preface general chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 tuesday...
TRANSCRIPT
1
2
Preface – General Chair
Dear Colleagues,
It gives me a great pleasure to welcome you to the 5th
International Conference in
Information Technology ICIT2011, hosted by the Faculty of Science and Information
Technology.
Research papers authored by scientists from all over the world are received by the organizing committee of the
conference. The submitted papers covered wide range of important topics in Information Technology and its
applications.
The refereed articles are organized under the following streams:
Database & Data Mining
Artificial Intelligence
Computer Networks & Communications
Computer Architecture
Parallel & Distributed Systems
Internet & its Applications
Multimedia & Visual Programming
Image and signal Processing
Information Systems
Human Computer Interface
Virtual Reality Systems
E-Commerce
Computer and network Security
Software Engineering
Distance Learning and e-education
Algorithms & Applications
Neural Networks
Computer Simulation
Natural Language Processing
Machine Learning
Aspect Oriented Software Development AOSD
Pattern Recognition
Information Security (Communication
Security/Network Security/Data Security)
GIS Technology and Application
Hardware Computer Design
Media and Societal Innovation
E-Education
Cyber Physical Systems
All submitted papers were refereed by anonymous referees in the filed of specialization, were some of the
research papers improved significantly based on the recommendation of the referees, to whom we would like to
thank for all their efforts.
I would like to express my appreciation to the conference committee and to everyone who contributed in the
preparation for the conference and thank them for all their handwork.
My greatest gratitude goes to all the authors that had the confidence in the quality of our conference and the
high standards it pertains and submitted their valuable work to be presented and published. For those authors
whom we did not accept their contribution, we wish them well and hope that the referees comments helped
them in producing an even better work in the future.
Thank you
Dr. Abdelfatah Aref Tamimi
Dean and Conference General Chair
Faculty of Science and Information Technology
3
Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman
Preconference Workshops
9:00-12:00: Writing Research Grant Proposals:
o How to write research *grant* proposals; Prof. Rosni Abdullah, Universiti Sains Malaysia
o Conducting Literature Review - by Prof Tajudin
12:00-13:00: Supervising Master and PhD degree, Abdel-Badeeh M. Salem, Ain Shams University, Cairo-Egypt:
13:00-14:00: Quality Assurance Perspectives in Higher Education Organizations, Ahmad Dalal’ah,
University of Ha’il, Saudi Arabia
Wednesday May 11th , 2011
8:00 – 8:45 Registration
9:00 – 9:30
Main Stage
Building 1
Opening Session
9:30 – 10:00 Coffee Break
Main Stage
Building 1 10:00–10:40
10:45 –11:30
11:40-12:25
12:30-13:10
13:20-14:00
Keynote Speeches
1. Title: Filling the gap between Simulation and Reality
By: Prof Hans-Dieter Burkhard
Humboldt University Berlin, Germany
Chair: Dr. Al-Dahoud Ali
2. Title: Diffusing ICT Mindfulness
By: Professor Sonny Nwankwo
Director of Research & Enterprise, East London University, UK
Chair: Nadim Obeid
3. Title: The Fractal Nature of Internet Traffic
By: Maaruf Ali
SMIEEE, FHEA(UK), UK
Chair: Mohammad Bilal Al-Zaubi
4. Title: Cognitive Biometrics: a Biosignal Based Approach to Person Authentication
By: Kenneth Revett,
British University in Egypt
Chair: Ismail M. Ababneh
5. Title: How Trust affects Internet Security
By: Johnnes ARREYMBI,
University of East London, UK
Chair: Fawaz AL Zaghoul
4
14:00– 15:30 Lunch : Main Restaurant
Session A 15:30-17:30
Room 5012
Faculty of IT
Building 5
Algorithms and Applications Chair: Afaf Al-Neaimi
1. Accuracy Measures for the Comparison of Classifiers, Vincent Labatut and Hocine Cherifi,
Galatasaray University, Turkey, University of Burgundy, France.
2. Artificial Bee Colony Algorithm for Curriculum Based Course Timetabling Problem, Asaju La’aro
Bolajia , Ahamad Tajudin Khadera ,Mohammed Azmi Al-betara , Mohammed Awadallaha, Al-
Zaytoonah University and a School of Computer Sciences, Universiti Sains Malaysia.
3. Application of Continuous Genetic Algorithm For Second-Order Singular Boundary Value
Problems, Omar Abu Arqub, Zaer Abo-Hammour, Hassan Rashaideh, Dept. of Applied Science, Al-
Balqa.Applied University.
4. Analysis of Feature Selection and Classification Techniques on Microarray Data, Colin Giles, Ryan
Wakelam, Sean Malone, Ghada Naji, Mohamad Naji, Tansel Ozyer, Reda Alhajj, Jon Rokne, Dept.
of CS, University of Calgary, Calgary, Alberta, Canada.
5. On Application of Ditance-Like Algorithms to Eevent Detection From Non-Stationary Time Series,
Tomasz Pelech-Pilichowki, AGH-University of Science and Technology, Krakow, Poland.
6. Applying GA to find Minimum Cost Routes between existing nodes in Different Network Models,
Ahmad Al-Sayaad, Abeer Abu-Sultan, Zakaria Zayed, Deena Abu-Sultan, XIS Solutions, Kuwait.
Session B
15:30-17:30
Room 5011
Faculty of IT
Building 5
Security (Communication Security/Network Security/Data Security) Chair: : Ion Tutanescu
1. Use of Elliptic Curves Cryptosystems in Information Security, Ion Tutanescu and Constantin A.,
University of Piteşti, Romania.
2. How SAGE helps to implement Goppa Codes and McEliece PKCSs, Thomas Risse, Institute of
Informatics & Automation, Faculty E & I, Hochschule Bremen, University of Applied Sciences
3. Applying the Software Engineering Principles in Building a Secure Software, Huda Abdulaali
AL_Amwee, Computer Science Dept., Al-Mustenseria University, Iraq.
4. Implementing Serpent Cipher in Field Programmable Gate Arrays, Jaroslaw Sugier, Wroclaw
University of Technology, Wroclaw, Poland.
5. IEEE 802.21 Information Service: Features and Implementation Issues, Fábio Buiati, Ismail Saadat,
Delfín Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM),
Spain.
6. Overview of IEEE 802.21 Security Issues for MIH Networks, Ismail Saadat, Fábio Buiati, Delfín
Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain.
5
Session C
15:30-17:30
Room 5007
Faculty of IT
Building 5
Software Engineering Chair: Mohammad Muharait
1. A Model Transformation approach Based on Homomorphic Mappings between UML Activity
Diagrams and BPEL4WS Specifications of Grid Service Workflows, Yousra Bendaly Hlaoui and
Leila Jemni Benayed, Research Unit in Technologies of Information and Communication, Tunisia.
2. Problems In Systematic Application Of Software Metrics And Possible Solution, Gordana Rakić and
Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of Sciences, Univ. of Novi Sad
3. Explore Developers and Users Communication Strategic to Reach a Share Understanding of
Requirements: Nonverbal Channels Perspective, Issam Jebreen, School of Comp. & Math Sciences,
AUT Univ., New Zealand.
4. Is Cloud Computing Ready for Critical Applications, Fredrick Japhet Mtenzi, Dublin Institute of
Technology, Irland.
5. A Tree Based Strategy for Interaction Testing, Mohammad F. J. Klaib1, Sangeetha Muthuraman
2,
and Noraziah Ahmad3, Jadara University, Irbid- Jordan, And Malysia.
6. Generation of Test Cases From Websites User Sessions, Sanaa Alsmadi, Izzat Alsmadi and
Mohammed Al-Kabi, Yarmouk University,Irbid, Jordan.
Session D
15:30-17:30
5010
Faculty of IT
Building 5
Workshops WS1: Analysis of Malicious Programs
Chair: Anne-Marie Imafidon, Computer Laboratory, University of Oxford, Oxford
Co-chairs: Chris Imafidon & J. Arreymbi, University of East London and University of
London.
WS2: SECURITY ISSUES IN CLINICAL INFORMATICS
By Chris Imafidon; Former Head, Management of Technology Unit, Queen Mary,
University of London.
Co-Author- Anne-Marie Imafidon, Keble College, University of Oxford, Oxford
17:30-17:45 Coffee Break
6
Session A
17:45-19:45
5012
Faculty of IT
Building 5
GIS, VRS, Internet, Pattern Recognition, Signal Processing, Societal
Innovation Chair: Luis Javier García
1. GIS Based Deployment Strategies of Wireless Sensors Deployment for Forest Fire Surveillance,
Wassim D. Katerji and Hoda W. Maalouf, Department of CS, Notre Dame University Zouk Mikael,
Lebanon.
2. Web virtual reality biology and ecology education helps disabled, Tomaz Amon, Slovenia.
3. Detecting Arabic Web Spam, Heider A. Wahsheh and Mohammed N. Al-Kabi, Yarmouk univ.,
Irbid, Jordan.
4. New Approach for Modifying Blowfish Algorithm Using 4-States keys, Afaf Al-Neaimi and Rehab
F. , AL-Zaytoonah university, Jordan, and University of Technology, Baghdad, Iraq.
5. The Jordanian eGovernment Initiatives within the Context of the Socio-technical Model, Ali Al-
Dahuod1, Rashid Jayousi
2, Luis Javier García Villalba
3 and Cláudia Jacy Barenco Abbas
3, Jordan,
Spain and Palastine.
6. Word-based Handwritten Arabic Scripts Recognition Using Dynamic Bayesian Network, Jawad H
AlKhateeb , Faculty of Science and IT, AlZaytoonah University of Jordan, Jordan.
Session B
17:45-19:45
5011
Faculty of IT
Building 5
Image Processing, Natural Languages, and Neural Networks Chair: Ayman M Abdalla
1. Fractal Image Compression Based On Complex Moments, Huda Al mawee and
Adel Muhsan Al SalMan, Dept. of CS, Al-Mustansiriyah Univ, Iraq.
2. Reduction in classification Errors for Myoelectric control of Hand Movements with Independent
Component Analysis, Ali H. Al-Timemy1, Guido Bugmann
1, Nicholas Outram
2 and Javier Escudero,
School of Computing and Mathematics, Univ. of Plymouth PL4 8AA, United Kingdom.
3. Compression transformation for small text_les, Jan Plato_s, Dept.of CS, FEIVSB - Technical Univ.
of Ostrava, Ostrava-Poruba, Czech Republic.
4. Embedded Multiprocessors Vocal Command system, a way to Improve the Tele-Control of a
didactic Manipulator Arm, Mohamed Fezari, Hamza Atoui and Ali Al-Dahoud, Univ. of Annaba,
Laboratory of Automatic and Signals Annaba.
5. Backpropagation Neural Network Algorithm for Forecasting Soil Temperatures Considering Many
Aspects: A Comparison of Different Approaches, Shahlla A. AbdAlKader1 and Omaima AL-Allaf
2,
1Foundation of Technical Education, Ministry of Higher Education,Mosul-Iraq and
2Faculty of
Science and IT, AlZaytoonah Univ. of Jordan, Amman-Jordan.
6. Analysis of Feed Point Coordinates of A Coaxial Feed Rectangular Microstrip Antenna Using
Mlpffbp Artificial Neural Network, V. V. Thakare1
and P. K. Singhal2, Madhav Institute of
Technology & Science, India.
7
Session C
17:45-19:45
5007
Faculty of IT
Building 5
Simulation and Data Base & Data Mining Chair: Ivan Lukovic
1. COMPUTER SIMULATION OF ARMED MOBILE PLATFORM GROUP SWARMING, Radomir
Janković, Union Univ.School of Computing, BELGRADE, SERBIA.
2. Human Resource Influence for Vehicle Fleet Management in Discrete Transport Systems, Jacek
Mazurkiewicz and Tomasz Walkowiak, Wroclaw Univ. of Technology, Wroclaw, Poland.
3. Dependability Model of a Discrete Transport System, Wojciech Zamojski#1
, Jacek Mazurkiewicz#2
,
and Katarzyna Michalska, Institute of Computer Engineering, Control and Robotics, Wroclaw
University of Technology, Poland.
4. Data-Mining Prefetching Algorithm for Hybrid Storage Systems, Mais Nijim, Dept. of Electrical
Engineering and CS, Texas A&M-Kingsville, Kingsville, TX, USA.
5. An Approach to Generating Server Implementation of the Inverse Referential Integrity Constraints,
Slavica Aleksic, Sonja Ristic*, and Ivan Lukovic, Univ. of Novi Sad, Faculty of Technical Sciences,
Novi Sad, Serbia.
6. Application of Data Mining Techniques for Improving Software Engineering, 2
Pey Ven Low, 3
Lee
Koon Ng, 4
Zhen Li Ong, and 1
Wahidah Husain , Universiti Sains Malaysia.
Session D
17:45-19:45
5010
Faculty of IT
Building 5
Workshops
WS1: Special Workshop on Information Security
Invited Speakers: Johnnes Arreymbi, Babatunde Ali-Alao
Confirmed Instructors: Alain Mbe, Idrissa Kargbo
WS2: Workshop on e-governance (ICIT- WEG)
Invited Speakers: Babatunde Ali-Alao, Johnnes Arreymbi. Emerging security Technologies
ePomaG consultancy London UK, University of East London.
Confirmed Instructors: Idrissa K. Kargbo, Alain Mbe, University of East London
20:00-21:00
Dinner
Thursday May 12th
, 2011
9:00-9:40
Conference Hall
Faculty of IT
Building 5
Keynote Speech
Chair: Mahmoud Iskandarani
Title: Parallel computing and it’s relevance to computational biology
By: Professor Rosni Abdullah
University Sains Malaysia, Malaysia
8
Session A
9:45-11:45
5012
Faculty of IT
Building 5
Knowledge Management and E-Education (2) Chair: Feras Alazzeh
1. A 902-928 Mhz Pll Design And Simulation For Biomedical Applications, Diary R. Sulaiman,
Univ. of Salahaddin– Hawler, College of Eng., Dept. of Electrical Engineering, Erbil, Iraq.
2. A Case Study for Developing an RFID Based Smart Health Centre in Iraq, Fawzi M Al-Naima
and Marwa M Talib, Nahrain Univ., Baghdad, Iraq.
3. Detection of Breast Abnormalities via Fisher Linear Discriminant and Nearest Neighbor
Classifier, IKHLAS ABDEL-QADER1
, MEMUNA SARFAZ2
, FADI ABU-AMARA3
, Al-
Hussein Bin Talal Univ., Western Michigan University, USA.
4. UTILISING AN INTRANET FOR KNOWLEDGE-SHARING: SURVEY OF A SELECTED
ORGANISATION IN SOUTH AFRICA, Udo Richard Averweg, eThekwini Municipality and
University of KwaZulu-Natal, Durban, South Africa.
5. Mobile TV: Cultural Based Design Evaluation, Menandros Apostolidis and Maaruf Ali, Arx.net
s.a. , Greece and Oxford Brookes Univ., UK
6. An Application of Educational Data Mining Techniques at Faculty of Technical Sciences in
Novi Sad, Vladimir Ivančević, Milan Čeliković, Slavica Aleksić, and Ivan Luković*, University
of Novi Sad, Serbia.
Session B
9:45-11:45
5009
Faculty of IT
Building 5
Parallel & Distributed Systems Chair: Yoshiro Imai
1. APPLICATION OF PARALLEL COMPUTING TO PRACTICAL COMPUTER EDUCATION
Trial Evaluation through Parallel Programming Exercises, Keiichi Shiraishi and Yoshiro Imai,
Kagawa National College of Technology, Information Technology Center & Graduate School of
Eng., Kagawa Univ., Japan
2. A Multi Agents Approach for the Complex Systems Diagnosis, Ramdane MAAMRI, Khaled
ALLEM, and Zaidi SAHNOUNE, LIRE Laboratory, Mentouri Univ. of Constantine, Algeria.
3. Resource Co-Allocation Algorithms in Distributed Job Batch Scheduling, Victor V. Toporkov,
Alexander Bobchenkov, Dmitry Emelyanov, and Anna Toporkova, CS Dept., Moscow Power
Eng. Institute, Russia.
4. Integrating mobile Application for distributed Environment, Zawawi Ismail and other, UITM,
Malysia
5. An Efficient MPI-Based Parallel Wave-Equation FDTD Algorithm for Dispersive
Electromagnetic Applications, Omar Ramadan, Computer Eng. Dept., Eastern Mediterranean
Univ. Gazi Magusa, Turkey.
6. Optimum Execution for Wienk using Parallel Programming Models (Comparison Study), Areej
Mustafa, Mahmoud Jabir, Rezek Mohammad and Rashid Jayousi, Al-Quds univ., Palestine.
9
Session C
9:45-11:45
5011
Faculty of IT
Building 5
Hardware and Information Systems Chair: Emad Abu-Shanab
1. Extended Model Driven Architecture to B Method, Ammar Aljer and Philippe Devienne, Aleppo
Univ., Aleppo, Syria Lille CS Laboratory (LIFL), and Univ. of Science and Technology of Lille
(USTL), France.
2. RULE-BASED ENGINE TO IMPROVE IT STUDENTS ACADEMIC STANDING, 1Inurina
Ibrahim, 2Hana Munira Muhd Mukhtar, and
3Husna Sarirah Husin, Malaysian Institute of
Information Technology, Universiti Kuala, Lumpur.
3. H-SR-ARQ system using a hardware accelerated algorithm implemented on FPGA, Constantin
ANTON, Laurenţiu Ionescu, Ion TUTĂNESCU, Alin MAZĂRE, and Gheorghe ŞERBAN ,
Univ. of Piteşti, Romania.
4. An Information System for a Sensor-Based Bridge Health Monitoring System, Osama
Abudayyeh, Upul Attanayake, Ikhlas Abdel-Qader, Haluk, Aktan, Eyad Almaita, and Joseph
Barbera, Western Michigan Univ., Kalamazoo, MI 49008.
5. Workflow Wrapper for Unstructured Workflows, Boris Milašinović, and Krešimir Fertalj,
Faculty of Electrical Engineering and Computing, Univ. of Zagreb, Croatia.
6. Reengineering E-government Projects: Gender Digital Divide perspective – The Case of Jordan,
Boran Rababah and Emad Abu-Shanab, CADER, Jordan and Yarmouk University, Jordan.
7. Improving Dependability of Complex Information Systems by Fast Service Relocation, D.
Caban and T. Walkowiak, Wroclaw Univ. of Technology Institute of Computer Eng, Control
and Robotics, Poland.
Session D
9:45-11:45
5007
Faculty of IT
Building 5
Computer Networks and E-Education (1) Chair: Fouad Qirem
1. WS-NEXT, A Web Services Network Extractor Toolkit, Chantal Cherifi, Yvan Rivierre, and
Jean-François Santucci , Joseph Fourier University, and Corsica University, France.
2. Bluetooth Based Control Panel for Smart Home Application, Herdawatie Abdul Kadir, Mohd
Helmy Abd Wahab, Lam Kah Hoe, Zarina Tukiran, Nor’aisah Sudin, and Ariffin Abdul
Mutalib, Univ. Tun Hussein Onn Malaysia, Johor, Malaysia.
3. Spatial and Energy Distributed Routing in Wireless Sensors Network, Jan Nikodem, Maciej
Nikodem, Marek Woda, and Ryszard Klempous, Dept. of Electronics, Wroclaw Univ. of
Technology, Poland.
4. Issues Towards Utilization of Fiber Optic Communication: The Case of SEACOM Submarine
Fiber Optic Cable in Tanzania, Msangawale Arbogast Otaigo Elias
and Koloseni Daniel , Dept.
of Information Technology, The Institute of Finance Management, Dar es Salaam, Tanzania.
5. An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks, Julián
García Matesanz, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, and José René
Fuentes Cortez, Universidad Complutense de Madrid (UCM).
6. Students Learning Styles Classification For e-Education, Marek Woda #1
, and Konrad Kubacki-
Gorwecki, Institute of Computer Eng., Control and Robotics, Wroclaw University of
Technology
Wybrzeże Wyspiańskiego, Poland.
10
11:45-12:00 Coffee Break
Session A
12:00-13:20
5012
Faculty of IT
Building 5
E-Commerce Chair: Maria Antonina Mach
1. Nonlinear Time Structures for Economic Reality Desription – a Survey, Maria Antonina Mach,
Univ. of Economics, Wroclaw, Poland.
2. The Prospects and Barriers of E-Commerce Implementation in Tanzania, George S. Oreku,
Fredrick J. Mtenzi and Al-Dahoud Ali, Dar es salaam, Tanzania, Dublin Institute of Technology,
Dublin 8, Ireland.
3. A BPA-Based Approach for the Identification of SOA Candidate Software Services, Rana
Yousef and Mohammed Odeh, University of Jordan, Jordan and the Univ. of the West of
England.
4. Using Biometrics to Improve Internet E-Business Security: A New Approach, J. Arreymbi1, V.
Odiah, A. Ijeh, and Ali A. Babatunde, School of Computing, IT & Eng., Univ. of East London,
UK.
5. E-Government – The Jordanian Experience, Issa S. I. Ottoum, Rose E. S. Suleiman,
Alzaytoonah University of Jordan, Solihull College, Solihull, United Kingdom
Session B
12:00-13:20
5011
Faculty of IT
Building 5
E-Education (2) Chair: Mirjana Ivanović
1. Design of E-Portfolio System’s Modelwith Artificial Intelligence Traits, Aleksandrs Gorbunovs,
Riga Technical University, LATVIA
2. Building a SOA ontology for universities websites, Jehad Omari, Ahmed Eroud, and Izzat
Alsmadi, CIS department, Yarmouk University. Jordan.
3. System for Testing Different Kinds of Students’ Programming Assignments, Ivan Pribela,
Mirjana Ivanović and Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of
Science, Univ. of Novi Sad, Serbia.
4. E-learning in Jordanian Universities, the Case of Al-Hashemite University, Emad Abu-Shanab
and Yousra Harb, Yarmouk University, Jordan.
11
Session C
12:00-13:20
5011
Faculty of IT
Building 5
E-Education (3) Chair: Maqbool Uddin Shaikh
1. Ontology-Based Architecture for Providing Recommendation in Java Tutoring System, Boban
Vesin, Aleksandra Klasnja-Milicevica, Mirjana Ivanovic
b and Zoran Budimac
b,
aHigher School
of Professional Business Studies, bFaculty of Science, Dept. of Mathematics and Informatics,
Novi Sad, Serbia.
2. Accreditation and Academic Audit Strategies for the Information Technology Faculties in
Jordan, Ahlam Alsmadi, and Emad Abu Shanab, Yarmouk University, Jordan.
3. Using Trained Matrix Technique For Acceptance Tests In Agility WEB Programming
Methodologies, Belal Ayyoub, Al-Balqa’a Applied Univ.- Faculty of Eng. Technology -
Computer Eng. Dept., Jordan.
4. Proposed Architecture for e - Learning System Incorporating Industrial and Academic
Requirements, Maqbool Uddin Shaikh, CS Dept.COMSATS Institute of Information
Technology, Islamabad, Pakistan.
Session D
12:00-13:20
5009
Faculty of IT
Building 5
Artificial Intelligence Chair: Rashid Jayousi
1. CUT APPROACH TO CLOSEDNESS UNDER FUZZY RELATIONS: THEORETICAL
BASICS AND APPLICATIONS IN ARTIFICIAL INTELLIGENCE, Jorge Jim´enez, Susana
Montes, Branimir ˇSeˇselja and Andreja Tepavˇcevi´, Campus de Viesques. University of
Oviedo, 33203 Gij´on, Spain.
2. Cuts of blocks of fuzzy relations and application in fuzzy databases, Branimir ˇSeˇselja,
Vladim´ır Janiˇs, Pavol Kral, Magdalena Renˇcova, and Andreja Tepavˇcevi, Matej Bel Univ.,
Bansk´a Bystrica, Slovak Republic.
3. Syntactic Sugar Programming Languages' Constructs-Preliminary Study, Mustafa Al-Tamim and
Rashid Jayousi, Dept. of CS, Al-Quds University, Jerusalem, Palestine.
4. Intelligent Air Conditioner System: User Acceptance Level of ICONS and Cost Saving Analysis,
Lim Seng Chee, Faten Damanhoori, Norlia Mustaffa, and Wahidah Husain, Univ. Sains
Malaysia.
13:20-14:20
Conference Hall
Faculty of IT
Building 5
Closing Session
14:30-15:30 Lunch: Main Restaurant
20:00-22:00 Dinner: Jerash Old City
Departure from the hotel at 7:00 PM
Friday May 13th
, 2011
Free Time
12
Al-Zaytoonah University of Jordan (henceforth, ZUJ) was established in 1993 after receiving its
license and general accreditation by Decision No. 848 on
March 6, 1993. Instruction began on September 6, 1993, and
since then Al-Zaytoonah has witnessed considerable
progress, at both the infrastructure and academic levels. It
now includes seven faculties, encompassing 21
undergraduate specializations and one graduate program.
Al-Zaytoonah University of Jordan is now a member of the
following unions and associations:
1. Union of Arab Universities
2. Union of Arab & European Universities
3. International Union of Universities
4. Union of Islamic World Universities
5. Association of Private Institutions for Higher Education
Al-Zaytoonah campus is distinguished by a wonderful site
overlooking Queen Alia International Airport Highway, and is
characterized by beautiful architectural features. It is only 15 km
south of the center of Amman, the capital of Jordan, and its
premises stretch over a total area of approximately 220,000 sq. m
The Faculty of Science and Information Technology was established in 1993. It offers the Bachelor of
Science degree in the following specializations:
Mathematics and Natural Science
Computer Science
Computer Information Systems
Software Engineering
Computer Networks
Multimedia Systems
The 5th
International Conference is a clear evidence of how far the Faculty of Science and
Information Technology has come in organizing conferences with high quality research
discussing advanced topics in the diverse areas of Information Technology and its
applications.
The 5th
conference reflects the high standards and the advanced level the Faculty of Science
and Information Technology has reached with the support of Alzaytoonah University of
Jordan.