Search Results for author: Mohamed Mahmoud

Found 8 papers, 2 papers with code

ArabicaQA: A Comprehensive Dataset for Arabic Question Answering

1 code implementation26 Mar 2024 Abdelrahman Abdallah, Mahmoud Kasem, Mahmoud Abdalla, Mohamed Mahmoud, Mohamed Elkasaby, Yasser Elbendary, Adam Jatowt

In conclusion, ArabicaQA, AraDPR, and the benchmarking of LLMs in Arabic question answering offer significant advancements in the field of Arabic NLP.

Benchmarking Machine Reading Comprehension +4

Advancements and Challenges in Arabic Optical Character Recognition: A Comprehensive Survey

no code implementations19 Dec 2023 Mahmoud SalahEldin Kasem, Mohamed Mahmoud, Hyun-Soo Kang

A thorough analysis is conducted on prevailing techniques utilized throughout the OCR process, with a dedicated effort to discern the most efficacious approaches that demonstrate enhanced outcomes.

Optical Character Recognition Optical Character Recognition (OCR)

Deep learning for table detection and structure recognition: A survey

3 code implementations15 Nov 2022 Mahmoud Kasem, Abdelrahman Abdallah, Alexander Berendeyev, Ebrahem Elkady, Mahmoud Abdalla, Mohamed Mahmoud, Mohamed Hamada, Daniyar Nurseitov, Islam Taj-Eddin

The goals of this survey are to provide a profound comprehension of the major developments in the field of Table Detection, offer insight into the different methodologies, and provide a systematic taxonomy of the different approaches.

object-detection Object Detection +3

Detection of False-Reading Attacks in the AMI Net-Metering System

no code implementations2 Dec 2020 Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary

Based on the data analysis, we propose a general multi-data-source deep hybrid learning-based detector to identify the false-reading attacks.

energy management Management

On Sharing Models Instead of Data using Mimic learning for Smart Health Applications

no code implementations24 Dec 2019 Mohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya

In this paper, we tackle this problem by sharing the models instead of the original sensitive data by using the mimic learning approach.

BIG-bench Machine Learning

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

no code implementations2 May 2019 Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud

In this paper, we propose the use of mimic learning to enable the transfer of intrusion detection knowledge through a teacher model trained on private data to a student model.

Network Intrusion Detection

Multiple-Instance, Cascaded Classification for Keyword Spotting in Narrow-Band Audio

no code implementations21 Nov 2017 Ahmad AbdulKader, Kareem Nassar, Mohamed Mahmoud, Daniel Galvez, Chetan Patil

We propose using cascaded classifiers for a keyword spotting (KWS) task on narrow-band (NB), 8kHz audio acquired in non-IID environments --- a more challenging task than most state-of-the-art KWS systems face.

General Classification Keyword Spotting +1

Cannot find the paper you are looking for? You can Submit a new open access paper.