This is a draft schedule. We will keep updating it every 3 days. It contains only registered papers. CONFERENCE PROGRAM The Third International Conference on e-Technologies and Networks for Development (ICeND2014) The Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014) Venue : Faculty of Engineering – Lebanese University University Address : Campus of Hadath, Beirut -Lebanon Website : http://ulfg.ul.edu.lb/home.aspx Conference Website :http://sdiwc.net/conferences/2014/icend2014/ | | http://sdiwc.net/conferences/2014/cybersec2014/ Email : ice2014@sdiwc.net | | cyb2014@sdiwc.net Notes: - The time of each presentation including questions is 15 minutes. Please adhere to it. There are no presentations on May 1, only a tour. Nearest Airport : Beirut-Rafic Hariri International Airport,3.1 km W from the university Host Country: Lebanon Participating Countries: Australia, Brazil, China, Egypt, France, Germany, Iran, Jordan, Lebanon,Malaysia, Qatar, Saudi Arabia, South Africa, Sudan, Tunisia and United Kingdom ICeND2014& CyberSec2014 Schedule Date Time Activity Fac. of Eng. Ground Floor ROOM A ROOM B 9:00 am – 10:00 am 10:00 am –10:15 am 10:15 am – 11:15 am 11:15 am – 11:30 am 11:30 am – 13:00 pm Registration Opening Ceremony Keynote Presentation by Imad Y. Hoballah Coffee Break Session 1 Session Chair: Salah Eddine El Ayoubi Wireless Communications Session Chair: HossamFahmy Cyber-Crimes April. 29, 2014 (Tue.) 153- Advanced Sensor Placement Algorithm for Grid Modeled Networks (Samih Abdul-Nabi - Lebanon) 109- Challenges Pertaining to Cyber War Under International Law (Murdoch Watney – South Africa) 172- Dense Areas Femtocell Deployment: Access Types and Challenges (Nadine Akkari - Saudi Arabia) 103- The Importance of Mandatory Data Breach Notification to Identity Crime (Eric Holm - Australia) 138- Best Operator Policy in a Heterogeneous Wireless Network (Soha Farhat - Lebanon) 170- Design and Implementation of an Accurate Real Time GPS Tracking System (Hind Dafallah - Sudan) 125- Efficient Spectrum Sensing Approaches Based on Waveform Detection (Abbas Nasser - Lebanon) 124- A Comprehensive Case Study of the Impact of Multicast Routing Protocols on Mobile Health Care Training Systems (AnisZarrad – Saudi Arabia) Digital Forensic 129 - An Enhancement of Traceability Model Based-On Scenario for Digital Forensic Investigation Process (ImanAhmeid Mohamed - Malaysia) Computer Forensics and Computer Security 123- Human Activity Recognition for Video Surveillance using Sequences of Postures (Othman Khalifa - Malaysia) 142- A Novel Encryption Solution for Real Time Applications (Ali Alshahrani - United Kingdom) 13:00 pm – 2:00 pm Lunch Break 2:00 pm – 3:00 pm Keynote Presentation by Salah Eddine El Ayoubi Coffee Break 3:00 pm - 3:15 pm 3:15 pm – 5:30 pm Session 2 Session Chair: Abed EllatifSamhat Wireless Communications Session Chair: Bachar El-Hassan 160 - Reducing Power Consumption of Cellular Networks by Using Various Cell Types and Cell Zooming (Michel Nahas Lebanon) 130- Wireless Speed-Control Car (Bilal Ghazal - Lebanon) 158- Mixture PLL-based Loop for Joint CFO and Channel Estimation in Slow Time-varying OFDM Environment (Ali Al Ghouwayel - Lebanon) 166- Decoding of Short Non-Binary LDPC Codes Using a Non Iterative Decoding Algorithm (Ali Al Ghouwayel - Lebanon) 155-Two-Bit Representation of the Extrinsic LLR Messages in the Variable Node Processor of NB-LDPC Decoder (Ali Al Ghouwayel - Lebanon) 140- Statistical Learning and Multiple Linear Regression Model for Network Selection using MIH (Ahmad Rahil – France) 121- Utilizing Mobile Applications as a Channel of Interaction between the Citizens and the Government: Design Mpolice in Iraq (Nassir Al-Khafaji - Malaysia) 136- Modified Earliest Deadline First Scheduling with Channel Quality Indicator for Downlink Real-Time Traffic in LTE Networks (Mahmoud M. Hamed – Egypt) E-Learning 134- Forecasting Exchange Rates: Artificial Neural Networks Vs Regression (AtefHarb - Lebanon) 137- An Empirical Comparative Study of the Drivers of E-Business Value Creation in the Jordanian Banking Sector (Ali Ahmad Alawneh – Jordan) 144- Analysis and Evaluation of Internet Protocol Television (Fatima F. ALQuayed - Saudi Arabia) Cyber Security 127 - Modeling The Propagation Of Security Threats: An E- Learning Case Study (NeilaRjaibi - Tunisia) 110-An Approach for Forensic Investigation in Firefox OS (MohdNajwadiYusoff – Malaysia) 112 - Mobile Forensic Data Acquisition in Firefox OS (MohdNajwadiYusoff - Malaysia) Authentication and Access Control Systems 117- Modifying Authentication Techniques in Mobile Communication Systems (Zakaria Abdel Wahab Egypt) 173- A New Approach for PAPR Reduction of OFDM Signal Based on SLM and PTS (Mohamed Abbas - Egypt) 19:00 - 21h00 Gala Dinner April. 30, 2014 (Wed.) 9:00 am – 10:00 am Keynote Presentation by HossamFahmy 10:00 am – 10:15 am 10:15 am – 12:30 am Coffee Break Session 3 Session Chair: Mohamad Khalil E-Health Session Chair: Aziz Barbar Security protocols 176- Sign to Letter Translator System using a Hand Glove (AbdallahKassem - Lebanon) 177- Utilization and Modeling Of An Artificial Muscle Application on IPMC muscle (ReemAbouMarak- Lebanon) 150- Impact of Network Structure on Spread of Competing Diseases (NazaninMazlooman - Iran) 113- Optimal Preprocessing and FCM Clustering of MIR, NIR and Combined MIR-NIR Spectra for Classification of Maize Roots (Abbas Rammal - Lebanon) 115- E-exams under E-learning System: Evaluation of On-Screen Distraction of First Year Medical Students in Relation to OnPaper Exams (Ayyub Patel - Saudi Arabia) 171- Data Mining in Healthcare Information Systems: Case Studies in Northern Lebanon (Ahmad Shahin - Lebanon) 159- Mathematical Modeling of Pacemaker for Study of Battery Longevity (George El-Jamal - Lebanon) 110- Development and Application of a Health Record System in Main Office and Branches of Dhi-Qar Health Directorate (Nassir Al-Khafaji – Malaysia) 165- Software-Defined Photonic Network-on-Chip (Junhui Wang - China) 124 -On the Power of Quantum Cryptography and Computers (Heshem A. El Zouka - Egypt) Security in Cloud Computing 118 - A Cognitive Approach for Botnet Detection Using Artificial Immune System in the Cloud (Victor Kebande - South Africa) Information Assurance and Security Management 116 - Comparison between Alloy and Timed Automata for Modelling and Analysing of Access Control Specifications (EmsaiebGeepalla - Libya) 119- Statistical Analysis for Random Bits Generation on Quantum Key Distribution (Omer Jasim - Egypt) Information and Data Management Information Content Security 126Mobile Applications Dynamic Content Management Server (CMS) (Bassam Hussein Lebanon) 131- Adoption of Information Communication Technology at a hospital: A Case Study of the King Fahad Medical City (AmnahBindakheel - Malaysia) 122- Graph-Coloring for Course Scheduling – A Comparative Analysis based on Course Selection order (Ammar Elhassan - Saudi Arabia) 133- Image Steganography based on LSBMR using Sobel Edge Detection (ZohrehFouroozesh - Qatar) 12:30 am – 2:00pm Lunch Break 2:00 pm – 3:45 pmSession 4 Session Chair: AbdallahKassem Computational Intelligence Image Processing 129- Generic Key Performance Indicators (ChadiKallab - Lebanon) 163- Selective Object Tracker: Evaluation and Enhancement (TarikLjouad - Germany) Ad hoc and Sensor Networks Grid, Cloud and Green Computing 162- Cloud Federation Means Cash (Jacques Bou Abdo - Lebanon) 169- An FPGA-BasedDynamic Power Management Technique for Wireless Sensor Network (Alexandre Ingles Da Silva – Brazil) 147- - A Comparative Study of MANET Routing Protocols (Mona Alslaim - Saudi Arabia) Miscellaneous 113- Autonomous Integrity Monitoring for GNSS Localization Using Informational Approach and Iono-Free Measurements (ZiadNaja – Lebanon) May 1, 2014 (Thu.) 3:45 pm – 4:00 pm Closing Session 9:00 am- 18:00 pm Tour to Byblos Tour to Byblos: Registration fees : 60 USD Program 09h00: 10h00: 10h00-13h00: 13h00-14h00: 14h30-16h30: 16h30: 18h00: Departure from LU to Byblos, Arrival to Byblos, Visiting the Roman Medieval port,the wax museum,the crusader castle and church as well as the extensive remains of city’s past - from Neolithic times to the crusader era, Lunch, Wander and shopping in old souks, Departure from Byblos, Return to Beirut.