


default search action
ICCA 2023: Cairo, Egypt
- International Conference on Computer and Applications, ICCA 2023, Cairo, Egypt, November 28-30, 2023. IEEE 2023, ISBN 979-8-3503-0325-4

- Mona Helmy, Kerolos Khalil, Omar Mohamed, Breksam Amr, Aly Mohamed, Amr Amin, Ammar Yasser, Tasneem Essmat, Youssef Hussien:

Vehicle-to-grid Technology in AUTOSAR for Electric Vehicles. 1-6 - Ahmed J. O. Ahmed, Ahmed Babiker, Ali Elhag, Mohamed Drar

:
Real-Time Agricultural Monitoring with Agrobot: A Raspberry Pi and YOLO Based Solution. 1-5 - Shatha Iskandar, Zahraa Jaara, Mohamad Abou Ali

, Fatima Sbeity, Abdallah Kassem, Lara Hamawy:
Eye Tracking System Using Convolutional Neural Network. 1-6 - Mohammad Qbea'h

, Jameela Alkaabi, Shamma Almansouri, AlMaha Alneyadi, Mouza Alderei:
Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations. 1-5 - Kingsley C. Nwosu

, Isaac Olusegun Osunmakinde:
An Architectural Design for the Use of Artificial Intelligence and Biometrics to Harden Campus Environments to Mitigate Mass Shooting Incidents. 1-7 - Hesham M. Moneer, Reham H. Elnabawy, Seif Eldawlatly

:
Enhancing Facial Recognition in Visual Prostheses using Region of Interest Magnification and Caricaturing. 1-5 - Ismail A. Mageed:

The Consistency Axioms of The Stable M/G/1 Queue's Za, b Non-Extensive Maximum Entropy Formalism with M/G/1 Theory Applications to 6G Networks and Multimedia Applications. 1-6 - George E. Raptis, Christina P. Katsini:

Transforming Ideas into Code: A Novel Approach to Design-to-Development Workflow. 1-6 - Abir Ghannem, Emily Francis, Hajer Nabli

, Layth Sliman
, Raoudha Ben Djemaa:
Fuzzy FCA-based Elderly Activity Recognition. 1-6 - Omar Attia, Ahmed Dahroug

, Abdel Fattah Hegazy:
A Proposed Model for Enhancing Product Recommendation Based on Word Embedding. 1-6 - Christian Chandra Kusuma, Galang Nurbudi Utomo, Jessica Hidayat, Nathalia Chandra, Putu Agus Parimartha, Kartika Purwandari:

Revolutionizing Indonesian Farming Application through Knowledge-Sharing and Collaboration. 1-6 - Maamar Bougherara

, Rafik Amara:
Routing Using Genetic Algorithm in Network on Chips with 3D Mesh Topology. 1-5 - Elio Aoun, Mohamad Abou Ali

, Abdallah Kassem, Mustapha Hamad:
ML Based Apple Leaf Disease Detection. 1-8 - Kartika Purwandari, Ajeng Wulandari, Noviyanti Tri Maretta, Sharlene Regina

, Vincent
:
Implementation of AI Model for Sentiment Analysis of Pharmaceutical Products. 1-6 - Ahmad AlRemaihi, Jihad Mohamad Al Ja'am, Kyle Lachini:

Exploring the Effectiveness of Haptic Machine for Children with Learning Difficulties. 1-8 - Maamar Bougherara

, Rafik Amara:
Application Mapping Onto Network on Chip Using Genetic Algorithm and Ant Colony Optimisation. 1-6 - Fadi Dornaika, Jihad Mohamad Al Ja'am, Alireza Bosaghzadeh, Zoulfikar Ibrahim, Nagore Barrena:

Scalable Semi-Supervised Learning through Combined Anchor-based Graph and Flexible Manifold Embedding. 1-6 - Samson Otieno Ooko

, Grace Kwagalakwe, Lossan Bonde:
An Evaluation of Machine Learning Techniques for Crop Detection from Garden Images. 1-6 - Mona Helmy, Mohamed Taher, Marwan Abdelhakem, Alaa Medhat, Moatsm Tarek, Aya Talla Tarek, Mustafa Amer, Moaz Ayman Mokhtar, Muhammad Ahmad:

Securing ISO 15118 Communication in Electric Vehicles using Real-Time Monitoring and Vehicle-to-Grid Sniffer. 1-5 - Omar Fahmy Hafez, Ann Nosseir, Gerard T. McKee, Samir Abou El-Seoud:

The Features of Students Paying and Not Paying Attention in Online Classes. 1-7 - Mohamed Adel ElBahaay, Tamer Arafa, Nashwa Abdelbaki:

Unsupervised Anomaly Detection for Throughput Enhancement in Mobile Networks. 1-6 - Nuwinda Kodikara, Golnaz Shahtahmassebi

:
Predicting Potential Customers in Direct Marketing Using Uplift Modelling and Advanced Machine Learning. 1-6 - Ibrahim Mohammed Saeed, Musab Ahmed Eltaema, Ghieth Alrahman Sulieman Eldie, Hassan Tarig Mohamed, Hiba Omer Ahmed, Musab Elkheir Salih Hamad:

Development of 3-Channel 12-Lead ECG Monitoring Device with Telemedicine Integration using AD8232. 1-8 - Deven Panchal

, Isilay Baran, Dan Musgrove, David Lu:
From Models to Microservices: Easily Operationalizing Machine Learning models. 1-5 - Mohamed R. Shoaib, Heba M. Emara, Jun Zhao:

A Survey on the Applications of Frontier AI, Foundation Models, and Large Language Models to Intelligent Transportation Systems. 1-7 - Meriam Sherif

, Nahla H. Barakat
, Abeer Hamdy
:
Adaptive Learning and Virtual Reality based Conceptual Framework for Dental Training. 1-6 - Mohamed Diab

, Zaky B. Nossair, Hesham Badr:
An Improved Intelligent Cognitive Radio Spectrum Sensing System using Concept Bottleneck and Deep Learning Models. 1-5 - Abdullah Almutairi, Danda B. Rawat:

Complementary Model Fusion for Enhanced Social Popularity Prediction. 1-7 - Wanyi Li, Xiaokun Wu, Keqing Deng:

Construction of Animal Protection Science Education System (APSES) Based on Unity3D. 1-6 - Akli Abbas

, Nourredine Oukas, Samia Haboussi, Mourad Amad:
A Novel Energy-Efficient Hierarchical Routing Protocol (EEHRP) for IoT Networks Using K-Means Machine Learning. 1-6 - Abdel-Razzak Merheb, Michel Issa, Hamza Assaad, Ahmad Haddad:

Revisiting Analog Flight Simulators: Simulation and Implementation of an Analog Simulator for Quadcopters. 1-6 - Engy Samir El-Shaer, Gerard T. McKee, Abeer Hamdy:

A Hybrid LSTM and Probabilistic Model for Modeling Repeat Purchase Behavior. 1-6 - Ismail A. Mageed:

Uniqeneness of The Time-Dependent Controller's Designed Parameter (TDCDP) of Fokker Planck Kolmogorov(FPK) Probability Density Function(PDF) with Applications of Lambert W Function to Number Theory, Quantum Computing and Bitcoin Protocols. 1-6 - Mau-Luen Tham, Ting Hong Cham, Ban-Hoe Kwan:

Detecting Non-Injured and Injured Humans in Thermal Imaging using YOLOv8. 1-5 - George E. Raptis, Vasilis Theodorou

, Christina P. Katsini:
Towards Evaluating Image Recommendations in Digital News and Media Ecosystem. 1-6 - Wenhan Yu, Jun Zhao:

Quantum Multi-Agent Reinforcement Learning as an Emerging AI Technology: A Survey and Future Directions. 1-7 - Rayane ElRabaa

, Soha Rawas
, Ali El-Zaart:
Unlocking the Potential of Naïve Bayes for Network Intrusion Detection: A RandomForest-Driven Feature Selection Strategy. 1-7 - Eunbi Ko, Guk Sik Jeong, Kyoung Cheol Koo:

Smart City Service Analysis Based on Geospatial Information Technology Life Cycle. 1-5 - Enock Tafadzwa Chekure, Peter Freere:

Four Points that Provide a Solution in Railway Line Detection and Tracking. 1-11 - Lolwa Hassan Alnuaimi, Jihad Mohamad Al Ja'am:

Preventing Fraud in E-tickets Validation Using The 2FA Approach. 1-5 - Lina Benchikh, Lemia Louail

, Assala Nacef:
Solving Energy Routing problems in Energy Internet using Genetic Algorithm. 1-6 - Assala Nacef, Lemia Louail

, Djamila Mechta, Lina Benchikh, Saad Harous
:
Simulated Annealing for Optimal Path Selection and Scheduling in Energy Routing for Smart Grids. 1-5 - Basant Ali Sayed, Ahmed Sharaf Eldin, Doaa Saad Elzanfaly, Amr S. Ghoneim

:
A Comprehensive Review of Breast Cancer Early Detection Using Thermography and Convolutional Neural Networks. 1-6 - Samson Otieno Ooko

, Jimmy Nsenga:
Tiny Machine Learning (TinyML) Based Self Diagnostic Kit for Respiratory Diseases. 1-6 - Ayah Abo El Rejal, Andreas Pester

, Khaled Nagaty:
Tiny Machine Learning for Underwater Image Enhancement: Pruning and Quantization Approach. 1-6 - Samar Mahmoud, Yasmine Arafa, Maha Abdelmohsen:

Dynamic Image Representations for Crowd Anomaly Detection using Generative Adversarial Networks. 1-6 - Anish Kadamathikuttiyil Karthikeyan Pillai, Ashley Ellis, Helkier Henrique Rossato, Enda Fallon

:
Real-time Tablet Inspection using Computer Vision for Blister Packing Machines. 1-6 - Moshira A. Ebrahim, Gamal A. Ebrahim

, Hoda K. Mohamed:
A Dual-Critic Deep Deterministic Policy Gradient Approach for Task Offloading in Edge-Fog-Cloud Environment. 1-6 - Ramadhan Ihsani Yulfa, Benediktus Hengki Setiawan, Gerry Gilbert Lourensius, Kartika Purwandari:

Enhancing Hate Speech Detection in Social Media Using IndoBERT Model: A Study of Sentiment Analysis during the 2024 Indonesia Presidential Election. 1-6 - Shehab Eldeen Ayman Mounir, Samir Abou El-Seoud, Khaled Nagaty, Omar H. Karam:

The Influence of ChatGPT on Student Learning and Academic Performance. 1-5 - Obsa Sandaba, Mousa Al-Kfairy:

Instashoppers Users' Concerns in UAE: Trust and Security Issues. 1-5 - Stylianos Vazaios, Andreas Mallas, Michalis Xenos:

Eye-Tracking Based Automatic Summarization of Lecture Slides. 1-7 - Wadha Alyammahi, Saed Alrabaee:

SES: Smart Education System. 1-4 - Maha Abdelmohsen, Yasmine Arafa, Samar Mahmoud:

Jammo-VRobot: A Cost-Effective Solution for Social Skills Training Programme for Children with High-Functioning Autism. 1-6 - Mohamed R. Shoaib, Zefan Wang, Milad Taleby Ahvanooey

, Jun Zhao:
Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models. 1-7 - Abdel-Razzak Merheb, Yahya Bazzaz, Ward Trad, Ahmad Haddad:

Development of a Free Fall Drone for Firefighting Applications. 1-6 - Ali Kalakech, Mohamad Bakir, Riad Youssef:

Coverage and Cell Capacity optimization in Private LTE network based on Position and Expected Channel Knowledge. 1-6 - Fadi Dornaika, Abdullah Baradaaji

, Jinan Charafeddine
:
Semi-supervised Classification through Data and Label Graph Fusion. 1-6 - Cherine Mohamed, Abeer Hamdy

:
Comparison of Transformer-based Architectures for Product Categorization. 1-5 - Mena Nagy A. Khalaf

, Taysir Hassan A. Soliman, Sara Salah Mohamed:
ROD-WGAN hybrid: A Generative Adversarial Network for Large-Scale Protein Tertiary Structures. 1-6 - Krishna D. Jadhav:

Architectures, Opportunities, and Challenges in Emerging Technologies of 6G. 1-4 - Jamshaid Iqbal Janjua

, Sidra Zulfiqar, Tahir Abbas Khan, Sadaqat Ali Ramay:
Activation Function Conundrums in the Modern Machine Learning Paradigm. 1-8 - Ismail A. Mageed:

A Unified Information Data Length (IDL) Theoretic Approach to Information- Theoretic Pathway Model Queueing Theory (QT) with Rényi entropic applications to Fuzzy Logic. 1-6 - Nourredine Oukas, Menouar Boulif, Akli Abbas

, Kahina Bahmed, Yasmine Mosteghanemi:
Mitigating Jamming Attacks in IoT RF-Devices through Dynamic Channel Hopping: A Novel Petri-nets Formulation. 1-6 - Eunbi Ko, Guk Sik Jeong, Kyoung Cheol Koo:

Smart City Based on Geospatial Information: Concept and Standardization Challenges. 1-5 - Ismail A. Mageed:

Fractal Dimension (Df) of Ismail's Fourth Entropy (HIV⁽q,a1, a2,..,ak⁾) with Fractal Applications to Algorithms, Haptics, and Transportation. 1-6 - Zeina Swilam, Abeer Hamdy

, Andreas Pester
:
Cross-Language Code Clone Detection Using Abstract Syntax Tree and Graph Neural Network. 1-5 - Heba Jabbar Hassan, Mousa K. Wali, Mohamed Ibrahim Shujaa:

Hybrid of DCT And PCA For Image Size Compression. 1-8 - Saleh Alhazbi:

Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation. 1-4 - Tahir Abbas

, Jamshaid Iqbal Janjua
, Muhammad Irfan:
Proposed Agricultural Internet of Things (AIoT) Based Intelligent System of Disease Forecaster for Agri-Domain. 1-6 - Mona Helmy, Mohamed Mahmoud:

Enhanced Multi-Level Secure Over-the-Air Update System using Adaptive AUTOSAR. 1-4 - Laila Hammam

, Hani Ghali, Gamal A. Ebrahim
, Hany Ayad Bastawrous:
An Optimized Plant Disease Detection Convolutional Neural Network for Future Hardware Implementation. 1-5 - Ismail A. Mageed:

Fractal Dimension(Df) Theory of Ismail's Second Entropy(Hq I) with Potential Fractal Applications to ChatGPT, Distributed Ledger Technologies(DLTs) and Image Processing(IP). 1-6 - Ramez Yousri

, Soha Safwat:
How Big Can It Get? A comparative analysis of LLMs in architecture and scaling. 1-5 - Deepthi Amuru, Andleeb Zahra, Varnika Karakuram, Zia Abbas:

Design of Approximate Full Adders for Error Resilient Applications. 1-6 - Aleksandra Kuzior, Katarzyna Postrzednik-Lotko, Jacek Pradela

:
Social Challenges Resulting from the Implementation of Technical Solutions in Smart Cities. 1-5 - Ikhlas Mastour

, Layth Sliman
, Benoit Charroux, Raoudha Ben Djemaa, Kamel Barkaoui:
Privacy-preserving Collaborative Computation: Methods, Challenges and Directions. 1-6 - Esraa H. Ali, Sawsan Sadek, Zaid F. Makki:

Novel Improved Fuzzy C-means Clustering for MR Image Brain Tissue Segmentation to Detect Alzheimer's Disease. 1-6 - Haotian Rao, João Paulo Ponciano, Muhammad Ali Imran, Ahmad Taha:

Evaluation of Network Performance Based on Structured Geometric Topologies. 1-6 - Sara Farag, Nahla H. Barakat

:
Data and Model Centric Approaches for Card Fraud Detection. 1-6 - Nadine Farag, Samy S. Ghoniemy

, Omar H. Karam:
Enhanced Semantic-based Chaotic System for Cyber-grooming Classification and Harassment Detection. 1-10 - Reyam Magdy Elshiny, Abeer Hamdy

:
Automatic Question Generation Using Natural Language Processing and Transformers. 1-6 - Mona Helmy, Amr Mohsen:

Vehicle-to-Cloud System New Architecture based on Adaptive AUTOSAR, VSS, and VISS. 1-4 - Sardar Anisul Haque, Ali Jaoua, Jihad Mohamad Al Ja'am, Hafeez Ur Rehman:

Reducing a 3-SAT Instance to a Set of 2-SAT Instances Using the Idea of Set Covering Problem. 1-3 - Mona Helmy, Youssef Essam, Sara Khaled, Omar Khaled, Omar Moataz:

Design and Implementation of Digital Twin V2X System of Broken Vehicle. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














