Monday December 16th, 2002 | |
08:00 – 09:00 | Registration@ Ibn Khaldoun Conference Hall, University of Qatar
|
09:00 – 11:00 | Opening Ceremony & Reception @ Ibn Khaldoun Conference Hall |
11:00 – 11:30 | Coffee Break @ Ibn Khaldoun Conference Hall
|
11:30 – 12:00 | Technical Presentation @ Ibn Khaldoun Conference Hall Title: Wide Area Workflow Speaker: Mongi Gazelle, Gazelle Information Technology, Germany
|
| |
12:00 – 12:30 | IT Exhibition @ University Exhibition Hall |
12:30 – 13:30 | University Tour |
14:00 – 16:00 | Lunch @ Sheraton Hotel Hosted By: His Excellency the President of the University of Qatar |
19:00 – 20:00 | Keynote Speech@ Palm Tree Island Title: Recent Trends in Information & Telecommunications Technology Keynote Speaker: Prof. Mohammad S. Obaidat |
20:30 – 22:00 | Dinner@ Palm Tree Island Hosted By: QAFCO |
Tuesday December 17th, 2002 | |
09:00 – 10:00 | Keynote Speech @ Ibn Khaldoun Conference Hall, University of Qatar Title: Fuzzy Logic Network for Genetic Networking Keynote Speaker: Prof. Paul Wang
|
| |
10:00 – 10:30 | Coffee Break |
| |
10:30 – 12:30 | Four Parallel Sessions Session A1: Artificial Intelligence, Expert Systems & Neural Networks
Appropriate Lemmae Discovery The Irrelevancy and Its Impact on the Clause Space of the Resolution-Based Theorem Prover Support Vector Machines for Wind Speed Prediction A Case Based Reasoning Framework for Domain Specific Search Engines
A Genetic-Based Approach for Satisfiability Problems A Fuzzy Logic (Filter for Tracking a maneuvering Target
A Symbolic-Based Model for Handling Muanced Information
Genetic-Based Number Recognition System Development of Knowledge Based Expert System for Online Monitoring Anomalies in Drive Systems Ali S. Hennache & Mohammad Al-Nais
Session B1:
Efficient Routing Algorithm on the OTIS-Networks
Using Modified Fast Walsh Transform (MFWT) to Accommodate Increasing Data Rate of IEEE 802.11b PHY WLAN to 22 Mbps
A Complete Optimal Symbolic Analyzer for the Analysis of Large Lumped and Distributed Networks
Congestion Avoidance and Explicit Allowed Rate for Transmitting Integrated Services over ATM Networks
The IEEE 802.11X Network Protocol: Merits and Pitfalls
Load Migration Towards Enhancing Availability
Power Optimization for Wireless Network Using Variable Power Levels
Designing for Mobile Environment Coverage and Delay Spread Measurements
Improved Layered Network Estimators for Transmission Channel Equalization Session C1: Al-Quds Web-Based Electronic Course
Using XML and Search Part Model to Sign a Contract by Internet E-Learning Technology Framework: Building an Object Oriented Model for E-Learning Applications Henda Chorfi & Mohamed Jemni
The Characteristics & Attitudes of Distance Education Students in Jordan: An Empirical Study
Performance Comparison of Apache and Microsoft IIS Web Server
Building Scalable E-Commerce Solutions
An Internet Search Engine with Term Ponderation
Plugging Software Tools in the Existing E-Learning Portals
Session D1: Inquiry Methods for Virus Identification
Interval-Based Testing for Spreadsheets
Fault Tolerant Multilayer Perceptron on 1-D Mesh
Secret Data Hiding in Wave Media File
Application of Object Oriented Software Quality Metrics to Measure the TPS System
An Empirical Study Using a Software Reuse Reference Model to Compare Small and Large Development Organizations
S. I. A. R. R. S: System Intelligent of Help to the Resolution of the Spatial Tool of Regional Scheduling Attended by Computer
Understanding Object-Oriented Class Libraries
Development a Software Test Strategy Based on Error Analysis
Modeling Process Using RAD and UML Activity Diagrams: an Exploratory Study
|
| |
10:30 – 11:30 | Two Parallel Technical Sessions iMATS: An Internet-Based Mobile Agent Trading System
Practices of Facilitating Effective Learning in a Virtual University
I-VOTE: A Secure Java Web-Based Online Voting System
Optimal Placement of Proxies in the Web with Capacity Constraints
Development of Customer Support Application for Engraved Furniture Design Regional Internet Exchange in MENA Countries Performance Evaluation Web intrusion Detection Using RIPEMD-160
Development of E-Learning Course in Physiological Measurements Using WebCT
Consistency problems in ER-Schemas for Database Systems
Cryptographic Applications in Database Security: A Survey Study
A strategy for Semantic Integrity Maintenace for Parallel Relational Database Systems Technical Session 2: Feature Contents Study in Arabic Numerals by Using Combined Neural Network Recognition Model
Connection-Field Behavior of Brain Modeling and Human Intelligence Power
Classification of Ventricular Ectopic Beats (VEB’s) Using Neural Networks
A Hybrid Rule Based Fuzzy-Neural Expert System for Passive Network Monitoring
Neurofuzzy Scheduling of Fieldbus Systems
An Application of Mobile Agent for Association Rule Mining
Short- Term Weather Forecasting Using Input-Data Function Reasoning Approach with Interaction of Different Atmosphere Layer Effect
The High Flexibility and Stability of Flexible Neural Network Controllers Medical Image Interpretation by Fuzzy Neural Networks and Expert System
|
| |
12:30 – 13:00 | Coffee Break |
13:00 – 14:00 | Technical Session 3:
Bandwidth Space Allocation Algorithm in ATM Networks
Turbo Trellis Coded Modulation Using MQAM
Text Compression Using Hybrids of BWT and GBAM
A Fast Algorithm for Layered Network Data Detectors
A single-Step Task Scheduling Algorithm for Parallel Computers with Bounded Number of Processor
An Effective Model For ISUP & SIP Mapping
Integration of SNMP and Jini for Mobile Network Management Performance Evaluation of Soft Handoff Strategies for Finite Buffer CDMA Cellular Networks
Packet Filtering Personal Firewall Based on Microsoft Internet Protocol Helper API
SnifferWall: An Integrated Sniffer Detector
|
13:00 – 14:00 | Three Parallel Sessions Session E: Multimedia, IT & Society, & Human Computer Interface
Research Initiatives at Zayed University on Software Agents in the Wireless World
Information Technology in the Arab Society: the Case of Egypt - the Socio-Cultural Contexts and the Concept of Digital Divide
Comparing Family of Fair Queuing Scheduling Algorithms for Multimedia Operating Systems
Empirical Test of An Application Service Provider Adoption Model
The Role of Network Delay on Tele-Training in Shared Haptic Virtual Environment
Session F: Evaluating Security Needs in Jini-Based Decision Support Systems
New Concurrent B-Tree Algorithms for Centralized Database Management Systems
Evaluation of New Information Technology: An Empirical Study
An Advice Unit for Forward Housing Planning (LHS)
A Multi-Level Conceptual Data Reduction Approach Based on the Lukasiewcz Implication
Session G: Comparative Analysis of Probability and Unsafety Vectors Routing Algorithm in K-Ary n-Cubes
Computer Simulation of the Relaxed Static Stable Fighter of F-16 Using Numerical Algorithms
A New Algorithms for Analysis of Verbal Information Based on Fuzzy-Logic
A Study on Centres of Chordal Graphs
A comparative Study of RTRL Algorithm and DEKF Approach for Training Recurrent Multilayer Perceptrons
|
| |
14:30 – 16:30 | Lunch @ Intercontinental Hotel Hosted By: QAFAC
|
17:00 – 18:00 | Trip to Sealine Beach |
18:00 – 19:00 | Keynote Speech @ Sealine Beach Title: Strategic Evolution of Enterprise Computing with Wireless Internet Platforms |
19:00 – 21:00 | Dinner@ Sealine Beach Hosted By: QatarGas |
Wednesday December 18th, 2000 | |
09:00 – 10:00 | Keynote Speech@ Ibn Khaldoun Conference Hall, University of Qatar Title: Notebook and Wireless LAN SED for Postgraduate Learning Keynote Speaker: Prof. Johann Guenther
|
10:00 – 10:30 | Coffee Break
|
10:30 – 12:30 | Four Parallel Sessions Session A2: Image Processing
Comparison of Moment Invariant Technique with new Proposed Feature Vector for Complex Image Matching
An Algorithm for Scene Cut from MPEG-1 Video Streams Fingerprint Recognition Technique Using Wavelet Transform Parallelization of Image Compression and Decompression Algorithm Based on ID Wavelet Transformation Investigating a Hybrid Technique for Medical Image Segmentation Intelligent Motion Detection and Tracking System Deformation Images with Shearing Invariants Digital Image Processing to Extract Information, Case Study from the State of Qatar A New Image Retrieval Scheme Based on the IC-VQ Compressed Images Robust and Invariant DFT Image Watermark: A new Approach Using Moments Invariant Session B2: Design of a Nibble-Size Ripple-Carry Adder for (-1+j)-Base Complex binary Numbers
Towards Scalable Collective Communication for Multicomputer Interconnection Networks
Rewriting Logic for Verification of Piplined Microprocessors
Feasibility Study of Dynamic Programmable Cache (DPC)
Reliability and Yield Enhancement of Array processors (Part I)
Reliability and Yield Enhancement of Array processors (Part II)
The Impact of Prefetching Policy on the Performance of Parallel Computer Graphics Algorithms
Beware of the Next Generation of Malicious Agents Performance of Complementary Code Keying (CCK) Modulation Scheme for IEEE 802.11b Wireless Local Area Networks (WLAN) in Gaussian Noise Channel
The Minimum Number of Links-Based Routing Strategy in ATM Networks (MNL)
Neural Networks in Network Security Session C2: On Combining Artificial Neural Networks into an HMM Arabic Speech Word Recognizer
Open Domain Question Answering System for Arabic
Improved Algorithm for Extracting Trilateral Arabic Root Bottom-Up Chart Parser for Arabic Sentences
Verification-Based Algorithms for Integer Programming and Genetic Algorithm
Data Discretization for Mining Association Rules
Genetic Algorithm Based Image Segmentation
Lagrangian Support Vector Machines for Phoneme Classification
Application of Fuzzy Logic to the Estimation of the Parameters of a Yeast Fermentation Processes
Session D2:
Parallelization of IBD Computation for determining Genetic Disease Map
Development of a Multi-Resolution Framework for NUBS
Wavelet Analysis of Harmonic Signal in Noisy Environment: Application to Industrial Plant Data
File Access Permission Change Detection Using Immunological Negative Selection Approach Computer Simulator for Teaching Assembly Language and Computer Organization to IT
Performance Comparison between the Paxos and Chandra-Toueg Consnsus Algorithms
Conceptual Cooperative Information Retrieval system
|
11:30 – 12:30 | Three Parallel Technical Sessions Syllable Based Labeling for Continuous Arabic Speech Recognition
ABJAD: An Offline Arabic Handwritten Recognition System
Arabic Handwitten Words Recognition
A parametric Approach for Arabic Speech Recognition Using Hidden Markov Models
Developing a Parser for a Design Pattern Specification Language Using A Java-Based Parser Generator
Region Segmentation and Splitting of Bio-Medical Objects by Border Identification Technique
Double Transform Contour Compression Automatic Retrieval and Summary of Internet Information by Means of Multi-Agent Architectures
Finding Silhouette Edges for 3D Terrain Skecthing
An Approach for Constructing Complex Discriminating Surfaces Based on Bayesian Inference of the Maximum Entropy
Technical Session 5: Invisible Interface for Mentoring User
REO2 Pt: An Optimal Tool for Understanding Object Oriented Program Software Development Tools and Executive Kernel Design for programmable Logic Controllers Demonic Semantics by Monotypes Theoretical Validation of Cohesion Metrics in Object oriented Systems Object-Oriented Frameworks: An Enabling Technology for Software Reuse An Algorithm for Computing the intersection between Two 3D Circular Disks in Closed-Forms Object Oriented Program Test Case Generation Using Hierarchical Coloured Petri Nets Embedding of Cycles into Arbitrary Trees
Technical Session 6: Micro-Code Generation for Rom-Based Controllers within a High-Level Synthesis Environment
The Design of the PANDA Intermediate Format
Task Dispatching for Parallel Vector Processors Inventory Control Network Management Using Material Required Planning (MRP)
Computer Simulation of Fully Developed Channel Flow and Validation of a Parallel Code
Indoor Mobile robot Local Path Planner with Trajectory Tracking
Cost-effective Formulation of a Finite-Element Model for Atmospheric Dispersion of Dense Gases
Collective Adaptation of Heterogeneous Communicating Multi Robot System
Flexible Design Method of Programmable Filter Using OrCAD Created Library Module
A Parallel Split-Step Fourier Method for the Coupled Nonlinear Schrodinger Equation
|
12:30 – 13:00 | Coffee Break |
13:00 – 14:00 | Closing Session
|
14:30 – 16:30 | Lunch @ Marriott Hotel Hosted By: QAPCO
|
19:00 – 20:00 | Keynote Speech @ Doha Club Title: Case-based Reasoning Technology Keynote Speaker: Prof. Abdel-Badeeh M. Salem
|
20:30 – 22:30 | Dinner @ Doha Club |
Thursday December 19th, 2002 | |
09:00 – 14:00 | Trip to RasLaffan Industrial City |
14:30 – 16:30 | Lunch @ RasLaffan Industrial City |
Conference program
Published in
Iajit
Share