Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The...

12
Under the Patronage of his Excellency Eng. Atef Minister of Information and Communication Technology Conference Program The 5 th International Conference on Information Technology May 11 th – 13 th , 2011 Al-Zaytoonah University OF JORDAN Amman, Jordan 1

Transcript of Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The...

Page 1: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

Under the Patronage of his Excellency

Eng. Atef

Minister of Information and Communication Technology

Conference ProgramThe 5th International Conference on Information Technology

May 11th – 13th, 2011

Al-Zaytoonah University OF JORDAN

Amman, Jordan

Faculty of Science and Information Technology

1

Page 2: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

Technically co-sponsored by:IEEE Jordan Section

IEEE Computer Society Lebanon Chapter

2

Page 3: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

Tuesday May 10th , 2011Registrations for guests from other countries: Dana Plaza Hotel: 19:00-21:00

Preconference Sessions 1- 9:00-12:00: Writing Research Grant Proposals:1. How to write research *grant* proposals; Prof. Rosni Abdullah, Universiti Sains Malaysia2. Conducting Literature Review - by Prof Tajudin 2- 12:00-13:00: Supervising Master and PhD degree, Abdel-Badeeh M. Salem, Ain Shams University, Cairo-Egypt: 3- 13:00-14:00: Quality Assurance Perspectives in Higher Education Organizations, Ahmad Dalal’ah, University of Ha’il, Saudi Arabia

Wednesday May 11th , 2011

8:00 – 8:45 Registrations for Jordanian

9:00 – 9:30Main StageBuilding 1

Opening Session- Conference Brief- University Brief- MOICT and Jordanian vision

9:30 – 10:00 Coffee Break

10:00–10:40Main StageBuilding 1

Keynote Speech 1Title: " Filling the gap between Simulation and Reality "By: Prof Dr Hans-Dieter Burkhard Humboldt University Berlin, Germany Chair: Dr. Al-Dahoud Ali

10:45 –11:30Main StageBuilding 1

Keynote Speech 2Title: Diffusing ICT MindfulnessBy: Professor Sonny Nwankwo Director of Research & Enterprise, East London University, UK

11:40-12:25Main StageBuilding 1

Keynote Speech 3Title: The Fractal Nature of Internet TrafficBy: Maaruf Ali SMIEEE, FHEA(UK), UK

12:30-13:15Main StageBuilding 1

Keynote Speech 4Title: Cognitive Biometrics: a Biosignal Based Approach to Person AuthenticationBy: Kenneth Revett, British University in Egypt

3

Page 4: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

13:20-14:05Main StageBuilding 1

Keynote Speech 5Title: How Trust affects Internet SecurityBy: Johnnes ARREYMBI, University of East London, UK

14:15– 15:15 Lunch: Restaurant of Al-Zaytoonah University

15:30-17:30

5012Faculty of IT

Building 5

15:30-17:305011

Faculty of ITBuilding 5

Algorithms and ApplicationsChair: 1- Accuracy Measures for the Comparison of Classifiers, Vincent Labatut and Hocine Cherifi , Galatasaray

University, Turkey, University of Burgundy, France.

2-Artificial Bee Colony Algorithm for Curriculum Based Course Timetabling Problem, Asaju La’aro Bolajia , Ahamad Tajudin Khadera ,Mohammed Azmi Al-betara , Mohammed Awadallaha, Al-Zaytoonah University and a School of Computer Sciences, Universiti Sains Malaysia.

3-Application of Continuous Genetic Algorithm For Second-Order Singular Boundary Value Problems, Omar Abu Arqub, Zaer Abo-Hammour, Hassan Rashaideh, Dept. of Applied Science, Al-Balqa, Applied University.

4-Analysis of Feature Selection and Classification Techniques on Microarray Data, Colin Giles, Ryan Wakelam, Sean Malone, Ghada Naji, Mohamad Naji, Tansel Ozyer, Reda Alhajj, Jon Rokne, Dept. of CS, University of Calgary, Calgary, Alberta, Canada.

5- On Application of Ditance-Like Algorithms to Eevent Detection From Non-Stationary Time Series, Tomasz Pelech-Pilichowki, AGH-University of Science and Technology, Krakow, Poland.

6-Applying GA to find Minimum Cost Routes between existing nodes in Different Network Models, Ahmad Al-Sayaad, Abeer Abu-Sultan, Zakaria Zayed, Deena Abu-Sultan, XIS Solutions, Kuwait.

Security (Communication Security/Network Security/Data Security)Chair: 1-Use of Elliptic Curves Cryptosystems in Information Security, Ion Tutanescu and Constantin A., University of

Piteşti, Romania.

2-How SAGE helps to implement Goppa Codes and McEliece PKCSs, Thomas Risse, Institute of Informatics & Automation, Faculty E & I, Hochschule Bremen, University of Applied Sciences

3-Applying the Software Engineering Principles in Building a Secure Software, Huda Abdulaali AL_Amwee, Computer Science Dept., Al-Mustenseria University, Iraq.

4-Implementing Serpent Cipher in Field Programmable Gate Arrays, Jaroslaw Sugier, Wroclaw University of Technology, Wroclaw, Poland.

5-IEEE 802.21 Information Service: Features and Implementation Issues, Fábio Buiati, Ismail Saadat, Delfín Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain.

6-Overview of IEEE 802.21 Security Issues for MIH Networks, Ismail Saadat, Fábio Buiati, Delfín Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain.

Software Engineering

4

Page 5: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

15:30-17:305007

Faculty of ITBuilding 5

Chair: 1- A Model Transformation approach Based on Homomorphic Mappings between UML Activity Diagrams and

BPEL4WS Specifications of Grid Service Workflows, Yousra Bendaly Hlaoui and Leila Jemni Benayed, Research Unit in Technologies of Information and Communication, Tunisia.

2- Problems In Systematic Application Of Software Metrics And Possible Solution, Gordana Rakić and Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of Sciences, Univ. of Novi Sad

3- Explore Developers and Users Communication Strategic to Reach a Share Understanding of Requirements: Nonverbal Channels Perspective, Issam Jebreen, School of Comp. & Math Sciences, AUT Univ., New Zealand.

4- Is Cloud Computing Ready for Critical Applications, Fredrick Japhet Mtenzi, Dublin Institute of Technology, Ireland.

5- A Tree Based Strategy for Interaction Testing, Mohammad F. J. Klaib1, Sangeetha Muthuraman2, and Noraziah Ahmad3, Jadara University, Irbid- Jordan, And Malaysia.

6: Generation of Test Cases From Websites User Sessions, Sanaa Alsmadi, Izzat Alsmadi and Mohammed Al-Kabi, Yarmouk University, Irbid, Jordan.

15:30-19:455009

Faculty of ITBuilding 5

WorkshopsWS1: Analysis of Malicious ProgramsChair: Anne-Marie Imafidon, Computer Laboratory, University of Oxford, Oxford Co-chairs: Chris Imafidon & J. Arreymbi, University of East London and University of London.

WS2: SECURITY ISSUES IN CLINICAL INFORMATICSBy Chris Imafidon; Former Head, Management of Technology Unit, Queen Mary, University of London.Co-Author- Anne-Marie Imafidon, Keble College, University of Oxford, Oxford

WS3: Special Workshop on Information SecurityInvited Speakers: Johnnes Arreymbi, Babatunde Ali-AlaoConfirmed Instructors: Alain Mbe, Idrissa Kargbo

WS4: Workshop on e-governance (ICIT- WEG)Invited Speakers: Babatunde Ali-Alao, Johnnes Arreymbi. Emerging security Technologies ePomaG consultancy London UK,  University of East London.   Confirmed Instructors: Idrissa K. Kargbo, Alain Mbe, University of East London

5

Page 6: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

17:30-17:45 Coffee Break

17:45-19:45

5012Faculty of IT

Building 5

5011Faculty of IT

Building 5

GIS, VRS, Internet, Pattern Recognition, Signal Processing, Societal InnovationChair: 1-GIS Based Deployment Strategies of Wireless Sensors Deployment for Forest Fire Surveillance, Wassim D.

Katerji and Hoda W. Maalouf, Department of CS, Notre Dame University Zouk Mikael, Lebanon.

2- Web virtual reality biology and ecology education helps disabled, Tomaz Amon, Slovenia.

3- Detecting Arabic Web Spam, Heider A. Wahsheh and Mohammed N. Al-Kabi, Yarmouk univ., Irbid, Jordan.

4- New Approach for Modifying Blowfish Algorithm Using 4-States keys, Afaf Al-Neaimi and Rehab F. , AL-Zaytoonah university, Jordan, and University of Technology, Baghdad, Iraq.

5- The Jordanian eGovernment Initiatives within the Context of the Socio-technical Model, Ali Al-Dahuod 1, Rashid Jayousi2, Luis Javier García Villalba3 and Cláudia Jacy Barenco Abbas3, Jordan, Spain and Palastine.

6- Word-based Handwritten Arabic Scripts Recognition Using Dynamic Bayesian Network, Jawad H AlKhateeb , Faculty of Science and IT, AlZaytoonah University of Jordan, Jordan.

Image Processing, Natural Languages, and Neural NetworksChair: 1-Fractal Image Compression Based On Complex Moments, Huda Al mawee and

Adel Muhsan Al SalMan, Dept. of CS, Al-Mustansiriyah Univ, Iraq.

2-Reduction in classification Errors for Myoelectric control of Hand Movements with Independent Component Analysis, Ali H. Al-Timemy1, Guido Bugmann1, Nicholas Outram2 and Javier Escudero, School of Computing and Mathematics, Univ. of Plymouth PL4 8AA, United Kingdom.

3- Compression transformation for small text_les, Jan Plato_s, Dept.of CS, FEIVSB - Technical Univ. of Ostrava, Ostrava-Poruba, Czech Republic.

4-Embedded Multiprocessors Vocal Command system, a way to Improve the Tele-Control of a didactic Manipulator Arm, Mohamed Fezari, Hamza Atoui and Ali Al-Dahoud, Univ. of Annaba, Laboratory of Automatic and Signals Annaba.

5-Backpropagation Neural Network Algorithm for Forecasting Soil Temperatures Considering Many Aspects: A Comparison of Different Approaches, Shahlla A. AbdAlKader1 and Omaima AL-Allaf2, 1Foundation of Technical Education, Ministry of Higher Education,Mosul-Iraq and 2Faculty of Science and IT, Al-Zaytoonah Univ. of Jordan, Amman-Jordan.

6-Analysis of Feed Point Coordinates of A Coaxial Feed Rectangular Microstrip Antenna Using Mlpffbp Artificial Neural Network, V. V. Thakare1 and P. K. Singhal2, Madhav Institute of Technology & Science, India.

Simulation and Data Base & Data MiningChair:

6

Page 7: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

5007Faculty of IT

Building 5

1- COMPUTER SIMULATION OF ARMED MOBILE PLATFORM GROUP SWARMING, Radomir Janković, Union Univ.School of Computing, BELGRADE, SERBIA.

2- Human Resource Influence for Vehicle Fleet Management in Discrete Transport Systems, Jacek Mazurkiewicz and Tomasz Walkowiak, Wroclaw Univ. of Technology, Wroclaw, Poland.

3- Dependability Model of a Discrete Transport System, Wojciech Zamojski#1, Jacek Mazurkiewicz#2, and Katarzyna Michalska, Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Poland.

4- Data-Mining Prefetching Algorithm for Hybrid Storage Systems, Mais Nijim, Dept. of Electrical Engineering and CS, Texas A&M-Kingsville, Kingsville, TX, USA.

5-An Approach to Generating Server Implementation of the Inverse Referential Integrity Constraints, Slavica Aleksic, Sonja Ristic*, and Ivan Lukovic, Univ. of Novi Sad, Faculty of Technical Sciences, Novi Sad, Serbia.

6-Application of Data Mining Techniques for Improving Software Engineering, 2Pey Ven Low, 3Lee Koon Ng, 4Zhen Li Ong, and 1Wahidah Husain , Universiti Sains Malaysia.

20:00-21:00 Dinner: Restaurant of Al-Zaytoonah University

Thursday May 12th , 2011

9:00-9:45 Keynote Speech 6Chair: Mahmood IskandaraniTitle: Parallel computing and it’s relevance to computational biologyBy: Professor Rosni Abdullah University Sains Malaysia

9:45-11:45

5012Faculty of IT

Building 5

Knowledge Management and E-Education (2)Chair: 1-A 902-928 Mhz Pll Design And Simulation For Biomedical Applications, Diary R. Sulaiman, Univ. of

Salahaddin– Hawler, College of Eng., Dept. of Electrical Engineering, Erbil, Iraq.

2- A Case Study for Developing an RFID Based Smart Health Centre in Iraq, Fawzi M Al-Naima and Marwa M Talib, Nahrain Univ., Baghdad, Iraq.

3-Detection of Breast Abnormalities via Fisher Linear Discriminant and Nearest Neighbor Classifier, IKHLAS

ABDEL-QADER1, MEMUNA SARFAZ

2, FADI ABU-AMARA

3, Al-Hussein Bin Talal Univ., Western

Michigan University, USA.

4- UTILISING AN INTRANET FOR KNOWLEDGE-SHARING: SURVEY OF A SELECTED ORGANISATION IN SOUTH AFRICA, Udo Richard Averweg, eThekwini Municipality and University of KwaZulu-Natal, Durban, South Africa.

5- Mobile TV: Cultural Based Design Evaluation, Menandros Apostolidis and Maaruf Ali, Arx.net s.a. , Greece and Oxford Brookes Univ., UK

6-An Application of Educational Data Mining Techniques at Faculty of Technical Sciences in Novi Sad , Vladimir Ivančević, Milan Čeliković, Slavica Aleksić, and Ivan Luković*, University of Novi Sad, Serbia.

7

Page 8: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

9:45-11:455009

Faculty of ITBuilding 5

9:45-11:455011

Faculty of ITBuilding 5

9:45-11:455007

Faculty of ITBuilding 5

Parallel & Distributed SystemsChair: 1-APPLICATION OF PARALLEL COMPUTING TO PRACTICAL COMPUTER EDUCATION Trial

Evaluation through Parallel Programming Exercises, Keiichi Shiraishi and Yoshiro Imai, Kagawa National College of Technology, Information Technology Center & Graduate School of Eng., Kagawa Univ., Japan

2-A Multi Agents Approach for the Complex Systems Diagnosis, Ramdane MAAMRI, Khaled ALLEM, and Zaidi SAHNOUNE, LIRE Laboratory, Mentouri Univ. of Constantine, Algeria.

3-Resource Co-Allocation Algorithms in Distributed Job Batch Scheduling, Victor V. Toporkov, Alexander Bobchenkov, Dmitry Emelyanov, and Anna Toporkova, CS Dept., Moscow Power Eng. Institute, Russia.

4-Integrating mobile Application for distributed Environment, Zawawi Ismail and other, UITM, Malysia

5-An Efficient MPI-Based Parallel Wave-Equation FDTD Algorithm for Dispersive Electromagnetic Applications, Omar Ramadan, Computer Eng. Dept., Eastern Mediterranean Univ. Gazi Magusa, Turkey.

6-Optimum Execution for Wienk using Parallel Programming Models (Comparison Study), Areej Mustafa, Mahmoud Jabir, Rezek Mohammad and Rashid Jayousi, Al-Quds univ., Palestine.

Hardware and Information SystemsChair: 1-Extended Model Driven Architecture to B Method, Ammar Aljer and Philippe Devienne, Aleppo Univ.,

Aleppo, Syria Lille CS Laboratory (LIFL), and Univ. of Science and Technology of Lille (USTL), France.

2-RULE-BASED ENGINE TO IMPROVE IT STUDENTS ACADEMIC STANDING, 1Inurina Ibrahim, 2Hana Munira Muhd Mukhtar, and 3Husna Sarirah Husin, Malaysian Institute of Information Technology, Universiti Kuala, Lumpur.

3- H-SR-ARQ system using a hardware accelerated algorithm implemented on FPGA, Constantin ANTON, Laurenţiu Ionescu, Ion TUTĂNESCU, Alin MAZĂRE, and Gheorghe ŞERBAN , Univ. of Piteşti, Romania.

4-An Information System for a Sensor-Based Bridge Health Monitoring System, Osama Abudayyeh, Upul Attanayake, Ikhlas Abdel-Qader, Haluk, Aktan, Eyad Almaita, and Joseph Barbera, Western Michigan Univ., Kalamazoo, MI 49008.

5- Workflow Wrapper for Unstructured Workflows, Boris Milašinović, and Krešimir Fertalj, Faculty of Electrical Engineering and Computing, Univ. of Zagreb, Croatia.

6-Reengineering E-government Projects: Gender Digital Divide perspective – The Case of Jordan, Boran Rababah and Emad Abu-Shanab, CADER, Jordan and Yarmouk University, Jordan.

7-Improving Dependability of Complex Information Systems by Fast Service Relocation, D. Caban and T. Walkowiak, Wroclaw Univ. of Technology Institute of Computer Eng, Control and Robotics, Poland.

Computer Networks and E-Education (1)Chair: 1-WS-NEXT, A Web Services Network Extractor Toolkit, Chantal Cherifi, Yvan Rivierre, and Jean-François

Santucci , Joseph Fourier University, and Corsica University, France.

2-Bluetooth Based Control Panel for Smart Home Application, Herdawatie Abdul Kadir, Mohd Helmy Abd Wahab, Lam Kah Hoe, Zarina Tukiran, Nor’aisah Sudin, and Ariffin Abdul Mutalib, Univ. Tun Hussein Onn Malaysia, Johor, Malaysia.

3-Spatial and Energy Distributed Routing in Wireless Sensors Network, Jan Nikodem, Maciej Nikodem, Marek Woda, and Ryszard Klempous, Dept. of Electronics, Wroclaw Univ. of Technology, Poland.

4- Issues Towards Utilization of Fiber Optic Communication: The Case of SEACOM Submarine Fiber Optic Cable in Tanzania, Msangawale Arbogast Otaigo Elias and Koloseni Daniel , Dept. of Information

8

Page 9: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

Technology, The Institute of Finance Management, Dar es Salaam, Tanzania.

5-An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks, Julián García Matesanz, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, and José René Fuentes Cortez, Universidad Complutense de Madrid (UCM).

6-Students Learning Styles Classification For e-Education, Marek Woda #1, and Konrad Kubacki-Gorwecki, Institute of Computer Eng., Control and Robotics, Wroclaw University of Technology Wybrzeże Wyspiańskiego, Poland.

11:45-12:00 Coffee Break

12:00-13:20

5012Faculty of IT

Building 5

5011Faculty of IT

Building 5

5007Faculty of IT

Building 5

5009

E-CommerceChair: 1-Nonlinear Time Structures for Economic Reality Description – a Survey, Maria Antonina Mach, Univ. of

Economics, Wroclaw, Poland.

2-The Prospects and Barriers of E-Commerce Implementation in Tanzania, George S. Oreku, Fredrick J. Mtenzi and Al-Dahoud Ali, Dar es salaam, Tanzania, Dublin Institute of Technology, Dublin 8, Ireland.

3-A BPA-Based Approach for the Identification of SOA Candidate Software Services, Rana Yousef and Mohammed Odeh, University of Jordan, Jordan and the Univ. of the West of England.

4-Using Biometrics to Improve Internet E-Business Security: A New Approach, J. Arreymbi1, V. Odiah, A. Ijeh, and Ali A. Babatunde, School of Computing, IT & Eng., Univ. of East London, UK.

E-Education (4)Chair: 1-Design of E-Portfolio System’s Modelwith Artificial Intelligence Traits, Aleksandrs Gorbunovs, Riga

Technical University, LATVIA

2- Building a SOA ontology for universities websites, Jehad Omari, Ahmed Eroud, and Izzat Alsmadi, CIS department, Yarmouk University. Jordan.

3-System for Testing Different Kinds of Students’ Programming Assignments, Ivan Pribela, Mirjana Ivanović and Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of Science, Univ. of Novi Sad, Serbia.

4-E-learning in Jordanian Universities, the Case of Al-Hashemite University, Emad Abu-Shanab and Yousra Harb, Yarmouk University, Jordan.

E-Education (4)Chair: 1-Ontology-Based Architecture for Providing Recommendation in Java Tutoring System, Boban Vesin,

Aleksandra Klasnja-Milicevica, Mirjana Ivanovicb and Zoran Budimacb, aHigher School of Professional Business Studies, bFaculty of Science, Dept. of Mathematics and Informatics, Novi Sad, Serbia.

2-Accreditation and Academic Audit Strategies for the Information Technology Faculties in Jordan, Ahlam Alsmadi, and Emad Abu Shanab, Yarmouk University, Jordan.

3-Using Trained Matrix Technique For Acceptance Tests In Agility WEB Programming Methodologies, Belal Ayyoub, Al-Balqa’a Applied Univ.- Faculty of Eng. Technology - Computer Eng. Dept., Jordan.

4- Proposed Architecture for e - Learning System Incorporating Industrial and Academic Requirements, Maqbool Uddin Shaikh, CS Dept.COMSATS Institute of Information Technology, Islamabad, Pakistan.

Artificial Intelligence

9

Page 10: Conference Program - City University of Applied Sciences€¦  · Web viewConference Program. The 5th International Conference on Information Technology. May 11th – 13th, 2011.

Faculty of ITBuilding 5

13:20-14:20Faculty of IT

Building 5, Conference Room

Chair: 1-CUT APPROACH TO CLOSEDNESS UNDER FUZZY RELATIONS: THEORETICAL BASICS AND

APPLICATIONS IN ARTIFICIAL INTELLIGENCE, Jorge Jim´enez, Susana Montes, Branimir ˇSeˇselja and Andreja Tepavˇcevi´, Campus de Viesques. University of Oviedo, 33203 Gij´on, Spain.

2-Cuts of blocks of fuzzy relations and application in fuzzy databases, Branimir ˇSeˇselja, Vladim´ır Janiˇs, Pavol Kral, Magdalena Renˇcova, and Andreja Tepavˇcevi, Matej Bel Univ., Bansk´a Bystrica, Slovak Republic.

3-Syntactic Sugar Programming Languages' Constructs-Preliminary Study, Mustafa Al-Tamim and Rashid Jayousi, Dept. of CS, Al-Quds University, Jerusalem, Palestine.

4- Intelligent Air Conditioner System: User Acceptance Level of ICONS and Cost Saving Analysis, Lim Seng Chee, Faten Damanhoori, Norlia Mustaffa, and Wahidah Husain, Univ. Sains Malaysia.

Closing Session

14:30 Lunch: Restaurant of Al-Zaytoonah University

20:00-22:00 Dinner: Green Vale Restaurant, Jarash City

Friday May 13th , 2011

Free Time

1