Publications

Export 356 results:
Sort by: Author Title [ Type  (Asc)] Year
Book
authors, 66, and M. E. E. K. amr and Editors:Samir Galal, Kasr El-Aini Introduction To Surgery,3rd -7th Editions, , Cairo, University Book Center,Sayed mahmoud, 2010.
Shalaby, E. A., and Z. M. Al-Shammari, Key Performance Indicators, , Germany, Lambert, 2015. book_pdf.pdf
Hosni, H. A., and T. A. Cope, A key to Egyptian Grasses, , Kew, Royal Botanic Gardens, 1991.
Book Chapter
Fouad, M. M. M., and A. E. Hassanien, "Key pre-distribution techniques for WSN security services", Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations: Springer Berlin Heidelberg, pp. 265–283, 2014. Abstract
n/a
Nabhan, A. R., and K. Shaalan, "Keyword identification using text graphlet patterns", Natural Language to Information Systems: 21st International Conference on Applications of Natural Language to Information Systems (NLDB 2016), Berlin , Springer, 2016. Abstractpaper_published.pdf

Keyword identification is an important task that provides useful information for NLP applications including: document retrieval, clustering, and categorization, among others. State-of-the-art methods rely on local features of words (e.g. lexical, syntactic, and presentation features) to assess their candidacy as keywords. In this paper, we propose a novel keyword identification method that relies on representation of text abstracts as word graphs. The significance of the proposed method stems from a flexible data representation that expands the context of words to span multiple sentences and thus can enable capturing
of important non-local graph topological features. Specifically, graphlets (small subgraph patterns) were efficiently extracted and scored to reflect the statistical dependency between these graphlet patterns and words labeled as keywords. Experimental results demonstrate the capability of the graphlet patterns in a keyword identification task when applied to MEDLINE, a standard research abstract dataset.

Barsoum, R., "Kidney in Schistoeomiasis", Comprehensive Clinical Nephrology, Philadelphia, Elsevier, 2015.
EBEID, M. A. H. M. O. U. D., "KLEINE GOTTER - GROSSE GOTTER", KLEINE GOTTER - GROSSE GOTTER, Germany, verlag patrick brose, 2013.
Hillier, B., J. Musgrove, and P. O'Sullivan, "Knowledge and {Design}", Development in {Design} {Methodology}, Chichester, Wiley, pp. 245–264, 1984. Abstract
n/a
Johnson, L., and N. E. Johnson, "Knowledge {Elicitation} {Involving} {Teachback} {Interviewing}", Knowlege {Acquisition} for {Expert} {Systems}: {A} {Practical} {Handbook}, London, Plenum Press, 1987. Abstract
n/a
Case
Conference Paper
Salah Ali, D., A. Ghoneim, and M. Saleh, "K-modes and Entropy Cluster Centers Initialization Methods", The 6th International Conference on Operations Research and Enterprise Systems , Porto, Portugal., February 23-25, 2017.
Ali, D. S., A. Ghoneim, and M. Saleh, "K-modes and Entropy Cluster Centers Initialization Methods", ICORES, 2017.
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on, 2013.
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 185–190, 2013. Abstract
n/a
KAMAL, K. A. R. E. E. M., H. Hefny, A. E. Hassanien, and M. Tolba, "Kekre’s Transform for Protecting Fingerprint Template.", 13th IEEE International Conference on Hybrid Intelligent Systems |(HIS13) Tunisia, 4-6 Dec. pp. 186-191, 2013, Tunisia, , 4-6 Dec, 2013.
Fatayer, T. S., S. Khattab, and F. A. Omara, "A key-agreement protocol based on the stack-overflow software vulnerability", Computers and Communications (ISCC), 2010 IEEE Symposium on: IEEE, pp. 411–416, 2010. Abstract
n/a
Bamatraf, S., and M. Bamatraf, "Keystroke Authentication using Ant Colony Optimization Algorithm", International Journal of Engineering Research and Technology, vol. 3, no. 6 (June-2014): ESRSA Publications, 2014. Abstract
n/a
Menshawy, D. E. L., H. M. O. Mokhtar, and O. Hegazy, "A Keystroke Dynamics Based Approach for Continuous Authentication", 10th IEEE International Scientific Conference, Beyond Databases Architectures and Structures (BDAS), Poland, 30 May , 2014.
Menshawy, D. E. L., H. M. O. Mokhtar, and O. Hegazy, "A Keystroke Dynamics Based Approach for Continuous Authentication", Beyond Databases, Architectures, and Structures - 10th International Conference, {BDAS} 2014, Ustron, Poland, May 27-30, 2014. Proceedings, pp. 415–424, 2014. Abstract
n/a
El-Mously, S., H. Hamdy, A. Abdel-Monem, A. M. Abdelalim, E. N. Sherbiny, S. M. Ahmed, R. R. Moustafa, H. Samir, T. H. Emara, A. H. Ghaffar, et al., "Knowledge and attitudes towards stroke among workers in three university hospitals in Egypt", World Congerss of Neuology, Vienna- Austria, 10/2013.
Elmahdy, H. N., M. H. Gheith, and A. A. Fahmy, "A Knowledge Base System for Representing Islamic Jurisprudence Knowledge and Understanding Arabic Natural Language Query", he Association of Using Arabic Language in Information Technology, Saudi Arabia, May. 1992.
Galal-Edeen, G. H., and B. Tawfik, "Knowledge Creation in a Community: the Case for International Collaboration", Conference on Enhancing the Competitiveness of Universities, Faculty of Commerce, Cairo University, Cairo, Egypt, 4 th June 2008. Abstract

n/a

Tourism