Browsing Faculty Of Computer Science Research Paper by Title

Browsing Faculty Of Computer Science Research Paper by Title

Sort by: Order: Results:

  • El-Wakil, Mohamed; El-Bastawisi, Ali; Boshra, Mokhtar; Fahmy, Ali (2004)
    Since 1994, many Object-Oriented Design (OOD) quality models had appeared. OOD quality models aim is assessing OOD quality characteristics, such as maintainability, in a quantitative way through ...
  • Ghanim, M. N.; Mustafa, H. I.; Abd El Aziz, S. (ELSEVIER SCIENCE INC., 2011)
    In this paper, the concept of intension is used to introduce two types of ordering relations based on information that generates a cover for the universal set. These types of ordering relations are distinct from the ...
  • Hegazy, Habiba; Abdelsalam, Mohamed; Hussien, Moustafa; Elmosalamy, Seif; IHassan, Yomna M.; Nabil, Ayman M (Elsevier B.V., 2020-05)
    Table tennis is a complex sport with a distinctive style of play. Due to the rising interest in this sport the past years, attempts have been targeted towards enhancing the training experience and quality through various ...
  • H. Haggag, Mohamed; R. Mahmoud, Doaa (Foundation of Computer Science, 2012)
    Traffic jams and congestions have bad effects on drivers and the whole community. Most – if not all – route planning systems focus on finding the optimal/fastest route for its users. Users might be advised to pass through ...
  • A. M. Ali, Khayri; A. Omara, Fatma; A. Elshakankiry, Osama (The Military Technical College, 2003)
    In this paper, an improved parallel generational copying real-time garbage collection scheme for shared-memory multiprocessors, which supports load balancing among workers, has been proposed, implemented, and evaluated. ...
  • Wessa, Eriny; Atia, Ayman (Institute of Electrical and Electronics Engineers Inc., 16/12/2021)
    Bin packing is an optimization problem defined as placing different sized objects into similar containers or bins to minimize the number of used bins. This problem has different variations based on the dimensions of the ...
  • A. Mansour, Hesham (The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016)
    Current support for Knowledge Discovery in Databases (KDD) is provided only for fragments of the process, a particular KDD process model, or most recently certain process aspects. The support needed for a KDD process varies ...
  • Hamed, Mohamed; El-Bastawissy, Ali; Mansour, Hesham; Ghannam, Adel N (EOS ASSOC, 2019-04)
    This paper is a part of a research project funded by the Science and Technology Development Fund (STDF), to create a product serving the digital transformation of Egyptian manufacturing companies. It allows a manufacturing ...
  • Zawawi, Nour Saad; Saber, Heba Gamal; Hashem, Mohamed (Institute of Advanced Engineering and Science (IAES), 2024-01)
    It is critical to determine the risk of Alzheimer’s disease (AD) in people with mild cognitive impairment (MCI) to begin treatment early. Its development is affected by many things, but how each effect and how the disease ...
  • Chettaoui, N; Atia, A; Bouhlel, M.S (Institute of Electrical and Electronics Engineers Inc., 5/27/2021)
    Implementing machine learning techniques is receiving considerable attention in the educational technology research field. Different systems and techniques were proposed to predict student performance and gain insights ...
  • Ali R.E.; El-Kadi H.; Labib S.S.; Saad Y.I. (Science and Information Organization, 2019)
    Diabetes is a disease that is chronic. Improper blood glucose control may cause serious complications in diabetic patients as heart and kidney disease, strokes, and blindness. Obesity is considered to be a massive risk ...
  • Hamda Othman, S; Asklany, S; Ali Mansouri, W (INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS,, 12/30/2019)
    In this paper, we focus on the scheduling algorithm of heterogeneous wireless networks where the traffic has different requirements constrains which are needed to be fulfilled without exceeding the internal constrains of ...
  • Montasser, Reem Kadry; Helal, Iman M. A (IEEE, 2023-07)
    Process discovery algorithms incorporating domain knowledge can have varying levels of user involvement. It ranges from fully automated algorithms to interactive approaches where the user makes critical decisions about the ...
  • Mohammed Hegazy, Osman; Hamed El Bastawissy, Ali; Farid Ibrahim, Romani (2005)
    In this paper, our concern is the management of mobile transactions in the shared area among many servers, when the mobile user moves from one cell to another in online partially-replicated distributed ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (IEEE, 2015)
    This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke ...
  • El-Shewy, Samir; Hegazy, Abd El-Fatah; Idrees, Amira M; Khedr, Ayman E (TAYLOR & FRANCIS LTD, 2018)
    This study presents a configurable approach for recommendations which determines the suitable recommendation method for each field based on the characteristics of its data, the method includes determining the suitable ...
  • Hussein, Omar; Hamza, Nermin; Hefny, Hesham (IEEE, 2015)
    This paper proposes a covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel. The paper describes a prospective information leakage attack that ...
  • H Ali El-Sappagh, Shaker; M Ahmed Hendawi, Abdeltawab; Hamed El Bastawissy, Ali (ELSEVIER, 2017)
    Extraction–transformation–loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, its cleansing, customization, reformatting, integration, and insertion into a data warehouse. ...
  • Samir Abdel-Moneim, Mohamed; Hamed El-Bastawissy, Ali; Hamed Kholief, Mohamed (7th Int. Conf. Inf. Technol, 2015)
    By data integration systems (DIS) we mean the systems in which query answers are instantaneously mapped from a set of available data sources. The query answers may be improved by detecting the quality of the ...
  • Zawawi, Nour; Hamdy, Mohamed; Ghary, R; F Tolba, Mohamed (SPRINGER, 2016)
    Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means ...

Search MSAR


Advanced Search

Browse

My Account