Browsing Faculty Of Computer Science Research Paper by Title

Browsing Faculty Of Computer Science Research Paper by Title

Sort by: Order: Results:

  • A. Mansour, Hesham (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016)
    Knowledge Discovery in Databases (KDD) is a complex process that is highly interactive and iterative. Managing the process and its underlying resources and interacting activities is a very complex task. Today, KDD projects ...
  • Saddad, Emad; Mokhtar, Hoda M. O.; El-Bastawissy, Ali; Hazman, Maryam (SAI, 2020)
    Traditional Data Warehouse is a multidimensional repository. It is nonvolatile, subject-oriented, integrated, time- variant, and non-operational data. It is gathered from multiple heterogeneous data sources. We need to ...
  • A. Mansour, Hesham; Duchamp, Daniel; Krapp, Carl-Arndt (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015)
    Knowledge Discovery in Databases (KDD) processes are complex, highly interactive and iterative. The similarities between KDD processes and software development processes suggest that approaches used to manage the development ...
  • Zawawi, Nour; Hamdy, Mohamed; El-Gohary, Rania; Fahmy Tolba, Mohamed (Springer, Cham, 11/28/2014)
    Preventing data abuses in cloud remains an essential point of the research. Proving the integrity and non-repudiation for large datasets over the cloud has an increasing attention of database community. Having security ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (International Journal of Computer Science and Information Security, 2014)
    Information leakage attacks represent a serious threat for their widespread and devastating effects. Their significance stems from the fact that they are committed by an organization’s authorized computer users, and/or ...
  • El Qutaany A.Z.; Hegazi O.M.; El Bastawissy A.H. (Science and Information Organization, 2018)
    Nowadays, organizations cannot satisfy their information needs from one data source. Moreover, multiple data sources across the organization fuels the need for data integration. Data integration system's users pose queries ...
  • El Bakry M.; Safwat S.; Hegazy O. (Institute of Electrical and Electronics Engineers Inc., 2016)
    Due to the huge increase in the size of the data it becomes troublesome to perform efficient analysis using the current traditional techniques. Big data put forward a lot of challenges due to its several characteristics ...
  • Soliman, Ashraf; Salah, Akram; Hefny, Hesham (Department of Computer Sciences, Faculty of Computers and Information, Cairo University, 2017)
    Multi-agent systems often dedicate a shared centralized ontology as domain knowledge but unfortunately they completely neglect the decentralized nature of domain knowledge. This nature implies distributing domain knowledge ...
  • Badr, Assem) (ELSEVIER SCIENCE BV, 2018-12)
    Recently, the most computer and digital systems are built based on the parallelism to increase their speed of processing. The complications of these systems are increasing proportionally with the complexity of the used ...
  • Mohamed, Hussam El-Din; Fadl, Ali; Anas, Omar; Wageeh, Youssef; ElMasry, Noha; Nabil, Ayman; Atia, Ayman (Elsevier, 2020-02)
    Tasks involving the monitoring of fish farms such as controlling fish ponds is one of the expensive and difficult tasks for fish farmers. Usually, fish farmers are doing these tasks manually which costs them time and money. ...
  • El-Dawy, Eman; MO Mokhtar, Hoda; El-Bastawissy, Ali (IEEE, 2011)
    Most of the current work on skyline queries mainly dealt with querying static query points over static data sets. With the advances in wireless communication, mobile computing, and positioning technologies, it has become ...
  • Hegazy, H; Abdelsalam, M; Hussien, M; Elmosalamy, S; Hassan, Y; Nabil, A; Atia, A (Intelligent Network and Systems Society, 2021-03)
    Sports training generally focuses on speed of response and variety of strategies aimed at encouraging sustainable physical activity and improving learning skills for players, thus, enhance their performance and skills ...
  • Abdelhady, Ghada; Ismail, Mohammed; Elbehiery, Hussam (2014)
    Biometrics is a technology that strives towards identifying or authenticating the identity of a living person based on biological key that make the process definitive and effortless. A person's live biometric data is being ...
  • Ateeq, Tayyab; Bin Faheem, Zaid; Ghoneimy, Mohamed; Ali, Jehad; Li, Yang; Baz, Abdullah (National Research Council of Canada, 2023-12)
    Cerebral microbleeds (CMBs) in the brain are the essential indicators of critical brain disorders such as dementia and ischemic stroke. Generally, CMBs are detected manually by experts, which is an exhaustive task with ...
  • Nagib, A.E.; Mohamed Saeed, M.; El-Feky, S.F.; Khater Mohamed, A. (Institute of Electrical and Electronics Engineers Inc., 2020-10)
    Over the last two decades, the neural network has surprisingly arisen as an efficient tool for dealing with numerous real-life applications. Optimization of the hyperparameter of the neural network attracted many researchers ...
  • Abdelmouez M., Ghada Fathy; . Helail, S; A. Elkouny, Abdellatif (World Academy of Science, Engineering and Technology, 2010)
    DES was published by the United States' National Bureau of Standards in January 1977 as an algorithm to be used for unclassified data. The algorithm had been used in banks for funds transfer security [2]. DES encryption ...
  • Kadry, Reem; Ismael, Osama (SCIENCE & INFORMATION SAI ORGANIZATION LTD, 19 BOLLING RD, BRADFORD, WEST YORKSHIRE, 00000, ENGLAND, 2020-11)
    K-Nearest Neighbour algorithm is widely used as a classification technique due to its simplicity to be applied on different types of data. The presence of multidimensional and outliers data have a great effect on the ...
  • Nassar, Amin Mohamed (IEEE, 2008)
    We propose an integrated acoustic echo cancellation solution based on using multiple of small adaptive filters rather than using one long adaptive filter. A new approach is proposed using the concept of decomposing the ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (LJS Publishing, 2014)
    In a traditional non-virtualized computer system the whole software stack is highly vulnerable to security breaches. This is mainly caused by the coexistence of deployed security systems in the same space as the potentially ...
  • El-Wakil, M; El-Bastawisi, Ali; Riad, M; Fahmy, A (2005)
    Despite the extensive and solid research literature on Object-Oriented Design Metrics (OOD Metrics), a recent survey that was conducted to assess the exploitation of metrics collection and analysis ...

Search MSAR


Advanced Search

Browse

My Account