acit2021
  • ACIT
  • Editorial Board
  • Conference Ethics
  • General Secretariat
    • Secretariat Council
    • Basic Regulations
  • Pre. Conferences
    • ACIT 2024
    • ACIT 2023
    • ACIT 2022
    • ACIT 2021
    • ACIT 2020
    • ACIT 2019
    • ACIT 2018
    • ACIT 2017
    • ACIT 2016
    • ACIT 2015
    • ACIT 2014
    • ACIT 2013
    • ACIT 2012
    • ACIT 2011
    • ACIT 2010
    • ACIT 2009
    • ACIT 2008
    • ACIT 2007
    • ACIT 2006
    • ACIT 2005
    • ACIT 2004
    • ACIT 2003
    • ACIT 2002
    • ACIT 2001
    • ACIT 2000
  • Proceedings
    • ACIT'2024 Proceedings
    • ACIT'2023 Proceedings
    • ACIT'2022 Proceedings
    • ACIT'2021 Proceedings
    • ACIT'2020 Proceedings
    • ACIT'2019 Proceedings
    • ACIT'2018 Proceedings
    • ACIT'2017 Proceedings
    • ACIT'2016 Proceedings
    • ACIT'2015 Proceedings
    • ACIT'2014 Proceedings
    • ACIT'2013 Proceedings
    • ACIT'2012 Proceedings
    • ACIT'2011 Proceedings
    • ACIT'2010 Proceedings
    • ACIT'2009 Proceedings
    • ACIT'2008 Proceedings
    • ACIT'2007 Proceedings
    • ACIT'2006 Proceedings
    • ACIT'2005 Proceedings
  • About Us
  • ACITFAQ
  • Contact Us
  • +More
    • About CCIS
  • Acit2025

ACIT'2025 will be held in Arab Academy for Science, Technology & Maritime Transport, December 16-18, 2025 - Alexandria, Egypt

Conference Program

  • Home\
  • Conference Program

Conference Programe

10937
Deans meeting

Deans meeting                                                              Saturday – 10/12/2011                                                    

 

 

Open Ceremony                                                            Sunday - 11/12/2011                                                 Place:                          

8:00 – 9:00: Registration

Open Ceremony : 9:00am – 10:30am                                                                                               Conference Hall:

10:30 – 11:00: Coffee Break

11:00am – 12:30am: Keynote Speech: Prof. Simon Yang - Biologically inspired Intelligent Systems with Applications to Information Technology

12:30pm – 2:00pm: Prayer and Lunch

                     Day 1: 2:00pm – 3:30pm                                         (A1): E-Commerce and E-learning                                                             Room:

Paper

Author

2594- The ability of remote sensing techniques in the search for groundwater

Mustafa ,Abd elbagy

2654- Electronic shopping behavior in mobile commerce context: An empirical study and a predictive model for developing countries

Ahmed ,Prof. Dr. Tarek Taha

1766- Using Wikis to Develop Writing Performance among Prospective EFL Teachers

Mohammed Khodary ,Manal

2239- Reconfigurable Multiple-Stereotype Student Model

Kseibat ,Dawod

 

2335- E-learning systems and the requirements of the educational environment - أنظمة التعليم الإلكتروني ومتطلبات البيئة التعليمية

رجاء الحجيلي

عبد الرحيم العوفي
عبدالله
الصاعدي
ياسرالجناحي

                     Day 1: 2:00pm – 3:30pm                                   (A2): Software Engineering                                                                             Room:

Paper

Author

2465- Feature Extraction Techniqes of EEG Signasl For BCI Application

Alhamdani ,Toka Abdulhameed
Sulaiman ,Abdul-Barry Raouf

1688- Multi-Agent System Meta-Models

Mohamed Elammari,

Reem Elsaeti

3152- The Cultural Aspects of Design Jordania Websites: An Empirical Evaluation of University, News, and Government Website by Different User Groups

Tolba ,Rasha

2560- A General Framework To Bridge The Gap Between Conceptual System And Abstract System In Software Development

Hagal ,Mohamed
Elshaari ,Mohamed

2581- A Structured Approach For Extracting Functional Requirements From Unclear Customers

Hagal ,Mohamed
Sallabi ,Omar

2627- Using Inconsistencies to Assess the Degree of Progress in Development Process

Al-Khaldi ,Dr. Randa

                     Day 1: 2:00pm – 3:30pm                  (A3): Algorithms & Application and Arabic Language Processing                        Room:

Paper

Author

2723- Finite Difference Methods For Numerical Simulations For 1+2 Dimensional Nonlinear Schrödinger Type Equations

Taha ,Thiab
Thiab Rashed Taha ,

2988- A Fuzzy Local Search Classifier for Intrusion Detection

Boughaci ,Dalila
Bouhali ,Samia
Ordeche ,Selma

3167- An Algebraic Algorithm for the Production-Inventory-Transportation Problem in a Three- Stage Supply

Seliaman ,Mohamed Elhassan

3175- A New Architecure For Translation Engine Using Ontology:One Step Ahead

Kharbat ,Faten

3233- A Particle Swarm Algorithm for Solving the Maximum Satisfiability Problem

Layeb ,Abdesslem

2542- Tele-monitoring the navigation of a Set of Robots Using Multiprocessors With a New Voice Command system

Fezari ,Mohamed
Saidi ,Mohamed Larbi
Atoui ,Hamza

3:30pm – 4:00pm: Refreshment

                     Day 1: 4:00pm – 5:30pm                      (B1): E-Learning and IT& Society and Remote Sensing and                         

                                                                                                  Neural Networks and Parallel & Distributed Systems                                    Room:

Paper

Author

2534- Is Saudi Arabia Ready for E-learning? – A Case Study

Chanchary ,Farah Habib
Islam ,Samiul

2535- Mobile Learning in Saudi Arabia - Prospects and Challenges

Chanchary ,Farah Habib
Islam ,Samiul

2579- Categorization of a Song Using an Ant Colony Algorithm

Lachtar ,Nadia
Bahi ,Halima

1689- Integrated Controller For Fixed Speed, Grid Connected Wind Turbine, Based On Neural Networks.

Hashad ,Alaa
Z.Amer ,Fathy
E.Youssef ,Ahmed

3139- Automatic Parallel Processing Environment

Osman ,Abdelrahman

2367- Pinus trees distribution mapping in Zawita gully with digital analysis

Ahihab ,Aahed

                      Day 1: 4:00pm – 5:30pm                                      (B2): Software Engineering                                                                         Room:

Paper

Author

3083- Evolution Framework for Software Architecture Using Graph Transformation Approach

Amirat ,Abdelkrim

3096- The Employment of Axiomatic Design in Software Engineering: A Software Development Conceptual Framework

El-Haik , Basem
shaout ,adnan

3102- A Framework for Software Product Risk Management Based on Quality Attributes and Operational Life Cycle (SPRMQ)

Mofleh ,Halima
Zahary ,Ammar

3149- A New Classification of Non-Functional Requirements for Engineering the Development of Software Services and Service-Oriented Applications

Odeh ,Yousra
Odeh ,Mohammed

3177- Towards a New Way for Aspect-Oriented Software Development

bentrad ,sassi
Meslati ,Djamel

3209- Towards The Use Of Program Slicing In The Change Impact Analysis Of Aspect Oriented Programs

Bouteraa ,Imed
Bounour ,Nora

                     Day 1: 4:00pm – 5:30pm                                            (B3): Arabic Language Processing                                                     Room:

Paper

Author

2559- An Evaluation of Indices Based on Arabic Documents: An overview

hanandeh ,Essam
AL zboun ,Fared

2562- Two Multi-class approaches for reduced massive data sets using Core Sets

Nour-Eddine ,LACHACHI
Abdelkader ,ADLA

2656- Arabic Opinion Mining Using Combined Classification Approach

El-Halees ,Alaa

2938- Arabic Alert E-Mail Detection using Rule based Filter

Al-Radaideh ,Qasem
AlEroud ,Ahmed

3077- Developing a Model for Generating Computer Program from Semi Natural Arabic Language.

Ahmed ,Tarig

3088- Searching Concepts and Keywords in the Holy Quran

Al-Taani ,Ahmad T.
Al-Gharaibeh ,Alaa M.

8:00pm – 10:00pm: Conference Dinner

 

                                                            Monday - 12/12/2011                                                                                             

9:00am – 10:30am: Keynote Speech: Prof. Norbik Idris - Information Security                                             Place:  

10:30am – 11:00am: Refreshment

                    Day 2: 11:00am – 12:30pm                          (C1): AI & Expert System and Information Security                                      Room:

Paper

Author

1925- Intelligent Traffic Light Control System Based Image Intensity Measurement

Al-Ani ,Muzhir
Alheeti ,khattab

2619- An Optimal General Trend for Fuzzy Time Series Forecasting Based on Intervals Fuzzy Rules Based High-Order Partitioning

Awami ,Saleh
Shakmak ,Youssef
mohamed ,samira

2631- 3D Mapping of an Unknown Environment by Cooperatively Mobile Robots

Huwedi ,Ashraf

2826- Expert System for Islamic Punishment (ESIP)

Nada ,Yasser
Aljahdali ,Sultan

2902- Analysis of the Stagnation Behavior of the Interacted Multiple Ant Colonies Optimization Framework

Aljanaby ,Alaa
Ku Mahamud ,Ku Ruhana

2914- Automatic Classification Of Questions Into Bloom's Cognitive Levels Using Support Vector Machines

Esmail ,Anwar
Osman ,Addin

                     Day 2: 11:00pm – 12:30pm                                            (C2): Information Security                                                               Room:

Paper

Author

2532- Enhancement of E-Government Security Based on Quantum Cryptography

Al-Janabi ,Sufyan T. Faraj
Sagheer ,Ali M.

2574- Auditing for Standards Compliance In the Cloud: Challenges and Directions

Rasheed ,Hassan

2613- Analyzing the Performance of a Dynamic Access Control System With Integrated Risk Analysis

Rasheed ,Hassan

2816- Towards an a priori approach for the security of information systems

Chehida ,Salim
Rahmouni ,Mustapha Kamel

3118- Email SPAM Related Issues and Methods of Controlling used by Internet Service Providers (ISPs) in Saudi Arabia

Alkahtani ,Hasan
Goodwin ,Robert
Gardner-Stephen ,Paul

3203- Gait Analysis For Criminal Identification Based On Motion Capture

Razali ,Nor Shahidayah
Abdul Manaf ,Azizah

                      Day 2: 11:00am – 12:30pm                                                        (C3): Multimedia                                                                   Room:

Paper

Author

2554- A Graph Grammar Approach for calculation of Aggregate Regions Automata

Hachichi ,Hiba
Kitouni ,Ilham
Saidouni ,Djamel-Eddine

2053- Interactions in Control of Large Scale Systems

Alfitorey Mousa ,Younes

3137- The Implementation Of Face Security For Authentication Implemented On Mobile Phone

Kremic ,Emir
Subasi ,Abdulhamit

1880- Texture Recognition based on DCT and Curvelet Transform

alrawi ,salah
Sadiq ,Ahmed
Ahmed ,Ismail

2551- Shapes Matching and Indexing using Textual Descriptors

Aouat ,Saliha
Larabi ,Slimane

2577- Obstacle Detection With Stereo Vision Based On The Homography

Baha ,Nadia
Larabi ,Slimane

3104- Analyzing Web Service Interaction Using Open ECATNets

Latreche ,Fateh
Sebih ,Hacene
Belala ,Faiza

12:30pm – 2:00pm: Prayer and Lunch

                     Day 2: 2:30pm – 5:00pm                              (D1): AI & Expert System and Software Engineering                                   Room:

Paper

Author

3049- Development of Graphical User Interface Using Philosophy of Use Case Maps

El_Berkawi ,Ebtesam

Elammari, Mohamed

2327- Complex System Model based on Multi-Agent Systems and Petri Nets

Belmabrouk ,Karima
Bendella ,Fatima
Benkhedda ,Samira

2459- Mathematical explanation of the errors that occur in real-time systems

Al-Raimi ,Hamid
Saif ,Jamil

3126A multi agent based tool for the simulaion of the dynamics of a bovine population under the effect of viral infections

Guerram ,Tahar
Dehimi ,Nour El Houda

3157- Force / Motion Control for Constrained Robot Manipulator Using Adaptive Neural Fuzzy Inference System(ANFIS)

Al-maliki ,Kadhim

                     Day 2: 2:30pm – 5:00pm                             (D2): Information Security and Mobile Application                                        Room:

Paper

Author

3204- Data Hiding Technique Based On Dynamic Lsb

AL- Aidroos ,Naziha
Mohamed ,Marghny
Bamatraf ,Mohamed

3231- A Multimedia Chaos-based Encryption Algorithm

Boulebtateche ,Brahim
Lafifi ,Mohamed Mourad
Bensaoula ,Salah

2055- A Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour

Shaout ,Adnan
Bodenmiller ,Adam

3123- Motion Control of non-Holonomic Mobile Manipulator using Fuzzy Logic.

Hassam ,Abdelouahab
Hamani ,Miloud

3141- Template Matching Method for Recognition Musnad Characters Based on Correlation Analysis

Qatran ,Mohammed

3193- On finding the best number of states for a HMM-based offline Arabic word recognition system

Wahby ,Talaat M.
Musa ,Dr.Mohamed E. M.
Osman ,Prof. Izzalding M

3202- Decision trees for handwritten Arabic words recognition

Chefrour ,Aida
Amrouch ,Siham
Souici-Meslati ,Labiba

                     Day 2: 2:30pm – 5:00pm                                         (D3): Image Processing and Multimedia                                              Room:

Paper

Author

2852- Multi-Phase Detection Technique For Removing Clusters Of Impulse Noise

Awad ,Ali

3020- Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table

AL-Najjar ,Hazem
AL-Najjar ,Asem

3046- Neural Network-Based Face Detection with Partial Face Pattern

Naji ,Sinan
Zainuddin ,Roziati
Zaid ,Masoud
Edouber ,Ammar

Hamid A. Jallab

3082- An approach automata Game of Life-MAS of segmentation MRI brain

Sarah ,Benmazou
Hayet Farida ,Merouani
Soumia ,Layachi

3184- Palm Veins Identification Using Radon Transform: RBF Approach

Ayache ,Mohammad
El Saleh ,Rola
Chantaf ,samer
Khatoun ,Ahmad
aboud ,Alaa

2944- Audiovisual Document Modeling By Metadata

Elleuch ,Héla
Yengui ,Ameni
Neji ,Mahmoud

8:00pm – 10:00pm: Conference Dinner

                                                             Tuesday - 13/12/2011                                                                             Place:                          

9:00am – 10:00am: Refreshment

                     Day 3: 10:00am – 12:00pm                           (E1): Computer in Education and Internet & the Web                               Room:

Paper

Author

2595- An Assistive Computerized System for Managing and Educating Children with Moderate and Mild Intellectual Disabilities at Shafallah Center in The State of Qatar

Saleh ,Moutaz
Aljaam ,Jihad

2626- Challenges Of Information Era: Teachers’ Attitude Towards The Use Of Internet Technology

Safdar ,Muhammad
Hussain ,Irshad
Abdul Malik ,Muhammad
Masood ,Kamran
Yaqoob ,Muhammad

1943- A Survey & Qualitative Analysis Of Interactive Pedagogical Drama Systems

Paracha ,Samiullah
Jehanzeb ,Sania
Yoshie ,Osamu

2986- A Framework For Collecting Clientside Paradata In Web Applications

Khasawneh ,Natheer
Al-Salman ,Rami
Al-Hammouri ,Ahmad T.
Conrad ,Stefan

3070- Dealing With Web Services Composition at the Architectural Level

Bennouar ,Djamal
Bentlemsan ,Kahdidja

                     Day 3: 10:00pm – 12:00pm                                     (E2): Geographical Information System                                             Room:

Paper

Author

2364- Representation in the open forms of geographic information systemsGIS) An Empirical Study on the water basin in northern Iraq

abbas ,ali abed

2365- Study the Effect of the Geometrical Correction of the Satellite image on the GPS Tracking by Using GIS

Ali ,Sabah

2397- Using GIS Technique in Hydrological Study Of Wadi Al-Shoar Basin North Iraq

Al-Salim ,Taha
Khattab ,Mohammed Fuzi

2537- Relevance of Remote Sensing and Geographic Information in assessing sustainable groundwater resource.─ A Case of Kedah and Perlis States, Malaysia

Adiat ,K.A.N.
Nawawi ,M.N.M.
Abdullah ,K.

2597- A Proposed GIS-Based Decision Making Framework for Tourism Development Sites Selection

Amri ,Mohamed
Eldrandaly ,Khalid

2680- Hydrology Modeling for Runoff Harvesting of Tarow valley Using GIS.

khalaf ,zakaria yahya
abbas ,ali abed

Day 3: 10:00am – 12:00am                             (E3): Computer Architecture and Computer Networks                          Room:

Paper

Author

2634- Towards a Security Meta-model for Software Architectures

Mohamed ,Gasmi
Makhlouf ,Derdour
Nacera ,Ghoualmi Zine

2620- On Internet Multicast Architectures:Fully Distributed and Hierarchical Vs Service-Centric

Said ,Omar
Ghiduk ,Ahmed
Aljahdali ,Sultan

2780- Analytical Study of the Effect of Transmission Range on the Performance of Probabilistic Flooding Protocols in MANETs

Bani Yassein ,Muneer
Abuein ,Qusai
Shatnawi ,Mohammed
Alzoubi ,Deya

3018- Digital Image Encryption Algorithm Based on a Linear Independence Scheme and the Logistic Map

AL-Najjar ,Hazem

3142- Node Selection Based On Energy Consumption In Manet

Kadir ,Jailani - Ghazali ,Osman
Muhammad ,Firdaus
Hassan ,Suhaidi

12:00pm – 2:00pm: Prayer and Lunch

 

Day 3: 2:00pm – 4:30pm                                (F1): Internet & Bioinformatics and Computer Ethics                             Room:

Paper

Author

2639- Pachinko Allocation Model with Image Local Features for Image Retrieval Tasks

Boulemden ,Ahmed
Tlili ,Yamina

2409- Parallel Hybrid Meta-heuristic: Genetic Algorithm with Hill Climbing to Resolve the QAP

GUEFROUCHI ,Ryma
KHOLLADI ,Mohamed-Khireddine

2569- Model Performance Improvement with Least Square Method in Highly Imbalanced and Correlated Datasets

Malazizi ,Ladan

2591- Data mining methods for medical data classification

Alickovic ,Emina
Subasi ,Abdulhamit

3215- Risk-Driven Compliant Access Controls for Clouds

Boussi Rahmouni ,Hanene
Munir ,Kamran
Odeh ,Mohammed
Mcclatchey ,Richard

Day 3: 2:00pm – 4:30pm                                           (F2): Information Systems                                                                   Room:

Paper

Author

2659- WSN-based Support for Irrigation Efficiency Improvements in Arab Countries

Al-Hamdi ,Ali
Hasan ,Ahmed
Akram ,Muhammad

2809- Decrypting The Ciphertexts of RSA With Public-Key

Derdouri ,Lakhdar
Saidi ,Noureddine

2873- Business Intelligence Maturity Models: Toward New Integrated Model

Shaaban ,Essam
Helmy ,Yehia
Khedr ,Ayman
Nasr ,Mona

2928- Analysis Of Factors That May Affect The Uses Of Knowledge Management In Sudanese Medium-Sized Companies

Elshaiekh ,Nour-Eldin Mohamed
Ibrahim ,Khalid Ahmed
Mchulla ,Fahima Omar

3172- Design And Implementation of RFID-Sensor Middleware Compliant with EPCglobal Architecture Framework

Uddin ,Md. Kafil

2419- An Analyzing Study of the Distributed Database System Parameters

Maabreh ,Khaled

3180- A survey of indexing techniques in natives XML databases

Zemmar ,Imen
Benouareth ,Abdallah
Souici-Meslati ,Labiba

Day 3: 2:00pm – 4:30pm                                (F3): Computer Networks and Machine Learning                                    Room:

Paper

Author

3158- An Overview Of Flow-Based And Packet-Based Intrusion Detection Performance In High Speed Networks

Alaidaros ,Hashem
Mahmuddin ,Massudi
Al Mazari ,Ali

3171- An Intelligent Approach for DoS attacks detection

Hassan Yassin ,Amr
Hamdy Hussien ,Hany

2350- Using Particle Swarm Optimization and Locally-Tuned General Regression Neural Networks with Optimal Completion for Clustering Incomplete Data Using Finite Mixture Models

Mohamed ,Ahmed Rafat Abas

3047- Integration of A Bayesian Learning Model In A Multi-Document Summarization System

Maher ,Jaoua
Fatma ,Kallel
Lamia ,Belguith
Abdelmajid ,Ben Hamadou

3064- A Taxonomy of Email SPAM Filters

Alkahtani ,Hasan
Gardner-Stephen ,Paul
Goodwin ,Robert

3103- Intrusion Inspector and Detector in Local Area Network using SNMP and MMC Techniques (IIDLAN)

Alawi ,Salah
Zahary ,Ammar
Al-Saggaf ,Adnan

4:30pm – 5:00pm:Closing Ceremony

8:00pm – 10:00pm:Conference Dinner

 Day 4: Social event (Optional)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Acit 2011

  • ACIT 2011
  • Evaluation Form
  • Call For Papers
  • Final Recommendations
  • Steering Committee
  • Climate for Riyadh
  • Technical Committee
  • Keynote Speakers
  • Conference Program
  • Accommodation
  • Organization
  • Important Dates
  • Camera Ready
  • About KSA

The International Arab Conference on Information Technology (ACIT) is a technical-scientific specialized conference. It is held periodically in the Arab homeland. All its bodies emerge from the Colleges of Computing and Information Society (CCIS).

Quick link

  • Home
  • STEERING COMMITTEE
  • ETHICS FOR PUBLISHING IN ACIT
  • ABOUT US
  • ACITFAQ

Contact

 

Zarqa University P.O. Box 132010

+962-5-3821100 / ext 1451

acit@ccis2k.org

  • ACIT
  • Editorial Board
  • Conference Ethics
  • General Secretariat
    • Secretariat Council
    • Basic Regulations
  • Pre. Conferences
    • ACIT 2024
    • ACIT 2023
    • ACIT 2022
    • ACIT 2021
    • ACIT 2020
    • ACIT 2019
    • ACIT 2018
    • ACIT 2017
    • ACIT 2016
    • ACIT 2015
    • ACIT 2014
    • ACIT 2013
    • ACIT 2012
    • ACIT 2011
    • ACIT 2010
    • ACIT 2009
    • ACIT 2008
    • ACIT 2007
    • ACIT 2006
    • ACIT 2005
    • ACIT 2004
    • ACIT 2003
    • ACIT 2002
    • ACIT 2001
    • ACIT 2000
  • Proceedings
    • ACIT'2024 Proceedings
    • ACIT'2023 Proceedings
    • ACIT'2022 Proceedings
    • ACIT'2021 Proceedings
    • ACIT'2020 Proceedings
    • ACIT'2019 Proceedings
    • ACIT'2018 Proceedings
    • ACIT'2017 Proceedings
    • ACIT'2016 Proceedings
    • ACIT'2015 Proceedings
    • ACIT'2014 Proceedings
    • ACIT'2013 Proceedings
    • ACIT'2012 Proceedings
    • ACIT'2011 Proceedings
    • ACIT'2010 Proceedings
    • ACIT'2009 Proceedings
    • ACIT'2008 Proceedings
    • ACIT'2007 Proceedings
    • ACIT'2006 Proceedings
    • ACIT'2005 Proceedings
  • About Us
  • ACITFAQ
  • Contact Us
  • +More
    • About CCIS
  • Acit2025
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…