!ﻛﻷ% &ﺎﻣﻠﻌﻣﻟ% ﺎ-ﺟ)ﻟ)ﻧﻛﺗ) &ﻻﺎﺻﺗﻹ% -4)...
TRANSCRIPT
تحتت ررعايیة معالي ووززيیرر ااإلتصاالتت ووتكنوولووجيیا االمعلووماتت ااألكررمم تنظظمم كليیة تكنوولووجيیا االمعلووماتت
"االتووجهھاتت االحدديیثة لتكنوولووجيیا االمعلووماتت االعلمي "مؤؤتمرراال جامعة االعلوومم االتططبيیقيیة ٬،قصرر االمؤؤتمررااتت في
10/12/2014ااألرربعاء
االفعاليیة االووقتت
ااإلستقبالل وواالتسجيیلل 08:30 – 10:00 منن االذذكرر االحكيیمم عططررةة ااإلفتتاحح مع آآيیاتت 10:00 – 10:10
كلمة ااألستاذذ االددكتوورر محفووظظ جووددةة ررئيیسس االجامعة 10:10 – 10:30 كلمة عميیدد االبحثث االعلمي وواالددررااساتت االعليیا ااألستاذذ االددكتوورر مصباحح عقلل 10:30 – 10:45
جامعة عمانن االعرربيیة . مامي ٬،حاالمتحددثث للمؤؤتمرر ااألستاذذ االددكتوورر عالء االإإلقاء محاضررةة 10:45 – 11:45 إإستررااحة 11:45 – 12:00
/ عضوو هھھھيیئة االتددرريیسس في االعانيإإلقاء محاضررةة االمتحددثث االثاني للمؤؤتمرر ااألستاذذ االددكتوورر مززهھھھرر جامعة ااألنبارر االعررااقيیة
12:00 – 12:45
٢۲٠۰١۱٥االذذيي تعقددهه االكليیة في شهھرر آآذذاارر CSIT 2015نبذذةة عنن مؤؤتمرر 12:45 – 13:00 غددااء للضيیووفف وواالمشارركيینن 13:00 – 14:00 نددووااتت للططلبة منن شرركاتت:
ااالررددنن Microsoftشرركة • Aspireشرركة • Telepropeشرركة •
13:00- 14:30
محاضررااتت االمشارركيینن في االمؤؤتمرر في قاعتي عمانن وواالقددسس في قصرر االمؤؤتمررااتت حسبب االجددوولل االتفصيیلي
14:00- 15:30
إإستررااحة 15:30- 15:45 متابعة محاضررااتت االمشارركيینن في االمؤؤتمرر في قاعتي عمانن وواالقددسس في قصرر االمؤؤتمررااتت حسبب
االجددوولل االتفصيیلي15:45- 17:30
-17:30 ووجباتت خفيیفيیة (عشاء) 18:00
The Detailed Program of the Modern Information Technology Trends (MITT)
At Conference Palace of Applied Science University
On Wednesday 10th December 2014
Time 08:30 -‐ 10:00 Reception and Registration 10:00 -‐ 10:10 Opening with the Holy Quran
10:10 -‐ 10:30
Prof. Mahfouz Judeh President of the Applied Science University Speech
10:30 – 10:45
Prof. Musbah Aqel, Dean of the Scientific Research and Graduate Studies in the Applied Science University Speech
10:45 – 11:45 Keynote Speaker Lecture (Prof. Alaa Al Hamami , Amman Arab University, Jordan)
11:45 – 12:00 Break
12:00 – 12:45 Keynote Speaker Lecture ( Prof. Mizhir Alani, University of Anbar, Iraq)
12:45 – 13:00 CSIT 2015 Overview
13:00 – 14:00 Lunch for Our Guests and Participants
13:00 -‐14:30 Speeches for Students -‐ Microsoft Speech -‐ Aspire Speech -‐ Teleprope Speech
Session1 Amman Hall, Conference Palace
14:00 – 15:30 Participants Sessions Lectures in Amman & Qudus Halls 15:30 -‐ 15:45 Break 15:45 – 17:30 Participants Sessions Lectures in Amman & Qudus Halls 17:30 – 18:00 Dinner (Snacks)
Time CS Sessions
14:00 – 15
:30
THINKING HEADSET: A COMPUTER MOUSE FOR PEOPLE WITH DISABILITIES
Mohammad H. Alomari Ola Younis
INTRUSION BLACKLIST MODEL (IBM) TO PRE-ANALYZE NETWORK TRAFFIC USING SIMILARITY MEASUREMENT
Enas Ayman Al-Utrakchi
Mohammad Rasmi AN INTELLIGENT APPROACH TO DETECT AND CLASSIFY THE
MICROCALCIFICATION IN MAMMOGRAM IMAGES Ayman AbuBaker
PRIORITIES BASED APPROACH FOR STEMMING ARABIC WORDS
Riyad Al-Shalabi Ghassan Kanaan
FULLY AUTOMATED LIQUID LEVEL MEASUREMENT IN BOTTLES USING EDGE DETECTION
Ashraf M. A. Ahmad Alaa Almomni
IMAGE ANALYSIS ALGORITHM TO DETECT DEFECTED TABLETS IN MEDICAL PILLS STRIP
Ashraf M. A. Ahmad Akram Alharouk
THE PERFORMANCE OF ALLOCATION ALGORITHMS FOR K-ARY N-CUBE CONNECTED MULTICOMPUTERS USING REAL AND
SYNTHETIC WORKLOADS
Doreyed Ahmad Ismail Ababneh
Saad Bani-Mohammad NEURO-FUZZY CONTROLLER FOR A MOBILE ROBOT IN
UNSTRUCTURED ENVIRONMENT Ali Baniyounes
INVITING ALICE TO THE COMPUTING ARABIAN LAND Khalid Al-Tahat
HANDLING CONTINUOUS ATTRIBUTES IN PRISM ALGORITHM WITH ENHANCE GENERATING RULE
Rasheed A. AL-zubaidy Mohammed Y. Hammadi
Session1 Qudus Hall, Conference Palace
Time CIS Sessions
14:00 – 15
:30
AN EFFICIENT INSERT APPROACH BY MOVING OBJECTS IN A HIERARCHAL SPATIAL DATA STRUCTURE
Mohammed A. Otair
PASSENGER TRAVEL ASSISTANT MOBILE APP Ahmad Hussain AL-Qerem
Bashar Marzouk Shrah Rula LawrenceNino
EARLY DETECTION AND CLASSIFICATION OF PLANT DISEASES: A CASE TOOL FOR DIAGNOSIS
Alaa Sheta, Maram Abuabed Bayan Alsayed
Ayna’a ALazam
Kholod Brime
FACTORS AFFECTING E-PAYMENT ADOPTION IN JORDAN Khalid M.Fraihat
GEOGRAPHICAL PATH SELECTION BASED ON USER TRANSPORTATION AND SERVICE PREFERENCES
Maha Saadeh Wisam Almobaideen
SHOP: SMART-HOME WITH HEALTHCARE FOR OLD PEOPLE Wesam AL-Mobaideen
Maen AL-Assaf Raed AL-Amayreh
Mohammad Disi Abdelrahman Manna
Mostafa Hashem THE IMPLICATION OF THE LEARNING THEORIES ON IMPLEMENTING
E-LEARNING COURSES Ahmad Alzaghoul
INVESTIGATING THE APPLICABILITY OF ACCESSIBILITY STANDARDS FOR DISABLED PERSON ON EDUCATIONAL WEBSITES
Bayan Abu Shawar
EPR DATA HIDING IN MEDICAL IMAGES BASED ON DISCRETE FOURIER TRANSFORM
Wesam Almobaideen Hazem Hiary
Farah Al-Adwan
Session2 Amman Hall, Conference Palace
Time CIS Sessions
15:45 – 17
:30
THE ROLE OF PROJECT SCOPE AND FORMAL METHODOLOGY IN SOFTWARE DEVELOPMENT
Mohammad Tarawneh Haroon Tarawneh
SOFTWARE DEVELOPMENT MODELS SELECTION FOR THE OPEN-SOURCE SOFTWARE DEVELOPMENT
Nedhal A. M. Al-Saiyed
DEVELOPING AN ENGLISH AUCTION INTERACTION PROTOCOL FOR MULTI AGENT SYSTEMS
Zahra'a Al Arabeyat
Abdulsalam Alarabeyyat
PARAMETER ESTIMATION OF THE COCOMO MODEL USING EVOLUTIONARY STRATEGIES
Alaa Sheta Alaa Abu Srhan
DEVELOPING AN INTERACTION PROTOCOL FOR MULTI-AGENT SYSTEMS
Wafa Sulaiman Ikraeem AL-Khrabsheh
Abdulsalam Alarabeyyat ENHANCING FIPA ENGLISH AUCTION
INTERACTION PROTOCOL FOR MULTI AGENT SYSTEMS: UNREACHABLE CASES
Abdulsalam Alarabeyyat Zahra'a Alarabeyat
THE CHALLENGES FACING SOFTWARE ENGINEERING OVER THE NEXT TWO DECADES
Fawaz Ahmad M. AL Zaghoul
TEST DRIVEN DEVELOPMENT OF RIGHT TO LEFT LANGUAGE APPS Farhan Al-ebeisat
MULTI-PLATFORM GUI TESTING TECHNIQUE IN MODEL-BASED GUI DEVELOPMENT ENVIRONMENT
Eman M. Saleh
Session2 Qudus Hall, Conference Palace
Time CNS Sessions
15:45 – 17
:30
FACEBOOK AND OUR CULTURE Firas Omar
FACE DETECTION BASED ON SKIN COLOR USING NEURAL NETWORK Mohammad M. Al-Awadi
Fatima A. Al-Alem
CLOUD COMPUTING EVALUATION FOR DECISION MAKING: FROM NON-FUNCTIONAL REQUIREMENTS PERSPECTIVE
Ahmad Olimat
AN EFFICIENT CLOUDS LOAD BALANCING THROUGH CONSTRAINT SATISFACTION PROBLEM
Farhan Al Zu’bi Mohammed Refai Ibrahim Al-Oqily
CLASSIFICATION OF NETWORK INTRUSION USING ARTIFICIAL NEURAL NETWORKS
Amneh Alamleh Alaa Sheta
RESOURCE ALLOCATION TECHNIQUE TO OBTAIN ENERGY EFFICIENT CLOUD
Taleen Akijian
Ahmad Kayed SECURING VOIP IN SIP MOBIL NETWORK
Zaid Salah Monef Alaa Alhamami
THE LOAD BALANCING ALGORITHM FOR THE STAR INTERCONNECTION NETWORK
Jehad Al-Sadi
MANAGENMENT AND ANALYSIS BIG DATA IN CLOUD COMPUTING Suhail Owais
Nada Sael