CONFERENCE PROGRAM The Third International Conference on Digital Information Processing and Communications (ICDIPC 2013) The conference venue (Islamic Azad University, UAE Branch ). ICDIPC2013 will be held at the Islamic Azad University (IAU) , UAE Branch, Dubai, UAE. IAU Address: Block #2, Academic City, Dubai, UAE For more information, please call IAU Information Desk at (+971)4-366 4696 or call Mr.Rrahmatollah Hemmati at Cell Phone: (+971)50 350 1730 FAX: (+971)4-366-4697, Web Site: www.iau.ae Hosting Country: United Arab Emirates Participants Countries sorted: Algeria, Australia, Austria, Bulgaria, China, Czech Republic, Denmark, Egypt, India, Indonesia, Iraq, Iran, Ireland, Japan, Jordan, KSA, Lebanon, Libya, Malaysia, Morocco, Nigeria, Norway, Pakistan, Palestine, Poland, Portugal, South Korea, Tunisia, Turkey, UAE, UK, and USA Notes: - The time of each presentation including questions is 20 minutes. Please adhere to it. - There is no presentation on Feb. 1, only a tour. - Note 1: The lunch will be served by Danial Restaurant inside the university campus Note 2: For the tour, the honored guests will be picked up from the Islamic Azad University, UAE campus and we go to the following addresses: 1- Zaabeel Placa, 2- Madinat Jumeirah, 3- Burj Al Arab, 4- Palm Island, 5- Ibn Battuta Mall, 6- Dubai Mall . Time: Morning : From 10.00 AM to 03:00 PM Note 3: There is a free transportation, Bus and minibus, from Islamic Azad University, Dubai Academic Campus to the following addresses: 1-Mall of Emirates, January 30, 2013, Bus Leaves IAU campus at 7:00 PM 2-Wafi Center, January 31, 2013, Bus Leaves IAU campus at 7:00 PM The nearest Airports going to the Islamic Azad University, UAE campus are as following: Dubai International Airport, Terminal 1 Dubai International Airport, Terminal 2 Dubai international Airport, Terminal 3 Sharjah Airport Please print this map and give it to a Tax Driver. He will take you to the Islamic Azad University, UAE campus at Academic city . ICDIPC2013 Schedule Date Jan. 30, 2013 (Wednesday) Jan. 31, 2013 (Thursday) Feb. 1, 2013 (Friday) Time Activity 9:00 am –10:00 am Registration Opening Ceremony by General Chair Dr. Mohammad V. Malakooti 10:00 am –10:05 am 10:10 am –10:20 am Islamic Azad University Documentary 10:20 am – 11:20 am Keynote Presentation Prof. Martin Hagan 11:20 am – 11:45 am Coffee Break 12.45 pm – 12.50 pm Photo Session 12.50 pm – 2:00 pm Lunch Break 2:00 pm – 4:00 pm Session 1 4:00 pm – 4:15 pm Coffee Break 4:15 pm – 6:15 8:30 am – 9:00 am Session 2 Islamic Azad University, UAE branch Documentary Keynote Speaker Prof. Jacek Stando 9:00 am –9:15 am Coffee Break 9:15 am – 11:15 am Session 3 11:15 am – 11:30 am Coffee Break 11:30 am – 1:30 pm Session 4 1:30 pm – 2:45 pm Lunch Break 2:45 pm – 4:45+ pm Session 5 4:45 pm – 5:00 pm Coffee Break 9.00 am- 5:00 pm City Tour 8:25 am – 8:30 am DETAILED PROGRAM Session 1 Jan. 30, 2013 (Wednesday) Title Room Time Chair Data Mining A 2:00 – 4:00 Dr. AmirVahid Fakhredaie 109- New Crossing Minimization Technique for Cancer Datasets Biclustering (Tamer Mohamed – Egypt) 141 - A Meta Description Logics Knowledge Base for Arabic Language Processing (Yasser Yahiaoui – Algeria) 213 - Predicting Future Ranking of Online Novels based on Collective Intelligence (Sachio Hirokawa – Japan) 211 - Monitoring Systems in Intensive Care Units Using Incremental Support Vector Machines (Fahmi Ben Rejab – Tunisia) 202 - Fractal Based Data Separation in Data Mining (Marcel Jirina - Czech Republic) 268 - Java Applications Comprehension by Discovering Clusters of Related Classes (Jauhar Ali – UAE) Image Processing Information Security B 2:00 – 4:00 Dr. Navid Hashemitaba C 2:00 – 4:00 Mr. Peyman Haghighat 251 - A Novel Method for Secure Image Delivery over Mobile Networks Based on Orthogonal Transforms and Scrambling Algorithms (Mohammad V. Malakooti – UAE) 169 - Medical Image Segmentation Using Hidden Markov Random Field A Distributed Approach (El-Hachemi Guerrout – Algeria) 321 - Objects Extraction for License Plate Detection (Charbel Fares – Lebanon) 288 - Classification of Piper Nigrum Samples Using Machine Learning Techniques: A Comparison (D.N.F Awang Iskandar – Malaysia) 309 - Robust 2D Augmented Reality Based on Homography Refinement and Temporal Coherence (Karam Kim - Korea, Republic Of) 224 Oriented Norway) Attested Genuineness in Service Environments (Anders Fongen – 275 - How to Violate Android’s Permission System Without Violating It (Kyoung-Soo Han Korea, Republic Of) 276 - BOSF: By-Owner Script (Jungtae Kim- Korea, Republic Of) Filtering 144 - Arbitrated Multiparty Protocol (Khalil Challita – Lebanon) 325 - An Approach Based on Semantic Management of User Profile to Ubiquitous Applications Adaptation (Salima BourougaaTria – Algeria) 265 - A Structured Aggregate Signature Scheme with Pairing-based Cryptography (Masaki Inamura – Japan) 262 - Securing a Cloud-based Community Trust Store for Local P2P E-Commerce (A.H. Fauzi – UK) 128 - A Novel Encryption Standard (DES) with Time Hopping Sequence for RFID System (Mohamed Mostafa AbdAllah - KSA) Session 2 Jan. 30, 2013 (Wednesday) Title Room Time Chair Embedded Systems A 4:15 - 6:15 Mr. Peiman Haghighat Information Security B 4:15 - 6:15 Mr. Mojtaba Sadeghi 166 - Inertial System for Measurement of the Dynamic Response and Status of the Vehicle Suspension Elements (Rosen Miletiev – Bulgaria) 303 - Image Recognition Method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) (Mohammad V. Malakooti – UAE) 147 - NFC Application Interface for Smart Phones and Appliances (Hamid Shahnasser USA) 310 - A Novel Data Compression and Suppression Methods based on DCT and Overlapping for the Wireless Sensor Networks (WSN) (Mohammad V. Malakooti – UAE) 154 - Efficient Temperature Aware Design for Portable Processors (Diary Sulaiman - Iraq) 319 - Design Noisy Digital Communication Channel Emulator Based-On Weibull Distribution (Tarek El-Mihoub – Libya) 316 - Secure Authentication Mechanism in Mobile Internet Protocol Version 6 (Mojtaba Sadeghi – UAE) 171 - A New Watermarking Attack Using Blind Sources Separation (Manal Taoufiki – KSA) missing copyright 245 - Regulators of Timeliness Data Quality Dimension for Changing Data Quality in Information Manufacturing System (IMS) (Mohammad Shamsul Islam – Ireland) Web Applications 246 - MyHealthyKids: Intelligent Obesity Intervention System for Primary School Children (Wahidah Husain – Malaysia) 172 - Performance Analysis of Java APIs for XML Processing (Orlando Belo – Portugal) 313 - A Basic Security Requirements Taxonomy to Quantify Security Threats: An E-learning Application (Neila Rjaibi– Tunisia) 294 - Digital Signature Scheme Enabling Pre-Control of Content Editing for Secondary Use (Tatsuhiko Sano – Japan) 214 - Steganographic Scheme Using The Z4-Linear Goethals Codes (Houda Jouhari – Morocco) E- Learning C 4:15 - 6:15 Dr. Tawfik Saeed Zeki 231 - Focused Search Using Community Search Logs (Takahiko Suzuki – Japan) 199 - Analysis of Online Materials and their Impact (Blanka Frydrychova Klimova - Czech Republic) 200 - ICT as an Effective Tool for Learning English (Blanka Frydrychova Klimova - Czech Republic) 234 - Identifying Students’ Trends Toward Personalizing Learning Management System (LMS) at Zarqa University (Ahmad AlHamad – Jordan) 158 - Social Network Media: Analyzing Student Interaction in Blended E-learning System and its Impact to Learning of Non-native English Students (Melvin Ballera – Libya) 232 - Development of Sustainable Key Performance Indicator (KPI) Monitoring and Control System Using Viable System Model (Sani Suleiman Isah – Nigeria) Neural Networks 170 - Optimising Insurance Fraud Detection and Classification of Vehicle Accident Damange by Using Neural Networks to Identify Patterns in Behaviour, Liked Cases and Vehicle Recognition. (Emma-Jane Phillips - UK) 296 - Semi-Fluid: Implementing A High Speed Content Distribution Model for Peer-TO-Peer Overlay Network (Mousa Al Falayleh – UAE) Session 3 Jan. 31, 2013 (Thursday) Title Wireless Networks Room Time Chair A 9:15- 11:15 Mr. Yousuf Akbari 152 - Applying Intelligent Agents in Wireless Sensor Networks as Base Stations (Mohammad Ali Kianifar – UAE) 217 - Effect of Space in an Adhoc Network (Mozmin Ahmed – India) 192 - Bandwidth Optimization Through Real Time Audio/Video Codec Switching By Using IMS (Amir Rashid Chaudhary – UK) Special session on remote sensing B 9:15- 11:15 Mr. Peiman Haghighat C 9:15- 11:15 Dr. Tawfik Saeed Zeki 132 - Reliability Evaluation of Multi-source Multi-sink Stochastic-flow Networks under Quickest Path and System Capacity Constraints ( Moatamad Hassan - KSA ) 250 - A Roll of GUI (Graphical User Interface) Observed in Hollywood Blockbuster Film (Jinhwan Yu – South Korea) 121 - Websites and Webpages Creditbility and Trust Evaluation (Yahya Tashtoush – Jordan) Multimedia Network Security 223 - Verification of Statistical Properties for Hyperspectral Images: Heteroscedasticity and Non-stationarity (Jihao Yin – China) 143 - Inter-Layer Sharing of Backup Path Capacities Providing Fast Service Recovery in IpMpls/Wdm Networks ( Jacek Rak - Poland ) 207 - Change Detection for Sustainability Monitoring Using Satellite Remote Sensing Data (X. Jia – Australia) 157 - Pooled Methodology for Combating Primary User Emulation Attack in Cognitive Radio Networks (Mufliha Kamran – Pakistan) 301 - Defence in-depth for Cyber Security With Custom Anti-Virus Signature Definition (Karim Ouazzane – UK) 205 - Spatial Subspace Clustering for Hyperspectral Data Segmentation (Yi Guo – Australia) 178 - Density Propagation Based Particle Filter Algorithm for Video Object Tracking ( Zexin Lin – China ) 315 - Current Threats of Wireless Networks (Mardiana Mohamad Noor – Malaysia) *137 - SOFL Three-Step Approach to Construct The Formal Specification of A Brain Tumor Treatment System (A Rahman Mat – Malaysia) 216 - Ultra-Low Complexity Control for AdHoc Mobile Sensor Networks (Matthias Scheutz - USA) Session 4 Jan. 31, 2013 (Thursday) Title Room Time Chair Signal Processing A 11:30 – 1:30 Mr. Yousuf Akbari Data Mining B 11:30 – 1:30 Dr. Tawfik Saeed Zeki Image Processing C 11:30 – 1:30 Dr. Navid Hashemitaba 281 - A New Virtualization-Based Security Architecture in A Cloud Computing Environment (Soha Zaghloul – KSA) 274 - Database Optimization for Large-Scale Web Access Log Management (Minjae Lee Korea, Republic Of) 312 - Glare Region Detection in Night Scene Using Multi-Layering (Chil-Suk Cho - Korea, Republic Of) 241 - A Modified Method of Information Hiding Based on Hybrid Cryptography and Steganography (Fadhil Salman Abed – Iraq) 222 - A Novel Semantic Search Technique Using Ontology (Mahnaz Khani – Iran) 299 Error Modeling of Depth Measurement Using Fir Stereo Camera Systems (Jun Ho Oh - Korea, Republic Of) 291 - Performance Analysis Under Imperfect Channel State Information and Inter-Cell Interference in LTE-Advanced System (Dong-il Lee - Korea, Republic Of) 153 - Tunable Current-Mode Tow-Thomas Biquad Based on CDTAs (Muhammed Ibrahim - Iraq) 297 LTE Handset RF Power Consumption Emulation (Deogratius Musiige – Denmark) 180 - Performance Evaluation of MC-CDMA System Using Delta Modulation in Ultra Wide Band Channel (Akhil V. Gite – India) 302 - A Hybrid Method with Confusion Network for Indexing Spoken Documents (Bendib Issam – Algeria) 261 - Real Life Pilot Solution with Artificial Intelligence for Disabled Computer Users (Markson Aigbodi – UK) 295 - Comparative Studies of Artificial Intelligence (AI) Techniques (Lubabatu Sada Sodangi – Nigeria) 305 - Prediction of Istanbul Stock Exchange (ISE) Direction Based on News Articles (Hakan Gunduz – Turkey) 283 - A Study on Providing Natural Twohanded Interaction Using a Hybrid Camera (Junyeong Choi - Korea, Republic Of) 311 - Fast Stereo Image Rectification Using Mobile GPU (Jungsik Park - Korea, Republic Of) 287 - Fast Generation of Digital Video Holograms Using a Spatio-Temporal Sampling Scheme and GPUs (Joongseok Song - Korea, Republic Of) 197 - Scheduling Techniques for Parallel Implementation of Wear Particle Recognition Algorithms (Mohammad Laghari – UAE) 120- Guarding Simple Polygons with Semiopen Edge Guards (Godfried Toussaint – UAE) – from image processing Ontology 179 - Legistical Efforts by E-Government (Wolfgang Kahlig – Austria) 257 - ONTOCARER: An Ontological Framework for Assistive Agents for The Disabled (Vassil Vassilev - UK) Session 5 Jan. 31, 2013 (Thursday) Title Room Time Chair Cloud Computing B 2:45 – 4:45 Mr. Peiman Haghighat Miscellaneous topics C 2:45 – 4:45 Ms. Farah Ansari 206 - Convergence of Cloud Computing, Service Oriented Architecture and Enterprise Architecture (Susan Sutherland –Australia) 298 - Design and Implementation of Cache Manager for Hybrid Storage ( Seongjin Lee - Korea, Republic Of ) 308 - A Swot Analysis on CISCO® High Availability Virtualization Clusters Disaster Recovery Plan (Eman Al-Harbi - KSA) 289 - The Use of the Aspect Oriented Programming (AOP) Paradigm in Discrete Event Simulation Domain: Overview and Perspectives (Meriem Chibani – Algeria) 247 - Healthcare Applications on Mobile Cloud Computing (Wahidah Husain – Malaysia) 161 - A New Test Process for SOA by Deploying ISTQB Framework (Reza Kianyzadeh – UAE) 145 - Cloud Computing Services in Mobile Devices Using Android Face Detector API and Rest Communication (Riri Fitri Sari – Indonesia) 271 - A New Architecture of an Autonomous System in Cloud Computing (Soha Zaghloul - KSA) 273 - Analysis of SaaS Multi-Tenant Database in A Cloud Environment (Soha Zaghloul – KSA) E-Commerce 105 - Location-based Mobile Advertising: A Step Towards Mobile Commerce in Developing World (Suleiman Almasri – KSA) 263 - Optimizing and Improvement Performance of Dual Band CPW-fed Monopole Antenna (Nafaa M. Shebani – Libya) 264 - Simulation and Analysis of Path Loss Models for WiMax Communication System (Nafaa M. Shebani – Libya) 203 - When Churn Happens in A Middle East Telecom Operator (Orlando Belo – Portugal) 149 - Enhancement and Performance Analysis on Dutta and Chaudhuri Color Edge Detection Algorithm In RGB Color Space (Mohamed Almadhoun – Palestine) 212- Migration of Legacy Systems to Service Oriented Architecture ( Wafa souiou- Algeria)