preface general chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 tuesday...

12
1

Upload: others

Post on 22-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

1

Page 2: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

2

Preface – General Chair

Dear Colleagues,

It gives me a great pleasure to welcome you to the 5th

International Conference in

Information Technology ICIT2011, hosted by the Faculty of Science and Information

Technology.

Research papers authored by scientists from all over the world are received by the organizing committee of the

conference. The submitted papers covered wide range of important topics in Information Technology and its

applications.

The refereed articles are organized under the following streams:

Database & Data Mining

Artificial Intelligence

Computer Networks & Communications

Computer Architecture

Parallel & Distributed Systems

Internet & its Applications

Multimedia & Visual Programming

Image and signal Processing

Information Systems

Human Computer Interface

Virtual Reality Systems

E-Commerce

Computer and network Security

Software Engineering

Distance Learning and e-education

Algorithms & Applications

Neural Networks

Computer Simulation

Natural Language Processing

Machine Learning

Aspect Oriented Software Development AOSD

Pattern Recognition

Information Security (Communication

Security/Network Security/Data Security)

GIS Technology and Application

Hardware Computer Design

Media and Societal Innovation

E-Education

Cyber Physical Systems

All submitted papers were refereed by anonymous referees in the filed of specialization, were some of the

research papers improved significantly based on the recommendation of the referees, to whom we would like to

thank for all their efforts.

I would like to express my appreciation to the conference committee and to everyone who contributed in the

preparation for the conference and thank them for all their handwork.

My greatest gratitude goes to all the authors that had the confidence in the quality of our conference and the

high standards it pertains and submitted their valuable work to be presented and published. For those authors

whom we did not accept their contribution, we wish them well and hope that the referees comments helped

them in producing an even better work in the future.

Thank you

Dr. Abdelfatah Aref Tamimi

Dean and Conference General Chair

Faculty of Science and Information Technology

\[email protected]

Page 3: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

3

Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman

Preconference Workshops

9:00-12:00: Writing Research Grant Proposals:

o How to write research *grant* proposals; Prof. Rosni Abdullah, Universiti Sains Malaysia

o Conducting Literature Review - by Prof Tajudin

12:00-13:00: Supervising Master and PhD degree, Abdel-Badeeh M. Salem, Ain Shams University, Cairo-Egypt:

13:00-14:00: Quality Assurance Perspectives in Higher Education Organizations, Ahmad Dalal’ah,

University of Ha’il, Saudi Arabia

Wednesday May 11th , 2011

8:00 – 8:45 Registration

9:00 – 9:30

Main Stage

Building 1

Opening Session

9:30 – 10:00 Coffee Break

Main Stage

Building 1 10:00–10:40

10:45 –11:30

11:40-12:25

12:30-13:10

13:20-14:00

Keynote Speeches

1. Title: Filling the gap between Simulation and Reality

By: Prof Hans-Dieter Burkhard

Humboldt University Berlin, Germany

Chair: Dr. Al-Dahoud Ali

2. Title: Diffusing ICT Mindfulness

By: Professor Sonny Nwankwo

Director of Research & Enterprise, East London University, UK

Chair: Nadim Obeid

3. Title: The Fractal Nature of Internet Traffic

By: Maaruf Ali

SMIEEE, FHEA(UK), UK

Chair: Mohammad Bilal Al-Zaubi

4. Title: Cognitive Biometrics: a Biosignal Based Approach to Person Authentication

By: Kenneth Revett,

British University in Egypt

Chair: Ismail M. Ababneh

5. Title: How Trust affects Internet Security

By: Johnnes ARREYMBI,

University of East London, UK

Chair: Fawaz AL Zaghoul

Page 4: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

4

14:00– 15:30 Lunch : Main Restaurant

Session A 15:30-17:30

Room 5012

Faculty of IT

Building 5

Algorithms and Applications Chair: Afaf Al-Neaimi

1. Accuracy Measures for the Comparison of Classifiers, Vincent Labatut and Hocine Cherifi,

Galatasaray University, Turkey, University of Burgundy, France.

2. Artificial Bee Colony Algorithm for Curriculum Based Course Timetabling Problem, Asaju La’aro

Bolajia , Ahamad Tajudin Khadera ,Mohammed Azmi Al-betara , Mohammed Awadallaha, Al-

Zaytoonah University and a School of Computer Sciences, Universiti Sains Malaysia.

3. Application of Continuous Genetic Algorithm For Second-Order Singular Boundary Value

Problems, Omar Abu Arqub, Zaer Abo-Hammour, Hassan Rashaideh, Dept. of Applied Science, Al-

Balqa.Applied University.

4. Analysis of Feature Selection and Classification Techniques on Microarray Data, Colin Giles, Ryan

Wakelam, Sean Malone, Ghada Naji, Mohamad Naji, Tansel Ozyer, Reda Alhajj, Jon Rokne, Dept.

of CS, University of Calgary, Calgary, Alberta, Canada.

5. On Application of Ditance-Like Algorithms to Eevent Detection From Non-Stationary Time Series,

Tomasz Pelech-Pilichowki, AGH-University of Science and Technology, Krakow, Poland.

6. Applying GA to find Minimum Cost Routes between existing nodes in Different Network Models,

Ahmad Al-Sayaad, Abeer Abu-Sultan, Zakaria Zayed, Deena Abu-Sultan, XIS Solutions, Kuwait.

Session B

15:30-17:30

Room 5011

Faculty of IT

Building 5

Security (Communication Security/Network Security/Data Security) Chair: : Ion Tutanescu

1. Use of Elliptic Curves Cryptosystems in Information Security, Ion Tutanescu and Constantin A.,

University of Piteşti, Romania.

2. How SAGE helps to implement Goppa Codes and McEliece PKCSs, Thomas Risse, Institute of

Informatics & Automation, Faculty E & I, Hochschule Bremen, University of Applied Sciences

3. Applying the Software Engineering Principles in Building a Secure Software, Huda Abdulaali

AL_Amwee, Computer Science Dept., Al-Mustenseria University, Iraq.

4. Implementing Serpent Cipher in Field Programmable Gate Arrays, Jaroslaw Sugier, Wroclaw

University of Technology, Wroclaw, Poland.

5. IEEE 802.21 Information Service: Features and Implementation Issues, Fábio Buiati, Ismail Saadat,

Delfín Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM),

Spain.

6. Overview of IEEE 802.21 Security Issues for MIH Networks, Ismail Saadat, Fábio Buiati, Delfín

Rupérez Cañas, Luis Javier García Villalba, Universidad Complutense de Madrid (UCM), Spain.

Page 5: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

5

Session C

15:30-17:30

Room 5007

Faculty of IT

Building 5

Software Engineering Chair: Mohammad Muharait

1. A Model Transformation approach Based on Homomorphic Mappings between UML Activity

Diagrams and BPEL4WS Specifications of Grid Service Workflows, Yousra Bendaly Hlaoui and

Leila Jemni Benayed, Research Unit in Technologies of Information and Communication, Tunisia.

2. Problems In Systematic Application Of Software Metrics And Possible Solution, Gordana Rakić and

Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of Sciences, Univ. of Novi Sad

3. Explore Developers and Users Communication Strategic to Reach a Share Understanding of

Requirements: Nonverbal Channels Perspective, Issam Jebreen, School of Comp. & Math Sciences,

AUT Univ., New Zealand.

4. Is Cloud Computing Ready for Critical Applications, Fredrick Japhet Mtenzi, Dublin Institute of

Technology, Irland.

5. A Tree Based Strategy for Interaction Testing, Mohammad F. J. Klaib1, Sangeetha Muthuraman

2,

and Noraziah Ahmad3, Jadara University, Irbid- Jordan, And Malysia.

6. Generation of Test Cases From Websites User Sessions, Sanaa Alsmadi, Izzat Alsmadi and

Mohammed Al-Kabi, Yarmouk University,Irbid, Jordan.

Session D

15:30-17:30

5010

Faculty of IT

Building 5

Workshops WS1: Analysis of Malicious Programs

Chair: Anne-Marie Imafidon, Computer Laboratory, University of Oxford, Oxford

Co-chairs: Chris Imafidon & J. Arreymbi, University of East London and University of

London.

WS2: SECURITY ISSUES IN CLINICAL INFORMATICS

By Chris Imafidon; Former Head, Management of Technology Unit, Queen Mary,

University of London.

Co-Author- Anne-Marie Imafidon, Keble College, University of Oxford, Oxford

17:30-17:45 Coffee Break

Page 6: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

6

Session A

17:45-19:45

5012

Faculty of IT

Building 5

GIS, VRS, Internet, Pattern Recognition, Signal Processing, Societal

Innovation Chair: Luis Javier García

1. GIS Based Deployment Strategies of Wireless Sensors Deployment for Forest Fire Surveillance,

Wassim D. Katerji and Hoda W. Maalouf, Department of CS, Notre Dame University Zouk Mikael,

Lebanon.

2. Web virtual reality biology and ecology education helps disabled, Tomaz Amon, Slovenia.

3. Detecting Arabic Web Spam, Heider A. Wahsheh and Mohammed N. Al-Kabi, Yarmouk univ.,

Irbid, Jordan.

4. New Approach for Modifying Blowfish Algorithm Using 4-States keys, Afaf Al-Neaimi and Rehab

F. , AL-Zaytoonah university, Jordan, and University of Technology, Baghdad, Iraq.

5. The Jordanian eGovernment Initiatives within the Context of the Socio-technical Model, Ali Al-

Dahuod1, Rashid Jayousi

2, Luis Javier García Villalba

3 and Cláudia Jacy Barenco Abbas

3, Jordan,

Spain and Palastine.

6. Word-based Handwritten Arabic Scripts Recognition Using Dynamic Bayesian Network, Jawad H

AlKhateeb , Faculty of Science and IT, AlZaytoonah University of Jordan, Jordan.

Session B

17:45-19:45

5011

Faculty of IT

Building 5

Image Processing, Natural Languages, and Neural Networks Chair: Ayman M Abdalla

1. Fractal Image Compression Based On Complex Moments, Huda Al mawee and

Adel Muhsan Al SalMan, Dept. of CS, Al-Mustansiriyah Univ, Iraq.

2. Reduction in classification Errors for Myoelectric control of Hand Movements with Independent

Component Analysis, Ali H. Al-Timemy1, Guido Bugmann

1, Nicholas Outram

2 and Javier Escudero,

School of Computing and Mathematics, Univ. of Plymouth PL4 8AA, United Kingdom.

3. Compression transformation for small text_les, Jan Plato_s, Dept.of CS, FEIVSB - Technical Univ.

of Ostrava, Ostrava-Poruba, Czech Republic.

4. Embedded Multiprocessors Vocal Command system, a way to Improve the Tele-Control of a

didactic Manipulator Arm, Mohamed Fezari, Hamza Atoui and Ali Al-Dahoud, Univ. of Annaba,

Laboratory of Automatic and Signals Annaba.

5. Backpropagation Neural Network Algorithm for Forecasting Soil Temperatures Considering Many

Aspects: A Comparison of Different Approaches, Shahlla A. AbdAlKader1 and Omaima AL-Allaf

2,

1Foundation of Technical Education, Ministry of Higher Education,Mosul-Iraq and

2Faculty of

Science and IT, AlZaytoonah Univ. of Jordan, Amman-Jordan.

6. Analysis of Feed Point Coordinates of A Coaxial Feed Rectangular Microstrip Antenna Using

Mlpffbp Artificial Neural Network, V. V. Thakare1

and P. K. Singhal2, Madhav Institute of

Technology & Science, India.

Page 7: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

7

Session C

17:45-19:45

5007

Faculty of IT

Building 5

Simulation and Data Base & Data Mining Chair: Ivan Lukovic

1. COMPUTER SIMULATION OF ARMED MOBILE PLATFORM GROUP SWARMING, Radomir

Janković, Union Univ.School of Computing, BELGRADE, SERBIA.

2. Human Resource Influence for Vehicle Fleet Management in Discrete Transport Systems, Jacek

Mazurkiewicz and Tomasz Walkowiak, Wroclaw Univ. of Technology, Wroclaw, Poland.

3. Dependability Model of a Discrete Transport System, Wojciech Zamojski#1

, Jacek Mazurkiewicz#2

,

and Katarzyna Michalska, Institute of Computer Engineering, Control and Robotics, Wroclaw

University of Technology, Poland.

4. Data-Mining Prefetching Algorithm for Hybrid Storage Systems, Mais Nijim, Dept. of Electrical

Engineering and CS, Texas A&M-Kingsville, Kingsville, TX, USA.

5. An Approach to Generating Server Implementation of the Inverse Referential Integrity Constraints,

Slavica Aleksic, Sonja Ristic*, and Ivan Lukovic, Univ. of Novi Sad, Faculty of Technical Sciences,

Novi Sad, Serbia.

6. Application of Data Mining Techniques for Improving Software Engineering, 2

Pey Ven Low, 3

Lee

Koon Ng, 4

Zhen Li Ong, and 1

Wahidah Husain , Universiti Sains Malaysia.

Session D

17:45-19:45

5010

Faculty of IT

Building 5

Workshops

WS1: Special Workshop on Information Security

Invited Speakers: Johnnes Arreymbi, Babatunde Ali-Alao

Confirmed Instructors: Alain Mbe, Idrissa Kargbo

WS2: Workshop on e-governance (ICIT- WEG)

Invited Speakers: Babatunde Ali-Alao, Johnnes Arreymbi. Emerging security Technologies

ePomaG consultancy London UK, University of East London.

Confirmed Instructors: Idrissa K. Kargbo, Alain Mbe, University of East London

20:00-21:00

Dinner

Thursday May 12th

, 2011

9:00-9:40

Conference Hall

Faculty of IT

Building 5

Keynote Speech

Chair: Mahmoud Iskandarani

Title: Parallel computing and it’s relevance to computational biology

By: Professor Rosni Abdullah

University Sains Malaysia, Malaysia

Page 8: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

8

Session A

9:45-11:45

5012

Faculty of IT

Building 5

Knowledge Management and E-Education (2) Chair: Feras Alazzeh

1. A 902-928 Mhz Pll Design And Simulation For Biomedical Applications, Diary R. Sulaiman,

Univ. of Salahaddin– Hawler, College of Eng., Dept. of Electrical Engineering, Erbil, Iraq.

2. A Case Study for Developing an RFID Based Smart Health Centre in Iraq, Fawzi M Al-Naima

and Marwa M Talib, Nahrain Univ., Baghdad, Iraq.

3. Detection of Breast Abnormalities via Fisher Linear Discriminant and Nearest Neighbor

Classifier, IKHLAS ABDEL-QADER1

, MEMUNA SARFAZ2

, FADI ABU-AMARA3

, Al-

Hussein Bin Talal Univ., Western Michigan University, USA.

4. UTILISING AN INTRANET FOR KNOWLEDGE-SHARING: SURVEY OF A SELECTED

ORGANISATION IN SOUTH AFRICA, Udo Richard Averweg, eThekwini Municipality and

University of KwaZulu-Natal, Durban, South Africa.

5. Mobile TV: Cultural Based Design Evaluation, Menandros Apostolidis and Maaruf Ali, Arx.net

s.a. , Greece and Oxford Brookes Univ., UK

6. An Application of Educational Data Mining Techniques at Faculty of Technical Sciences in

Novi Sad, Vladimir Ivančević, Milan Čeliković, Slavica Aleksić, and Ivan Luković*, University

of Novi Sad, Serbia.

Session B

9:45-11:45

5009

Faculty of IT

Building 5

Parallel & Distributed Systems Chair: Yoshiro Imai

1. APPLICATION OF PARALLEL COMPUTING TO PRACTICAL COMPUTER EDUCATION

Trial Evaluation through Parallel Programming Exercises, Keiichi Shiraishi and Yoshiro Imai,

Kagawa National College of Technology, Information Technology Center & Graduate School of

Eng., Kagawa Univ., Japan

2. A Multi Agents Approach for the Complex Systems Diagnosis, Ramdane MAAMRI, Khaled

ALLEM, and Zaidi SAHNOUNE, LIRE Laboratory, Mentouri Univ. of Constantine, Algeria.

3. Resource Co-Allocation Algorithms in Distributed Job Batch Scheduling, Victor V. Toporkov,

Alexander Bobchenkov, Dmitry Emelyanov, and Anna Toporkova, CS Dept., Moscow Power

Eng. Institute, Russia.

4. Integrating mobile Application for distributed Environment, Zawawi Ismail and other, UITM,

Malysia

5. An Efficient MPI-Based Parallel Wave-Equation FDTD Algorithm for Dispersive

Electromagnetic Applications, Omar Ramadan, Computer Eng. Dept., Eastern Mediterranean

Univ. Gazi Magusa, Turkey.

6. Optimum Execution for Wienk using Parallel Programming Models (Comparison Study), Areej

Mustafa, Mahmoud Jabir, Rezek Mohammad and Rashid Jayousi, Al-Quds univ., Palestine.

Page 9: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

9

Session C

9:45-11:45

5011

Faculty of IT

Building 5

Hardware and Information Systems Chair: Emad Abu-Shanab

1. Extended Model Driven Architecture to B Method, Ammar Aljer and Philippe Devienne, Aleppo

Univ., Aleppo, Syria Lille CS Laboratory (LIFL), and Univ. of Science and Technology of Lille

(USTL), France.

2. RULE-BASED ENGINE TO IMPROVE IT STUDENTS ACADEMIC STANDING, 1Inurina

Ibrahim, 2Hana Munira Muhd Mukhtar, and

3Husna Sarirah Husin, Malaysian Institute of

Information Technology, Universiti Kuala, Lumpur.

3. H-SR-ARQ system using a hardware accelerated algorithm implemented on FPGA, Constantin

ANTON, Laurenţiu Ionescu, Ion TUTĂNESCU, Alin MAZĂRE, and Gheorghe ŞERBAN ,

Univ. of Piteşti, Romania.

4. An Information System for a Sensor-Based Bridge Health Monitoring System, Osama

Abudayyeh, Upul Attanayake, Ikhlas Abdel-Qader, Haluk, Aktan, Eyad Almaita, and Joseph

Barbera, Western Michigan Univ., Kalamazoo, MI 49008.

5. Workflow Wrapper for Unstructured Workflows, Boris Milašinović, and Krešimir Fertalj,

Faculty of Electrical Engineering and Computing, Univ. of Zagreb, Croatia.

6. Reengineering E-government Projects: Gender Digital Divide perspective – The Case of Jordan,

Boran Rababah and Emad Abu-Shanab, CADER, Jordan and Yarmouk University, Jordan.

7. Improving Dependability of Complex Information Systems by Fast Service Relocation, D.

Caban and T. Walkowiak, Wroclaw Univ. of Technology Institute of Computer Eng, Control

and Robotics, Poland.

Session D

9:45-11:45

5007

Faculty of IT

Building 5

Computer Networks and E-Education (1) Chair: Fouad Qirem

1. WS-NEXT, A Web Services Network Extractor Toolkit, Chantal Cherifi, Yvan Rivierre, and

Jean-François Santucci , Joseph Fourier University, and Corsica University, France.

2. Bluetooth Based Control Panel for Smart Home Application, Herdawatie Abdul Kadir, Mohd

Helmy Abd Wahab, Lam Kah Hoe, Zarina Tukiran, Nor’aisah Sudin, and Ariffin Abdul

Mutalib, Univ. Tun Hussein Onn Malaysia, Johor, Malaysia.

3. Spatial and Energy Distributed Routing in Wireless Sensors Network, Jan Nikodem, Maciej

Nikodem, Marek Woda, and Ryszard Klempous, Dept. of Electronics, Wroclaw Univ. of

Technology, Poland.

4. Issues Towards Utilization of Fiber Optic Communication: The Case of SEACOM Submarine

Fiber Optic Cable in Tanzania, Msangawale Arbogast Otaigo Elias

and Koloseni Daniel , Dept.

of Information Technology, The Institute of Finance Management, Dar es Salaam, Tanzania.

5. An Improved Buddy System Auto-Configuration Protocol for Mobile Ad Hoc Networks, Julián

García Matesanz, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, and José René

Fuentes Cortez, Universidad Complutense de Madrid (UCM).

6. Students Learning Styles Classification For e-Education, Marek Woda #1

, and Konrad Kubacki-

Gorwecki, Institute of Computer Eng., Control and Robotics, Wroclaw University of

Technology

Wybrzeże Wyspiańskiego, Poland.

Page 10: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

10

11:45-12:00 Coffee Break

Session A

12:00-13:20

5012

Faculty of IT

Building 5

E-Commerce Chair: Maria Antonina Mach

1. Nonlinear Time Structures for Economic Reality Desription – a Survey, Maria Antonina Mach,

Univ. of Economics, Wroclaw, Poland.

2. The Prospects and Barriers of E-Commerce Implementation in Tanzania, George S. Oreku,

Fredrick J. Mtenzi and Al-Dahoud Ali, Dar es salaam, Tanzania, Dublin Institute of Technology,

Dublin 8, Ireland.

3. A BPA-Based Approach for the Identification of SOA Candidate Software Services, Rana

Yousef and Mohammed Odeh, University of Jordan, Jordan and the Univ. of the West of

England.

4. Using Biometrics to Improve Internet E-Business Security: A New Approach, J. Arreymbi1, V.

Odiah, A. Ijeh, and Ali A. Babatunde, School of Computing, IT & Eng., Univ. of East London,

UK.

5. E-Government – The Jordanian Experience, Issa S. I. Ottoum, Rose E. S. Suleiman,

Alzaytoonah University of Jordan, Solihull College, Solihull, United Kingdom

Session B

12:00-13:20

5011

Faculty of IT

Building 5

E-Education (2) Chair: Mirjana Ivanović

1. Design of E-Portfolio System’s Modelwith Artificial Intelligence Traits, Aleksandrs Gorbunovs,

Riga Technical University, LATVIA

2. Building a SOA ontology for universities websites, Jehad Omari, Ahmed Eroud, and Izzat

Alsmadi, CIS department, Yarmouk University. Jordan.

3. System for Testing Different Kinds of Students’ Programming Assignments, Ivan Pribela,

Mirjana Ivanović and Zoran Budimac, Dept. of Mathematics and Informatics, Faculty of

Science, Univ. of Novi Sad, Serbia.

4. E-learning in Jordanian Universities, the Case of Al-Hashemite University, Emad Abu-Shanab

and Yousra Harb, Yarmouk University, Jordan.

Page 11: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

11

Session C

12:00-13:20

5011

Faculty of IT

Building 5

E-Education (3) Chair: Maqbool Uddin Shaikh

1. Ontology-Based Architecture for Providing Recommendation in Java Tutoring System, Boban

Vesin, Aleksandra Klasnja-Milicevica, Mirjana Ivanovic

b and Zoran Budimac

b,

aHigher School

of Professional Business Studies, bFaculty of Science, Dept. of Mathematics and Informatics,

Novi Sad, Serbia.

2. Accreditation and Academic Audit Strategies for the Information Technology Faculties in

Jordan, Ahlam Alsmadi, and Emad Abu Shanab, Yarmouk University, Jordan.

3. Using Trained Matrix Technique For Acceptance Tests In Agility WEB Programming

Methodologies, Belal Ayyoub, Al-Balqa’a Applied Univ.- Faculty of Eng. Technology -

Computer Eng. Dept., Jordan.

4. Proposed Architecture for e - Learning System Incorporating Industrial and Academic

Requirements, Maqbool Uddin Shaikh, CS Dept.COMSATS Institute of Information

Technology, Islamabad, Pakistan.

Session D

12:00-13:20

5009

Faculty of IT

Building 5

Artificial Intelligence Chair: Rashid Jayousi

1. CUT APPROACH TO CLOSEDNESS UNDER FUZZY RELATIONS: THEORETICAL

BASICS AND APPLICATIONS IN ARTIFICIAL INTELLIGENCE, Jorge Jim´enez, Susana

Montes, Branimir ˇSeˇselja and Andreja Tepavˇcevi´, Campus de Viesques. University of

Oviedo, 33203 Gij´on, Spain.

2. Cuts of blocks of fuzzy relations and application in fuzzy databases, Branimir ˇSeˇselja,

Vladim´ır Janiˇs, Pavol Kral, Magdalena Renˇcova, and Andreja Tepavˇcevi, Matej Bel Univ.,

Bansk´a Bystrica, Slovak Republic.

3. Syntactic Sugar Programming Languages' Constructs-Preliminary Study, Mustafa Al-Tamim and

Rashid Jayousi, Dept. of CS, Al-Quds University, Jerusalem, Palestine.

4. Intelligent Air Conditioner System: User Acceptance Level of ICONS and Cost Saving Analysis,

Lim Seng Chee, Faten Damanhoori, Norlia Mustaffa, and Wahidah Husain, Univ. Sains

Malaysia.

13:20-14:20

Conference Hall

Faculty of IT

Building 5

Closing Session

14:30-15:30 Lunch: Main Restaurant

20:00-22:00 Dinner: Jerash Old City

Departure from the hotel at 7:00 PM

Friday May 13th

, 2011

Free Time

Page 12: Preface General Chairicit.zuj.edu.jo/icit11/data/conference_program_4-5-2011-size.pdf · 3 Tuesday May 10th , 2011 19:00-21:00: Registrations: Dana Plaza Hotel, Amman Preconference

12

Al-Zaytoonah University of Jordan (henceforth, ZUJ) was established in 1993 after receiving its

license and general accreditation by Decision No. 848 on

March 6, 1993. Instruction began on September 6, 1993, and

since then Al-Zaytoonah has witnessed considerable

progress, at both the infrastructure and academic levels. It

now includes seven faculties, encompassing 21

undergraduate specializations and one graduate program.

Al-Zaytoonah University of Jordan is now a member of the

following unions and associations:

1. Union of Arab Universities

2. Union of Arab & European Universities

3. International Union of Universities

4. Union of Islamic World Universities

5. Association of Private Institutions for Higher Education

Al-Zaytoonah campus is distinguished by a wonderful site

overlooking Queen Alia International Airport Highway, and is

characterized by beautiful architectural features. It is only 15 km

south of the center of Amman, the capital of Jordan, and its

premises stretch over a total area of approximately 220,000 sq. m

The Faculty of Science and Information Technology was established in 1993. It offers the Bachelor of

Science degree in the following specializations:

Mathematics and Natural Science

Computer Science

Computer Information Systems

Software Engineering

Computer Networks

Multimedia Systems

The 5th

International Conference is a clear evidence of how far the Faculty of Science and

Information Technology has come in organizing conferences with high quality research

discussing advanced topics in the diverse areas of Information Technology and its

applications.

The 5th

conference reflects the high standards and the advanced level the Faculty of Science

and Information Technology has reached with the support of Alzaytoonah University of

Jordan.