2018
AUTOMATING ULTRASOUND EXAMINATION OF A VASCULAR SYSTEM
Tara Astigarraga, Ossama Emam, AL A. Hamid, Kimberly Greene Starks
audio signal, ultrasound, position, computer vision, computer science, artificial intelligence, human anatomy, ultrasound probe
Abstract
An ultrasound probe is guided to an optimal position on a patients body by illuminating the patients body with a laser, by displaying icons of the probe position and the optimal position on a 3-D model of the patients body, or by playing an audio signal that varies according to distance of the probe position from the optimal position. In certain embodiments, the probe is guided to a series of optimal positions for conducting a vascular exam, responsive to a database of human anatomy and vasculature and responsive to a database of vascular exam procedures.
2017
Water management using water consuming behavior to control water flow
Ahmed I. Abdel-Fattah, Ossama Emam
water flow, data structure, computer program, movement, real time computing, control, computer science, water consumption
Abstract
Embodiments of the invention provide a method, system and computer program product for managing water consumption when a user engages in a specified water using activity. In an embodiment, the method comprises detecting user movement during said activity; detecting water usage during said activity; creating a pattern associating said user movements with said water usage over a specified period of time; and using said pattern to control a supply of water for the user when the user engages in the water using activity. In an embodiment, movement sensors are used to generate data representing movement of the user during the water using activity; water sensors are used to generate data representing water usage during the water using activity; and the movement data and the water data are processed to generate a data structure correlating the user movement data with the water data.
2016
Polling parameter adjustment
Ossama Emam, Vinod A. Valecha
polling, queue, real time computing, computer science
Abstract
An approach, executed by a computer, includes receiving at least an initial polling quantity and an initial polling frequency and polling an endpoint application using the initial polling quantity and the initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events generated at the endpoint application and remaining in a queue at the endpoint application and comparing the number of events in each queue. The approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on the comparison of the first number of events not consumed in the queue of the listening application and the second number of events generated at the endpoint application and remaining in the queue at the endpoint application.
2015
System for hiding sensitive messages within non-sensitive meaningful text
Ahmed I. Abdel-Fattah, Ossama S. Emam
information retrieval, world wide web, computer science, confidentiality
Abstract
The method includes receiving, by one or more computer processors, a first text, wherein at least a portion of the received first text is confidential. The method further includes identifying, by one or more computer processors, an intended recipient of the received first text. The method further includes identifying, by one or more computer processors, a first conversion model, which corresponds to the intended recipient. The method further converting, by one or more computer processors, the received first text into a third text that does not include confidential text based upon the identified first conversion model.
Automatic generation of action items from a meeting transcript
Tara Astigarraga, Ossama S. Emam, Al Hamid, Sara Noeman, Kimberly G. Starks
chunking, information extraction, topic model, action, natural language processing, information retrieval, computer science, artificial intelligence
Abstract
Examples of techniques for generating a plurality of action items from a meeting transcript of a meeting are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method comprises chunking the meeting transcript into a plurality of chunks using a meeting topic model. The computer-implemented method also comprises performing, by a processor, information extraction on the plurality of chunks to extract action item information from the plurality of chunks. The computer-implemented method further comprises generating the plurality of action items based on the extracted action item information.
Performance detection and enhancement of machine translation
Mohamed A. Bahgat, Ossama Emam, Ayman S. Hanafy, Sara A. Noeman
machine translation, natural language processing, speech recognition, translation, computer science, artificial intelligence
Abstract
In an approach for evaluating performance of machine translation, a processor receives a first document in a source language. A processor translates the first document in the source language to a second document in a target language, based, at least in part, on a first quantity of information. A processor evaluates the second document in the target language, based, at least, on one or more aspects of the translation. A processor determines, based, at least in part, on the evaluation, the second document in the target language meets a predetermined threshold.
Vehicle accident avoidance system
Mohamed A. Bahgat, Ossama Emam, Ayman S. Hanafy, Sara A. Noeman
host, intersection, real time computing, path, computer science, vehicle accident
Abstract
Method and system are provided for vehicle accident avoidance carried out with respect to a host vehicle by modeling behavior. The method includes: monitoring a surrounding environment of the host vehicle and detecting other vehicles in a vicinity of the host vehicle by at least one visual sensor. The method further includes: estimating a speed and direction of each of the detected vehicles; calculating one or more projected paths of each of the detected vehicles based on their current estimated speed and direction, the current monitored surrounding environment, and other vehicle projected paths; estimating a probability of intersection of each projected path with the host vehicle; and providing an alert or action to the host vehicle if there is a high probability of intersection.
2013
AUTOMATED TRAFFIC SYNCHRONIZATION
Ossama Emam, Peter G Fairweather, Dimitri Kanevsky, Irina Rish
US Patent 20,130,013,130
Indexing content and source code of a software application
Aleksandr Y. Aravkin, Sasha P. Caskey, Ossama S. Emam, Dimitri Kanevsky, Tara N. Sainath
monolithic application, software construction, software system, software visualization, software, source code, search engine indexing, index, computer engineering, programming language, computer science
Abstract
In a method for generating a searchable index from an analysis of a software application, receiving a first software application. The one or more processors determine that a first source code of the first software application is inaccessible. The one or more processors stimulate the first software application. The one or more processors analyze textual data resulting from the stimulation of the first software application. The one or more processors classify one or more images resulting from the stimulation of the first software application. The one or more processors index the analyzed textual data and the classified one or more images resulting from the stimulation of the first software application.
Morphology analysis for machine translation
Mohamed A. Bahgat, Ossama Emam, Ayman S. Hanafy, Sara A. Noeman
language identification, universal networking language, cache language model, language model, stop words, first language, language primitive, machine translation, natural language processing, linguistics, computer science, artificial intelligence
Abstract
A method and system for analyzing language morphology to facilitate statistical machine translation from a first language to a target language is disclosed. The method and system can include marking words in a first language text with a part-of-speech tag, and parsing one or more sentences in the first language text to determine syntactic dependence relations between the words in the one or more sentences of the first language text. Morphological features of the words in the first language text can also be extracted. The method and system can also include tagging the words in the first language text with a language morphology tag from a second language. A modified form of words in the first language text can be generated using the language morphology tags from the second language. The modified form of the words can be used to facilitate translation from the first language to a target language.
Prediction of free parking spaces in a parking area
Mohamed A. Bahgat, Ossama S. Emam, Ayman S. Hanafy, Sara A. Noeman
parking guidance and information, ticket, computer program, transport engineering, product, engineering, distance threshold, parking area
Abstract
Embodiments of the present invention disclose a computer implemented method, computer program product, and system for management of parking spaces in a parking area. Identifying an individual entering a parking area and a vehicle in the parking area that corresponds to the identified individual. Determining a distance between the identified individual and the identified vehicle in the parking area. Determining whether the identified individual is moving toward the identified vehicle. Responsive to determining that the identified individual is moving toward the identified vehicle, determining whether the determined distance is less than an associated distance threshold condition. In another embodiment, detecting a parking ticket entering the parking area and identifying an individual and a vehicle in the parking area that correspond to the detected parking ticket.
2012
Method and computer program for securely storing data
Ossama Emam, Genady Grabarnik, Dimitri Kanevsky, Alexander Zlatsin
secure copy, encryption, computer network, computer program, database, component, computer science, original data
Abstract
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
Masking Mobile Message Content
Sasha P. Caskey, Ossama Emam, Dimitri Kanevsky, Tara N. Sainath
message broker, masking, computer network, computer science, world wide web, mobile message
Abstract
A method, an apparatus and an article of manufacture for masking a message on an electronic device. The method includes receiving a message on an electronic device, determining if a message category label is included in the message, mapping the message category to a corresponding masking format if a message category label is included in the message, extracting the content of the message to generate a message category if a message category label is not included in the message, wherein each message category generated corresponds to a masking format, and masking the message on the electronic device by transforming the message into the masking format that corresponds to the message category for the message.
Method for separating a dividable computer device into multiple sub-computers with predetermined features and functionality loaded before the separation upon users selection
Tara N. Sainath, Dimitri Kanevsky, Sasha P. Caskey, Ossama S. Emam
computer hardware, engineering drawing, computer science, selection, separation, computer device
Abstract
A method for separating a dividable computer device into multiple sub-computers may include receiving, by the dividable computer device, a command to separate a sub-computer from the dividable computer device. The method may also include detecting by the dividable computer device separation of the sub-computer and reconfiguring the dividable computer device for operation without the separated sub-computer in response to each sub-computer being separated.
Computereinheit, die in mehrere Teilcomputer auftrennbar ist
Tara N. Sainath, Dimitri Kanevsky, Sasha P. Caskey, Ossama S. Emam
Abstract
Ein Verfahren zum Auftrennen einer teilbaren Computereinheit in mehrere Teilcomputer kann das Empfangen eines Befehls durch die teilbare Computereinheit zum Abtrennen eines Teilcomputers von der teilbaren Computereinheit aufweisen. Das Verfahren kann daruber hinaus das Erkennen einer Abtrennung des Teilcomputers durch die teilbare Computereinheit und in Reaktion auf das Abtrennen des jeweiligen Teilcomputers das Neukonfigurieren der teilbaren Computereinheit fur den Betrieb ohne den abgetrennten Teilcomputer beinhalten.
2011
Computer device separable into multiple sub-computers
Tara N. Sainath, Dimitri Kanevsky, Sasha P. Caskey, Ossama S. Emam
computer hardware, computer science, separable space, computer device
Abstract
A method for separating a dividable computer device into multiple sub-computers may include receiving, by the dividable computer device, a command to separate a sub-computer from the dividable computer device. The method may also include detecting by the dividable computer device separation of the sub-computer and reconfiguring the dividable computer device for operation without the separated sub-computer in response to each sub-computer being separated.
2010
Automated energy transfer calculation and compensation
Ossama Emam, Dimitri Kanevsky, Irina Rish
US Patent 7,831,525
2009
System and method for guiding a user through a surrounding environment
Ossama Emam, Hesham Soultan
rendering, human computer interaction, computer program, computer science
Abstract
A method, system and computer program product for guiding a user through a surrounding environment is disclosed. The method can include receiving user preferences; determining the current geographical location of the user, receiving a destination request from the user; creating a route for the destination; as the route is being traversed by the user, capturing images of the surrounding environment; analyzing the captured images to determine events; comparing the events to the user preferences; wherein the comparing comprises identifying at least one event matching at least one user preference; providing a notification message to the user based on the comparing step, receiving a confirmation from the user; and rendering instructions relevant to the event to the user.
2008
Access to multilingual textual resources
Ossama Emam, Ahmed Hassan, Hany M. Hassan
histogram, set, information retrieval, first language, computer science, second language
Abstract
A mechanism is provided for determining a second document of a set of documents in a second language having the same textual content as a first document in a first language. A first histogram that is indicative of the textual content of the first document is generated. A second histogram is generated for each document of the set of documents. Each second histogram is indicative of the textual content of a document of the set of documents. Each second histogram is compared with the first histogram to determine at least one histogram from the plurality of second histograms which matches the first histogram. The second document is then identified as the document having the at least one histogram.
Word formation method and system
Ossama Emam, Walid Mohamed Magdy
word formation, word, sequence, speech recognition, mathematics, arabic
Abstract
A computer-implemented method of word formation in a data processing system. A plurality of basic Arabic naked characters is received in sequence. The plurality of basic Arabic naked characters is concatenated to form a naked word including the plurality of basic Arabic naked characters. The naked word is associated with a first Arabic-like language. The naked word is transformed into a complete word in the first Arabic-like language. The complete word is displayed.
System and method of GUI overlaying for migrating from a first application to a second application
Ossama Emam, Genady Grabarnik, Dimitri Kanevski, Alexander Zlatsin
feature, graphical user interface, display device, set, overlay, computer hardware, computer science
Abstract
A system and associated method for migrating from a first application to a second application where the second application is an alternative to the first application with respect to functionality. Overlaying a first graphical user interface (GUI) onto the second application where the first GUI corresponding to the first application. Sending to a display device a set of steps which if executed would invoke a feature utilizing a second GUI after the feature was invoked utilizing the first GUI. Removing the first GUI with respect to the feature and displaying the second GUI with respect to the feature after satisfying a condition. Finally, repeating the steps of sending to a display device and removing the first GUI for all features common to both the first application and the second application.
System and method for migrating from a first application to a second application
Ossama Emam, Genady Grabarnik, Dimitri Kanevski, Alexander Zlatsin
feature, graphical user interface, display device, set, overlay, computer hardware, computer science
Abstract
A system and associated method for migrating from a first application to a second application where the second application is an alternative to the first application with respect to functionality. Overlaying a first graphical user interface (GUI) onto the second application where the first GUI corresponding to the first application. Sending to a display device a set of steps which if executed would invoke a feature utilizing a second GUI after the feature was invoked utilizing the first GUI. Removing the first GUI with respect to the feature and displaying the second GUI with respect to the feature after satisfying a condition. Finally, repeating the steps of sending to a display device and removing the first GUI for all features common to both the first application and the second application.
Method, system and computer program for driving assistance and monitoring
Ossama Emam, Dimitri Kanevsky
blind spot, computer program, data processing, real time computing, simulation, position, engineering
Abstract
A data processing method for alerting a first vehicle when entering and/or residing in a blind spot of at least one second vehicle and a system and a computer program implementing such a method. A method in accordance with an embodiment includes: determining and dynamically updating the position of second vehicle, the blind spot of the second vehicle, and the time for the first vehicle to enter the blind spot. An alarm signal is generated when the first vehicle is entering or residing in a blind spot of the second vehicle. The method also includes steps to generate direction for the first vehicle to avoid entering in or to leave the blind spot of the second vehicle.
Driving assistance and monitoring
Ossama Emam, Dimitri Kanevsky
blind spot, computer program, data processing, real time computing, simulation, position, engineering
Abstract
A data processing method for alerting a first vehicle when entering and/or residing in a blind spot of at least one second vehicle and a system and a computer program implementing such a method. A method in accordance with an embodiment includes: determining and dynamically updating the position of second vehicle, the blind spot of the second vehicle, and the time for the first vehicle to enter the blind spot. An alarm signal is generated when the first vehicle is entering or residing in a blind spot of the second vehicle. The method also includes steps to generate direction for the first vehicle to avoid entering in or to leave the blind spot of the second vehicle.
AUTOMATED DYNAMIC VEHICLE BLIND SPOT DETERMINATION
Ossama Emam, Dimitri Kanevsky, Irina Rish
US Patent App. 12/196,042
2007
System and method for analyzing traffic disturbances reported by vehicles
Ossama Emam, Dimitri Kanevsky
abnormality, data mining, simulation, engineering, behavior type, vehicle behavior
Abstract
A method, system and computer program product for collecting, analyzing and handling abnormal situations or abnormal vehicle behaviors encountered on a road by at least one vehicle. The method includes: receiving at least one report from at least one originator, each report corresponding to at least one abnormal situation or abnormal vehicle behavior encountered by a vehicle on the road; for each received report: for each reported abnormal situation: characterizing the abnormal situation according to a situation type based on information and measurements contained in the report; identifying and localizing the abnormal situation from information contained in the report; taking an appropriate action in order to handle the abnormal situation based on: the situation type, the localization of the abnormal situation and previous reports related to the abnormal situation, if any, received during a given time period; for each reported abnormal vehicle behavior: characterizing the abnormal vehicle behavior according to a behavior type based on information and measurements contained in the report; identifying the vehicle or a driver of the vehicle having the abnormal behavior from information contained in the report; taking an appropriate action based on: the behavior type, previous reports, if any, received during a given time period and concerning the same vehicle or driver; recording the report.
Securely storing data
Ossama Emam, Genady Grabarnik, Dimitri Kanevsky, Alexander Zlatsin
encryption, component, computer security, computer science, original data
Abstract
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
Method, system and computer program for securely storing data
Ossama Emam, Dimitri Kanevsky, Genady Grabarnik, Alexander Zlatsin
secure copy, encryption, computer network, computer program, component, computer science, computer security, original data
Abstract
A method of securely storing data comprising the steps of : - dividing the data into a plurality of secure components; - encrypting the secure components; - moving each secure component to a different location which is substantially inaccessible to an unauthorized request; - storing the secure components at the different locations for a period of time; - repeating the moving and storing steps; - moving all of the secure components to a single location in response to an authorized request; - decrypting each of the secure components; and - assembling the plurality of secure components to reconstruct the original data.
System and method for generating virtual images according to position of viewers
Ossama Emam, Dimitri Kanevsky, Alexander Zlatsin
virtual image, augmented reality, window, computer vision, computer graphics images, impression, position, engineering, artificial intelligence, special effects
Abstract
A method generates and superposes virtual images to an existing image in order to show special effects. Images are generated depending on the relative position of one or more subjects viewing the existing image. The images are generated in order to see an augmented reality. The subjects are people located near a transparent support such as a screen or a window. These people watch the augmented reality through the screen/window. The virtual objects on the screen are created in such a way as to give a realistic impression for different people watching the same screen/window at the same time, thereby generating virtual images in order to create an augmented reality for one or many viewers watching the same real objects at the same time.
Method, system and computer program for generating virtual image according to position of browsing person
Ossama Emam, Dimitri Kanevsky, Alexander Zlatsin, , ,
virtual image, virtual reality, window, object, computer vision, impression, computer program, position, computer science, image, artificial intelligence
Abstract
PROBLEM TO BE SOLVED: To provide a method of generating a virtual image according to a relative position of one or more of persons as objects browsing an existing image, for a special effect, to be superimposed to the existing image. 41 42 SOLUTION: The image is generated to browse intensified reality. The objects are the persons existing in the vicinity of a transparent support body such as a screen and a window. The persons browse the intensified reality through the screen/window. A virtual object on the screen is prepared by a method to impart a real impression to the persons different each other browsing the same screen/window, and the virtual reality is generated to prepare the intensified reality for the one or plurality of browsing persons browsing the same real object. 132 133 COPYRIGHT: (C)2008,JPO&INPIT
2006
System and method for diacritization of text
Ossama S. Emam, Ruhi Sarikaya, Imed Zitouni
diacritic, utterance, representation, speech recognition, aggregate, computer science
Abstract
A system and method for restoration of diacritics includes making classification decisions regarding an utterance in accordance with an aggregate of a plurality of information sources in a diacritization model for diacritic restoration. A best diacritic representation is determined for graphemes in the utterance based upon a best match with the diacritization model. A diacritically restored representation of the utterance is output.
Method and system for automatically generating multilingual electronic content from unstructured data
Hany Hassan, Ossama Emam, Amr Yassin
unstructured data, machine translation, table of contents, language identification, field, computer program, information retrieval, computer science, content, electronic content
Abstract
The present invention is directed to the field of electronic content management and more particularly to a method, system and computer program for automatically generating electronic content based on a user designed table of contents (102) and a desired final content form (105) . Language identification (105) and automatic machine translation technologies are also used to broaden the sources of information. The method comprises the steps of: extracting from the unstructured data, information related to one or a plurality of preselected topics; consolidating the extracted information in a structured form; localizing the consolidated information according to a selected environment; generating content according to a specified form.
2004
Hierarchical approach for the statistical vowelization of Arabic text
Ossama Emam, Volker Fischer
noisy text analytics, text graph, text segmentation, text simplification, language model, speech processing, character, natural language processing, decision tree, speech recognition, computer science, artificial intelligence
Abstract
The present invention relates to the field of computer-aided text and speech processing, and in particular to a method and respective system for converting an input text given in an incomplete language, for example a language, in which unvowelized text is used, into speech, wherein a computer-aided grapheme-phoneme conversion is used. In order to improve completion of the text, it is proposed to a) use statistical methods including decision trees and stochastic language models for enriching, i.e. completing said input text with missing informationwhich may be desired for a full understanding of the input text b) subjecting the completed input text to said grapheme-phoneme conversion to produce synthetic speech. Advantageously, the text is completed according to a model hierarchy giving higher priority to longer chunks of text, ie sentences (310, 315, 320) then multiword phrases (330, 335, 340), then words (350, 355, 360) and finally character groups (370, 375, 380, 390).
2002
Segmentation technique increasing the active vocabulary of speech recognizers
Ossama Dr. Emam, Siegfried Dr. Kunzmann
Patent 1
Abstract vocabulary, speech processing, audio mining, logogen model, speaker recognition, speech analytics, word error rate, speech production, syllable, natural language processing, computer science, artificial intelligence
A speech recognition system and a method executed by a speech recognition system focusing on the vocabulary of the speech recognition system and its usage during the speech recognition process is provided. A segmented vocabulary and its exploitation is provided comprising a multitude of entries wherein an entry is either identical to a legal word or a constituent of a legal word of the language, and the constituent is an arbitrary sub-component of the legal word according to the orthography. A constituent can comprise any number of characters not limited to a syllable of a legal word or a recognition unit of the speech recognition system. The vocabulary is used to recognize constituents of the vocabulary for recombination of the constituents into legal words if a constituent combination table indicates that the recognized constituents are a legal concatenation in the language.
vocabulary, speech processing, audio mining, logogen model, speaker recognition, speech analytics, word error rate, speech production, syllable, natural language processing, computer science, artificial intelligence