Ahmed Sharaf Eldin | Helwan University (original) (raw)
Uploads
Papers by Ahmed Sharaf Eldin
In aspect oriented development, obliviousness is one of its pillars as it helps developers to imp... more In aspect oriented development, obliviousness is one of its pillars as it helps developers to implement crosscutting concerns via aspects, which increases the overall software modularity. Despite of its merits, obliviousness brings the problem of interferences among aspects as several aspects pointcuts may address the same joinpoint for the same advice. Existing approaches deals with conflicts at design level use graphs structures, which increase in size as project size increases. In this work, a relational database model is used to map aspect oriented design models and then conflicts are extracted by an algorithm runs over this database. This approach is simpler than other approaches and enables large project sizes while the other approaches get complicated due to increment in graph size. The proposed approach can be extended to the distributed team development, dependent on the database engine used.
SN Applied Sciences, 2019
The contents of this thesis are a detailed study of the software for the finite element method. I... more The contents of this thesis are a detailed study of the software for the finite element method. In the text, the finite element method is introduced from both the engineering and mathematical points of view. The computer implementation of the method is explained with samples of mainframe, mini- and micro-computer implementations. A solution is presented for the problem of limited stack size for both mini- and micro-computers which possess stack architecture. Several finite element programs are presented. Special purpose programs to solve problems in structural analysis and groundwater flow are discussed. However, an efficient easy-to-use finite element program for general two-dimensional problems is presented. Several problems in groundwater flow are considered that include steady, unsteady flows in different types of aquifers. Different cases of sinks and sources in the flow domain are also considered. The performance of finite element methods is studied for the chosen problems by ...
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
Computer and Information Science, 2015
2008 Mosharaka International Conference on Communications, Computers and Applications, 2008
ABSTRACT
Education and Information Technologies, 2013
ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics course... more ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics courses using an e-training support system. Laurillard’s conversational approach based on conceptual representation for both instructor and learner was used to form the framework. As the current study specifically interested in training as a special form for learning, so, we sought methods and strategies to integrate requirements of both company and employee into the design of training programs. Therefore, a competency perspective was adopted into the conversational framework to use learning design that leads to learning activities tightly related to the needs of the company and employee. The above framework has been developed with special consideration to the underpinning pedagogical principles and the needs of lifelong learning that continues after the training has been completed. The implementation of the developed framework needs a special computerized system, so an e-training support system (ETSS) was developed to realize the framework. ETSS is an open source and standard-based infrastructure to enable and foster competence development and exchange of learning activities and learning units. Although the domain of the current study focuses on geo-informatics, ETSS is applicable to any other domain. The developed framework through its ETSS implementation were evaluated in a typical training environment. The results indicated that the best method in training was the training with the developed system with 91.5 % in comparison with the traditional training method with 81.4 %.
ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by ... more ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calculate the degree of association between each position mutation and the absence of F10 antibody epitope on the protein surface. We identified amino acid positions that are responsible for the protein escape from neutralization by f10 antibody.
2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011
... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab... more ... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab Academy for Science, Technology and Maritime Transport (AASTMT ... The 1L 2D DWT encrypted Lena based on the user secret key and the biometric key is shown in Fig. 7. ...
Communications and Computer Security, 2013
International Journal of Computer Applications, 2013
النشرة المعلوماتیة فی الحاسبات والمعلومات
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Drug combinations is considered as an effective strategy designed to control complex diseases lik... more Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses develop...
Journal of Information Security and Applications
International Journal of Advanced Computer Science and Applications
2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016
International Journal of Computer Mathematics, 1990
In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers i... more In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers is considered. The main limitations of memory and address space are overcome and a software solution proposed using a Virtual Stack Facility (VSF) which is implemented and tested. A new replacement algorithm for a virtual stack is presented and shown to be more efficient than other
In aspect oriented development, obliviousness is one of its pillars as it helps developers to imp... more In aspect oriented development, obliviousness is one of its pillars as it helps developers to implement crosscutting concerns via aspects, which increases the overall software modularity. Despite of its merits, obliviousness brings the problem of interferences among aspects as several aspects pointcuts may address the same joinpoint for the same advice. Existing approaches deals with conflicts at design level use graphs structures, which increase in size as project size increases. In this work, a relational database model is used to map aspect oriented design models and then conflicts are extracted by an algorithm runs over this database. This approach is simpler than other approaches and enables large project sizes while the other approaches get complicated due to increment in graph size. The proposed approach can be extended to the distributed team development, dependent on the database engine used.
SN Applied Sciences, 2019
The contents of this thesis are a detailed study of the software for the finite element method. I... more The contents of this thesis are a detailed study of the software for the finite element method. In the text, the finite element method is introduced from both the engineering and mathematical points of view. The computer implementation of the method is explained with samples of mainframe, mini- and micro-computer implementations. A solution is presented for the problem of limited stack size for both mini- and micro-computers which possess stack architecture. Several finite element programs are presented. Special purpose programs to solve problems in structural analysis and groundwater flow are discussed. However, an efficient easy-to-use finite element program for general two-dimensional problems is presented. Several problems in groundwater flow are considered that include steady, unsteady flows in different types of aquifers. Different cases of sinks and sources in the flow domain are also considered. The performance of finite element methods is studied for the chosen problems by ...
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
Computer and Information Science, 2015
2008 Mosharaka International Conference on Communications, Computers and Applications, 2008
ABSTRACT
Education and Information Technologies, 2013
ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics course... more ABSTRACT The current study seeks to introduce a new pedagogical design for geo-informatics courses using an e-training support system. Laurillard’s conversational approach based on conceptual representation for both instructor and learner was used to form the framework. As the current study specifically interested in training as a special form for learning, so, we sought methods and strategies to integrate requirements of both company and employee into the design of training programs. Therefore, a competency perspective was adopted into the conversational framework to use learning design that leads to learning activities tightly related to the needs of the company and employee. The above framework has been developed with special consideration to the underpinning pedagogical principles and the needs of lifelong learning that continues after the training has been completed. The implementation of the developed framework needs a special computerized system, so an e-training support system (ETSS) was developed to realize the framework. ETSS is an open source and standard-based infrastructure to enable and foster competence development and exchange of learning activities and learning units. Although the domain of the current study focuses on geo-informatics, ETSS is applicable to any other domain. The developed framework through its ETSS implementation were evaluated in a typical training environment. The results indicated that the best method in training was the training with the developed system with 91.5 % in comparison with the traditional training method with 81.4 %.
ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by ... more ABSTRACT Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calculate the degree of association between each position mutation and the absence of F10 antibody epitope on the protein surface. We identified amino acid positions that are responsible for the protein escape from neutralization by f10 antibody.
2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011
... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab... more ... Mohamed S. El-Mahallawy1, Esam A. Hagras2, Ahmed Zein Eldin1, Mohamed Waleed Fakhr1 1,3,4Arab Academy for Science, Technology and Maritime Transport (AASTMT ... The 1L 2D DWT encrypted Lena based on the user secret key and the biometric key is shown in Fig. 7. ...
Communications and Computer Security, 2013
International Journal of Computer Applications, 2013
النشرة المعلوماتیة فی الحاسبات والمعلومات
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Drug combinations is considered as an effective strategy designed to control complex diseases lik... more Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses develop...
Journal of Information Security and Applications
International Journal of Advanced Computer Science and Applications
2016 11th International Conference on Computer Engineering & Systems (ICCES), 2016
International Journal of Computer Mathematics, 1990
In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers i... more In this paper the efficient implementation of the Finite Element Method (FEM) on mini-computers is considered. The main limitations of memory and address space are overcome and a software solution proposed using a Virtual Stack Facility (VSF) which is implemented and tested. A new replacement algorithm for a virtual stack is presented and shown to be more efficient than other