Browsing Faculty Of Computer Science Research Paper by Title

Browsing Faculty Of Computer Science Research Paper by Title

Sort by: Order: Results:

  • Ateeq, Tayyab; Bin Faheem, Zaid; Ghoneimy, Mohamed; Ali, Jehad; Li, Yang; Baz, Abdullah (National Research Council of Canada, 2023-12)
    Cerebral microbleeds (CMBs) in the brain are the essential indicators of critical brain disorders such as dementia and ischemic stroke. Generally, CMBs are detected manually by experts, which is an exhaustive task with ...
  • Nagib, A.E.; Mohamed Saeed, M.; El-Feky, S.F.; Khater Mohamed, A. (Institute of Electrical and Electronics Engineers Inc., 2020-10)
    Over the last two decades, the neural network has surprisingly arisen as an efficient tool for dealing with numerous real-life applications. Optimization of the hyperparameter of the neural network attracted many researchers ...
  • Abdelmouez M., Ghada Fathy; . Helail, S; A. Elkouny, Abdellatif (World Academy of Science, Engineering and Technology, 2010)
    DES was published by the United States' National Bureau of Standards in January 1977 as an algorithm to be used for unclassified data. The algorithm had been used in banks for funds transfer security [2]. DES encryption ...
  • Kadry, Reem; Ismael, Osama (SCIENCE & INFORMATION SAI ORGANIZATION LTD, 19 BOLLING RD, BRADFORD, WEST YORKSHIRE, 00000, ENGLAND, 2020-11)
    K-Nearest Neighbour algorithm is widely used as a classification technique due to its simplicity to be applied on different types of data. The presence of multidimensional and outliers data have a great effect on the ...
  • Nassar, Amin Mohamed (IEEE, 2008)
    We propose an integrated acoustic echo cancellation solution based on using multiple of small adaptive filters rather than using one long adaptive filter. A new approach is proposed using the concept of decomposing the ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (LJS Publishing, 2014)
    In a traditional non-virtualized computer system the whole software stack is highly vulnerable to security breaches. This is mainly caused by the coexistence of deployed security systems in the same space as the potentially ...
  • El-Wakil, M; El-Bastawisi, Ali; Riad, M; Fahmy, A (2005)
    Despite the extensive and solid research literature on Object-Oriented Design Metrics (OOD Metrics), a recent survey that was conducted to assess the exploitation of metrics collection and analysis ...
  • Labib S.S. (Institute of Electrical and Electronics Engineers Inc., 2016)
    Brain computer interface (BCI) systems measure brain signal and translate it into control commands in an attempt to mimic specific human thinking activities. In recent years, many researchers have shown their interests in ...
  • Wassif, KT; Badr, A; Nassef, M; Abd El Haliem, Z (INNOVATIVE SCIENTIFIC INFORMATION & SERVICES NETWORK, INNOVATIVE SCIENTIFIC INFORMATION & SERVICES NETWORK,, 2019-09)
    RNA - Protein interactions have vital roles in several cellular processes such as RNA transfer, gene regulation at the transcriptional processes and sequence encoding. RNA-binding prediction is a very important aspect of ...
  • Elshafiey, TF; Aberle, JT (INT INST INFORMATICS & SYSTEMICS, 2002)
    This paper presents an efficient approach for the evaluation of the RCS of cross- patch antennas on ferrite substrates. The direction of the do magnetization of the ferrite is assumed arbitrarily in theta and phi. The ...
  • Mahmoud, A; Ali, F; El-Kilany, A; Mazen, S (European Council for Modelling and Simulation, 06/01/2020)
    With the amount of data is growing extensively in different domains in the recent years, the data imbalance problem arises frequently. A dataset is called imbalanced when the data of a certain class has significantly more ...
  • Abo Khedra, M. M; Mohammed, Ammar; Abdel-Hamid, Yasser (IEEE, 2023-07)
    Process mining showed great capabilities in many fields, aiming to automatically extract the nature of process models from "event logs."Businesses commonly use process mining to improve key performance indicators (KPIs). ...
  • Zawawi, Nour; El-Gohary, Rania; Hamdy, Mohamed; Fahmy Tolba, Mohamed (Springer, Berlin, Heidelberg, 12/08/2012)
    Keepinglarge scale data sets like data warehouse seems a vital demand of business organizations. Proving copyright, ownership, integrity and non-repudiation have a growing interest of database community. Many watermarking ...
  • El-Wakil, Mohamed; El-Bastawisi, Ali; Boshra, Mokhtar; Fahmy, Ali (2004)
    Since 1994, many Object-Oriented Design (OOD) quality models had appeared. OOD quality models aim is assessing OOD quality characteristics, such as maintainability, in a quantitative way through ...
  • Ghanim, M. N.; Mustafa, H. I.; Abd El Aziz, S. (ELSEVIER SCIENCE INC., 2011)
    In this paper, the concept of intension is used to introduce two types of ordering relations based on information that generates a cover for the universal set. These types of ordering relations are distinct from the ...
  • Hegazy, Habiba; Abdelsalam, Mohamed; Hussien, Moustafa; Elmosalamy, Seif; IHassan, Yomna M.; Nabil, Ayman M (Elsevier B.V., 2020-05)
    Table tennis is a complex sport with a distinctive style of play. Due to the rising interest in this sport the past years, attempts have been targeted towards enhancing the training experience and quality through various ...
  • H. Haggag, Mohamed; R. Mahmoud, Doaa (Foundation of Computer Science, 2012)
    Traffic jams and congestions have bad effects on drivers and the whole community. Most – if not all – route planning systems focus on finding the optimal/fastest route for its users. Users might be advised to pass through ...
  • A. M. Ali, Khayri; A. Omara, Fatma; A. Elshakankiry, Osama (The Military Technical College, 2003)
    In this paper, an improved parallel generational copying real-time garbage collection scheme for shared-memory multiprocessors, which supports load balancing among workers, has been proposed, implemented, and evaluated. ...
  • Wessa, Eriny; Atia, Ayman (Institute of Electrical and Electronics Engineers Inc., 16/12/2021)
    Bin packing is an optimization problem defined as placing different sized objects into similar containers or bins to minimize the number of used bins. This problem has different variations based on the dimensions of the ...
  • A. Mansour, Hesham (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016)
    Current support for Knowledge Discovery in Databases (KDD) is provided only for fragments of the process, a particular KDD process model, or most recently certain process aspects. The support needed for a KDD process varies ...

Search MSAR


Advanced Search

Browse

My Account