Welcome to my homepage
I received my B.Sc. degree in Computer Science from the Hadramout University of Science and Technology (HUST) in 2005, and my M.Sc. degree in Computer Artificial Intelligence and Pattern Recognition from the King Fahd University of Petroleum and Minerals(KFUPM) in 2012. I am currently a PhD student in the Computer Science and Engineering College of the KFUPM. I am an active member of the Document Layout Analysis Group and teaching assistant at the Computer Science Department in the KFUPM. My current research work is mainly focused on Document image layout analysis and retrieval and text recognition.
Manuscript Layout Analysis:
Although digital copies of ancient manuscripts exist, the reader finds it difficult to search for a piece of information in such growing and huge collection of document archive. One of the reasons behind is searching in these digital document images is still similar to paper-based ones. In other words, a researcher should know the book title, page number of the desired piece of information prior to perform his search. Then, he needs to read through all page to determine if what he looking for is exist or not. Therefore, computer-aided software such Optical Text Recognition (OTR), or Document Image Retrieval (DIR) must be adopted to facilitate readers/researchers for fast information retrieval.
The electrocardiogram (ECG) is an important biomedical signal that is used to understand the heart activity. For example, the exercise stress ECG is used as an indirect method for assessing individuals for limitation of coronary blood flow due to obstructive coronary artery disease(CAD). So, such limitation can be detected via analyzing the patient’s ECG signals. Our Last research focused on a method to integrate a 12-lead ECG system to enhance the detection of a limitation of coronary blood flow. read more..
Biometric Recognition and Authentication:
Personal recognition based on biometric technology is an emerging feild of research in security systems. Many researchers are attracted to this technology due to two main advantages as compared to traditional methods; it provides a good resistance to spoof attacks and it is hard to be lost or stolen. Typically, this technology uses human physiological or behavioral characteristics such as face, iris, palmprint, fingerprint, voice, gait, etc. Usually, each individual human-biotraits enjoys some strength levels and suffer some weakness levels. In our research, we are trying to utilize two or three individual human-trait such as face, iris and palm to build a stronger biometric authentication system. read more ...