Individuals in the Autism Spectrum often encounter situations where they have to respond to questions and situations that they do not know how to respond to, such as, questions asked by strangers including ones related to daily-life activities. A…
The government initiative in the implementation of smart city concept is an effort in the management of a city. In the governance of a town, public service is one of the most important aspects. Improving public services requires public role because…
In this work, we present a framework to integrate the functionalities of the Enterprise Resource Planning (ERP) with the University academic and management functionalities at the British University in Egypt , in order to produce a University Resource…
Big data is currently one of the most critical emerging technologies. Big Data are used as a concept that refers to the inability of traditional data architectures to efficiently handle the new data sets. The 4V’s of big data – volume, velocity,…
Sentiment Analysis (SA) or Opinion Mining is the process of analysing natural language texts to detect an emotion or a pattern of emotions towards a certain product to make a decision about that product. SA is a topic of text mining, Natural Language…
Much of our scientific, technological, and economic future depends on the availability of an ever-increasing supply of computational power. However, the increasing demand for such power has pushed electronic technology to the limit of physical…
There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing…
Children with special needs face major difficulties to understand the script of stories. They cannot comprehend the words’ meaning properly. Instructors use different techniques to explain them. They read the script several times, use glossy images,…
We describe a SMS-based information system called CATS, which allows posting and searching through free Arabic text using Information Extraction (IE) technology. We discuss the challenges of applying IE technology for unedited real Arabic text. In…
Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber…