Change search
Refine search result
1234567 1 - 50 of 585
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Al-Madina Higher Institute for Engineering and Technology.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Minia University, Egypt.
    Hamed, Hesham F. A.
    Minia University, Egypt.
    Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine2016In: Building Sustainable Health Ecosystems: 6th International Conference on Well-Being in the Information Society, WIS 2016, Tampere, Finland, September 16-18, 2016, Proceedings / [ed] Hongxiu Li, Pirkko Nykänen, Reima Suomi, Nilmini Wickramasinghe, Gunilla Widén, Ming Zhan, Springer International Publishing , 2016, p. 151-160Conference paper (Refereed)
    Abstract [en]

    The use of medical images has been continuously increasing, which makes manual investigations of every image a difficult task. This study focuses on classifying brain magnetic resonance images (MRIs) as normal, where a brain tumor is absent, or as abnormal, where a brain tumor is present. A hybrid intelligent system for automatic brain tumor detection and MRI classification is proposed. This system assists radiologists in interpreting the MRIs, improves the brain tumor diagnostic accuracy, and directs the focus toward the abnormal images only. The proposed computer-aided diagnosis (CAD) system consists of five steps: MRI preprocessing to remove the background noise, image segmentation by combining Otsu binarization and K-means clustering, feature extraction using the discrete wavelet transform (DWT) approach, and dimensionality reduction of the features by applying the principal component analysis (PCA) method. The major features were submitted to a kernel support vector machine (KSVM) for performing the MRI classification. The performance evaluation of the proposed system measured a maximum classification accuracy of 100 % using an available MRIs database. The processing time for all processes was recorded as 1.23 seconds. The obtained results have demonstrated the superiority of the proposed system.

  • 2.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronic and Communication Department Al-Madina Higher Institute for Engineering and Technology, Giza.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Faculty of Engineering, Minia University.
    Hamed, Hesham F. A.
    Faculty of Engineering, Minia University.
    Design and implementation of a computer-aided diagnosis system for brain tumor classification2017In: 2016 28th International Conference on Microelectronics (ICM), 2017, p. 73-76, article id 7847911Conference paper (Refereed)
    Abstract [en]

    Computer-aided diagnosis (CAD) systems have become very important for the medical diagnosis of brain tumors. The systems improve the diagnostic accuracy and reduce the required time. In this paper, a two-stage CAD system has been developed for automatic detection and classification of brain tumor through magnetic resonance images (MRIs). In the first stage, the system classifies brain tumor MRI into normal and abnormal images. In the second stage, the type of tumor is classified as benign (Noncancerous) or malignant (Cancerous) from the abnormal MRIs. The proposed CAD ensembles the following computational methods: MRI image segmentation by K-means clustering, feature extraction using discrete wavelet transform (DWT), feature reduction by applying principal component analysis (PCA). The two-stage classification has been conducted using a support vector machine (SVM). Performance evaluation of the proposed CAD has achieved promising results using a non-standard MRIs database.

  • 3.
    AL-Hilfi, Mohammed
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Olovsson, Emil
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Integration & Interoperabilitet vid utveckling av IT-system2017Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    This study will increase understanding of how a system developer can solve complex problems within organizations by developing a new information technology system (IT-system), with a focus on technical- and organizational interoperability at the integration process. The authors act as system developers through a case study where there is a need for a new IT-system.

    In this thesis an abductive approach is used combined with an instrumental case study. The work is split up into four phases:

    (1) Identifying problems within the organization by drawing up business models, collecting data through qualitative semi-structured interviews with stakeholders, and the development of a theoretical base. As theoretical frame of reference Integration and interoperability (I & I) is defined, business models are explained, how technical- and operational interoperability differs, how business models are created, agile software development and usability of IT-systems.

    (2) Building, intervention and evaluation. The IT-system is built using an iterative and incremental software development process where focus is on solving the identified problems. During the development stage requirements and challenges are identified to create the business model target view. The IT-system is developed to reflect this view where each iteration of the IT-system is revised from flaws discovered during interviews with stakeholders. The first iteration did not fulfill the stakeholders’ requirements and expectations, but later iterations succeeded in this and were implemented within the organization. When the IT-system had been implemented, it was evaluated by the end users to identify if the system developers had succeeded in solving the organizational problems, and to check usability of the IT-system.

    (3) Reflection and learning. The result is analyzed and discussed, compared to the theoretical frame of reference and course of action. The result shows that system developers succeeded in identifying complex problems within the organization and managed to create a new IT-system that met stakeholders’ needs, while also solving identified organizational problems.

    (4) In the last phase formalization of learning are general concepts compiled that can be used in other projects. In this thesis are eight aspects and principles are identified that can be used by system developers when developing IT-systems.

  • 4.
    Ali, Bako
    et al.
    Luleå University of Technology.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Faculty of Engineering, Al Azhar University.
    Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes2018In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, no 3, article id 817Article in journal (Refereed)
    Abstract [en]

     The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  • 5.
    Al-Serafi, Ayman
    et al.
    Teradata Corporation.
    Elragal, Ahmed
    Department of Business Informatics and Operations, German University in Cairo (GUC), Cairo.
    Visual trajectory pattern mining: An exploratory study in baggage handling systems2014In: Advances in data mining: Advances in data mining : applications and theoretical aspects : 14th Industrial Conference, ICDM 2014, St. Petersburg, Russia, July 16-20, 2014. Proceedings / [ed] Petra Perner, Cham: Encyclopedia of Global Archaeology/Springer Verlag, 2014, p. 159-173Conference paper (Refereed)
    Abstract [en]

    There is currently a huge amount of data being collected about movements of objects. Such data is called spatiotemporal data and paths left by moving-objects are called trajectories. Recently, researchers have been targeting those trajectories for extracting interesting and useful knowledge by means of pattern analysis and data mining. But, it is difficult to analyse huge datasets of trajectories without summarizing them and visualizing them for the knowledge seeker and for the decision makers. Therefore, this research paper focuses on utilizing visual techniques and data mining analysis of trajectory patterns in order to help extract patterns and knowledge in an interactive approach. The research study proposes a research framework which integrates multiple data analysis and visualization techniques in a coherent architecture in support of interactive trajectory pattern visualization for the decision makers. An application case-study of the techniques is conducted on an airport's baggage movement data within the Baggage Handling System (BHS). The results indicate the feasibility of the approach and its methods in visually analysing trajectory patterns in an interactive approach which can support the decision maker. © 2014 Springer International Publishing Switzerland.

  • 6. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Corporate Social Responsibility disclosure via Twitter by top listed UK companies: A Data Science Approach2018Conference paper (Refereed)
  • 7.
    Amin, Marian Hany
    et al.
    The German University in Cairo.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Financial Disclosure on Twitter by Top Listed UK Companies: A Data Science Approach2018Conference paper (Refereed)
    Abstract [en]

    Ongoing advancements in technology have changed dramatically the disclosure media that companies adopt. Such disclosure media have evolved from the traditional paper-based ones, to the internet as the new platform to disclose information via companies’ designated websites. However, currently the new media for disclosures are the social media. The aim of this paper is to investigate corporate social media accounts for financial disclosure, as well as, identify its determinants. The sample of the study is comprised of the tweets posted on the Twitter accounts belonging to the FTSE 350 constituents. Topic modeling is applied to identify financial disclosure tweets and logistic regression is run to identify the determinants of financial disclosure on Twitter. Results show that companies use Twitter to make corporate disclosures and some board characteristics are found to have a significant relationship with financial disclosure.

  • 8. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Twitter: An emerging media for corporate disclosure2018Conference paper (Refereed)
  • 9.
    Andersson, Adrian
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering.
    Designprinciper för digitala tjänster inom gruvindustrin2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Gruvindustrin befinner sig i en stor förändring allt eftersom digitaliseringen fortskrider. Digitaliseringen innebär att en mängd nya tekniker börjar implementeras i gruvor runt om i världen. En av dessa tekniker är att de anställda använder smartphones i arbetet. Detta medför dock problem då miljön inom gruvindustrin inte är optimal för de generella designprinciperna som finns att tillgå idag. Denna studie undersöker och utvecklar därför designprinciper som kan användas för mobila applikationer inom gruvindustrin. Studien har teori som behandlar generella designprinciper för mobila applikationer, mobila designmönster samt industri 4.0. Vidare har en kvalitativ studie genomförts i form av intervjuer med respondenter från både gruvindustrin men också personer med mångårig erfarenhet av utveckling av mobila applikationer till gruvindustrin. Kvalitativa studien genomfördes för att öka förståelsen kring kontexten som infinner sig inom gruvindustrin men också använda den expertis som finns inom området för att kunna utveckla relevanta designprinciper som kan vara till användning i praktiken. Den insamlade empirin jämfördes sedan mot teori och med hjälp av studiens analys kunde designprinciper som kan anses vara specifika för gruvindustrin identifieras. Slutsatserna visar att enkelhet är nyckeln till framgång och element såsom automatisk ifyllnad, enkel och snabb navigering, stora ikoner och användning av färger är några av de möjliga lösningar som föreslagits för att ta fram en användarvänlig applikation.   

  • 10.
    Andersson, Ingemar
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindqvist, Göran
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Randers, Frode
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Preservation Services Planning: A Decision Support Framework2014Conference paper (Refereed)
    Abstract [en]

    Commercial organizations are experiencing a growing need to access business-criticaldata in the longer term of their operations. Governmental regulations as well as commercial interestsinfluence this need. Organizations are willing to procure cost-effective services to this end - servicesthat are increasingly based as public or private cloud solutions. With the advent of autonomous cloudservices comes the possibility to assemble (mix and match) preservation services in a workflowbasedservice-oriented solution. Following the interaction with information managers in (three)commercial organizations operating in different markets and after a review of current literature, wehave revealed a lack of comprehensive guidelines and decision support in service selection as part ofpreservation planning. Existing models and frameworks used for assessing the quality of preservationservices either manage performance-based features that service provider’s offer or the technicaldetails of the preservation actions themselves. In this paper we present our preservation-planningframework (Preserv-Qual) that addresses the need for decision support in the selection ofpreservation services that explicitly acknowledge the differences among aspects of information usewithin an organization. We describe the outcome from an evaluation of the framework in threecommercial organisations as a service quality assessment and decision support tool. This papershows how our framework supports the use of existing and proven methods, models and principlesfor service assessment, digital preservation and decision support.

  • 11.
    Andersson, Ingemar
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Nilsson, Jörgen
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindqvist, Göran
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lindbäck, Lena
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Runardotter, Mari
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Innovation and Design.
    Web archiving using the collaborative archiving services testbed2011In: eChallenges e2011 Conference Proceedings / [ed] Paul Cunningham; Miriam Cunningham, IIMC International Information Management Corporation , 2011Conference paper (Other academic)
    Abstract [en]

    Websites constitute one category of official records and as such should be preserved for the long term in compliance with Swedish legislation. Collaborative Archiving Services Testbed (CAST) supports actors involved in the selective web archiving process, from harvesting to the creation of an information package ready for transfer to a long-term archive at National Archives of Sweden. CAST is developed in compliance with the ISO standards Open Archival Information System (OAIS) and Producer-Archive Interface Methodology Abstract Standard (PAIMAS), and do also consider other well-known and established standards and recommendations in digital preservation area. CAST promotes cooperation, knowledge acquisition and sharing among users in an experimental step-by-step workflow, encouraging a proactive approach resulting in authority websites better adapted to digital preservation recommendations. CAST is developed at LDP Centre, a national competence centre in Sweden, within the digital preservation area.

  • 12.
    Aristomenopoulos, Georgios
    et al.
    Institute of Communication and Computer Systems, Athens.
    Kaninis, Argyris
    VELTI SA of Software Products and Related Products and Services.
    Vlahopoulos, Panagiotis
    VELTI SA of Software Products and Related Products and Services.
    Sällström, Annika
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Distance- Spanning Technology.
    Benbadis, Farid
    Thales Communications and Security.
    Papavassiliou, Symeon
    Institute of Communication and Computer Systems, Athens.
    The QUEENS experiment through TEFIS platform2012In: Testbeds and Research Infrastructure: Development of Networks and Communities: 8th International ICST Conference, TridentCom 2012, Thessanoliki, Greece, June 11-13, 2012, Revised Selected Papers / [ed] Thanasis Korakis ; Michael Zink ; Maximilian Ott, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2012, p. 394-396Conference paper (Refereed)
    Abstract [en]

    QUEENS (Dynamic Quality User Experience ENabling Mobile Multimedia Services) aims at exploiting and leveraging on the benefits and flexibility provided by a novel dynamic real-time QoE provisioning framework in order to assess and establish a new era of user-centric mobile multimedia applications. To achieve that, QUEENS utilizes and builds on the TEFIS infrastructure (EC ICT FIRE initiative) that provides a unique integrated platform for supporting efficient Future Internet service experiment and development involving different actors and heterogeneous testbeds. The TEFIS tools and facilities for designing, planning and executing QUEENS experiment, along with a QoE-aware mobile multimedia application prototype will be demonstrated, forming the trends of future internet services and experimental procedures

  • 13.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Workshop on Emerging Aspects in Information Security2015Other (Other (popular science, discussion, etc.))
  • 14.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Communications in Computer and Information Science, Vol. 3812013Other (Other (popular science, discussion, etc.))
  • 15.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Computer Networks2011Other (Other (popular science, discussion, etc.))
    Abstract [en]

    The International Journal of Computer and Telecommunications Networking (COMNET)

  • 16.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Computers & Security2014Other (Other (popular science, discussion, etc.))
  • 17.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Concurrency and Computation: Practice and Experience2016Other (Other (popular science, discussion, etc.))
  • 18.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Health Information Science and Systems (HISS)2016Other (Other (popular science, discussion, etc.))
  • 19.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Information Sciences2013Other (Other (popular science, discussion, etc.))
  • 20.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Intelligent Systems Reference Library, Vol. 702014Other (Other (popular science, discussion, etc.))
  • 21.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Mobile and Ubiquitous Systems2013Other (Other (popular science, discussion, etc.))
  • 22.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Telecommunications2016Other (Other (popular science, discussion, etc.))
  • 23.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Conference on Telecommunications2016Other (Other (popular science, discussion, etc.))
  • 24.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Japan-Egypt Conference on Electronics, Communications and Computers2013Other (Other (popular science, discussion, etc.))
  • 25.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: International Journal of Computational Vision and Robotics. Special Issue on: "Advances in Soft Computing Techniques for Image Processing"2013Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Vol. 3, No. 4

  • 26.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Pattern Recognition2014Other (Other (popular science, discussion, etc.))
    Abstract [en]

    The Journal of the Pattern Recognition Society

  • 27.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Science and Information Conference2014Other (Other (popular science, discussion, etc.))
  • 28.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Science and Information Conference2013Other (Other (popular science, discussion, etc.))
  • 29.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: SpringerPlus2015Other (Other (popular science, discussion, etc.))
  • 30.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Studies in Computational Intelligence, Vol. 6302016Other (Other (popular science, discussion, etc.))
  • 31.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 28th International Conference on Image and Vision Computing New Zealand (IVCNZ 2013)2013Other (Other (popular science, discussion, etc.))
  • 32.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 29th International Conference on Image and Vision Computing New Zealand (IVCNZ 2014)2014Other (Other (popular science, discussion, etc.))
  • 33.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 30th International Conference on Image and Vision Computing New Zealand ( (IVCNZ 2015)2015Other (Other (popular science, discussion, etc.))
  • 34.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 31st International Conference Image and Vision Computing New Zealand (IVCNZ 2016)2016Other (Other (popular science, discussion, etc.))
  • 35.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: The 49th Hawaii International Conference on System Sciences (HICSS-49)2016Other (Other (popular science, discussion, etc.))
  • 36.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Aktivitet: Workshop on Emerging Aspects in Information Security2014Other (Other (popular science, discussion, etc.))
  • 37.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Erratum to : Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU2016In: Soft Computing Applications: Proceedings of the 6th International Workshop Soft Computing Applications (SOFA 2014) / [ed] Valentina Emilia Balas; Lakhmi C. Jain; Branko Kovačević, New York: Encyclopedia of Global Archaeology/Springer Verlag, 2016, Vol. 2, p. E1-Conference paper (Refereed)
    Abstract [en]

    Fingerprint is one of the broadly utilized biometric traits for personal identification in both civilian and forensic applications due to its high acceptability, strong security, and low cost. Fingerprint ridge orientation is one of the global fingerprint representations that keeps the holistic ridge structure in a small storage area. The importance of fingerprint ridge orientation comes from its usage in fingerprint singular point detection, coarse level classification, and fingerprint alignment. However, processing time is an important factor in any automatic fingerprint identification system, estimating that ridge orientation image may consume long processing time. This research presents an efficient ridge orientation estimation approach by incorporating a Graphics Processing Unit (GPU) capability to the traditional pixel gradient method. The simulation work shows a significant enhancement in ridge orientation estimation time by 6.41x using a general purpose GPU in comparison to the CPU execution.

  • 38.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU2016In: Soft Computing Applications: Proceedings of the 6th International Workshop Soft Computing Applications (SOFA 2014) / [ed] Valentina Emilia Balas; Lakhmi C. Jain; Branko Kovačević, New York: Encyclopedia of Global Archaeology/Springer Verlag, 2016, Vol. 2, p. 891-902Conference paper (Refereed)
    Abstract [en]

    Fingerprint is one of the broadly utilized biometric traits for personal identification in both civilian and forensic applications due to its high acceptability, strong security, and low cost. Fingerprint ridge orientation is one of the global fingerprint representations that keeps the holistic ridge structure in a small storage area. The importance of fingerprint ridge orientation comes from its usage in fingerprint singular point detection, coarse level classification, and fingerprint alignment. However, processing time is an important factor in any automatic fingerprint identification system, estimating that ridge orientation image may consume long processing time. This research presents an efficient ridge orientation estimation approach by incorporating a Graphics Processing Unit (GPU) capability to the traditional pixel gradient method. The simulation work shows a significant enhancement in ridge orientation estimation time by 6.41x using a general purpose GPU in comparison to the CPU execution.

  • 39.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Fingerprint local invariant feature extraction on GPU with CUDA2013In: Informatica, ISSN 0350-5596, E-ISSN 1854-3871, Vol. 37, no 3, p. 279-284Article in journal (Refereed)
    Abstract [en]

    Driven from its uniqueness, immutability, acceptability, and low cost, fingerprint is in a forefront between biometric traits. Recently, the GPU has been considered as a promising parallel processing technology due to its high performance computing, commodity, and availability. Fingerprint authentication is keep growing, and includes the deployment of many image processing and computer vision algorithms. This paper introduces the fingerprint local invariant feature extraction using two dominant detectors, namely SIFT and SURF, which are running on the CPU and the GPU. The paper focuses on the consumed time as an important factor for fingerprint identification. The experimental results show that the GPU implementations produce promising behaviors for both SIFT and SURF compared to the CPU one. Moreover, the SURF feature detector provides shorter processing time compared to the SIFT CPU and GPU implementations.

  • 40.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    From classical methods to animal biometrics: A review on cattle identification and tracking2016In: Computers and Electronics in Agriculture, ISSN 0168-1699, E-ISSN 1872-7107, Vol. 123, p. 423-435Article in journal (Refereed)
    Abstract [en]

    Cattle, buffalo and cow, identification has recently played an influential role towards understanding disease trajectory, vaccination and production management, animal traceability, and animal ownership assignment. Cattle identification and tracking refers to the process of accurately recognizing individual cattle and their products via a unique identifier or marker. Classical cattle identification and tracking methods such as ear tags, branding, tattooing, and electrical methods have long been in use; however, their performance is limited due to their vulnerability to losses, duplications, fraud, and security challenges. Owing to their uniqueness, immutability, and low costs, biometric traits mapped into animal identification systems have emerged as a promising trend. Biometric identifiers for beef animals include muzzle print images, iris patterns, and retinal vascular patterns. Although using biometric identifiers has replaced human experts with computerized systems, it raises additional challenges in terms of identifier capturing, identification accuracy, processing time, and overall system operability. This article reviews the evolution in cattle identification and tracking from classical methods to animal biometrics. It reports on traditional animal identification methods and their advantages and problems. Moreover, this article describes the deployment of biometric identifiers for effectively identifying beef animals. The article presents recent research findings in animal biometrics, with a strong focus on cattle biometric identifiers such as muzzle prints, iris patterns, and retinal vascular patterns. A discussion of current challenges involved in the biometric-based identification systems appears in the conclusions, which may drive future research directions.

  • 41.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Introduction to Information Security Foundations and Applications2018In: Information Security: Foundations, technologies and applications / [ed] Ali Ismail Awad and Michael Fairhurst, Institution of Engineering and Technology, 2018, , p. 432p. 3-9Chapter in book (Refereed)
  • 42.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Andrzej, BialasInstitute of Innovative Technologies EMAG.
    Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017)2017Conference proceedings (editor) (Refereed)
    Abstract [en]

    https://fedcsis.org/2017/insert

  • 43.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hassaballah, MahmoudImage and Video Processing Lab, Faculty, South Valley University.
    Image Feature Detectors and Descriptors: Foundations and Applications2016Collection (editor) (Refereed)
  • 44.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hassanien, Aboul Ella
    Cairo University.
    Erratum: Impact of Some Biometric Modalities on Forensic Science2014In: Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Switzerland: Springer International Publishing , 2014, p. E1-Chapter in book (Refereed)
  • 45.
    Awad, Ali Ismail
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hassanien, Aboul Ella
    Faculty of Computers and Information, Cairo University.
    Impact of Some Biometric Modalities on Forensic Science2014In: Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Springer International Publishing , 2014, p. 47-62Chapter in book (Refereed)
    Abstract [en]

    Recently, forensic science has had many challenges in many different types of crimes and crime scenes, vary from physical crimes to cyber or computer crimes. Accurate and efficient human identification or recognition have become crucial for forensic applications due to the large diversity of crime scenes, and because of the increasing need to accurately identify criminals from the available crime evidences. Biometrics is an emerging technology that provides accurate and highly secure personal identification and verification systems for civilian and forensic applications. The positive impact of biometric modalities on forensic science began with the rapid developments in computer science, computational intelligence, and computing approaches. These advancements have been reflected in the biometric modality capturing process, feature extraction, feature robustness, and features matching. A complete and automatic biometric identification or recognition systems have been built accordingly. This chapter presents a study of the impacts of using some biometric modalities in forensic applications. Although biometrics identification replaces human work with computerized and automatic systems in order to achieve better performance, new challenges have arisen. These challenges lie in biometric system reliability and accuracy, system response time, data mining and classification, and protecting user privacy. This chapter sheds light on the positive and the negative impacts of using some biometric modalities in forensic science. In particular, the impacts of fingerprint image, facial image, and iris patterns are considered. The selected modalities are covered preliminarily before tackling their impact on forensic applications. Furthermore, an extensive look at the future of biometric modalities deployment in forensic applications is covered as the last part of the chapter.

  • 46.
    Awad, Ali Ismail
    et al.
    Faculty of Engineering, Faculty of Engineering, Al Azhar University, Qena, Egypt.
    Hassanien, Aboul EllaCairo University.Baba, KensukeKyushu University.
    Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings2013Collection (editor) (Refereed)
  • 47.
    Backlund, Fredrik
    et al.
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Business Administration and Industrial Engineering.
    Chroneer, Diana
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Sundqvist, Erik
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Business Administration and Industrial Engineering.
    Project Management Maturity Models – A Critical Review: A Case Study within Swedish Engineering and Construction Organizations2014In: Procedia - Social and Behavioral Sciences, ISSN 1877-0428, E-ISSN 1877-0428, Vol. 119, p. 837-846Article in journal (Refereed)
    Abstract [en]

    Different kinds of project management maturity models (PM3s) exist today, most of them inspired by the capability maturity model (CMM) developed in the beginning of the 90ies, originally intended to measure capability in software development projects. Research indicates that organizations with higher project management (PM) maturity levels are expected to be successful in terms of project effectiveness and efficiency, and thus have a competitive advantage in the marketplace. Though, despite several PM3s developed during a time period of over 20 years, knowledge about how PM3s are a*pplied in organizations is sparse within the PM literature. This paper explores how major engineering and construction companies view PM maturity and PM3s in order to develop and improve their PM practices. These kinds of organizations are mainly project-intensive, objective oriented,and have the capabilities to perform overall business development initiatives, i.e. suitable for applying PM3s.The contribution of PM3s to organizational improvement and development is somewhat unclear. Therefore, a literature review highlights different aspects regarding PM3s, specifically their purpose, strengths, and weaknesses. To what extent PM3s are used, interviews have been conducted with seven respondents within different project intensive organizations, in their roles as project managers or in charge of PM development. How a PM3 can beintroduced and applied is explored via an in-depth case study at the major mining company in Sweden, LKAB. However, tentative results show that the application of PM3s in Swedish engineering and construction organizations are limited, indicating that further research is needed

  • 48.
    Backlund, Fredrik
    et al.
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Business Administration and Industrial Engineering.
    Chronéer, Diana
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Sundqvist, Erik
    Luleå University of Technology, Department of Business Administration, Technology and Social Sciences, Business Administration and Industrial Engineering.
    Maturity assessment: towards continuous improvements for project-based organisations?:2015In: International Journal of Managing Projects in Business/Emerald, ISSN 1753-8378, E-ISSN 1753-8386, Vol. 8, no 2, p. 256-278Article in journal (Refereed)
    Abstract [en]

    PurposeThe aim of this study is to contribute to the empirical research on project management maturity assessments, specifically based on a maturity model. Design/methodology/approachThe empirical data is based on a case study including in-depth interviews with a semi-structured approach, followed by a focus group interview. A survey was distributed within a project-based organisation and to client and stakeholder representatives, and then analysed. The organisation in the case study is a project department within a Swedish mining company. FindingsCareful considerations are needed when choosing a project management maturity model (PM3) as the model structure can influence the assessment’s focus. It is also important to include both internal and external project stakeholders in the assessment to achieve an efficiency and effectiveness perspective when analysing PM capabilities. Valid information from an assessment is crucial, therefore, clear communication from management is important in order to motivate the participants in the assessment. Research limitations/implicationsImproved understanding for implementing and applying a PM3 contributes to the increased knowledge of drivers, enablers and obstacles when assessing PM maturity, which also creates a basis for further research initiatives. Practical implicationsAn increased knowledge of drivers, enablers and obstacles should be valuable for practitioners introducing and applying a PM3.Originality/valueThis case study gives an in-depth insight into the implementation of a PM3 within a project-based organisation. Through conducting a literature review, it was found that this type of empirical research is rare

  • 49.
    Badawy, Shaimaa Ali
    et al.
    University of Western Ontario.
    Elragal, Ahmed
    German University in Cairo (GUC).
    Gabr, Mahmoud Mohamed Hassan
    Faculty of Science, Alexandria University.
    Multivariate similarity-based conformity measure (MSCM: An outlier detection measure for data mining applications2008In: Proceedings of the IASTED International Conference on Artificial Intelligence and Applications Machine Learning: as part of the 26th IASTED International Multi-Conference on Applied Informatics ; February 11 - 13, 2008, Innsbruck, Austria / [ed] Alexander Gammermann, Anaheim, Calif: ACTA Press, 2008, p. 314-320Conference paper (Refereed)
    Abstract [en]

    Outliers, the odd objects in the dataset, can be viewed from two different perspectives; the outliers as undesirable objects that should be treated or deleted in the data preparation step of the data mining process, and the outliers as interesting objects that are identified for their own interest in the data mining step of the mining process. In the latter case, outliers shouldn't be removed, that's why one of the main categories of tasks performed by data mining techniques is outlier detection. Applications that make use of such detection include credit card fraud detection and network intrusion detection. Most of the available outlier detection techniques rely in a distance measure to compare the objects in the dataset which imposed the restriction of dealing with numeric data. In this paper a new multivariate similarity-based conformity measure (MSCM) is suggested to be used to detect outliers in datasets that contain attributes of different data types. The MSCM satisfies two other desirable features; being a multivariate measure and giving ranking instead of a binary judgment of the object. The measure has been applied on three different datasets in order to be evaluated; the measure has shown good results in these experiments.

  • 50.
    Basden, Andrew
    et al.
    Salford University.
    Mirijamdotter, AnitaLuleå University of Technology, Department of Business Administration, Technology and Social Sciences, Innovation and Design.Sytse, StrijbosVrije Universiteit.
    Integrating visions of technology: proceedings of the 12th annual working conference of CPTS2006Collection (editor) (Other academic)
1234567 1 - 50 of 585
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf