ACM Proceedings of the ICSIE 2018
Total Page:16
File Type:pdf, Size:1020Kb
Proceedings of 2018 7th International Conference on Software and Information Engineering ICSIE 2018 The British University in Egypt, Egypt May 2-4, 2018 ISBN: 978-1-4503-6469-0 The Association for Computing Machinery 2 Penn Plaza, Suite 701 New York New York 10121-0701 ACM COPYRIGHT NOTICE. Copyright © 2018 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or [email protected]. For other copying of articles that carry a code at the bottom of the first or last page, copying is permitted provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, +1-978-750-8400, +1-978-750-4470 (fax). ACM ISBN: 978-1-4503-6469-0 Table of Contents ....................................................................................................................................................................... Preface ............................................................................................................................................ v ConferenceSession Committees 1- Software Engineering and Information Security vi .......................................................................................................................... DynamicAndrew Code Sadek, Loading Mohamed to a Bare-metal Elmahdy and Embedded Tarek Eldeeb Target 1 ................................................................... An EmpiricalJalal Shah, Study Nazri with Kama Function and Saiful Point Adli Analysis Ismail for Software Development Phase Method 7 ......................................................................................................... AnalysingMarlina Log Abdul Files Latib, For Web Saiful Intrusion Adli Ismail, Investigation Othman Mohd Using Yusop, Hadoop Pritheega Magalingam and Azri Azmi 12 ............................................................................... 3 Privacy-PreservingSaeed Samet, Mohd Personal Tazim Health Ishraque Record and (PAnupamHR): A Sharma Secure Android Application 22 ......................................................................................................................... The RoleAli Meligy, of Ethnography Walid Dabour in Agile and AlaaRequirements Farhat Analysis 27 ............................................................................... PredictingNadine the Farag Survivors and Ghada of the Hassan Titanic - Kaggle, Machine Learning From Disaster - 32 .................................................. UsingNayeth Fuzzy I. Logic Solorzano in QCA Alcivar, for the Luke Selection Houghton of Relevant and Louis IS Adoption Sanzogni Drivers in Emerging Economies 38 ........................................................ UsingSara SMOTE Adel andEl-Shorbagy, Heterogeneous Wael Mohamed Stacking El-Gammal in Ensemble and learning Walid. for M. AbdelmoezSoftware Defect Prediction 44 Session 2- Computer Vision and Image Processing ...................................................... ExtractionAnn Nosseir of Egyptian and Ramy License Roshdy Plate Numbers and Characters Using SURF and Cross Correlation 48 ............................................................................................................. AutomaticAnn Nosseir Extraction and Omar of Arabic Adel Number from Egyptian ID Cards 56 .......................................................................................................... AutomaticAnn Nosseir Identification and Seif Eldinand Classifications Ashraf Ahmed for Fruits Using k-NN 62 ............................................................................. ComputerReham Aided Rabie, Diagnosis Mohamed System Meselhy for Eltoukhy, Liver Cirrhosis Mohammad Based al-Shatouri, on Ultrasound Essam Images A. Rashed 68 ................................................................................................................................. ImageHaneen Denoising A. Elyamani, Technique Samir forA. CT El-Seoud Dose Modulation and Essam A. Rashed 72 ...................................................................................... An InteractiveSamir A. El-Seoud, Mixed Reality Amr S. Imaging Mady and System Essam for A. Minimally Rashed Invasive Surgeries 76 ........................................................................... A Computer-AidedHanan M. Amer, Early Fatma Detection E.Z. Abou-Chadi, System of Sherif Pulmonary S. Kishk Nodules and Marwa in CT I. ScanObayya Images 81 iii Session 3- Computer Science and Applications ................................................................................................... Directer:Xiaobin A Parallel Song, Zehui and Directed Wu and Yunchao Fuzzing Wangbased on Concolic Execution 87 ......................................................................... A NewNada Approach Radwan, for M. Implementing B. Abdelhalim 3D and Video Ashraf Call AbdelRaouf on Cloud Computing Infrastructure 93 .................................................................................................. InteractiveIhab Adly, Mobile Mohamed Learning Fadel, Platform Ahmed at El-Baz the British and Hani University Amin in Egypt 97 .................................................................................... A RESTfulMohanad Architecture Odema, Ihab for PortableAdly, Ahmed Remote El-Baz Online and Hani Experimentation Amin Services 102 .................................................................................... AdaptiveShourok security AbdelRahim, scheme Samy for real-time Ghoneimy VoIP and using Gamal multi-layer Selim steganography 106 ....................................................................................................................................................................................... ClickbaitSuhaib Detection R. Khater, Oraib H. Al-sahlee, Daoud M. Daoud and Samir Abou El-Seoud 111 ...................................................................................... PedagogicalEslam Abou and Gamie, Elearning Samir Logs Abou Analyses El-Seoud, to Enhance Mostafa Students’ A. Salama Performance and Walid Hussein 116 ................................................................................................. EfficientDiaaEldin Architecture M. Osman, for MohamedControlled A. Accurate Sobh, Ayman Computation M. Bahaa-Eldin using AVX and Ahmad M. Zaki 121 ............................................................................ A FrameworkEslam Amer to andAutomate Ayman the Nabil Generation of Movies’ Trailers Using Only Subtitles 126 ............................................................. Example-BasedRana Ehab, MachineEslam Amer Translation: and Mahmoud Matching Gadallah Stage Using Internal Medicine Publications 131 ................................................................................................... PositiveMostafa and NegativeA. Salama Feature-feature and Ghada Hassan Correlation Measure: AddGain 136 iv Preface The 2018 7th International Conference on Software and Information Engineering (ICSIE 2018) provided a forum for accessing the most up-to-date and authoritative knowledge from both industrial and academic worlds, sharing best practices in this exciting field. ICSIE 2018 was held in Cairo, Egypt, during the period May 2-4, 2018. The event was held with presentations delivered by researchers and scholars from the international community, including keynote speeches and highly selective lectures. The proceedings of ICSIE 2018 consist of 26 selected papers from 64 submitted papers which were from universities, research institutes and industries. All of the papers were subjected to peer-reviewing by conference committee members and international reviewers. The papers selected for the proceedings depended on their quality and their relevance to the conference. Studies presented in this volume cover the following topics: Artificial Intelligence, Bioinformatics, Communication Systems and Networks, Computer Vision & Pattern Recognition, Design Patterns and Frameworks, Distributed and Intelligent Systems, Software Requirements Engineering, Technology Transfer, Web Engineering, etc. The conference dinner took place with a glittering 2-hour dinner cruise along the iconic Nile River and was greatly enjoyed by all participants. I would like to take this opportunity to thank many people. First and foremost I want to express my deep appreciation to keynote speakers, session chairs, as well as all the reviewers for their efforts and kind help in this congress. Final thanks go to all authors and participants at ICSIE 2018 for helping to make it a successful event. Conference Chair Prof. Samir A. El-Seoud, The British University in Egypt, Egypt v Conference Committees International Advisory Committees Prof. Dr.sc., Dr.-Ing. Michael E. Auer, Vice Rector at Carinthia University of Applied Sciences (FH Kärnten), Austria Prof. Omar H. Karam, Dean of the Faculty of Informatics and Computer Science (ICS), The British University in Egyot (BUE), Egypt Prof. Mohamed F. Tolba,