Ahmed Ibrahim

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Brain Stroke Segmentation Using Deep Learning Models: A Comparative Study.
CoRR, 2024

2023
Extracting behavioural features from smartphone notifications.
Behav. Inf. Technol., December, 2023

Enhanced Autonomous Vehicle Positioning Using a Loosely Coupled INS/GNSS-Based Invariant-EKF Integration.
Sensors, July, 2023

Self-Efficacy for Engineering Design (SEED): Instrument Development and Validation.
IEEE Trans. Educ., June, 2023

Passive social sensing with smartphones: a systematic review.
Computing, 2023

Conflicting Moral Codes for Self-Driving Cars: The Single Car Case.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

2022
Homogenous and Heterogenous Parallel Clustering: An Overview.
CoRR, 2022

Rethinking the Bottleneck in Diversifying the Cybersecurity Talent Pool: What Actions can We Take and How can We Measure Success?
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
Recognising Intrinsic Motivation using Smartphone Trajectories.
Int. J. Hum. Comput. Stud., 2021

From GPS to semantic data: how and why - a framework for enriching smartphone trajectories.
Computing, 2021

Building and Hacking an Exploitable WiFi Environment for Your Classroom - Even for Remote Participants!
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Pervasive Hand Gesture Recognition for Smartphones using Non-audible Sound and Deep Learning.
Proceedings of the 13th International Joint Conference on Computational Intelligence, 2021

Secure Health Information Exchange (S-HIE) Protocol with Reduced Round-Trip Count.
Proceedings of the 9th IEEE International Conference on Healthcare Informatics, 2021

2020
Design of the Baseband Physical Layer of NarrowBand IoT LTE Uplink Digital Transmitter.
J. Circuits Syst. Comput., 2020

Building and Hacking an Exploitable WiFi Environment for your Classroom.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Initial Development and Validation of the Self-Efficacy for Engineering Design (SEED) Survey for Undergraduate Students in Mechanical Engineering.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
Introducing Practical SHA-1 Collisions to the Classroom.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Hardware Accelerated Epileptic Seizure Detection System Using Support Vector Machine.
Proceedings of the 8th International Conference on Modern Circuits and Systems Technologies, 2019

Taming services for IBM cloud.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Students' Perceptions of Best and Worst Aspects of Design Courses: A Qualitative Analysis of 87 Courses and 5591 Students.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
The Impact of Soft Errors on Memristor-Based Memory.
Proceedings of the New Generation of CAS, 2017

Input Fast-Forwarding for Better Deep Learning.
Proceedings of the Image Analysis and Recognition - 14th International Conference, 2017

2016
Linking movement and environmental data: The need for representation.
Int. J. Appl. Earth Obs. Geoinformation, 2016

2015
Measuring undergraduate students' self-efficacy in engineering design in a project-based design course.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

2014
Analysis of the Suitability of Existing Medical Ontologies for Building a Scalable Semantic Interoperability Solution Supporting Multi-site Collaboration in Oncology.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014

Representing Internal Varying Characteristics of Moving Objects.
Proceedings of the Advances in Databases and Information Systems, 2014

2013
Efficient processing of containment queries on nested sets.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2010
Authentication Method Using Hand Images for Access Control systems.
Int. Arab. J. e Technol., 2010


  Loading...