Browsing Faculty Of Computer Science Research Paper by Title

Browsing Faculty Of Computer Science Research Paper by Title

Sort by: Order: Results:

  • MA Helal, Iman; El-Bastawissy, Ali; Hegazy, Osman (IEEE, 2010)
    Nowadays, rules make part of any software system including real-time applications and games, meanwhile an event can trigger many different rules according to the conditions controlling these rules. Although rules are core ...
  • Emad, Bassel; Atef, Omar; Shams, Yehya; El-Kerdany, Ahmed; Shorim, Nada; Nabil, Ayman (Elsevier, 2020-01)
    Scopus
  • M. Elbehiery, Hussam; M. Ghada, Abdelmouez (IEEE, 2010)
    It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples ...
  • Afifi K.; Al-Sadek A.F. (Blackwell Publishing Ltd, 2018)
    Despite recent efforts to improve the scoring performance of scoring functions, accurately predicting the binding affinity is still a challenging task. Therefore, different approaches were tried to improve the prediction ...
  • Abdelrahman, Amr; El-Bastawissy, Ali; Kholief, Mohamed (Mohamed, 2016)
    Data integration from different data sources may result in data inconsistencies due to different representation of the same objects at the data source. Many researchers have tried to solve this problem manually or using ...
  • Mahfouz, Mohamed A (2023-07)
    The standard k-nearest neighbors' approach to regression analysis encounters a number of problems when used on datasets with various density distributions. This paper proposes a kNNR-relative ensemble regressor based on ...
  • Mousa, Farid A.; El-Khoribi, Reda A.; Shoman, Mahmoud E. (IEEE, 10/07/2015)
    A channel of communication for both human brain and computer system is provided via a system called Brain Computer Interface (BCI). The vital aim of BCI research is to develop a system that helps the disabled people to ...
  • Zakaria E.E.; Hamza H.S.; Saroit I.A. (Institute of Electrical and Electronics Engineers Inc., 2016)
    As mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in ...
  • Mohamed S.I. (International Journal of Scientific and Technology Research, 2019)
    Egypt�s current bus system is large enough to satisfya significant portion of the populations demand, yet fails to do sodue t o mismanaged resources. Static lines and unclear schedulescreate a confusing and unappealing ...
  • Atia, Ayman (International Journal Of UbiComp, 2010)
    In this paper, we introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick ...
  • A Elmanakhly, Dina; Atia, Ayman; A Rashed, Essam; M Mostafa, Mostafa-Samy (SPRINGER, 2016)
    The main challenge of creating large interactive displays in the operating rooms (ORs) is in the definition of ways that are efficient and easy to learn for the physician. Apart from traditional input methods such as mouse ...
  • A. EL-LICY, FATMA; HUSSEIN, OMAR; HEGAZY, OSMAN (Institute of Statistical Studies and Research, Cairo University, 2010)
    This paper presents a method to safeguard stored data integrity from attacks committed by insiders. This method forms an additional data security layer to detect and prevent unauthorized modification to critical configuration ...
  • Slim, S.O; Elfattah, M.M.A; Atia, A; Mostafa, M.-S.M (Intelligent Network and Systems Society, 2021-03)
    View references (73) Nowadays, more and more human activity recognition (HAR) tasks are being solved with deep learning techniques because it’s high recognition rate. The architectural design of deep learning is a challenge ...
  • Hegazy, Habiba; Abdelsalam, Mohamed; Hussien, Moustafa; Elmosalamy, Seif; M.I Hassan, Yomna; Nabil, Ayman M.; Atia, Ayman (Elsevier Ltd, 2020-01)
    Assisting table tennis coaching using modern technologies is one of the most trending researches in the sports field. In this paper, we present a methodology to identify and recognize the wrong strokes executed by players ...
  • Ehab, Mohamed; Ahmed, Hossam Mohamed Mohamed; Hammad, Mostafa; ElMasry, Noha; Atia, Ayman (MeC'20 Workshop, 10/29/2020)
    In sports, coaching remains an essential aspect of the efficiency of the athlete’s performance. This paper proposes a wrist wearable assistant for the swimmer called iSwimCoach. The key aim behind the system is to detect ...
  • Doha, E. H.; Bhrawy, A. H.; Hafez, R. M. (PERGAMON-ELSEVIER SCIENCE LTD, 2011)
    his paper analyzes a method for solving the third-and fifth-order differential equations with constant coefficients using a Jacobi dual-Petrov-Galerkin method, which is more reasonable than the standard Galerkin one. The ...
  • A. Mansour, Hesham (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016)
    Knowledge Discovery in Databases (KDD) is a complex process that is highly interactive and iterative. Managing the process and its underlying resources and interacting activities is a very complex task. Today, KDD projects ...
  • Saddad, Emad; Mokhtar, Hoda M. O.; El-Bastawissy, Ali; Hazman, Maryam (SAI, 2020)
    Traditional Data Warehouse is a multidimensional repository. It is nonvolatile, subject-oriented, integrated, time- variant, and non-operational data. It is gathered from multiple heterogeneous data sources. We need to ...
  • A. Mansour, Hesham; Duchamp, Daniel; Krapp, Carl-Arndt (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015)
    Knowledge Discovery in Databases (KDD) processes are complex, highly interactive and iterative. The similarities between KDD processes and software development processes suggest that approaches used to manage the development ...
  • Zawawi, Nour; Hamdy, Mohamed; El-Gohary, Rania; Fahmy Tolba, Mohamed (Springer, Cham, 11/28/2014)
    Preventing data abuses in cloud remains an essential point of the research. Proving the integrity and non-repudiation for large datasets over the cloud has an increasing attention of database community. Having security ...

Search MSAR


Advanced Search

Browse

My Account