13 articles in this issue
Eman Ahmed,Amin A. Sorrour,Mohamed A. Sobh,Ayman M. Bahaa-Eldin
Malwares are increasing rapidly. The nature of distribution and effects of malwares attacking several applications requires a real-time response. Therefore, a high performance detection platform is required. In this paper, Hadoop is utilized to perform st... see more
Walid B. Hussein,Sarah A. Essmat,Nestor Yoma
Classifying bubbles in liquids is a crucial problem that is demanded within multiple fields. This paper discusses a new method for classifying bubble sizes in non-contact and inexpensive approach using ultrasound analysis. Exploiting the principle of buoy... see more
Mahmoud M. El-Khouly,Samir Abou El-Seoud
Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. I... see more
Osama Halabi,Samir A. Elseoud,Jihad M. Alja'am,Hena Alpona,Moza Al-Hemadi,Dabia Al-Hassan
Individuals in the Autism Spectrum often encounter situations where they have to respond to questions and situations that they do not know how to respond to, such as, questions asked by strangers including ones related to daily-life activities. A variety ... see more
Samir Abou El-Seoud,Eslam Ahmed AboGamie,Mostafa Salama
In this work, we present a framework to integrate the functionalities of the Enterprise Resource Planning (ERP) with the University academic and management functionalities at the British University in Egypt , in order to produce a University Resource Plan... see more
Samir Abou El-Seoud,Hosam F. El-Sofany,Mohamed Ashraf Fouad Abdelfattah,Reham Mohamed
Big data is currently one of the most critical emerging technologies. Big Data are used as a concept that refers to the inability of traditional data architectures to efficiently handle the new data sets. The 4V’s of big data – volume, velocity, variety a... see more
Ayman M. Bahaa-Eldin,Samir Abou El-Seoud
-
Masoud U. Mwinyi,Jihad M. Alja'am,Samir Abou El-Seoud
Children with special needs face major difficulties to understand the script of stories. They cannot comprehend the words’ meaning properly. Instructors use different techniques to explain them. They read the script several times, use glossy images, symbo... see more
Basma Badawi Hathout,Samy Ghoniemy,Osman Ibrahim
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of se... see more
Mohamed AbdelFattah,Dahab Galal,Nada Hassan,Doaa Elzanfaly,Greg Tallent
Sentiment Analysis (SA) or Opinion Mining is the process of analysing natural language texts to detect an emotion or a pattern of emotions towards a certain product to make a decision about that product. SA is a topic of text mining, Natural Language Proc... see more
Samir Abou El-Seoud,Reham Fouad Mohamed,Samy Ghoneimy
Much of our scientific, technological, and economic future depends on the availability of an ever-increasing supply of computational power. However, the increasing demand for such power has pushed electronic technology to the limit of physical feasibility... see more
Samiha Abdelrahman Mohammed Marwan,Ahmed Shawish,Khaled Nagaty
There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing quantities of... see more
Daoud M. Daoud,Samir Abou El-Seoud
We describe a SMS-based information system called CATS, which allows posting and searching through free Arabic text using Information Extraction (IE) technology. We discuss the challenges of applying IE technology for unedited real Arabic text. In additio... see more