INNOVATIONS IN
INFORMATION TECHNOLOGY NOVEMBER 19-21,
2006 Jumeirah Beach Hotel, PROGRAM |
|||
SUNDAY NOVEMBER 19 |
|||
08:00-10:00 Registration |
|||
10:00-11:15 Welcome and Opening Ceremony |
|||
Opening Speech |
HH
Sheikh Maktoum bin Mohammed bin Rashid Al Maktoum Chairman
of the |
||
Keynote Speech 1 |
Bill Thomas |
Executive Vice President, EDS |
Unlocking the Transformational
Power of IT |
Keynote Speech 2 |
Peter Freeman |
Assistant Director of National
Science Foundation (NSF) |
The Innovation Eco-system and
Economic Development |
11:15-11:30 Break |
|||
11:30-12:30 Discussion Panel |
|||
Topic |
Technology Production in the |
||
Members |
Mohamed Baka (IT Advisor to the Chairman, ADWEA),
Peter Freeman (Assistant Director of National Science Foundation),
Bill Thomans (Executive Vice President, EDS), Hanns Windele (Vice
President Europe, Mentor Graphics), Yervant Zorian (Vice President and
Chief Scientist, Virage Logic; Vice President, IEEE Computer Society) and
Mitra Jay (Founding Professor of Business Enterprise and Innovation at
the University of Essex) |
||
12:30-14:00
Lunch |
Session 1: 14:00 –
15:40 (Sunday, November 19) |
|||||
Session
1A: Wireless Sensor Networks, Chairs:
Mohsen Guizani, |
|||||
Alexandre |
Caminada |
Universite de Technologie Belfort-Montbeliard |
|
Oumaya
Baala |
Location
Precision in Indoor Positioning System |
Jassim |
Samhan |
|
UAE |
Raed M. Shubair, M.A.Al-Qutayri |
Design
and Implementation of an Adaptive Smart Antenna System |
Mohsin |
Samahi |
|
UAE |
Raed M. Shubair |
Performance
of Smart Antenna Systems for Signal Detection and Estimation in Multipath
Fading Environment |
Hafiz |
Farooq Ahmad |
National |
|
Rabia Iqbal |
Secure
Dynamic Key Management for Sensor Networks |
Iman |
Saleh |
Virginia Tech |
|
Hesham
El-Sayed. Mohamed Eltoweissy |
A
Fault Tolerance Management Framework for Wireless Sensor Networks |
Session
1B: Web Technology, Chairs: Soraya Kouadri Moustefaoui, |
|||||
Olivier |
Thiebaut |
|
|
Alan Jones |
A
Web-Service Application for Ubiquitous Response to Emergency Situations in
Hazardous Environments |
Zakir |
Laliwala |
Dhirubhai Ambani |
|
Sanjay
Chaudhary |
Event-Driven
Dynamic Web Services Composition: From Modeling to Implementation |
Elarbi |
Badidi |
|
UAE |
Larbi
Esmah, Adel Serhani, Mohamed Elkoutbi |
WS-QoSM:
A Broker-based Architecture for Web Services QoS Management |
M. Arguello |
Casteleiro |
|
|
Atif
El-Hasia |
Construction
Knowledge Exchange: a case study of exploiting Semantics for Web Mining |
Hend |
Al-Khalifa |
|
|
Hugh C.
Davis |
Measuring
the Semantic Value of Folksonomies |
Session 1C: Knowledge Management 1,
Chairs: Zoheir Ezziane, |
|||||
Khalid |
Al-Mabrouk |
|
|
|
Critical Success Factors Affecting
Knowledge Management Adoption: A Review of the Literature |
Kenneth A. |
Grant |
|
|
Umair Quereshi |
Knowledge Management Systems -- Why
So Many Failures? |
Piers |
|
|
UAE |
Ken Adamson |
Towards DSS: Enhancing Domain
Knowledge through Knowledge Discovery |
Khalid |
Al-Mabrouk |
|
|
Jeffrey Soar |
Identification of Major Issues for
Successful IT Transfer in the Arab World: The Preliminary Results |
Bashar |
Al-Rawi |
|
UAE |
Fadi Aloul |
Solving Employee Timetabling
Problems Using Boolean Satisfiability |
Session
1D: Wireless Communications, Chairs: Wathiq Mansour, |
|||||
Amr |
Mohamed Hussein Alnuweiri |
University or |
|
|
Cross-layer
Framework for Rate Allocation in Heterogeneous Wireless Multicast |
Ezedin |
Barka |
|
UAE |
Mohammed
Boulmalf, Amal Alteniji, Hanadi Al Suwaidi, Huda Khazaimy, Meera Al Mansouri |
Impact
of Security on the Performance of Wireless- Local Area Networks |
Camille |
Gaspard |
|
|
Ayman
Kayssi, Ali Chehab |
ODYSSEY:
Policy-Driven Anonymizer for Handheld Wireless Devices Privacy |
Abbas |
Mohammadi |
|
|
Roya E.
Rezagah |
Characterization
of the Scalability of Wireless Ad Hoc Networks under Channel Constraints |
Ahn |
Chang-Juni |
|
|
Satoshi
Takahash, Makoto Taromaru |
Transmit
Sector Selection with Considering the Link Correlation for SDM/OFDM Systems |
15:40-16:00: Break |
Session
2: 16:00-17:40 (Sunday, November 19) |
|||||
Session
2A: Information Systems, Chairs: Hazem El-Khatib, |
|||||
Wail M. |
Omar |
|
|
A.
Taleb-Bendiab |
Defining
An Ontology For E-Health Autonomic Software Services |
Madjid |
Merabti |
|
|
Abir Jaafar
Hussain, Rozaida Ghazali, Dhiya
Al-Jumeily, |
Dynamic
Ridge Polynomial Neural Network for Financial Time Series Prediction |
Bassam |
Ahmad |
|
|
Wail M.
Omar, A. Taleb-Bendiab |
Autonomic
Grid Overlay For Managing Financial Applications |
Fariba |
Shadabi |
|
|
|
Learning
from Ensembles: Using Artificial Neural Network Ensemble for Medical Outcomes
Prediction |
Rob |
MacGregor |
|
|
P.N.
Hyland, C. Harvie and B.C. Lee |
An
Examination of the Driving Forces Behind ICT Adoption in Australian Rural and
Regional Medical Practices |
Session
2B: Telecommunication, Chairs: Khaled Shuaib, |
|||||
Laith Awda |
Kadhim |
UOT |
|
|
Ultrawide
83-nm 3 dB Gain-Band using Raman Amplifiers for WDM Long Distance
Transmission |
Rashida |
Hashim |
|
UAE |
Qassim
Nasir, Saad Harous |
Adaptive
Multi-path QoS Aware Dynamic Source Routing Protocol for |
Mohammad |
Al-Qudah |
|
UAE |
Lami Kaya |
An
Interactive Visual Debugging Tool for Viterbi Trellis Decoding of 2D Codes |
M. |
Alnuaimi |
|
UAE |
K. Shuaib,
|
Performance
Evaluation of IEEE 802.15.4 Physial Layer Using |
|
Alouneh |
|
|
Anjali
Agarwal, Abdeslam En-Nouaary |
A
Novel Approach for Fault Tolerance in MPLS Networks |
Session 2C: Knowledge Management 2,
Chairs: Piers |
|||||
Dalia |
Kriksciuniene |
|
|
Ingrida Sarkiunaite, Virgilijus
Sakalauskas |
Evaluating Return on Computer
Literacy of the |
Beverley |
Hope |
|
UAE |
Sally Dexter |
ICT and Social Capital in the
Knowledge Economy |
Mikko |
Siponen |
|
|
Seppo Pahnila, Adam M. Mahmood |
Factors Influencing to Protection
Motivation and IS Security Policy Compliance |
Ross |
King |
|
|
May Lwin, Ross King, Jerome
Williams |
Privacy, Data Fabrication, and
Knowledge Discovery in Databases |
Amin Milani |
Fard |
|
|
Hoda
Akbari, Mohammad -R. Akbarzadeh -T |
Fuzzy Adaptive Resonance Theory for
Content-Based Data Retrieval |
Session
2D: E-Business 1, Chairs: Habib Al-Assaad, ORACLE and Ramadan S. Ben Amer, EFORS |
|||||
Abass |
Oyindamola |
|
|
Gheorghita Ghinea |
Electronic
Negotiation Frameworks: A Snapshot of the State of The Art |
Yaqoob |
Siyal |
Nanyang Technological University |
|
B |
The
Adoption of E-Commerce by Overseas Sindhis: An Empirical Study |
Lejla |
Vrazalic |
|
|
Rob MacGregor |
Sector
Driven Variations on E-commerce Adoption Barriers in Regional Small
Businesses: An Australian Study |
Heinz |
Kreft |
|
|
Wael Adi |
fairCASH
– A Digital Cash Candidate for the |
Ibrahim |
Mahmoud |
|
UAE |
Jawad
Berri |
Enabling
Cooperative E-Commerce on the Web |
17.40-18.00
Break |
Session
3: 18:00 – 19:40 (Sunday, November 19) |
|||||
Session
3A: Security and Privacy 1, Chairs: Ezedin Barka, |
|||||
Omar |
Khadeer Hussain |
|
|
Elizabeth
Chang, Farookh Khadeer Hussain, C Tharam Dillon |
Towards
Ascertaining Risk in Digital Business EcoSystem Interactions |
Mohammad |
Amir Moulavi |
|
|
Hossein
Parvar |
Secure
Key Management in Hierarchical Group Communication Using Agents |
Adel |
Bouhoula |
Ecole Supérieure des Communications de Tunis |
|
Zoheir
Trabelsi |
Handling
Anomalies in Distributed Firewalls |
Mohammad |
Al-Jarrah |
|
|
Abdel-Karim
R. Tamimi, |
A
Thin Security Layer Protocol Over IP Protocol on TCP/IP Suite for Security
Enhancement |
Mohammed |
Misbahuddin |
|
|
M.H.
Shastri, Nanded, |
A Simple and Efficient Solution to Remote
User Authentication Using Smart cards |
Session
3B: Network Applications, Chairs: Khalid Khawaja, |
|||||
Mohamed |
Kheir |
|
|
Adel
Abdin, Essam Hashish |
An
Extremely Compact UWB Microstrip Annular Ring Filter for Bluetooth
Applications |
Norrozila |
Sulaiman |
|
|
Rolando
Carrasco, Graeme Chester |
Analyzing
the Performance of Voice over Internet Protocol (VoIP) in a 3G network |
Sami |
Habib |
|
|
Mohammad
Gh. Mohammad |
Q8WARE:
Synthesis Tool for Network-on-Chip Applications |
Abderahmane |
Lakas |
|
UAE |
Mohammed
Boulmalf |
Study
of the Effect of Mobility Hand-Over on VoIP over WLAN |
Fisseha |
Mekuria |
GSTIT |
|
Ewan Sutherland |
Future
Networks and Services in Sub-Saharan |
Session
3C: Web Applications, Chair: Adel Serhani, |
|||||
Samhaa |
R.
El-Beltagy |
|
|
Ehab
Abdel-Hamid Mohamed, Salwa El-Gamal |
A
Feature Reduction Technique for Improved Web Page Clustering |
A. Ziad |
Hatahet |
Modelware Inc. |
|
Y.C.
Chehadeh, A. E. Agamy, Mohamed A. Bamakhrama, A. Banawan |
Investigating
Distribution of Data of HTTP Traffic: An Empirical Study |
Hugh |
C. Davis |
|
|
Hend Al-Khalifa |
FolksAnnotation:
A Semantic Metadata Tool for Annotating Learning Resources Using Folksonomies
and Domain Ontologies |
Tse-Ming |
Tsai |
Institute for Information Industry |
|
Chia-Chun
Shih, Seng-cho T. Chou |
Personalized
Blog Recommendation Using Value, Semantic, and Social Model |
Houda |
Nakkach |
University Manouba-ENSI |
|
Naoufel
Kraiem, Henda Ben Ghezala |
Identification
of the Web Services Starting from the Existing Web applications |
|
Kudelka |
|
|
Vaclav
Snasel, Eyas El-Qawasmeh, Ondrej Lehecka |
Internet
Searching Using Web Patterns |
Session
3D: Mobile Applications, Chairs: Jawad Berri, |
|||||
Mohammad |
Shirali-Shahreza |
|
|
Sajad
Shirali-Shahreza |
Preventing
|
Ricardo |
De Oliveira Anido |
|
BRASIL |
Hiata Anderson |
QuickFrame
- A Fast Development Tool for |
Hye Sun |
Lee |
|
|
Bong Gyou
Lee, Lee, Chi Hyung |
Analysis
of the Actual Response Rates in |
Muhammad |
Aiman
Mazlan |
Motorola Multimedia |
|
|
Stress
Test on J2ME Compatible |
Nabil |
Al-Qirim |
|
UAE |
|
Mobile
Commerce Technologies Penetration in Small to Medium-Sized Enterprises in |
20:00- GALA DINNER: CISCO Research Award and
Distinguished Scholar Award |
MONDAY NOVEMBER 20 |
|||||
Session
4: 9:20 – 11:00 (Monday, November 20) |
|||||
Session
4A: Human Computer Interaction, Chair: Naoufel Werghi, |
|||||
M |
Awais |
|
|
S Shamail,
|
Continuous
Arabic Speech Segmentation Using FFT Spectrogram |
Muhammad
Sarwar |
Ehsan |
|
|
Gernot
Kubin |
Frame
Change Ratio: A Measure to Model Short-Time Stationarity of Speech |
Werner
|
Winiwarter |
|
|
|
WETCAT-
Web-Enabled Translation Using Corpus-Based Acquisition of Transfer Rules |
Yuki
|
Arase |
|
|
Takahiro
Hara, Toshiaki Uemukai, Shojiro Nishio |
Nine-Button
Web Browsing System for Cellular Phone Users |
Session
4B: Tutorial 1, Pervasive Computing, Chair: Abdelrahmane Al-Ali, American |
|
Presenter |
Sajal Das,
University Distinguished Scholar Professor. Director, Center for Research in
Wireless Mobility and Networking (CReWMaN), |
Topic |
Smart Environments – Technology, Protocols and Applications |
Session
4C: Software Applications, Chair: Saad Harous, |
|||||
Kee |
Woi Hin |
Motorola
Multimedia |
|
|
Future
Implementation and Integration of Agile Method in Software Development and
Testing |
Toufik
|
Taibi |
|
UAE |
Taieb Mkadmi |
Generating
Java Code from Design Patterns Formalized in BPSL |
Khaled |
Hamdan |
|
UAE |
Hazem El
Khatib, John Moses, Peter Smith |
A
Software Cost Ontology System for Assisting Estimation of Software Project
Effort for Use with Case Based Reasoning |
Mohammed |
El-Korek
|
|
UAE |
Taha
Landolsi, A. R. Al-Ali, Yousel Al-Assef, Rawan Aloul |
Portable
Integrated Multi-Signal Patient Monitoring System |
Sid Ahmed |
Benlazaar
|
|
|
Belbachir
Hafida, Hemerlain Dalila |
Cybernetic
Behavior of the Intelligents Agent ConRaider |
11.00-11.20 Break |
Session
5: 11:20 – 13:00 (Monday, November 20) |
|||
Session
5A: Invited VIP Session: New Generation IT, Chair: Ibrahim Hajj, Dean, |
|||
Muhammad |
Hussain |
VP,
Business Development, IBM |
Innovation
for the 21st Century... |
Mitra |
Jay |
Professor,
|
New
Horizons for Information and Communications Technology: The Entrepreneurial
Perspective |
Ali |
Faramawy |
VP
Europe, Africa & Middle-East, Microsoft |
Enabling
IT for a People Ready Business |
Swami |
Manohar |
President,
PicoPeta |
OpenAlchemy:
An Alternate handheld UI |
Session
5B: Tutorial 1: Pervasive Computing (Con't), Chair: Abdelrahmane Al-Ali, |
|
Presenter |
Sajal Das,
University Distinguished Scholar Professor. Director, Center for Research in
Wireless Mobility and Networking (CReWMaN), |
Topic |
Smart Environments – Technology, Protocols and Applications |
13.00-14:00 Lunch Break |
Session
6: 14:00 – 15:40 (Monday, November 20) |
|||||
Session
6A: Data Mining, Chairs: Denis
Pechnov, Olivercom LLC and Ghassan Qaddah, |
|||||
Omar |
Boussaid |
|
|
Riadh Ben Messaoud, Sabine
Loudcher |
Mining
Association Rules in OLAP Cubes |
Guanling |
Lee |
|
|
Yuh-Tzu
Lin |
A
Study on Proportional Fault-tolerant Data Mining |
Mustafa Mat |
Deris |
|
|
Wan
Shuhadah Wan Nawang , Mamat Rabiei |
Update-Ordering
for Database Consistency in Peer -to-peer Environments |
Minghua |
|
|
|
Shinichi
Taniguchi, |
Discovering
Important Rules and Loyal Customer by Considering the Repetition in
Association Rules |
Samhaa |
R. El-Beltagy |
|
|
|
KP-Miner:
A Simple System for Effective Keyphrase Extraction |
Session
6B: Tutorial 2: Quality Assurance, Chairs: Ahmed Jaffar, |
|
Presenter |
Raed H.
Charafeddine, Assistant General Manager and Head of Branch Network, |
Topic |
Leading Change: A Choice or a Must? |
Session
6C: Security and Privacy 2, Chairs: Hassan Barada, |
|||||
|
Al-Fedaghi |
|
|
|
Personal
Management of Private Information |
Ali |
Chehab |
|
|
Wassim Itani, Ayman Kayssi |
SECERN:
A Secure |
Khaled |
Kevin Deeb |
|
|
|
Efficiency,
Privacy, and Security Analysis of Ubiquitous Systems in the Retail Industry |
Safuat |
Hamdy |
|
UAE |
|
Computations
in Class Groups of Imaginary Quadratic Number Fields |
Mahmood |
Doroodchi |
|
|
Kayvan
Farzaneh |
XML
Security beyond XSLT |
15:40
– 16:00 Break |
Session
7: 16:00 – 17:40 (Monday, November 20) |
|||||
Session
7A: E-Business 2, Chairs: Peter Fettke, |
|||||
Jayavel
|
Sounderpandian |
University
of Wisconsin-Parkside |
|
Rajendra
V. Boppana, Suresh Chalasani |
Cost-Benefit
Analysis of RFID Implementations in Retail Stores |
Thomas |
Menkhoff |
|
|
Yue Wah
Chay, Benjamin Loh, Hans-Dieter Evers |
Creating
Knowledge through Combination – A Case Study from |
Thierry |
Bodhun |
Research
Centre On Software Technology |
|
Rosa
Preziosi, Maria Tortorella |
Building
an RFID Document Management Service |
Abir |
Jaafar Hussain |
|
|
Rozaida
Ghazal, Dhiya Al-Jumeily, Madjid Merabti |
Dynamic
Ridge Polynomial Neural Network for Financial Time Series Prediction |
Peter |
Fettke |
|
|
Peter Loos |
Using
Reference Models for Business Engineering - State-of-the-Art and Future
Developments |
Session
7B: Tutorial 2: Quality Assurance (Cont’d), Chairs: : Ahmed Jaffar, |
|
Presenter |
Raed H.
Charafeddine, Assistant General Manager and Head of Branch Network, |
Topic |
Leading Change: A Choice or a Must? |
Session
7C: Computer Systems, Chairs: Valerieu
Beiu, |
|||||
Bruce |
Mills |
|
UAE |
P. W. Chandana Prasad,
V.C. Prasad |
Benchmark Circuit Complexity Validation using Binary
Decision Diagram Characteristics |
Fadi |
Sibai |
|
UAE |
|
Dissecting the PCMark®05 Benchmark and Assessing
Performance Scaling |
Said |
Elnaffar |
|
UAE |
Pat Martin |
Techniques and a Framework for Characterizing
Computer Systems' Workloads |
Nguyen |
The Loc |
|
|
Said Elnaffar, Takuya Katayama, Ho Tu Bao |
Grid Scheduling using 2-Phase Prediction (2PP) of
CPU Power |
Sedigheh |
Khajoueinejad |
Islamic |
|
Mojtaba Sabeghi, Azam Sadeghzadeh |
A Fuzzy Cache Replacement Policy and its
Experimental Performance Assessment |
Naeem Z |
Azeemi |
|
|
|
Multicriteria
Energy Efficient Source Code Compilation for Dependable Embedded Applications |
TUESDAY NOVEMBER 21 |
|||||
Session
8: 9-20 – 11:00 (Tuesday, November 21) |
|||||
Session
8A: Multimedia 1, Chairs: Jihad
Mohaidat, |
|||||
Shahnaz |
Behnami |
|
|
|
Advanced
E-access Content Filimage System: Synthesis File cards through Automatic
Images-Captions Web-Pages Extraction |
Attaullah |
Solangi |
UET Texila |
|
Yaqoob
Siyal |
A
Novel Morphological Edge Detector Based Approach For Monitoring Vehicles At
Traffic Junctions |
Tetsuji |
Takada |
University of Electro-Communications |
|
Takehito
Onuki, Hideki Koike |
Awase-E:
Recognition-based Image Authentication Scheme Using User's Personal
Photographs |
Habib |
Hamam |
|
|
Daniel LeBlanc, Yacine Benahmed, Sid-Ahmed Selouani,
Yassine Bouslimani |
Computer
interface by gesture and voice for users with special needs |
Yaqoob |
Siyal |
Nanyang Technological University |
|
Fawad
Ahmed |
A
Novel Hashing Scheme For Image Authentication |
Session
8B: E-Government, Chairs: Hassan Selim, |
|||||
Torki |
Altameem |
|
|
|
A
Proposed Model for E-Government Implementation |
Kashif |
Farooq |
|
|
|
Devolution
of E-Governance among Multilevel Government Structure |
|
Limam Mansar |
|
UAE |
|
E-Government
Implementation: Impact On Business Processes |
Mohammed |
Abu Jayyab |
|
UAE |
Salim Al
Ahdab,Hazem Taji, Zahra Al Hamdani,Fadi Aloul |
PolluMap:
A Pollution Mapper for Cities |
Jennifer |
Decruz
Owen Allan |
School of Advanced Computing |
|
Narainee
Rambajun, Sanjay P Sood, Victor
Mbarika, Rajeev Agrawal, Zia Saquib |
The
E-Government Concept: A Systematic Review of Research and Practitioner
Literature |
Session
8C: Multimedia 2, Chairs: Ashraf Elnagar, |
|||||
Jan Carlo |
Barca |
|
|
Grace
Rumantir, Raymond Koon Li |
A
New Illuminated Contour-Based Marker System for Optical Motion Capture |
Naeem |
Radi |
|
|
Abir
Jaafar Hussain, Dhiya Al-Jumeily |
Adaptive
Variable-Length Quantiser for Image Compression |
Athanasios |
Drigas |
N.C.S.R. 'Demokritos', IIT, Net Media Lab |
|
Stelios
Kouremenos, Dimitris Kouremenos, |
Performance
Evaluation of Sign-Language Videoconference Traffic |
Abbas |
Bigdeli
|
National ICT Australia Ltd. |
|
Abdolhossein
Sarrafzadeh, Samuel Alexander, Farhad Dadgostar, Chao Fan |
See
Me, Teach Me: Facial Expression and Gesture Recognition for Intelligent
Tutoring Systems |
Tamer |
Rabie |
|
UAE |
|
A
Novel Compression Technique for Super Resolution Color Photography |
Session
8D: Tutorial 3: Information Security,
Chairs: Safuat Hamdy, |
|
Presenters |
Fadi
Aloul, |
Topic |
Information Security: From Theory to Practice |
Session
8E: Tutorial 4: Web Services, Chair: Zakaria Maammar, |
|
Presenter |
Soraya
Kouadri Moustefaoui, Associate Professor, |
Topic |
Best Practices in Web Services: "Paving the Way to SOA
Success" |
11.00-11:20 Break |
Session 9: 11:20 - 13:00 (Tuesday, November 21) |
|
Session 9A: Tutorial 3: Information Security (Cont'd) Chairs:
Safuat Hamdy, |
|
Presenters |
Fadi
Aloul, |
Topic |
Information Security: From Theory to Practice |
Session
9B: Tutorial 4: Web Services (Cont'd), Chair: Zakaria Maammar, |
|
Presenter |
Soraya
Kouadri Moustefaoui, Associate Professor, |
Topic |
Best Practices in Web Services: "Paving the Way to SOA
Success” |
13.00-14.00 Lunch, Closing Ceremony and Best Paper Award
Announcement |
Session
9C: Special Exhibit, Chair: Samer
Ajrouche, HYPERLINK |
|
Presenters |
Dr. Ahmad Jaffar, Associate Professor,
Dr. |
Topic |
E-Business Walkthrough using an ERP portal |