Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hoda Baraka is active.

Publication


Featured researches published by Hoda Baraka.


International Journal of Computer Processing of Languages | 2004

Machine Translation of English Noun Phrases into Arabic

Khaled Shaalan; Ahmed Rafea; Azza Abdel Moneim; Hoda Baraka

The present work reports our attempt in automating the translation of English noun phrase (NP) into Arabic. Translating NP is a very important task toward sentence translation since NPs form the majority of textual content of the scientific and technical documents. The system is implemented in Prolog and the parser is written in DCG formalism. The paper also describes our experience with the developed MT system and reports results of its application on real titles of theses from the computer science domain.


Machine Translation | 2008

Generating Arabic text in multilingual speech-to-speech machine translation framework

Azza Abdel Monem; Khaled Shaalan; Ahmed Rafea; Hoda Baraka

The interlingual approach to machine translation (MT) is used successfully in multilingual translation. It aims to achieve the translation task in two independent steps. First, meanings of the source-language sentences are represented in an intermediate language-independent (Interlingua) representation. Then, sentences of the target language are generated from those meaning representations. Arabic natural language processing in general is still underdeveloped and Arabic natural language generation (NLG) is even less developed. In particular, Arabic NLG from Interlinguas was only investigated using template-based approaches. Moreover, tools used for other languages are not easily adaptable to Arabic due to the language complexity at both the morphological and syntactic levels. In this paper, we describe a rule-based generation approach for task-oriented Interlingua-based spoken dialogue that transforms a relatively shallow semantic interlingual representation, called interchange format (IF), into Arabic text that corresponds to the intentions underlying the speaker’s utterances. This approach addresses the handling of the problems of Arabic syntactic structure determination, and Arabic morphological and syntactic generation within the Interlingual MT approach. The generation approach is developed primarily within the framework of the NESPOLE! (NEgotiating through SPOken Language in E-commerce) multilingual speech-to-speech MT project. The IF-to-Arabic generator is implemented in SICStus Prolog. We conducted evaluation experiments using the input and output from the English analyzer that was developed by the NESPOLE! team at Carnegie Mellon University. The results of these experiments were promising and confirmed the ability of the rule-based approach in generating Arabic translation from the Interlingua taken from the travel and tourism domain.


midwest symposium on circuits and systems | 1998

Solving graph partitioning problem using genetic algorithms

Sahar Shazely; Hoda Baraka; Ashraf Abdel-Wahab

The graph partitioning problem (GPP) is one of the fundamental multimodal, combinatorial problems that has many applications in computer science. Many deterministic algorithms have been devised to obtain a good solution for the GPP. This paper presents new techniques for discovering more than one solution to this problem using genetic algorithms. The techniques used are based upon applying niching methods to obtain multiple good solutions instead of only one solution. The paper also presents in detail a comparison between the results of a traditional method, simple genetic algorithm (SGA), and two niching methods, fitness sharing and deterministic crowding when applied to the graph partitioning problem.


database and expert systems applications | 2000

A Structured Testing Methodology for Knowledge-Based Systems

Abeer El-Korany; Ahmed Rafea; Hoda Baraka; Saad Eid

In recent years, knowledge-based software technology has proven itself to be a valuable tool for solving hitherto intractable problems. Developers of knowledge-based systems must ensure that the system will give its users accurate advice or correct solutions to their problems. Thus, knowledge-based systems must be debugged and validated just like any other piece of software. It has been found that one of the most important problems in developing knowledge-based systems is the lack of methods to verify and validate its KB. The aim of this article is to define a methodology and its supporting tool set that are used together in order to completely test knowledge-based systems. The suggested testing methodology couples different verification and validation activities that are collectively valuable in raising the level of system correctness.


industrial and engineering applications of artificial intelligence and expert systems | 1999

Genetic algorithms in solving graph partitioning problem

Sahar Shazely; Hoda Baraka; Ashraf H. Abdel-Wahab; Hanan Kamal

The Graph Partitioning Problem (GPP) is one of the fundamental multimodal combinatorial problems that has many applications in computer science. Many algorithms have been devised to obtain a reasonable approximate solution for the GP problem. This paper applies different Genetic Algorithms in solving GP problem. In addition to using the Simple Genetic Algorithm (SGA), it introduces a new genetic algorithm named the Adaptive Population Genetic Algorithm (APGA) that overcomes the premature convergence of SGA. The paper also presents a new approach using niching methods for solving GPP as a multimodal optimization problem. The paper also presents a comparison between the four genetic algorithms; Simple Genetic Algorithm (SGA), Adaptive Population Genetic Algorithm (APGA) and the two niching methods; Sharing and Deterministic Crowding. when applied to the graph partitioning problem. Results proved the superiority of APGA over SGA and the ability of niching methods in obtaining a set of multiple good solutions.


performance evaluation of wireless ad hoc, sensor, and ubiquitous networks | 2005

DRKH: dynamic re-keying with key hopping

Ahmad Mohammad Mohammad Kholaif; Magda B. Fayek; Hussein S. Eissa; Hoda Baraka

In this paper, we present Dynamic Re-keying with Key Hopping (DRKH) encryption protocol that uses RC4 encryption technique to ensure a strong security level with the advantage of low execution cost compared to other IEEE 802.11 security schemes.


local computer networks | 2005

DRKH: A Power Efficient Encryption Protocol forWireless Devices

Ahmad Mohammad Mohammad Kholaif; Magda B. Fayek; Hussein S. Eissa; Hoda Baraka

In this paper, we present dynamic rekeying with key hopping (DRKH) encryption protocol that uses RC4 encryption technique to ensure a strong security level with the advantage of low execution cost compared to other IEEE 802.11 security schemes. Low computational complexity makes DRKH suitable for solar- and battery-powered handheld devices such as nodes in Solar ESS (extended service set) and wireless sensor networks. Our design goal is to eventually integrate DRKH with different emerging wireless technologies. However, in this paper, we focus on the integration of DRKH with 802.11 standard since it is the most widely deployed wireless technology. The results and analysis show that DRKH overcomes all the security threats with wired equivalent privacy (WEP) protocol while consuming a much lower power than WEP, Wi-Fi Protected Access (WPA) 1.0 and WPA 2.0


International Journal of Pervasive Computing and Communications | 2007

DRKH: A Power Efficient Encryption Protocol for Wireless Devices

Ahmad Mohammad Mohammad Kholaif; Magda B. Fayek; Hussein S. Eissa; Hoda Baraka

In this paper, we present Dynamic Re‐keying with Key Hopping (DRKH) encryption protocol that uses RC4 encryption technique to ensure a strong security level with the advantage of low execution cost compared to other IEEE 802.11 security schemes. Low computational complexity makes DRKH suitable for solar‐ and battery‐powered handheld devices such as nodes in Solar ESS (Extended Service Set) and wireless sensor networks. Our design goal is to eventually integrate DRKH with different emerging wireless technologies. However, in this paper, we will focus on the integration of DRKH with 802.11 standard since it is the most widely deployed wireless technology. The results and analysis show that DRKH overcomes all the security threats with Wired Equivalent Privacy (WEP) protocol while consuming a much lower power than WEP, Wi‐Fi Protected Access (WPA) 1.0 and WPA 2.0.


industrial and engineering applications of artificial intelligence and expert systems | 1999

Unified chromosome representation for large scale problems

Hoda Baraka; Saad Eid; Hanan Kamal; Ashraf H. Abdel Wahab

Genetic Algorithms have been successfully applied to the function optimization problem. However, the main disadvantage of this technique is its large chromosome length and hence long conversion time specially when applied to functions with a large number of parameters. In this paper, a new chromosome representation scheme that reduces the chromosome length is proposed. The scheme is also domain independent and may be used with any function. Results and a comparison between the conventional chromosome representation and the proposed one are presented.


Archive | 2011

NEW ADAPTIVE ROUTING PROTOCOL FOR MANET

Maged Salah Eldin Soliman; Sherine M. Abd El-kader; Hussein S. Eissa; Hoda Baraka

Collaboration


Dive into the Hoda Baraka's collaboration.

Top Co-Authors

Avatar

Ahmed Rafea

American University in Cairo

View shared research outputs
Top Co-Authors

Avatar

Khaled Shaalan

British University in Dubai

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge