Prof. Ahmed Yossif

Professor of Computer Engineering

Biography:

Ahmed E. Yossif is a professor of computer engineering at Al Yamamah University (YU). He received his Ph.D. and M.Sc. degrees in Computer Science & Engineering from University of Connecticut (UConn), CT, USA. He also obtained M.Sc. and B.Eng. degrees in Electronics & Electrical Communications Engineering from Helwan University. His research interest is Cloud Computing, AI, IoT, Information Security and Data Science. Before joining YU, he worked in several universities such as King Saud University (KSU), Helwan University (HU), British University in Egypt (BUE), Misr International University (MIU), Misr University for Science &Technology (MUST), 6 October University, 6th Oct. University for Modern Sciences and Arts (MSA), Arab Open University (AOU), Nahda University Benisuef (NUB) and Badya University.

Publications:

Articles in peer-reviewed journals:

  1. E. Youssef, T. Altameem, M. S. Pethuraj, S. Baskar, and A. S. Hassanein, “Alzheimer’s disease prognosis using neuro-gen evo-synthesis framework for elderly populations,” Biomedical Signal Processing and Control, vol. 102, p. 107349, Apr. 2025, doi: 10.1016/j.bspc.2024.107349. (IF=4.9 Q1, CiteScore=9.8 Q1)
  2. Shafiq, M. Awadallah, K. Saleem, and A. E. Youssef, “An Energy-Efficient and Safe Landing Multirotor Design for Drones,” IEEE Access, vol. 12, pp. 110610–110625, 2024, doi: 10.1109/access.2024.3439400. (IF= 3.4 Q2, CiteScore= 9.8 Q1).
  3. E. Youssef and K. Saleem, “A Hybrid MCDM Approach for Evaluating Web-Based E-Learning Platforms,” IEEE Access, vol. 11, pp. 72436–72447, 2023, doi: 10.1109/access.2023.3294798. (IF= 3.9 Q2, CiteScore= 9 Q1).
  4. Altameem, M. Shaheer Akhtar, T. Altameem, H. Fouad, S. Anil, Y. S. Kim, and A. E. Youssef, “Responsive Policy Decisions for Improving the Accuracy of Medical Data Analysis in Healthcare-based Human–Machine Interaction Systems,” International Journal of Humanoid Robotics, vol. 20, issue 02n03, pp. 2240007, June 2023. doi.org/10.1142/S0219843622400072. (IF= 1.616 Q4, CiteScore=3.6 Q3).
  1. Ahmed Altameem, Viacheslav Kovtun, Mohammed Al-Ma'aitah, Torki Altameem, Fouad H, Ahmed E. Youssef, “Patient's data privacy protection in medical healthcare transmission services using back propagation learning,” Computers and Electrical Engineering, vol. 102, pp. 108087, Sept 2022. (IF= 4.152 Q2, Citescore = 8.8 Q1)
  1. F. Altukhaim, A. M. Mostafa, and A. E. Youssef, “Multidirectional Replication for Supporting Strong Consistency, Low Latency, and High Throughput,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 11485–11510, May 2022. (IF= 3.732 Q1, CiteScore=8.3 Q1)
  2. E. Youssef, O. Alfarraj, M. Alkhalaf, and A. S. Hassanein, “A supervised biosensor-based non-variant structuring approach for analyzing infectious disease data,” Measurement, vol. 193, pp. 110903, Apr. 2022. (IF= 3.927 Q1, CiteScore=6.4 Q1)
  3. H. Mahmoud, S. Alamery, H. Fouad, A. Altinawi, and A. E. Youssef, “An automatic detection system of diabetic retinopathy using a hybrid inductive machine learning algorithm,” Personal and Ubiquitous Computing, Jan. 2021. (IF=2.000 Q3, SJR=0.54 Q2)
  4. Binsaeed, G. Stringhini, and A. E. Youssef, “Detecting Spam in Twitter Microblogging Services: A Novel Machine Learning Approach based on Domain Popularity,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 11, pp. 11-22, Nov. 2020. (WoS, SJR =0.16 Q4)
  5. Hashem, M. L. Mohammed, and A. E. Youssef, “Improving the Efficiency of Dental Implantation Process Using Guided Local Search Models and Continuous Time Neural Networks with Robotic Assistance,” IEEE Access, vol. 8, pp. 202755–202764, Oct., 2020. (IF=3.745 Q1, SJR=0.78 Q1)
  1. Hashem, S. Vellappally, H. Fouad, M. Luqman, and A. E. Youssef, “Predicting Neurological Disorders Linked to Oral Cavity Manifestations Using an IoMT-Based Optimized Neural Networks,” IEEE Access, vol. 8, pp. 190722–190733, Sept 2020. (IF=3.745 Q1, SJR=0.78 Q1)
  1. H. Muhammad, A. Siddique, A. E. Youssef, K. Saleem, B. Shahzad, A. Akram, and A.-B. S. Al-Thnian, “A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems,” Sustainability, vol. 12, no. 10, pp. 4071, May 2020. (IF=2.576 Q2, SJR= 0.58 Q2)
  2. E. Youssef, “An Integrated MCDM Approach for Cloud Service Selection Based on TOPSIS and BWM,” IEEE Access, vol. 8, pp. 71851–71865, Apr. 2020. (IF=3.745 Q1, SJR=0.78 Q1)
  1. Hashem and A. E. Youssef, “Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool,” Cluster Computing, vol. 23, no. 3, pp. 1669–1682, Apr. 2020. (IF=3.458 Q1, SJR=0.41 Q2) 
  1. E. Youssef, “A delphi-based security risk assessment model for cloud computing in enterprises,” Journal of Theoretical and Applied Information Technology, vol. 98, no.1, pp.151-162, Jan. 2020. (SJR = 0.23 Q3)
  2. E. Youssef, “A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 12, pp. 186-194, Dec. 2019. (IF=0.9, SJR =2.1 Q3) 
  1. E. Youssef and A. M. Mostafa, “Critical Decision-Making on Cloud Computing Adoption in Organizations Based on Augmented Force Field Analysis,” IEEE Access, vol. 7, pp. 167229–167239, Nov. 2019. (IF=3.745 Q1, SJR=0.78 Q1)
  1. M. Mostafa, A. E. Youssef, and Y. A. Aljarbua, “Bidirectional Chain Replication for Higher Throughput Provision,” KSII Transactions on Internet and Information Systems, vol. 13, no. 2, pp. 668-685, Feb. 2019. (IF= 0.648 Q4, SJR =0.22 Q3)
  1. Meftah, A. E. Youssef, & M. Zakariah, “Effect of Service Broker Policies and Load Balancing Algorithms on the Performance of Large Scale Internet Applications in Cloud Datacenters,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 5, pp. 219-227, May 2018. (WoS-ESCI, SJR =0.16 Q4)
  2. Derhab, K. Saleem, A. E. Youssef, and M. Guerroumi, “Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices,” Arabian Journal of Science & Engineering (AJSE), Springer, vol.,41, no. 2, pp.479-493, Feb, 2016. (IF=1.711 Q3)
  1. Almetwally M. Mostafa and A. E. Youssef, “PRP: A Primary Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs”, Multimedia Tools and Applications, vol. 74, no. 16, pp. 6243–6254, Springer, Aug. 2015. (IF=, 2.313 Q2, SJR=0.46 Q1)
  2. Ahmad A. Al-Daraiseh; Mohammed Morsi; A. E. Youssef, “Feasibility Verification and Performance Evaluation of Exclusion-Based VANETs (EBV)”. The journal of KING ABDULAZIZ UNIVERSITY, Computing and Information Technology, Volume 3, No.1, 2015.
  3. Almetwally Mostafa, Ahmed E. Youssef and Gamal Alshorbagy, “A Framework for a Smart Social Blood Donation System Based on Mobile Cloud Computing”, Health Informatics-An International Journal (HIIJ), Vol.3, No.4, pp. 1-10, November 2014.
  4. Almetwally Mostafa and Ahmed E. Youssef, "Improving Resource Utilization, Scalability, and Availability in Replication Systems Using Object Ownership", Arabian Journal of Science & Engineering (AJSE), Springer, vol. 39, no. 12, pp. 8731-8741, 2014. (IF= 1.711 Q3)
  5. Ahmed E. Youssef, “A Framework for Secure Healthcare Systems Based on Big Data Analytics in Mobile Cloud Computing Environments”, International Journal of Ambient Systems and Applications (IJASA), vol.2, no.2, pp. 1-11, June, 2014.
  6. Abdulelah Almishal and Ahmed E. Youssef, “Cloud Service Providers: A Comparative Study”, International Journal of Computer Applications and Information Technology (IJCAIT), vol. 5, no. 2, pp. 46-52, May, 2014.
  7. Ahmed E. Youssef, “Towards Pervasive Computing Environments with Cloud Services”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol.4, No.3, pp.1-9, June 2013.
  8. Ahmed A. Al-Johani and Ahmed E. Youssef, “A Framework for ERP Systems in SME Based on Cloud Computing Technology”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.3, pp. 1-14, June 2013.
  9. Almetwally M. Mostafa and Ahmed E. Youssef, "A Primary Shift Protocol for Improving Availability in Replication Systems", International Journal of Computer Applications (IJCA), Vol. 72, No. 4, pp 37-44, June 2013.
  10. Abeer Hamdy, Reda Ammar, and Ahmed E. Youssef, “Efficient Scheduling of Real-Time Parallel Applications on Clusters” International Journal of Computer Science & Information Technology (IJCSIT), Vol. 4, No. 5, pp. 197-212, October 2012.
  11. Ahmed E. Youssef, Abeer Hamdy, and Reda Ammar, “Efficient Processing Power Reservation Approach to Improve Real-Time Task Schedulability and Reliability” International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 5, No 2, pp. 196-205, Sept. 2012.
  12. Abeer Hamdy, Ahmed E. Youssef, and Reda Ammar, “Real-Time Workload Allocation on a Uni-processor”, International Journal of Computer Applications (IJCA), Vol. 53– No.12, pp.17-24, Sept. 2012.
  13. Ahmed E. Youssef, “Exploring Cloud Computing Services and Applications”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 6, pp. 838-847, July 2012.
  14. Ahmed E. Youssef and Manal Alageel, “A Framework for Secure Cloud Computing”, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 4, No 3, pp. 478-500, July 2012.
  15. Ahmed Emam and Ahmed E. Youssef “Do Females Read Faster Than Males? An Empirical Study Using Eye Tracking System”, International Journal of computer Science Issues (IJCSI), Volume 9, Issue 3, pp.232-240, May 2012.
  16. Abdulaah Alshwaier, Ahmed Youssef and Ahmed Emam “A New Trend for E-Learning in KSA Using Educational Cloud”, Advanced Computing: An International Journal (ACIJ), Vol.3, No.1, pp.81-97, Jan. 2012.
  17. Ahmed Youssef and Ahmed Emam, “Network Intrusion Detection Using Data Mining Techniques and Network Behavior Analysis”, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 6, pp. 87-98, Dec. 2011.
  18. Medhat Awadallah and Ahmed Youssef, “Scalable Symmetric Key Cryptography using Asynchronous Data Exchange in Enterprise Grid” International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 6, No 3, pp. 107-115, Nov. 2011.
  19. Ahmed Youssef and Manal Alageel “Security Issues in Cloud Computing” GSTF International Journal on Computing, Vol.1, No. 3, pp. 7-12, Aug. 2011.
  20. Reda Ammar, Abeer Hamdy and Ahmed Hussein, “Efficient Execution of Real-Time Tasks on a Single Processor”, International Journal of Intelligent Computing and Information Sciences (IJICIS), Vol.9, No.2, pp. 31-40, July 2009.
  21. Ahmed E. Hussein, “Efficient real-time task scheduling in heterogeneous clusters with network limitations”, Ph.D dissertation, University of Connecticut, USA, 2006.

Conferences:

Papers in Conferences Proceedings:

  1. Abdelouahid Derhab, Kashif Saleem and Ahmed E. Youssef, “Third Line of Defense Strategy to Fight against SMS-based Malware in Android Smartphones”, The International Wireless Communications and Mobile Computing Conference (IWCMC 2014), Nicosia, Cyprus, Aug, 2014. (WoS, Scopus)
  2. Almetwally M. Mostafa and Ahmed E. Youssef, “A Multi-Primary Ownership Partitioning Protocol For Highly Scalable and Available Replication Services”, The Second Saudi International Electronics, Communications and Photonics Conference, SIECPC '13, Riyadh, 27 - 30 April, 2013. (WoS, Scopus)
  3. Almetwally M. Mostafa and Ahmed E. Youssef, "Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs", International Conference on IT Convergence and Security (ICITCS), Macua, China, 16-18 Dec 2013. (WoS, Scopus)
  4. Mohammed Alnuem, Samir EL-Masri, Ahmed Youssef, and Ahmed Emam “Towards Integrating National Electronic Care Records in Saudi Arabia”, 12th Int'l. Conference on Bioinformatics and Computational Biology BIOCOMP'11, LV, USA, July 18-21, 2011.
  5. Ahmed Emam, Ahmed Youssef, Samir EL-Masri, and Mohammed Alnuem “Towards Universial Patient Identifiers in KSA”, 10th Int'l Conference on Information and Knowledge Engineering IKE'11, LV, USA, July 18-21, 2011.
  6. Hashad, F.Z. Amer, A.M. El-Garhy, A.E. Youssef, and S.M. Aly “Integrated Controller For Fixed Speed, Grid Connected Wind Turbine, Based On Neural Networks,” Proceedings on the International Conference on Artificial Intelligence (ICAI), 2011.
  7. Hamdy A. Morsy, Joshua Gluckman, Ahmed Hussein, Fathy Z. Amer “Block Based Steganography”, In Proceeding of 9th European Conference on Information Warfare and Security (ECIW), Thessaloniki, Greece, 1-2 July 2010.
  8. Hamdy A. Morsy, Ahmed Hussein, Joshua Gluckman, Fathy Z. Amer “Hiding Appropriate Messages in the LSB of JPEG images”, In Proceeding of 5th International Conference on Information Warfare and Security (ICIW). The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA, 8-9 April 2010.
  9. Nora Naguib, Ahmed Hussein, Hisham Kishk, and Mohamed Eladawy, “Using PFA in Feature Analysis and Selection for H.264 Adaptation”, Paris 2009 International Conference on Image and Vision Computing (ICIVC 2009), June 2009.
  10. Nora Naguib, Ahmed Hussein, Hisham Kishk, and Mohamed Eladawy, “Contrast Error Distribution Measurement for Full Reference Image Quality Assessment”, 18th International Conference on Computer Theory and Applications (ICCTA), Alex, Egypt, Oct 2008.
  11. Reda Ammar, S. Rajasekaran Ahmed Hussein, and Abeer Hamdy, “Efficient Real-Time Task Scheduling on Cluster Platforms with Network Limitations”, IEEE International Symposium on Computers and Communications (ISCC), Aveiro, Portugal, July 2007.
  12. Abeer Hamdy, Reda Ammar, and Ahmed Hussein, “Efficient Workload Allocation to Schedule Fork-Join Real-Time Task Graphs on Cluster Computing Platforms”, 2nd International Computer Engineering Conference, ICENCO'2006), Cairo, Egypt, Dec. 2006.
  13. Ahmed Hussein, Reda Ammar, and Abeer Hamdy, “Efficient Workload Allocation to Schedule Tandem Real-Time Task Graphs in a Cluster Computing Environment”, International Society of Computers and their Applications (ISCA), 19th International Conference on Parallel and Distributed Computing Systems (PDCS), San Francisco, California, USA, Sep. 2006.
  14. Reda Ammar, Ahmed Hussein, and Abeer Hamdy, “Efficient Execution of Real-Time Tasks on a Single Processor”, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vancouver, Canada, Aug. 2006.
  15. Abeer Hamdy, Ahmed Hussein, and Reda Ammar, “An efficient workload allocation to improve scheduling real-time tasks”, IEEE International Symposium on Computers and Communications (ISCC), Pula-Cagliari, Sardinia, Italy, June 2006.
  16. Ahmed Hussein, Reda Ammar, and Abeer Hamdy, “Efficient Processing Power Utilization to Execute Real-Time Tasks”, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Athens, Greece, Dec. 2005.

Teaching:

More than 30 years’ experience in designing, developing and teaching postgrad and undergrad courses with active learning at different institutions. Here are the courses that I have taught:

  • Artificial Intelligence
  • Technology in Practice (Robotics, Linux, Networking)
  • Operating Systems,
  • Computer Networks
  • Human Computer Interaction
  • to Computing and Information Technology
  • Multimedia Systems
  • Fundamentals & Ethics of Information Systems
  • Projects Management
  • Data structure and algorithms with C++
  • Enterprise Resource Planning (ERP)
  • Enterprise Applications Development
  • Requirements Engineering
  • Computing Essentials
  • Knowledge Representation and AI
  • Enterprise Content Management
  • E-Business
  • E-commerce
  • E-health
  • Selected topics in Ecommerce
  • Web Content Management
  • Digital Logic Design
  • Microprocessors & microcontrollers
  • OOP with Java
  • Real-time Systems
  • Cybersecurity
  • Software Engineering
  • Data Mining
  • Machine Learning,
  • Pattern Recognition
  • Computer Interface
  • Computer organization & Architecture
  • Expert Systems
  • Independent Studies in CS
  • Graduation Projects

Services:

Committees and Services

  • College of Computer & Information Sciences (CCIS) Strategic Plan, KSU
  • Accreditation (ABET, NCAAA), KSU
  • Quality Assurance, KSU, HU, and Badya University
  • Postgraduate Affairs, KSU and HU
  • Annual Report, Dept. of Information Systems, CCIS, KSU
  • TA and Manpower Affairs, Dept. of Information Systems, KSU
  • Graduation Projects, Dept. of Information Systems, KSU
  • Student Advising, Dept. of Information Systems, KSU
  • Labs Development and Settings, HU, Badya University
  • Graduation project annual competition, IS Dept. CCIS, KSU
  • Preparing study plans, course syllabi, program specs, and university code of ethics, Badya University
  • Research committee, Badya University.

Workshops and Forums

  • The Preparatory Week for University Teaching, KSU, 19-21 Sep 2010
  • “Effective Classroom Management”, KSU, April 2010
  • “Teaching with Active Learning”, KSU, Sep 2010
  • “Assessing Student Learning”, KSU, Sep 2010
  • “Improving Students Learning and Motivations”, KSU, Sep 2010
  • The 1st annual forum for university teaching, KSU, 11-12 Sep 2011
  • “E-course design”, CCIS, KSU, 2014.
  • “Cloud Infrastructure and Services v2”, KSU, January 18, 2015 - January 22, 2015.
  • “Networks and Information Security”, Helwan University, 15-16/8/2021