Conference Program
Monday December 16th, 2002
| |
08:00 – 09:00 |
Registration@ Ibn Khaldoun Conference Hall, University of Qatar |
09:00 – 11:00 |
Opening Ceremony & Reception @ Ibn Khaldoun Conference Hall |
11:00 – 11:30 |
Coffee Break @ Ibn Khaldoun Conference Hall |
11:30 – 12:00 |
Technical Presentation @ Ibn Khaldoun Conference Hall Title: Wide Area Workflow Speaker: Mongi Gazelle, Gazelle Information Technology, Germany |
12:00 – 12:30 |
IT Exhibition @ University Exhibition Hall |
12:30 – 13:30 |
University Tour |
14:00 – 16:00 |
Lunch @
Sheraton Hotel Hosted By: His Excellency the President of the University of Qatar |
19:00 – 20:00 |
Keynote Speech@ Palm Tree Island Title: Recent Trends in Information & Telecommunications Technology Keynote Speaker: Prof. Mohammad S. Obaidat |
20:30 – 22:00 |
Dinner@ Palm Tree Island Hosted By: QAFCO |
Tuesday December 17th, 2002 | |
09:00 – 10:00 |
Keynote Speech @ Ibn Khaldoun Conference Hall, University of Qatar Title: Fuzzy Logic Network for Genetic Networking Keynote Speaker:
Prof. Paul Wang |
10:00 – 10:30 |
Coffee Break |
10:30 – 12:30 |
Four Parallel Sessions Session A1: Artificial Intelligence, Expert Systems & Neural Networks Appropriate Lemmae
Discovery The Irrelevancy and Its
Impact on the Clause Space of the Resolution-Based Theorem Prover Support Vector Machines for
Wind Speed Prediction A Case Based Reasoning
Framework for Domain Specific Search Engines
A Genetic-Based Approach
for Satisfiability Problems A Fuzzy Logic (Filter for
Tracking a maneuvering Target
A Symbolic-Based Model for
Handling Muanced Information
Genetic-Based Number Recognition
System
Development of Knowledge
Based Expert System for Online Monitoring Anomalies in Drive Systems Session B1: Efficient Routing Algorithm
on the OTIS-Networks
Using Modified Fast Walsh
Transform (MFWT) to Accommodate Increasing Data Rate of IEEE 802.11b PHY WLAN
to 22 Mbps
A Complete Optimal Symbolic
Analyzer for the Analysis of Large Lumped and Distributed Networks
Congestion Avoidance and
Explicit Allowed Rate for Transmitting Integrated Services over ATM Networks
The IEEE 802.11X Network
Protocol: Merits and Pitfalls
Load Migration Towards
Enhancing Availability Power Optimization for
Wireless Network Using Variable Power Levels Designing for Mobile
Environment Coverage and Delay Spread Measurements Improved Layered Network
Estimators for Transmission Channel Equalization Session C1: Al-Quds Web-Based
Electronic Course
Using XML and Search Part
Model to Sign a Contract by Internet E-Learning Technology
Framework: Building an Object Oriented Model for E-Learning Applications Henda Chorfi & Mohamed Jemni
The Characteristics &
Attitudes of Distance Education Students in Jordan: An Empirical Study
Performance Comparison of
Apache and Microsoft IIS Web Server
Building Scalable
E-Commerce Solutions
An Internet Search Engine
with Term Ponderation
Plugging Software Tools in
the Existing E-Learning Portals Session D1: Inquiry Methods for Virus
Identification
Interval-Based Testing for
Spreadsheets
Fault Tolerant Multilayer
Perceptron on 1-D Mesh
Secret Data Hiding in Wave
Media File
Application of Object
Oriented Software Quality Metrics to Measure the TPS System
An Empirical Study Using a
Software Reuse Reference Model to Compare Small and Large Development
Organizations
S. I. A. R. R. S: System
Intelligent of Help to the Resolution of the Spatial Tool of Regional
Scheduling Attended by Computer
Understanding
Object-Oriented Class Libraries
Development a Software Test
Strategy Based on Error Analysis
Modeling Process Using RAD
and UML Activity Diagrams: an Exploratory Study
|
10:30 – 11:30 |
Two Parallel Technical Sessions iMATS: An Internet-Based
Mobile Agent Trading System
Practices of Facilitating
Effective Learning in a Virtual University
I-VOTE: A Secure Java
Web-Based Online Voting System
Optimal Placement of
Proxies in the Web with Capacity Constraints
Development of Customer
Support Application for Engraved Furniture Design Regional Internet Exchange
in MENA Countries Performance Evaluation Web intrusion Detection
Using RIPEMD-160
Development of E-Learning
Course in Physiological Measurements Using WebCT
Consistency problems in
ER-Schemas for Database Systems
Cryptographic Applications
in Database Security: A Survey Study A strategy for Semantic
Integrity Maintenace for Parallel Relational Database Systems Technical Session 2: Feature Contents Study in
Arabic Numerals by Using Combined Neural Network Recognition Model
Connection-Field Behavior
of Brain Modeling and Human Intelligence Power
Classification of
Ventricular Ectopic Beats (VEB’s) Using Neural Networks
A Hybrid Rule Based Fuzzy-Neural Expert System for Passive Network Monitoring
Neurofuzzy Scheduling of
Fieldbus Systems
An Application of Mobile Agent
for Association Rule Mining
Short- Term Weather
Forecasting Using Input-Data Function Reasoning Approach with Interaction of
Different Atmosphere Layer Effect
The High Flexibility and
Stability of Flexible Neural Network Controllers Medical Image
Interpretation by Fuzzy Neural Networks and Expert System
|
12:30 – 13:00 |
Coffee Break |
13:00 – 14:00 |
Technical Session 3: Bandwidth Space Allocation
Algorithm in ATM Networks
Turbo Trellis Coded Modulation
Using MQAM
Text Compression Using
Hybrids of BWT and GBAM
A Fast Algorithm for
Layered Network Data Detectors
A single-Step Task
Scheduling Algorithm for Parallel Computers with Bounded Number of Processor
An Effective Model For ISUP
& SIP Mapping
Integration of SNMP and
Jini for Mobile Network Management Performance Evaluation of
Soft Handoff Strategies for Finite Buffer CDMA Cellular Networks
Packet Filtering Personal
Firewall Based on Microsoft Internet Protocol Helper API
SnifferWall: An Integrated
Sniffer Detector |
13:00 – 14:00 |
Three
Parallel Sessions Session E: Multimedia, IT & Society, & Human Computer Interface Research Initiatives at Zayed
University on Software Agents in the Wireless World
Information Technology in
the Arab Society: the Case of Egypt - the Socio-Cultural Contexts and the
Concept of Digital Divide
Comparing Family of Fair
Queuing Scheduling Algorithms for Multimedia Operating Systems
Empirical Test of An
Application Service Provider Adoption Model
The Role of Network Delay
on Tele-Training in Shared Haptic Virtual Environment Session F: Evaluating Security Needs
in Jini-Based Decision Support Systems
New Concurrent B-Tree
Algorithms for Centralized Database Management Systems
Evaluation of New
Information Technology: An Empirical Study
An Advice Unit for Forward
Housing Planning (LHS)
A Multi-Level Conceptual
Data Reduction Approach Based on the Lukasiewcz Implication Session G: Comparative Analysis of
Probability and Unsafety Vectors Routing Algorithm in K-Ary n-Cubes
Computer Simulation of the
Relaxed Static Stable Fighter of F-16 Using Numerical Algorithms
A New Algorithms for
Analysis of Verbal Information Based on Fuzzy-Logic
A Study on Centres of
Chordal Graphs
A comparative Study of RTRL
Algorithm and DEKF Approach for Training Recurrent Multilayer Perceptrons
|
14:30 – 16:30 |
Lunch @ Intercontinental Hotel Hosted By: QAFAC |
17:00 – 18:00 |
Trip to Sealine Beach |
18:00 – 19:00 |
Keynote Speech @ Sealine Beach Title: Strategic
Evolution of Enterprise Computing with Wireless Internet Platforms |
19:00 – 21:00 |
Dinner@ Sealine Beach Hosted By: QatarGas |
Wednesday December 18th, 2000 | |
09:00 – 10:00 |
Keynote Speech@ Ibn Khaldoun Conference Hall, University of Qatar Title: Notebook and Wireless LAN SED for Postgraduate Learning Keynote Speaker: Prof.
Johann Guenther |
10:00 – 10:30 |
Coffee Break |
10:30 – 12:30 |
Four Parallel Sessions
Session A2: Image Processing Comparison of Moment Invariant Technique with
new Proposed Feature Vector for Complex Image Matching
An Algorithm for Scene Cut from MPEG-1 Video
Streams Fingerprint Recognition Technique Using
Wavelet Transform Parallelization of Image Compression and
Decompression Algorithm Based on ID Wavelet Transformation Investigating a Hybrid Technique for Medical
Image Segmentation Intelligent Motion Detection and Tracking
System Deformation Images with Shearing Invariants Digital Image Processing to Extract
Information, Case Study from the State of Qatar A New Image Retrieval Scheme Based on the
IC-VQ Compressed Images Robust and Invariant DFT Image Watermark: A
new Approach Using Moments Invariant Session B2: Design of a Nibble-Size
Ripple-Carry Adder for (-1+j)-Base Complex binary Numbers
Towards Scalable Collective
Communication for Multicomputer Interconnection Networks
Rewriting Logic for
Verification of Piplined Microprocessors
Feasibility Study of
Dynamic Programmable Cache (DPC)
Reliability and Yield
Enhancement of Array processors (Part I)
Reliability and Yield
Enhancement of Array processors (Part II)
The Impact of Prefetching
Policy on the Performance of Parallel Computer Graphics Algorithms
Beware of the Next
Generation of Malicious Agents Performance of
Complementary Code Keying (CCK) Modulation Scheme for IEEE 802.11b Wireless
Local Area Networks (WLAN) in Gaussian Noise Channel
The Minimum Number of
Links-Based Routing Strategy in ATM Networks (MNL)
Neural Networks in Network Security Session C2: On Combining Artificial
Neural Networks into an HMM Arabic Speech Word Recognizer
Open Domain Question
Answering System for Arabic
Improved Algorithm for
Extracting Trilateral Arabic Root Bottom-Up Chart Parser for
Arabic Sentences
Verification-Based
Algorithms for Integer Programming and Genetic Algorithm
Data Discretization for
Mining Association Rules
Genetic Algorithm Based
Image Segmentation
Lagrangian Support Vector
Machines for Phoneme Classification
Application of Fuzzy Logic
to the Estimation of the Parameters of a Yeast Fermentation Processes
Session
D2: Parallelization
of IBD Computation for determining Genetic Disease Map
Development of a
Multi-Resolution Framework for NUBS
Wavelet Analysis of
Harmonic Signal in Noisy Environment: Application to Industrial Plant Data
File Access Permission
Change Detection Using Immunological Negative Selection Approach Computer Simulator for
Teaching Assembly Language and Computer Organization to IT
Performance Comparison
between the Paxos and Chandra-Toueg Consnsus Algorithms
Conceptual Cooperative
Information Retrieval system
|
11:30 – 12:30 |
Three Parallel Technical Sessions Syllable Based Labeling for
Continuous Arabic Speech Recognition
ABJAD: An Offline Arabic
Handwritten Recognition System
Arabic Handwitten Words
Recognition
A parametric Approach for
Arabic Speech Recognition Using Hidden Markov Models
Developing a Parser for a Design
Pattern Specification Language Using A Java-Based Parser Generator
Region Segmentation and
Splitting of Bio-Medical Objects by Border Identification Technique
Double Transform Contour
Compression Automatic Retrieval and
Summary of Internet Information by Means of Multi-Agent Architectures
Finding Silhouette Edges
for 3D Terrain Skecthing
An Approach for
Constructing Complex Discriminating Surfaces Based on Bayesian Inference of
the Maximum Entropy
Technical Session 5: Invisible Interface for
Mentoring User
REO2 Pt: An Optimal Tool
for Understanding Object Oriented Program Software Development Tools and
Executive Kernel Design for programmable Logic Controllers Demonic Semantics by
Monotypes Theoretical Validation of
Cohesion Metrics in Object oriented Systems Object-Oriented Frameworks:
An Enabling Technology for Software Reuse An Algorithm for Computing
the intersection between Two 3D Circular Disks in Closed-Forms Object Oriented Program
Test Case Generation Using Hierarchical Coloured Petri Nets Embedding of Cycles into
Arbitrary Trees Technical Session 6: Micro-Code Generation for
Rom-Based Controllers within a High-Level Synthesis Environment
The Design of the PANDA
Intermediate Format
Task Dispatching for
Parallel Vector Processors Inventory Control Network
Management Using Material Required Planning (MRP)
Computer Simulation of
Fully Developed Channel Flow and Validation of a Parallel Code
Indoor Mobile robot Local
Path Planner with Trajectory Tracking
Cost-effective Formulation
of a Finite-Element Model for Atmospheric Dispersion of Dense Gases
Collective Adaptation of
Heterogeneous Communicating Multi Robot System
Flexible Design Method of
Programmable Filter Using OrCAD Created Library Module
A Parallel Split-Step
Fourier Method for the Coupled Nonlinear Schrodinger Equation
|
12:30 – 13:00 |
Coffee Break |
13:00 – 14:00 |
Closing Session
|
| |
14:30 – 16:30 |
Lunch @ Marriott Hotel Hosted By: QAPCO |
| |
19:00 – 20:00 |
Keynote Speech @ Doha Club Title: Case-based Reasoning Technology Keynote Speaker: Prof. Abdel-Badeeh M. Salem |
20:30 – 22:30 |
Dinner @ Doha Club |
Thursday December 19th, 2002 | |
09:00 – 14:00 |
Trip to RasLaffan Industrial City |
14:30 – 16:30 |
Lunch @ RasLaffan Industrial City |