btbanner.jpg

Myocardial segmentation using contour-constrained optical flow tracking

Despite the important role of object tracking using the Optical Flow (OF) in computer graphics applications, it has a limited role in segmenting speckle-free medical images such as magnetic resonance images of the heart. In this work, we propose a novel solution of the OF equation that allows incorporating additional constraints of the shape of the segmented object. We formulate a cost function that include the OF constraint in addition to myocardial contour properties such as smoothness and elasticity. The method is totally different from the common naïve combination of OF estimation within

Healthcare
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Survey and taxonomy of information-centric vehicular networking security attacks

Information Centric Networks (ICNs) overcome the current IP-based networks weakness and aim to ensure efficient data distribution. The Main ICN features are location-independent naming, in-network caching, name-based routing, built-in security, and high mobility. ICN vehicular networks stratify the ICN architecture on the Vehicular Ad hoc Networks (VANETs) to reinforce a massive amount of data transmission and handle the critical time interests inside the vehicular networks while taking into consideration the vehicles’ high mobility. Original Equipment Manufacturers (OEMs) gather the real-time

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Named entity recognition of persons' names in Arabic tweets

The rise in Arabic usage within various socialmedia platforms, and notably in Twitter, has led to a growing interest in building ArabicNatural Language Processing (NLP) applications capable of dealing with informal colloquialArabic, as it is the most commonly used form of Arabic in social media. The uniquecharacteristics of the Arabic language make the extraction of Arabic named entities achallenging task, to which, the nature of tweets adds new dimensions. The majority ofprevious research done on Arabic NER focused on extracting entities from the formallanguage, namely Modern Standard Arabic

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Streaming support for data intensive cloud-based sequence analysis

Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS) technology. Based on the concepts of "resources-on-demand" and "pay-as-you-go", scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client's site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Strain correction in interleaved strain-encoded (SENC) cardiac MR

The strain encoding (SENC) technique directly encodes regional strain of the heart into the acquired MR images and produces two images with two different tunings so that longitudinal strain, on the short-axis view, or circumferential strain on the long-axis view, are measured. Interleaving acquisition is used to shorten the acquisition time of the two tuned images by 50%, but it suffers from errors in the strain calculations due to inter-tunings motion of the heart. In this work, we propose a method to correct for the inter-tunings motion by estimating the motion-induced shift in the spatial

Artificial Intelligence
Healthcare
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Survey of Code Reuse Attacks and Comparison of Mitigation Techniques

Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses. Due to vulnerabilities found in software which allows attackers to corrupt the memory space of the vulnerable software to modify maliciously the contents of the memory; hence controlling the software to be able to run arbitrary code. The CRAs defenses either prevents the attacker from reading program code, controlling program memory space directly or indirectly through the usage of pointers. This paper provides a thorough evaluation of the current mitigation techniques against CRAs with regards to

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Supporting bioinformatics applications with hybrid multi-cloud services

Cloud computing provides a promising solution to the big data problem associated with next generation sequencing applications. The increasing number of cloud service providers, who compete in terms of performance and price, is a clear indication of a growing market with high demand. However, current cloud computing based applications in bioinformatics do not profit from this progress, because they are still limited to just one cloud service provider. In this paper, we present different use case scenarios using hybrid services and resources from multiple cloud providers for bioinformatics

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

A dynamic system development method for startups migrate to c loud

Cloud computing has become the most convenient environment for startups to run, build and deploy their products. Most startups work on availing platforms as a solution for problems related to education, health, traffic and others. Many of these platforms are mobile applications. With platforms as a service (PaaS), startups can provision their applications and gain access to a suite of IT infrastructure as their business needs. But, startups face many business and technical challenges to adapt rapidly to cloud computing. This paper helps startups to build a migration strategy. It discusses

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Artificial intelligence for retail industry in Egypt: Challenges and opportunities

In the era of digital transformation, a mass disruption in the global industries have been detected. Big data, the Internet of Things (IoT) and Artificial Intelligence (AI) are just examples of technologies that are holding such digital disruptive power. On the other hand, retailing is a high-intensity competition and disruptive industry driving the global economy and the second largest globally in employment after the agriculture. AI has large potential to contribute to global economic activity and the biggest sector gains would be in retail. AI is the engine that is poised to drive the

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Agriculture and Crops
Mechanical Design
Innovation, Entrepreneurship and Competitiveness

Entrepreneurial ecosystems: Global practices and reflection on the egyptian context

Following the Egyptian revolution that had taken place in 2011, many social and economic norms changed. The Egyptian economy witnessed a severe deterioration. In 2016, the Egyptian pound lost almost 60% of its value overnight. Egyptian government and foreign development agencies rallied to find a remedy to the economic downturn. With no jobs, young Egyptians started experimenting with the possibility of entrepreneurship. This acted as a pretext to the massive transformations taking place in the Egyptian ecosystem. The objective of this paper is to identify how Egypt should shape its

Innovation, Entrepreneurship and Competitiveness