Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Sahar M. Ghanem"'
Publikováno v:
The International Arab Journal of Information Technology. :52-64
Privacy-preserving data publishing have been studied widely on static data. However, many recent applications generate data streams that are real-time, unbounded, rapidly changing, and distributed in nature. Recently, few work addressed k-anonymity a
Publikováno v:
ISNCC
The most common goal of malware analysis is to determine if a given binary is malware or benign. Another objective is similarity analysis of malware binaries to understand how new samples differ from known ones. Similarity analysis helps to analyze t
Autor:
Islam A. Moursy, Sahar M. Ghanem
Publikováno v:
2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS).
Secure multiparty computation (MPC) is required when individuals want to privately evaluate a function over their inputs. While evaluating a common function, the participants do not reveal their inputs to each other. A homomorphic encryption (HE) sch
Publikováno v:
Peer-to-Peer Networking and Applications. 8:965-991
VITAL is a novel P2P indexing structure that provides on top of exact search a similarity search of multidimensional vectors. It is designed to scale to millions of peers and billions of shared documents and to adapt to high network dynamics. To expl
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319209036
ICVS
ICVS
Offline signature recognition is a very difficult task due to normal variability in signatures and the unavailability of dynamic information regarding the pen path. In this paper, a technique for signature recognition is proposed based on shape conte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ae4fdb583bda6c4b891d2cf8cd16d918
https://doi.org/10.1007/978-3-319-20904-3_3
https://doi.org/10.1007/978-3-319-20904-3_3
Autor:
Waleed Farag, J. C Wild, Ayman Abdel-Hamid, Hussein Abdel-Wahab, Sahar M. Ghanem, Kurt Maly, C.M. Overstreet
Publikováno v:
International Journal of Distance Education Technologies. 1:17-36
In recent years, we have seen the introduction and use of many distance learning systems. Some of these systems are characterized as interactive, which means the dominant mode of instruction is live or synchronous using networked multimedia technolog
Publikováno v:
ISCC
Association rule discovery algorithms generate all rules satisfying minimum support and confidence thresholds. These techniques yield too many rules and are infeasible when the minimum support is low. Recently, Li [1] proposed the Optimal Rule Discov
Publikováno v:
CIT
Super-peer networks inherit the advantages of P2P networks, such as pooling together the shared data (images in our system) across peers, self-organizing, and fault-tolerance. In addition, they take advantage of the heterogeneity of capabilities acro
Publikováno v:
Pattern Recognition in Bioinformatics ISBN: 9783642040306
PRIB
PRIB
Motif Finding is one of the most important tasks in gene regulation which is essential in understanding biological cell functions. Based on recent studies, the performance of current motif finders is not satisfactory. A number of ensemble methods hav
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57fe8c09c0cc7fef81ca9c9d38977793
https://doi.org/10.1007/978-3-642-04031-3_2
https://doi.org/10.1007/978-3-642-04031-3_2
Publikováno v:
AICCSA
This paper presents WhatAreYouLOOKing4 (WAY-LOOK4) system, a novel framework for content-based image retrieval (CBIR). Local descriptors are used to describe the visual contents of an image. Image signatures and similarity retrieval are based on the