Export 8338 results:
Sort by: Author Title [ Type  (Asc)] Year
Book Chapter
Meguid, S. A., A. R. Alian, and M. A. N. Dewapriya, "Atomistic modelling of nanoindentation of multilayered graphene-reinforced nanocomposites", Micromechanics and Nanomechanics of Composite Solids: Springer, Cham, pp. 39–70, 2018. Abstract
Hamza, N., D. ElKerdany, S. Imam, A. AlSadaty, and T. ElSerafi, "Attaba Market Hall in Khedive Cairo, Egypt: Pivoting Urban Grids, Ambiances and Socialities", Architecture and Urban Transformation of Historical Markets: Cases from the Middle East and North Africa: Newcastle University, 2022.
Aly, H., and M. ElGayyar, "Attacking AES Using Bernstein’s Attack on Modern Processors", Progress in Cryptology – AFRICACRYPT 2013, vol. 7918: Springer Berlin Heidelberg, pp. 127-139, 2013. Abstract

The Advanced Encryption Standard (AES) was selected by NIST due to its heavy resistance against classical cryptanalysis like differential and linear cryptanalysis. Even after the appearance of the modern side-channel attacks like timing and power consumption side-channel attacks, NIST claimed that AES is not vulnerable to timing attacks. In 2005, Bernstein [6] has successfully attacked the OpenSSL AES implementation on a Pentium III processor and completely retrieved the full AES key using his cache timing side-channel attack. This paper reproduces Bernstein’s attack on Pentium Dual-Core and Core 2 Duo processors. We have successfully attacked the AES implemented in the latest OpenSSL release 1.0.1c using the most recent GCC compiler 4.7.0 running on both Windows and Linux in some seconds by sending (2)22 plaintexts at most. We improved Bernstein’s first round attack by using 2 way measurements. Instead of using only the above average timing information, we added the above minimum timing information which significantly improved the results.

Kamal, H., Z. Magdy, and F. Massoud, "Autofiction as a Lens for Reading Contemporary Egyptian Writing", The Autoficitonal: Approaches, Affordances, Forms: Palgrave Macmillan, 2022. Abstract

This chapter offers a discussion of three texts by bicultural Egyptian writers: Waguih Ghali’s Beer in the Snooker Club (1964), Radwa Ashour’s Specters (1999), and Miral al-Tahawy’s Brooklyn Heights (2010). The three works are read via an autofictional lens, with focus on Ghali’s autofictional identity, Ashour’s autofictional threads, and al-Tahawy’s autofictionalizing experience. The study suggests that autofictionality can be identified in the texts in terms of genre as well as technique, demonstrating the potential of the autofictional as a literary strategy in negotiating identity, memory, and experience in the writing of Egyptian literature. Our reading of the three texts testifies to the affordance of an autofictional lens in reading Arabic literature and allows new insights into writing at the intersection of reality and the imagination.

Sharif, M. M., Alaa Tharwat, A. E. Hassanien, and H. A. Hefeny, "Automated Enzyme Function Classification Based on Pairwise Sequence Alignment Technique", Intelligent Data Analysis and Applications: Springer International Publishing, pp. 499–510, 2015. Abstract
Esraa Elhariri, N. Elbendary, A. E. Hassanien, and A. Badr, "Automated Ripeness Assessment System of Tomatoes Using PCA and SVM Techniques", Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, USA, IGI, pp. 101-131, 2014. Abstract,.and.the.process.of.,.’.perspective..To.ensure.optimum.yield.of.

Ahmed M. Anter, M. A. Elsoud, and A. E. Hassanien, "Automatic Mammographic Parenchyma Classification According to BIRADS Dictionary", Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, USA, IGI, pp. 22-37,, 2014. Abstract,.enhancement.and. segmentation.processis applied to increase the computation and focus onmammographic parenchyma.
This.parenchyma is analyzed to discriminate tissue density according to BIRADS using Local Binary

Shaalan, K., and A. H. Hossny, "Automatic rule induction in Arabic to English machine translation framework", Challenges for Arabic Machine Translation, Amsterdam, The Netherlands, John Benjamins Publishing Company, 2012. Abstractkhaled_shaalan_ch10.pdf

This paper addresses exploiting a supervised machine learning technique to automatically induce Arabic-to-English transfer rules from chunks of parallel aligned linguistic resources. The induced structural transfer rules encode the linguistic translation knowledge for converting an Arabic syntactic structure into a target English syntactic structure. These rules are going to be an integral part of an Arabic-English transfer-based machine translation. Nevertheless, a novel morphological rule induction method is employed for learning Arabic morphological rules that are applied in our Arabic morphological analyzer. To demonstrate the capability of the automated rule induction technique we conducted rule-based translation experiments that use induced rules from a relatively small data set. The translation quality of the hybrid translation experiments achieved good results in terms of WER.

ElGhazaly, T., "Automatic Text Classification Using Neural Network and Statistical Approaches", Intelligent Natural Language Processing: Trends and Applications: Springer, Cham, pp. 351–369, 2018. Abstract
El-Licy, F., T. A. Mashat, and A. K. R. A. M. SALAH, "Automating Web Service Composition: An Ontological Agent Framework.", Handbook of Research on Architectural Trends in Service-Driven Computing,, USA, IGI Global, 2014.
Conference Paper
Hussein, M. A. A., ""A Rare Offering Table from Hawara"", "The Faculty of Archaeology 6th International Conference of Archaeology , Cairo University, 5th December , 2018.
Fahmy, A., M. Sharawy, K. El-Hadad, G. Salama, and K. Hassanain, ""A Secure Covert Communication Model based on Image Steganography"", Signal and Image Processing, USA, 2005.
, ""A Training Program for Development of Kindergarten Teacher Skills in Research of Information and Employing Them In Light of Standards of Quality"", "A Training Program for Development of Kindergarten Teacher Skills in Research of Information and Employing Them In Light of Standards of Quality": cairo university, 2015. research_summery.pdf
El-Hattab, A. H., A. T. I. Hanish., E. O. Abustiet, and S. A. Shaban, A-simple greenhouse bioassay for residues of some sugar beet herbicides, , November 28-29, 1998.
Al-Hassan, L., M. Zafer, R. A. M. Hamid, and H. El-Mahallawy, "A. baumannii OXA-378 multidrug-resistant clone emerges in the clinical setting", ECCMID, 2017.
Gomaa, M. M., Hussain S. A., E. - D. E. A., Bayoumi, and M. M. Gobashy, "A.C. Electrical properties of kaolinite under pressure- pseudo random network modeling", 63th Conference and technical exhibition of the European Association of Geoscientists and Engineers (EAGE), Session P054, Amsterdam, The Netherlands. , 2001.
Elhafez, S. M., A. A. Ashour, N. M. Elhafez, and Y. M. Elhafez, "Aanalysis of Wrist and Fingers Positions during Writing in Preschool Children", World Confederation for Physical Therapy (WCPT), Suntec City, Singapore, 3 May, 2015. wrist_and_fingers_positions.docx
Abu-Hamd, M., A. Nasr, and A. Amer, AASHTO Load Distribution of Horizontally Curved Bridges, , International Conference on Future Vision, 2004. aashto_load_distribution_of_horizontally_curved_bridges.pdf
Maghraby, G., M. Elmeniawy, H. Mostafa, O. Shaker, M. habib, and R. Elgohary, "AB0129 EXPLORING LONG NON-CODING RNA GAS5 IN SLE PATIENTS AND ITS RELATION TO INTERFERON SIGNATURE", Scientific Abstracts: BMJ Publishing Group Ltd and European League Against Rheumatism, pp. 1243.3-1244, 6, 2023. Abstract