International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science. .::. Invited Lecture
1
TUE: 29-12-2015 Main Hall Invited Speaker Sec13 ( 1 )  
10:30 : 11:00
 
CSC - 13 IN Prof. P. Balasubramaniam balugru@gmail.com
 
21
  Mathematics Specialization : Control Theory  
  P. Balasubramaniam  
 
Professor of Mathematics, Department of Mathematics, Gandhigram Rural Institute, Deemed University, India
 
  ABSTRACT  
  -  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science. .::. Invited Lecture
2
TUE: 29-12-2015 Main Hall Invited Speaker Sec15 ( 1 )  
12:15 : 12:45
 
CSC - 8 DE Prof. Monika Heiner monika.heiner@b-tu.de
 
21
  Applying Petri nets for systems and synthetic biology  
  Monika Heiner  
 
Brandenburg University of Technology Cottbus, Germany
 
  ABSTRACT  
  -  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science. .::. Invited Lecture
3
TUE: 29-12-2015 Main Hall Invited Speaker Sec17 ( 1 )  
02:15 : 02:45
 
CSC - 14 JP Prof. Nobuo Funabiki funabiki@okayama-u.ac.jp
 
21
  mathematical engineering and information physics  
  Nobuo Funabiki  
 
Dept. of Electrical and Communication Engineering, Graduate School of Natural Science and Technology, Okayama University, Japan
 
  ABSTRACT  
  -  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
4
( )  
:
 
CSC - 18 NG Prof. Daniel Nwosuopara riversstateuniversitysciencete@gmail.com
 
21
  Computer Science  
  RAHMON MUTIU ADEWALE , Rabiatu OpawuyiBibitayo  
 
COMPUTER SCIENCE
COMPUTER MANAGEMENT
 
  ABSTRACT  
  PROJECT THE FOR COMPUTER SCIENCE COURSE PROJECT MAN- AGEMENT Department of Computer Science Rivers State University Sciencete & Technology Nigeria. Westend, Port Harcourt,Nigeria,Founded: 1980 +2348123877333 riversstateuniversitysciencete@gmail.com ABSTRACT Project-based assignments are widely used in Computer Science courses to give students hands-on experience in using the learned knowledge to solve problems. However, despite its importance, management on student projects is usually done in an ad-hoc fashion, with varying degrees of interaction and guidance to students. This paper presents a general, Wiki-based project management framework: project activities are centralized and captured by a dedicated Wiki site, consisting of Wiki pages created by both the instructor and students. The Project Wiki framework supports all types of project activities, and enables flexible and multi-dimension interaction patterns for instructor, individual student and the whole class. INTRODUCTION Project-based assignments have been widely used in Computer Science courses [2, 11, 10]; in fact, most recently published CS textbooks include companion web sites offering course project materials, for example, see [7, 4]. By doing course projects, students deepen their understanding on course subject matter and gain hands-on experience in using their learned knowledge to solve problems — the main goal in active learning. However, despite its importance, management on student projects is usually done in an ad-hoc fashion: instructors use different tools and techniques, specific to a particular course or instructor, with varying degrees of interaction and guidance to students. To address these issues, this paper presents a general, Wiki-based project management framework which can be easily modified and used in typical computer science courses. Using Project Wiki, project activities are centralized and captured by a dedicated Wiki site, consisting of Wiki pages created by both the instructor and students. Instructors create template pages to guide student through projects and highlight key requirements; students create and maintain their own Wiki pages for project planning and logging; instructors review student pages to check project status and give feedback; students can also review and add comments to each other’s Wiki; finally, the whole class can access and edit common group Wiki pages to engage in broader community-style collective learning. The contributions of this paper are the following: • we developed a general and flexible Wiki-based project management framework; • we present the structure and setup of the Project Wiki framework, and explore enabled activities; • we describe our experience using it in a project-oriented compiler class. The rest of the paper is organized as follows: Section 2 describes the background and motivation of Wiki-based project management; Section 3 describes the Project Wiki framework, and the users, activities, and typical settings. Section 4 presents our experience using Project Wiki in a project-oriented compiler class. We conclude in Section 5.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
5
( )  
:
 
CSC - 19 NG Dr. Adewunmi Adewale Adeshina federaluniversitytechakure@gmail.com
 
21
  Computer Science & Hardware,Software Maintenance  
  Adewumi Adewale Adeshina , Saliu Adijat Adenike , Saka Mariam Gbemisola  
 
Computer Management
Computer Software Programming
Computer Engineering & Hardware
 
  ABSTRACT  
  Introduction. In one sentence, what’s the topic? Phrase it in a way that your reader will understand. If you’re writing a PhD thesis, your readers are the examiners – assume they are familiar with the general field of research, so you need to tell them specifically what topic your thesis addresses. Same advice works for scientific papers – the readers are the peer reviewers, and eventually others in your field interested in your research, so again they know the background work, but want to know specifically what topic your paper covers. State the problem you tackle. What’s the key research question? Again, in one sentence. (Note: For a more general essay, I’d adjust this slightly to state the central question that you want to address) Remember, your first sentence introduced the overall topic, so now you can build on that, and focus on one key question within that topic. If you can’t summarize your thesis/paper/essay in one key question, then you don’t yet understand what you’re trying to write about. Keep working at this step until you have a single, concise (and understandable) question. Summarize (in one sentence) why nobody else has adequately answered the research question yet. For a PhD thesis, you’ll have an entire chapter, covering what’s been done previously in the literature. Here you have to boil that down to one sentence. But remember, the trick is not to try and cover all the various ways in which people have tried and failed; the trick is to explain that there’s this one particular approach that nobody else tried yet (hint: it’s the thing that your research does). But here you’re phrasing it in such a way that it’s clear it’s a gap in the literature. So use a phrase such as “previous work has failed to address…”. (if you’re writing a more general essay, you still need to summarize the source material you’re drawing on, so you can pull the same trick – explain in a few words what the general message in the source material is, but expressed in terms of what’s missing) Explain, in one sentence, how you tackled the research question. What’s your big new idea? (Again for a more general essay, you might want to adapt this slightly: what’s the new perspective you have adopted? or: What’s your overall view on the question you introduced in step 2?) In one sentence, how did you go about doing the research that follows from your big idea. Did you run experiments? Build a piece of software? Carry out case studies? This is likely to be the longest sentence, especially if it’s a PhD thesis – after all you’re probably covering several years worth of research. But don’t overdo it – we’re still looking for a sentence that you could read aloud without having to stop for breath. Remember, the word ‘abstract’ means a summary of the main ideas with most of the detail left out. So feel free to omit detail! (For those of you who got this far and are still insisting on writing an essay rather than signing up for a PhD, this sentence is really an elaboration of sentence 4 – explore the consequences of your new perspective). As a single sentence, what’s the key impact of your research? Here we’re not looking for the outcome of an experiment. We’re looking for a summary of the implications. What’s it all mean? Why should other people care? What can they do with your research. (Essay folks: all the same questions apply: what conclusions did you draw, and why would anyone care about them?)  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
6
( )  
:
 
CSC - 20 EG Dr. Ahmed Abd El-Latif ahmed_rahiem@yahoo.com
 
21
  A new quantum image steganography scheme based on Hadamard transformation  
  BassemAbd-El-Atty , Mohamed Amin , Ahmed A. Abd El-Latif  
 
Faculty of Science, Computer Science Laboratory, Menoufia University, Shebin El-Koom 32511, Egypt
Faculty of Science, Computer Science Laboratory, Menoufia University, Shebin El-Koom 32511, Egypt
Faculty of Science, Computer Science Laboratory, Menoufia University, Shebin El-Koom 32511, Egypt
 
  ABSTRACT  
  In this paper, a quantum image steganography scheme to embed quantum text message into quantum image is proposed based on the novel enhanced quantum representation (NEQR) for quantum images and Hadamard transformation. The extraction process can recover the text message and the cover image according to the stego image only. To the best of our knowledge, there is no prior quantum image steganography algorithm to embed quantum text message into quantum image. The simulation results demonstrate that the proposed scheme has good invisibility, high security and high capacity.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
7
( )  
:
 
CSC - 21 EG Dr. ahmed mohamed creesbo37@gmail.com
 
21
  heelo  
  heelo  
 
heelo
 
  ABSTRACT  
  heelo  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
8
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 1 )  
09:00 : 09:15
 
CSC - 1 EG Dr. Asaad Ahmed asaadgad@azhar.edu.eg
 
21
  Two-Tier User Experience Prediction Scheme  
  Ahmed A. A. Gad-Elrab , Kamal A. Eldahshan , M.A.W. Mahmoud , Mahmoud E. Embabi  
 
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, 11884, Egypt
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, 11884, Egypt
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, 11884, Egypt
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, 11884, Egypt
 
  ABSTRACT  
  Building professional and efficient systems by using user experience became one of the important research activities that focus on the interactions between products, applications, designers, and users. Unfortunately, using user experience faces many problems. One of these problems is how to predict a user experience efficiently to build robust, effective, and flexible applications. To solve this problem, it is needed to design an optimal and efficient method for predicting user experience which includes behavior and emotions experiences. In this paper, we propose a two-tier ranking scheme by using two multi-criteria decision making approaches. This proposed scheme considers a user experience as a sequence of executed actions or operations and it can predicate the most efficient user experience sequence of operations among a group of user experiences or experiences of individual users on a certain system or application. It uses the combination of two multi-criteria decision making approaches to rank each operation or action in a user sequence. Based on this ranking process, the proposed algorithm constructs a compound predicated user sequence by using two tiers. In each tier, it selects some of ranked operations and adds them to the predicated user sequence by taking into account their sub goals. The proposed scheme is presented as a flexible and efficient method for predicting user experience which will be help designers and developers in building professional systems and applications.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
9
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 2 )  
09:15 : 09:30
 
CSC - 2 EG Ms. Mai Farag mai.farag2015@gmail.com
 
21
  Binary-Real Coded Genetic Algorithm Based K-Means Clustering for Unit Commitment Problem  
  . Mai A.Farag , M.A. El-Shorbagy , I.M. El_Desoky , A.A. El-Sawy , A.A. Mousa  
 
1Department of Basic Engineering Science, Faculty of Engineering, Menoufiya University, Egypt.
1Department of Basic Engineering Science, Faculty of Engineering, Menoufiya University, Egypt.
1Department of Basic Engineering Science, Faculty of Engineering, Menoufiya University, Egypt.
1Department of Basic Engineering Science, Faculty of Engineering, Menoufiya University, Egypt.&Department of Mathematics, Faculty of Science, Qassim University, Saudi Arabia.
1Department of Basic Engineering Science, Faculty of Engineering, Menoufiya University, Egypt.&Department of Mathematics, Faculty of Sciences, Taif University, Saudi Arabia.
 
  ABSTRACT  
  This paper presents a new algorithm for solving unit commitment (UC) problems using a binary-real coded genetic algorithm based on K-means clustering technique. UC is a NP-hard nonlinear mixed-integer optimization problem, encountered as one of the toughest problems in power systems, in which some power generating units are to be scheduled in such a way that the forecasted demand is met at minimum production cost over a time horizon. In the proposed algorithm, the algorithm integrates the main features of a binary-real coded genetic algorithm (GA) and k-means clustering technique. The binary coded GA is used to obtain a feasible commitment schedule for each generating unit; while the amounts of power generated by committed units are determined by using real coded GA for the feasible commitment obtained in each interval. K-means clustering algorithm divides population into a specific number of subpopulations with dynamic size. In this way, using k-means clustering algorithm allows the use of different GA operators with the whole population and avoids the local problem minima .The effectiveness of the proposed technique is validated on a test power system available in the literature. The performance of the proposed algorithm is found quite satisfactory in comparison with the previously reported results  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
10
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 3 )  
09:30 : 09:45
 
CSC - 3 MA Ms. sara sandabad sandabad.sandabad@gmail.com
 
21
  New tumor extraction method using the Nl-means filter and expectation maximization algorithm  
  sara sandabad , yassine sayd tahri , ahmed hammouch  
 
Laboratory LRGE, ENSET, Mohamed V University, Rabat, Morocco
Laboratory LRGE, ENSET, Mohamed V University, Rabat, Morocco
Laboratory LRGE, ENSET, Mohamed V University, Rabat, Morocco
 
  ABSTRACT  
  The development of science has allowed computer scientists to touch the medicine and bring aid to radiologists as we are presenting it in our article. Our work focuses on the detection and localization of tumors areas in the human brain; this will be a completely automatic without any human intervention. In front of the huge volume of MRI to be treated per day, the radiologist can spend hours and hours providing a tremendous effort. This burden has become less heavy with the automation of this step. In this article we present an automatic and effective tumor detection, this work consists of two steps: the first is the image filtering using the filter Nl-means, then applying the expectation maximization algorithm (EM) for retrieving the tumor mask from the brain MRI and extracting the tumor area using the mask obtained from the second step. To prove the effectiveness of this method multiple evaluation criteria will be used, so that we can compare our method to frequently extraction methods used in the literature.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
11
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 4 )  
09:45 : 10:00
 
CSC - 4 EG Mr. ehab adel ahk_75@yahoo.com
 
21
  Application of Radial Neural Networks for Depth Profile Inversion  
  Ehab Adel Mahmoud El_Fayome , Aladin H. Kamel , Hadia S. ElHennawy  
 
Ministry of Interior
Advanced Industrial, Technical and Engineering Center
Electronics and Communications Department, Faculty of Engineering, Ain Shams University
 
  ABSTRACT  
  An artificial neural network can be viewed as a mapping of an input space, into some output space. In order to simulate the desired mapping, the network has to go through a learning process consisting of an iterative change of the internal parameters, through the presentation of many input patterns and their corresponding output patterns. The training process is accomplished if the error between the computed output and the desired output pattern is minimum for all examples in the training set. The network will then simulate the desired mapping on the restricted domain of the training examples. In the field of mathematical modeling, a radial basis function network is an artificial neural network that uses radial basis functions as activation functions. The output of the network is a linear combination of radial basis functions of the inputs and neuron parameters. Radial basis function networks have many uses, including function approximation, time series prediction, classification, and system control. We present an application of those neural networks in which the network is designed to accept scattered electromagnetic fields as its input pattern and to compute the corresponding material properties (permittivities and conductivities) of a layered material slab embedded in a homogeneous medium. The slab is modeled by N layers with constant layer thickness; hence, the dimension of the input vector space is 2N. The scattered electromagnetic fields are collected at M wave numbers; hence, the dimension of the output vector space is M. Three neural networks (exact radial basis, approximate radial basis and generalized regression) are designed, implemented and compared for performance. Performance criteria included size of the training set, mean square errors, maximum errors, error histogram distribution for both the training and generalization sets. Additionally the performance of the three networks in the presence of noise has been tested by adding different percentages of noise to the scattered electromagnetic fields. This application proves that radial neural networks are able to solve nontrivial inverse problems.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
12
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 5 )  
10:00 : 10:15
 
CSC - 5 EG Dr. Tamer Farag tamer@sci.cu.edu.eg
 
21
  Comparative Study of Two On-Demand Ad Hoc Routing Algorithms Using NS2 Simulator.  
  Reem Farag , Tamer Farag  
 
Department of Mathematics, Faculty of Science, Cairo university
College of Applied Studies and Community Services University of Dammam
 
  ABSTRACT  
  Ad-hoc wireless network is a collection of mobile nodes. Each node may act as a router to extend the wireless coverage. This type of networks has no fixed infrastructure, so routing is one of the challenges that face the researchers. Although most of routing protocols find the shortest working path, they have different network performances. In this paper we have made an analytical study of two ad-hoc routing algorithms, we investigate the performance under different interference levels, ieee802.11 specifications, and data rates. We measure the performance of three topologies using NS2. The results have shown that the average throughput is not proportionally increase with the data rate increase, and the interference has highly effect on each routing algorithm performance.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
13
TUE: 29-12-2015 Hall[A] Oral - Sec10 ( 6 )  
10:15 : 10:30
 
CSC - 6 EG Dr. Mostafa Herajy mm_herajy@hotmail.com
 
21
  On the Efficient Implementation of Multiscale Hybrid Simulation  
  Mostafa Herajy , Monika Heiner  
 
Mathematics and Computer Science Department, Faculty of Science, Port Said University, Port Said, Egypt
Computer Science Institute, Brandenburg University of Technology, Cottbus, Germany
 
  ABSTRACT  
  The recent interest in modelling multi-scale biological networks results in new challenges to the current simulation approaches. One of these issues is the need to simulate models that exhibit two timescales: slow and fast. A promising direction to tackle such difficulty is to resort to hybrid simulation where stochastic and deterministic simulation algorithms collaborate on executing the same model semantics. Nevertheless, many issues are risen during the implementation process which hinder the practical application of this approach. In this paper we identify three of these issues along with our approach to deal with them. Moreover, we present a running example to illustrate our solution.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
14
TUE: 29-12-2015 Poster - Sec 02 ( 1 )  
11:30 : 12:15
 
CSC - 7 EG Dr. Essam Othman essamothman1@yahoo.com
 
21
  A robust method for gesture recognition based on fingertip detection and multi-class support vector machine  
  Mahmoud Elmezain , Essam O. Abdel-Rahman  
 
Faculty of science, Tanta university, Egypt
Computer Science Department, Faculty of Computers and Information, Minia University, Minia, Egypt.
 
  ABSTRACT  
  While automatic hand gesture1 recognition technology has been successfully applied to real-world applications, there are still existed several problems that need to be solved for wider applications of Human-Computer Interaction (HCI). One of such problems, which arise in real-time hand gesture recognition, is to extract gestures via fingertip from the sequence of hand motions. Another problem is caused by the fact that the same gesture varies in shape, trajectory and duration, even for the same person. Mostly, previous approaches use the centroid points of hand motion, which make any gesture system not realistic and not well for on-line applications. The main contribution of this paper is to explore two parts; the first part is able to deal with a large number of hand gestures against complex backgrounds and lighting conditions. This part is based on a color and 3D depth map from kinect cameras. Furthermore, the hand trajectory will take place in further step using a robust stereo tracking algorithm to generate 3D dynamic features. The second part deals with the extracted features of dynamic affine-invariants as Zernike moments and elliptic Fourier, in addition to mass center and optical flow motion features are derived from 3D spatio-temporal hand motion. These feature vectors are used to train multi-class Support Vector Machine and a recognition process that identifies the hand gesture from the SVM of segmented hands. . The proposed techniques can automatically recognize isolated hand gestures with superior performance and low computational complexity when applied on several video samples containing confusing situations such as partial occlusion and overlapping.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
15
TUE: 29-12-2015 Poster - Sec 02 ( 1 )  
11:30 : 12:15
 
CSC - 9 EG Assoc.Prof. EL-Sayed Abdel-Khalek sayedquantum@yahoo.co.uk
 
21
  Two-dimensional image thresholding technique based on genetic algorithm and entropy  
  S. Abdel-Khalek , A. Ben Ishak , Osama A. Omer , A. S.- F. Obada  
 
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, Egypt
DElectrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt
Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt
Department of Mathematics, Faculty of Science, Al-Azhar University, Cairo, Egypt
 
  ABSTRACT  
  It is well known that for certain tasks, genetic algorithm techniques outperform classical methods. A growing number of contributions achieved the threshold of digital images using some information theory methods such as entropy. Threshold of an image are considered as a type of crucial information that can be extracted by applying detectors with different methodologies. It is a main tool in pattern recognition, image segmentation, edge detection and scene analysis. So, in this paper we proposed a novel image threshold based on the flexible representation of genetic algorithm (GA) employing Tsallis and Reyni entropies. The entropy is used to measure the amount of information contained in digital images in point of view of information theory. GA is able to achieve different tasks in image processing using different entropy formulas especially in medical images. Therefore, the image partition based on GA leads to maximum entropy fitness function compared to thresholding.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
16
TUE: 29-12-2015 Poster - Sec 02 ( 1 )  
11:30 : 12:15
 
CSC - 10 EG Dr. Mohamed A. El-Sayed mas06@fayoum.edu.eg
 
21
  Fast Algorithm for Edges Detection Based on Pal's Entropy  
  Mohamed A. El-Sayed  
 
Department of Mathematics, Faculty of Science, Fayoum University, Egypt
 
  ABSTRACT  
  There are many methods to perform edge detection in digital image. However, there are three common categories, gradient, Laplacian and entropy. In the gradient method detects the edges by searches for the maximize and minimize values of the first derivative of the image. The Laplacian method by looking for zerocrossings in the second derivative of the image to find edges, such as Roberts, Prewitt, Sobel and the Laplacian methods. These methods need processes give rise to the exponential increment of computational time, especially with large size of images, and therefore requires more time for processing. This paper shows the new algorithm based on Pal's entropy for edge detection using split and merge technique. The objective is to find the best edge representation with decrease the computation time. the proposed algorithm yields edge detection performance comparable to the classic methods. The effectiveness of the proposed method is demonstrated by using examples from the real-world and synthetic images. The performance evaluation of the proposed technique in terms of the quality of the edge images are presented. Keywords: Pal's entropy, Information content, Edge detection, Thresholding  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
17
TUE: 29-12-2015 Poster - Sec 02 ( 1 )  
11:30 : 12:15
 
CSC - 11 EG Dr. Mohamed A. El-Sayed mas06@fayoum.edu.eg
 
21
  Study of Features Optimization Method for User Biometric Identification  
  Mohamed A. El-Sayed  
 
Department of Mathematics, Faculty of Science, Fayoum University, Egypt
 
  ABSTRACT  
  In this paper we propose approach to study the complexity process of the identification mode related to the dimensionality problem. We plan first to determine pertinent features of users’ biometric templates such that the intra-variation is minimized and the inter-variation is maximized. Firstly, reduction of features extraction, we will use feature selection algorithm based on several Multi-Objective Optimization (MOO) techniques. Secondly, acceleration of classification, we will use recent method to determine clusters of users having significant similarities and then apply Support Vector Machine (SVM) classifiers on each cluster of users independently. Hence reducing the dimensionality of the dataset for training SVMs and improving the performance of user identification. The results of the approach will be compared to analyze which of the cases is more effective in improving the performance of user identification. It is minimize the computation time and increase the quality of outputs. Another benefit comes from easy implementation of this method.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
18
TUE: 29-12-2015 Hall[A] Oral - Sec13 ( 1 )  
03:15 : 03:30
 
CSC - 12 EG Dr. Mohamed Elgazzar mohamedhelgazzar@gmail.com
 
21
  Performance Optimization for Telecom Convergent Mediation  
  Mohamed Elgazzar  
 
Vodafone International Services
 
  ABSTRACT  
  Telecom Convergent Mediation is a critical system in the Mobile Networks as it is responsible for two main tasks. The first one is offline mediation and aims to process all the network event information (Call Detail Record - CDR) which are generated from all the network nodes and send the resulting information to the different IT systems (e.g. Billing, DWH, Revenue Assurance, etc). The second task is online mediation which is responsible for protocol conversion between the different network nodes that are not using the same network interface protocol (e.g. service node that is using HTTP and charging interface that is using diameter). Normally, the telecom operators locate the offline mediation in a separate hardware and the online mediation on another hardware to preserve performance. In this paper, a methodology is proposed to co-locate both offline mediation and online mediation on the same hardware in order to optimize the resource usage and hence power usage. The proposed methodology integrates different factors from the convergent mediation system and the system administrator inputs to provide optimal performance and resource optimization for the Convergent Mediation.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
19
TUE: 29-12-2015 Hall[A] Oral - Sec13 ( 2 )  
03:30 : 03:45
 
CSC - 15 NG Mr. ABIODUN ADEYINKA FASASI tuewes@gmail.com
 
21
  THE CHALLENGES FACING THE ADVANCEMENT OF TECHNOLOGY IN THE 21ST CENTURY NIGERIA, PERCEPTION OF THE FINAL YEAR STUDENTS OF COMPUTER SCIENCE IN OBAFEMI AWOLOWO UNIVERSITY, ILE IFE NIGERIA.  
  Fasasi Abiodun Adeyinka  
 
Imo State University Teaching Hospital
 
  ABSTRACT  
  The study investigated the challenges facing the advancement of technology in the 21st century Nigeria as perceived by the final year students of computer science in Obafemi Awolowo University, Ile Ife Nigeria. It explores the basic importance of technology as well as examined the possible influence that sex, class level, family type and age might have on the perception of the respondents. The study is a descriptive analysis of the prevailing situation in the country as observed by the University learners in Obafemi Awolowo University. Simple random sampling technique was used to select 200 students from the 2014/2015 graduating students. A self designed instrument used for the study is a 20 item questionnaire titled Technology Advancement in Nigeria (TAN). The face and content validities of the instrument were ascertained by giving copies of the instrument to some test experts in the field of Test and Measurement of the Faculty of Education, Osun State University, Ile Ife. Some of the items were reconstructed by the test experts and some ambiguous statements were restructured. The researcher took to all corrections and the validity was standardized. The Reliability of the instrument was ascertained using Test Retest Technique and r= 8.75 which was considered high enough for the study. The instrument was self administered with the cooperation of the level coordinator of the final year students. Data collected was analysed using Analysis of Covariance (ANCOVA) at 0.05 level of significance. The study revealed that the final year students had a negative perception towards the development of Technology in Nigeria. It was also revealed that the respondents were not different in their perception based on any of the demographic variables used in this study because. The F- cal (0.099) and the F- table (4.00) implies that there was no significant difference among the respondents based on class, ages, family type and gender. Based on the above findings, appropriate recommendations were made.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
20
TUE: 29-12-2015 Hall[A] Oral - Sec13 ( 3 )  
03:45 : 04:00
 
CSC - 16 NG Ms. Josephine Aworiwo Edeha otesodiq@gmail.com
 
21
  Enhancement of the Performance of Al-Qatraneh 33-kV Transmission Line Using STATCOM: A Case Study  
  Edeha Josephine Aworiwo  
 
Imo State University Teaching Hospital, Orlu,Imo State
 
  ABSTRACT  
  This paper presents a case study of using STATCOM to enhance the performance of Al-Qatraneh 33-kV transmission line. The location of the STATCOM was identified by maintaining minimum voltage drops at the 110 load nodes. The transmission line and the 110 load nodes have been modeled by MATLAB/Simulink. The suggested STATCOM and its location will increase the transmission capability of this transmission line and overcome the overload expected in the year 2010. The annual percentage loading rise has been considered as 14.35%. A graphical representation of the line-to-line voltages and the voltage drops at different load nodes is illustrated.  
 
 
International Conference for Mathematics
and Applications (ICMA15)
Academy of Scientific Research and Technology
27 – 29 DEC. 2015
Cairo, Egypt
 
 
المؤتمر الدولي في الرياضيات
(ICMA15)وتطبيقاتها 
أكاديمية البحث العلمي والتكنولوجيا
2015 ديسمبر 29 - 27
القاهرة  ـ  جمهورية مصر العربية
 
www.asrt.sci.eg  -  ncm-eg.org ICMA15.msa.edu.eg www.msa.edu.eg
 

Computer Science.
21
TUE: 29-12-2015 Hall[A] Oral - Sec13 ( 4 )  
04:00 : 04:15
 
CSC - 17 NG Ms. Josephine Aworiwo Edeha otesodiq@gmail.com
 
21
  Contention Window Adjustment in IEEE 802.11-Based Industrial Wireless Networks  
  MONDAY OMOTAYO ANTHONY  
 
Imo state university Teaching Hospital
 
  ABSTRACT  
  The use of wireless technology in industrial networks has gained vast attraction in recent years. In this paper, we have thoroughly analyzed the effect of contention window (CW) size on the performance of IEEE 802.11-based industrial wireless networks (IWN), from delay and reliability perspective. Results show that the default values of CWmin, CWmax, and retry limit (RL) are far from the optimum performance due to the industrial application characteristics, including short packet and noisy environment. In this paper, an adaptive CW algorithm (payload-dependent) has been proposed to minimize the average delay. Finally a simple, but effective CW and RL setting has been proposed for industrial applications which outperforms the minimum-average-delay solution from maximum delay and jitter perspective, at the cost of a little higher average delay. Simulation results show an improvement of up to 20%, 25%, and 30% in average delay, maximum delay and jitter respectively.