(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–11 of 11 results for author: Taloba, A I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.05294  [pdf, other

    cs.DS cs.LO

    Identifying Difficult exercises in an eTextbook Using Item Response Theory and Logged Data Analysis

    Authors: Ahmed Abd Elrahman, Ahmed I. Taloba, Mohammed F. Farghally, Taysir Hassan A Soliman

    Abstract: The growing dependence on eTextbooks and Massive Open Online Courses (MOOCs) has led to an increase in the amount of students' learning data. By carefully analyzing this data, educators can identify difficult exercises, and evaluate the quality of the exercises when teaching a particular topic. In this study, an analysis of log data from the semester usage of the OpenDSA eTextbook was offered to i… ▽ More

    Submitted 25 November, 2022; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: 6 pages,5 figures

    MSC Class: (ams.org

  2. arXiv:2203.05602  [pdf

    cs.CV

    Gesture based Arabic Sign Language Recognition for Impaired People based on Convolution Neural Network

    Authors: Rady El Rwelli, Osama R. Shahin, Ahmed I. Taloba

    Abstract: The Arabic Sign Language has endorsed outstanding research achievements for identifying gestures and hand signs using the deep learning methodology. The term "forms of communication" refers to the actions used by hearing-impaired people to communicate. These actions are difficult for ordinary people to comprehend. The recognition of Arabic Sign Language (ArSL) has become a difficult study subject… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  3. arXiv:2203.05601  [pdf

    cs.CV

    Human Face Recognition from Part of a Facial Image based on Image Stitching

    Authors: Osama R. Shahin, Rami Ayedi, Alanazi Rayan, Rasha M. Abd El-Aziz, Ahmed I. Taloba

    Abstract: Most of the current techniques for face recognition require the presence of a full face of the person to be recognized, and this situation is difficult to achieve in practice, the required person may appear with a part of his face, which requires prediction of the part that did not appear. Most of the current forecasting processes are done by what is known as image interpolation, which does not gi… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  4. arXiv:2203.03713  [pdf

    cs.CY cs.LG

    A Predictive Model for Student Performance in Classrooms Using Student Interactions With an eTextbook

    Authors: Ahmed Abd Elrahman, Taysir Hassan A Soliman, Ahmed I. Taloba, Mohammed F. Farghally

    Abstract: With the rise of online eTextbooks and Massive Open Online Courses (MOOCs), a huge amount of data has been collected related to students' learning. With the careful analysis of this data, educators can gain useful insights into the performance of their students and their behavior in learning a particular topic. This paper proposes a new model for predicting student performance based on an analysis… ▽ More

    Submitted 16 February, 2022; originally announced March 2022.

    Comments: 21 pages,11 figures

  5. arXiv:2111.02308  [pdf

    cs.CR

    Maneuvering Digital Watermarking In Face Recognition

    Authors: Osama R. Shahin, Zeinab M. Abdel Azim, Ahmed I Taloba

    Abstract: The challenges faced in the digital world are many, which could be resolved with some biometric recognition methods. These biometric recognition methods are encompassed within watermarking technology, steganography, cryptography, and many other schemes of security. These methods assist in securing digital images with the authentication of their owner. This paper briefly contextualizes the digital… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 9 pages, 7 figures, Published with International Journal of Engineering Trends and Technology (IJETT)

    Journal ref: Volume 69 Issue 11 November 2021.Published with International Journal of Engineering Trends and Technology (IJETT)

  6. Arabic aspect sentiment polarity classification using BERT

    Authors: Mohammed M. Abdelgwad, Taysir Hassan A Soliman, Ahmed I. Taloba

    Abstract: Aspect-based sentiment analysis(ABSA) is a textual analysis methodology that defines the polarity of opinions on certain aspects related to specific targets. The majority of research on ABSA is in English, with a small amount of work available in Arabic. Most previous Arabic research has relied on deep learning models that depend primarily on context-independent word embeddings (e.g.word2vec), whe… ▽ More

    Submitted 10 March, 2023; v1 submitted 28 July, 2021; originally announced July 2021.

    Journal ref: J Big Data 9, 115 (2022)

  7. Arabic aspect based sentiment analysis using bidirectional GRU based models

    Authors: Mohammed M. Abdelgwad, Taysir Hassan A Soliman, Ahmed I. Taloba, Mohamed Fawzy Farghaly

    Abstract: Aspect-based Sentiment analysis (ABSA) accomplishes a fine-grained analysis that defines the aspects of a given document or sentence and the sentiments conveyed regarding each aspect. This level of analysis is the most detailed version that is capable of exploring the nuanced viewpoints of the reviews. The bulk of study in ABSA focuses on English with very little work available in Arabic. Most pre… ▽ More

    Submitted 6 October, 2021; v1 submitted 22 January, 2021; originally announced January 2021.

    Journal ref: Journal of King Saud University - Computer and Information Sciences (2021)

  8. A Comparative Study on using Principle Component Analysis with Different Text Classifiers

    Authors: Ahmed I. Taloba, D. A. Eisa, Safaa S. I. Ismail

    Abstract: Text categorization (TC) is the task of automatically organizing a set of documents into a set of pre-defined categories. Over the last few years, increased attention has been paid to the use of documents in digital form and this makes text categorization becomes a challenging issue. The most significant problem of text categorization is its huge number of features. Most of these features are redu… ▽ More

    Submitted 4 July, 2018; originally announced July 2018.

    Journal ref: International Journal of Computer Applications 180(31):1-6, April 2018

  9. arXiv:1501.00728  [pdf

    cs.LG

    Differential Search Algorithm-based Parametric Optimization of Fuzzy Generalized Eigenvalue Proximal Support Vector Machine

    Authors: M. H. Marghny, Rasha M. Abd ElAziz, Ahmed I. Taloba

    Abstract: Support Vector Machine (SVM) is an effective model for many classification problems. However, SVM needs the solution of a quadratic program which require specialized code. In addition, SVM has many parameters, which affects the performance of SVM classifier. Recently, the Generalized Eigenvalue Proximal SVM (GEPSVM) has been presented to solve the SVM complexity. In real world applications data ma… ▽ More

    Submitted 4 January, 2015; originally announced January 2015.

  10. arXiv:1405.6173  [pdf

    cs.NE cs.CE

    An Effective Evolutionary Clustering Algorithm: Hepatitis C Case Study

    Authors: M. H. Marghny, Rasha M. Abd El-Aziz, Ahmed I. Taloba

    Abstract: Clustering analysis plays an important role in scientific research and commercial application. K-means algorithm is a widely used partition method in clustering. However, it is known that the K-means algorithm may get stuck at suboptimal solutions, depending on the choice of the initial cluster centers. In this article, we propose a technique to handle large scale data, which can select initial cl… ▽ More

    Submitted 27 February, 2014; originally announced May 2014.

  11. arXiv:1402.6859  [pdf

    cs.LG cs.DB

    Outlier Detection using Improved Genetic K-means

    Authors: M. H. Marghny, Ahmed I. Taloba

    Abstract: The outlier detection problem in some cases is similar to the classification problem. For example, the main concern of clustering-based outlier detection algorithms is to find clusters and outliers, which are often regarded as noise that should be removed in order to make more reliable clustering. In this article, we present an algorithm that provides outlier detection and data clustering simultan… ▽ More

    Submitted 27 February, 2014; originally announced February 2014.