This page has only limited features, please log in for full access.

Unclaimed
Ahmed E. Youssef
College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 11653, Saudi Arabia

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 15 May 2020 in Sustainability
Reads 0
Downloads 0

The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To identify the most important quality criteria, a survey was conducted. An instrument was deployed among 157 subjects, including e-learning designers, developers, students, teachers, and educational administrators. Finally, a second instrument was distributed among 51 participants to make a pairwise comparison among the criteria and rank them according to their relative importance. The identified and prioritized factors were classified into four main categories. Among these four factors, content was identified as the most important factor, whereas design was found to be the least important factor.

ACS Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability 2020, 12, 4071 .

AMA Style

Abdul Hafeez Muhammad, Ansar Siddique, Ahmed E. Youssef, Kashif Saleem, Basit Shahzad, Adnan Akram, Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability. 2020; 12 (10):4071.

Chicago/Turabian Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. 2020. "A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems." Sustainability 12, no. 10: 4071.

Article
Published: 21 April 2020 in Cluster Computing
Reads 0
Downloads 0

Despite the rapid improvement in dental health over the last few decades, a significant portion of our population continue seek dental care every year. Estimates show that 13% of adults seek dental care for dental infection or fatigue within four years. The Social and individual burden of this disease can be reduced by its early detection. However, the symptoms of teeth infection in the early stages are not clear, hence, it would be relatively difficult to predict teeth infections based solely on human skills and experience. Big Data (BD) technologies have a great potential in transforming dental care, as they have revolutionized other industries. In addition to reducing cost, they could save millions of lives and improve patient outcomes. This paper proposes a novel integrated prediction model that extracts hidden knowledge from radiographic datasets containing a large volume of dental X-ray images and utilizes this knowledge to predict dental infections. Initially, preprocessing techniques using morphological skeleton and mean approach is applied to eliminate noise and enhance the images. Next, Multi Scale Segmented Region (MSR) approach, Watershed Approach (WA), Sobel edge Detection (SD), Histogram based Segmentation (HS), Trainable Segmentation (TS), Dual Clustering (DC), and Fuzzy C-Means clustering (FCM) are examined for image segmentation and feature extraction. Among these methods, MSR was selected for feature extraction since it outperformed other methods in terms of accuracy, specificity, precision, recall and F1-score. Then, a set of neural network classifiers are trained to identify patterns in the extracted optimized features and predict dental infections. For this purpose, we have examined Bacterial Optimized Recurrent Neural Networks (BORNN), Deep Learning Neural Networks (DANN), Genetic Optimized Neural Networks (GONN) and Adaptive Neural Networks Algorithm (ADNN). BORNN have shown maximum accuracy and Roc value (98.1% and 0.92 respectively), and minimum error values (MSE = 0.189, MAE = 0.143). The output of the proposed integrated prediction model is fed into a dental robot who proceeds with the treatment process with high accuracy and minimum delay. The proposed prediction model was implemented using a big data analytics tool called Apache SAMOA and experimental results showed its correctness and effectiveness.

ACS Style

Mohamed Hashem; Ahmed Youssef. Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. Cluster Computing 2020, 23, 1669 -1682.

AMA Style

Mohamed Hashem, Ahmed Youssef. Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. Cluster Computing. 2020; 23 (3):1669-1682.

Chicago/Turabian Style

Mohamed Hashem; Ahmed Youssef. 2020. "Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool." Cluster Computing 23, no. 3: 1669-1682.

Journal article
Published: 10 April 2020 in IEEE Access
Reads 0
Downloads 0

Cloud Computing (CC) has become increasingly popular since it provides a wide variety of customized and reliable computational services. With the rapid growth of this technology, more and more IT services providers compete to offer high-quality and cost-effective cloud services that best fulfill their customers’ needs. Given the vast diversity of these offers, the choice of the most appropriate Cloud Service Provider (CSP) became a dilemma that confuses most cloud customers. Many diverged criteria have to be considered to precisely evaluate services offered by several CSPs, some of these criteria cannot be quantified easily such as usability and security. The selection of the best CSP is thus a complex Multi-Criteria Decision Making (MCDM) problem that needs to be addressed efficiently. Previous studies of this problem employed MCDM methods that are either unfeasible when it is difficult or meaningless to quantify alternatives over criteria or computationally expensive and inconsistent when relative preferences of alternatives and criteria are used instead. In this paper, we propose a novel MCDM approach that is feasible, efficient and consistent using relative preferences of criteria and alternatives. The proposed approach incorporates Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and the Best Worst Method (BWM) to rank CSPs using evaluation criteria characterizing their services. The integrated approach has been tested and validated through a use-case scenario which demonstrates its effectiveness and correctness. We have also compared the proposed approach to the most commonly used MCDM approach, Analytical Hierarchical Process (AHP). The results clearly show that the proposed approach outperforms AHP in terms of computational complexity and consistency; hence, it is more efficient and reliable than AHP.

ACS Style

Ahmed Youssef. An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM. IEEE Access 2020, 8, 71851 -71865.

AMA Style

Ahmed Youssef. An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM. IEEE Access. 2020; 8 (99):71851-71865.

Chicago/Turabian Style

Ahmed Youssef. 2020. "An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM." IEEE Access 8, no. 99: 71851-71865.

Journal article
Published: 19 November 2019 in IEEE Access
Reads 0
Downloads 0

Cloud Computing (CC) has become an important milestone information technology that attracts many organizations. With the potential to transform business processes, lower IT expenses, and offer access to unlimited computing resources with minimal management effort, organizations look to cloud-based solutions to achieve business efficiencies. Thus, it would seem that these organizations could easily migrate to CC. However, enterprises are still concerned about moving their business-critical applications to the cloud. Among the reasons are that it is an emerging technology that has not reached a level of maturity; the lack of industry-specific conformity to standards; and a high level of security risks. As a result, there is a big dispute among organizations on the decision of whether it is more business-efficient to embark on the cloud or remain with their interior IT infrastructures. In this paper, we aim to solve this debate by proposing a novel approach that supports decision-making on CC adoption in organizations. Unlike traditional decision-making approaches that pay little or no consideration to organizational high-level business objectives, our proposed approach is driven by the business objectives of the organization. First, we identify driving and restraining forces that influence CC adoption in organizations. Second, a formal decision-making model is proposed based on Force Field Analysis (FFA) augmented by pairwise comparison and Delphi methods, this model estimates the values of the driving and restraining forces based on their impacts on the organization’s objectives. By analyzing the forces for and against CC adoption, organizations can decide whether or not to move forward with the adoption. Alternatively, organizations can use the analysis to think about how they can strengthen the forces that support the adoption and weaken the forces opposing it, so that the adoption is more successful. The proposed model is validated for usability and applicability through a use case scenario.

ACS Style

Ahmed Youssef; Almetwally M. Mostafa. Critical Decision-Making on Cloud Computing Adoption in Organizations Based on Augmented Force Field Analysis. IEEE Access 2019, 7, 167229 -167239.

AMA Style

Ahmed Youssef, Almetwally M. Mostafa. Critical Decision-Making on Cloud Computing Adoption in Organizations Based on Augmented Force Field Analysis. IEEE Access. 2019; 7 (99):167229-167239.

Chicago/Turabian Style

Ahmed Youssef; Almetwally M. Mostafa. 2019. "Critical Decision-Making on Cloud Computing Adoption in Organizations Based on Augmented Force Field Analysis." IEEE Access 7, no. 99: 167229-167239.

Journal article
Published: 28 February 2019 in KSII Transactions on Internet and Information Systems
Reads 0
Downloads 0
ACS Style

Almetwally M. Mostafa; Ahmed Youssef; Yazeed Ali Aljarbua. Bidirectional Chain Replication for Higher Throughput Provision. KSII Transactions on Internet and Information Systems 2019, 13, 668 -685.

AMA Style

Almetwally M. Mostafa, Ahmed Youssef, Yazeed Ali Aljarbua. Bidirectional Chain Replication for Higher Throughput Provision. KSII Transactions on Internet and Information Systems. 2019; 13 (2):668-685.

Chicago/Turabian Style

Almetwally M. Mostafa; Ahmed Youssef; Yazeed Ali Aljarbua. 2019. "Bidirectional Chain Replication for Higher Throughput Provision." KSII Transactions on Internet and Information Systems 13, no. 2: 668-685.

Journal article
Published: 01 January 2019 in International Journal of Advanced Computer Science and Applications
Reads 0
Downloads 0

Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed. Hence, no matter how strongly the cloud model is secured, organizations continue suffering from lack of trust on CC and remain uncertain about its security risk consequences. Traditional risk management frameworks do not consider the impact of CC security risks on the business objectives of the organizations. In this paper, we propose a novel Cloud Security Risk Management Framework (CSRMF) that helps organizations adopting CC identifies, analyze, evaluate, and mitigate security risks in their Cloud platforms. Unlike traditional risk management frameworks, CSRMF is driven by the business objectives of the organizations. It allows any organization adopting CC to be aware of cloud security risks and align their low-level management decisions according to high-level business objectives. In essence, it is designed to address impacts of cloud-specific security risks into business objectives in a given organization. Consequently, organizations are able to conduct a cost-value analysis regarding the adoption of CC technology and gain an adequate level of confidence in Cloud technology. On the other hand, Cloud Service Providers (CSP) is able to improve productivity and profitability by managing cloud-related risks. The proposed framework has been validated and evaluated through a use-case scenario.

ACS Style

Ahmed Youssef. A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations. International Journal of Advanced Computer Science and Applications 2019, 10, 1 .

AMA Style

Ahmed Youssef. A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations. International Journal of Advanced Computer Science and Applications. 2019; 10 (12):1.

Chicago/Turabian Style

Ahmed Youssef. 2019. "A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations." International Journal of Advanced Computer Science and Applications 10, no. 12: 1.

Journal article
Published: 03 May 2015 in Arabian Journal for Science and Engineering
Reads 0
Downloads 0

In this paper, we propose MinDroid, a user-centric preventive policy enforcement system against SMS malware in Android devices. The design of MinDroid takes into consideration the user’s little understanding of the Android permission system. This can be done by deriving the policy rules from the behavioral model of the malicious SMS applications rather than adopting user-defined rules. MinDroid requires user intervention only during the first T time units from the application installation time. The user during this time period is notified to accept or reject the SMS-sending operations. MinDroid execution is specified as a finite state machine, and its security properties are formally proven using Metric Temporal Logic. We also show that MinDroid is resilient against threats trying to compromise its correct functionality. In addition, an analytical study demonstrates that MinDroid offers good performance in terms of detection time and execution cost in comparison with intrusion detection systems based on static and dynamic analysis. The detection efficiency of MinDroid is also studied in terms of detection rate, false positive rate, and ROC distance. A prototype implementation of MinDroid is tested under Android emulator.

ACS Style

Abdelouahid Derhab; Kashif Saleem; Ahmed Youssef; Mohamed Guerroumi. Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices. Arabian Journal for Science and Engineering 2015, 41, 479 -493.

AMA Style

Abdelouahid Derhab, Kashif Saleem, Ahmed Youssef, Mohamed Guerroumi. Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices. Arabian Journal for Science and Engineering. 2015; 41 (2):479-493.

Chicago/Turabian Style

Abdelouahid Derhab; Kashif Saleem; Ahmed Youssef; Mohamed Guerroumi. 2015. "Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices." Arabian Journal for Science and Engineering 41, no. 2: 479-493.

Journal article
Published: 31 October 2014 in Arabian Journal for Science and Engineering
Reads 0
Downloads 0

In Primary Backup Replication (PBR) systems, the primary node exclusively performs the task of maintaining object consistency for the whole object store; this causes imbalanced load distribution (i.e., poor resource utilization) and limits scalability. In addition, system’s availability and data accessibility are completely lost in case of primary failure. This paper proposes a novel approach that disjoints the exclusive role of the primary node by allowing all nodes (replicas) of the system share the load of maintaining object consistency. We define “object ownership” as the exclusive right of a replica to permit object update. The replica that has this right is called the “owner” of this object. The main idea in the proposed approach is to distribute the ownership of the objects among replicas in the sense that each replica owns the objects that are initially created at it (i.e., created by the clients connected to this replica). Hence, the local object store at each replica can be viewed as if it is logically partitioned into different disjoint sets of objects. Each set is owned by a different replica which controls the update requests of the objects in this set. The proposed Object Ownership Distribution (OOD) approach improves load balancing and resource utilization since all nodes share the load of maintaining object store consistency. Furthermore, it improves scalability since any new replica added to the system will eventually share the load with the existing replicas. In addition, system’s availability is improved since an owner failure only renders its own objects unavailable while objects owned by other owners are not affected.

ACS Style

Almetwally M. Mostafa; Ahmed E. Youssef. Improving Resource Utilization, Scalability, and Availability in Replication Systems Using Object Ownership Distribution. Arabian Journal for Science and Engineering 2014, 39, 8731 -8741.

AMA Style

Almetwally M. Mostafa, Ahmed E. Youssef. Improving Resource Utilization, Scalability, and Availability in Replication Systems Using Object Ownership Distribution. Arabian Journal for Science and Engineering. 2014; 39 (12):8731-8741.

Chicago/Turabian Style

Almetwally M. Mostafa; Ahmed E. Youssef. 2014. "Improving Resource Utilization, Scalability, and Availability in Replication Systems Using Object Ownership Distribution." Arabian Journal for Science and Engineering 39, no. 12: 8731-8741.

Conference paper
Published: 01 August 2014 in 2014 International Wireless Communications and Mobile Computing Conference (IWCMC)
Reads 0
Downloads 0

In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to design and deploy a new line in the defense-in-depth strategy, called the third line. This line is represented by a security framework, named the Intrusion Ambushing System and is designed to tackle the issue of SMS-based malware in the Android-based Smartphones. The framework exploits the security features offered by Android operating system to prevent the malicious SMS from going out of the phone and detect the corresponding SMS-based malware. We show that the proposed framework can ensure full security against SMS-based malware. In addition, an analytical study demonstrates that the framework offers optimal performance in terms of detection time and execution cost in comparison to intrusion detection systems based on static and dynamic analysis.

ACS Style

Abdelouahid Derhab; Kashif Saleem; Ahmed Youssef; Amira Youssef. Third line of defense strategy to fight against SMS-based malware in android smartphones. 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) 2014, 542 -547.

AMA Style

Abdelouahid Derhab, Kashif Saleem, Ahmed Youssef, Amira Youssef. Third line of defense strategy to fight against SMS-based malware in android smartphones. 2014 International Wireless Communications and Mobile Computing Conference (IWCMC). 2014; ():542-547.

Chicago/Turabian Style

Abdelouahid Derhab; Kashif Saleem; Ahmed Youssef; Amira Youssef. 2014. "Third line of defense strategy to fight against SMS-based malware in android smartphones." 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) , no. : 542-547.

Journal article
Published: 05 June 2014 in Multimedia Tools and Applications
Reads 0
Downloads 0

In cooperative Mobile Ad-hoc Networks (MANETs), copies of data are replicated on different mobile devices to improve system’s availability. A primary or authoritative control node is assigned to act as a coordinator for the shared data copies, when this primary fails, another node has to be elected to replace the failed one. Since mobile devices have a limited battery power, the primary may fail at any time. Moreover, current primary election protocols in MANETs employ a notable wireless communication overhead which consumes a considerable amount of battery power. In this paper, we propose a novel protocol, called Primary Replacement Protocol (PRP), to replace an exhausted primary in MANETs based on the measurement of its remaining battery power early before it dies. More specifically, PRP replaces the exhausted primary with a healthy node when its remaining battery power reaches a predefined threshold. This replacement can be accomplished with much less communication overhead. Hence, our approach has two contributions: 1) reducing the chance of primary outage by early detection of potential power failure, 2) saving the power that is consumed in traditional primary election approaches due to communication overhead.

ACS Style

Almetwally M. Mostafa; Ahmed E. Youssef. PRP: A primary replacement protocol based on early discovery of battery power failure in MANETs. Multimedia Tools and Applications 2014, 74, 6243 -6254.

AMA Style

Almetwally M. Mostafa, Ahmed E. Youssef. PRP: A primary replacement protocol based on early discovery of battery power failure in MANETs. Multimedia Tools and Applications. 2014; 74 (16):6243-6254.

Chicago/Turabian Style

Almetwally M. Mostafa; Ahmed E. Youssef. 2014. "PRP: A primary replacement protocol based on early discovery of battery power failure in MANETs." Multimedia Tools and Applications 74, no. 16: 6243-6254.

Conference paper
Published: 01 April 2013 in 2013 Saudi International Electronics, Communications and Photonics Conference
Reads 0
Downloads 0

Primary Backup Replication (PBR) suffers from the bottleneck problem at the primary, single point of failure, poor scalability, and imbalanced utilization of computing resources. These shortcomings are mainly due to the exclusive role of the primary in accepting and executing client's requests. In this paper, we tackle this problem and propose a novel approach that distributes the primary role among several nodes, where each node owns a subset (partition) of replicated data objects. In our approach, when a client creates an object, the created object is propagated to all nodes; however, the node that executes object's creation call becomes the owner (the primary) of this object. As a result, several nodes own different disjoint subsets of replicated objects instead of having only a single primary node owning the whole object store. The expression “owning an object” means the exclusive right of the owner node to lock/unlock the object. Distribution of data ownership among several nodes achieves scalability and improves load balancing. Furthermore, under our approach a replication system can be administrated seamlessly in case of node failure and network partitioning. Our approach generalizes and subsumes the traditional PBR approach.

ACS Style

Almetwally M. Mostafa; Ahmed Youssef. A multi-primary ownership partitioning protocol for highly scalable and available replication services. 2013 Saudi International Electronics, Communications and Photonics Conference 2013, 1 -5.

AMA Style

Almetwally M. Mostafa, Ahmed Youssef. A multi-primary ownership partitioning protocol for highly scalable and available replication services. 2013 Saudi International Electronics, Communications and Photonics Conference. 2013; ():1-5.

Chicago/Turabian Style

Almetwally M. Mostafa; Ahmed Youssef. 2013. "A multi-primary ownership partitioning protocol for highly scalable and available replication services." 2013 Saudi International Electronics, Communications and Photonics Conference , no. : 1-5.

Withdrawal
Published: 01 November 2011 in Journal of King Saud University - Computer and Information Sciences
Reads 0
Downloads 0

This article has been withdrawn at the request of the author(s) and/or editor. The Publisher apologizes for any inconvenience this may cause. The full Elsevier Policy on Article Withdrawal can be found at http://www.elsevier.com/locate/withdrawalpolicy.

ACS Style

Ahmed Youssef; Manal Alaqeel. WITHDRAWN: Towards secure clouds. Journal of King Saud University - Computer and Information Sciences 2011, 1 .

AMA Style

Ahmed Youssef, Manal Alaqeel. WITHDRAWN: Towards secure clouds. Journal of King Saud University - Computer and Information Sciences. 2011; ():1.

Chicago/Turabian Style

Ahmed Youssef; Manal Alaqeel. 2011. "WITHDRAWN: Towards secure clouds." Journal of King Saud University - Computer and Information Sciences , no. : 1.