Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Artificial Intelligence (2)
- ANN (1)
- Accessibility (1)
- Artificial Intelligence in Education (1)
- Artificial Intelligence in Higher Education in Egypt (1)
-
- Artificial intelligence for Equity and Accessibility (1)
- Atmospheric pressure (1)
- Automated Deep Learning (1)
- Blockchain (1)
- Business (1)
- C++ (Computer program language) (1)
- Cancer classification (1)
- Cement Alkali-activated Cement Greenhouse emissions Nanostructures Interfaces Water Modeling Simulation Molecular dynamics Materials science (1)
- Cloud-native Computing (1)
- Computer network resources (1)
- Computer software (1)
- Consumption (1)
- Containerization (1)
- Convolutional Neural Networks (1)
- Deep Learning Pipelines (1)
- Deep learning (1)
- Egypt (1)
- Energy (1)
- Equity (1)
- Evolution (1)
- Forecast (1)
- Gene expressions (1)
- Genetic algorithms (1)
- Grover's algorithm (1)
- Harmonic oscillator (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 59
Full-Text Articles in Physical Sciences and Mathematics
Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad
Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad
Theses and Dissertations
Identity management is one of the most important topics in the security field. Public Key Infrastructure (PKI) is the most commonly used approach in legally identity management systems. PKI systems have many centralized services that might affect the availability and trustworthiness of the system. Issues related to certificate verification methods such as Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) can be avoided if blockchain is used. Blockchain is a decentralized trusted system where data can only be appended to a public ledger. Edits are not allowed in blockchain. Blockchain consists of several nodes all of them have …
The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy
The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy
Theses and Dissertations
Artificial Intelligence (AI) is an emerging technology that is transforming various aspects of society, including higher education. This paper examines faculty perspectives from five different institutions; The American University in Cairo (AUC), The German University in Cairo (GUC), The Arab Academy for Science and Technology (AAST), Ain Shams University, and Cairo University, on the use of AI in higher education in teaching and learning in Egypt, with all its challenges and resources available to support it, and how it can be used to achieve equity and accessibility. This research was conducted through a qualitative study using semi-structured one- on-one interviews …
A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil
Theses and Dissertations
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down …
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
Theses and Dissertations
In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …
Atomistic Simulation Of Na+ And Cl- Ions Binding Mechanisms To Tobermorite 14Å As A Model For Alkali Activated Cements, Ahmed Abdelkawy
Atomistic Simulation Of Na+ And Cl- Ions Binding Mechanisms To Tobermorite 14Å As A Model For Alkali Activated Cements, Ahmed Abdelkawy
Theses and Dissertations
The production of ordinary Portland cement (OPC) is responsible for ~8% of all man-made CO2 emissions. Unfortunately, due to the continuous increase in the number of construction projects, and since virtually all projects depend on hardened cement from the hydration of OPC as the main binding material, the production of OPC is not expected to decrease. Alkali-activated cement produced from the alkaline activation of byproducts of industries, such as iron and coal industries, or processed clays represents a potential substitute for OPC. However, the interaction of the reaction products of AAC with corrosive ions from the environment, such as Cl-, …
Energy Planning Model Design For Forecasting The Final Energy Consumption Using Artificial Neural Networks, Haidy Eissa
Energy Planning Model Design For Forecasting The Final Energy Consumption Using Artificial Neural Networks, Haidy Eissa
Theses and Dissertations
“Energy Trilemma” has recently received an increasing concern among policy makers. The trilemma conceptual framework is based on three main dimensions: environmental sustainability, energy equity, and energy security. Energy security reflects a nation’s capability to meet current and future energy demand. Rational energy planning is thus a fundamental aspect to articulate energy policies. The energy system is huge and complex, accordingly in order to guarantee the availability of energy supply, it is necessary to implement strategies on the consumption side. Energy modeling is a tool that helps policy makers and researchers understand the fluctuations in the energy system. Over the …
A Framework For Phrase Based Smt In The Technical Translation Domain, Hisham Farouk Khodeir
A Framework For Phrase Based Smt In The Technical Translation Domain, Hisham Farouk Khodeir
Archived Theses and Dissertations
No abstract provided.
Using Parallel Primary Caches To Improve Capacity And Bandwidth, John Rubena Wani
Using Parallel Primary Caches To Improve Capacity And Bandwidth, John Rubena Wani
Archived Theses and Dissertations
No abstract provided.
Error Correction In Quantum Cryptography, Mohamed Salah El Ashmawy
Error Correction In Quantum Cryptography, Mohamed Salah El Ashmawy
Archived Theses and Dissertations
No abstract provided.
Resource Optimization Property Manager For Autonomic Computing, Hazem A. M. Sharaf El Din
Resource Optimization Property Manager For Autonomic Computing, Hazem A. M. Sharaf El Din
Archived Theses and Dissertations
No abstract provided.
Moment-Preserving Piecewise Approximation For 1-D And 2-D Signals, Soha M. A. A. Seif
Moment-Preserving Piecewise Approximation For 1-D And 2-D Signals, Soha M. A. A. Seif
Archived Theses and Dissertations
No abstract provided.
Shape Similarity By Deformation Using Polynomial Transformation, Hanan M. Moussa
Shape Similarity By Deformation Using Polynomial Transformation, Hanan M. Moussa
Archived Theses and Dissertations
No abstract provided.
Applying Simulated Annealing As An Intelligent Genetic Mutation Operator For Finding Most Probable Explanations On Bayesian Belief Networks, Sahr Attia Afara
Applying Simulated Annealing As An Intelligent Genetic Mutation Operator For Finding Most Probable Explanations On Bayesian Belief Networks, Sahr Attia Afara
Archived Theses and Dissertations
No abstract provided.
Recurrent Connectionist Models For Map Explanation In Bayesian Networks, Murad Assaggaf
Recurrent Connectionist Models For Map Explanation In Bayesian Networks, Murad Assaggaf
Archived Theses and Dissertations
No abstract provided.
Web Service Quality-Dased Profiling And Selection, Ahmed Magdi Hamza
Web Service Quality-Dased Profiling And Selection, Ahmed Magdi Hamza
Archived Theses and Dissertations
Guaranteeing quality of service has been recently labeled as one of multiple major research challenges in the service oriented architecture. In effect, Web service selection from a set of matched services offering the same functional requirements, and ultimately claiming certain quality of service guarantees about themselves is not enough. A need emerges for the existence of a trusted third party that monitors Web service quality indicators, yet in a way that does not interfere with the normal operation of the Web service itself. The third party will eventually provide consumers with guarantees about Web service quality. In this research we …
Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha M. El-Sokkary
Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha M. El-Sokkary
Archived Theses and Dissertations
No abstract provided.
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Theses and Dissertations
Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.
Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …
Quantum Simulation Of Schrödinger's Equation, Mohamed Eltohfa
Quantum Simulation Of Schrödinger's Equation, Mohamed Eltohfa
Capstone and Graduation Projects
Quantum computing is one of the promising active areas in physics research. This is because of the potential of quantum algorithms to outperform their classical counterparts. Grover’s search algorithm has a quadratic speed-up compared to the classical linear search. The quantum simulation of Schrödinger’s equation has an exponential memory save-up compared to the classical simulation. In this thesis, the ideas and tools of quantum computing are reviewed. Grover’s algorithm is studied and simulated as an example. Using the Qiskit quantum computing library, a code to simulate Schrödinger’s equation for a particle in one dimension is developed, simulated locally, and run …
Deep Learning For Multi-Tissue Cancer Classification Of Gene Expressions, Tarek Khorshed
Deep Learning For Multi-Tissue Cancer Classification Of Gene Expressions, Tarek Khorshed
Theses and Dissertations
We contribute in saving the lives of cancer patients through early detection and diagnosis, since one of the major challenges in cancer treatment is that patients are diagnosed at very late stages when appropriate medical interventions become less effective and full curative treatment is no longer achievable. Cancer classification using gene expressions is extremely challenging given the complexity and high dimensionality of the data. Current classification methods typically rely on samples collected from a single tissue type and perform a prerequisite of gene feature selection to avoid processing the full set of genes. These methods fall short in taking advantage …
An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr
An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr
Archived Theses and Dissertations
Enterprise Resource Planning (ERP) solutions provide generic off-the-shelf reference models usually known as "best practices". The configuration !individualization of the reference model to meet specific requirements of business end users however, is a difficult task. The available modeling languages do not provide a complete configurable language that could be used to model configurable reference models. More specifically, there is no algorithm that monitors the transformation of configurable UML Activity Diagram (AD) models while preserving the syntactic correctness of the model. To fill these gaps we propose an extended UML AD modeling language which we named Configurable UML Activity Diagram (C-UML …
Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly
Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly
Archived Theses and Dissertations
Suspended atmospheric particles (particulate matter) are a form of air pollution that visually degrades urban scenery and is hazardous to human health and the environment. Current environmental monitoring devices are limited in their capability of measuring average particulate matter (PM) over large areas. Quantifying the visual effects of haze in digital images of urban scenery and correlating these effects to PM levels is a vital step in more practically monitoring our environment. Current image haze extraction algorithms remove all the haze from the scene and hence produce unnatural scenes for the sole purpose of enhancing vision. We present two algorithms …
Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk
Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk
Archived Theses and Dissertations
Software quality measurement lies at the heart of the quality engineering process. Quality measurement for object-oriented artifacts has become the key for ensuring high quality software. Both researchers and practitioners are interested in measuring software product quality for improvement. It has recently become more important to consider the quality of products at the early phases, especially at the design level to ensure that the coding and testing would be conducted more quickly and accurately. The research work on measuring quality at the design level progressed in a number of steps. The first step was to discover the correct set of …
Performance Evaluation Of The Factored Model For Arabic To English Phrase Based Statistical Machine Translation, Mireille Anwar
Performance Evaluation Of The Factored Model For Arabic To English Phrase Based Statistical Machine Translation, Mireille Anwar
Archived Theses and Dissertations
No abstract provided.
Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha El Sokkary
Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha El Sokkary
Archived Theses and Dissertations
Intrusion detection research over the last twenty years has focused on the threat of individuals illegally hacking into systems. Nowadays, intrusion threat to computer systems has changed radically. Instead of dealing with hackers, most current works focus on defending the system against code-driven attacks. Today’s web script codes such as VBScript are receiving increasing focus as a backdoor for attacking many computers through e-mail attachments or infected web sites. The nature of these malicious codes is that they can spread widely causing serious damages to many applications. Moreover, the majority of anti-virus tools used today are able to detect known …
Capturing Design Patterns For Performance Issues In Database-Driven Web Applications, Osama Mabroul Khaled
Capturing Design Patterns For Performance Issues In Database-Driven Web Applications, Osama Mabroul Khaled
Archived Theses and Dissertations
The Design patterns technology is a new research topic which aims at helping with communicating technical knowledge in a standard non-technical format. People coming from different technical backgrounds can share this knowledge and apply it in their own way. For example, pieces of designs could be the same for different applications but they get implemented using different programming languages. On the other hand, web applications are becoming more widely spread, especially e-commerce ones, which make light returns on investment and achieve good relations between the companies and the customers. To stabilize this relationship, a web application must have a good …
Parallel Versus Iterated: Comparing Population Oriented And Chained Sequential Simulated Annealing Approaches To Cost-Based Abduction, Heba Abdallah Amer
Parallel Versus Iterated: Comparing Population Oriented And Chained Sequential Simulated Annealing Approaches To Cost-Based Abduction, Heba Abdallah Amer
Archived Theses and Dissertations
Stochastic search techniques are used to solve NP-hard combinatorial optimization problems. Simulated annealing, genetic algorithms and hybridization of both, all attempt to find the best solution with minimal cost and time. Guided Evolutionary Simulated Annealing is one technique of such hybridization. It is based on evolutionary programming where a number of simulated annealing chains are working in a generation to find the optimum solution for a problem. Abduction is the problem of finding the best explanation to a given set of observations. In AI, this has been modeled by a set of hypotheses that need to be assumed to prove …
Plits, Dina Salah El Din Nasr
Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm
Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm
Archived Theses and Dissertations
No abstract provided.
Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid
Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid
Archived Theses and Dissertations
No abstract provided.
Global Incremental Garbage Collection In Distributed Systems, Soha Safwat Labib
Global Incremental Garbage Collection In Distributed Systems, Soha Safwat Labib
Archived Theses and Dissertations
No abstract provided.