Department of Software Engineering

More ...

About Department of Software Engineering

Facts about Department of Software Engineering

We are proud of what we offer to the world and the community

29

Publications

12

Academic Staff

99

Students

101

Graduates

Programs

بكالوريوس في تقنية المعلومات
Major هندسة البرمجيات

...

Details

Who works at the Department of Software Engineering

Department of Software Engineering has more than 12 academic staff members

staff photo

Dr. Trial Lecturer Lecturer Lecturer

عضو هيئة تدريس

Publications

Some of publications in Department of Software Engineering

Applying Arabic Stemming Using Query Expansion

The process of conflating different Arabic word formats to their stem or root is called stemming. Indexing text collection using stems or roots has been reported to be superior to using original word formats. However, the Arabic text stemming has negative effects on words. It conflates words with different meaning under one index term. This occurs frequently in Arabic when using stems and it becomes more frequent when choosing roots to index the collection. Furthermore, search engine whose index is constructed using a particular stemmer makes it a stemmer-dependent engine. In this paper, we show how we can still use stemming to reach the same results without indexing the stemmed text. Original words have been indexed, and a stemmer used to extract word variants and add them to the user query. Apart from making our search operation stemmer-independent, we proof that our approach is as good as light stemming and is significantly better than root stemming. arabic 5 English 41
Aabdusalam F Ahmad Nwesri, Hasan A. H. Alyagoubi(9-2015)
Publisher's website

Medical 3D Integral Images Visualization in True Space

3D Integral Imaging (also referred to as 3D Holoscopic imaging) methodology uses the principle of “Fly’s eye” and hence allows natural viewing of objects (i.e. fatigue free viewing); 3D-holoscopic technology produces images that are true optical models. This technology is based on physical principles with duplication of light fields. In this paper, a new method of visualization medical 3D integral images is proposed. Digital Imaging and Communications in Medicine data images (DICOM) taken from CT, MRI, PET and US images that produced by 3D-Doctor software to generate medical 3D integral images visualization of anatomy without glass in natural light. The method is mainly based on multiprocessor ray tracing system as renderer. The medical 3D content is captured in real time with the content viewed by multiple viewers independently of their position, without the needs of 3D eyewear. Experimental results show validation of the new algorithm and demonstrated that medical 3D integral images content can be displayed on commercially available multi-view auto-stereoscopic display. Medical 3D integral images content is parsed into multiprocessor ray tracing system, consequently, short time of medical 3D integral images movie of such pelvis scene is generated and displayed on PC screen, LCD and Holovizio display.
Dr. Mahmoud Geat Mahmoud Eljadid, Prof. Amar Aggoun(5-2016)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website