ICENCO 2017
Program
2017 13thInternational Computer
Engineering Conference
Computer Engineering
Department
Faculty of Engineering
Cairo University
Cairo, EGYPT
"Boundless Smart Societies"
December
27-28, 2017
The Conference Venue
First Day:
The conference will be held at the Four Seasons Hotel
– Giza. It's located in 35 Giza Street
(Ex. Mourad st.). If you're taking a taxi, mention "Four Seasons El Giza, Sharie
Mourad" (Four Seasons, Giza, Mourad st.)
Second Day:
The conference will be held at Faculty of Engineering, Cairo University, and
Computer Engineering Department. You may phone +202-35678981.
Conference in a Glance
08:30-09:00 am |
Registration |
09:00-09:10 am |
Soft Opening
Prof. Samir Shaheen, ICENCO Chair and
Past-Dean Faculty of Engineering, Cairo University |
09:15-11:00 am |
Session 1
Communications and Computer Networks |
11:00: 11:15 am |
Coffee Break |
11:15 am-01:00 pm
|
Session 2
Image Processing and Computer Vision |
01:00-02:00 pm |
Lunch Break |
02:00-03:45 pm |
Session 3
Machine Intelligence |
3:45:4:00 pm |
Coffee Break |
04:00-05:45 pm |
Session 4
Control Applications and Embedded
Systems |
06:00–09:00 pm
|
Official Opening, Conf. Banquet and Honoring of Class 2007
Talk entitled:
POSTAL HISTORY In Modern Egypt
Sherif El Kerdani
Fellow of the Royal Academy of Surgeons
Board Member of the Philatelic Society of
Egypt
Member Egypt Study Circle, London
Member of the Royal Philatelic Society of London
|
09:00-09:30 am |
Registration |
09:30-11:15 am
|
Session 5
Image Processing & Computer Vision and
Big Data |
11:15-11:30 am
|
Coffee break |
11:30 am-1:15 pm
|
Session 6
Machine Intelligence |
1:15-02:15 pm
|
Lunch
|
02:15-04:00 pm
|
Session 7
Communications and Computer Networks |
4:00-4:15 pm
|
Coffee break
|
04:15-06:00 pm
|
Session 8 & Closing
Miscellaneous |
Conference
Program
Date
|
Wednesday 27, December 2017
|
Location
|
Four Seasons Hotel -First Residence, Giza
|
Registration
(08:30 am – 09:00 am)
|
||
Soft Opening
(09:00 am – 09:10
am)
Prof. Samir Shaheen Past-Dean Faculty of Engineering, Cairo University
Conference Chair
|
||
Session 1: Communications and Computer Networks
(09:15 am – 11:00 am) |
||
Moderators: Prof. Samir Shaheen
Past-Dean Faculty of Engineering, Cairo U.
& Prof. Omar Karam Dean of Informatics& Computer Science, BUC |
||
No |
Ref. No. |
Paper Title/authors |
1 |
EG-62 |
Modified Capacity Enhanced PF
(MCE-PF) Downlink Scheduling Algorithm for Heterogeneous LTE-Advanced Networks
Amany Sobhy Eladham, Nada
ElShennawy and Amany Sarhan |
2 |
Ku-65 |
Performance
Enhancement of Free Space Optical (FSO) Systems Using Polarized DWDM-OFDM
technique under Atmospheric Disturbances
Abd El-Naser A. Mohamed, Ahmed
Nabih Zaki Rashed, Mohamed S. F. Tabbour and Amira M. Ismail |
3 |
EG-24 |
Evaluating QoS using Scheduling
Algorithms in MPLS/VPN/WiMAX Networks
Hassan H.
Elkarash, Nada M. Elshennawy and Elsayed A. Sallam |
4 |
So-112 |
Cost-Efficient
Architecture of IPsec Classification Engine with TCAM
Hayotjon Aliev,
Won Sik Chae and HyungWon Kim |
5 |
So-98 |
Interoperability
of Device Identification in Heterogeneous IoT Platforms |
6 |
Ku-47 |
Performance Analysis For Diverse Simulation Scenarios for
DSDV, DSR and AODV MANET Routing Protocols
Qutaiba Razouqi,
Ahmed Boushehri and Mohamed Gaballah |
7 |
Jo-115 |
Fuzzy Logic-Based
Clustering Approach with Mobile Sink for WSNs
Omar Banimelhem
and Alaa Abu-Hantash |
8 |
So-96 |
Development of
IoT Security Component for Interoperability
Se-Ra Oh and
Young-Gab Kim |
9 |
So-49 |
Low overhead
routing for IEEE 802.11-based Internet-of-Things networks
Hyoung-Gyu Choi, Seung-Jae Han, and
Sunju Park |
10 |
UK-77 |
An Energy
Efficient and Adaptive Clustering for Wireless Sensor Network (CH-leach) using
Leach Protocol
Walid Abushiba,
Princy Johnson and Saad Alharthi |
Coffee Break
(11:00: 11:15 am) |
||
Session 2:
Image Processing and Computer Vision
|
||
Moderators: Prof. Ahmed Darwish
Former Minister
of Administrative Develop.
& Dr. Mayada Hadhoud Assistant Professor Computer
Engineering Department, Cairo University |
||
No |
Ref. No. |
Paper Title/authors |
1 |
EG-70 |
Speeding up
Dominant Object Video Segmentation
Ali Alabed, Omar
A. Nasr and Elsayed Hemayed |
2 |
EG-43 |
Improving the speed of
chaotic-maps-based image encryption using parallelization
Amany Elrefaey,
Amany Sarhan and Nada M. El-Shennawy |
3 |
EG-09 |
Automatic Multi-Style License
Plate Detection Using a Biologically Inspired Classifier
Amr A. El-Latief,
Elsayed E. Hemayed, Dina Helal and Mohamed Rehan |
4 |
Cz-79 |
An investigation of key features
of atherosclerotic plaques on B-images in comparison with histological patterns
to ischemic stroke prediction
Jiri Blahuta,
Jakub Skacel and Petr Cermak |
5 |
Le-40 |
Lebanese Automated Number Plate
Reading Based on Neural Network Recognition
Moustafa M.
Kurdi, Imad A. Elzein, Jalal Issa and Ibrahim Sayed Ahmad
|
6 |
Li-37 |
Detection of Saliency Map as
Image Feature Outliers Using Random Projections Based Method
Robertas
Damaševičius, Rytis Maskeliūnas,
Marcin Woźniak,
Dawid Połap, Tatjana Sidekerskienė and Marcin Gabryel |
Lunch Break
(1:00 pm – 2:00 pm) |
Session 3: Machine Intelligence
(2:00 pm
– 3:45 pm) |
||
Moderators: Prof. Reda Abdel Wahab Vice –Dean Faculty of Computer and
Information Technology
Prof. Nevin Darwish x-Chair Computer Engineering Department
Computer Engineering Department ,
Cairo University |
||
No |
Ref. No. |
Paper Title/authors |
1 |
SA-90 |
Twitter Features
Distributions across Similar Labelers
Amal Abdullah
AlMansour
|
2 |
EG-23 |
Prediction of DNA Methylation
for Every CpG Loci in chromosome 18
in Embryonic stem cells using Support Vector machine
Asmaa Abo Bakr Kamel, Mai S.
Mabrouk and Mohamed Waleed Fakhr |
3 |
EG-06 |
Observations on Exploration and
Exploitation Effects on Solving Rubik's Cube Using Evolutionary Strategies
Ayman M. Abo El-Maaty and Magda B.
Fayek |
4 |
Ye-88 |
A Fuzzy
Classifier based Detection for Epileptic Seizure Signals
B. AL-Bokhity,
Dalia Nashat and T. M. Nazmy |
5 |
EG-14 |
A Stacked Generalization Method
for Disease Progression Prediction
Gamal Elkomy, Elsayed Sallam and Sherin Elgokhy |
6 |
EG-57 |
Learning the Sit-to-Stand Human
Behavior: An Inverse Optimal Control Approach
Haitham El-Hussieny, Ahmed Asker
and Omar Salah |
7 |
Le-38 |
Proposed System of ANN for
Positioning and Navigation of UAV-UGV
Moustafa M. Kurdi, Alex K. Dadykin,
Imad Elzein and Ibrahim Sayed Ahmad |
8 |
Li-127 |
Gender-Related
Differences in Brand-Related Social Media Content: An Empirical Investigation
Ligita
Zailskaitė-Jakštė and Robertas Damaševičius |
9 |
UN-31 |
A Novel Language-Adaptable Accent Reduction Software Template
Aaron Ward and Selim S. Awad |
Coffee break
|
Session 4: Control Applications and Embedded Systems
(04:00 pm – 5:45 pm) |
||
Moderators:
Prof. Ahmed Hassan, Computer
Eng. Ain Shams University
& Dr. Amr Wassal Computer Eng. Cairo University
|
||
No |
Ref.No. |
Paper Title/authors |
1 |
EG-13 |
Modeling and
Simulation of the Common Rail Fuel Injection System of the Diesel Engine
Mohamed H.
Siliman, Ahmed S.Ali, Saleh abo-Elfadl |
2 |
EG-50 |
GWOMF: Grey Wolf
Optimization for Motif Finding
Fatma Hashem,Mai
S. Mabrouk and Walid Al-Atabany |
3 |
EG-18 |
Detecting genetic
variants of Breast cancer using different power spectrum methods
Safaa M. Naeem,
Mai S. Mabrouk and Mohamed A. Eldosoky |
4 |
So-94 |
IKE Hardware
Engine Based on CAM for Concurrent Processing of
Massive User Sessions
Shimaa Abdel
Naby, Saad Arslan and HyungWon Kim |
5 |
EG-129 |
Hardware in the
Loop of Position Tracking Control of HyDraulic Servo Mechanism
Mohamed El-Sayed
M. Essa, Magdy A. S. Aboelela, M. A. Moustafa Hassan and S. M. Abdrabbo |
6 |
EG-54 |
Experimental
Nonlinear Identification of a Lab-Scale Helicopter System using MLP Neural
Network
Mohammed Moness
and Tarek Diaa-Eldeen
|
7 |
EG-10 |
Fluid Catalytic
Cracking Unit Control Using Model Predictive Control And Adaptive Neuro Fuzzy
Inference System: A Comparative Study
Mohamed Zahran,
M. E. Ammar, M. M. Ismail and M. A. Moustafa Hassan |
8 |
EG-58 |
Towards High
Accuracy Measurements for Gas Flow Rate Using Ultrasonic Devices in Oil Fields
Waleed Sayed
Khadrawy, M. M. Elsherbini, Reham S. Saad and Hala M. Abdel Kader |
Official Opening (Banquet and Honoring of Class of 2007)
(06:00 pm – 9:00
pm) |
Conference
Program (cont.)
Date
|
Thursday 28, December 2017
|
Location
|
Computer Engineering Dept. Cairo University, Giza
|
Registration
(09:00 – 09:30 am) |
||
Session 5: Image Proc. / Computer Vision and Big Data
(9:30 – 11:15 am)
|
||
Moderators:
Dr. Bassem Ibrahim
Electronic Research Institute
& Dr. Mayada Hadhoud Assistant Professor
Computer Engineering Department, Cairo University |
||
No |
Ref. No. |
Paper Title/authors |
1 |
EG-87 |
A Novel
Implementation for FastSLAM 2.0 Algorithm Based on Cloud Robotics
Shimaa S.
Ali, Abdallah Hammad and Adly S. Tag Eldien |
2 |
EG-102 |
A Reactive Fault
Tolerance Approach For Cloud Computing
Eman AbdElfattah,
Mohamed Elkawkagy and Ashraf El-Sisi |
3 |
EG-74 |
An Economic Model
for Cloud Service Composition Based on User's Preferences
Hala Hassan, Ali
El-Desoky and Abd El-Hameed Ibrahim |
4 |
EG-126 |
Concurrency Control Algorithm for Shared
Disk Cloud DBMS
Islam
Eisa and Rashid Salem |
5 |
EG-134 |
Automatic Diagnosis of Autoimmune Diseases
by Classifying HEp-2 Cells |
6 |
EG-76 |
Improving Instance Selection Methods for Big
Data Classification
Mohamed Malhat, Mohamed El Menshawy, Hamdy Mousa, and Ashraf El Sisi |
7 |
EG-111
|
Non-Uniform Quantized Huffman
Compression Technique for EEG Data
Ramez Moh. Elaskary, Mohamed Saeed and
Tawfik Ismail |
8 |
EG-92 |
Record Linkage Approaches in Big Data: A
State Of Art Study |
9 |
EG-26 |
Providing QoS in Contention Management for
Software Transactional Memory |
10 |
EG-131 |
Novel selection
policies for Container-based Cloud Deployment Models
Walid A. Hanafy,
Amr E. Mohamed and Sameh A. Salem |
|
|
Coffee Break
(11:15 – 11:30) |
Session 6: Machine Intelligence
(11:30 – 1:15) |
||
Moderators: Prof. Nevin Darwish x-Chair Computer
Engineering Department
& Prof. Amir. F. Atiya
x–Director Scientific Computation Centre
Computer Engineering Department ,
Cairo University |
||
No |
Ref. No. |
Paper Title/authors |
1 |
EG-81 |
A Data Mining Experimentation
Framework to Improve Six Sigma Projects
Ahmed F. Fahmy, Ahmed H. Yousef and
Hoda K. Mohamed |
2 |
EG-82 |
On the Use of Predictive
Analytics Techniques for Network Elements Failure Prediction in Telecom
Operators
Ahmed F. Fahmy, Ahmed H. Yousef and
Hoda K. Mohamed |
3 |
EG-17 |
Enhancing Stock
Prediction Clustering Using K-Means with Genetic Algorithm
Eslam Nader
Desokey, Amr Badr and Abdel Fatah Hegazy |
4 |
EG-46 |
Customer Churn
Prediction Model using Data Mining techniques
Ibrahim M. M.
Mitkees, Sherif M Badr and Ahmed
Ibrahim Bahgat ElSeddawy |
5 |
EG-133 |
Location Category
Classification using Tree Based Models with Novelty Discrimination
Khaled Yasser and
Elsayed Hemayed |
6 |
EG-132 |
A Novel Model
based on Non Invasive Methods for Prediction of Liver Fibrosis
Mahmoud Nasr,
Khalid El-Bahnasy, M. Hamdy and Sanaa M. Kamal |
7 |
EG-35 |
An Algorithmic
Approach for Overcoming Brain Tumor Using Swarm Robots
Mohamed Abd
Elhamid Abbas |
8 |
EG-124 |
Classification of
right and left hand movement using nonlinear analysis
Muhammed
Al-suify, Walid Al-Atabany and Mohamed.A.A.Eldosoky |
9 |
EG-97 |
Improve the Compression of
Bacterial DNA Sequence
Nour S. Bakr and Amr A. Sharawi |
10 |
EG-20 |
A New Hybrid
Approach for Document Clustering
Osama Ismael |
Lunch Break
(01:15 – 02:15) |
Session 7: Communications and Computer Networks
(02:15pm – 4:00 pm) |
Moderators: Prof. Samir Shaheen
Past-Dean Faculty of Engineering, Cairo Uni.
Prof. Ehab Ali x- Chair Computer Department, Helwan Uni. |
|
No |
Ref No |
Paper Title/authors |
1
|
EG-25 |
Optimization of
FBG Performance Parameters under Gamma Radiation and Temperature Effects
Abd El-Naser
A.Mohamed, Ahmed Nabih Zaki Rashed, Ahmed I.Elsaket, M. M. Zaky and Mohamed A.
Gaheen |
2 |
EG-114 |
Multicast
Security Model for Internet of Things Based on Context Awareness
Hussein Harb,
Ashraf William, Omayma A. El-Mohsen and Hala A. Mansour |
3 |
EG-66 |
Cooperative
Spectrum Sensing and
Clustering Schemes in CRN:A Survey
Ibrahim
Salah,
Waleed
Saad,
Mona
Shokair and Mohamed Elkordy |
4
|
EG-55 |
Energy Aware
Ad-hoc On Demand Multipath Distance Vector (EA-AOMDV)
Mahmoud M. Shawara,, Amany M.
Sarhan and Nawal A. Elfishawy |
5 |
EG-99 |
A study in WPA2
enterprise recent Attacks
Mohamed A.
Abo-Soliman and Marianne A. Azer |
6 |
EG-34 |
Robust
Pre-Authentication Protocol for Wireless Network |
7 |
EG-52 |
A
Novel Approach for
Resource Utilization and Management in SDN
Mohamed I. Hamed, Basem M.
ElHalawany, Mostafa M. Fouda and Adly S. Tag Eldien |
8 |
EG-75 |
An Adaptive Algorithm for
Channel Assignment and Load Balancing in Elastic IEEE 802.11 WLANs
Noureen Heiba,
Masoud Alghoniemy, Mohamed Elwekeil, Amr Mokhtar and Mohamed R. M. Rizk |
9 |
EG-123 |
SLUM: Smart
Location Update Mechanism for Random Mobility Model
Lamiaa Menshawy, Heba Nashaat and Rawya
Y. Rizk |
10 |
EG-67 |
A Novel Multiuser MIMO
Scheduling Technique for Limited Feedback Systems
Yasser Naguib Ahmed |
11 |
EG-71 |
A Novel Determinant Based
Transmit Antenna Selection Technique in Single User MIMO Systems
Yasser Naguib Ahmed |
12 |
EG-73 |
A
Spectrum-Sensing Decision Framework Based on Self Organized Map for Cognitive
Radio Ad Hoc Networks
Zahraa Abd
El-Hamid, Salah El Agouz, Abd El-Halim A. Zekry and Fathi E. Abd El-Samie |
Coffee Break
(4:00 – 4:15 pm)
|
Session 8: Miscellaneous
(4:15 pm – 6:00 pm) |
||
Moderators:
Prof. Ihab Talkhan Chair Computer
Engineering Department
& Dr. Khaled Ibrahim Tech.
Computer Systems Developer
Computer Engineering Department, Cairo University. |
||
No |
Ref.No. |
Paper Title/authors |
1 |
EG-95 |
High-Level Synthesis Hardware
Implementation and Verification of HEVC DCT on SoC-FPGA
Belal Mohamed, Amr Elsayed,
Omar Amin, Eslam Khafagy, Maher Abdelrasoul, Ahmed Shalaby and Mohammed S. Sayed |
2 |
EG-86 |
Using Ontology-Based Concept
Maps for Requirements Engineering: A Case Study |
3 |
EG-106 |
Happy Feet Maya plugin to
generate customized gait cycles for 3D characters
Mary Guindy and Rimon Elias |
4 |
EG-117 |
Internet of Things Security
Framework
Amira Hagag Imam and Marianne A.
Azer |
5 |
EG-119 |
Correlation Between Protocol
Selection and Packet Drop Attack Severity in Ad Hoc Networks
Mahmoud Reda and Marianne A. Azer |
6 |
EG-68 |
Efficient Microcontroller System
to Test an SRAM Chip Using Signature Analysis
Mahmoud S. Ragab , Mohamed H.
El-Mahlawy, and Emad A. El-Samahy |
7 |
EG-107 |
Design and Simulation of
Authenticated Encryption AENOTP Stream Cipher Algorithm
Mohamed Nabil Hussein, Mohamed
Helmy Megahed and Mohamed Hassan Abdel Azeem |
8 |
EG-22 |
Analysis of Faults Fixing System
Using Rough Sets: A Case Study in Large-Scale Telecommunication Company (Telecom
Egypt)
O. E. Emam, M. S. Farhan and A. A.
Abohany |
Closing Session |