


default search action
ICSIE 2019: Cairo, Egypt
- Proceedings of the 2019 8th International Conference on Software and Information Engineering, ICSIE 2019, Cairo, Egypt, April 09-12, 2019. ACM 2019, ISBN 978-1-4503-6105-7

Software Engineering
- Kamal A. El-Dahshan, Eman K. Elsayed, Naglaa E. Ghannam

:
Comparative Study for Detecting Mobile Application's Anti-Patterns. 1-8 - Jalal Shah, Nazri Kama, Nur Azaliah Abu Bakar

:
Estimating Change Effort Using a Combination of Change Impact Analysis Technique with Function Point Analysis. 9-14 - Zainab Umair Kamangar, Umair Ayaz Kamangar

, Qasim Ali, Isma Farah Siddiqui
, Shahzad Nizamani, Tauha Hussain Ali:
To enhance Effectiveness of Crowdsource Software Testing by applying Personality Types. 15-19 - Fatai Idowu Sadiq, Akpe A. C. Ehinomen, Bobadoye, S. Temidayo, Kayode I. Adenuga, Soliudeen, M. Jamiu:

Ontology-Based Smart Attendance using Android Mobile Application in Higher Institution. 20-24 - Tihomir Orehovacki

:
Objective and Subjective Metrics Meant for Evaluating Quality of Social Web Applications. 25-29 - Aldrin Jaramillo Franco, Germán Urrego-Giraldo:

Brainstorming versus a Scenario-based Approach: Results of an Empirical Study. 30-37 - Kamran Ali Memon

, Xiaoling Xia, Habiba Halepoto
:
Some Serious Deliberations and Reflections on the Significance of Non-Functional Requirements for Improving the Quality of Software. 38-41 - Soonh Taj

, Qasim Ali Arain, Imran Memon, Asma Zubedi:
To apply Data Mining for Classification of Crowd sourced Software Requirements. 42-46 - Nahla H. Barakat

:
A Framework for integrating software design patterns with game design framework. 47-50 - Bojan Nokovic, Salah Sharieh:

Case Study: Qualitative and Quantitative Verification of File Ingestion Process. 51-54 - Patricia P. Jiménez, Jimena Pascual, Andrés Mejía:

Towards a pedagogical model of social justice in engineering education. 55-59 - Rania Rushdy Moussa, Khaled Mohamed Dewidar:

Evaluating the Efficiency of Energy-scape software. 60-65
Computer Science and Engineering
- M. Medhat Kamal

, Saad M. Darwish
, Ahmed Elfatatry:
Enhancing the Automation of GUI Testing. 66-70 - Kayode I. Adenuga, Rahmat O. Adenuga, Abdallah Ziraba, Penn E. Mbuh:

Healthcare Augmentation: Social Adoption of Augmented Reality Glasses in Medicine. 71-74 - Ahmed Elnakib

, Hanan M. Amer
, Fatma E. Abou-Chadi:
Computer aided detection system for early cancerous pulmonary nodules by optimizing deep learning features. 75-79 - Amira Galal, Farah Hisham, Mennatallah Mohamed, Sara Hassan, Taraggy M. Ghanim, Ayman Nabil

:
Automatic Recognition of Elbow Musculoskeletal Disorders using Cloud Application. 80-84 - Nadine Farag, Samir Abou El-Seoud

, Gerard T. McKee, Ghada Hassan:
Bullying Hurts: A Survey on Non-Supervised Techniques for Cyber-bullying Detection. 85-90 - Manar Abdelhamid, Ghada Hassan:

Blockchain and Smart Contracts. 91-95 - Ahmed Awad, Khaled Nagaty:

Commit Message Generation from Code Differences using Hidden Markov Models. 96-99 - Saad M. Darwish

, Adel A. El-Zoghabi, Hany M. Elgohary:
Bio-inspired Expert System for Identifying Questioned Documents' Printer Source Suitable for Digital Forensics. 100-104 - Víctor Hugo Medina García, Marino Mauricio Mejía Rocha, Lina María Medina Estrada:

Knowledge Management System Architecture based on Cultural Algorithms. 105-108 - Nannan Heng, Zhengyi Yang, Shengnan Zhu, Jie Zeng:

A Novel Method of Dynamic Cloud Workflow Processing Based on 3D_DWFN. 109-113 - Ayman Elzagh, Mohamed Shaheen, Sohair F. Rezeka:

Decision support system to measure the suitability and compatibility of CubeSats components with launch vehicles frequencies (LSCDSS). 114-119 - Daoud M. Daoud, Samer Aoudi

, M. Samir Abou oudi:
Building a Sentiment Analysis system using automatically generated training Dataset. 120-125 - M. Samir Abou El-Seoud, Amr S. Mady:

A Comprehensive Review on Volume Rendering Techniques. 126-131 - Lei Feng, Lidong Wei, Lei Yang, Xiaoying He, Jinsong Zhou:

Modeling and Simulation of spectrometer based on prism. 132-135
Information and Communication Technology
- Haitham Hafez, Amro Mokhtar:

Performance Analysis of Transmit Diversity and Spatial Multiplexing MIMO Techniques in LTE Cell Edge Coverage Areas. 136-140 - Yaru Tang, Shuang Cong:

Quantum State Feedback Control Based on the on-line State Estimation. 141-144 - Ahmed Samir Abo-Taleb, M. Nabil, Mohamed Shalaby

, Salwa Elramly:
An Enhanced SHA3-based Hashing Method: A Side-channel attack countermeasure. 145-150 - Shafiq-Ur Rehman, Manuel Ceglia, Sidra Siddiqui, Volker Gruhn:

Towards an Importance of Security for Cyber-Physical Systems/Internet-of-Things. 151-155 - Salma Nasser, Amr Alashram, Ahmed Hani, Khaled Fathy, Haitham H. M. Mahmoud

, Dalia Ayman, Sameh O. Abdellatif:
Implementation of Underwater Communication System powered by Solar Energy Harvesting. 156-161 - Souheil Fenghour, Daqing Chen

, Perry Xiao
:
Decoder-Encoder LSTM for Lip Reading. 162-166 - Hosam F. El-Sofany, Samir Abou El-Seoud

:
A Cloud-based Educational and Career Guidance Model using Fuzzy Logic Concepts. 167-172 - Walaa Mohamed, Mohammad M. Abdellatif

:
Telemedicine: An IoT Application For Healthcare systems. 173-177 - Ayatalla Abdelrahman, Mohammad M. Abdellatif

:
Performance of Detection Algorithms for Massive MIMO Systems. 178-182 - Muneer O. Bani Yassein

, Ameena Flefil, Dragana Krstic
, Yaser M. Khamayseh
, Wail Mardini, Mohammed Q. Shatnawi
:
Performance Evaluation of RPL in High Density Networks for Internet of Things (IoT). 183-187 - Farhan Ali

, Yigang He:
Spectrum for Next Generation Technologies. 188-191 - Mosleh M. Abu-Alhaj

, Mayy M. Al-Tahrawi, Sumaya N. Al-Khatib:
A New Method to Improve Voice over IP (VoIP) Bandwidth Utilization over Internet Telephony Transport Protocol (ITTP). 192-195
Big Data Analysis and Applications
- Kayode I. Adenuga, Idris Oladele Muniru, Fatai Idowu Sadiq, Rahmat O. Adenuga, Muhammad J. Solihudeen:

Big Data in Healthcare: Are we getting useful insights from this avalanche of data? 196-199 - Esraa Hamdi Abdelaziz, Sanaa Moharram Kamal, Khaled El-Bhanasy, Rasha M. Ismail

:
The application of data mining techniques and feature selection methods in the risk classification of Egyptian liver cancer patients using clinical and genetic data. 200-205 - Marwa S. Salem, Sally S. Ismail

, Mostafa Aref:
Personality Traits for Egyptian Twitter Users Dataset. 206-211 - Heba Salah Elselmy, Ayman Ghoneim, Ihab A. El-Khodary:

Portfolio Selection Factors: Egypt Equity Market Case Study. 212-216 - Tasneem A. Gameel, Sherine Rady

, Khaled A. ElBahnasy
, Sanaa Moharram Kamal:
Novel Biomarkers from genes in the apoptotic pathway for Prediction of HCC Progression using Association Rule Mining. 217-221 - Gehad Zakria, Mamdouh Farouk, Khaled Fathy, Malak N. Makar:

Semantic Representation Extraction from Unstructured Arabic Text. 222-226 - Álvaro Romero, Antony Gonzales, Carlos Raymundo

:
Data Governance Reference Model under the Lean Methodology for the Implementation of Successful Initiatives in the Peruvian Microfinance Sector. 227-231 - Laureta Hajderanj, Isakh Weheliye, Daqing Chen:

A New Supervised t-SNE with Dissimilarity Measure for Effective Data Visualization and Classification. 232-236 - Eslam Abou Gamie, M. Samir Abou El-Seoud, Mostafa A. Salama:

A layered-analysis of the features in higher education data set. 237-242 - Essam A. Rashed

, M. Samir Abou El-Seoud:
Deep learning approach for breast cancer diagnosis. 243-247 - Nada S. El-Askary

, Mohammed A.-M. Salem
, Mohamed Ismail Roushdy
:
Feature Extraction and Analysis for Lung Nodule Classification using Random Forest. 248-252 - Muhammad Mustafa Hassan

, Markku Tukiainen, Adnan N. Qureshi:
(Un)Discounted Usability: Evaluating Low-Budget Educational Technology Projects with Dual-Personae Evaluators. 253-258 - Ann Nosseir, Mokhtar Ahmed Shawky:

Automatic Classifier for Skin Disease Using k-NN and SVM. 259-262 - Ann Nosseir, Omar El Araby:

Monitoring Baby State While Sleeping Using K-NN and M-SVM Classifiers. 263-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














