default search action
ICCA 2023: Cairo, Egypt
- International Conference on Computer and Applications, ICCA 2023, Cairo, Egypt, November 28-30, 2023. IEEE 2023, ISBN 979-8-3503-0325-4
- Mona Helmy, Kerolos Khalil, Omar Mohamed, Breksam Amr, Aly Mohamed, Amr Amin, Ammar Yasser, Tasneem Essmat, Youssef Hussien:
Vehicle-to-grid Technology in AUTOSAR for Electric Vehicles. 1-6 - Ahmed J. O. Ahmed, Ahmed Babiker, Ali Elhag, Mohamed Drar:
Real-Time Agricultural Monitoring with Agrobot: A Raspberry Pi and YOLO Based Solution. 1-5 - Shatha Iskandar, Zahraa Jaara, Mohamad Abou Ali, Fatima Sbeity, Abdallah Kassem, Lara Hamawy:
Eye Tracking System Using Convolutional Neural Network. 1-6 - Mohammad Qbea'h, Jameela Alkaabi, Shamma Almansouri, AlMaha Alneyadi, Mouza Alderei:
Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations. 1-5 - Kingsley C. Nwosu, Isaac Olusegun Osunmakinde:
An Architectural Design for the Use of Artificial Intelligence and Biometrics to Harden Campus Environments to Mitigate Mass Shooting Incidents. 1-7 - Hesham M. Moneer, Reham H. Elnabawy, Seif Eldawlatly:
Enhancing Facial Recognition in Visual Prostheses using Region of Interest Magnification and Caricaturing. 1-5 - Ismail A. Mageed:
The Consistency Axioms of The Stable M/G/1 Queue's Za, b Non-Extensive Maximum Entropy Formalism with M/G/1 Theory Applications to 6G Networks and Multimedia Applications. 1-6 - George E. Raptis, Christina P. Katsini:
Transforming Ideas into Code: A Novel Approach to Design-to-Development Workflow. 1-6 - Abir Ghannem, Emily Francis, Hajer Nabli, Layth Sliman, Raoudha Ben Djemaa:
Fuzzy FCA-based Elderly Activity Recognition. 1-6 - Omar Attia, Ahmed Dahroug, Abdel Fattah Hegazy:
A Proposed Model for Enhancing Product Recommendation Based on Word Embedding. 1-6 - Christian Chandra Kusuma, Galang Nurbudi Utomo, Jessica Hidayat, Nathalia Chandra, Putu Agus Parimartha, Kartika Purwandari:
Revolutionizing Indonesian Farming Application through Knowledge-Sharing and Collaboration. 1-6 - Maamar Bougherara, Amara Rafik:
Routing Using Genetic Algorithm in Network on Chips with 3D Mesh Topology. 1-5 - Elio Aoun, Mohamad Abou Ali, Abdallah Kassem, Mustapha Hamad:
ML Based Apple Leaf Disease Detection. 1-8 - Kartika Purwandari, Ajeng Wulandari, Noviyanti Tri Maretta, Sharlene Regina, Vincent:
Implementation of AI Model for Sentiment Analysis of Pharmaceutical Products. 1-6 - Ahmad AlRemaihi, Jihad Mohamad Al Ja'am, Kyle Lachini:
Exploring the Effectiveness of Haptic Machine for Children with Learning Difficulties. 1-8 - Maamar Bougherara, Amara Rafik:
Application Mapping Onto Network on Chip Using Genetic Algorithm and Ant Colony Optimisation. 1-6 - Fadi Dornaika, Jihad Mohamad Al Ja'am, Alireza Bosaghzadeh, Zoulfikar Ibrahim, Nagore Barrena:
Scalable Semi-Supervised Learning through Combined Anchor-based Graph and Flexible Manifold Embedding. 1-6 - Samson Otieno Ooko, Grace Kwagalakwe, Lossan Bonde:
An Evaluation of Machine Learning Techniques for Crop Detection from Garden Images. 1-6 - Mona Helmy, Mohamed Taher, Marwan Abdelhakem, Alaa Medhat, Moatsm Tarek, Aya Talla Tarek, Mustafa Amer, Moaz Ayman Mokhtar, Muhammad Ahmad:
Securing ISO 15118 Communication in Electric Vehicles using Real-Time Monitoring and Vehicle-to-Grid Sniffer. 1-5 - Omar Fahmy Hafez, Ann Nosseir, Gerard T. McKee, Samir Abou El-Seoud:
The Features of Students Paying and Not Paying Attention in Online Classes. 1-7 - Mohamed Adel ElBahaay, Tamer Arafa, Nashwa Abdelbaki:
Unsupervised Anomaly Detection for Throughput Enhancement in Mobile Networks. 1-6 - Nuwinda Kodikara, Golnaz Shahtahmassebi:
Predicting Potential Customers in Direct Marketing Using Uplift Modelling and Advanced Machine Learning. 1-6 - Ibrahim Mohammed Saeed, Musab Ahmed Eltaema, Ghieth Alrahman Sulieman Eldie, Hassan Tarig Mohamed, Hiba Omer Ahmed, Musab Elkheir Salih Hamad:
Development of 3-Channel 12-Lead ECG Monitoring Device with Telemedicine Integration using AD8232. 1-8 - Deven Panchal, Isilay Baran, Dan Musgrove, David Lu:
From Models to Microservices: Easily Operationalizing Machine Learning models. 1-5 - Mohamed R. Shoaib, Heba M. Emara, Jun Zhao:
A Survey on the Applications of Frontier AI, Foundation Models, and Large Language Models to Intelligent Transportation Systems. 1-7 - Meriam Sherif, Nahla H. Barakat, Abeer Hamdy:
Adaptive Learning and Virtual Reality based Conceptual Framework for Dental Training. 1-6 - Mohamed Diab, Zaky B. Nossair, Hesham Badr:
An Improved Intelligent Cognitive Radio Spectrum Sensing System using Concept Bottleneck and Deep Learning Models. 1-5 - Abdullah Almutairi, Danda B. Rawat:
Complementary Model Fusion for Enhanced Social Popularity Prediction. 1-7 - Wanyi Li, Xiaokun Wu, Keqing Deng:
Construction of Animal Protection Science Education System (APSES) Based on Unity3D. 1-6 - Akli Abbas, Nourredine Oukas, Samia Haboussi, Mourad Amad:
A Novel Energy-Efficient Hierarchical Routing Protocol (EEHRP) for IoT Networks Using K-Means Machine Learning. 1-6 - Abdel-Razzak Merheb, Michel Issa, Hamza Assaad, Ahmad Haddad:
Revisiting Analog Flight Simulators: Simulation and Implementation of an Analog Simulator for Quadcopters. 1-6 - Engy Samir El-Shaer, Gerard T. McKee, Abeer Hamdy:
A Hybrid LSTM and Probabilistic Model for Modeling Repeat Purchase Behavior. 1-6 - Ismail A. Mageed:
Uniqeneness of The Time-Dependent Controller's Designed Parameter (TDCDP) of Fokker Planck Kolmogorov(FPK) Probability Density Function(PDF) with Applications of Lambert W Function to Number Theory, Quantum Computing and Bitcoin Protocols. 1-6 - Mau-Luen Tham, Ting Hong Cham, Ban-Hoe Kwan:
Detecting Non-Injured and Injured Humans in Thermal Imaging using YOLOv8. 1-5 - George E. Raptis, Vasilis Theodorou, Christina P. Katsini:
Towards Evaluating Image Recommendations in Digital News and Media Ecosystem. 1-6 - Wenhan Yu, Jun Zhao:
Quantum Multi-Agent Reinforcement Learning as an Emerging AI Technology: A Survey and Future Directions. 1-7 - Rayane ElRabaa, Soha Rawas, Ali El-Zaart:
Unlocking the Potential of Naïve Bayes for Network Intrusion Detection: A RandomForest-Driven Feature Selection Strategy. 1-7 - Eunbi Ko, Guk Sik Jeong, Kyoung Cheol Koo:
Smart City Service Analysis Based on Geospatial Information Technology Life Cycle. 1-5 - Enock Tafadzwa Chekure, Peter Freere:
Four Points that Provide a Solution in Railway Line Detection and Tracking. 1-11 - Lolwa Hassan Alnuaimi, Jihad Mohamad Al Ja'am:
Preventing Fraud in E-tickets Validation Using The 2FA Approach. 1-5 - Lina Benchikh, Lemia Louail, Assala Nacef:
Solving Energy Routing problems in Energy Internet using Genetic Algorithm. 1-6 - Assala Nacef, Lemia Louail, Djamila Mechta, Lina Benchikh, Saad Harous:
Simulated Annealing for Optimal Path Selection and Scheduling in Energy Routing for Smart Grids. 1-5 - Basant Ali Sayed, Ahmed Sharaf Eldin, Doaa Saad Elzanfaly, Amr S. Ghoneim:
A Comprehensive Review of Breast Cancer Early Detection Using Thermography and Convolutional Neural Networks. 1-6 - Samson Otieno Ooko, Jimmy Nsenga:
Tiny Machine Learning (TinyML) Based Self Diagnostic Kit for Respiratory Diseases. 1-6 - Ayah Abo El Rejal, Andreas Pester, Khaled Nagaty:
Tiny Machine Learning for Underwater Image Enhancement: Pruning and Quantization Approach. 1-6 - Samar Mahmoud, Yasmine Arafa, Maha Abdelmohsen:
Dynamic Image Representations for Crowd Anomaly Detection using Generative Adversarial Networks. 1-6 - Anish Kadamathikuttiyil Karthikeyan Pillai, Ashley Ellis, Helkier Henrique Rossato, Enda Fallon:
Real-time Tablet Inspection using Computer Vision for Blister Packing Machines. 1-6 - Moshira A. Ebrahim, Gamal A. Ebrahim, Hoda K. Mohamed:
A Dual-Critic Deep Deterministic Policy Gradient Approach for Task Offloading in Edge-Fog-Cloud Environment. 1-6 - Ramadhan Ihsani Yulfa, Benediktus Hengki Setiawan, Gerry Gilbert Lourensius, Kartika Purwandari:
Enhancing Hate Speech Detection in Social Media Using IndoBERT Model: A Study of Sentiment Analysis during the 2024 Indonesia Presidential Election. 1-6 - Shehab Eldeen Ayman Mounir, Samir Abou El-Seoud, Khaled Nagaty, Omar H. Karam:
The Influence of ChatGPT on Student Learning and Academic Performance. 1-5 - Obsa Sandaba, Mousa Al-Kfairy:
Instashoppers Users' Concerns in UAE: Trust and Security Issues. 1-5 - Stylianos Vazaios, Andreas Mallas, Michalis Xenos:
Eye-Tracking Based Automatic Summarization of Lecture Slides. 1-7 - Wadha Alyammahi, Saed Alrabaee:
SES: Smart Education System. 1-4 - Maha Abdelmohsen, Yasmine Arafa, Samar Mahmoud:
Jammo-VRobot: A Cost-Effective Solution for Social Skills Training Programme for Children with High-Functioning Autism. 1-6 - Mohamed R. Shoaib, Zefan Wang, Milad Taleby Ahvanooey, Jun Zhao:
Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models. 1-7 - Abdel-Razzak Merheb, Yahya Bazzaz, Ward Trad, Ahmad Haddad:
Development of a Free Fall Drone for Firefighting Applications. 1-6 - Ali Kalakech, Mohamad Bakir, Riad Youssef:
Coverage and Cell Capacity optimization in Private LTE network based on Position and Expected Channel Knowledge. 1-6 - Fadi Dornaika, Abdullah Baradaaji, Jinan Charafeddine:
Semi-supervised Classification through Data and Label Graph Fusion. 1-6 - Cherine Mohamed, Abeer Hamdy:
Comparison of Transformer-based Architectures for Product Categorization. 1-5 - Mena Nagy A. Khalaf, Taysir Hassan A. Soliman, Sara Salah Mohamed:
ROD-WGAN hybrid: A Generative Adversarial Network for Large-Scale Protein Tertiary Structures. 1-6 - Krishna D. Jadhav:
Architectures, Opportunities, and Challenges in Emerging Technologies of 6G. 1-4 - Jamshaid Iqbal Janjua, Sidra Zulfiqar, Tahir Abbas Khan, Sadaqat Ali Ramay:
Activation Function Conundrums in the Modern Machine Learning Paradigm. 1-8 - Ismail A. Mageed:
A Unified Information Data Length (IDL) Theoretic Approach to Information- Theoretic Pathway Model Queueing Theory (QT) with Rényi entropic applications to Fuzzy Logic. 1-6 - Nourredine Oukas, Menouar Boulif, Akli Abbas, Kahina Bahmed, Yasmine Mosteghanemi:
Mitigating Jamming Attacks in IoT RF-Devices through Dynamic Channel Hopping: A Novel Petri-nets Formulation. 1-6 - Eunbi Ko, Guk Sik Jeong, Kyoung Cheol Koo:
Smart City Based on Geospatial Information: Concept and Standardization Challenges. 1-5 - Ismail A. Mageed:
Fractal Dimension (Df) of Ismail's Fourth Entropy (HIV⁽q,a1, a2,..,ak⁾) with Fractal Applications to Algorithms, Haptics, and Transportation. 1-6 - Zeina Swilam, Abeer Hamdy, Andreas Pester:
Cross-Language Code Clone Detection Using Abstract Syntax Tree and Graph Neural Network. 1-5 - Heba Jabbar Hassan, Mousa K. Wali, Mohamed Ibrahim Shujaa:
Hybrid of DCT And PCA For Image Size Compression. 1-8 - Saleh Alhazbi:
Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation. 1-4 - Tahir Abbas, Jamshaid Iqbal Janjua, Muhammad Irfan:
Proposed Agricultural Internet of Things (AIoT) Based Intelligent System of Disease Forecaster for Agri-Domain. 1-6 - Mona Helmy, Mohamed Mahmoud:
Enhanced Multi-Level Secure Over-the-Air Update System using Adaptive AUTOSAR. 1-4 - Laila Hammam, Hani Ghali, Gamal A. Ebrahim, Hany Ayad Bastawrous:
An Optimized Plant Disease Detection Convolutional Neural Network for Future Hardware Implementation. 1-5 - Ismail A. Mageed:
Fractal Dimension(Df) Theory of Ismail's Second Entropy(Hq I) with Potential Fractal Applications to ChatGPT, Distributed Ledger Technologies(DLTs) and Image Processing(IP). 1-6 - Ramez Yousri, Soha Safwat:
How Big Can It Get? A comparative analysis of LLMs in architecture and scaling. 1-5 - Deepthi Amuru, Andleeb Zahra, Varnika Karakuram, Zia Abbas:
Design of Approximate Full Adders for Error Resilient Applications. 1-6 - Aleksandra Kuzior, Katarzyna Postrzednik-Lotko, Jacek Pradela:
Social Challenges Resulting from the Implementation of Technical Solutions in Smart Cities. 1-5 - Ikhlas Mastour, Layth Sliman, Benoit Charroux, Raoudha Ben Djemaa, Kamel Barkaoui:
Privacy-preserving Collaborative Computation: Methods, Challenges and Directions. 1-6 - Esraa H. Ali, Sawsan Sadek, Zaid F. Makki:
Novel Improved Fuzzy C-means Clustering for MR Image Brain Tissue Segmentation to Detect Alzheimer's Disease. 1-6 - Haotian Rao, João Paulo Ponciano, Muhammad Ali Imran, Ahmad Taha:
Evaluation of Network Performance Based on Structured Geometric Topologies. 1-6 - Sara Farag, Nahla H. Barakat:
Data and Model Centric Approaches for Card Fraud Detection. 1-6 - Nadine Farag, Samy S. Ghoniemy, Omar H. Karam:
Enhanced Semantic-based Chaotic System for Cyber-grooming Classification and Harassment Detection. 1-10 - Reyam Magdy Elshiny, Abeer Hamdy:
Automatic Question Generation Using Natural Language Processing and Transformers. 1-6 - Mona Helmy, Amr Mohsen:
Vehicle-to-Cloud System New Architecture based on Adaptive AUTOSAR, VSS, and VISS. 1-4 - Sardar Anisul Haque, Ali Jaoua, Jihad Mohamad Al Ja'am, Hafeez Ur Rehman:
Reducing a 3-SAT Instance to a Set of 2-SAT Instances Using the Idea of Set Covering Problem. 1-3 - Mona Helmy, Youssef Essam, Sara Khaled, Omar Khaled, Omar Moataz:
Design and Implementation of Digital Twin V2X System of Broken Vehicle. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.