Browsing Faculty Of Computer Science Research Paper by Title

Browsing Faculty Of Computer Science Research Paper by Title

Sort by: Order: Results:

  • Atia, Ayman (International Journal Of UbiComp, 2010)
    In this paper, we introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick ...
  • A Elmanakhly, Dina; Atia, Ayman; A Rashed, Essam; M Mostafa, Mostafa-Samy (SPRINGER, 2016)
    The main challenge of creating large interactive displays in the operating rooms (ORs) is in the definition of ways that are efficient and easy to learn for the physician. Apart from traditional input methods such as mouse ...
  • A. EL-LICY, FATMA; HUSSEIN, OMAR; HEGAZY, OSMAN (Institute of Statistical Studies and Research, Cairo University, 2010)
    This paper presents a method to safeguard stored data integrity from attacks committed by insiders. This method forms an additional data security layer to detect and prevent unauthorized modification to critical configuration ...
  • Slim, S.O; Elfattah, M.M.A; Atia, A; Mostafa, M.-S.M (Intelligent Network and Systems Society, 2021-03)
    View references (73) Nowadays, more and more human activity recognition (HAR) tasks are being solved with deep learning techniques because it’s high recognition rate. The architectural design of deep learning is a challenge ...
  • Hegazy, Habiba; Abdelsalam, Mohamed; Hussien, Moustafa; Elmosalamy, Seif; M.I Hassan, Yomna; Nabil, Ayman M.; Atia, Ayman (Elsevier Ltd, 2020-01)
    Assisting table tennis coaching using modern technologies is one of the most trending researches in the sports field. In this paper, we present a methodology to identify and recognize the wrong strokes executed by players ...
  • Ehab, Mohamed; Ahmed, Hossam Mohamed Mohamed; Hammad, Mostafa; ElMasry, Noha; Atia, Ayman (MeC'20 Workshop, 10/29/2020)
    In sports, coaching remains an essential aspect of the efficiency of the athlete’s performance. This paper proposes a wrist wearable assistant for the swimmer called iSwimCoach. The key aim behind the system is to detect ...
  • Doha, E. H.; Bhrawy, A. H.; Hafez, R. M. (PERGAMON-ELSEVIER SCIENCE LTD, 2011)
    his paper analyzes a method for solving the third-and fifth-order differential equations with constant coefficients using a Jacobi dual-Petrov-Galerkin method, which is more reasonable than the standard Galerkin one. The ...
  • A. Mansour, Hesham (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016)
    Knowledge Discovery in Databases (KDD) is a complex process that is highly interactive and iterative. Managing the process and its underlying resources and interacting activities is a very complex task. Today, KDD projects ...
  • Saddad, Emad; Mokhtar, Hoda M. O.; El-Bastawissy, Ali; Hazman, Maryam (SAI, 2020)
    Traditional Data Warehouse is a multidimensional repository. It is nonvolatile, subject-oriented, integrated, time- variant, and non-operational data. It is gathered from multiple heterogeneous data sources. We need to ...
  • A. Mansour, Hesham; Duchamp, Daniel; Krapp, Carl-Arndt (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015)
    Knowledge Discovery in Databases (KDD) processes are complex, highly interactive and iterative. The similarities between KDD processes and software development processes suggest that approaches used to manage the development ...
  • Zawawi, Nour; Hamdy, Mohamed; El-Gohary, Rania; Fahmy Tolba, Mohamed (Springer, Cham, 11/28/2014)
    Preventing data abuses in cloud remains an essential point of the research. Proving the integrity and non-repudiation for large datasets over the cloud has an increasing attention of database community. Having security ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (International Journal of Computer Science and Information Security, 2014)
    Information leakage attacks represent a serious threat for their widespread and devastating effects. Their significance stems from the fact that they are committed by an organization’s authorized computer users, and/or ...
  • El Qutaany A.Z.; Hegazi O.M.; El Bastawissy A.H. (Science and Information Organization, 2018)
    Nowadays, organizations cannot satisfy their information needs from one data source. Moreover, multiple data sources across the organization fuels the need for data integration. Data integration system's users pose queries ...
  • El Bakry M.; Safwat S.; Hegazy O. (Institute of Electrical and Electronics Engineers Inc., 2016)
    Due to the huge increase in the size of the data it becomes troublesome to perform efficient analysis using the current traditional techniques. Big data put forward a lot of challenges due to its several characteristics ...
  • Soliman, Ashraf; Salah, Akram; Hefny, Hesham (Department of Computer Sciences, Faculty of Computers and Information, Cairo University, 2017)
    Multi-agent systems often dedicate a shared centralized ontology as domain knowledge but unfortunately they completely neglect the decentralized nature of domain knowledge. This nature implies distributing domain knowledge ...
  • Badr, Assem) (ELSEVIER SCIENCE BV, 2018-12)
    Recently, the most computer and digital systems are built based on the parallelism to increase their speed of processing. The complications of these systems are increasing proportionally with the complexity of the used ...
  • Mohamed, Hussam El-Din; Fadl, Ali; Anas, Omar; Wageeh, Youssef; ElMasry, Noha; Nabil, Ayman; Atia, Ayman (Elsevier, 2020-02)
    Tasks involving the monitoring of fish farms such as controlling fish ponds is one of the expensive and difficult tasks for fish farmers. Usually, fish farmers are doing these tasks manually which costs them time and money. ...
  • El-Dawy, Eman; MO Mokhtar, Hoda; El-Bastawissy, Ali (IEEE, 2011)
    Most of the current work on skyline queries mainly dealt with querying static query points over static data sets. With the advances in wireless communication, mobile computing, and positioning technologies, it has become ...
  • Hegazy, H; Abdelsalam, M; Hussien, M; Elmosalamy, S; Hassan, Y; Nabil, A; Atia, A (Intelligent Network and Systems Society, 2021-03)
    Sports training generally focuses on speed of response and variety of strategies aimed at encouraging sustainable physical activity and improving learning skills for players, thus, enhance their performance and skills ...
  • Abdelhady, Ghada; Ismail, Mohammed; Elbehiery, Hussam (2014)
    Biometrics is a technology that strives towards identifying or authenticating the identity of a living person based on biological key that make the process definitive and effortless. A person's live biometric data is being ...

Search MSAR


Advanced Search

Browse

My Account