Search Results - "2014 24th International Conference on Computer Theory and Applications (ICCTA)"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study by Ahmed, Khaled, El Tazi, Neamat, Hossny, Ahmad

    “…Social media contains a lot of useful information that express different aspects of the society using unstructured and temporal data. The main challenge with…”
    Get full text
    Conference Proceeding
  2. 2

    A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency Centers by Refat, Ramy, Taha, Ayman, Senbel, Samah

    “…Nurse scheduling is a very complex task for the human resource director in the health organizations due to the numerous requirements, limitations and rules…”
    Get full text
    Conference Proceeding
  3. 3

    Analytical Model for Service Response Time in Distributed Systems by Dandoush, Abdulhalim, Elgamel, Mohamed

    “…Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such…”
    Get full text
    Conference Proceeding
  4. 4

    Process Algebras, Reasoning, And Validation by Hassan, Nabil

    “…Process algebras model concurrent systems, and hence permit system reasoning or validation of concurrent programs. These are bottom up paradigms that start…”
    Get full text
    Conference Proceeding
  5. 5

    Multi-Agent based University Advising System by Attia, Mohamed, Badawy, Osama, Kosba, Essam

    “…Providing accurate advice to undergraduate students during their undergraduate program and directing them towards proper course selection is the means by which…”
    Get full text
    Conference Proceeding
  6. 6

    Prevention Of DOM Based XSS Attacks Using A White List Framework by Ali, Khaled, Abdel-Hamid, Ayman, Kholief, Mohamed

    “…Web applications are not guaranteed to be safe for both clients and servers since many vulnerabilities can be exploited in a web application to reach a…”
    Get full text
    Conference Proceeding
  7. 7

    An Advanced Data Security Algorithm Using cryptography and DNA-Based steganography by Hamed, Essam M. Ramzy, Taha, Ayman E., Hammoodi, Ahmed Imad

    “…nowadays, data security has become one of the most important branches of computer sciences because of the great development in the Internet field and the great…”
    Get full text
    Conference Proceeding
  8. 8

    Power System Disturbance Suppression Using Interval Type-2 Fuzzy Logic Stabilizer by Gouda, O. E., Amer, G. M., Salim, O. M., Hassan, M. A.

    “…Low frequency oscillations (LFOs) have a dramatic effect on small signal stability of a power system. As power system started to operate near its stability…”
    Get full text
    Conference Proceeding
  9. 9

    Aggregating Local Metrics for Global Trust Calculations in the TOR Network by Aziem, Nada M. Abdel, Fahmy, Sherif F., Hashad, Attallah I.

    “…This paper discusses the design and implementation of a distributed trust calculation mechanism that allows users in the peer-to-peer TOR anonymity network to…”
    Get full text
    Conference Proceeding
  10. 10

    Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA) by Aboshosha, Bassam.W., Ramdan, Rabie. A., Wahdan, Abdel Moneim

    “…Wireless networks applications are growing very fast although their nodes suffer from limited bandwidth, memory, and processing capabilities. They operate on…”
    Get full text
    Conference Proceeding
  11. 11

    Students' Attitudes toward Mobile Learning Adoption in Private University in Egypt by Abdelfattah, Tamer F, Esmail, Ossama

    “…To solve the problem of Education in Egypt keep in mind no. of mobiles (%70) [18]. Mobile Learning not only effective tool for distance learning but also…”
    Get full text
    Conference Proceeding
  12. 12

    Performance Analysis of Selective Authentication Schemes for IPTV Networks by Al-Sharif, Ahmad H., Youssef, Khaled Y., Hala A. K., Mansour

    “…The growing demand on IPTV as well as the strong adoption of smart devices as tablets and smartphones in presence of broadband wireless technologies as LTE,…”
    Get full text
    Conference Proceeding
  13. 13

    Biologically Inspired Hierarchical Model for Traffic Sign Recognition by Aziz, Amr Abdel, Imam, Ibrahim F., Shoukry, Amin

    “…In this research, a study of the Hierarchical Temporal Memory (HTM) model using the Numenta Implementation "Nupic v1.7" and an investigation of its performance…”
    Get full text
    Conference Proceeding
  14. 14

    GIS-Based Decision Support System Using Analytical Hierarchy Process for Solar Cells Site Selection in Sinai Peninsula, Egypt by Al Aziz, Heba Abdu, Elkaffas, Saleh Mesbah, Hassan, Safaa M., Amasha, Ali

    “…During the few recent decades, the demand for solar energy has increased and has been widely implemented around the world to replace the conventional…”
    Get full text
    Conference Proceeding
  15. 15

    Intelligent Look-ahead Controllers for Nonholonomic Mobile Robot Manipulator by Amer, Ahmed F., Sallam, Elsayed A., Sultan, Ibrahim A.

    “…This paper presents a planning and control algorithm for nonholonomic mobile robots (NMRs). The proposed controller uses the Look-ahead method that is based on…”
    Get full text
    Conference Proceeding
  16. 16

    Using Genetic Algorithm to Improve the Performance of Sigma-Delta Converter Used on Earthquake Monitoring Systems by Mohamed, Omar, AbdelRassoul, Roshdy, Mohanna, Mahmoud, Nofal, Hamed

    “…An earthquake monitoring system consists of many electronic devices, one of this vital device is the digitizer which converts the analogue signal coming from…”
    Get full text
    Conference Proceeding
  17. 17

    Tracing Origins Of Unknown DNA/Protein Offspring Sequences On Multi-Processors by Issa, Mohamed, Alzohairy, Ahmed Mansour

    “…One of the main problems for an evolutionary biologist is tracing the modifications of ancestors in offspring sequences. The Gene Tracer application was…”
    Get full text
    Conference Proceeding
  18. 18

    Integrated Inductor Class-D Audio Amplifier Modeling & Simulation by Shalaby, Abdelrahman, Orabi, Mohamed, Hasaneen, El-Sayed

    “…during the last few years, there has been a growing market demand for audio amplifiers with a high output power and a large number of channels. This requires…”
    Get full text
    Conference Proceeding
  19. 19

    Hybrid Trust Management Model for Cloud Computing by Saleh, Aya Salama A., Hamed, Essam M. Ramzy, Hashem, Mohamed

    “…Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques…”
    Get full text
    Conference Proceeding
  20. 20

    Measuring Organizations' readiness for Customer Relationship Management (CRM): A Comparative Study by Ammar, Mennatallah, Kosba, Essam, Mahar, Khaled

    “…Since 1990, Customer relationship management (CRM) has become an important subject for many organizations in different industries. CRM is a business strategy…”
    Get full text
    Conference Proceeding