• Home
  • Program
  • Call For Paper
  • Paper Submission
  • Registration
  • Invited Speakers

AISI2024

  • Home
  • Important Dates
  • Program
  • Committees
  • Call For Paper
  • Paper Submission
  • Registration
  • Contacts
  • Call For Workshops

Technical Program

Day 1:    21 January 2025

Opining and Welcome Message

Professor Ashraf Darwish, Vice Chair of AISI2025

Professor Rawya Rizk, Chair of the AISI2025

Professor Sharif Saleh, the president of the Prot Said University

Time 10.00-10.30

Session (1)

Advanced intelligent systems and informatics

Session Chairs

Professor Rehab F. Abdel-Kader, Port Said University, Egypt

Dr. Mohamed Abdelfatah, 

10.30-10.40

A Deep Learning Approach for 3D Human Object Reconstruction from 2D Images: Review, advances, and limitation

by  Omnia A. Al-Eisawi, Esraa A.-R. Hamed, Howida A. Shedeed, and Mohamed F. Tolba

10.40-10.50

Enhancing the Rating Prediction accuracy of Item-based Collaborative Filtering Recommendation System

by Fainan Nagi El-Sisi, Hatem Abdul-kader , Arabi El-Said Keshk, Asma Haroun Elsaid and Hussam Elbehiery

10.50-11.00

Breast Cancer Detection on Thermography Using Convolutional Neural Network Algorithm

By Basant Ali Sayed, Ahmed Sharaf Eldin, Doaa Saad Elzanfaly, and Amr Ghoneim

 

11.00-11.10

 Imagined Speech Decoding from EEG Signal

By Reham A. El Shahed, Doaa Ezzat, Howida A. Shedeed, and Mohamed F. Tolba

11.10-11.20

Reducing the Execution Time of User-based Collaborative Filtering Recommendation System 

by  Fainan Nagy El-Sisi, Mohamed Mahmoud Fouad, Arabi El-Said Keshk, and Hatem Abdul-kader

11.20-11.30

Comparative Analysis of Custom CNN Architecture and MobileNet for Deepfake Image Detection

by Omar Akram, Abdelrahman Mohamed, Hager Magdy, Mariam M. Abdellatif, and Sara Abdelghafar

11.30-11.40

Efficient Sleep Apnea Detection via ECG Signals Using a 1D Convolutional Neural Network

By Asmaa Ali Elsheikh, Doaa.Ezzat, and Manal Tantawi

11.40-11.50

Leveraging Artificial Intelligence for Enhanced Detection and Mitigation of Illicit Activities on the Dark Web

by Ramy El-Kady

11.50-12.00

 A Novel Downlink Scheduler based on Social Spider Algorithm for Enhanced LTE Networks

By Heba Nashaat, Mervat Salah and Rawya Rizk

12.00-12.10

 An Enhanced Context Awareness and Semantic Service Provisioning Framework for Efficient IoT Resource Management

By  Wael Haider, Hatem Abdelkader, and Amira Abdelwahab

12.10-12.20

Optimized Base Station Placement in WSNs: A Hybrid Adaptive Approach for Maximized Lifetime

by Ahmed Salah, Heba M. Abdel-Atty, Rawya Y. Rizk,  and Islam E. Shaalan

12.20-12.30

Evaluating AI Approaches for 5G Network Traffic Prediction: A Comparative Analysis  by Alaa A. Hussien, Heba Nashaat and Rehab F. Abdel-Kader

12.30-12.40

Deep Feature Fusion-Based Model for Real-Time Malicious Drone Identification

Gehad Ismail Sayed  and Aboul Ella Hassanien-

Break

Session (2) Intelligent systems and applications

Session Chairs:

Dr. Heba M. Abdel-Atty

Dr. Heba Nashaat

1.00-1.10

  Deep Q-Learning Model for Enhanced Human Activity Recognition in Smartphone Applications

Ahmed khedr   and  Heba Askr

1.10-1.20

Emotion Detection in Egyptian Academics Sentiment about ChatGPT usage in Academic Article Writing using Word2Vec

by Lamiaa Mostafa   and Sara Beshir

1.20-1.30

 Impact of Artificial Intelligence (AI) on Lingual Connection and its Perspectives

Hind Tarish Al Yahya, Ohaud Al Muoaeweed, Doha Adel Bilal

 

1.30-1.40

Shallow Convolutional Networks for Crop Mapping in the context of sparse training points

By Bassam Abdellatif 

1.40-1.50

 Smart Water Distribution Management Using Machine Learning Techniques

By Mervat Salah, Rehab F. Abdel-Kader, and Shereen El-Shekheby

1.50-2.00

E-Commerce Churn Prediction for Analyzing Customer Behavior Based on Machine Learning

By Sameh Zarif , Mohamed Sobhy, and Marian Wagdy

2.00-2.10

AUTODIAG: Revolutionizing Automotive Maintenance Remote Diagnostics Empowered using Artificial Intelligence and Embedded Systems Through IoT

By Eman Adel, Ahmed Saleh, Ahmed Samir, Emily Essam, Mahmoud Nasr, Mohamed Fathy, Mohamed Nadim, Mostafa Ahmed, Sandy Nabil, Yasmeen Hany, Youssef Ahmed, and Marwa Gamal

2.20-2.30

A Real-Time Bilingual Sign Language Alphabet Recognition System Based on Deep Learning and OpenCV

By Ganna Saleh, Nada Zamzam, Mariam M. Abdellatif, and Sara Abdelghafar1

2.30-2.40

 Bee -Inspired Clustering Framework for Internet of Vehicles

By Abeer A. Hassan, Radwa Attia, and Rawya Rizk 

2.40-2.50

Autonomous Navigation Techniques for Mobile Robots in Complex Environments: A review

By Hala Elhadidy, Aya Abdelhady Deaf, Rawya Yehia Rizk, Walaa Elsayed Saber

2.50-3.00

Developing-UI Network Traffic Analysis and Malicious Packet Detection System Application Using AI algorithms.

By Soha A. Mohamed and Habib El-Rahman2

3.00-3.10

Optimizing Single Object Tracking Using Attention-Driven Discriminative Correlation Filters

By Ahmed O. Elsaid and Mohamed M. Fouad Tarek S. Ghoniemy

3.10-3.20

Distinguishing Olive and Henna Leaves with Histogram of Oriented Gradients and Logistic Regression model By Ghada Dahy, Heba Aboul Ella,  Dalia Zainal

Close

Day 2:    22 January 2025

On-line presentation

Cairo Time

Online session

Intelligent systems and applications

Session Cahir :Professor Aboul Ella Hassanien

5.00-5.10

Fusion Based Technique for Underwater Image Enhancement  by By Rajdeep Basu, Ronit Kumar , Pratima Sarkar , Sourav De, Siddhartha Bhattacharyya , Jan Platos, Vaclav Snasel

5.10-5.20

Context-Aware Multi-Criteria Recommender Systems  Using Variable Selection Networks by LE Ngoc Luyen, Marie-Hélène ABEL

5.20-5.30

Advanced Data Mining Solution for Educational Decision Making by  Debnath N. C., Novillo-Rangone, G. A , Montejano G. A, Garis, A. G., Molina, W.R., Riesco D.

5.30-5.40

Quantum Computing in Cybersecurity using Quantum Key Distribution and Quantum Random Number Generator By Archit Kumar,  Shilpi Sharma,  and Narayan C. Debnath

5.40-5.50

YOLOv8 for Vehicle Detection and Speed Estimation  by Anh Kim Thi Do, Thanh My Le Truong, Narayan C. Debnat , Vinh Dinh Nguyen

5.50-6.00

Perceptual Hashing Algorithms for Image Recognition  by Anshdeep Singh, Mohd Zaid Khan, Shilpi Sharma, Narayan C Debnath

6.00-6.10

Dense Crowd Facial Recognition Technology Based on Improved YOLOv5 Algorithm by  Song Tang

6.10-6.20

Traffic Sign Classification Using an Ensemble Technique with Machine Learning and Deep Learning Methods   by Vinh Dinh Nguyen and Narayan C. Debnath

6.20-6.30

IoT Enabled Indian Postal Sign Recognition System: Facilitating Communication among Individuals with Hearing and Speech Impairments By Sesan D, Dhanalakshmi, Jennyfer Susan M B, Krishnaveni M, Narmatha V, Subashini, and Prabavathi G. T

6.30-6.40

Transformer Models in Natural Language Processing: A Comprehensive Review and Prospects for Future Development By Maha Salem, Azza Mohamed, and Khaled Shaalan1

6.40-6.50

Intelligent Water Management: Deep Learning in Edge and Fog Computing for Smart Irrigation By Manash Kumar Mondal, Sourav Banerjee, Moumita Roy, Utpal Biswas, and Narayan C. Debnath

6.50-700

A novel architectural framework for 2-D Global Routing using hybrid Biogeography-based Optimization and Maze Routing Algorithm By Lavika Goel

7.00-7.10

 AISI2024 ©. All Rights Reserved.