iKNiTO Journal Management System
Toggle navigation
Home
Volume & Issue:
Volume 8, Issue 2, December 2021, Page 1-176 (Special issue for proceedings of the first international conference of computers and information, ICCI 2021.)
1
Editorial: Special issue for selected articles from the proceedings of the first international conference on computers and information, ICCI'2021.
View Article
|
PDF
478.62 K
|
View on SCiNiTO
2
Heart Disease Classification Based on Hybrid Ensemble Stacking Technique
Page
1-8
Ahmed El Sheikh; Nader Mahmoud; Arabi Elsayed Keshk
View Article
|
PDF
420.33 K
|
View on SCiNiTO
3
New CAPTCHA Approach for Securing Online Social Network and Webpages Using Extended Finite Automata (XFA CAPTCHA)
Page
9-16
menna-allah magdy mostafa; Hamdy M. Mousa; Medhat A. Tawfik
View Article
|
PDF
605.57 K
|
View on SCiNiTO
4
Collaborative Filtering Using Explicit and Implicit Ratings for Arabic Dataset
Page
17-25
Rouhia Mohammed Sallam; M. Hussien; Hamdy M. Mousa
View Article
|
PDF
551.13 K
|
View on SCiNiTO
5
Automated Market Analysis by RFMx Encoding Based Customer Segmentation using Initial Centroid Selection Optimized K-means Clustering Algorithm
Page
26-31
Ahmed Maghawry; Ahmed Al-qassed; Mohamed Awad; M. Kholief
View Article
|
PDF
428.68 K
|
View on SCiNiTO
6
A Comparative Study of Machine Learning Algorithms for Short-term Electrical Load Forecasting
Page
32-37
M. Hussien; Wesam Yehia; Ashraf Bahgat El-Sisi
View Article
|
PDF
477.43 K
|
View on SCiNiTO
7
Parallel Fast Dynamic Algorithm for Sequence Alignment Using OpenMP and Partitioning Scheme
Page
38-43
Sara A shehab
View Article
|
PDF
430.25 K
|
View on SCiNiTO
8
Troubleshooting Payment Journey In Multilayer System Using Blockchain Technology
Page
44-50
Ahmed Abd-Elwasaa; Eman M Mohamed; Arabi Elsayed Keshk
View Article
|
PDF
520.18 K
|
View on SCiNiTO
9
Security Testing of IOT Smart Applications
Page
51-56
Shymaa Shaban; Eman M Mohamed; Arabi Elsayed Keshk
View Article
|
PDF
321.06 K
|
View on SCiNiTO
10
Detecting and Predicting Crimes using Data Mining Techniques: Comparative Study
Page
57-62
Samah Zahran; Eman M Mohamed; Hamdy M. Mousa
View Article
|
PDF
347.15 K
|
View on SCiNiTO
11
Power-Aware Allocation of Virtual Machine-Based Real-Time Cloudlets in Cloud Data Centers
Page
63-70
eman ibrahim elbedewy; Anas Youssef; Arabi Keshk
View Article
|
PDF
707.4 K
|
View on SCiNiTO
12
Hybrid approach for COVID-19 detection from chest radiography
Page
71-76
Esraa Fady Dawod; Nader Mahmoud; Ashraf Elsisi
View Article
|
PDF
453.36 K
|
View on SCiNiTO
13
Survey of Computation Integrity Methods For Big Data
Page
77-81
Doaa mohamed abo aly; Walid Atwa; Hamdy M. Mousa
View Article
|
PDF
645.81 K
|
View on SCiNiTO
14
A Comparative Analysis for Predicting Airline Arrival Delays
Page
82-86
Alaa Ebrahim ghalwash; Hamdy M. Mousa; Heba Mohamed Atef Elbeh
View Article
|
PDF
339.62 K
|
View on SCiNiTO
15
SBPAM: Secure Based Predictive Autoscaling Model For containerized application
Page
87-93
M. Shenawy; Hayam Mousa; Khalid M. Amin
View Article
|
PDF
703.41 K
|
View on SCiNiTO
16
An Efficient Person Re-Identification Method Based on Deep Transfer Learning Techniques
Page
94-99
Shimaa Saber; Khalid M. Amin; Mohamed Adel Hammad
View Article
|
PDF
517.67 K
|
View on SCiNiTO
17
COVID-19 Detection Based on Chest X-Ray Image Classification using Tailored CNN Model
Page
100-108
M. Zaki; Khalid Amin; Ahmed Mahmoud Hamad
View Article
|
PDF
492.35 K
|
View on SCiNiTO
18
Variational 3D Mesh Generation of Man-Made Objects
Page
109-114
G. Fahim; Sameh Zarif; Khalid Amin
View Article
|
PDF
519.25 K
|
View on SCiNiTO
19
Enhanced User Authentication Based on Dynamic Port Knocking Technique
Page
115-124
Alaa Zidan; Khalid M. Amin; T. Ghanem
View Article
|
PDF
556.1 K
|
View on SCiNiTO
20
Static video summarization approach using Binary Robust Invariant Scalable Keypoints
Page
125-130
Eman Morad; Khalid M. Amin; Sameh Zarif
View Article
|
PDF
684.15 K
|
View on SCiNiTO
21
Gamification in education: Serious Game Prototype for Children with Special Needs
Page
131-136
Eman Shaltout; Khalid M. Amin; Ahmed Afifi
View Article
|
PDF
613.65 K
|
View on SCiNiTO
22
A proposed learning model based on fog computing technology
Page
137-143
M. Saieed; Hatem Ahmed; N. Abbas
View Article
|
PDF
553.26 K
|
View on SCiNiTO
23
Enhanced Security System of Internet of Things data streaming
Page
144-150
A. Saada; Hatem Abdel-Kader; Asmaa H Ali
View Article
|
PDF
630.01 K
|
View on SCiNiTO
24
A novel optimization algorithm for the missing data in HCC based on multiple imputation and genetic algorithm
Page
151-155
Y. Salah; M. Adel Hammad; Hatem Abdel-Kader
View Article
|
PDF
329.75 K
|
View on SCiNiTO
25
Frequent Pattern Mining over Streaming Data: From models to research challenges
Page
156-161
A. Saad; Rashed Salem; Hatem Abdel-Kader
View Article
|
PDF
509.26 K
|
View on SCiNiTO
26
Diffusion Models for Social Analysis, Influence and Learning
Page
162-169
N. Badr; Hatem Abdel-Kader; Asmaa H Ali
View Article
|
PDF
444.43 K
|
View on SCiNiTO
27
A Review for Recommender System Models and Deep Learning
Page
170-176
F. Nagy; A. Haroun; Hatem Abdel-Kader; Arabi Keshk
View Article
|
PDF
562.61 K
|
View on SCiNiTO