Ahmed Sharaf Eldin | Helwan University (original) (raw)

Uploads

Papers by Ahmed Sharaf Eldin

Research paper thumbnail of Crosscutting Specification Interference Detection at Aspect Oriented UML-Based Models: A Database Approach

In aspect oriented development, obliviousness is one of its pillars as it helps developers to imp... more In aspect oriented development, obliviousness is one of its pillars as it helps developers to implement crosscutting concerns via aspects, which increases the overall software modularity. Despite of its merits, obliviousness brings the problem of interferences among aspects as several aspects pointcuts may address the same joinpoint for the same advice. Existing approaches deals with conflicts at design level use graphs structures, which increase in size as project size increases. In this work, a relational database model is used to map aspect oriented design models and then conflicts are extracted by an algorithm runs over this database. This approach is simpler than other approaches and enables large project sizes while the other approaches get complicated due to increment in graph size. The proposed approach can be extended to the distributed team development, dependent on the database engine used.

Research paper thumbnail of Sentiment analysis of Arabic comparative opinions

SN Applied Sciences, 2019

Research paper thumbnail of Finite elements software and applications

The contents of this thesis are a detailed study of the software for the finite element method. I... more The contents of this thesis are a detailed study of the software for the finite element method. In the text, the finite element method is introduced from both the engineering and mathematical points of view. The computer implementation of the method is explained with samples of mainframe, mini- and micro-computer implementations. A solution is presented for the problem of limited stack size for both mini- and micro-computers which possess stack architecture. Several finite element programs are presented. Special purpose programs to solve problems in structural analysis and groundwater flow are discussed. However, an efficient easy-to-use finite element program for general two-dimensional problems is presented. Several problems in groundwater flow are considered that include steady, unsteady flows in different types of aquifers. Different cases of sinks and sources in the flow domain are also considered. The performance of finite element methods is studied for the chosen problems by ...

Research paper thumbnail of Enhancing Aggregation over Uncertain Databases

2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015

Research paper thumbnail of Handling Uncertainty in Database: An Introduction and Brief Survey

Computer and Information Science, 2015

Research paper thumbnail of Enhancing packet forwarding in Mobile Ad hoc Networks by exploiting the Information Dispersal Algorithm

2008 Mosharaka International Conference on Communications, Computers and Applications, 2008

ABSTRACT

Research paper thumbnail of A new pedagogical design for geo-informatics courses using an e-training support system

Education and Information Technologies, 2013

ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics course... more ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics courses using an e-training support system. Laurillard’s conversational approach based on conceptual representation for both instructor and learner was used to form the framework. As the current study specifically interested in training as a special form for learning, so, we sought methods and strategies to integrate requirements of both company and employee into the design of training programs. Therefore, a competency perspective was adopted into the conversational framework to use learning design that leads to learning activities tightly related to the needs of the company and employee. The above framework has been developed with special consideration to the underpinning pedagogical principles and the needs of lifelong learning that continues after the training has been completed. The implementation of the developed framework needs a special computerized system, so an e-training support system (ETSS) was developed to realize the framework. ETSS is an open source and standard-based infrastructure to enable and foster competence development and exchange of learning activities and learning units. Although the domain of the current study focuses on geo-informatics, ETSS is applicable to any other domain. The developed framework through its ETSS implementation were evaluated in a typical training environment. The results indicated that the best method in training was the training with the developed system with 91.5 % in comparison with the traditional training method with 81.4 %.

Research paper thumbnail of Mining Medical Records Using Fuzzy Logic to Detect Surprising Patterns

ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by ... more ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calculate the degree of association between each position mutation and the absence of F10 antibody epitope on the protein surface. We identified amino acid positions that are responsible for the protein escape from neutralization by f10 antibody.

Research paper thumbnail of Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic Encryption

2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011

... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab... more ... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab Academy for Science, Technology and Maritime Transport (AASTMT ... The 1L 2D DWT encrypted Lena based on the user secret key and the biometric key is shown in Fig. 7. ...

Research paper thumbnail of Vegk: Secure Clustering for Efficient Operation in WSNS

Communications and Computer Security, 2013

Research paper thumbnail of Information Gain based Methodology to Predict the Effect of Conformational Change on the Existence of f10 Epitope on the Surface of Human H5N1 Virus Hemagglutinin Protein

International Journal of Computer Applications, 2013

Research paper thumbnail of User-Generated Content (UGC) Credibility on Social Media Using Sentiment Classification

النشرة المعلوماتیة فی الحاسبات والمعلومات

Research paper thumbnail of In-Silico Methodologies for Cancer Multidrug Optimization

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Drug combinations is considered as an effective strategy designed to control complex diseases lik... more Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses develop...

Research paper thumbnail of A survey on behavioral biometric authentication on smartphones

Journal of Information Security and Applications

Research paper thumbnail of A Data Mining Approach for the Prediction of Hepatitis C Virus protease Cleavage Sites

International Journal of Advanced Computer Science and Applications

Research paper thumbnail of Feature-based sentiment analysis in online Arabic reviews

2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016

Research paper thumbnail of Bibliometric analysis of Egyptian publications on Hepatitis C virus from PubMed using data mining of an in-house developed database (HCVDBegy)

Research paper thumbnail of Effect of Using a Graphical Conceptual Representation Tool on Student Understanding

Research paper thumbnail of Quality Measuring Model for KADS-based Expert Systems

Research paper thumbnail of Finite element software for mini-computers

International Journal of Computer Mathematics, 1990

In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers i... more In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers is considered. The main limitations of memory and address space are overcome and a software solution proposed using a Virtual Stack Facility (VSF) which is implemented and tested. A new replacement algorithm for a virtual stack is presented and shown to be more efficient than other

Research paper thumbnail of Crosscutting Specification Interference Detection at Aspect Oriented UML-Based Models: A Database Approach

In aspect oriented development, obliviousness is one of its pillars as it helps developers to imp... more In aspect oriented development, obliviousness is one of its pillars as it helps developers to implement crosscutting concerns via aspects, which increases the overall software modularity. Despite of its merits, obliviousness brings the problem of interferences among aspects as several aspects pointcuts may address the same joinpoint for the same advice. Existing approaches deals with conflicts at design level use graphs structures, which increase in size as project size increases. In this work, a relational database model is used to map aspect oriented design models and then conflicts are extracted by an algorithm runs over this database. This approach is simpler than other approaches and enables large project sizes while the other approaches get complicated due to increment in graph size. The proposed approach can be extended to the distributed team development, dependent on the database engine used.

Research paper thumbnail of Sentiment analysis of Arabic comparative opinions

SN Applied Sciences, 2019

Research paper thumbnail of Finite elements software and applications

The contents of this thesis are a detailed study of the software for the finite element method. I... more The contents of this thesis are a detailed study of the software for the finite element method. In the text, the finite element method is introduced from both the engineering and mathematical points of view. The computer implementation of the method is explained with samples of mainframe, mini- and micro-computer implementations. A solution is presented for the problem of limited stack size for both mini- and micro-computers which possess stack architecture. Several finite element programs are presented. Special purpose programs to solve problems in structural analysis and groundwater flow are discussed. However, an efficient easy-to-use finite element program for general two-dimensional problems is presented. Several problems in groundwater flow are considered that include steady, unsteady flows in different types of aquifers. Different cases of sinks and sources in the flow domain are also considered. The performance of finite element methods is studied for the chosen problems by ...

Research paper thumbnail of Enhancing Aggregation over Uncertain Databases

2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015

Research paper thumbnail of Handling Uncertainty in Database: An Introduction and Brief Survey

Computer and Information Science, 2015

Research paper thumbnail of Enhancing packet forwarding in Mobile Ad hoc Networks by exploiting the Information Dispersal Algorithm

2008 Mosharaka International Conference on Communications, Computers and Applications, 2008

ABSTRACT

Research paper thumbnail of A new pedagogical design for geo-informatics courses using an e-training support system

Education and Information Technologies, 2013

ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics course... more ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics courses using an e-training support system. Laurillard’s conversational approach based on conceptual representation for both instructor and learner was used to form the framework. As the current study specifically interested in training as a special form for learning, so, we sought methods and strategies to integrate requirements of both company and employee into the design of training programs. Therefore, a competency perspective was adopted into the conversational framework to use learning design that leads to learning activities tightly related to the needs of the company and employee. The above framework has been developed with special consideration to the underpinning pedagogical principles and the needs of lifelong learning that continues after the training has been completed. The implementation of the developed framework needs a special computerized system, so an e-training support system (ETSS) was developed to realize the framework. ETSS is an open source and standard-based infrastructure to enable and foster competence development and exchange of learning activities and learning units. Although the domain of the current study focuses on geo-informatics, ETSS is applicable to any other domain. The developed framework through its ETSS implementation were evaluated in a typical training environment. The results indicated that the best method in training was the training with the developed system with 91.5 % in comparison with the traditional training method with 81.4 %.

Research paper thumbnail of Mining Medical Records Using Fuzzy Logic to Detect Surprising Patterns

ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by ... more ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calculate the degree of association between each position mutation and the absence of F10 antibody epitope on the protein surface. We identified amino acid positions that are responsible for the protein escape from neutralization by f10 antibody.

Research paper thumbnail of Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic Encryption

2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011

... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab... more ... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab Academy for Science, Technology and Maritime Transport (AASTMT ... The 1L 2D DWT encrypted Lena based on the user secret key and the biometric key is shown in Fig. 7. ...

Research paper thumbnail of Vegk: Secure Clustering for Efficient Operation in WSNS

Communications and Computer Security, 2013

Research paper thumbnail of Information Gain based Methodology to Predict the Effect of Conformational Change on the Existence of f10 Epitope on the Surface of Human H5N1 Virus Hemagglutinin Protein

International Journal of Computer Applications, 2013

Research paper thumbnail of User-Generated Content (UGC) Credibility on Social Media Using Sentiment Classification

النشرة المعلوماتیة فی الحاسبات والمعلومات

Research paper thumbnail of In-Silico Methodologies for Cancer Multidrug Optimization

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Drug combinations is considered as an effective strategy designed to control complex diseases lik... more Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses develop...

Research paper thumbnail of A survey on behavioral biometric authentication on smartphones

Journal of Information Security and Applications

Research paper thumbnail of A Data Mining Approach for the Prediction of Hepatitis C Virus protease Cleavage Sites

International Journal of Advanced Computer Science and Applications

Research paper thumbnail of Feature-based sentiment analysis in online Arabic reviews

2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016

Research paper thumbnail of Bibliometric analysis of Egyptian publications on Hepatitis C virus from PubMed using data mining of an in-house developed database (HCVDBegy)

Research paper thumbnail of Effect of Using a Graphical Conceptual Representation Tool on Student Understanding

Research paper thumbnail of Quality Measuring Model for KADS-based Expert Systems

Research paper thumbnail of Finite element software for mini-computers

International Journal of Computer Mathematics, 1990

In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers i... more In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers is considered. The main limitations of memory and address space are overcome and a software solution proposed using a Virtual Stack Facility (VSF) which is implemented and tested. A new replacement algorithm for a virtual stack is presented and shown to be more efficient than other