Tentative Schedule

advertisement
This is a draft schedule. We will keep updating it every 3 days. It contains only registered papers.
CONFERENCE PROGRAM
The Third International Conference on e-Technologies and Networks for
Development (ICeND2014)
The Third International Conference on Cyber Security, Cyber Warfare, and
Digital Forensic (CyberSec2014)
Venue
: Faculty of Engineering – Lebanese University
University Address : Campus of Hadath, Beirut -Lebanon
Website
: http://ulfg.ul.edu.lb/home.aspx
Conference Website :http://sdiwc.net/conferences/2014/icend2014/ | | http://sdiwc.net/conferences/2014/cybersec2014/
Email
: ice2014@sdiwc.net | | cyb2014@sdiwc.net
Notes:
-
The time of each presentation including questions is 15 minutes. Please adhere to it.
There are no presentations on May 1, only a tour.
Nearest Airport
: Beirut-Rafic Hariri International Airport,3.1 km W from the university
Host Country: Lebanon
Participating Countries: Australia, Brazil, China, Egypt, France, Germany, Iran, Jordan, Lebanon,Malaysia, Qatar, Saudi
Arabia, South Africa, Sudan, Tunisia and United Kingdom
ICeND2014& CyberSec2014 Schedule
Date
Time
Activity
Fac. of Eng.
Ground Floor
ROOM A
ROOM B
9:00 am – 10:00 am
10:00 am –10:15 am
10:15 am – 11:15 am
11:15 am – 11:30 am
11:30 am – 13:00 pm
Registration
Opening Ceremony
Keynote Presentation by
Imad Y. Hoballah
Coffee Break
Session 1
Session Chair: Salah Eddine El Ayoubi
Wireless Communications
Session Chair: HossamFahmy
Cyber-Crimes
April. 29, 2014
(Tue.)
153- Advanced Sensor Placement Algorithm for Grid Modeled
Networks (Samih Abdul-Nabi - Lebanon)
109- Challenges Pertaining to Cyber War Under
International Law (Murdoch Watney – South Africa)
172- Dense Areas Femtocell Deployment: Access Types and
Challenges (Nadine Akkari - Saudi Arabia)
103- The Importance of Mandatory Data Breach
Notification to Identity Crime (Eric Holm - Australia)
138- Best Operator Policy in a Heterogeneous Wireless Network
(Soha Farhat - Lebanon)
170- Design and Implementation of an Accurate Real Time GPS
Tracking System (Hind Dafallah - Sudan)
125- Efficient Spectrum Sensing Approaches Based on
Waveform Detection (Abbas Nasser - Lebanon)
124- A Comprehensive Case Study of the Impact of Multicast
Routing Protocols on Mobile Health Care Training Systems
(AnisZarrad – Saudi Arabia)
Digital Forensic
129 - An Enhancement of Traceability Model Based-On
Scenario for Digital Forensic Investigation Process
(ImanAhmeid Mohamed - Malaysia)
Computer Forensics and Computer Security
123- Human Activity Recognition for Video
Surveillance using Sequences of Postures (Othman
Khalifa - Malaysia)
142- A Novel Encryption Solution for Real Time
Applications (Ali Alshahrani - United Kingdom)
13:00 pm – 2:00 pm
Lunch Break
2:00 pm – 3:00 pm
Keynote Presentation by
Salah Eddine El Ayoubi
Coffee Break
3:00 pm - 3:15 pm
3:15 pm – 5:30 pm
Session 2
Session Chair: Abed EllatifSamhat
Wireless Communications
Session Chair: Bachar El-Hassan
160 - Reducing Power Consumption of Cellular Networks by
Using Various Cell Types and Cell Zooming (Michel Nahas Lebanon)
130- Wireless Speed-Control Car (Bilal Ghazal - Lebanon)
158- Mixture PLL-based Loop for Joint CFO and Channel
Estimation in Slow Time-varying OFDM Environment (Ali Al
Ghouwayel - Lebanon)
166- Decoding of Short Non-Binary LDPC Codes Using a Non
Iterative Decoding Algorithm (Ali Al Ghouwayel - Lebanon)
155-Two-Bit Representation of the Extrinsic LLR Messages in
the Variable Node Processor of NB-LDPC Decoder (Ali Al
Ghouwayel - Lebanon)
140- Statistical Learning and Multiple Linear Regression Model
for Network Selection using MIH (Ahmad Rahil – France)
121- Utilizing Mobile Applications as a Channel of Interaction
between the Citizens and the Government: Design Mpolice in
Iraq (Nassir Al-Khafaji - Malaysia)
136- Modified Earliest Deadline First Scheduling with Channel
Quality Indicator for Downlink Real-Time Traffic in LTE
Networks (Mahmoud M. Hamed – Egypt)
E-Learning
134- Forecasting Exchange Rates: Artificial Neural
Networks Vs Regression (AtefHarb - Lebanon)
137- An Empirical Comparative Study of the Drivers of
E-Business Value Creation in the Jordanian Banking
Sector (Ali Ahmad Alawneh – Jordan)
144- Analysis and Evaluation of Internet Protocol
Television (Fatima F. ALQuayed - Saudi Arabia)
Cyber Security
127 - Modeling The Propagation Of Security Threats:
An E- Learning Case Study (NeilaRjaibi - Tunisia)
110-An Approach for Forensic Investigation in Firefox
OS (MohdNajwadiYusoff – Malaysia)
112 - Mobile Forensic Data Acquisition in Firefox OS
(MohdNajwadiYusoff - Malaysia)
Authentication and Access Control Systems
117- Modifying Authentication Techniques in Mobile
Communication Systems (Zakaria Abdel Wahab Egypt)
173- A New Approach for PAPR Reduction of OFDM Signal Based
on SLM and PTS (Mohamed Abbas - Egypt)
19:00 - 21h00
Gala Dinner
April. 30, 2014
(Wed.)
9:00 am – 10:00 am
Keynote Presentation by
HossamFahmy
10:00 am – 10:15 am
10:15 am – 12:30 am
Coffee Break
Session 3
Session Chair: Mohamad Khalil
E-Health
Session Chair: Aziz Barbar
Security protocols
176- Sign to Letter Translator System using a Hand Glove
(AbdallahKassem - Lebanon)
177- Utilization and Modeling Of An Artificial Muscle Application on IPMC muscle (ReemAbouMarak- Lebanon)
150- Impact of Network Structure on Spread of Competing
Diseases (NazaninMazlooman - Iran)
113- Optimal Preprocessing and FCM Clustering of MIR, NIR and
Combined MIR-NIR Spectra for Classification of Maize Roots
(Abbas Rammal - Lebanon)
115- E-exams under E-learning System: Evaluation of On-Screen
Distraction of First Year Medical Students in Relation to OnPaper Exams (Ayyub Patel - Saudi Arabia)
171- Data Mining in Healthcare Information Systems: Case
Studies in Northern Lebanon (Ahmad Shahin - Lebanon)
159- Mathematical Modeling of Pacemaker for Study of Battery
Longevity (George El-Jamal - Lebanon)
110- Development and Application of a Health Record System in
Main Office and Branches of Dhi-Qar Health Directorate (Nassir
Al-Khafaji – Malaysia)
165- Software-Defined Photonic Network-on-Chip (Junhui Wang
- China)
124 -On the Power of Quantum Cryptography and
Computers (Heshem A. El Zouka - Egypt)
Security in Cloud Computing
118 - A Cognitive Approach for Botnet Detection Using
Artificial Immune System in the Cloud (Victor Kebande
- South Africa)
Information Assurance and Security
Management
116 - Comparison between Alloy and Timed Automata
for Modelling and Analysing of Access Control
Specifications (EmsaiebGeepalla - Libya)
119- Statistical Analysis for Random Bits Generation on
Quantum Key Distribution (Omer Jasim - Egypt)
Information and Data Management
Information Content Security
126Mobile
Applications
Dynamic
Content
Management Server (CMS) (Bassam Hussein Lebanon)
131- Adoption of Information Communication
Technology at a hospital: A Case Study of the King
Fahad Medical City (AmnahBindakheel - Malaysia)
122- Graph-Coloring for Course Scheduling – A
Comparative Analysis based on Course Selection order
(Ammar Elhassan - Saudi Arabia)
133- Image Steganography based on LSBMR using
Sobel Edge Detection (ZohrehFouroozesh - Qatar)
12:30 am – 2:00pm
Lunch Break
2:00 pm – 3:45 pmSession 4
Session Chair: AbdallahKassem
Computational Intelligence
Image Processing
129- Generic Key Performance Indicators (ChadiKallab - Lebanon)
163- Selective Object Tracker: Evaluation and Enhancement (TarikLjouad - Germany)
Ad hoc and Sensor Networks
Grid, Cloud and Green Computing
162- Cloud Federation Means Cash (Jacques Bou Abdo - Lebanon)
169- An FPGA-BasedDynamic Power Management Technique for Wireless Sensor Network (Alexandre Ingles Da Silva –
Brazil)
147- - A Comparative Study of MANET Routing Protocols (Mona Alslaim - Saudi Arabia)
Miscellaneous
113- Autonomous Integrity Monitoring for GNSS Localization Using Informational Approach and Iono-Free Measurements
(ZiadNaja – Lebanon)
May 1, 2014
(Thu.)
3:45 pm – 4:00 pm
Closing Session
9:00 am- 18:00 pm
Tour to Byblos
Tour to Byblos:
Registration fees : 60 USD
Program
09h00:
10h00:
10h00-13h00:
13h00-14h00:
14h30-16h30:
16h30:
18h00:
Departure from LU to Byblos,
Arrival to Byblos,
Visiting the Roman Medieval port,the wax museum,the crusader castle and church as well as the extensive remains of city’s
past - from Neolithic times to the crusader era,
Lunch,
Wander and shopping in old souks,
Departure from Byblos,
Return to Beirut.
Download