Skip to main content

Showing 1–21 of 21 results for author: Moustafa, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15003  [pdf, other

    cs.CV cs.HC

    Real-Time Hand Gesture Recognition: Integrating Skeleton-Based Data Fusion and Multi-Stream CNN

    Authors: Oluwaleke Yusuf, Maki Habib, Mohamed Moustafa

    Abstract: This study focuses on Hand Gesture Recognition (HGR), which is vital for perceptual computing across various real-world contexts. The primary challenge in the HGR domain lies in dealing with the individual variations inherent in human hand morphology. To tackle this challenge, we introduce an innovative HGR framework that combines data-level fusion and an Ensemble Tuner Multi-stream CNN architectu… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: 13 pages. 7 figures. Code available at https://github.com/Outsiders17711/e2eET-Skeleton-Based-HGR-Using-Data-Level-Fusion

  2. arXiv:2312.10854  [pdf, other

    cs.CV cs.LG

    The Right Losses for the Right Gains: Improving the Semantic Consistency of Deep Text-to-Image Generation with Distribution-Sensitive Losses

    Authors: Mahmoud Ahmed, Omer Moussa, Ismail Shaheen, Mohamed Abdelfattah, Amr Abdalla, Marwan Eid, Hesham Eraqi, Mohamed Moustafa

    Abstract: One of the major challenges in training deep neural networks for text-to-image generation is the significant linguistic discrepancy between ground-truth captions of each image in most popular datasets. The large difference in the choice of words in such captions results in synthesizing images that are semantically dissimilar to each other and to their ground-truth counterparts. Moreover, existing… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

  3. arXiv:2312.08903  [pdf, other

    cs.CR

    Attestation with Constrained Relying Party

    Authors: Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan-Erik Ekberg

    Abstract: Allowing a compromised device to receive privacy-sensitive sensor readings, or to operate a safety-critical actuator, carries significant risk. Usually, such risks are mitigated by validating the device's security state with remote attestation, but current remote attestation protocols are not suitable when the beneficiary of attestation, the relying party, is a constrained device such as a small s… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  4. arXiv:2303.01468  [pdf

    cs.CV eess.SP

    Dataset Creation Pipeline for Camera-Based Heart Rate Estimation

    Authors: Mohamed Moustafa, Amr Elrasad, Joseph Lemley, Peter Corcoran

    Abstract: Heart rate is one of the most vital health metrics which can be utilized to investigate and gain intuitions into various human physiological and psychological information. Estimating heart rate without the constraints of contact-based sensors thus presents itself as a very attractive field of research as it enables well-being monitoring in a wider variety of scenarios. Consequently, various techni… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: Presented at the International Conference on Machine Vision 2022, Rome, Italy. Paper is 8 pages long and includes 7 figures (including table)

  5. Dynamic Conditional Imitation Learning for Autonomous Driving

    Authors: Hesham M. Eraqi, Mohamed N. Moustafa, Jens Honer

    Abstract: Conditional imitation learning (CIL) trains deep neural networks, in an end-to-end manner, to mimic human driving. This approach has demonstrated suitable vehicle control when following roads, avoiding obstacles, or taking specific turns at intersections to reach a destination. Unfortunately, performance dramatically decreases when deployed to unseen environments and is inconsistent against varyin… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Comments: 14 pages, 11 figures, 7 tables

    Journal ref: IEEE Transactions on Intelligent Transportation Systems

  6. arXiv:2108.07661  [pdf, other

    cs.CV

    An Evaluation of RGB and LiDAR Fusion for Semantic Segmentation

    Authors: Amr S. Mohamed, Ali Abdelkader, Mohamed Anany, Omar El-Behady, Muhammad Faisal, Asser Hangal, Hesham M. Eraqi, Mohamed N. Moustafa

    Abstract: LiDARs and cameras are the two main sensors that are planned to be included in many announced autonomous vehicles prototypes. Each of the two provides a unique form of data from a different perspective to the surrounding environment. In this paper, we explore and attempt to answer the question: is there an added benefit by fusing those two forms of data for the purpose of semantic segmentation wit… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  7. arXiv:2108.02148  [pdf, other

    cs.SD cs.CV cs.HC cs.LG eess.AS

    Pervasive Hand Gesture Recognition for Smartphones using Non-audible Sound and Deep Learning

    Authors: Ahmed Ibrahim, Ayman El-Refai, Sara Ahmed, Mariam Aboul-Ela, Hesham M. Eraqi, Mohamed Moustafa

    Abstract: Due to the mass advancement in ubiquitous technologies nowadays, new pervasive methods have come into the practice to provide new innovative features and stimulate the research on new human-computer interactions. This paper presents a hand gesture recognition method that utilizes the smartphone's built-in speakers and microphones. The proposed system emits an ultrasonic sonar-based signal (inaudib… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  8. arXiv:2102.06864  [pdf, other

    cs.CV

    Adversarial Unsupervised Domain Adaptation Guided with Deep Clustering for Face Presentation Attack Detection

    Authors: Yomna Safaa El-Din, Mohamed N. Moustafa, Hani Mahdi

    Abstract: Face Presentation Attack Detection (PAD) has drawn increasing attentions to secure the face recognition systems that are widely used in many applications. Conventional face anti-spoofing methods have been proposed, assuming that testing is from the same domain used for training, and so cannot generalize well on unseen attack scenarios. The trained models tend to overfit to the acquisition sensors… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

    Comments: 10 pages, 2 figures, to be published in IMPROVE 2021

  9. arXiv:2009.12466  [pdf

    eess.IV cs.CE cs.CV

    Enhanced 3D Myocardial Strain Estimation from Multi-View 2D CMR Imaging

    Authors: Mohamed Abdelkhalek, Heba Aguib, Mohamed Moustafa, Khalil Elkhodary

    Abstract: In this paper, we propose an enhanced 3D myocardial strain estimation procedure, which combines complementary displacement information from multiple orientations of a single imaging modality (untagged CMR SSFP images). To estimate myocardial strain across the left ventricle, we register the sets of short-axis, four-chamber and two-chamber views via a 2D non-rigid registration algorithm implemented… ▽ More

    Submitted 29 November, 2020; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: This a preprint of original research work

    ACM Class: I.3; I.4; I.6; J.3

  10. arXiv:2007.13662  [pdf

    cs.LG stat.ML

    Predicting Nonlinear Seismic Response of Structural Braces Using Machine Learning

    Authors: Elif Ecem Bas, Denis Aslangil, Mohamed A. Moustafa

    Abstract: Numerical modeling of different structural materials that have highly nonlinear behaviors has always been a challenging problem in engineering disciplines. Experimental data is commonly used to characterize this behavior. This study aims to improve the modeling capabilities by using state of the art Machine Learning techniques, and attempts to answer several scientific questions: (i) Which ML algo… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 6 pages, 6 figures, conference

  11. arXiv:2004.12040  [pdf, other

    cs.CV

    Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study

    Authors: Yomna Safaa El-Din, Mohamed N. Moustafa, Hani Mahdi

    Abstract: Biometric presentation attack detection is gaining increasing attention. Users of mobile devices find it more convenient to unlock their smart applications with finger, face or iris recognition instead of passwords. In this paper, we survey the approaches presented in the recent literature to detect face and iris presentation attacks. Specifically, we investigate the effectiveness of fine tuning v… ▽ More

    Submitted 28 April, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

    Comments: A preprint of a paper accepted by IET Biometrics journal and is subject to Institution of Engineering and Technology Copyright

  12. arXiv:2004.02037  [pdf

    cs.LG cs.CE eess.SY

    Using Machine Learning Approach for Computational Substructure in Real-Time Hybrid Simulation

    Authors: Elif Ecem Bas, Mohamed A. Moustafa, David Feil-Seifer, Janelle Blankenburg

    Abstract: Hybrid simulation (HS) is a widely used structural testing method that combines a computational substructure with a numerical model for well-understood components and an experimental substructure for other parts of the structure that are physically tested. One challenge for fast HS or real-time HS (RTHS) is associated with the analytical substructures of relatively complex structures, which could… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: 10 Pages, 12 Figures, IMAC 38i Conference

  13. arXiv:1901.09097  [pdf, other

    cs.CV cs.LG stat.ML

    Driver Distraction Identification with an Ensemble of Convolutional Neural Networks

    Authors: Hesham M. Eraqi, Yehya Abouelnaga, Mohamed H. Saad, Mohamed N. Moustafa

    Abstract: The World Health Organization (WHO) reported 1.25 million deaths yearly due to road traffic accidents worldwide and the number has been continuously increasing over the last few years. Nearly fifth of these accidents are caused by distracted drivers. Existing work of distracted driver detection is concerned with a small set of distractions (mostly, cell phone usage). Unreliable ad-hoc methods are… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1706.09498

    Journal ref: Journal of Advanced Transportation, Machine Learning in Transportation (MLT) Issue, 2019

  14. arXiv:1710.03804  [pdf, other

    cs.LG

    End-to-End Deep Learning for Steering Autonomous Vehicles Considering Temporal Dependencies

    Authors: Hesham M. Eraqi, Mohamed N. Moustafa, Jens Honer

    Abstract: Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to training artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, most existing solutions consider only the visual camera frames as input, thus ignoring the temporal relationship between frames. In this work, we p… ▽ More

    Submitted 22 November, 2017; v1 submitted 10 October, 2017; originally announced October 2017.

    Comments: 31st Conference on Neural Information Processing Systems (NIPS), Machine Learning for Intelligent Transportation Systems Workshop, Long Beach, CA, USA, 2017

  15. arXiv:1706.09498  [pdf, other

    cs.CV

    Real-time Distracted Driver Posture Classification

    Authors: Yehya Abouelnaga, Hesham M. Eraqi, Mohamed N. Moustafa

    Abstract: In this paper, we present a new dataset for "distracted driver" posture estimation. In addition, we propose a novel system that achieves 95.98% driving posture estimation classification accuracy. The system consists of a genetically-weighted ensemble of Convolutional Neural Networks (CNNs). We show that a weighted ensemble of classifiers using a genetic algorithm yields in better classification co… ▽ More

    Submitted 29 November, 2018; v1 submitted 28 June, 2017; originally announced June 2017.

    Journal ref: 32nd Conference on Neural Information Processing Systems (NIPS 2018), Workshop on Machine Learning for Intelligent Transportation Systems

  16. arXiv:1703.08366  [pdf

    cs.CV

    A Hybrid Deep Learning Approach for Texture Analysis

    Authors: Hussein Adly, Mohamed Moustafa

    Abstract: Texture classification is a problem that has various applications such as remote sensing and forest species recognition. Solutions tend to be custom fit to the dataset used but fails to generalize. The Convolutional Neural Network (CNN) in combination with Support Vector Machine (SVM) form a robust selection between powerful invariant feature extractor and accurate classifier. The fusion of expert… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  17. arXiv:1611.04905  [pdf, other

    cs.CV

    CIFAR-10: KNN-based Ensemble of Classifiers

    Authors: Yehya Abouelnaga, Ola S. Ali, Hager Rady, Mohamed Moustafa

    Abstract: In this paper, we study the performance of different classifiers on the CIFAR-10 dataset, and build an ensemble of classifiers to reach a better performance. We show that, on CIFAR-10, K-Nearest Neighbors (KNN) and Convolutional Neural Network (CNN), on some classes, are mutually exclusive, thus yield in higher accuracy when combined. We reduce KNN overfitting using Principal Component Analysis (P… ▽ More

    Submitted 15 November, 2016; originally announced November 2016.

  18. arXiv:1609.08414  [pdf

    cs.NE

    Reactive Collision Avoidance using Evolutionary Neural Networks

    Authors: Hesham Eraqi, Youssef EmadEldin, Mohamed Moustafa

    Abstract: Collision avoidance systems can play a vital role in reducing the number of accidents and saving human lives. In this paper, we introduce and validate a novel method for vehicles reactive collision avoidance using evolutionary neural networks (ENN). A single front-facing rangefinder sensor is the only input required by our method. The training process and the proposed method analysis and validatio… ▽ More

    Submitted 27 September, 2016; originally announced September 2016.

    Comments: ECTA 2016. Final paper is at SCITEPRESS digital library

  19. arXiv:1609.08399  [pdf, other

    cs.CV

    House price estimation from visual and textual features

    Authors: Eman Ahmed, Mohamed Moustafa

    Abstract: Most existing automatic house price estimation systems rely only on some textual data like its neighborhood area and the number of rooms. The final price is estimated by a human agent who visits the house and assesses it visually. In this paper, we propose extracting visual features from house photographs and combining them with the house's textual information. The combined features are fed to a f… ▽ More

    Submitted 27 September, 2016; originally announced September 2016.

    Comments: NCTA 2016. Final paper is on SCITEPRESS digital library

  20. arXiv:1609.06260  [pdf, other

    cs.CV

    GAdaBoost: Accelerating Adaboost Feature Selection with Genetic Algorithms

    Authors: Mai Tolba, Mohamed Moustafa

    Abstract: Boosted cascade of simple features, by Viola and Jones, is one of the most famous object detection frameworks. However, it suffers from a lengthy training process. This is due to the vast features space and the exhaustive search nature of Adaboost. In this paper we propose GAdaboost: a Genetic Algorithm to accelerate the training procedure through natural feature selection. Specifically, we propos… ▽ More

    Submitted 20 September, 2016; originally announced September 2016.

    Comments: 8th International Conference on Evolutionary Computation Theory and Applications (ECTA 2016). Final paper will appear at the SCITEPRESS Digital Library

  21. arXiv:1511.08899  [pdf, other

    cs.CV cs.MM cs.NE

    Applying deep learning to classify pornographic images and videos

    Authors: Mohamed Moustafa

    Abstract: It is no secret that pornographic material is now a one-click-away from everyone, including children and minors. General social media networks are striving to isolate adult images and videos from normal ones. Intelligent image analysis methods can help to automatically detect and isolate questionable images in media. Unfortunately, these methods require vast experience to design the classifier inc… ▽ More

    Submitted 28 November, 2015; originally announced November 2015.

    Comments: PSIVT 2015, the final publication is available at link.springer.com