Fathi E Abd El-Samie
Applied Filters
- Fathi E Abd El-Samie
- AuthorRemove filter
People
Colleagues
- Moawad Ibrahim Dessouky (38)
- El Sayed M El-Rabaie (30)
- Walid El-Shafai (23)
- Osama S Faragallah (17)
- Osama Zahran (16)
- Saleh A Alshebeili (16)
- Adel S El-Fishawy (12)
- Sayed El-Rabaie (12)
- Ghada M El-Banby (10)
- Emad S Hassan (9)
- Mohamed M El-Halawany (8)
- Bassiouny M Sallam (7)
- Sami A El-Dolil (7)
- Huda I Ashiba (6)
- Faisal S Al-Kamali (5)
- Farid Shawki (5)
- Ibrahim M Eldokany (5)
- Saied M Abd El-Atty (5)
- Waleed Al-Nuaimy (5)
Publication
Journal/Magazine Names
- Wireless Personal Communications: An International Journal (30)
- Multimedia Tools and Applications (28)
- International Journal of Speech Technology (20)
- Digital Signal Processing (11)
- Transactions on Emerging Telecommunications Technologies (6)
- Computers and Electrical Engineering (3)
- Neural Computing and Applications (3)
- 3D Research (2)
- IET Communications (2)
- Journal of Visual Communication and Image Representation (2)
- Wireless Networks (2)
- Circuits, Systems, and Signal Processing (1)
- Computational Intelligence and Neuroscience (1)
- Information Processing and Management: an International Journal (1)
- Information Security Journal: A Global Perspective (1)
- International Journal of Remote Sensing (1)
- Journal of Information Security and Applications (1)
- Journal of Signal Processing Systems (1)
- The Journal of Supercomputing (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
Real-time Arabic avatar for deaf-mute communication enabled by deep learning sign language translation
- Fatma M. Talaat
Dept. of Machine Learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelsheikh, 33516, Egypt
Faculty of Computer Science & Engineering, New Mansoura University, Gamasa, 35712, Egypt
, - Walid El-Shafai
Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh, 11586, Saudi Arabia
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt
, - Naglaa F. Soliman
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
, - Abeer D. Algarni
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
, - Fathi E. Abd El-Samie
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
, - Ali I. Siam
Dept. of Embedded Network Systems Technology, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelsheikh, 33516, Egypt
Computers and Electrical Engineering, Volume 119, Issue PA•Oct 2024 • https://doi.org/10.1016/j.compeleceng.2024.109475AbstractDeaf-mute individuals encounter substantial difficulties in their daily lives due to communication impediments. These individuals may encounter difficulties in social contact, communication, and capacity to acquire knowledge and engage in ...
- 0Citation
MetricsTotal Citations0
- Fatma M. Talaat
- research-article
Efficient Blind Signal Separation Algorithms for Wireless Multimedia Communication Systems
- R. Ali
https://ror.org/05sjrb944Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Menouf, Egypt
, - O. Zahran
https://ror.org/05sjrb944Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
https://ror.org/05sjrb944Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Menouf, Egypt
https://ror.org/05b0cyh02 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
, - Salwa M. Serag Eldin
https://ror.org/014g1a453Department of Computer Engineering, College of Computers and Information Technology, Taif University, P.O. 11099, 21944, Taif, Saudi Arabia
https://ror.org/016jp5b92Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt
Wireless Personal Communications: An International Journal, Volume 138, Issue 2•Sep 2024, pp 745-767 • https://doi.org/10.1007/s11277-024-11494-5AbstractThis paper studied the problem of multi-user blind signal separation (BSS) in wireless communications. The existing separation algorithms work on quadrature phase shift keying (QPSK). Through our work, two proposed algorithms were presented to ...
- 0Citation
MetricsTotal Citations0
- R. Ali
- research-article
Enhanced user verification in IoT applications: a fusion-based multimodal cancelable biometric system with ECG and PPG signals
- Ali I. Siam
https://ror.org/04a97mm30Department of Embedded Network Systems Technology, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafr Al Sheikh, Egypt
, - Walid El-Shafai
https://ror.org/053mqrf26Security Engineering Lab, Computer Science Department, Prince Sultan University, 11586, Riyadh, Saudi Arabia
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Lamiaa A. Abou Elazm
https://ror.org/0532wcf75Department of Microelectronics, Electronics Research Institute, Nozha, Egypt
, - Nirmeen A. El-Bahnasawy
https://ror.org/05sjrb944Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
https://ror.org/05b0cyh02Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
, - Atef Abou Elazm
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ghada M. El-Banby
https://ror.org/05sjrb944Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Neural Computing and Applications, Volume 36, Issue 12•Apr 2024, pp 6575-6595 • https://doi.org/10.1007/s00521-023-09394-zAbstractThe core premise of cancelable biometrics lies in the creation of a distinct biometric template for every individual, which can be either canceled or regenerated as needed. This process requires the use of a uniquely-defined key during the ...
- 0Citation
MetricsTotal Citations0
- Ali I. Siam
- research-article
Secure Transmission in Wireless Sensor Networks via Reconfigurable Intelligent Surface
- Asmaa Amer
Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf, 32952, Menoufia, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf, 32952, Menoufia, Egypt
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
, - A. Abdelaziz Salem
Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf, 32952, Menoufia, Egypt
, - Mona Shokair
Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf, 32952, Menoufia, Egypt
, - A.M. Benaya
Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf, 32952, Menoufia, Egypt
Digital Signal Processing, Volume 140, Issue C•Aug 2023 • https://doi.org/10.1016/j.dsp.2023.104083AbstractNowadays, reconfigurable intelligent surfaces (RISs) are broadly used due to their flexibility and cost-effectiveness in controlling the wireless environment with low-cost passive reflecting elements. In addition, RIS-assisted systems ...
Graphical abstractHighlights- Proposed RIS-assisted WSNs with a friendly jammer for enhanced security.
- ...
- 0Citation
MetricsTotal Citations0
- Asmaa Amer
- research-article
Machine learning and deep learning techniques for driver fatigue and drowsiness detection: a review
- Samy Abd El-Nabi
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Department of Artificial Intelligence Engineering, Faculty of Computer Science and Engineering, King Salman International University (KSIU), 46511, South Sinai, Egypt
, - Walid El-Shafai
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
https://ror.org/053mqrf26Security Engineering Lab, Computer Science Department, Prince Sultan University, 11586, Riyadh, Saudi Arabia
, - El-Sayed M. El-Rabaie
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Khalil F. Ramadan
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
https://ror.org/05b0cyh02Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
, - Saeed Mohsen
Department of Artificial Intelligence Engineering, Faculty of Computer Science and Engineering, King Salman International University (KSIU), 46511, South Sinai, Egypt
Department of Electronics and Communications Engineering, Al-Madinah Higher Institute for Engineering and Technology, 12947, Giza, Egypt
Multimedia Tools and Applications, Volume 83, Issue 3•Jan 2024, pp 9441-9477 • https://doi.org/10.1007/s11042-023-15054-0AbstractThere are several factors for vehicle accidents during driving such as drivers’ negligence, drowsiness, and fatigue. These accidents can be avoided, if drivers are warned in time. Moreover, recent developments in computer vision and artificial ...
- 1Citation
MetricsTotal Citations1
- Samy Abd El-Nabi
- research-article
Efficient frameworks for statistical seizure detection and prediction
- Ali Ahmed Khalil
https://ror.org/02hcv4z63Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Minia University, 61111, Minia, Egypt
Information and Digital Transformation Department, Institute of Public Administration, Riyadh, Saudi Arabia
, - Mostafa I. El Sayeid
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fatma E. Ibrahim
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ashraf A. M. Khalaf
https://ror.org/02hcv4z63Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Minia University, 61111, Minia, Egypt
, - Entessar Gemeay
https://ror.org/014g1a453Department of Computer Engineering, Computer and Information Technology College, Taif University, Taif, Saudi Arabia
https://ror.org/016jp5b92Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt
, - Hossam Kasem
https://ror.org/016jp5b92Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt
, - Salah Eldeen A. Khamis
https://ror.org/016jp5b92Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Tanta University, Tanta, Egypt
, - Ghada M. El-Banby
Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering, Menoufa University, 32952, Menouf, Egypt
, - Walid El-Shafai
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
https://ror.org/053mqrf26Security Engineering Lab, Computer Science Department, Prince Sultan University, 11586, Riyadh, Saudi Arabia
, - El-Sayed M. El-Rabaie
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Adel S. El-Fishawy
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Moawad I. Dessouky
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ibrahim M. El-Dokany
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Turkey Alotaiby
KACST, 11442, Riyadh, Kingdom of Saudi Arabia
, - Saleh A. Alshebeili
https://ror.org/02f81g417KACST‑TIC in Radio Frequency and Photonics for the E‑Society (RFTONICS), King Saud University, 11421, Riyadh, Saudi Arabia
https://ror.org/02f81g417Department of Electrical Engineering, King Saud University, 11421, Riyadh, Saudi Arabia
, - Fathi E. Abd El-Samie
https://ror.org/05sjrb944Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
https://ror.org/05b0cyh02Department of Information Technology, College of Computer and Information sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia
The Journal of Supercomputing, Volume 79, Issue 16•Nov 2023, pp 17824-17858 • https://doi.org/10.1007/s11227-022-05030-0AbstractThis paper presents two efficient frameworks for seizure detection and prediction that depend on statistical analysis. The common thread between them is the selection of certain attributes extracted from the electroencephalography (EEG) signals ...
- 0Citation
MetricsTotal Citations0
- Ali Ahmed Khalil
- research-article
Efficient Framework for Video Communication in IoT Applications
- Walid El-Shafai
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Security Engineering Lab, Computer Science Department, Prince Sultan University, 11586, Riyadh, Saudi Arabia
, - Amany Daosh
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Nehad Haggag
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Aya M. Gamal
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Nevein Sadic
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Yasser Mahrous
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fatma E. Ibrahim
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Naglaa F. Soliman
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
, - Abeer D. Algarni
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
, - Ghada M. El-Banby
Department of Industrial Electronics and Control Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Mohamed R. Abdel-Rahman
Department of Electrical Engineering, King Saud University, Riyadh, Saudi Arabia
, - Saeed A. Aldosari
Department of Electrical Engineering, King Saud University, Riyadh, Saudi Arabia
, - Emad S. Hassan
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Department of Electrical Engineering, College of Engineering, Jazan University, 45142, Jazan, Saudi Arabia
, - Huda I. Ashiba
Department of Electronics and Electrical Communications, Bilbis Higher Institute of Engineering, Bilbis, Sharqia, Egypt
, - Eman A. Sultan
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Waleed Al-Hanafy
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Adel A. Saleeb
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Adel S. El-Fishawy
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - El-Sayed M. El-Rabaie
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Mohamed El-Halawany
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Moawad I. Dessouky
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Sami A. El Dolil
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Nabil A. Ismail
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ibrahim M. Eldokany
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Atef Abou Elazm
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
Department Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Wireless Personal Communications: An International Journal, Volume 129, Issue 1•Mar 2023, pp 1-35 • https://doi.org/10.1007/s11277-022-09491-7AbstractThis paper is mainly concerned with video watermarking as a tool to secure the video transmission process over wireless channels. In addition, the relatability of the communication process is guaranteed through a hybrid error control scheme. The ...
- 0Citation
MetricsTotal Citations0
- Walid El-Shafai
- research-article
New Proposed Algorithms for Infrared Video Sequences Non-uniformity Correction
- H. I. Ashiba
Department of Electronics and Electrical Communications Engineering, Bilbis Higher Institute of Engineering, Bilbis, Sharqia, Egypt
, - Nevein Sadic
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Emad S. Hassan
Department of Electrical Engineering, College of Engineering, Jazan University, 45142, Jizan, Saudi Arabia
, - Sami El-Dolil
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
Wireless Personal Communications: An International Journal, Volume 126, Issue 2•Sep 2022, pp 1051-1073 • https://doi.org/10.1007/s11277-022-09782-zAbstractInfrared (IR) video sequences Improvement is a difficult task because of many factors for example low dynamic range, noise and Non-Uniformity (NU) effect. The NU is a time-dependent noise that appears due to the lack of sensor equalization. So, it ...
- 0Citation
MetricsTotal Citations0
- H. I. Ashiba
- research-article
Detection of Abnormal Activities from Various Signals Based on Statistical Analysis
- Saly Abd-Elateif El-Gindy
Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Minia University, 61111, Minia, Egypt
High Institute for Engineering & Technology-Obour, K 21Cairo/ Belbeis Rd, Obour, Egypt
, - Fatma E. Ibrahim
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Mohamed Alabasy
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Hesham M. Abdelzaher
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Mahmoud El-Refy
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ashraf A. M. Khalaf
Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Minia University, 61111, Minia, Egypt
, - Sami M. El-Dolil
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Adel S. El-Fishawy
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Taha E. Taha
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - El-Sayed M. El-Rabaie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Moawad I. Dessouky
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ibrahim El-Dokany
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Osama A. Oraby
Electrical Engineering Department, Faculty of Engineering, Damiatta University, Damiatta, Egypt
, - Turky N. Alotaiby
KACST, 11442, Riyadh, Kingdom of Saudi Arabia
, - Saleh A. Alshebeili
KACST-TIC in Radio Frequency and Photonics for the E-Society (RFTONICS), King Saud University, 11421, Riyadh, Saudi Arabia
Department of Electrical Engineering, King Saud University, 11421, Riyadh, Saudi Arabia
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Department of Information Technology, College of Computer and Information sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia
Wireless Personal Communications: An International Journal, Volume 125, Issue 2•Jul 2022, pp 1013-1046 • https://doi.org/10.1007/s11277-022-09565-6AbstractLow-frequency signals comprise different types such as Electroencephalogram (EEG), gyroscope and seismic signals. Processing of EEG signals is performed for tasks such as seizure prediction and detection. On the other hand, processing of seismic ...
- 0Citation
MetricsTotal Citations0
- Saly Abd-Elateif El-Gindy
- research-article
Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications
- Walid El-Shafai
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Security Engineering Lab, Computer Science Department, Prince Sultan University, 11586, Riyadh, Saudi Arabia
, - Fatma Khallaf
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Department of Electrical Engineering, Faculty of Engineering, Ahram Canadian University, 6th October City, Giza, Egypt
, - El-Sayed M. El-Rabaie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
Neural Computing and Applications, Volume 34, Issue 13•Jul 2022, pp 10629-10653 • https://doi.org/10.1007/s00521-022-06994-zAbstractImage cryptography based on chaos algorithms is widely employed in modern security systems in telemedicine Internet of Things (IoT) applications. One of the main drawbacks of the state-of-the-art chaos encryption algorithms is that they are not ...
- 0Citation
MetricsTotal Citations0
- Walid El-Shafai
- research-article
Efficient deep learning approach for augmented detection of Coronavirus disease
- Ahmed Sedik
Department of the Robotics and Intelligent Machines, Kafrelsheikh University, Kafrelsheikh, Egypt
, - Mohamed Hammad
Information Technology Department, Faculty of Computers and Information, Menoufia University, Shebeen El-Kom, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufa University, 32952, Menouf, Egypt
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, 84428, Riyadh, Saudi Arabia
, - Brij B. Gupta
National Institute of Technology, Kurukshetra, India
Department of Computer Science and Information Engineering, Asia University, Taichung City, Taiwan
, - Ahmed A. Abd El-Latif
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, 32511, Shebeen El-Kom, Egypt
Neural Computing and Applications, Volume 34, Issue 14•Jul 2022, pp 11423-11440 • https://doi.org/10.1007/s00521-020-05410-8AbstractThe new Coronavirus disease 2019 (COVID-19) is rapidly affecting the world population with statistics quickly falling out of date. Due to the limited availability of annotated Coronavirus X-ray and CT images, the detection of COVID-19 remains the ...
- 26Citation
MetricsTotal Citations26
- Ahmed Sedik
- research-article
Cancelable speaker identification based on cepstral coefficients and comb filters
- Mohamed Monir
Sharm El-Shaikh Airport, Sharm El Sheikh, Egypt
, - Mona Kareem
Sharm El-Shaikh Airport, Sharm El Sheikh, Egypt
, - Sami M. El-Dolil
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
, - Adel Saleeb
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
, - Adel S. El-Fishawy
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
, - Mohamed Abd-Elsalam Nassar
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
, - Mohamed A. Zein Eldin
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
, - Fathi E. Abd El-Samie
Communications and Electronics Department, Faculty of Electronic Engineering, Manoufia University, Menouf, Egypt
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia
International Journal of Speech Technology, Volume 25, Issue 2•Jun 2022, pp 471-492 • https://doi.org/10.1007/s10772-021-09804-4AbstractThis paper presents a proposed approach for cancelable biometric recognition related to speaker identification. Both comb and inverse comb filters are used to distort speech signals intentionally prior to and after feature extraction. The ...
- 0Citation
MetricsTotal Citations0
- Mohamed Monir
- research-article
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding
- Mohamed A. Abdel‐Moneim
Department of Telecommunication, Faculty of Engineering Egyptian Russian University Cairo Egypt
, - Rasha M. Al‐Makhlasawy
Department of Computers and Systems Electronics Research Institute El Nozha ElGededa Egypt
, - Nariman Abdel‐Salam Bauomy
Department of Electronics and Communications Engineering, Faculty of Engineering Canadian International College (CIC) Cairo Governorate Egypt
, - El‐Sayed M. El‐Rabaie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
, - Walid El‐Shafai
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
Security Engineering Laboratory, Department of Computer Science Prince Sultan University Riyadh Saudi Arabia
, - Ahmed E. A. Farghal
Department of Electrical Engineering, Faculty of Engineering Sohag University Sohag Egypt
, - Fathi E. Abd El‐Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
Transactions on Emerging Telecommunications Technologies, Volume 33, Issue 5•May 2022 • https://doi.org/10.1002/ett.4459AbstractRecently, automatic modulation classification (AMC) has extensively and commonly been utilized in several modern wireless communication systems as a significant tool of signal detection for civilian and military applications and cognitive radio ...
Recently, automatic modulation classification (AMC) has been extensively utilized in several modern wireless communication systems as an important tool of signal identification for cognitive radio. In this article, we propose a new data conversion method ...
- 0Citation
MetricsTotal Citations0
- Mohamed A. Abdel‐Moneim
- research-article
Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing
- Basma Abd El-Rahiem
Mathematics and Computer Science Department, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt
, - Fathi E. Abd El Samie
Department of Information Technology, College of Computer and Information sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
, - Mohamed Amin
Mathematics and Computer Science Department, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt
Applied Intelligence, Volume 53, Issue 2•Jan 2023, pp 1792-1806 • https://doi.org/10.1007/s10489-021-03153-0AbstractCancellable biometrics have been enrolled in several applications such as cloud computing and cyber security. This makes researchers investigate their approaches in this field. This paper presents a Cancellable Multi-Biometric System (CMBS) based ...
- 2Citation
MetricsTotal Citations2
- Basma Abd El-Rahiem
- research-article
Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications
- Mohamed Hammad
Information Technology Department, Faculty of Computers and Information, Menoufia University, Egypt
, - Ahmed A. Abd El-Latif
EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, 32511, Egypt
, - Amir Hussain
School of Computing, Edinburgh Napier University, Scotland, UK
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Egpt
, - Brij B. Gupta
Department of Computer Science and Information Engineering, Asia University, Taichung 413, Taiwan
LAU, Beirut, Lebanon
iStaffordshire University, Stoke-on-Trent ST4 2DE, UK
, - Hassan Ugail
Centre for Visual Computing, University of Bradford, Bradford, UK
, - Ahmed Sedik
Department of Robotics and Intelligent Machines, Faculty of Artificial Intelligence, Kafrelsheikh University, Egypt
Computers and Electrical Engineering, Volume 100, Issue C•May 2022 • https://doi.org/10.1016/j.compeleceng.2022.108011Highlights- A novel deep learning models for arrhythmia detection in IoT healthcare applications are proposed.
AbstractIn this paper, novel convolutional neural network (CNN) and convolutional long short-term (ConvLSTM) deep learning models (DLMs) are presented for automatic detection of arrhythmia for IoT applications. The input ECG signals are ...
Graphical abstractDeep Learning Models for Arrhythmia Detection in IoT Healthcare Applications.
Display Omitted
- 5Citation
MetricsTotal Citations5
- Mohamed Hammad
- research-article
Efficient cancelable speaker identification system based on a hybrid structure of DWT and SVD
- Khaled M. Abdelwahab
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Saied Abd El-atty
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Ayman M. Brisha
Electronic Technology Department, Faculty of Technology and Education, Beni Suef University, Beni Suef, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
International Journal of Speech Technology, Volume 25, Issue 1•Mar 2022, pp 279-288 • https://doi.org/10.1007/s10772-020-09778-9AbstractTraditional biometric systems are subjected to several attacks. If the original database of human biometrics is compromised, the biometric data is lost forever. This paper presents a sophisticated implementation of one of the watermarking ...
- 1Citation
MetricsTotal Citations1
- Khaled M. Abdelwahab
- research-article
An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks
- Walid El-Shafai
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh 11586 Saudi Arabia
, - Ahmed K. Mesrega
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
, - Hossam Eldin H. Ahmed
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
, - Nirmeen A. El-Bahnasawy
Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 84428, Saudi Arabia
Journal of Information Security and Applications, Volume 64, Issue C•Feb 2022 • https://doi.org/10.1016/j.jisa.2021.103039AbstractThe security of multimedia content and its applications have become a a very important task in digital communication technology. The extensive use of multimedia content over wireless networks makes the network applications exposed to ...
- 1Citation
MetricsTotal Citations1
- Walid El-Shafai
- research-article
Proposed Approaches for Cooperative Cognitive Radio
- Nahid Gomaa
Department of Electronics and Electrical Communications Engineering, Bilbis Higher Institute of Engineering, Bilbis, Sharqia, Egypt
, - H. I. Ashiba
Department of Electronics and Electrical Communications Engineering, Bilbis Higher Institute of Engineering, Bilbis, Sharqia, Egypt
, - Sami A. El-Dolil
Department of Electronics and Electrical Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
, - Mohamed Fouad
Faculty of Engineering, Zagazig University, Zagazig, Egypt
, - Fathi E. Abd El-Samie
Department of Electronics and Electrical Engineering, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt
Multimedia Tools and Applications, Volume 81, Issue 4•Feb 2022, pp 5645-5668 • https://doi.org/10.1007/s11042-021-11703-4AbstractThis paper in this topic concentrates on an important part is spectrum sensing (SS). It can detect the idle hole in spectrum by detection methods. This paper uses the sensing technique is called energy detector(ED). The ED depends on only the ...
- 0Citation
MetricsTotal Citations0
- Nahid Gomaa
- research-article
Deploying Machine Learning Techniques for Human Emotion Detection
- Bai Yuan Ding,
- Ali I. Siam
Department of Embedded Network Systems TechnologyFaculty of Artificial IntelligenceKafrelsheikh UniversityKafr El-SheikhEgyptkfs.edu.eg
, - Naglaa F. Soliman
Department of Information TechnologyCollege of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh 84428Saudi Arabiapnu.edu.sa
, - Abeer D. Algarni
Department of Information TechnologyCollege of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh 84428Saudi Arabiapnu.edu.sa
, - Fathi E. Abd El-Samie
Department of Information TechnologyCollege of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh 84428Saudi Arabiapnu.edu.sa
, - Ahmed Sedik
Department of the Robotics and Intelligent MachinesFaculty of Artificial IntelligenceKafrelsheikh UniversityKafr El-SheikhEgyptkfs.edu.eg
Computational Intelligence and Neuroscience, Volume 2022•2022 • https://doi.org/10.1155/2022/8032673Emotion recognition is one of the trending research fields. It is involved in several applications. Its most interesting applications include robotic vision and interactive robotic communication. Human emotions can be detected using both speech and visual ...
- 3Citation
MetricsTotal Citations3
- research-article
Performance improvement of data transmission using a hybrid underwater and terrestrial system
- Khalil F. Ramadan
Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
, - Khaled Ramadan
Department of Electronics and Electrical Communication Engineering The Higher Institute of Engineering at Al‐Shorouk City Cairo Egypt
, - Taha E. Taha
Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
, - Moawad I. Dessouky
Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
, - Fathi E. Abd El‐Samie
Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University Menouf Egypt
Transactions on Emerging Telecommunications Technologies, Volume 32, Issue 9•September 2021 • https://doi.org/10.1002/ett.4247AbstractIn this paper, we investigate and enhance the performance of data transmission using a hybrid underwater and terrestrial system with low‐complexity linear equalization. Due to the low speed, salinity, water depth, pH degree, and water temperature ...
The proposed communication system consists of two segments: the underwater segment that can be implemented by acoustic waves, and the second segment in the air that can be implemented by electromagnetic waves. Note that the transducer in the underwater ...
- 0Citation
MetricsTotal Citations0
- Khalil F. Ramadan
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner