Conference Programe
10861
ACIT'2024 will be held in Zarqa University, December 10-12, 2024 -Zarqa, Jordan
10861
Deans meeting Saturday – 10/12/2011 |
Open Ceremony Sunday - 11/12/2011 Place: |
8:00 – 9:00: Registration |
Open Ceremony : 9:00am – 10:30am Conference Hall: |
10:30 – 11:00: Coffee Break |
11:00am – 12:30am: Keynote Speech: Prof. Simon Yang - Biologically inspired Intelligent Systems with Applications to Information Technology |
12:30pm – 2:00pm: Prayer and Lunch |
Day 1: 2:00pm – 3:30pm (A1): E-Commerce and E-learning Room:
Paper |
Author |
2594- The ability of remote sensing techniques in the search for groundwater |
Mustafa ,Abd elbagy |
2654- Electronic shopping behavior in mobile commerce context: An empirical study and a predictive model for developing countries |
Ahmed ,Prof. Dr. Tarek Taha |
1766- Using Wikis to Develop Writing Performance among Prospective EFL Teachers |
Mohammed Khodary ,Manal |
2239- Reconfigurable Multiple-Stereotype Student Model |
Kseibat ,Dawod
|
2335- E-learning systems and the requirements of the educational environment - أنظمة التعليم الإلكتروني ومتطلبات البيئة التعليمية |
رجاء الحجيلي
عبد الرحيم
العوفي
|
Day 1: 2:00pm – 3:30pm (A2): Software Engineering Room:
Paper |
Author |
2465- Feature Extraction Techniqes of EEG Signasl For BCI Application |
Alhamdani ,Toka Abdulhameed |
1688- Multi-Agent System Meta-Models |
Mohamed Elammari, Reem Elsaeti |
3152- The Cultural Aspects of Design Jordania Websites: An Empirical Evaluation of University, News, and Government Website by Different User Groups |
Tolba ,Rasha |
2560- A General Framework To Bridge The Gap Between Conceptual System And Abstract System In Software Development |
Hagal ,Mohamed |
2581- A Structured Approach For Extracting Functional Requirements From Unclear Customers |
Hagal ,Mohamed |
2627- Using Inconsistencies to Assess the Degree of Progress in Development Process |
Al-Khaldi ,Dr. Randa |
Day 1: 2:00pm – 3:30pm (A3): Algorithms & Application and Arabic Language Processing Room:
Paper |
Author |
2723- Finite Difference Methods For Numerical Simulations For 1+2 Dimensional Nonlinear Schrödinger Type Equations |
Taha ,Thiab |
2988- A Fuzzy Local Search Classifier for Intrusion Detection |
Boughaci ,Dalila |
3167- An Algebraic Algorithm for the Production-Inventory-Transportation Problem in a Three- Stage Supply |
Seliaman ,Mohamed Elhassan |
3175- A New Architecure For Translation Engine Using Ontology:One Step Ahead |
Kharbat ,Faten |
3233- A Particle Swarm Algorithm for Solving the Maximum Satisfiability Problem |
Layeb ,Abdesslem |
2542- Tele-monitoring the navigation of a Set of Robots Using Multiprocessors With a New Voice Command system |
Fezari ,Mohamed |
3:30pm – 4:00pm: Refreshment |
Day 1: 4:00pm – 5:30pm (B1): E-Learning and IT& Society and Remote Sensing and
Neural Networks and Parallel & Distributed Systems Room:
Paper |
Author |
2534- Is Saudi Arabia Ready for E-learning? – A Case Study |
Chanchary ,Farah Habib |
2535- Mobile Learning in Saudi Arabia - Prospects and Challenges |
Chanchary ,Farah Habib |
2579- Categorization of a Song Using an Ant Colony Algorithm |
Lachtar ,Nadia |
1689- Integrated Controller For Fixed Speed, Grid Connected Wind Turbine, Based On Neural Networks. |
Hashad ,Alaa |
3139- Automatic Parallel Processing Environment |
Osman ,Abdelrahman |
2367- Pinus trees distribution mapping in Zawita gully with digital analysis |
Ahihab ,Aahed |
Day 1: 4:00pm – 5:30pm (B2): Software Engineering Room:
Paper |
Author |
3083- Evolution Framework for Software Architecture Using Graph Transformation Approach |
Amirat ,Abdelkrim |
3096- The Employment of Axiomatic Design in Software Engineering: A Software Development Conceptual Framework |
El-Haik , Basem |
3102- A Framework for Software Product Risk Management Based on Quality Attributes and Operational Life Cycle (SPRMQ) |
Mofleh ,Halima |
3149- A New Classification of Non-Functional Requirements for Engineering the Development of Software Services and Service-Oriented Applications |
Odeh ,Yousra |
3177- Towards a New Way for Aspect-Oriented Software Development |
bentrad ,sassi |
3209- Towards The Use Of Program Slicing In The Change Impact Analysis Of Aspect Oriented Programs |
Bouteraa ,Imed |
Day 1: 4:00pm – 5:30pm (B3): Arabic Language Processing Room:
Paper |
Author |
2559- An Evaluation of Indices Based on Arabic Documents: An overview |
hanandeh ,Essam |
2562- Two Multi-class approaches for reduced massive data sets using Core Sets |
Nour-Eddine ,LACHACHI |
2656- Arabic Opinion Mining Using Combined Classification Approach |
El-Halees ,Alaa |
2938- Arabic Alert E-Mail Detection using Rule based Filter |
Al-Radaideh ,Qasem |
3077- Developing a Model for Generating Computer Program from Semi Natural Arabic Language. |
Ahmed ,Tarig |
3088- Searching Concepts and Keywords in the Holy Quran |
Al-Taani ,Ahmad T. |
8:00pm – 10:00pm: Conference Dinner |
Monday - 12/12/2011 |
9:00am – 10:30am: Keynote Speech: Prof. Norbik Idris - Information Security Place: |
10:30am – 11:00am: Refreshment |
Day 2: 11:00am – 12:30pm (C1): AI & Expert System and Information Security Room:
Paper |
Author |
1925- Intelligent Traffic Light Control System Based Image Intensity Measurement |
Al-Ani ,Muzhir |
2619- An Optimal General Trend for Fuzzy Time Series Forecasting Based on Intervals Fuzzy Rules Based High-Order Partitioning |
Awami ,Saleh |
2631- 3D Mapping of an Unknown Environment by Cooperatively Mobile Robots |
Huwedi ,Ashraf |
2826- Expert System for Islamic Punishment (ESIP) |
Nada ,Yasser |
2902- Analysis of the Stagnation Behavior of the Interacted Multiple Ant Colonies Optimization Framework |
Aljanaby ,Alaa |
2914- Automatic Classification Of Questions Into Bloom's Cognitive Levels Using Support Vector Machines |
Esmail ,Anwar |
Day 2: 11:00pm – 12:30pm (C2): Information Security Room:
Paper |
Author |
2532- Enhancement of E-Government Security Based on Quantum Cryptography |
Al-Janabi ,Sufyan T. Faraj
|
2574- Auditing for Standards Compliance In the Cloud: Challenges and Directions |
Rasheed ,Hassan |
2613- Analyzing the Performance of a Dynamic Access Control System With Integrated Risk Analysis |
Rasheed ,Hassan |
2816- Towards an a priori approach for the security of information systems |
Chehida ,Salim |
3118- Email SPAM Related Issues and Methods of Controlling used by Internet Service Providers (ISPs) in Saudi Arabia |
Alkahtani ,Hasan |
3203- Gait Analysis For Criminal Identification Based On Motion Capture |
Razali ,Nor Shahidayah |
Day 2: 11:00am – 12:30pm (C3): Multimedia Room:
Paper |
Author |
2554- A Graph Grammar Approach for calculation of Aggregate Regions Automata |
Hachichi ,Hiba |
2053- Interactions in Control of Large Scale Systems |
Alfitorey Mousa ,Younes |
3137- The Implementation Of Face Security For Authentication Implemented On Mobile Phone |
Kremic ,Emir |
1880- Texture Recognition based on DCT and Curvelet Transform |
alrawi ,salah |
2551- Shapes Matching and Indexing using Textual Descriptors |
Aouat ,Saliha |
2577- Obstacle Detection With Stereo Vision Based On The Homography |
Baha ,Nadia |
3104- Analyzing Web Service Interaction Using Open ECATNets |
Latreche ,Fateh |
12:30pm – 2:00pm: Prayer and Lunch |
Day 2: 2:30pm – 5:00pm (D1): AI & Expert System and Software Engineering Room:
Paper |
Author |
3049- Development of Graphical User Interface Using Philosophy of Use Case Maps |
El_Berkawi ,Ebtesam Elammari, Mohamed |
2327- Complex System Model based on Multi-Agent Systems and Petri Nets |
Belmabrouk ,Karima |
2459- Mathematical explanation of the errors that occur in real-time systems |
Al-Raimi ,Hamid |
3126A multi agent based tool for the simulaion of the dynamics of a bovine population under the effect of viral infections |
Guerram ,Tahar |
3157- Force / Motion Control for Constrained Robot Manipulator Using Adaptive Neural Fuzzy Inference System(ANFIS) |
Al-maliki ,Kadhim |
Day 2: 2:30pm – 5:00pm (D2): Information Security and Mobile Application Room:
Paper |
Author |
3204- Data Hiding Technique Based On Dynamic Lsb |
AL- Aidroos ,Naziha |
3231- A Multimedia Chaos-based Encryption Algorithm |
Boulebtateche ,Brahim |
2055- A Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour |
Shaout ,Adnan |
3123- Motion Control of non-Holonomic Mobile Manipulator using Fuzzy Logic. |
Hassam ,Abdelouahab |
3141- Template Matching Method for Recognition Musnad Characters Based on Correlation Analysis |
Qatran ,Mohammed |
3193- On finding the best number of states for a HMM-based offline Arabic word recognition system |
Wahby ,Talaat M. |
3202- Decision trees for handwritten Arabic words recognition |
Chefrour ,Aida |
Day 2: 2:30pm – 5:00pm (D3): Image Processing and Multimedia Room:
Paper |
Author |
2852- Multi-Phase Detection Technique For Removing Clusters Of Impulse Noise |
Awad ,Ali |
3020- Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table |
AL-Najjar ,Hazem |
3046- Neural Network-Based Face Detection with Partial Face Pattern |
Naji ,Sinan Hamid A. Jallab |
3082- An approach automata Game of Life-MAS of segmentation MRI brain |
Sarah ,Benmazou |
3184- Palm Veins Identification Using Radon Transform: RBF Approach |
Ayache ,Mohammad |
2944- Audiovisual Document Modeling By Metadata |
Elleuch ,Héla |
8:00pm – 10:00pm: Conference Dinner |
Tuesday - 13/12/2011 Place: |
9:00am – 10:00am: Refreshment |
Day 3: 10:00am – 12:00pm (E1): Computer in Education and Internet & the Web Room:
Paper |
Author |
2595- An Assistive Computerized System for Managing and Educating Children with Moderate and Mild Intellectual Disabilities at Shafallah Center in The State of Qatar |
Saleh ,Moutaz |
2626- Challenges Of Information Era: Teachers’ Attitude Towards The Use Of Internet Technology |
Safdar ,Muhammad |
1943- A Survey & Qualitative Analysis Of Interactive Pedagogical Drama Systems |
Paracha ,Samiullah |
2986- A Framework For Collecting Clientside Paradata In Web Applications |
Khasawneh ,Natheer |
3070- Dealing With Web Services Composition at the Architectural Level |
Bennouar ,Djamal |
Day 3: 10:00pm – 12:00pm (E2): Geographical Information System Room:
Paper |
Author |
2364- Representation in the open forms of geographic information systemsGIS) An Empirical Study on the water basin in northern Iraq |
abbas ,ali abed |
2365- Study the Effect of the Geometrical Correction of the Satellite image on the GPS Tracking by Using GIS |
Ali ,Sabah |
2397- Using GIS Technique in Hydrological Study Of Wadi Al-Shoar Basin North Iraq |
Al-Salim ,Taha |
2537- Relevance of Remote Sensing and Geographic Information in assessing sustainable groundwater resource.─ A Case of Kedah and Perlis States, Malaysia |
Adiat ,K.A.N. |
2597- A Proposed GIS-Based Decision Making Framework for Tourism Development Sites Selection |
Amri ,Mohamed |
2680- Hydrology Modeling for Runoff Harvesting of Tarow valley Using GIS. |
khalaf ,zakaria yahya |
Day 3: 10:00am – 12:00am (E3): Computer Architecture and Computer Networks Room:
Paper |
Author |
2634- Towards a Security Meta-model for Software Architectures |
Mohamed ,Gasmi |
2620- On Internet Multicast Architectures:Fully Distributed and Hierarchical Vs Service-Centric |
Said ,Omar |
2780- Analytical Study of the Effect of Transmission Range on the Performance of Probabilistic Flooding Protocols in MANETs |
Bani Yassein ,Muneer |
3018- Digital Image Encryption Algorithm Based on a Linear Independence Scheme and the Logistic Map |
AL-Najjar ,Hazem |
3142- Node Selection Based On Energy Consumption In Manet |
Kadir ,Jailani - Ghazali ,Osman |
12:00pm – 2:00pm: Prayer and Lunch |
Day 3: 2:00pm – 4:30pm (F1): Internet & Bioinformatics and Computer Ethics Room:
Paper |
Author |
2639- Pachinko Allocation Model with Image Local Features for Image Retrieval Tasks |
Boulemden ,Ahmed |
2409- Parallel Hybrid Meta-heuristic: Genetic Algorithm with Hill Climbing to Resolve the QAP |
GUEFROUCHI ,Ryma |
2569- Model Performance Improvement with Least Square Method in Highly Imbalanced and Correlated Datasets |
Malazizi ,Ladan |
2591- Data mining methods for medical data classification |
Alickovic ,Emina |
3215- Risk-Driven Compliant Access Controls for Clouds |
Boussi Rahmouni ,Hanene |
Day 3: 2:00pm – 4:30pm (F2): Information Systems Room:
Paper |
Author |
2659- WSN-based Support for Irrigation Efficiency Improvements in Arab Countries |
Al-Hamdi ,Ali |
2809- Decrypting The Ciphertexts of RSA With Public-Key |
Derdouri ,Lakhdar |
2873- Business Intelligence Maturity Models: Toward New Integrated Model |
Shaaban ,Essam |
2928- Analysis Of Factors That May Affect The Uses Of Knowledge Management In Sudanese Medium-Sized Companies |
Elshaiekh ,Nour-Eldin
Mohamed |
3172- Design And Implementation of RFID-Sensor Middleware Compliant with EPCglobal Architecture Framework |
Uddin ,Md. Kafil |
2419- An Analyzing Study of the Distributed Database System Parameters |
Maabreh ,Khaled |
3180- A survey of indexing techniques in natives XML databases |
Zemmar ,Imen |
Day 3: 2:00pm – 4:30pm (F3): Computer Networks and Machine Learning Room:
Paper |
Author |
3158- An Overview Of Flow-Based And Packet-Based Intrusion Detection Performance In High Speed Networks |
Alaidaros ,Hashem |
3171- An Intelligent Approach for DoS attacks detection |
Hassan Yassin ,Amr |
2350- Using Particle Swarm Optimization and Locally-Tuned General Regression Neural Networks with Optimal Completion for Clustering Incomplete Data Using Finite Mixture Models |
Mohamed ,Ahmed Rafat Abas |
3047- Integration of A Bayesian Learning Model In A Multi-Document Summarization System |
Maher ,Jaoua |
3064- A Taxonomy of Email SPAM Filters |
Alkahtani ,Hasan |
3103- Intrusion Inspector and Detector in Local Area Network using SNMP and MMC Techniques (IIDLAN) |
Alawi ,Salah |
4:30pm – 5:00pm:Closing Ceremony |
8:00pm – 10:00pm:Conference Dinner |
Day 4: Social event (Optional) |