Conference Program

Tuesday, December 6, 2005

09:00 - 10:00              Registration
10:00 - 11:00              Opening Ceremony
11:00 - 11:30              Coffee Break
11:30 - 13:30              Keynote Speech "eHealth and Telemedicine: the ICT
                                      Revolution in Healthcare" by Prof. Ewart Carson   

13:30 - 15:00              Lunch

Sessions

 

D1EA: D1EB: D1EC:  

 

AI & Expert SystemsRoomSoftware EngineeringRoomThe Internet and the WebRoom
 

  15:00-15:20

 

 

48. Fuzzy Based Approach to Intelligent Game Design413946. Package Development for Wireless Communication Systems4137188. Towards Mining Association Rules from Complex Structured XML4142
      
Adnan Shaout, Brady King, and Luke Reisner Manar Younis Ahmed Kashmola and Bayez K. Al-Sulaiyfanie Fatma Helmy Ismail, Hoda Kourashi, Mona ismail, and Islam El-Maddah 
      
 
 

  15:20-15:40

 

 

15. Genetic Algorithm for Compressing Sound Data4139192. A Framework For Sales Force Automation Domain4137155. Fault Tolerance of Mobile Agent4142
      
Mohammed Abbas Fadhel Al-Husainy Lily Suryani Safie and Lee Sai Peck Imane Aly Saroit Ismail and Amal Moh. Barakat Al-Dweik 
      

 

 

  15:40-16:00

 

 

40. Designing Digital Electronic Circuits by Evolutionary GA4139146. Separation Of Concurrency Models Using Languages Embeddings4137106. The Development of a Web Based Assignment Management Prototype4142
      
Safa Amir Najim Al-salahi Youcef Hammal Mee Chin Wee and Zaitun A. B  
      

 

 

  16:00-16:20

 

 

64. On Ant Colony Optimization and its New Directions4139103. Guiding Design Pattern Reuse4137159. Composition of Semantic Web Services : A User’s Query Reformulation-Based
Approach
4142
      
Alaa E Aljanaby, Ku Ruhana Ku Mahamud, and Norita Md. Norwawi Nadia Bouassida and Hanene Ben abdallah Temglit, Aliane, and Ahmed Nacer  
      

 

 

  16:20-16:40

 

 

163. Qeamsa: A Quantum Evolutionary Framework for Multiple Sequence Alignment4139110. Retro Design and UML Modeling by Machine Learning4137143. The Role of Using Internet in Medical Researches4142
      
Souham Meshoul, Abdesselam Layeb, and Mohamed Batouche Chérifa Boudia, Baghdad Atmani, and Bouziane Beldjilali Zainab Tahir Al-Bayati  
      

 

 

  16:40-17:00

 

 

    184. Reorganizing Dynamic Information Resources in the Complex Web4142
      
    Amjad Rattrout, Maya Rupert, and Salima Hassas 
      

 

19:00-20:30        Dinner

 

Wednesday, December 7, 2005

 

09:00-11:00        Keynote Speech - "The Impact of Computers on the
                              Formalisation and Study of Language" Faculty of Science
                              and IT Auditorium by Prof. Fairouz Kamareddine

11:00 - 11:30      Coffee Break

 

Sessions

 

D2MA: D2MB: D2MC:  

 

Arabic Language ProcessingRoomSoftware EngineeringRoomInformation SecurityRoom
 

  11:30-11:50

 

 

114. Algorithms for the Recognition of the Connected Arab Digits based on continuous Hidden Markov Models4139178. The Design of a Complex Software System by Assembling Component with
ArchJava
4137  
      
S. Atoui and M.Bedda Bennouar, Khammaci, and Henni   
      

 

 

  11:50-12:10

 

 

39. Arabic Writer-Identification from Handwriting Images4139145. Criterion for Target Confirmation of Vep in Single Trial Through Channel
Corralation Method
4137176. An Adaptive Proxy Pre-fetch Scheme for a Consistent SMIL Presentation4142
      
Laheeb Mohammad Al-Zoubaidy and Hanaa Fathee Al-Najar S.Andrews, Nidal Kamel, and David Ngo A.Abdelli and N.Badache 
      

 

 

  12:10-12:30

 

 

209. Arabic Voice Recognition Prototype Using Neural Network4139208. Multi-Agent Workflow "An Approach Based on the Ontology of Service"413716. Hiding a 256 Color Image in True Type Image4142
      
Al-Adhaileh Mosleh H. and Natshah Tasneem Zakaria Elberrichi, Maamar Khater, and Mimoun Malki Lala Zareh Krikor, Mahmoud Yousef Al-Kurdi, and Sami E. I. Baba 
      

 

 

  12:30-12:50

 

 

170. Wavelet Transform and Fuzzy Approach in the Recognition of Arabic Characters4139139. Modular Implementation of Aspectual Requirements413734. Data Security Based on Neural Networks4142
      
Nadia Ben Amor and Najoua Essoukri Ben Amara Amirat Abdelkrim and Laskri Mohamed Tayeb  Hamid Abdullah Jalab, Hamid A.Jalab, and Khaled M. G.Noaman 
      

 

 

  12:50-13:10

 

 

141. Recognizing Isolated Handwritten Arabic Characters Using Hybrid of Modified Directional Element Feature and General Autoassociative Memory4139148. Graphical Notations for Standard QoS Modeling Elements413725. A Suggestion for Protecting E-mail in e-Government Applications4142
      
Amer AL-Nassiri Sameera Abughalyoon and Rashid Jayousi Alaa Hussain Al-hamami and Saad A Al-Anni 
      

 

 

  13:10-13:30

 

 

186. Arabic Speech Synthesis by Concatenation of Speech Units Using MAP4139162. Requirements Management Measures4137167. Verification and Analysis of Security Protocols Using Colored Petri Nets4142
      
Barakeh Jaber, Fatina Abu Gharbieh, and Hanna Abdel Nour Mahmoud Ali Khraiwesh and Asim El Sheikh Salah A. Aly and Hani Abu-Salem 
      

 

13:30-15:00        Lunch

 

Sessions

 

D2EA: D2EB: D2EC:  

 

Arabic Language Processing

Image Processing

Room

Software Engineering

Information Systems

Room

e-commerce

e-learning

Room
 

  15:00-15:20

 

 

93. Using the Brill Part of Speech Tagger for Modern Standard Arabic4139201. SQLFlow: PL/SQL Multi-Diagrammatic Source Code Visualization4137187. Global Early Flash Worms Detection and Containment System (GEDC)4142
      
Massaoud Abuzed and Mohamed Arteimi Samir Tartir and Ayman Issa Manal Tamimi and Badie Sartawi 
      

 

 

  15:20-15:40

 

 

88. Arabic Part-of-Speech Tagger Based Neural Networks4139173. GKIN: A Graphical User Interface for KINSOLVER4137  
      
Jabar Hassan Yousif and Tengku M. Tengku Leonidas Deligiannidis, Thiab R. Taha, Boanerges Aleman-Meza, Yihai Yu, and H.-B. Sch   
      

 

 

  15:40-16:00

 

 

35. An Edge-Based Method for Machine Printed Arabic Character Recognition413980.Query Expansion for Arabic Information Retrieval in the Legal Domain413775. Networks Security: Risk Management and Economics in Information Technology4142
      
Abbas H. Hassin Soraya Zaidi and Mohamed Tayeb Laskri Nicolas Sklavos, Panagiwtis Souras, and Abdoul Rjoub 
      

 

 

  16:00-16:20

 

 

142. Morphometric Appreciation of Mammary Breast Calcifications Around Multiresolution Analysis by Inertia and Frequentiel Factors413983. A Coalition Formation-Based Negotiation Model for the Cooperative Information Systems413771. English Language Content Management System4142
      
Reguieg F. Zohra, Benblidia Nadjia, Guerti Mhania, and Guessoum Abderrezak Bouzidi Sabrina and Zarour Nacereddine Samuel R. J., and Zaitun A. B. 
      

 

 

  16:20-16:40

 

 

49. Face Recognition System Using SVD and Neural Network4139189. Automatic Term Extraction Using Statistical Techniques- A Comparative In-Depth Study & Applications413770. Mobile Learning Applications in Wieless Classrooms4142
      
Othman O. Khalifa, Yuslina Binti Kamarudin, and Thaaherah Shireen Yousef W. Sabbah and Yousef Abuzir  Devinder Singh and Zaitun A. B. 
      

 

 

  16:40-17:00

 

 

206. Visual Transformation of Image into another Based on Morphing Method413996. Boolean Query Optimization Using Genetic Algorithms and Fuzzy Theorm4137  
      
Huda Abdul Al-Alee al-Amawee Suhail Sami Jebour Owais, Pavel Kromer, and Vaclav Snasel   
      

 

19:00-20:30        Dinner

 

Thursday, December 8, 2005

09:00-11:00        Keynote Speech - "Is Discovery Informatics is a Methodology or
                              an Ontology?" by
Professor Hani Mahdi 

11:00-11:30        Coffee Break

 

Sessions

 

D3MA: D3MB: D3MC:  

 

Image ProcessingRoom

Databases

Geographic Information Systems

Room

Computer Networks

Room
 

  11:30-11:50

 

 

191. "Nothing is Fool Proof in Biometric Security"4139111. Identification of Biological Data Issues and Challenges Through Real World Examples4137175. On the Self-Similar Nature of ATM Network Traffic4142
      
Sivakumar Syed Muhammad Ahsan and Abad Ali Shah Humam Elagha 
      

 

 

  11:50-12:10

 

 

84. A Heuristic Method for Malaria Detection4139169. Designing Data Mart Schema from Real World Entities4137190. Dynamic Load Balancing for Beowulf Clusters4142
      
Ali Al-Hamdi, Sami Alboukhaiti, and Basim Alfaquih Jamel Feki and Hanêne Ben-Abdallah Belabbas Yagoubi 
      

 

 

  12:10-12:30

 

 

198. Predator Prey Optimizer for Unsupervised Clustering in Image Segmentation413957. FOODS: Object Oreinted Framework for Distributed File System4137153. Distributed Real Time Tasks in MANETs4142
      
Salima Nabti, Souham Meshoul, and Mohamed Batouche Radwan F. Qasrawi and Badie Sartawi Adnan Shaout and Sarah Sikandar 
      

 

 

  12:30-12:50

 

 

101. Autonomous Agents-Based Approach for Color Image Segmentation413976. GIS for the Management and the Follow-up of the Landslides of the Constantine City4137127. DSP Implementation of Enhanced Multistage Detector with Parallel Interference Cancellation for DS-CDMA System4142
      
Ouadfel Salima and Batouche Mohamed Mohamed-Khireddine KHOLLADI Sedki bakir al-abdally and Bayez K. Al-Sulaifanie 
      

 

 

  12:50-13:10

 

 

137. PDE-Based Image Sharpening in the Presence of Noise4139120.  معالجة وتحليل قاعدة البيانات في نظم المعلومات الجغرافية  413765. A Fuzzy-Based Routes Lifetime Estimation for Ad-hoc Networks4142
      
Salim Bettahar and Amine Boudghene Stambouli Ali Abd Al-azawy Essam Natsheh, Sabira Khatun, and Adznan Jantan 
      

 

 

  13:10-13:30

 

 

36. Moving Object Tracking with an Active Camera Using Improved One at a time algorithm (OTA)413972. The Development of an Online SVG Based Point Map Animation Server4137164. Prediction of Retention Parameters Using Artificial Neural Network and Topological Indices4142
      
Faisel Ghazee Mohamed, Nabeel Jameel Tawfiq, and Wijdan Abdul Ameer Phua Yeong Tsan, and Zaitun A. B. Soumaya Batouche, Abdelhak Gheid, and Nacer Rebbani 
      

 

 

  13:30-13:50

 

 

    140. Grid Computing Services Implementation4142
      
    Sultan Salim AL-Yahyai and Abderezak Touzene 
      

 

13:50-15:00        Lunch

 

Sessions

 

D3EA: D3EB: D3EC:  

 

Pattern Recognition

Room

Algorithms and Applications

Image Processing

Room

Digital Telecommunications

Room
 

  15:20-15:40

 

 

30. A Segmentation Technique to Handwritten Word Recognition4139113. Need for Cooperation between Academia and Industry in Developing Countries4137166. Efficient Replication Techniques for Mobile Database4142
      
Mohamed Senouci, Abdelkarim Liazid, and Hadj Ali Beghdadi Syed Muhammad Ahsan and Abad Ali Shah Ziyad.T.Abdul-Mehdi, Ali Bin Mamat, Hamidah Ibrahim, and Mustafa Mat Dirs  
      

 

 

  15:40-16:00

 

 

204. Hybrid Technique to Enhance Voice Command for a Wheelchair413952. An Efficient Algorithm for Checking Path Existence Between Graph Vertices413768. Voice Transformation for Very Low Bit Rate Speech Coders4142
      
Mohamed Fezari, Mounir Bousbia-Salah, and Mouldi Bedda Nabil Arman Dalia Ribhi Kalouti, Omimah Radwan Silmi, and Hanna Abdel Nour 
      

 

 

  16:00-16:20

 

 

99. Design of a Voice Command System for an Electric Wheelchair4139100. Non-Atomicity in Timed Models4137185. VoIP Data Rate Reduction Using Linear Prediction Coefficients Redundancy4142
      
Mohamed Fezari, Mounir Bousbia-Salah, and Mouldi Bedda Nabil Belala and Djamel-Eddine Saïdouni Islam Y. Amro and Hanna Abdel Nour 
      

 

 

  16:20-16:40

 

 

195. Planar Hidden Markov/ Neural Networks Modelling for Off-Line Signature Verification413981. Assessment of Diabetic Retinopathy by Automatic Detecting of Pathological Patterns413786. Fast Pursuit of Mobile Nodes in Road Networks4142
      
Imen Abroug Ben Abdelghani, Amina Ghardallou Lasmar, and Najoua Essoukri Ben Amara Benblidia Nadjia, Reguieg Fatma Zohra, and Guessoum Abderrezak Sahar Idwan and Dinesh Mehta 
      

 

 

  16:40-17:00

 

 

199. Writer Identification Using SVM Classifier and Genetic Algorithm for Optimal Futures Selection4139135. Flame Recognition and Finding its Center in Digital Color Images413789. Mobility and Wireless MAC Protocols in MANETs4142
      
Sami Gazzah and Najoua Essoukri Ben Amara Khalil I. Alsaif and luma Akram Djemel Djenouri, Mohamed Bouznada, and Faten Khiat  
      

 

17:00-18:00        Closing Session

19:00-20:30        Dinner

 

Friday, December 9, 2005

 

Read 7638 times Last modified on Wednesday, 14 October 2015 08:14
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…