Monday 19/2/2018 |
||
8:00-9:30 | Registration | |
9:30 - 11:00 | Opening Ceremony | |
11:00 - 11:45 | Keynote Speech I. Prof. Samir Shaheen |
|
11:45 - 12:15 | Break | |
12:15 - 13:00 | Keynote speech: "From Alex to Aswan: R&D Projects Supported by NTRA" Dr. Omar Nasr NTRA |
|
13:00 - 13:45 | Keynote Speech: The Road to Smart Grid with Special Reference to Developing Countries. Dr. Magdi Salama. |
|
14:00-15:00 | Industrial Session :NTRA and UMR | |
15:00 - 19:00 | Social Event: Lunch and Nile Tour | |
Tuesday 20/2/2018 |
||
8:00-10:00 | Technical WorkshopIoT Systems and Applications, iTi | |
10:00 - 10:45 | Keynote Speech: "AI, A Driving Force for the Future" Dr. Refaat Mohamed, Robotics Diverey Care Inc, USA |
|
Session I: Computer hardware and Smart Technology | ||
10:45 – 11:05 | Lower-Bound Complexity and High Performance Mechanism for Scheduling Dependent-Tasks on Heterogeneous Grids Tarek Hagras; AsmaaAtef; YousefMahdy; Jan Janecek |
|
11:05 - 11:25 | Fuzzy logic approach for airborne gravimeter power system control Mohamed Elsayed Elkattan |
|
11:25 - 11:45 | A Hybrid Moth-Flame Optimization and Extreme Learning Machine Model for Financial Forecasting Mustafa Abdul Salam; Eid Emary; Hossam M. Zawbaa |
|
11:45 - 12:05 | Economic dispatch using stochastic whale optimization algorithm FatmaAlzahra Mohamed; Karar Mahmoud; Mohamed Abdelnasser |
|
12:05 - 12:30 | Industrial Session CISCO Net Acad in Egypt |
|
12:30 - 13:30 | Lunch | |
Session II: Computer Vision and Image Processing | ||
13:30 - 13:50 | Improve Image De-blurring Nidhal Abass; Elaf Altaee; Zainalabideena Rasheed |
|
13:50 - 14:10 | Deep Visual Embedding for Image Classification Adel Saleh; Mohamed Abdelnasser; Md. Mostafa Kamal Sarker; Vivek Kumar Singh; Saddam Abdulwahab; Nasibeh Saffari; Miguel Angel Garcia; Domenec Puig |
|
14:10 - 14:30 | A Comparative Study of Classification Methods for Automatic Multimodal Brain Tumor Segmentation Moumen El-Melegy; Khaled Abo El-Magd |
|
14:30 - 14:50 | Effect of Bursty Traffic on The Performance of Heterogeneous Access Networks Ahmed Mohamed, Adel Agamy |
|
Session III: Computer Networks | ||
14:50 - 15:10 | A Survey of Internet of Things Technologies and Projects for Healthcare services Noha Mohamed; Abdelmgeid Ali; Nahla Fathy; Fatma Omara |
|
15:10 – 15:30 | Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attack Ahmed Gad |
|
15:30 - 15:50 | SOAP: SDN Overlay Across Providers For IoT Cognition Services Walaa F. Elsadek |
|
15:50 – 16:10 | Connectivity and Node Throughput Awareness for Hybrid Optical/RF Backhauling of 5G Networks Mohammed Almekhlafi; Yasmine Fahmy; Hany M. El-Sayed; Mohamed Khairy |
|
16:10 - 17:40 | Technical Session A Closer Look at CCNA R&S, Security and CyberOps , CISCO |
|
17:40- 21:00 | Technical Workshop IoT Systems and Applications, iTi |
Social Event Visiting Nubian Museum and Break |
Wednesday 21/2/2018 |
||
8:00-10:00 | Technical Workshop Job Hunting, iTi |
|
Session IV: Computer Networks | ||
10:00-10:20 | Multi-Core Optical Fiber in a Passive Optical Local Area Network Ahmed Samir; Jakup Ratkoceri; Bostjan Batagelj |
|
10:20-10:40 | Study the Effect of TCP Gaping technique in in low bandwidth networks Elsadig Gamaleldeen Karar |
|
10:40-11:00 | New Congestion Control Algorithm to Improve Computer Networks Performance Abdou Ahmed; Noha Nasrelden |
|
11:00-11:20 | Framework for Providing Context-Aware Mobile Cloud Services Rasha el Stohy; HaithamA.ElGhareeb; Nashaat E. Khamessy |
|
Session V: Computer hardware and Smart Technology | ||
11:20 - 11:40 | Providing a Transparent Dynamic Organization Technique for Efficient Aggregation of Multiple JADE Agent Platforms Hosny Abbas; Samir I. Shaheen; Mohammed Amin |
|
11:40 - 12:00 | An Approach for Big Data Security Based on Hadoop Distributed Filesystem Mohamed Khafagy; Hadeer Mahmoud; Abdelfatah Hegazy |
|
12:00 - 12:20 | Study of Hybrid Intrusion Detection System Sherine Mohamadain, Mazhar Tayel, Mohamed Rizk |
|
12:20 - 12:40 | Trust Model for Cloud Service Consumer Alshaimaa Mohammed; Ehab Morsy; Fatma Omara |
|
12:40 - 13:40 | Lunch | |
Session VI: Computer Vision and Image Processing | ||
13:40 - 14:00 | Unsupervised Patterned Fabric Defect Detection using Texture Filtering and K-Means clustering Azhar Hamdi, Mohamed M. Fouad, Mohammed S. Sayed, Mohiy M. Hadhoud |
|
14:00 - 14:20 | 3D Holographic Compression Methods for Real Time Applications Ahmed Youssef; Samia Heshmat |
|
14:20 - 14:40 | Computer Aided Diagnosis System for Skin Lesions Detection Using Texture Analysis Methods Habeba Mahmoud; Mohamed Abdelnasser; Osama A. Omer |
|
15:00 - 16:00 | Poster Session | |
Posters | ||
Effects of Threats to Accounting Information on the Credibility of Electronic Financial Reports Ahmad Fawzy ahmad |
||
Fast Channel Estimator Based on Compressive Sensing Algorithm for 1- Bit ADC MIMO-Constant Envelope Modulation Shaimaa Hussein, Hany S. Hussein, Ehab Mahmoud Mohamed |
||
High Energy Efficient (Wi-Fi/WiGig) WLAN Rehab Abdel-Raouf, Hamada Esmaiel, and Ehab Mahmoud Mohamed |
||
Li-Fi Dynamic Resource Allocation Based on Weighted Spectral Efficiency Ahmed M. Nor, Ehab Mahmoud Mohamed, Hamada Esmaiel |
||
Multivariate Fuzzy Time Series Model for Forecasting Ashraf K. Abd-Elaal |
||
Scheduling and Routing Methods Based High Speed Optical Interconnection Network Abd El-Naser A. Mohammed, Mohamed S. F. Tabbour, and Ahmed M. El-Eraki |
||
Non-Orthogonal Multiple Access (NOMA) and Millimeter Wave Performance in 5G Amir Nosseir, Abdallah Mohamed, Mahmoud Safwat, Amr Mohammed, Ibrahim Abdelmoez, Mohamed Sayed, Ahmed Abdelreheem, Hamada Esmaiel |
||
The Role Of Gender in the Perception of E-Marketing Deception and Online Consumers’ Purchasing Intentions Mamdouh A. Sabra, Aml M. Mahmoud |
||
Performance Evaluation of Matrix Multiplication on Intel Xeon E5520 Safaa O. Osman, Ghada Y. Abozaid, Mostafa I. Soliman |
||
(VMC-LEACH): Routing Protocol to Maximize Wireless Sensor Networks Throughput and Lifetime Mahmoud Aboalneel, Ayman EL-SAYED, Mohammed Abd-Elnaby |