Schedule

advertisement
CONFERENCE PROGRAM
The Third International Conference on Digital Information Processing and Communications
(ICDIPC 2013)
The conference venue (Islamic Azad University, UAE Branch ).
ICDIPC2013 will be held at the Islamic Azad University (IAU) , UAE Branch, Dubai, UAE.
IAU Address: Block #2, Academic City, Dubai, UAE
For more information, please call IAU Information Desk at (+971)4-366 4696 or call Mr.Rrahmatollah Hemmati at Cell Phone:
(+971)50 350 1730
FAX: (+971)4-366-4697, Web Site: www.iau.ae
Hosting Country: United Arab Emirates
Participants Countries sorted: Algeria, Australia, Austria, Bulgaria, China, Czech Republic, Denmark, Egypt, India, Indonesia, Iraq, Iran, Ireland,
Japan, Jordan, KSA, Lebanon, Libya, Malaysia, Morocco, Nigeria, Norway, Pakistan, Palestine, Poland, Portugal, South Korea, Tunisia, Turkey,
UAE, UK, and USA
Notes:
- The time of each presentation including questions is 20 minutes. Please adhere to it.
- There is no presentation on Feb. 1, only a tour.
-
Note 1: The lunch will be served by Danial Restaurant inside the university campus
Note 2: For the tour, the honored guests will be picked up from the Islamic Azad University, UAE campus and we go to the following
addresses:
1- Zaabeel Placa, 2- Madinat Jumeirah, 3- Burj Al Arab, 4- Palm Island, 5- Ibn Battuta Mall, 6- Dubai Mall .
Time: Morning : From 10.00 AM to 03:00 PM
Note 3: There is a free transportation, Bus and minibus, from Islamic Azad University, Dubai Academic Campus to the following
addresses:
1-Mall of Emirates, January 30, 2013, Bus Leaves IAU campus at 7:00 PM
2-Wafi Center, January 31, 2013,
Bus Leaves IAU campus at 7:00 PM
The nearest Airports going to the Islamic Azad University, UAE campus are as following:




Dubai International Airport, Terminal 1
Dubai International Airport, Terminal 2
Dubai international Airport, Terminal 3
Sharjah Airport
Please print this map and give it to a Tax Driver. He will take you to the Islamic Azad University, UAE campus at Academic city
.
ICDIPC2013 Schedule
Date
Jan. 30, 2013
(Wednesday)
Jan. 31, 2013
(Thursday)
Feb. 1, 2013
(Friday)
Time
Activity
9:00 am –10:00 am
Registration
Opening Ceremony by General Chair
Dr. Mohammad V. Malakooti
10:00 am –10:05 am
10:10 am –10:20 am
Islamic Azad University Documentary
10:20 am – 11:20 am
Keynote Presentation
Prof. Martin Hagan
11:20 am – 11:45 am
Coffee Break
12.45 pm – 12.50 pm
Photo Session
12.50 pm – 2:00 pm
Lunch Break
2:00 pm – 4:00 pm
Session 1
4:00 pm – 4:15 pm
Coffee Break
4:15 pm – 6:15
8:30 am – 9:00 am
Session 2
Islamic Azad University, UAE branch
Documentary
Keynote Speaker Prof. Jacek Stando
9:00 am –9:15 am
Coffee Break
9:15 am – 11:15 am
Session 3
11:15 am – 11:30 am
Coffee Break
11:30 am – 1:30 pm
Session 4
1:30 pm – 2:45 pm
Lunch Break
2:45 pm – 4:45+ pm
Session 5
4:45 pm – 5:00 pm
Coffee Break
9.00 am- 5:00 pm
City Tour
8:25 am – 8:30 am
DETAILED PROGRAM
Session 1
Jan. 30, 2013 (Wednesday)
Title
Room
Time
Chair
Data Mining
A
2:00 – 4:00
Dr. AmirVahid Fakhredaie
109- New Crossing Minimization Technique for
Cancer Datasets Biclustering (Tamer Mohamed –
Egypt)
141 - A Meta Description Logics Knowledge Base
for Arabic Language Processing (Yasser Yahiaoui
– Algeria)
213 - Predicting Future Ranking of Online Novels
based on Collective Intelligence (Sachio Hirokawa
– Japan)
211 - Monitoring Systems in Intensive Care Units
Using Incremental Support Vector Machines
(Fahmi Ben Rejab – Tunisia)
202 - Fractal Based Data Separation in Data Mining
(Marcel Jirina - Czech Republic)
268 - Java Applications Comprehension by
Discovering Clusters of Related Classes (Jauhar
Ali – UAE)
Image Processing
Information Security
B
2:00 – 4:00
Dr. Navid Hashemitaba
C
2:00 – 4:00
Mr. Peyman Haghighat
251 - A Novel Method for Secure Image
Delivery over Mobile Networks Based on
Orthogonal Transforms and Scrambling
Algorithms (Mohammad V. Malakooti – UAE)
169 - Medical Image Segmentation Using
Hidden Markov Random Field A Distributed
Approach (El-Hachemi Guerrout – Algeria)
321 - Objects Extraction for License Plate
Detection (Charbel Fares – Lebanon)
288 - Classification of Piper Nigrum Samples
Using Machine Learning Techniques: A
Comparison (D.N.F Awang Iskandar –
Malaysia)
309 - Robust 2D Augmented Reality Based on
Homography Refinement and Temporal
Coherence (Karam Kim - Korea, Republic Of)
224 Oriented
Norway)
Attested Genuineness in Service
Environments (Anders Fongen –
275 - How to Violate Android’s Permission
System Without Violating It (Kyoung-Soo Han Korea, Republic Of)
276 - BOSF: By-Owner Script
(Jungtae Kim- Korea, Republic Of)
Filtering
144 - Arbitrated Multiparty Protocol (Khalil
Challita – Lebanon)
325 - An Approach Based on Semantic
Management of User Profile to Ubiquitous
Applications Adaptation (Salima BourougaaTria – Algeria)
265 - A Structured Aggregate Signature
Scheme with Pairing-based Cryptography
(Masaki Inamura – Japan)
262 - Securing a Cloud-based Community Trust
Store for Local P2P E-Commerce (A.H. Fauzi –
UK)
128 - A Novel Encryption Standard (DES) with
Time Hopping Sequence for RFID System
(Mohamed Mostafa AbdAllah - KSA)
Session 2
Jan. 30, 2013 (Wednesday)
Title
Room
Time
Chair
Embedded Systems
A
4:15 - 6:15
Mr. Peiman Haghighat
Information Security
B
4:15 - 6:15
Mr. Mojtaba Sadeghi
166 - Inertial System for Measurement of the
Dynamic Response and Status of the Vehicle
Suspension Elements (Rosen Miletiev –
Bulgaria)
303 - Image Recognition Method based on
Discrete Wavelet Transform (DWT) and Singular
Value Decomposition (SVD) (Mohammad V.
Malakooti – UAE)
147 - NFC Application Interface for Smart
Phones and Appliances (Hamid Shahnasser USA)
310 - A Novel Data Compression and
Suppression Methods based on DCT and
Overlapping for the Wireless Sensor Networks
(WSN) (Mohammad V. Malakooti – UAE)
154 - Efficient Temperature Aware Design for
Portable Processors (Diary Sulaiman - Iraq)
319 - Design Noisy Digital Communication
Channel
Emulator
Based-On
Weibull
Distribution (Tarek El-Mihoub – Libya)
316 - Secure Authentication Mechanism in
Mobile Internet Protocol Version 6 (Mojtaba
Sadeghi – UAE)
171 - A New Watermarking Attack Using Blind
Sources Separation (Manal Taoufiki – KSA)
missing copyright
245 - Regulators of Timeliness Data Quality
Dimension for Changing Data Quality in
Information
Manufacturing
System
(IMS)
(Mohammad Shamsul Islam – Ireland)
Web Applications
246 - MyHealthyKids: Intelligent Obesity
Intervention System for Primary School
Children (Wahidah Husain – Malaysia)
172 - Performance Analysis of Java APIs for
XML Processing (Orlando Belo – Portugal)
313 - A Basic Security Requirements
Taxonomy to Quantify Security Threats: An
E-learning
Application (Neila Rjaibi–
Tunisia)
294 - Digital Signature Scheme Enabling
Pre-Control of Content Editing for
Secondary Use (Tatsuhiko Sano – Japan)
214 - Steganographic Scheme Using The
Z4-Linear Goethals Codes (Houda Jouhari
– Morocco)
E- Learning
C
4:15 - 6:15
Dr. Tawfik Saeed Zeki
231 - Focused Search Using Community Search
Logs (Takahiko Suzuki – Japan)
199 - Analysis of Online Materials and their
Impact (Blanka Frydrychova Klimova - Czech
Republic)
200 - ICT as an Effective Tool for Learning
English (Blanka Frydrychova Klimova - Czech
Republic)
234 - Identifying Students’ Trends Toward
Personalizing Learning Management System
(LMS) at Zarqa University (Ahmad AlHamad –
Jordan)
158 - Social Network Media: Analyzing Student
Interaction in Blended E-learning System and its
Impact to Learning of Non-native English
Students (Melvin Ballera – Libya)
232 - Development of Sustainable Key
Performance Indicator (KPI) Monitoring and
Control System Using Viable System Model (Sani
Suleiman Isah – Nigeria)
Neural Networks
170 - Optimising Insurance Fraud Detection and
Classification of Vehicle Accident Damange by
Using Neural Networks to Identify Patterns in
Behaviour, Liked Cases and Vehicle Recognition.
(Emma-Jane Phillips - UK)
296 - Semi-Fluid: Implementing A High Speed
Content Distribution Model for Peer-TO-Peer
Overlay Network (Mousa Al Falayleh – UAE)
Session 3
Jan. 31, 2013 (Thursday)
Title
Wireless Networks
Room
Time
Chair
A
9:15- 11:15
Mr. Yousuf Akbari
152 - Applying Intelligent Agents in
Wireless Sensor Networks as Base
Stations (Mohammad Ali Kianifar – UAE)
217 - Effect of Space in an Adhoc
Network (Mozmin Ahmed – India)
192 - Bandwidth Optimization Through Real
Time Audio/Video Codec Switching By
Using IMS (Amir Rashid Chaudhary – UK)
Special session on remote
sensing
B
9:15- 11:15
Mr. Peiman Haghighat
C
9:15- 11:15
Dr. Tawfik Saeed Zeki
132 - Reliability Evaluation of Multi-source
Multi-sink Stochastic-flow Networks under
Quickest
Path
and
System
Capacity
Constraints ( Moatamad Hassan - KSA )
250 - A Roll of GUI (Graphical User Interface)
Observed in Hollywood Blockbuster Film (Jinhwan Yu – South Korea)
121 - Websites and Webpages Creditbility and
Trust Evaluation (Yahya Tashtoush – Jordan)
Multimedia
Network Security
223 - Verification of Statistical Properties for
Hyperspectral Images: Heteroscedasticity and
Non-stationarity (Jihao Yin – China)
143 - Inter-Layer Sharing of Backup Path
Capacities Providing Fast Service Recovery in IpMpls/Wdm Networks ( Jacek Rak - Poland )
207 - Change Detection for Sustainability
Monitoring Using Satellite Remote Sensing
Data (X. Jia – Australia)
157 - Pooled Methodology for Combating
Primary User Emulation Attack in
Cognitive Radio Networks (Mufliha
Kamran – Pakistan)
301 - Defence in-depth for Cyber Security With
Custom Anti-Virus Signature Definition (Karim
Ouazzane – UK)
205 - Spatial Subspace Clustering for
Hyperspectral Data Segmentation (Yi Guo –
Australia)
178 - Density Propagation Based Particle Filter
Algorithm for Video Object Tracking ( Zexin Lin –
China )
315 - Current Threats of Wireless
Networks (Mardiana Mohamad Noor –
Malaysia)
*137 - SOFL Three-Step Approach to Construct
The Formal Specification of A Brain Tumor
Treatment System (A Rahman Mat – Malaysia)
216 - Ultra-Low Complexity Control for
AdHoc Mobile Sensor Networks (Matthias
Scheutz - USA)
Session 4
Jan. 31, 2013 (Thursday)
Title
Room
Time
Chair
Signal Processing
A
11:30 – 1:30
Mr. Yousuf Akbari
Data Mining
B
11:30 – 1:30
Dr. Tawfik Saeed Zeki
Image Processing
C
11:30 – 1:30
Dr. Navid Hashemitaba
281 - A New Virtualization-Based Security
Architecture in A Cloud Computing Environment
(Soha Zaghloul – KSA)
274 - Database Optimization for Large-Scale
Web Access Log Management (Minjae Lee Korea, Republic Of)
312 - Glare Region Detection in Night
Scene Using Multi-Layering (Chil-Suk Cho
- Korea, Republic Of)
241 - A Modified Method of Information Hiding
Based on Hybrid Cryptography and Steganography
(Fadhil Salman Abed – Iraq)
222 - A Novel Semantic Search Technique
Using Ontology (Mahnaz Khani – Iran)
299
Error
Modeling
of
Depth
Measurement Using Fir Stereo Camera
Systems (Jun Ho Oh - Korea, Republic Of)
291 - Performance Analysis Under Imperfect
Channel
State
Information
and
Inter-Cell
Interference in LTE-Advanced System (Dong-il Lee
- Korea, Republic Of)
153 - Tunable Current-Mode Tow-Thomas Biquad
Based on CDTAs (Muhammed Ibrahim - Iraq)
297 LTE Handset RF Power Consumption
Emulation (Deogratius Musiige – Denmark)
180 - Performance Evaluation of MC-CDMA System
Using Delta Modulation in Ultra Wide Band
Channel (Akhil V. Gite – India)
302 - A Hybrid Method with Confusion Network for
Indexing Spoken Documents (Bendib Issam –
Algeria)
261 - Real Life Pilot Solution with Artificial
Intelligence for Disabled Computer Users
(Markson Aigbodi – UK)
295 - Comparative Studies of Artificial
Intelligence (AI) Techniques (Lubabatu Sada
Sodangi – Nigeria)
305 - Prediction of Istanbul Stock
Exchange (ISE) Direction Based on News
Articles (Hakan Gunduz – Turkey)
283 - A Study on Providing Natural Twohanded Interaction Using a Hybrid Camera
(Junyeong Choi - Korea, Republic Of)
311 - Fast Stereo Image Rectification
Using Mobile GPU (Jungsik Park - Korea,
Republic Of)
287 - Fast Generation of Digital Video
Holograms Using a Spatio-Temporal
Sampling Scheme and GPUs (Joongseok
Song - Korea, Republic Of)
197 - Scheduling Techniques for Parallel
Implementation of Wear Particle Recognition
Algorithms (Mohammad Laghari – UAE)
120- Guarding Simple Polygons with Semiopen Edge Guards (Godfried Toussaint –
UAE) – from image processing
Ontology
179 - Legistical Efforts by E-Government
(Wolfgang Kahlig – Austria)
257 - ONTOCARER: An Ontological
Framework for Assistive Agents for The
Disabled (Vassil Vassilev - UK)
Session 5
Jan. 31, 2013 (Thursday)
Title
Room
Time
Chair
Cloud Computing
B
2:45 – 4:45
Mr. Peiman Haghighat
Miscellaneous topics
C
2:45 – 4:45
Ms. Farah Ansari
206 - Convergence of Cloud Computing, Service Oriented Architecture
and Enterprise Architecture (Susan Sutherland –Australia)
298 - Design and Implementation of Cache Manager for Hybrid Storage
( Seongjin Lee - Korea, Republic Of )
308 - A Swot Analysis on CISCO® High Availability Virtualization Clusters
Disaster Recovery Plan (Eman Al-Harbi - KSA)
289 - The Use of the Aspect Oriented Programming (AOP) Paradigm in
Discrete Event Simulation Domain: Overview and Perspectives (Meriem
Chibani – Algeria)
247 - Healthcare Applications on Mobile Cloud Computing (Wahidah
Husain – Malaysia)
161 - A New Test Process for SOA by Deploying ISTQB Framework
(Reza Kianyzadeh – UAE)
145 - Cloud Computing Services in Mobile Devices Using Android Face
Detector API and Rest Communication (Riri Fitri Sari – Indonesia)
271 - A New Architecture of an Autonomous System in Cloud Computing
(Soha Zaghloul - KSA)
273 - Analysis of SaaS Multi-Tenant Database in A Cloud Environment
(Soha Zaghloul – KSA)
E-Commerce
105 - Location-based Mobile Advertising: A Step Towards Mobile
Commerce in Developing World (Suleiman Almasri – KSA)
263 - Optimizing and Improvement Performance of Dual Band CPW-fed
Monopole Antenna (Nafaa M. Shebani – Libya)
264 - Simulation and Analysis of Path Loss Models for WiMax
Communication System (Nafaa M. Shebani – Libya)
203 - When Churn Happens in A Middle East Telecom Operator (Orlando
Belo – Portugal)
149 - Enhancement and Performance Analysis on Dutta and Chaudhuri
Color Edge Detection Algorithm In RGB Color Space (Mohamed
Almadhoun – Palestine)
212- Migration of Legacy Systems to Service Oriented Architecture (
Wafa souiou- Algeria)
Download