Cherif Salama

Learn More
Cyber-physical systems comprise digital components that directly interact with a physical environment. Specifying the behavior <i>desired</i> of such systems requires analytical modeling of physical phenomena. Similarly, testing them requires simulation of continuous systems. While numerous tools support later stages of developing simulation codes, there is(More)
Modern hardware description languages support code-generation constructs like <b>generate/endgenerate</b> in Verilog. These constructs are intended to describe regular or parameterized hardware designs and, when used effectively, can make hardware descriptions shorter, more understandable, and more reusable. In practice, however, designers avoid these(More)
The Verilog hardware description language has padding semantics that allow designers to write descriptions where wires of different bit widths can be interconnected. However, many of these connections are nothing more than bugs inadvertently introduced by the designer and often result in circuits that behave incorrectly or use more resources than required.(More)
Modern hardware description languages support code generation constructs like generate/endgenerate in Verilog. These constructs are used to describe regular or parameterized hardware designs and, when used effectively, can make hardware descriptions shorter, more understandable, and more reusable. In practice, however, designers avoid these abstractions,(More)
The Verilog hardware description language has padding semantics that allow designers to write descriptions where wires of different bit widths can be interconnected. However, many of these connections are nothing more than bugs inadvertently introduced by the designer and often result in circuits that behave incorrectly or use more resources than required.(More)
This paper describes the ASU system submitted in the COLING W-NUT 2016 Twitter Named Entity Recognition (NER) task. We present an experimental study on applying deep learning to extracting named entities (NEs) from tweets. We built two Long Short-Term Memory (LSTM) models for the task. The first model was built to extract named entities without types while(More)
Constructing a timetable is a widespread problem. Computers can be employed to solve this problem faster and to produce better solutions. Software solutions for this problem already exist and are used by some universities. However, some universities have complex types of constraints that make it hard to use most of the available software solutions. This(More)
Identifying objects of interest in a video sequence is a fundamental and essential part in many vision systems. A common method to achieve that goal is to perform background subtraction. For automated surveillance systems with multiple cameras, real-time background subtraction is particularly important. In this paper, we examine how to exploit GPU(More)
Structural testing is concerned with the internal structures of the written software. The targeted structural coverage criteria are usually based on the criticality of the application. Modified Condition/Decision Coverage (MC/DC) is a structural coverage criterion that was introduced to the industry by NASA. Also, MC/DC comes either highly recommended or(More)
The university course timetabling problem (UCTP) is a combinatorial optimization problem of great importance for every university. This paper proposes the use of a parallel evolutionary algorithm to solve the problem and focuses on accelerating the process for specifically very large sized problems. The problem was solved using the genetic algorithm, and(More)