Conference Program |
4th International Conference On Information Technology |
ICIT 2009 |
June 3rd - 5th, 2009 |
Al-Zaytoonah University, Jordan |
Wednesday June 3rd , 2009 |
|
10:00 11:00 |
Registration |
11:00 11:30 Main Stage Building 1 |
Opening Session |
11:30 12:00 |
Coffee Break |
12:00 12:40 Main Stage Building 1
|
Keynote Speech 1 Chair: Al-Dahoud Ali Title: "Agent Oriented Techniques for Programming Autonomous Robots"
By:
Prof Dr Hans-Dieter
Burkhard |
12:45 13:30 Main Stage Building 1
|
Keynote Speech 2 Chair: Ayman Mahmoud Abdalla Title: Contemporary Cybercrime Trends Impact on global Web-based Economy
By: Victor Ralevich, Sheridan Institute, Canada |
13:40-15:00 Main Stage Building 1
|
Special Session 1: Assistive ICTs for People with Disabilities Chairs: Urbano Stenata, Giuseppe Tritto, Abdel-Badeeh M. Salem Ministry of Foreign Affairs, Italy, President WABIT, Italy, Professor of Computer Science, Egypt, Hasna Ibn Zine Idrissi, Morocco.
Special Talks by the Chairs
1- Integrating Ami, Mde For Muti-Device Muli-Modal User Interface To Support People With Disabilities, Eman M. Saleh, Aly Fahmy, Amr Kamel, Abdel Badeeh M. Salem, Egypt
2- Ambient Intelligent: A New Computing Paradigm For People With Disabilities Abdel Badeeh M. Salem, Egypt
3- Healthy food for people with Disabilities", De Luca Anna Rita, Italy
4-"Disability Convention", Urbano Stenta, Italy
5-"Empowering ICT Health Strategies for Human Welfare", Giuseppe Tritto, Italy |
15:10 16:00 |
Lunch: At The Restaurant Of The University |
June 3rd , 2009 16:10 17:15 Aula A Building 5 Faculty Of IT
|
Computer Networks and Communications Chair: Ismail Ababneh, Jordan.
1- Pessimistic Backoff for Mobile Ad hoc Networks, Saher S. Manaseer, Muneer Masadeh Glasgow University, JUST, USA, Jordan.
2- Performance Evolution of Multiple Probabilities of Ad-hoc On Demand Distance Victor Protocol (AODV), M. Bani Yassein, M. Bani Khalaf, JUST, Jordan.
3- Investigation of the Performance of the Wavelet Packet Based Multi-Carrier CDMA Communications in Rayleigh Fading Channel, Mohamed N. El-Eskandrani, Ehab F. Badran, and Darwish A. Mohamed, Egypt.
4- Congestion-Aware Routing Protocols for Ad Hoc Networks, Raed Seetan, Ismail Ababneh and Ahmad Dalalah, JUST, Jordan. |
June 3rd , 2009 17:20 18:30 Aula A Building 5 Faculty Of IT
|
E-Government , E-Commerce, GIS Technology and Applications Chair: Gilbert Ahamer, Austria 1- M-Government in Jordan: Today and the Future, Mona M. Bataineh, Emad A. Abu-Shanab, Asmaa M. Jdaitawi, Yarmouk University, Jordan,2- Using GIS, Remote Sensing and Associated Digital Image Processing Techniques to produce Land Use Capability Map for Zarqa area, Jordan, Eyad H. R. Fadda, Al-Balqa Applied University and Natural Resources Authority, Jordan.3- Automation of the Moving Objects Movement Prediction Process, Ivana Nižetić, Krešimir Fertalj, Croatia.4- How to map perspectives: Moving GISc to IISc, Gilbert Ahamer, Adrijana Car, Robert Marschallinger, Gudrun Wallentin, Fritz Zobl, Austria.5- Protection of e-commerce Using Hybrid Tools, Mohamed Alnuaimi, Mohammad A Al-Fayoumi and Sattar J Aboud, Middle East University for Graduate Studies, Jordan, and Baghdad-Iraq. |
18:30-19:00 |
Coffee Break |
June 3rd , 2009 19:00 19:45 Building 5 Aula A Faculty Of IT
|
Internet and Its Applications Chair: Afif Mgawash 1- Towards An Efficient Web Caching Hybrid Architecture, Maha Saleh El Oneis, Hassan Barada, Mohamed Jamal Zemerly, United Arab Emirates.
2- Internet Banking Acceptance of Malay and Chinese Ethnic Group in Malaysia Based On the Theory of Planned Behavior, Khalil Md-Nor, Mohd Pisal Zainal, MALAYSIA. 3- Investigating the characteristics used in quantitative analysis of websites evaluation,Omar Husain Tarawneh, Faudziah Bt Ahmad, Malaysia.
|
June 3rd , 2009 16:10 17:15 Building 5 Aula B Faculty Of IT
|
Operating Systems, Parallel and Distributed Systems Chair: Mais Nijim, USA
1- Digital forensic techniques for static analysis of NTFS images, Mamoun Alazab, Australia.2- An Approach for Fault Tolerance in Dynamic Multi-Agent systems, Mounira BOUZAHZAH, Ramdane MAAMRI, Algeria.3- Coordination of Application-Level and Job-Flow Scheduling Techniques in Distributed Computing, Victor V. Toporkov, Russia.4- Modeling a Hybrid Energy-Efficient Architecture for Parallel Disk Systems, Mais Nijim and Nooh Bany Muhammad, USA. |
June 3rd , 2009 17:15 18:30 Aula B Building 5 Faculty Of IT |
Artificial Intelligence Part 1 Chair: AMJAD RATTROUT, France 1- Bayesian Networks for Elucidating and Integrating Breast Cancer Knowledge, Farzana Kabir Ahmad, Safaai Deris, Nor Hayati Othman, Malaysia
2- Managing Tacit Knowledge in Rural Healthcare using Mobile Technology, Ahmad Mohammad Ali Qtaishat, Mohd Syazwan Abdullah, Wan Rozaini Sheikh Osman, Malaysia 3- Semantic Approach based Multi-agent System for Information Search on the Web, NESSAH Djamel, KAZAR Okba, Algeria
4- Hybrid Neuro-Fuzzy System for Mobile Robot Reactive Navigation, Ayman A. AbuBaker, Applied Science University, Jordan.
5- Hierarchal Traveling Design Pattern for Mobile Agents in JADE Framework, Mohammed Eshtay Applied Science University, Jordan. |
18:30-19:00 |
Coffee Break |
June 3rd , 2009 19:00 20:20 Aula B Building 5 Faculty Of IT |
Artificial Intelligence Part 2 Chair: Mirjana Ivanović, Serbia.
1- Genetic Access on Combinatorial Problems, Prasanna Ranjith, Taher Omran Ahmed, Libya 2- Do`cument Management in Distributed and Heterogeneous Environments, Dragoslav Pešović, Milan Vidaković, Zoran Budimac, Mirjana Ivanović, Serbia.
3- Modular Exam Scheduling using Genetic Algorithm, Dua Saadeh, Basel Abu-Jamous, Fahad Mustafa, Muath Al-Hijjawi, University of Jordan, Amman, Jordan 4- Using Agents to Reorganize the Dynamic Information Resources in a Self Organized Web System, AMJAD RATTROUT, RASHA ASSAF, SALIMA HASSAS, Palestine, France.
5- Evolutionary System Induction through Multi Agent Algorithm, Dr. Nada M. A. Al Salami, Al-Zaytoonah Universit, Jordan. |
June 3rd , 2009 16:10 17:20 Building 5 Aula C |
Special Session 2: DeSyT Dependable Systems and Technologies ; Part 1 Chairs: Prof Wojciech Zamojski, Tomasz Walkowiak, Marek Woda
1- Field data reliability analysis of highly reliable item, David Valis, M. Koucky, A. Jodejko University of Defence, Czech Republic
2- Using Event and Performance Logs in Dependability Evaluation, Janusz Sosnowski, M. Krol Wroclaw University of Technology, Poland
3- Introduction of teaching strategies as a method to increase effectiveness of knowledge acquisition, Marek Woda, Wroclaw University of Technology, Poland
4- Automatic reconfiguration in the response to network incidents by neural networks, Andrzej Olchawa, Tomasz Walkowiak, Wroclaw University of Technology, Poland
5- Task-level simulation of service based information systems, Tomasz Walkowiak, M. Woropay Wroclaw University of Technology, Poland |
June 3rd , 2009 17:20-18:40
Building 5 Aula C Faculty Of IT
|
Special Session 2: DeSyT Dependable Systems and Technologies; Part 2 Chairs: Prof Wojciech Zamojski, Tomasz Walkowiak, Marek Woda
1- An approach to Service Net modeling, Wojciech Zamojski, Tomasz Walkowiak Wroclaw University of Technology, Poland
2- Dependable SIMD Architecture for Artificial Neural Networks, Jacek Mazurkiewicz Wroclaw University of Technology, Poland
3- Modeling Equipment Deterioration for Dependability Analysis, Jarosław Sugier, George Anders Wroclaw University of Technology, Poland
4- Queuing System with Variable Number of Servers, Marek Mlynczak Wroclaw University of Technology, Poland
5- A Function/Artifact and Time/Incident Model for Simulations of Realistic Complex Information Systems and its Application to Discovery of Weaknesses and Optimization of Such Systems, Michal Wosko, Cottbus Technische Universitat, Germany
6- On approaches for reliability comparison of highly reliable items´ sets, David Valis, M. Koucky, University of Defence, Czech Republic |
18:40-19:00 |
Coffee Break |
June 3rd , 2009 19:00 20:20 Aula C Building 5 Faculty Of IT
|
Database and Data Mining Part 1 Chair: Ivan Luković, Novi Sad.
1- Use MADM method to Decision making among results extracted from Association rules, Hiva Samadian, Hamid Abed, Iran.
2- Fuzzy Ontology-Driven Method for Ranking Unexpected Rules, MOHAMED SAID HAMANI, RAMDANE MAAMRI, Algeria
3- Towards the Implementation of Temporal-Based Software Version Management at Universiti Darul Iman Malaysia, M Nordin A Rahman, Azrul Amri Jamal and W Dagang W Ali, Malaysia. 4- Attractive Clustering Approach for Knowledge Discovery in Gene Expression Data,Mohammed Alshalalfa, Tansel Özyer, Reda Alhajj, Canada, Turkey, Lebanon.
5- A Data Warehouse System for Monitoring University Education Process, Milan Čeliković, Slavica Aleksić, Ivan Luković, Novi Sad. |
June 3rd , 2009 16:10 20:20 Aula D Building 5 Faculty Of IT |
Mathematics Chair: prof Azmi Madi
1- Bounds for the Zeros of Polynomials Based on Spectral Norm Inequalities Khalid Shebrawi, Jordan
M.N.M. Allam, R. Tantawy , Egypt
3- Unitarily Invariant Norm Inequalities for Sum of Operators Hussien Albadawi, Jordan
4- Numerical Solution of Sti¤ Initial Value Problems Using Continuous Genetic Algorithms Omar A. AbuArqob, Zaer S. Abo-Hammour, Jordan
5- FiM, a Test & Assessment Environment complementing the Mathematical Education by Drill & Practice Exercises and Examinations Thomas Risse, Germany
6-Least and greatest fixed points of a while semantics function Fairouz Tchier, Saudi Arabia |
20:30 22:00 |
Dinner: The Restaurant Of The University |
Thursday June 4th , 2009 |
|
09:00 09:45 Aula A Faculty Of IT Building 5 |
Keynote Speech 3 Chair: Mahmoud Iskandarani Title: Future Direction in Parallel Cryptography By: Azman Samsudin Universiti Sains Malaysia |
June 4th , 2009 10:00 11:00 Aula A Faculty Of IT Building 5
|
Computer and Network Security: Part 1 Special Session 3: Information Security-related Values and Practices in International Setting
Chair: Dragana Martinovic, Canada
1- Performance Evolution of Multiple Probabilities of Ad-hoc On Demand Distance Victor Protocol (AODV), M. Bani Yassein, M. Bani Khalaf, JUST, Jordan.
2- A Semantic Web Technology-based Architecture for New Server-side Data Validation in Web Applications, Shadi Aljawarneh and Faisal Alkhateeb, Al-Isra and Yarmouk University, Jordan. 3- Security Challenges for Emerging VANETs, Faisal Al-Hawi, UAE
4- Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment, Essam Al daoud, Ahid Al-Shbail, Adnan M. Al-Smadi, Zarka and Al al-bayt University, Jordan
5- Space of Access Control Administration Models, Amir H. Chinaei, Ken Barker, Frank Wm. Tompa, University of Waterloo, CANADA. |
June 4th , 2009 11:00 11:30 Aula A Faculty Of IT Building 5 |
Computer and Network Security: Part 2 Chair: Khaled M. Suwais, Malaysia 1- Comprehensive Survey on the Constructional Design of Existing Stream Ciphers,Khaled M. Suwais, Azman Samsudin, Malaysia 2- Security, Privacy, Authentication in RFID and Applications of Smart E-Travel, Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, UAE. |
June 4th , 2009 11:30 12:30 Aula A Faculty Of IT Building 5 |
Natural Language Processing, Pattern Recognition, Neural Networks Chair: Riyad Al-Shalabi
1- Using Ontology to Define the Structure of the Holy Quran, Malek Zakarya AL Ksasbeh, Mohd Syazwan Abdullah, Wan Rozaini Sheik Osman, Farihana Elyana, Malaysia. 2- Clustering Arabic Documents Using Frequent Itemset-based Hierarchical Clustering with an N-Grams, Haytham S. Al-sarrayrih, Riyad Al-Shalabi, Mutah University, and Arab Academy for Banking and Financial Sciences, Jordan.
3- A Resilient Back Propagation Algorithm for Breast Biopsy Classification Based on Artificial Neural Networks, Fawzi M. Al Naima, Ali Hussian Ali Al Timemy, Iraq
4- Construction of 3D Facial Wrinkles using Splines, Ali Mehdi, Rami Qahwaji, Hassan Ugail, Abdullah Mehdi, PSU and University of Bradford, UK.
|
June 4th, 2009 12:30 14:15 Building 5 Aula A Faculty Of IT
|
Distance Learning and E-education Chair: Zaitun A. B. Malaysia. 1-Designing a Doctoral Program for Online Students, Zaitun A. B. And Siow H. L, Malaysia.
2- Distance Learning and E-education Agents Based Modeling of Distant Biology Practical Work, Djamila Mechta, Saad Harous, Mahieddine Djoudi, Amel Douar, Algeria, UAE, France.
3- An Adaptive Personalized Course Selection System, Rashid Jayousi, Yasmin I. Bali, Palestine.
4- Blended e-learning Approach at the University of Jordan, Dua Saadeh, Qays Al-Karimi, University of Jordan, Jordan. 5- Integration of Recommendations into Java Tutoring system, Aleksandra Klašnja-Milićević, Boban Vesin1, Mirjana Ivanović, Zoran Budimac, Novi Sad.6- Towards The Conception of A Universal Multimedia Tool For the Design Optimization of the Fin, N.E.Khelalfa1 M.S. Ahmed Bacha1, A.C. Selka1, Algeria.7- The Influence of Blended Learning Model on Developing Leadership Skills of School Administrators, Dr. Tufan AYTAÇ, The Ministry of National Education, Turkey. |
June 4th , 2009 10:00 11:00 Aula B Faculty Of IT Building 5 |
Image and Signal Processing Part 1 Chair: Hao Ying, USA
1-The Quality Evaluations 3rd Dimension of Medical Image Compression, Dinu Dragan Dragan Ivetic, Serbia
2- Image Contrast Sharpening Using Adaptive Graylevel Transformation Functions, Iyad Jafar, Hao Ying, University of Jordan, Jordan, Wayne State University, USA.
3- JPEG2000 Features for Ubiquitous Healthcare Device Interface, Dragan Ivetic, Dinu Dragan, Serbia.
4- Heartbeat Feature Extraction from Vowel Speech Signal Using 2D Spectrum Representation, Dmitriy E. Skopin, Sergey U. Baglikov, Russia, Al'Balqa Applied University, Jordan.
5- Image Concepts Disambiguation using Associated Text Concepts, Ahmad Adel Abu Shareha, Rajeswari Mandava, Dhanesh Ramachandram, Malaysia |
June 4th , 2009 11:00 12:00 Aula B Faculty Of IT Building 5 |
Software Engineering Part 1Chair: Leila Jemni Ben Ayed, Tunisia 1- An Interactive Composition of UML-AD for the Modelling of Workflow ApplicationsYousra BenDaly Hlaoui, Leila Jemni Ben Ayed, Tunisia. 2- RFID in Healthcare Industry: A Strategic Framework for Implementation, Noor Awawdeh, Emad Abu-Shanab, Yarmouk University, Jordan.
3- Electronic Customer Relationship Management (e-CRM) in Zain Company, Yousra Harb, Emad Abu-Shanab, Yarmouk University, Jordan
4- Using partially defined workflows for course modeling in a learning management system, Boris Milašinović, Krešimir Fertalj, Croatia.
5- Challenges and Discussion of Software Redesign, Marija Katić, Krešimir Fertalj, Croatia
|
June 4th , 2009 12:00 13:00 Aula B Faculty Of IT Building 5 |
Software Engineering Part 2Chair: Mohammad Mherat
1- Deduction of Program Correctnes in Formal Theory, Ivana Berkovic, Branko Markoski, Jovan Setrajcic, Vladimir Brtka, Dalibor Dobrilovic, Serbia 2- WACS: an Alternative to PC2 for Programming Contests, Ahmed Bentiba, Mohamed Al Mansoori, Mohamed J. Zemerly, UAE
3- From UML Sequence Diagrams to ECATNets: a Graph Transformation based Approach for modelling and analysis, Allaoua Chaoui, Raida ElMansouri, Wafa Saadi, Elhillali Kerkouche, Algeria.
4- Evaluating Agent-Oriented Software Engineering Methodologies, Abdulsalam Alarabeyyat, Al-Balqa Applied University Jordan. 5- A Model for System Reliability Optimization Problems Based on Ant colony Using Index of Criticality Constrain, Belal Ayyoub, Asim El-Sheikh, Al-Balqaa Applied and University AABFS, Jordan.
|
June 4th , 2009 13:00 14:00 Aula B Faculty Of IT Building 5 |
Software Engineering Part 3Chair: Emad Abu-Shanab, Yarmouk University, Jordan
1- Web Applications Development and Software Process Improvement in Small Software Firms: a Review, Haroon Tarawneh, Sattam Allahawiah, Al-balqa Applied University, Jordan.
2- Supply Chain Performance Measurement System Based On Scorecards and Web Portals, Nenad Stefanovic, Dusan Stefanovic, Serbia.
3- Software Process Improvement (SPI) In Small Software Firms, Mejhem Yousef Al Tarawneh, Mohd Syazwan Abdullah, Abdul Bashah Mat Ali, Malaysia
4- Barriers for Implementation of Electronic Medical Record (EMR), Bilal Ali Yaseen AL-nassar , Mohd Syazwan Abdullah, Wan Rozaini Sheik Osman, Malaysia. |
June 4th , 2009 10:00 11:00 Aula C Faculty Of IT Building 5
|
Advances in Ubiquitous Computing Systems (AUCS 2009) Chair: Fredrick Mtenzi, Ireland
1- Smart Spaces in Ubiquitous Computing, Dennis Lupiana, Zanifa Omary, Fredrick Mtenzi, Ciaran ODriscoll, Dublin Institute of Technology, Ireland.
2- Evolution versus Revolution as a Strategy for Thin Client Acceptance: Case Study, Paul Doyle, Mark Deegan, David Markey, Ciaran ODriscoll, Ireland 3- Tight Lower Bound for the Sparse Travelling Salesman Problem, Fredrick Mtenzi4- A Service-based Approach to Supporting Portable, Persistent, Private Computing Environments, Dan MacCormac, Mark Deegan, Fred Mtenzi, Brendan OShea, Ireland
|
June 4th , 2009 11:00 12:00 Aula C Faculty Of IT Building 5 |
Image and Signal Processing Part 2 Chair: Jyoti Singhai, India.
1- Modified Cubic Threshold Denoising Technique using Curvelet Transform, Dr Jyoti Singhai, Preety D Swami, India. 2- A modified technique for low RMSE multifocus image fusion, Dheeraj Agrawal, Dr.J.Singhai, INDIA.3- Adapted Non-Local Means Filter using Variable Window Size, Ammar M. Alhosainy and Ehab F. Badran, Egypt.4- Distribution of the PAPR for Real-Valued OFDM Signals, Sulaiman A. Aburakhia, Ehab F. Badran, and Darwish A. Mohamed, Egypt.5- A comparison of different focus measures for use in fusion of multi-focus noisy images, V. Aslantas, R. Kurban, Turkey. |
June 4th, 2009 12:00 13:00 Building 5 Aula C Faculty Of IT
|
Algorithms, Hardware and Computer Design Chair: Ellips Masehian, Iran
1- Analysis of Motion Feasibility of Multiple Mobile Agents on Graphs, Ellips Masehian, Hiva Samadian, Farzaneh Daneshzand, Iran 2- Improving Average Time Complexity of Tiling Arrays Using A* Algorithm, Mohamed Abd Elhamid Abbas, EGYPT3- Low Power Bus Architectures in Nano-Technology, Study and Analysis, Ghashmi Bin Talib, Abdoul Rjoub, Odysseas Koufopavlou, Jordan, Greece.4- Design of the Feedback Controller (PID Controller) for the Buck Boost Converter, Sattar Jaber Al-Isawi, Ehsan A. Abd Al-Nabi, Libya. |
June 4th , 2009 13:00 14:15 Aula C Faculty Of IT Building 5 |
Special session 4: Speech recognition Speech Recognition, Virtual Reality Systems, Multimedia and Visual Programming Chair: Mohamed FEZARI, ALGERIA. 1- Spotted Words Recognition System Based on Kalman Filter and HMM Models to control Manipulator Arm, Attoui Hamza, Mohamed FEZARI, Mouldi BEDDA, ALGERIA.2- New speech processor and Ultrasonic Sensors Based Embedded system to Improve the Control of a Motorised Wheelchair, Mohamed Fezari, Abd-Errahmene Khati, karim Hamza, ALGERIA.3- HMM/GMM based Voice command system, A Way to improve a wireless control for a Didactic Manipulator Arm TR45, Mohamed FEZARI, Hamza Attoui, ALGERIA.
4- Virtual Reality Systems; An Educational Game from 17th Century Revived in Todays Web Virtual Reality Edutainment project, Tomaž Amon, Stane Okoliš, Slovenia.
5- Multimedia and Visual Programming; Extending AVF for Effective Road-surveying in the Web Environment, Srdjan Mihic, Dragan Ivetic, Republic of Serbia.
|
14:20-15:00 |
Lunch: At The Restaurant Of The University, Closing Session |
|
Free After Noon |
20:30 |
Dinner: Jerash Old City |
Friday June 5th, 2009 |
|
Free Time |