Conference Program
5876
ACIT'2025 will be held in Arab Academy for Science, Technology & Maritime Transport, December 16-18, 2025 - Alexandria, Egypt
5876
ACIT
The 14th International Arab Conference on Information Technology
Organized by Sudan University of Science and Technology, Khartoum - Sudan
Date: 17-19 /12/2013
Conference Days Time Table |
9:00 -11:00 am |
11:00- 12:00 pm |
12:00 -1:30 pm |
1:30- 2:30 pm |
2:30 - 4:30 pm |
|||||||
Day I Tuesday 17-12 |
Opening Ceremony Friendship Hall |
Coffee Break Friendship Hall |
Keynote Speech I Grand Ballroom |
Lunch |
Paper Session |
|||||||
Churchill Hall |
Nile Hall |
Meeting Room # 2 |
||||||||||
New Timing for Day II & Day III |
9:00 – 10:30 am |
10:30- 11:00 am |
11:00 -1:00 pm |
1:00- 2:30 pm |
2:30 - 4:30 pm |
|||||||
Day II Wednesday 18-12 |
Keynote Speech II Grand Ballroom |
Coffee Break |
Paper Session |
Lunch |
Tutorials |
|||||||
Churchill Hall |
Nile Hall |
Meeting Room 2 |
Churchill Hall |
Nile Hall |
Grand Ball |
|||||||
Day III Thursday 19-12 |
Keynote Speech III Grand Ballroom |
Paper Session |
Closing Ceremony Grand Ballroom
|
|||||||||
Churchill Hall |
Nile Hall |
Meeting Room 2 |
Preside-ntial Hall |
|||||||||
Day IV Friday: Social Event 20th of December 2013 Visiting Al-bejrawia & Naga-Musawarat sufra (Registration required). |
||||||||||||
* Paper presentation by authors will not take more than 20 minutes, including questions.
Day I Tuesday 17th of December 2013 |
|||||
Keynote Speech I Time: 12:00 – 1:30 PM Location: Grand Ballroom Title: ICT for Development (ICT4D) By: Dr. Hussein Suleman - University of Cape Town, South Africa Chair: Mohammed Elammari |
|||||
Lunch Break 1:30 - 2:30 PM |
|||||
Paper Session 2:30 - 4:30 pm |
|||||
Location: Churchill Hall |
Location: Nile Hall |
Location: Meeting Room # 2 |
|||
Computer Network and Information Security Session Chairs: Abdallah Shoushan Wesam Bhaya |
Software Engineering Session Chairs: Khalid Mahar Mohamed Awad |
AI and Expert System Session Chairs: Mohammed Radi AbdulRrahman Gabir |
|||
PID |
TITLE |
PID |
TITLE |
PID |
TITLE |
35 |
Persistent Scheduler Based Call Admission Control for Long Term Evolution (3GPP) Networks Vijay Franklin. |
50 |
A K Semantics for Dynamic Software Architectures Sahar Smaali, Aicha Choutri, Faiza Belala |
13 |
Global analysis on subconscious feature applied to Emotional BDI architecture Sid Ahmed Benlazaar. |
130 |
Leakage Current and Dynamic Power Analysis of finfet based 7T SRAM at 45 nm Technology Saurabh Khandelwal, Dr Balwinder Raj, Dr R D Gupta. |
76 |
Applying Model Driven Architecture Approach to Develop Software Systems - Case Study Mohammed Mukhtar. |
58 |
A Hierarchical Fusion Strategy based Multimodal Biometric System Youssef Elmir, Zakaria Elberrichi, Reda Adjoudj. |
133 |
Multimedia Education System for Deaf and Hear Impairment Children Nour Eldin Elshaiekh, Banan Mursi, Mohammed Hussein. |
87 |
Towards a Framework for the Curricula of Information Systems in the Arab Universities Suleiman Mustafa. |
108 |
Centroid-Based Arabic Classifier Abduelbaset Goweder, Mohummed Elboashi, Ali elbekai. |
166 |
Investigation and Optimization of high performance Schmitt trigger at Nanoscale CMOS Technology Anshul Saxena, Akansha Shrivastava, Shyam Akashe. |
97 |
From UML 2.0 Interaction Fragments to PROMELA Code Using A Graph Transformation Using AtoM3 Abdelkrim Amirat |
121 |
Explanations in Recommender Systems: Overview and Research Approaches Mohammed Al-Taie.
|
|
|
|
|
163 |
Predicting stock prices using data mining techniques Qasem Al-Radaideh, Adel Abu Assaf. |
|
|
|
|
192 |
Biometry: Face Recognition Applying Logistic Model Trees Emir Kremic, Abdulhamit Subasi. |
Day II Wednesday 18 th of December 2013 |
|||||
Keynote Speech II Time: 9:00 – 10:30AM Location: Grand Ballroom Title: Non-Euclidean Problems in Pattern Recognition By: Prof. Robert P.W. Duin - Delft University of Technology, The Netherlands Chair: Thiab Taha |
|||||
Coffee Break 10:30 - 11:00 AM |
|||||
Paper Session 11:00 -1:00 pm |
|||||
Location: Churchill Hall |
Location: Nile Hall |
Location: Meeting Room # 2 |
|||
Computer Network and Information Security Session Chairs: Mohamed Saleh Abdelaal Ali AlSharafi |
Software Engineering Session Chairs: Ahmed Hamed Taher Ali Alrashahy |
Algorithm and Application Session Chairs: Safwan AlSalaimeh – Abu Aglaa Babiker |
|||
PID |
TITLE |
PID |
TITLE |
PID |
TITLE |
33 |
A Transform Based 3D- Speech Scrambling Using Multi-Wavelet: Design and Evaluation Hanaa Salman. |
132 |
Extreme Programming: Strengths and Weaknesses Ahmad Dalalah.. |
167 |
ARSYPAR:A tool for parsing the Arabic language based on supervised learning Nabil Khoufi, Chafik Aloulou, Lamia Hadrich Belguith. |
68 |
A novel Mecannism for Securing Cloud Computing Yasir Mohamed |
134 |
Formal development of reconfigurable manufacturing systems Laid Kahloul, Allaoua Chaoui, Karim Djouani. |
146 |
Improved Eye Detection and Iris Center Tracking with the Outer Corner Eyelashes Occlusion Correction Sohel Rana, Zahidul Islam, Chil woo Lee. |
165 |
Simplified Online Signature Verification through Uncompromised Electrode Reduction in Data Gloves Andrews Samraj, Kalvina Rajendran, Shohel Sayeed. |
136 |
Social Web Services Development Based on MDA: Extending WSDL to Inject Social-QoS Hichem Bouchakour Errahmani, Sidi Mohammed Benslimane. |
28 |
Redesign of Bellman-Ford Shortest Path Problem Ahmed Musa. |
186 |
Security in Virtual Private Networks: A review Eman Osman, yasir Mohamed. |
141 |
A software product line for e-learning applications Amina GUENDOUZ, Djamal Bennouar. |
51 |
Implementing denoising by Bionic Wavelet Transform BWT in FPGA to simulate a hearing aid Salaheddine Derouiche, Bachir Djedou, Chabbi Charef. |
194 |
Challenges of Computer Crime Investigation In North Africa's Countries Mohamed Sarrab, Hamza Aldabbas, Mahmoud Elbasir. |
191 |
Extending the Technology Acceptance Model for Mobile Government Systems Nisreen Beshir Osman. |
65 |
Mathematical relationship between external events in real-time systems and errors generated in these systems Hamid Al-Raimi, Jamil Saif. |
92 |
Hash Algorithm for Data Integrity based on Matrix Combination Rushdi Hamamreh, Mohammed Jamoos. |
164 |
UsualSpace; Evolutive-Agents modeling and analysis Mohamed Dbouk. |
98 |
Speech compression based on psychoacoustic model and a general approach for Filter Bank Design using Optimization Talbi Mourad, Cherif Adnane. |
Lunch Break 1:00 – 2:30 PM |
|||||
Tutorial Sessions 2:30 – 4:30 PM |
Day III Thursday 19 th of December 2013 |
|||||||
Keynote Speech III Time: 9:00 – 10:30AM Location: Grand Ballroom Title: Doing Research in Mobile Education in the Developing World By: Dr. Laurie Butgereit - Nelson Mandela Metropolitan University(NMMU), South Africa Chair: Izzeldin Kamel |
|||||||
Coffee Break 10:30 - 11:00 AM |
|||||||
Paper Session 11:00 -1:00 pm |
|||||||
Location: Churchill Hall |
Location: Nile Hall |
Location: Meeting Room # 2 |
Location: Presidential Hall |
||||
Database System Session Chairs: Izzeldin Osman Ali AlDaoud |
Software Engineering Session Chairs: Ahmad Khasawneh Mohammed Radwan |
Algorithm and Application Session Chairs: Amir Abd Elfattah Nael Hirzallah |
Image Processing Session Chairs: Hassan Ibrahim Ahmed AlNubi |
||||
PID |
TITLE |
PID |
TITLE |
PID |
TITLE |
PID |
TITLE |
120 |
A framework for component and aspect oriented programming in java Batoul Hocine, Djamal Bennouar. |
142 |
Challenges Facing Small and Medium Enterprises for Implementing Software Process Improvement Mohammed Merghany, Viju G K, Khalid Ahmed, Mohammed Jassim. |
54 |
Parametric expressive speech model from xml file using transitory emotions Mahmoud Neji. |
36 |
Classifying Images by Canny Mask Segmentation and Laplacian Sigmas in Content Based Image Retrieval System Ensaf ALZurqa. |
138 |
Geometric Transformation of User Queries in Information Retrieval on the Web Aicha Aggoune, Abdelkrim Bouramoul, Mohamed Khireddine. |
143 |
Using Combinatorial Particle Swarm Optimization to Automatic Service Identification Mohamed El Amine, Sidi Mohamed Benslimane. |
118 |
Mathematical Modeling and Technical Decision by using Fuzzy Method Waail Mahmod Lafta Al-waely. |
114 |
Contrast Improvement of Chest Organs in Computed Tomography Images using Image Processing Technique Yousif Abdallah, Magdolin Siddig. |
156 |
A New Multidimensional Model for the OLAP of Documents Based on Facets Omar Khrouf, kaïs Khrouf. |
158 |
Comparison of The Workflow Management Systems Bizagi, ProcessMaker and Joget
Mohamed Abdelgader, Omer Dawood, Mohamedelhafi |
149 |
A dynamic programming approach to document clustering based on term sequence alignment Rafi Muhammad, Shahid Mohammad. |
122 |
Scaled Bayes Image Denoising Algorithm Using Modified Soft Thresholding Function Sabahaldin A. Hussain Alqaisi. |
159 |
Using Nested Tables and Multi-pitch Adjusting in Harmony Search (NTMHS) to Solve Timetabling Problem in Object-Relational Model Wadee Al-Qubati, Ammar Zahary, Abdulkadir Al-Abbadi. |
|
- |
176 |
Implementing The Classical Poker Method For Testing Randomness In Parallel With MATLAB Wael Mohamed Fawaz. |
153 |
Real Time Finger Binary Recognition using Relative Finger-Tip Position Asaduz Zaman, Md Zahidul Islam, Chil Woo Lee. |
170 |
New Distributed Research-Oriented Version Control System: Towards Total Traceability of Research Collaboration Safa TAIEB, Layth Sliman, benoit charroux, Yvan Stroppa, Fathelalem Fadlalla. |
155 |
Integrating AHP Application for Project Management Waled Alzober, Abdul Razak Yaakub. |
181 |
Signature Verification System Based on Support Vector Machine Classifier Ahmed Abdelrahman, Ahmed Abdallah. |
|
- |
183 |
Management of QoS and Data Freshness in Real-Time Data Warehouses using Feedback Control Scheduling Issam Hamdi, Emna Bouazizi, Jamel Feki. |
|
- |
184 |
Preparing Mathematics teachers to integrate ICT in teaching using TPACK framework / TPACK Noha Omer, Izzeldin Osman, Johannes Cronjé. |
|
- |
Lunch Break 1:00 – 2:30 PM |
|||||||
Closing Ceremony 2:30 –3:30 PM |
|||||||
4:00 - 6:00 Nile Cruise Tour |
Day IV Friday: Social Events 20th of December 2013 |
Visiting Al-bejrawia Pyramids & Al-Nagaa-Musawarat sufra (Registration is required). |
No Tutorial |
Tutorial Topic |
Tutorial Presenter |
Date& Time |
Chair |
Location |
Tutorial I |
Performance Modeling of Database Systems |
Dr. Rasha I. M. Osman Imperial College London, UK |
Day II Wednesday 18-12 2:30 - 4:30 pm
|
Mohammed Alam |
Churchill Hall |
Tutorial II |
Pattern recognition: can we learn something from computers? |
Prof. David Martinus Joannes Delft university of Technology, The Netherlands |
Mahmoud Ali |
Nile Hall |
|
Tutorial III |
Cloud Computing: Architecture, Migration, Opportunities, Challenges and Best Practices |
Mehdi Bahrami University of California, Merced, USA |
Yaser Hanafy |
Grand Ballroom |