Prof. Mona Nasr
Prof. Nasr is a Professor at Information Systems Department, Faculty of Computers and Artificial Intelligence, Helwan University, Prof. Mona held many positions such as (Chief Information Officer (CIO) for Helwan University HU, Scientific Computing Center Manager at HU, Head of Information Systems Department at Faculty of Computers and Artificial Intelligence HU, Vice Dean for Community Service and Environmental Development at FCAI-HU, Vice Dean at the Canadian International College CIC, El Sheikh Zayed Campus).
She received the M.Sc. degree in information systems from Faculty of Computers and Artificial Intelligence, Helwan University, Egypt, 2000. Ph.D. degree in Information Systems from Faculty of Computers and Artificial Intelligence, Helwan University, Egypt, 2006.
Prof. Nasr is a well-known speaker with a charismatic presence at academic conferences and seminars, university, and public lectures and radio and television programs in his area of expertise. She published many articles in international journals and conferences and she is an active reviewer for numerous international journals.
Prof. Nasr attended Digital Transformation & e-Governance Course(16th Nov. till 9th Dec 2021, Tallinn, Estonia),Organized by e-Governance Academy eGA , UNDP, Lebanon in cooperation with the Estonian e-Governance Academy, sharing the best practices on e-Governance and digitization in general.
Prof. Nasr attended Teaching the Teacher TTT Program in Artificial Intelligence from EPITA , School of Engineering and Computer Science (EPITA-Paris, France) Nov- Dec 2020.
she is a member in many other societies such as (IEDRC, IACSIT, MJC, IAOE, TWOWS/OWSD, CSTA, ArabWIC ABI,...etc).
Prof. Nasr Awarded: -
Selected from the top 50 women achievers in the middle East in 2021 supporting their organizations in the journey for business and Digital Transformation. IDC's list of Female Achievers 2021 in Category "CIO Pioneers" (Women Transforming Technology summit 7th Oct. 2021, Middle East), UAE, Dubai.
Selected from the Top 10 Women in Technology and Business, for female business and IT leaders who have positively impacted the business outcomes, work cultures, and levels of innovation required to drive significant improvements in financial performance @IDC CIO Summit Egypt, 14th June 2021
African Women in Technology Role Model from AFCHIX, 2017
A trophy (The Best Senior Level STEM Executive 2015) from Meera Kaul Foundation. The foundation focuses on women and women led enterprise in STEM (Science, Technology, Engineering, and Mathematics) in North America, Eastern Europe, and selected countries in Middle East, Africa, China and India.
Full fellowship from Bibliotheca Alexandrina(BA) in cooperation with The German Academic Exchange Service through the DAAD Kairo, Alexandria, Egypt.
Full fellowship from Bibliotheca Alexandrina(BA) in cooperation with the Arab Regional Office for the World Academy of Science for the advancement of science in developing countries (TWAS-ARO), Alexandria, Egypt.
Full fellowship from The Cyprus Institute for participating in the Third SESAME-LinkSCEEM Third Cross-sectional HPC Workshop, Cairo, Egypt.
Full fellowship from The Cyprus Institute for participating in the Second SESAME-LinkSCEEM Summer School, Allan-Jordan.
Full fellowship from The Cyprus Institute for participating in the Second LinkSCEEM/V-MUST, Alexandria, Egypt.
Phone: 002-01001779619
Address: Cairo, Egypt
She received the M.Sc. degree in information systems from Faculty of Computers and Artificial Intelligence, Helwan University, Egypt, 2000. Ph.D. degree in Information Systems from Faculty of Computers and Artificial Intelligence, Helwan University, Egypt, 2006.
Prof. Nasr is a well-known speaker with a charismatic presence at academic conferences and seminars, university, and public lectures and radio and television programs in his area of expertise. She published many articles in international journals and conferences and she is an active reviewer for numerous international journals.
Prof. Nasr attended Digital Transformation & e-Governance Course(16th Nov. till 9th Dec 2021, Tallinn, Estonia),Organized by e-Governance Academy eGA , UNDP, Lebanon in cooperation with the Estonian e-Governance Academy, sharing the best practices on e-Governance and digitization in general.
Prof. Nasr attended Teaching the Teacher TTT Program in Artificial Intelligence from EPITA , School of Engineering and Computer Science (EPITA-Paris, France) Nov- Dec 2020.
she is a member in many other societies such as (IEDRC, IACSIT, MJC, IAOE, TWOWS/OWSD, CSTA, ArabWIC ABI,...etc).
Prof. Nasr Awarded: -
Selected from the top 50 women achievers in the middle East in 2021 supporting their organizations in the journey for business and Digital Transformation. IDC's list of Female Achievers 2021 in Category "CIO Pioneers" (Women Transforming Technology summit 7th Oct. 2021, Middle East), UAE, Dubai.
Selected from the Top 10 Women in Technology and Business, for female business and IT leaders who have positively impacted the business outcomes, work cultures, and levels of innovation required to drive significant improvements in financial performance @IDC CIO Summit Egypt, 14th June 2021
African Women in Technology Role Model from AFCHIX, 2017
A trophy (The Best Senior Level STEM Executive 2015) from Meera Kaul Foundation. The foundation focuses on women and women led enterprise in STEM (Science, Technology, Engineering, and Mathematics) in North America, Eastern Europe, and selected countries in Middle East, Africa, China and India.
Full fellowship from Bibliotheca Alexandrina(BA) in cooperation with The German Academic Exchange Service through the DAAD Kairo, Alexandria, Egypt.
Full fellowship from Bibliotheca Alexandrina(BA) in cooperation with the Arab Regional Office for the World Academy of Science for the advancement of science in developing countries (TWAS-ARO), Alexandria, Egypt.
Full fellowship from The Cyprus Institute for participating in the Third SESAME-LinkSCEEM Third Cross-sectional HPC Workshop, Cairo, Egypt.
Full fellowship from The Cyprus Institute for participating in the Second SESAME-LinkSCEEM Summer School, Allan-Jordan.
Full fellowship from The Cyprus Institute for participating in the Second LinkSCEEM/V-MUST, Alexandria, Egypt.
Phone: 002-01001779619
Address: Cairo, Egypt
less
Related Authors
Elizabeth FitzGerald (née Brown)
The Open University
Josiah Heyman
University of Texas at El Paso (UTEP)
Beat Signer
Vrije Universiteit Brussel
Mohammed Seyam
Mansoura University
Javier Díaz Noci
Pompeu Fabra University
Vinicius Garcia
Universidade Federal de Pernambuco
Iman Attarzadeh
Islamic Azad University of Tehran, Central branch
Dr Yusri Arshad
Universiti Teknikal Malaysia Melaka
Abd Rahman Ahlan
International Islamic University Malaysia
Kostas Zafiropoulos
University of Macedonia
InterestsView All (26)
Uploads
Papers by Prof. Mona Nasr
time-critical applications. In IoT-time critical applications, legitimate users may require accessing the real-time data directly from the IoT devices rather than requesting data stored in the cloud. These IoT devices are prone to distinct threats and security breaches. Authentication mechanisms are substantial to control access to IoT devices in cloud computing, as authorized users and IoT devices should ensure the authenticity of each other and generate a session key for securing the exchanged traffic. As different IoT devices are resourceconstrained, traditional security mechanisms will not be appropriate for these
devices, as they need considerable computational power and consume excessive energy. Cryptographic researchers are exerting a worthy effort to develop lightweight security mechanisms to cope with resource-constrained IoT systems. In this paper, we propose a novel lightweight protocol (LightAHAKA) for authenticating IoT-cloud elements and establishing a key agreement for encrypting the exchanged sensitive data. Security analysis of the (Light-AHAKA) is carried out to assure the protocol immunity to different security attacks.
We provide a perspective technical survey analysis in machine learning (ML), and deep learning (DL) approaches for genome analysis. It's quickly rising applications related to cancer diseases such as cancer diagnosis or subtypes of cancer through omics input data. It discusses effective approaches in the fields of genomics regulatory, pathogenicity, and variant calling. Moreover, the representation of ML's potential benefits due to the several technological platforms involved in its
diagnosis, prognosis, and treatment. We concentrate on the most up-to-date knowledge of cancer classification models, targeted therapy, and define how genetic mutations inspire targeted therapy's responsiveness and highlight the different related issues in this era of precision medicine. Finally, we disuse limitations of the different approaches and hopeful ways of upcoming research in targeted therapy.
time-critical applications. In IoT-time critical applications, legitimate users may require accessing the real-time data directly from the IoT devices rather than requesting data stored in the cloud. These IoT devices are prone to distinct threats and security breaches. Authentication mechanisms are substantial to control access to IoT devices in cloud computing, as authorized users and IoT devices should ensure the authenticity of each other and generate a session key for securing the exchanged traffic. As different IoT devices are resourceconstrained, traditional security mechanisms will not be appropriate for these
devices, as they need considerable computational power and consume excessive energy. Cryptographic researchers are exerting a worthy effort to develop lightweight security mechanisms to cope with resource-constrained IoT systems. In this paper, we propose a novel lightweight protocol (LightAHAKA) for authenticating IoT-cloud elements and establishing a key agreement for encrypting the exchanged sensitive data. Security analysis of the (Light-AHAKA) is carried out to assure the protocol immunity to different security attacks.
We provide a perspective technical survey analysis in machine learning (ML), and deep learning (DL) approaches for genome analysis. It's quickly rising applications related to cancer diseases such as cancer diagnosis or subtypes of cancer through omics input data. It discusses effective approaches in the fields of genomics regulatory, pathogenicity, and variant calling. Moreover, the representation of ML's potential benefits due to the several technological platforms involved in its
diagnosis, prognosis, and treatment. We concentrate on the most up-to-date knowledge of cancer classification models, targeted therapy, and define how genetic mutations inspire targeted therapy's responsiveness and highlight the different related issues in this era of precision medicine. Finally, we disuse limitations of the different approaches and hopeful ways of upcoming research in targeted therapy.
Ramsis Hilton
26-27 September 2019
ITU/UNESCO Regional Digital Inclusion Week for the Arab States
13th International Forum for Smart Learning
Augmented Reality in Learning on 26th 2:00 P.M. - 3:00 P.M.
Additionally, we identify several critical techniques which can be accomplished for blocking many possible attacks against the IoT seven levels.
elements including attribute, record, table, system or more abstract groupings such as
business unit, company or product range. This paper presents a thorough analysis
of three data quality dimensions which are completeness, relevance, and duplication.
Besides; it covers all commonly used techniques for each dimension. Regarding
completeness; Predictive value imputation, distribution-based imputation, KNN, and
more methods are investigated. Moreover; relevance dimension is explored via filter and
wrapper approach, rough set theory, hybrid feature selection, and other
techniques. Duplication is investigated throughout many techniques such as; K-medoids,
standard duplicate elimination algorithm, online record matching, and sorted blocks.