ICENCO
2018
Program
2018
14thInternational Computer
Engineering
Conference
Computer Engineering Department
Faculty of Engineering
Cairo University
Cairo, EGYPT
"Secure Smart Societies"
December 29-30, 2018
The Conference Venue
First Day:
The conference will be held at the Four Seasons Hotel (First Residence
Giza). It is located at 35 Charli Digoul Street (Previously Mourad Street). If
you're taking a taxi, mention "Four Seasons El Giza, across Giza Zoo.
Second Day:
The conference will be held at the Computer Engineering Department Faculty
of Engineering, Cairo University, You may phone
+2-01222166568 or 02 35678981
Both Venues are shown in the map below
Conference in a Glance
08:30-09:00 am |
Registration |
09:00-09:10 am |
Soft Opening Prof. Samir Shaheen, ICENCO Chair and Past-Dean
Faculty of Engineering, Cairo University |
09:15-10:45 am |
Session 1 Image Processing and Communications |
11:00: 11:15 am |
Coffee Break |
11:15 am-01:30 pm |
Session 2 Machine Intelligence |
01:30-02:00 pm |
Lunch Break |
02:00-03:45 pm |
Session 3 Computer and Vehicular Networks |
3:45:4:00 pm |
Coffee Break |
04:00-05:45 pm |
Session 4 Big Data and Applications |
06:30–09:30 pm
|
Official Opening, Conf. Banquet and Honoring of Class 2008
Talk entitled: A Journey to The Centre Prof. Aly Gabr Professor of Architecture Past - Vice
Dean of Faculty of Engineering, Cairo University |
09:00-09:10 am |
Registration Seventh Floor |
09:15-11:15 am
|
Session 5
Software Engineering and Applications |
11:15-11:30 am
|
Coffee break |
11:30 am-1:30 pm
|
Session 6
Machine Learning and Applications |
1:20-02:30 pm
|
Lunch
|
02:30-04:30 pm
|
Session 7
Cryptography and Computer Security |
Conference Program
Date
|
Saturday 29,
December 2018
|
Location
|
Four Seasons Hotel -First Residence, Giza
|
Registration (08:30 am – 09:00 am) |
||
Soft
Opening (09:00 am – 09:10 am)
Prof. Samir Shaheen Past-Dean Faculty of Engineering, Cairo University Conference Chair |
||
Session 1: Image Processing and
Communications (09:15 am – 11:00 am) |
||
Moderators: Prof. Magda Fayek . & Prof. Omar Karam
Dean of Informatics& Computer Science, BUC |
||
N0 |
Code |
Paper Title/authors |
1 |
11 |
Fusion-based Resolution Enhancement of
Satellite Images: Comparative Study and Performance Evaluation |
2 |
19 |
CPRI Data Compression Using Non-Uniform
Quantized Huffman Technique in C-RAN |
3 |
45 |
Improving LSB Audio Steganography Using
Simulated Annealing for Satellite Telemetry |
4 |
56 |
A Comparative Study Among Various
Algorithms for Lossless Airborne LiDAR Data Compression |
Coffee Break (11:00: 11:15 am) |
Session 2: Machine Intelligence (11:15 am– 01:15 pm) |
||
Moderators: Prof. Nevin Darwish
& Dr. Abdel
Monem Baiomy Assistant Professor Computer Engineering
Department, Cairo University |
||
N0 |
code |
Paper Title/authors |
1 |
10 |
The Concept of an Artificial Neural
Network for the Classification of Atheromous Plaques from Digitized Segmented
Histological Image |
3 |
30 |
A Comparative
Performance Study of Naďve and Ensemble Algorithms for E-commerce |
4 |
36 |
Adaptive Speech Synthesis and training
using low-cost AI Computing |
5 |
49 |
Computer-aided Systematic Business
Process Management: Case Study of PG ProgramAmjad |
6 |
51 |
An Innovative Word Encoding Method For
Text Classification Using Convolutional Neural Network |
7 |
67 |
A Gaming Environment to Train Teachers
Diagnose Children Learning Disabilities |
Lunch Break
(1:15
pm – 2:00 pm) |
Session 3: Computer
and vehicular Networks
(2:00 pm –
3:45 pm) |
||
Moderators: Prof. Samir Shaheen / Prof. Hoda Baraka Computer Engineering
Department , Cairo University |
||
N0 |
Code |
Paper Title/authors |
1 |
4 |
Undetectable
Tapping Methods for Gigabit Passive Optical Network (GPON) |
2 |
21 |
Adaptive Context Aware
Cross-layer Vertical Handover in Heterogeneous Networks |
3 |
24 |
An Improved
Energy-Efficient Directed Diffusion Routing Protocol for Wireless Sensor
Network |
4 |
46 |
An End-user Microservice-Based
Lightweight Architecture for IoT |
5 |
57 |
Performance
Comparison of Multicast Protocols in Mobile Social Networks |
6 |
89 |
Finger Printing of Engine Control Units
by Using Frequency Response for Secure In-Vehicle Communication |
Coffee break |
Session 4: Big
Data and Applications
(04:00 pm – 5:45 pm) |
||
Moderators:
Prof. Amr Wassal / Dr. Ahmed Kaseb Computer
Engineering Department , Cairo
University |
||
N0 |
Code |
Paper Title/authors |
1 |
12 |
A New Game
Theory Approach for Noise Reduction in Cognitive Radio Network |
2 |
40 |
A New Automated Big Data Partitioning Approach to Improve
Condensation Methods Performance |
3 |
50 |
Automatic Diagnosis of Asphyxia Infant Cry Signals Using Wavelet
Based Mel Frequency Cepstrum Features , and Eman Mohamed Marzook |
4 |
73 |
An Enhanced Registration and Display Algorithm for Medical
Augmented Reality |
Official Opening, Conf. Banquet and Honoring of Class 2008
Talk entitled: A Journey to The Centre Prof. Aly H. Gabr Professor of Architecture Past-Vice Dean of Faculty of Engineering. Cairo
University |
`
Conference Program
(cont.)
Date
|
Sunday 30, December 2018
|
Location
|
Computer Engineering Dept. Cairo University, Giza
|
Registration (09:00 – 09:30 am)
|
||
Session
5: Software Engineering and Applications
(9:30 – 11:15 am)
|
||
Moderators: Dr. Ahmed Hamdy Dr. Khaled Soradi Computer
Engineering Department, Cairo University |
||
N0 |
Code |
Paper Title/authors |
1 |
17 |
Overlapping Factor Effect on the
Prototype Filter Response Proposed For FBMC Transmultiplexer System |
2 |
31 |
Pattern
Search for Closed-loop Parameter Estimation of Two Wheel Inverted Pendulum
System |
3 |
39 |
A New
Approach for Treating a Time Delay System: A State Space Approach |
4 |
47 |
Generalization
of Third-Order Low Pass Filters to the Fractional-Order Domain with
Experimental Results |
5 |
99 |
Reducing RFID Data Uncertainty using Mean
Field Variational Inference |
6 |
121 |
Implementation for EEA3 algorithm Based on 3GPP
Standard |
7 |
127 |
A Reliability-based Stopping Criterion for Turbo
Product Codes |
8 |
146 |
Comparative robustness study of
multivariable controller of fixed wing Ultrastick25-e UAV |
|
|
Coffee Break
(11:15 – 11:30) |
Session
6: Machine Learning and Applications
(11:30 – 1:15) |
||
Moderators: Prof. Nevin Darwish x-Chair Computer
Engineering Department & Prof. Amir. F.
Atiya x–Director Scientific
Computation Centre Computer Engineering
Department , Cairo University |
||
N0 |
Code |
Paper Title/authors |
1 |
32 |
Design and Implementation of a prototype
robotic system for medical ultrasound diagnosis |
2 |
72 |
Improving Standard Progressive Multiple
Sequence Alignment by Using Multithreading Techniques |
3 |
75 |
A Text Mining Approach for Automatic
Selection of Academic Course Topics based on Course Specifications |
4 |
87 |
Control of Hardware Implementation of
Hydraulic Servo Application Based on Adaptive Neuro Fuzzy Inference System |
5 |
105 |
Sentiment Analysis of Social Media
Networks Using Machine Learning |
6 |
108 |
Twitter Sentiment Analysis using Deep
Neural Network |
7 |
110 |
Ontology Learning Based on Word
Embeddings for Text Big Data Extraction |
8 |
119 |
Parametric
Fault Detection of Analogue Circuits Based on Optimized Support Vector
Machine Classifier |
9 |
142 |
A Multi Linear Regression Approach for
Handling Missing Values with Unknown Dependent Variable (MLRMUD) |
10 |
148 |
Modeling and Simulation Synthesis for an
Air-to-Air Guided Missile |
11 |
152 |
Accuracy Enhancement Scaling Factor of
Viola-Jones Using Genetic Algorithms |
Lunch Break
(01:15 – 02:00) |
Session 7: Cryptography and Computer Security (02:00 pm – 4:00 pm) |
Moderators: Prof. Samir Shaheen Prof. Hoda Baraka Computer Engineering
Department, Cairo University. |
|
N0 |
Code |
Paper Title/authors |
1
|
41 |
A Secure Privacy-Preserving Mutual
Authentication Scheme for Publish-Subscribe Fog Computing |
2 |
59 |
Energy Efficient Smart Wireless Sensor
Network for Border Monitoring |
3 |
64 |
SCIQ-CD: A Secure Scheme to Provide
Confidentiality and Integrity of Query results for Cloud Databases |
4
|
66 |
Applying
Blockchain to automate installments payment between Supply Chain Parties |
5 |
86 |
C2S, a New Cryptographic Command Set for
Smart Card Operating System |
6 |
88 |
Malware
Incident Handling and Analysis Workflow |
7 |
90 |
Web Application API Blind Denial of
Service Attacks |
8 |
124 |
Anonymous
Routing Protocols in MANETs, a Security Comparative Analysis |
9 |
151 |
Group Mobility-Based Optimization of
Cache Content in Wireless Device-to-Device Networks |
|
|
Closing Session |