|
ICENCO-2004
Preliminary Program
Monday, December 27
9:30 10:00 |
Registration |
10:00 12:30 |
Tutorial 1: Dynamics of Network Resource Management, Ibrahim Matta,
Mina Guirguis |
12:30 2:00 |
Lunch break |
2:00 4:30 |
Tutorial 2: An
Introduction to Rough Set Theory and its Applications, Zbigniew Suraj |
Monday, December 27
5:00 6:30 |
Opening Session &
Invited Talk |
Tuesday, December 28
From 8:30 |
Registration |
|
8:50 11:00 |
Session 1a: Network Analysis |
Session 1b: Image Processing Applications |
11:00 11:30 |
Coffee Break |
|
11:30 1:30 |
Session 2a: Network Modeling |
Session 2b: Parallel and Distributed Processing |
1:30 - 2:30 |
Lunch Break |
|
1:30 3:00 |
Poster Session 1 |
|
3:00 5:00 |
Session 3a: Ad-Hoc & Wireless Networks |
Session 3b: Neural Networks |
From 8:00 |
Banquet in Gawharah
Hall, Nile Hilton Hotel, El-Tahrir square |
Wednesday, December 29
9:00 11:00 |
Session 4a: Network Management |
Session 4b: Data Compression |
11:00 11:30 |
Coffee Break |
|
11:30 1:30 |
Session 5a:
Image Processing & Hardware Components
|
Session 5b: Neural Networks |
1:30 - 2:30 |
Lunch Break |
|
1:30 3:00 |
Poster Session 2 |
|
3:00 5:20 |
Special Session 1: Rough Sets and Fuzzy Sets |
Special Session 2: The Evolving Internet |
Thursday, December 30
9:00 11:00 |
Session 6a: QoS in Networks |
Session 6b: Knowledge Discovery and Web Mining |
11:00 11:30 |
Coffee Break |
|
11:30 1:30 |
Session 7a: Communications Networks |
Session 7b: Computational Intelligence |
1:30 - 2:30 |
Lunch Break |
|
1:30 3:00 |
Poster Session 3 |
|
3:00 5:00 |
Session 8a: Intelligent Agents |
Session 8b: Neural Networks & Hardware Components |
Tuesday, December 28
Session 1a: Network Analysis
Moderators |
El-Sawy, A. and
Matta, I. |
8:50 - 9:20 |
Invited Talk:
Non-intrusive testing of firewalls, A. Liu, M. Gouda, H. Ma, A. Ngu |
9:20 - 9:40 |
Transient State Analysis of a Firewall System, S. Sobhy, H. Elmahdy,
R. Serig, S. Ahmed |
9:40 - 10:00 |
Routing Tradeoffs inside a d-Dimensional Torus with Applicability to
CAN, M. Guirguis, A. Bestavros,
I. Matta |
10:00 - 10:20 |
Effect of Imperfect Multipath Channel Estimation on STC Performance,
W. Hoteit, Y. Shayan, A. Elhakeem |
10:20 - 10:40 |
A Distributed Bandwidth-Guaranteed Routing Algorithm for
Point-to-Multipoint VPLS Virtual Connections, N. Abu Ali, H. Mouftah,
S. Gazor |
10:40 - 11:00 |
Reservation Based Admission Control of a Multimedia Server, M. Rahman,
M. Akbar, R. Ruby |
Session 1b: Image
Processing Applications
Moderators |
Fayek, M. and Zaki,
M. |
9:00 - 9:20 |
Artificial Neural Network Approach to Estimation of Hemoglobin in
Blood, H. Ranganathan, N. Gunasekaran |
9:20 - 9:40 |
Visual Inspection for Fired Ceramic Tiles Surface Defects Using
Wavelet Analysis, H. Elbehiery, A. Hefnawy, M. Elewa |
9:40 - 10:00 |
Genetic Classification for the Lesion Detection in Brain Images, N.
Lassouaoui, L. Hamami |
10:00 - 10:20 |
An Efficient Face Region Detection for Video Indexing, J. Kim, S. Lee,
J. Baek |
10:20 - 10:40 |
A Robust Digital Watermark Algorithm Based on Discrete Wavelet
Transform, M. Amin, A. Hassanien |
10:40 - 11:00 |
Diagnose Femur Osteoporosis Using Active Contour Model For Finding
Bone Mineral Density In X-Ray Images, S. Kiattisin, K. Chamnongthai |
Session 2a:
Network Modeling
Moderators |
Ezz, K. and Salama,
H. |
11:30 - 11:50 |
An Improved Model for IEEE 802.11 MAC Protocol K. Khayyat, F. Gebali |
11:50 - 12:10 |
Modeling an Energy-Eficient MAC Layer Protocol, S. Gobriel, R. Melhem,
D. Mosse |
12:10 - 12:30 |
Determining the Issues to Consider When Deploying VoIP onto a Small
Enterprise Network Q. Rahman, A. Abubakar, S. Sirajuddin, S. Islam |
12:30 - 12:50 |
Performance Evaluation and Comparison of Tree and Ring
Application-Layer Multicast Overlay Networks, A. Sobeih, J. Wang, W.
Yurcik |
12:50 - 1:10 |
Optical Network Design Optimization Using Genetic Algorithms, M.
Elsersy, M. Abdelmagid, M. Marie, S. Gamal |
Session 2b:
Parallel and Distributed Processing
Moderators |
El-Fouly, R. and Wagdy, M. |
11:30
- 1:50 |
Distributed Processing Over Loosely Coupled Networks, A. Amin, A. Azab,
H. Zakaria, A. Darwish |
11:50 - 12:10 |
A 1-V BiCMOS Bandgap Reference Voltage, H. Nguyen, M. Wagdy, A. Coban |
12:10 - 12:30 |
An Approach for Reconfiguration and Function Recovery of Networks with
Defined Connectivity, T. Nikolov, A. Tsenov |
12:30 - 12:50 |
Automated Method for Building CNOT Based Quantum Circuits for Boolean
Functions, A. Younes, J. Miller |
12:50 - 1:10 |
Design of an Interstage Amplifier for a 12-Bit, 20 MSPS Pipelined ADC,
M. Wagdy, V. Talpade |
1:10 - 1:30 |
Mapping Large Deep Packet Classification Algorithm onto Smaller
Systolic Arrays, F. Gebali, A. Rafiq |
Session 3a:
Ad-Hoc & Wireless Networks
Moderators |
Badawi, A. and Lotfy, O. |
3:00 3:20 |
An Efficient Reclustering Algorithm in Mobile Ad Hoc Networks, M. Al-kahtani,
H. Mouftah |
3:20 3:40 |
Analysis for New Criterion Based DiffServ for Stateless Wireless
Ad-Hoc Network (SWAN), R. El-Mayet, B. Nossier, M. Fakhr |
3:40 4:00 |
Evaluation of Probing Strategies and Resources Allocation for Ad hoc
Networks Over UTRA-TDD Protocol, A. Barnawi, J. Gardiner |
4:00 4:20 |
BIPAP: Bimodal Power-Aware Routing Protocol for Wireless Sensor
Networks, H. Morcos, A. Bestavros,
I. Matta |
4:20 4:40 |
Queuing Model and Performance Analysis for a Wireless ATM/CDMA
Network, F. Zaki, R. El-Awadi, M. Ashour |
4:40 5:00 |
QoS Provision through Power Control for a Wireless Multimedia ATM/CDMA
Network, F. Zaki, R. El-Awadi, M. Ashour |
Session 3b:
Neural Networks
Moderators |
Hegazy, O. and
Suraj, Z. |
3:00 3:20 |
Chaos in Firing-Rate Recurrent Neural Network Models, D. Mishra, A.
Yadav, S. Ray, P. Kalra |
3:20 3:40 |
Radial Basis Function Neural Networks and Protein Secondary Structure
Prediction, J. Nan, X. Bin, Z. Chunguang |
3:40 4:00 |
New Hyperspheres for Pattern Classification, H. Fayed, S. Hashem, A.
Atiya |
4:00 4:20 |
Gaussian Mixture Modeling for Analog Fault Diagnosis With Feature
Selection and Extraction, M. El-Gamal |
4:20 4:40 |
A Multi-Classifier Approach to Self-Supervised Learning, N. El Gayar |
4:40 5:00 |
Efficient Non-Quadratic Hybrid Quick Sort, F. Elaker |
Wednesday, December 29
Session 4a:
Network Management
Moderators |
Baraka, H. and
Shaheen, S. |
9:00 - 9:20 |
A New Dynamic Pricing Policy for Integrated Service Networks, A.
Abdelaal, H. Ali, H. Omran |
9:20 - 9:40 |
On the Location Management in PCS Networks H. Safa, S. Pierre |
9:40 - 10:00 |
Performance Analysis of General Packet Radio Service, M. Fikry, O. El
Ghandour, S. El Ramly |
10:00 - 10:20 |
Traffic Congestion in Computer Network and its Avoidance by
Reinforcement Learning T. Horiguchi, K. Hayashi, A. Tretiakov |
10:20 - 10:40 |
Adaptive Repair Allocation for Multicast over Dynamic Trees, Z. Wan,
M. Kadoch, A. Elhakeem |
10:40 - 11:00 |
A Multiple Polynomial Technique for HPA Linearization through RF
Predistortion A. Zahran, M. El-Tanany, L. Morant |
Session 4b: Data
Compression
Moderators |
El-Desouky,
A. and Fikry, M. |
9:00
- 9:20 |
Using Fractal Dimension for Image Compression Predictions Performance
Evaluation, D. Radu, D. Matei, B. Barliga |
9:20 - 9:40 |
A Novel Hybrid Moving Object Detection Algorithm for Video
Surveillance Applications, A. Amin, G. Selim, S. Fahmy, I. Ismail
|
9:40 - 10:00 |
Lossless Compression of Multitemporal and Multispectral Satellite
Images, H. Shamardan, S. Abd El-Azim, M. Fikri |
10:00 - 10:20 |
Optimizing the Tree Structure in the Lossless Binary Tree Predictive
Coding, Z. Chen, M. El-Sakka |
10:20 - 10:40 |
Elegant Object Detection Approach in MPEG Video Compressed Domain, A.
Ahmad, B. Ahmad, S. Lee |
10:40 - 11:00 |
On Performance Evaluation of Image Segmentation Algorithms: Success is
not All or None, D. Nassar, F. Chaudhry, H. Ammar |
Session 5a: Image
Processing & Hardware Components
Moderators |
Badr, A. and
Sarhan, E. |
11:30 - 11:50 |
Hadamard Transform in H.264/MPEG-4 Part 10: A Hardware Prototype, I.
Amer, W. Badawy, G. Jullien |
11:50 - 12:10 |
A Hybrid GA/Decision Tree System for Microarray Gene Selection and
Classification, M. El-Telbany, H. Konsowa |
12:10 - 12:30 |
Performance Evaluation for 3D Microwave Holographic Systems
Reconstruction, H. Elsadek, A. Raouf, H. Eldeeb, R. Ammar |
12:30 - 12:50 |
One-Pointer Zero-Memory Viterbi decoder, D. El-Dib, M. Elmasry |
12:50 - 1:10 |
Fast Multiplierless Approximation of the DCT for MPEG-7 Color Layout
Descriptor Using StarCore 140, V. Panwalkar, T. Sripan, M. El-Sharkawy,
P. Salama, M. Rizkalla |
1:10 - 1:30 |
A Framework for Rapid Deployment of Devices and Robots on a Network,
R. Badapanda, S. Nair, D. Kim |
Session 5b:
Computational Intelligence
Moderators |
Bahnasawy, A. and
Younis, M. |
11:30 - 11:50 |
Robust Beamforming Based on the Least-Squared Method of Subarrays for
Imperfect Antenna Array, R. Niemkhum, R. Suleesathira |
11:50 - 12:10 |
An Improved Algorithm for Training Feedforward Neural Network, J.
Tsai, H. Li |
12:10 - 12:30 |
A Novel Approach For Combining Neural Networks During Training For
Time Series Modeling, H. Fayed, S, Hashem, Z. Ashour |
12:30 - 12:50 |
A Neural Network Approach to Stock Market Prediction Using Peak &
Trough Analysis, H. Abdelazim, F. Badawy |
12:50 - 1:10 |
Financial Management Analysis the Application of Statistical Analysis
and Data Mining Techniques for the Forecasting of Companies
Profitability and Future Trends, S. Mahgoub, Y. Elshayeb |
1:10 - 1:30 |
An Algorithm with Pyramidal Structure for Features Extraction in
Fingerprint Images, E. Ezin |
Special Session
1: Rough Sets and Fuzzy Sets
Moderators |
Kurzynski, M. and
Hassanien, A. |
3:00 3:20 |
Fuzzy Logic Based Kalman Filter in Transfer Alignment, C. Bhunia, P.
Nandi |
3:20 3:40 |
Rough Entropy Based on Neigborhood Systems Covering Granules, M. He,
B. Feng |
3:40 4:00 |
Robust H1 Fuzzy Filter Design for Uncertain Nonlinear Descriptor
Systems, W. Assawinchaichot, S. Nguang, P. Shi |
4:00 4:20 |
Discovering Concurrent Data Models and Decision Algorithms from Data:
A Rough Set Approach, Z. Suraj |
4:20 - 4:40 |
Integrating Fuzzy Approach and History Knowledge to create an
Intelligent Processor for a Human-Robot Interface, S. Jusoh, F. Wang,
S. Yang |
4:40 5:00 |
Rule-Based Learning of Pattern Recognition Probabilistic Approach,
M. Kurzynski |
5:00 5:20 |
Fuzzy Inference Method for Qualitative Models of Multi-Purpose
Systems, V. Borisov, A. Fedulov |
Special Session
2: The Evolving Internet
Moderators |
Ragab, K. and Abo
Dahab, M. |
3:00 3:20 |
A Scalable Application Architecture for Composing News Portals on the
Internet, S. Tok, Z. Bayram |
3:20 3:40 |
An Adaptive Autonomous Decentralized Community Overlay Network, K.
Ragab, K. Mori |
3:40 4:00 |
Multi-Agent Based Collaborative Electronic Commerce System, T. Helmy |
4:00 4:20 |
An English-To-Arabic Web Translation Agent, I. Youssef, W. Oransa. I.
Imam |
4:20 - 4:40 |
An Information Retrieval Learning Agent, I. Imam, A. Galal |
Thursday, December 30
Session 6a: QoS
in Networks
Moderators |
Dakroury, Y. and
Fahmy, A. |
9:00 - 9:20 |
QoS-based Receiver-Controlled Routing, H. Hassanein,Z. Khan |
9:20 - 9:40 |
A QoS Capable Fetch Policy for SMT Processors, L. He, Z. Liu |
9:40 - 10:00 |
Re-Authentication Policy for Cellular-WLAN Integration, W. Shin, K.
Wong |
10:00 - 10:20 |
New Chain Construction for Multicast Stream Authentication Q. Abuein,
S. Shibusawa |
10:20 - 10:40 |
Denial of Service (DoS) Attacks Source Traceback, A. Azab, S. El-Kassas,
A. Darwish |
10:40 - 11:00 |
Integrating dynamic congestion avoidance with multiple connections
based TCP, Q. Fu, J. Indulska |
Session 6b:
Knowledge Discovery and Web Mining
Moderators |
Kamel, M. and
Mashaly, S. |
9:00 - 9:20 |
New Classification Approach Using Co-Occurrence Word, G. Elmarhomy, E.
Atlam, K. Morita, M. Fuketa, J. Aoe |
9:20 - 9:40 |
A Framework for Information Extraction, Storage and Retrieval, S. El-Beltagy,
M. Said, K. Shaalan |
9:40 - 10:00 |
Ontology-Aided Web Search Assistant, M. Kamel, E. Powers, A. Lee |
10:00 - 10:20 |
Knowledge Discovery for Document Classification Using Field
Association Word, G. Elmarhomy, M. Fuketa, K. Morita, J. Aoe |
10:20 - 10:40 |
Machine Learning Algorithm for Knowledge Refinement and Optimization,
K. El-Bahnasy, M. Rafea, S. El-Beltagy, K. Wassef, S. El-Gammal |
10:40 - 11:00 |
Retrieval Optimization in Multimedia Database Management System, P.
Mukherjee, M. Nasipuri, D. Basu, M. Kundu |
Session 7a:
Communications Networks
Moderators |
El-Hadidi, M. and
Nassar, S. |
11:30 - 11:50 |
Wavelength Assignment in Multi ber Rings with limited Conversion, G.
Justo, T. Radzik |
11:50 - 12:10 |
Robust Route Establishment in High-Mobility MANETs, H. Hassanein, H.
Du, C. Yeh |
12:10 - 12:30 |
A FSM-based Parameterized Generator of Boolean Expressions C. Sun, T.
Chen, K. Sim |
12:30 - 12:50 |
Analog Front End
for ADSL Modem, A. Hussein, N. Ibrahim, H. Mogahed, M. Moness |
12:50 - 1:10 |
Reducing the Risk of the Honest Dealer Assumption in Robust Threshold
RSA Function Sharing, M. Ibrahim |
1:10 - 1:30 |
CVS: Collaborative Voting System to Detect Routing Misbehavior in
Wireless Ad hoc Networks, A. Deshpande, A. Hegde, A. Shetty |
Session 7b:
Computational Intelligence
Moderators |
Arabawy, A. and
Nair, S. |
11:30 - 11:50 |
A Near Optimal Predictive Image Encoding Algorithm, S. Zahir |
11:50 - 12:10 |
Performance of Non-Binary Convolutional Turbo Codes for Short Frame
Transmission Systems, S. Cho, J. Kim, K. Cho |
12:10 - 12:30 |
A Top-down Method to Construct Hierarchical Bayesian Networks for
Situation Assessment, Z. Sun, H. Yang, W. Hu |
12:30 - 12:50 |
Image Transmission to Mobile Devices, M. Danaher |
12:50 - 1:10 |
Bayesian Network System for Storage and Searching of Text in Various
File Structure, D. Hanchate, S. Sutar, A. Kiwelekar |
1:10 - 1:30 |
Coded Pipelined Parallel Acquisition Scheme for Frequency Hopping
Spread Spectrum Systems, Z. Li, A. Elhakeem, X. Wang |
Session 8a:
Intelligent Agents
Moderators |
Bahgat, R. and Elgamal, M. |
3:00 3:20 |
E-Commerce by Increasing Confidence into E-Piracy, S. Ghernaouyi-Helie,
M. Sfaxi |
3:20 3:40 |
Intelligent Agents for Multiple Models based Approach in Distributed
and Heterogeneous Systems, A. Zakari |
3:40 4:00 |
Localization, Mapping and Feature Discovery of a Platoon of
Cooperative Heterogeneous Mobile Robots Using Colored Circles and RGB
Images, M. El Kaissi, M. Elgamel, M. Bayoumi |
4:00 4:20 |
Web-enabling Legacy Systems via Presentation Access From Webulation to
Automation, M. El-Ramly |
4:20 4:40 |
The Development of Multilayer Map, A New Concept of Location Oriented
Database for Location-Based Services, R. Indrajit, Herman |
4:40 5:00 |
MDA model transformation using UML collaborations, A. Caramazana, M.
Vidales, L. Aguilar |
Session 8b:
Neural Networks & Hardware Components
Moderators |
Fahmy, A. and Talkhan, I. |
3:00 3:20 |
A Fuzzy Approach to Stable Input Power for Random Number Generator
Engine, J. Hong, S. Park, J. Park |
3:20 3:40 |
Hardware Implementation of Neural Network on FPGA, M. Syiam, H. Klash,
I. Mahmoud, S. Haggag |
3:40 4:00 |
Adaptive Communication Channel Equalization using Artificial Neural
Network, Z. Jaffery, Zaheeruddin, Moinuudin |
4:00 4:20 |
Adaptation of ATIs No-Hooks Technology to the Infineon TriCore
Processor for Hookless Bypass Rapid Prototyping, C. Correa, J. Slumpff,
S. Awad |
Poster Session 1
A New Proposal for Session Key Update in DSA-Supporting ATM Networks,
A. Omar, N. Ibrahim, A. Hussein, M. Azzam |
Architectural Considerations for Wireless Mesh Networks, V. Shukla |
The Predictability of Neural Networks Trained by Particle Swarm
Optimization: The Nile River Flood Forecasting, M. El-Telbany, H.
Konsowa, M. El-Adawy |
Single Scan Frequent Set Generation in Association Rule Mining, R.
Nedunchezhian, K. Anbumani |
Super Pipelined Digit Serial Adders for Multimedia and e-Security, A.
Gutub, M. Ibrahim, M. Araman |
Using a Groupware Technology in E-learning and its Implications on
E-government A Case Study, D. Ambaye, H. AbdelGaffar |
A 12-Bit, 3-Bits per Stage, CMOS Pipelined ADC Architecture, V. Do, M.
Wagdy |
A Pipelined A/D Converter Using 0.18m CMOS Technology, V.
Kongachariyakul, M. Wagdy |
An Adaptive Introspective Sorting Algorithm, F. Elaker |
Essential New Get
Up for the Next Internet Era, D. Manjaiah, K. Subramanya, S. Sharma |
Resonance Generation of Short Arabic Vowels, M. Guerti
|
Poster Session 2
A Study of Routing Protocols for Mobile Ad-hoc Network, H. Bakht, M.
Merabti. B. Askwith |
Surface Defects Detection for Ceramic Tiles Using Image Processing and
Morphological Operation Techniques, H. Elbehiery, A. Hefnawy, M. Elewa |
Channel Scan for Association in IEEE STD 802.15.4, J. Jung, J. Lee |
The Implementation of an MTL-Based Multistrategy Learning System Using
Blackboard Model of Problem Solving, S. Mokhtar, A. AbdelWahab, A.
Ibrahim, S. Shaheen |
A Robust Content-Based Image Retrieval System Based on: Color,
Texture, and Color Layout, M. Tahoun, K. Nagaty, M. A-Mageed, T. El-Areef |
A Study on the Role of Correlations and Individual Input Performance
in the Input Selection Problem, A. Atiya |
Reliability and Availability of Fault-Tolerant Networked Controlled
Systems, H. Amer, R. Daoud |
Trust determinants of New Entrants, Buyers, and Dellers in a C to C IP
Exchange Platform, H. Lu, R. Tzou |
Investigative Data Mining: Issues and Challenges, N. Memon |
Cheap, Viable, Cloaking Technique for Protecting Information, K.
Santhi, S. Kumaran,
V. Srivastava, S.
Lwakabamba |
Low Voltage Low Power CMOS Current Conveyor, F. Farag, H. Hamed
|
Poster Session 3
A Routing Protocol for Mobile Ad-hoc Network, H. Bakht, M. Merabti, B.
Askwith |
Image Analysis System for Fracture Surface of High Steel Low Alloy (HSLA)
Materials, R. Pradhan, M. Nasipuri, M. Tarafder, S. Dey |
Data Redistributing in Distributed Computing Systems, A. Ali |
WDC: a Web Cache Architecture Based on Local Control, Z. Zhang, X.
Wang |
Optimization of Technical Specification and Maintenance Requirements :
An Evolutionary Computation Approach, A. Mishra, A. Patwardhan, A.
Chauhan |
Design of Context Aware Framework and Intelligent Service Manage Agent
for Personalization, H. Lee, E. Ko, J. Lee |
Case-Based Reasoning Using Ontology in Semantic Web Environment, E. Ko,
H. Lee, J. Kang, J. Lee |
DOATool: Domain Ontology Acquisition Tool, M. Dahab, H. Hassan, A.
Rafea, M. Rafea |
Supporting Decision Making for E-Tendering in the Malaysian
Construction Industry, N. Noor, K. Papamichail, B. Warboys |
An Accelerometer
Based Approach to Measuring Displacement of a Vehicle Body, L. Slifka,
F. Chen, S. Awad |
|