You are on page 1of 33

11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18]

[3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

3ICT'18
International Conference on Innovation and Intelligence for 2018
Informatics, Computing, and Technologies (3ICT) Program

S22-
S45-06-Zain S45-11-Zain E- S45-12-Zain S45-Zain E-
S45-101-Zain E- S45-108-Zain E- BTC
Time E-Learning Learning E-Learning Learning
Learning Center Learning Cente Food
Center Center Center Center
Court

Sunday, November 18
08:00
am- R1: Registration-
09:00 Day1

am
09:00
am-
KS-1: Keynote Speaker
09:20
am
09:20
am-
KS-2: Keynote Speaker
09:40
am

09:40
am-
SB-1: Short Break
10:00
am
10:00
S2:
am- S3: Artificial Intelligence,
S1: Smart Cities Telecommunication and
11:40 Robotics, and Data Mining
Networks-1
am
11:40
am-
P1: Prayer
12:00
pm
12:00
pm-
OC-1: Opening Ceremony
12:10
pm
https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 1/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):
pm
12:10
OC-2: Talk by His
pm-
Excellency President of the
12:20
University of Bahrain
pm
12:20
pm-
KS-3: Keynote Speaker
12:40
pm
12:40
pm- OC-3: Appreciation for
12:50 Keynote Speakers

pm
12:50
pm-
SB-2: Short Break
01:00
pm
01:00
S6: From RFID to Cyber-
pm- S5: Informatics-1 (e- S4: Biomedical and
Physical Systems: Reality,
02:20 Government Services) Healthcare
Dreams, and Fantasy
pm
02:20
pm- LB-1: Lunch PS-1: Poster
03:10 Break Day-1 Session

pm
03:10
pm-
S8: Internet of Things S7: Cloud Computing
04:50
pm

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 2/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Monday, November 19
08:00
am- R2: Registration-
08:30 Day2

am
08:30
am-
KS-4: Keynote Speaker
08:50
am
08:55
am-
KS-5: Keynote Speaker
09:20
am
09 20
https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 3/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

09:20
am-
SB-3: Short Break
09:45
am
09:45
S10: S11: Informatics-2
am-
S9: Cyber Security Telecommunication and (Education & E-Learning
11:25
Networks-2 Systems)
pm
11:25
am-
P2: Prayer
11:50
am
11:50
S14: Optimization, S15: Future Vehicular
am- S13: Machine Learning and S12: Internet of
Modeling and Communications & Self
01:30 Robotics Things - Workshop
Simulation Driving Cars
pm
01:30
pm- LB-2: Lunch
02:20 Break Day-2

pm PS-2: Poster
02:20 Session
S17: Data Mining and
pm- S16: Software Engineering and
Knowledge S18: Informatics-3
04:00 Cloud Computing
Representation
pm
04:00
pm-
CS: Closing Session
04:30
pm

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 4/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Sunday, November 18

Sunday, November 18 8:00 - 9:00


R1: Registration-Day1
Room: S45-Zain E-Learning Center

Sunday, November 18 9:00 - 9:20


KS-1: Keynote Speaker
Enabling Collaboration in Internet of Things Environments: Security, Trust and Resilience
Prof. Mohamed Eltoweissy, Virginia Military Institute, USA

Room: S45-101-Zain E-Learning Center

Recently, Cyberspace has been designated as the fifth, and only human-made, dimension of operations. Cyberspace is becoming the nervous system of our modern
society as it is increasingly being integrated in virtually all aspects of control and communication. Today's Cyberspace comprises highly dynamic, interdependent
global network of information technology infrastructures, telecommunications networks, computing systems, integrated sensors, control systems, embedded
processors and controllers giving rise to the pervasive "Internet of Things (IOT)." The complexity and heterogeneity of the IoT systems coupled with evolving advanced
persistent threats as the new reality, call for platforms to manage security, trust and resilience as services. This talk will focus on how to enable effective collaboration
in IOT-powered environments. Specifically, it will discuss IOT security, trust and resilience as essential enablers for effective collaboration. The talk will outline some
challenges and proposes a platform that would provide a comprehensive approach for enabling collaboration.

Sunday, November 18 9:20 - 9:40


KS-2: Keynote Speaker
IoT and Consumer Healthcare- Opportunities and Challenges
Dr. Chitra Balakrishna, program Leader in cyber security at Edge Hill University, United Kingdom

Room: S45-101-Zain E-Learning Center

The term healthcare has a very wide scope that ranges from lifestyle and wellness right up to care for acute conditions. In the recent past, a large number of devices
enabled by IoT have become available in the market, that can monitor various aspects of lifestyle and biological functions. As a consequence, the potential for
obtaining detailed data on life style, habits and behaviour of an individual exists. Such data provides a feedback to an individual for compliance with ``healthy
guidelines'' as well as contribute information to the healthcare provider for use in diagnosis, in the event of an ailment.The talk addresses various aspects of care that
can benefit from IoT-enabled consumer grade health monitoring devices, various opportunities and challenges in this ‘Consumer Healthcare' landscape.

Sunday, November 18 9:40 - 10:00


SB-1: Short Break
Room: S45-Zain E-Learning Center

Sunday, November 18 10:00 - 11:40


S1: Smart Cities
Room: S45-108-Zain E-Learning Cente
Chairs: Princy Johnson, Hayat Mohamed Abdulla Ali

10:00 Dynamic Model of Soil Moisture for Smart Irrigation Systems


Luisella Balbis and Ali Jassim
In geographical areas subject to an arid climate, one of the most precious resources is water, which often get wasted due to inefficient irrigation systems.
Automated irrigation systems which relies on closed loop control and feedback from sensors can help to closely match the water supply to the crop demand
and avoid waste. In recent years, predictive control strategies were proposed for high tech watering systems which rely heavily on complex models
incorporating variables such as crop water demand, soil evapotranspiration, weather conditions etc.. Through these models it is possible to anticipate the water
demand of the crop, and give optimal irrigation scheduling with a significant reduction in water consumption. In this paper we developed a model of the soil
moisture dynamics based on climatological data of the Kingdom of Bahrain. The model, which is based on the hydraulic balance approach, was validated by
comparing its estimated output with real measurements

Presenter bio: Luisella Balbis is currently an Assistant Professor in the Department of Computer Engineering at the University of Bahrain. She received her PhD at the
Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, Scotland, in 2009. Her research interests include automatic control and computer
networks

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 5/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

10:20 BIM from Conceptual Model to Construction


Wael Abdelhameed
The paper investigates the architectural models and the construction process while using Building Information Modelling. Building BIM model becomes vital for
the designers in conceptual designing; collaborative design and communication between all designers are essential during these design phases.
Multidisciplinary model is the first step for the designers of different disciplines to communicate and collaborate in such matter. After creating the
multidisciplinary model in conceptual designing, is it enough to use into the construction process? Are there more details that should be added into the model?
The paper attempts at shed more light on the obstacles faced and functions needed to use the conceptual model of BIM into the construction process. The
paper explores the details required to the BIM models to be utilised into the construction process. A main methodological tool is applied by synthesizing and
extracting from the literature review of related research areas. The secondary data lead to certain categories of BIM details that have to be applied by the BIM
users after the conceptual design phases. The paper concludes to solid results and certain recommendations during creating BIM model.

Presenter bio: Dr. Wael Abdelhameed has a Ph.D. in CAAD and Architecture Education. He has been Associate Professor at UoB since 2014. Before joining UoB, he held
teaching and research positions at South Valley University (Egypt), Fulbright Commission (USA), and Arizona State University (USA). His research areas are Digital Media
use in designing; Virtual Reality; BIM use in early design stages. He has published more than 25 papers and articles. He has been a member of the Technical Committee for
International Fulbright Science and Technology (IFST), Ph.D. award and Postdoctoral Scholarship, Fulbright Commission of Egypt, since 2006. He was a guest speaker of 1st,
2nd, 3rd, 4th and 5th Virtual Reality Symposium, Tokyo, Japan 2007-2014; and a keynote speaker at CAD'12 conference, Niagara Falls, Canada.

10:40 Smart City: An Investigation Toward a Proposed Maturity Model


Batool Mohsin
Smart City is an emerging strategy to solve the problems resulted from the increase in urban population and rapid urbanization. The global market for smart
city solutions, services, and investments in the world is expected to be very high in 2026. However, there are very few scientific papers that propose a Smart City
maturity model which provide directions or support such investment decisions. Due to the complexity and limited experience concerning Smart City within
countries, there is very few researches that can be used to evaluate the city's achievements in implementing the smart city initiatives. Also, there is a limitation in
measuring the level of maturity (as is) and determining the next future level (to be). The main objective of this paper is to identify and assess the current
maturity models and develop a Customized Smart City Maturity Model for Kingdom of Bahrain. Furthermore, it aims to highlight the status of Smart City in the
Kingdom and assess the level of maturity in one of Smart Cities' dimension (Smart Governance) using the customize maturity model.

Presenter bio: Mrs. Batool Mohsin received her Bsc. degree in Information Systems from university of Bahrain in 2016. Currently, Batool is doing her Masters in Information
Technology at University of Bahrain. She has COBIT 5 professional certificate in 2018 and Teachers' Professional Development certificate according to QQA Framework in
2017. Her interest fields in Smart Cities, IoT, cloud computing

11:00 A Low-cost Solar Farm Monitoring System Based on Cloud Database


Fawzi Mohammed Munir Al-Naima and Abdullah Hamad
Renewable energies have become important sources of electricity generation in modern times, with solar energy being one of the best types of such energy
since solar radiation can be converted directly into electricity. To harness the solar energy in the best way, specialists in this field resort to solar farms where a
large number of solar panels are installed in an open area and the electricity produced is being transferred into towns. The design of a reliable monitoring
system for such a large number of solar panels becomes the essential part of such design to reach the needed efficiency. This paper introduces a low-cost
practical implementation of a monitoring system for an existing solar system installed on the building of the Ministry of Science and Technology (MST) in
Baghdad based on Wireless Sensor Network (WSN) technique. The "ThingSpeak" cloud database is utilized to store and retrieve the monitored data and the
PHP and HTML programming languages are used to design a Graphical User Interface (GUI) to display these data.

Presenter bio: ORCID: https://orcid.org/0000-0003-0930-5073 Born on 22.12.1948, Mosul, Iraq. BSc ( First Class Honours) in Electrical Engg.,Newcastle University, UK, 1971.
PhD Electrical Engineering, Newcastle University, UK, 1976. Supervised more than 70 MSc and PhD theses. Full Professor of Electronic Engg. since 1990. Published more
than 80 research papers in national and Int. Conferences and Journals. Co-author of three translated books to the Arabic language. Co-author of four chapters in books
published by International Publishers. Co-author of a book on Circuit Theory published in the USA. Fellow Life Member of IETE (India), SMIEEE Research Areas: Computer-
aided network design, Analog and digital signal processing, Symbolic Analysis of large circuits, Optimization Techniques.Has been serving as Editorial Member for a
number of national and international scientific journals.

S2: Telecommunication and Networks-1


Room: S45-06-Zain E-Learning Center
Chairs: Abdulnasir Hossen, Reham Almesaeed

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 6/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

10:00 A Comparison Analysis of Fault Detection Algorithms in Wireless Sensor Networks


Zainab Alansari, Belgaum Mohammad Riyaz and Anupama Prasanth
Sensors are capable of performing different tasks such as receiving various environmental information and have generated the idea of creating and expanding
the traditional networks to Wireless Sensor Networks (WSN). A WSN include various sensor nodes which are distributed in the environment to gather data. The
sensor node's location is not necessarily defined and not specified. Such a feature allows us to release them in hazardous or inaccessible places. On the other
hand, this means that the WSN protocols and algorithms must have the ability to self-deny. Other unique features of WSNs are the ability of sensor nodes to
collaborate and coordinate with each other. A processor is assigned to each sensor node which initially performs a series of acquired simple information
processing to transmits the semi-processed data instead of sending all raw data to the center, Base Station (BS) or the sink node. Fault detections in WSN are of
particular importance due to unique technical and conceptual challenges. In this paper, due to the specific limitations and operating conditions of wireless
sensor networks, different fault detection algorithms were examined. The best way to improve the ability of fault detection is to reduce energy consumption in
sensor nodes. In such techniques, using the residue number system in the wireless sensor network structure improves repair and fault detection. Moreover,
modules are attached whenever we require distinguishing and correcting the information security in the number system. Although there are various algorithms
yet the Residue Number System algorithm has higher performance.

Presenter bio: Dr. Anupama Prasanth, Completed PhD in Computer Science. She is working as Assistant Professor in AMA International University Bahrain. Fifteen years of
experience in teaching and published more than ten papers in International journals. She is also a reviewer of several International journals.

10:20 Software Defined-Network for Real-time Operations of Business Intelligence Tasks


Akram Zeki, Adamu Abubakar and Awad Ibrahim
Information and Communication Technology (ICT) is a crucial tool for Business Intelligence. ICT tools help in an operation that yields a "real-time reporting with
analytical alert" through the use of BI operation. The efficient handle of the flow of data from one node to the other by BI operation required many network
resources, limited resource is a drawback to BI tasks that need a real-time operation. If bandwidth is shared among applications that use the internet. It is
consider as one of the crucial obstacles to BI operations. Therefore, a dynamic tasks scheduling application is required. It should be able to manage the flow of
data in a network involving of BI operation. For that reason, this paper proposes an effective routing scheme required for BI tasks in order to provide real-time
reporting with the analytical decision without link congestion for any task. The proposed mechanism can be used to control the actions and the forwarding rules
in the network. This increases the efficiency of a network by rerouting traffics between links. It utilizes the idle links and directs the traffic from and to them to
raise the network total efficiency rate. Consequently, bandwidths will be remarkably higher and the link congestion problem will be avoided from that network.
In the experiments of emulating congested traffic, the paper gets better network performance of throughput, jitter, and packet loss rate using the proposed
traffic rerouting, as opposed to the environment without traffic rerouting.

Presenter bio: Akram M. Zeki (PhD in Computer Science from University Technology Malaysia) is an Associate Professor at Department of Information System at Faculty of
Information and Communication Technology at International Islamic University Malaysia. His research interest including of Watermarking, Steganography, Information
Security and Image Processing and Multimedia, he is very interesting to work in the field of IT and Islam and develop Islamic Applications. He is supervising few master and
PhD students; he is leading few research grants under his university or under national grant. Dr. Akram published 7 books, more than 50 Articles in Journals, 45 book’s
chapters and more than 100 conference papers. Beside that he received few awards from university and national level.

10:40 Crosstalk Noise Controller in WDM Optical Network on Chip Routers


Ahmed Jedidi
The computer applications performance growing exponentially and they are greedier in computing resources. To satisfy these demands the multiprocessor
system-on-chip (MPSoC) is an attractive solution which became one of the important technologies in our days. However, the communication between the
different processors' cores presents the first challenge front the high performance of MPSoC. Network on chip (NoC) is one of the promoting solution to
improve on chip communication between cores. Nevertheless, NoC potential limited by physical limitation, power consumption, latency and bandwidth in the
both case: increasing data exchange or scalability of multicores. To avoid these limitations, the optical communication can be a perfect solution which it offers a
wider bandwidth and lower power consumption. The silicon photonics technology proposes many optical devices on chip, based on a new technology named
Optical Network-on-Chip (ONoC) has been introduced in MPSoC. However, the factoring nature of the ONoC components induces a malicious impairment
called crosstalk noise. This serious problem deteriorates the quality of signals and degrades network performance. Many types of optical switches are developed
to ONoC which they present the backbone of the network and the first resource of the crosstalk noise. As a result, detect and monitor the crosstalk noise
becoming a challenge to keep the performance in the ONoC. In this article, we propose a new hardware solution to detect and control the crosstalk noise in
ONoC components. Particularly, we present the different optical devices presented in ONoC and an analytic model of the crosstalk noise at the optical devices.
The proposed hardware system is presented and implemented in objective to test his performance and efficiency in terms of execution time, area occupation
and scalability. Moreover our system reach the high performance with 23 ms in execution time

Presenter bio: Dr. Ahmed Jedidi is assistant professor of Computer and Telecommunication Engineering faculty member of college of engineering at Ahlia University.
Currently he is a chairperson of computer engineering in Ahlia University. He received PhD degree in System of Computer Engineering in 2012 at the National School of
Engineering Sfax University Tunisia. Also, he is a member in the laboratory “Computer & Embedded Systems” University of Sfax, Tunisia. The line of research focuses on the
detection, localization and estimation of crosstalk in all-optical networks (AONs), the embedded system performance, optical network communication and Wireless sensor
network. Besides, he has a number of research papers published in international journals and conferences. He has more than 11 years’ experience in teaching in various
universities in Tunisia and Saudi Arabia. Particular, he teaching Computer and network courses.

11:00 Tracking High-Speed Users Using SNR-CQI Mapping in LTE-A Networks

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 7/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Ali Al Janaby, Alauddin Yousif Al-Omary, Siddeeq Yousif Ameen and Hussain Al-Rizzo
The task of estimating, tracking and controlling the speed of user equipment (UE), particularly with speed above allowed limits, is a challenge which has a
significant impact on radio resource and mobility management in Long Term Evolution (LTE). In this paper, we propose an algorithm that relies on transmitting
Channel Quality Indicator CQI bits through LTE network's remote IP Multimedia Subsystem (IMS) application server to analyze and to map the UE speed and to
determine if the UE is above the speed limit. The paper presents a new approach to estimate, track, and control users moving above speed limits in LTE-
Advanced (LTE-A) networks using mapping of the uplink CQI index of the UE since the CQI range can provide an indication to the system regarding the
movement and the speed of the UE.

Presenter bio: Holds B.Sc. in Electronic and Communication, University of Mosul, Iraq in 1980 and M.Sc. in Communication Engineering from University of Technology, Iraq
in 1986. He got his Ph.D. degree in system and information engineering from Toyohashi University, Japan, 1994. Since 2005, he is an associate professor at the Department
of Computer Engineering, College of Information Technology, University of Bahrain. His research interests include Hardware/Software co-design Telematics system,
Machine-to-Machine Communication, Mobile Network performance, ASIC and embedded system design using VHDL and FPGA. He has been actively involved in many
research projects and published 2 books and more than 40 papers. He attended many International conferences and awarded best session paper in some of these
conferences. He is a member of the Institute of Electrical and Electronic Engineers (IEEE), the Japanese Information Processing Society and the International Association of
Computer Science and Information Technology (IACSIT). He was a Member of the UNESCO Project to establish a computer networks between the GCC’s Inheritance and
folklore centres started in April 2001 until April 2002. Dr. Al-Omary is the founder and managing editor of the International Journal of Computing and Network technology
(IJCNT) published by the research deanship of University of Bahrain.

Presenter bio: Siddeeq Y. Ameen born in 1960 in Mousol, Iraq. He awarded BSc in Electrical and Electronic Engineering from the University of Technology, Baghadad, Iraq in
1983. Next, he awarded the MSc and PhD from Loughborough University, UK. in 1986 and 1990, respectively in the field of digital communication systems and data
communication. From 1990-2006, Professor Siddeeq worked with the University of Technology in Baghdad with participation in most of Baghdad's universities. From 2006-
June 2011, he acts as a dean of college of Engineering at the Gulf University in Bahrain. Recently Prof. Siddeeq is a professor of Telecommunication with the department of
Computer Engineering and Information Technology, University of Technology, Baghdad. Through his academic life he published over 70 papers in field of data
communication and information security.

11:20 Solving the Discrete Cost Multicommodity Network Design Problem to Optimality
Imen Mejri, IM, Safa Bhar Layeb and Farah Mansour Zeghal
Multicommodity Network Design problems arise in the strategic and tactical planning processes and have many applications mainly in the fields of
telecommunication and logistics. Thus, solving this challenging NP-hard problem is crucial for the profitable business of network operators. In this work, we
focus on the Discrete Cost Multicommodity Network Design Problem (DCMNDP), with multiple discrete facilities (corresponding to different technologies) to be
installed on the edges. Each facility is bidirectional and has known discrete capacity and cost. For this problem, we present a tailored Benders decomposition
using an arc-flow based formulation and we strengthen it by adding some valid inequalities. Preliminary computational results conducted on both real-world
instances and randomly generated instances are reported.

Presenter bio: Batool S.Taher Shubbar 4th year student in UOB ,CE A toastmaster

S3: Artificial Intelligence, Robotics, and Data Mining


Room: S45-11-Zain E-Learning Center
Chairs: Noora Alghatam, Alrence S Halibas

10:00 Features-Level Software Effort Estimation Using Machine Learning Algorithms


Mustafa Hammad and Abdulla Alqaddoumi
Software effort estimation is a paramount mission in the software development process, which covered by project managers and software engineers. In the early
stages, software system features are the only available measures. Therefore, cost estimation is a mission that comes under the planning stage of software
venture management. In this paper, various machine learning algorithms are used to build software effort estimation models from software features. Artificial
Neural Network (ANN), Support Vector Machines (SVM), K-star, and Linear Regression machine learning algorithms are evaluated on a public dataset with actual
software efforts. Results showed that machine learning approach can be dependable on predicting the future effort of a software system.

Presenter bio: Dr. Abdulla Alqaddoumi received his B.Sc. in Computer Science from University of Bahrain, Kingdom of Bahrain in 2002. He completed his M.Sc. in Advanced
Computing Science at University of Manchester, UK in 2005. He completed his Ph.D from New Mexico State University in 2016. Dr. Abdulla Alqaddoumi serves as Assistant
Professor in the Department of Computer Science at the University of Bahrain. His research interest includes Knowledge Representation, Optimization, Parallel Processing,
Programming Languages and Graph Theory.

10:20 Application Of Artificial Neural Networks For Exploratory Analysis Of Small Dataset
Uneb Gazder, Ashar Ahmed and Umaira Shahid
This study aims to explore the use of Artificial Neural Networks (ANNs) for estimating the relationship between accidents and other variables with a small
dataset. Analysis of road traffic accidents is often hampered due to insufficient datasets. Especially, for the cases when specific highway facilities are considered.
This issue is also gaining importance for analysing traveller behaviour with the advent of new technologies and implementation of concepts of smart cities. The
accident sites selected for this study comprise of unsignalized intersections in Penang State of Malaysia. Accidents in Malaysia have become a major concern for

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 8/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

the authorities. However, the data collection is a major issue hindering its analysis because of limited datasets. The safe operation of traffic on unsignalized
intersections mainly depends on drivers' judgement and decision making. Hence, the safety considerations on such locations are peculiar in comparison to
other facilities. These facts led to carrying out the study for these sites. Two types of ANNs were used i.e. Multilayer Feedforward (MLFF) and linear. In addition,
regression model and Mann-Whitney test were also used to compare the results from ANNs. It was found that regression model as well as Mann-Whitney test
gave inconclusive results for the available dataset. On the other hand, ANNs were able to approximate the relationship in conformity to the previous studies.
However, larger datasets are expected to give better accuracies for regression as well as ANNs.

Presenter bio: Dr. Uneb Gazder is an Assistant Professor in Department of Civil Engineering at University of Bahrain. He completed his PhD from King Fahd University of
Petroleum and Minerals in 2014. His area of specialization is transportation planning. He has authored/co-authored more than 25 publications/conference papers. His
research areas include statistical analysis, artificial neural networks and transportation planning and safety.

10:40 Execution Time Performance For Different Variants of R-Eclat Algorithm


Julaily Aida Jusoh and Mustafa Bin Man
Association rules aim to mining interesting correlations and association among itemsets in the transaction databases. The relationship between itemsets can be
found as frequent pattern and infrequent pattern. The mining infrequent pattern has been an interesting issue in discovering the uninteresting patterns which
are rarely occurring. However, rarely itemsets occurrences may provide valuable information in knowledge mining process. R-Eclat is a novel algorithm that uses
in determining infrequent itemsets in a transaction database. This paper proposed IF-Postdiffset as a new format variant for R-Eclat algorithm. Besides, the issue
of discovering infrequent itemsets mining from the transactional database via different format variants of the R-Eclat algorithm will be discussed. Experimental
results will show the efficiency and effectiveness of the proposed approach.

Presenter bio: Mustafa Man is an Associate Professor in School of Informatics and Applied Mathematics, Universiti Malaysia Terengganu (UMT). Prior to being confirmed by
the company and finished his studies in Universiti Teknologi Malaysia (UTM) in the field of Computer Science in 2012. He has received Computer Science Diploma,
Computer Science Degree, Degree (Master Science from Universiti Putra Malaysia). In 2012, he has been awarded a "MIMOS Prestigious Awards" for his PhD by MIMOS
Berhad. He was selected as the winner of this award is a very diligent student, working diligently to complete his PhD studies. He has shown a strong and in depth interest
in the field of research and development based on the integration of multiple types of databases. His current research involved in data integration, data mining, image
processing, IoT and Augmneted Reality. (http://staff.umt.edu.my/~mustafaman/)

11:00 ONTO SQAM - A Model for Analyzing Seafood Quality Based on Ontology
Sherimon P. C. and Vinu Sherimon
One of the most precious exporting sectors in the Indian economy is the seafood industry. Sustained measures to ensure the quality of export materials are very
critical to further increase the growth in seafood export. To ensure the overall quality of seafood, a knowledge-based system entitled 'Ontology Based Quality
Analyzer and Miner (ONTO SQAM) is developed. Ontologies are used to represent the seafood domain. Different algorithms are suggested for analysis, mining,
and prediction to ensure the seafood quality. The key features of the model are the development of algorithms to generate frequent patterns of quality seafood
and to predict the success rates of seafood based on the catching center. Indian Seafood industry is taken as the case study in this research. This paper presents
only the architecture of the system. The implementation of the model will be discussed in an extended version of this paper.

Presenter bio: Dr. Vinu Sherimon, is a faculty in the Department of IT, Higher College of Technology, Muscat, Sultanate of Oman since 2004.She has published 2 book
chapters, and 15 peer-reviewed Journal articles in various International Journals including Elsevier, and ACM. She has also presented research papers in several
International conferences and published papers in 21 Conference Proceedings. Dr. Vinu serves as the reviewer of The Research Council (TRC), Oman and other
International Journals. During 2012-2014, she was the co-investigator of a funded project under Open Research Grant (ORG) program from TRC, Oman. In 2014, a research
paper co-authored by Dr. Vinu won the first National Research award in Oman. Her research interests lie in semantic web, pervasive computing, ontology, big data, and
data mining.

Presenter bio: Dr. Sherimon P.C. is currently working at Faculty of Computer Studies, Arab Open University (AOU), Oman. He has 20 years of teaching experience in
different institutions. He started his career as a Software Engineer and later joined at Mahatma Gandhi University, India. In 2004, he joined Higher College of Technology
and worked as the Head of Section in IT Department. He joined AOU in 2010. He holds two Master’s Degree, in Computer Science and Information Technology and a Ph.D.
Degree in Computer Science. He won the first National Research award from TRC, Oman in Information and Communication Technology sector. He has published around
42 research papers in Springer, ACM, etc. He has presented papers in various International Conferences in US, UK, Russia, China, Malaysia, India, Kuwait, Jordan, Ajman and
Oman. He worked as Chairman and Scientific committee member in various conferences. He has also delivered Keynote address in various conferences. He serves as the
reviewer of TRC and other International Journals.

11:20 Multi-Human-Multi-Robot Facial Interaction System


Muhammad Tahir Khan
Recent advancement in the service and manufacturing industry has increased the productivity of the process as well as the quality of the products. In order to
improve it to a more sophisticated level, robot is the necessary element of the service and manufacturing industry. To give a more advance shape, the robots
must have to interact with one another and with the humans. In this research, a system has been designed and developed in which multiple human and multiple
robot will be able to interact with one another using facial features directions. The system includes the face detection, facial features detections and
classification of features directions, so that the human can give specific facial features direction to a specific robot for a specific type of action. For face detection
Viola Jones method has been used, for facial features detection modified version of Viola Jones methods is used. After the facial features detection for facial
features direction classification in order to command the robot convolutional neural network (CNN) architecture Resnet50 is used.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_i… 9/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Presenter bio: Muhammad Tahir Khan received Master’s degree in Mechatronics from University of New South Wales, Sydney, Australia, and Ph.D degree from the
University of British Columbia, Vancouver, BC, Canada, in 1999, and 2010, respectively. He was a Post-Doctoral Fellow with the Industrial Automation Laboratory at the
University of British Columbia, Vancouver, BC, Canada for two years until January 2012. Currently, he is professor with the Department of Mechatronics Engineering at the
University of Engineering and Technology, Peshawar, Pakistan. He is also an editor of Mechatronic Systems and Control Journal (formerly Control and Intelligent Systems).
His research interests include Robotics, and Intelligent Control Systems.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 10/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Sunday, November 18 11:40 - 12:00


P1: Prayer
Room: S45-Zain E-Learning Center

Sunday, November 18 12:00 - 12:10


OC-1: Opening Ceremony
Room: S45-101-Zain E-Learning Center

Sunday, November 18 12:10 - 12:20


OC-2: Talk by His Excellency President of the University of Bahrain
Prof. Riyad Hamzah

Room: S45-101-Zain E-Learning Center

Sunday, November 18 12:20 - 12:40


KS-3: Keynote Speaker
Be Careful: I can Read your Mind
Prof. Magdy A. Bayoumi, University of Louisiana at Lafayette, USA

Room: S45-101-Zain E-Learning Center

This is one of the ultimate goals of the "Brain Initiative" which may be real by 2030. In General, to be able to control our surrounding world by the power of our mind,
to control the artificial limbs by our thoughts, and to read people's brain is a dream and it is an exciting one.Brain Computer/Machine Interface (BCI/BMI) is one of the
enabling technology towards these goals. We have designed and developed BCI chips that can overcome the main challenges of interfacing with human brain, mainly:
low bandwidth communication, small chip area, low power and low heat dissipation, and tolerant to noise. This new chip is based on spike sorting. Probably, the more
reflective title of this talk is "Brain on Silicon" Finally, a case study of early prediction, warning, and detection of seizure using the developed chip will be illustrated.

Sunday, November 18 12:40 - 12:50


OC-3: Appreciation for Keynote Speakers
Room: S45-101-Zain E-Learning Center

Sunday, November 18 12:50 - 1:00


SB-2: Short Break
Room: S45-Zain E-Learning Center

Sunday, November 18 1:00 - 4:50


PS-1: Poster Session
Room: S45-Zain E-Learning Center

Sunday, November 18 1:00 - 2:20


S6: From RFID to Cyber-Physical Systems: Reality, Dreams, and Fantasy
IEEE Invited Speaker - This talk is sponsored by IEEE council on RFID
Distinguished Lecturer: Prof. Magdy A. Bayoumi, University of Louisiana at Lafayette, USA

Room: S45-108-Zain E-Learning Cente


Chairs: Isa Salman Qamber, Adel Abdulla

S5: Informatics-1 (e-Government Services)


Room: S45-06-Zain E-Learning Center
Chairs: Abdul Fattah Salman, Wael Abdelhameed

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 11/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

1:00 The Cultural Impact on User Interface Design: The Case of e-Government of Kingdom of Bahrain
Lamya Aljasmi and Hadeel Alobaidy
The internet and web services continue to grow rapidly and so does the needs of users. Users prefer easy and fast services that can be accessed everywhere
such as paying utility bills and scheduling appointments.In doing so, on-line services need to be provided by governments to facilitate easy access.In this age of
globalization, we live in a highly diversified world in which people from different cultural backgrounds live together.Users interactions become more appealing if
cultural characteristics are incorporated into the interface design. Culture could have an important impact upon people using the web services. Thus, designing
web services for a multi-cultural society will require studying in depth the effect of the society cultural characteristics. The user interface can be designed using
those characteristics that help in gaining the user's attention. Previous studies indicate that users are more comfortable when interacting with a user interface
related to their own culture. This paper investigates the influence of culture on the user interface design of Bahrain e-Government services to examine the views
of cultural effect on user interface design. The results show the positive and negative impact of users culture on the interface design.

Presenter bio: Hadeel Alobaidy is an Assistant Professor at University of Bahrain, College of Information Technology, Department of Computer Science, specializing in
Software Engineering and web engineering . Her current research interests Human Computer interaction, software Engineering, Web engineering, Ontology, Semantic Web
and Data Mining.

1:20 An Evaluation of Technological and Physiological Barriers in E-Commerce Adoption in the British SME's
Humayun Bakht and He Xiaoxiangyu
Electronic commerce in the recent decades has been adopted by more and more companies or sectors to aid in their growth. It is obvious that the concept of e-
commerce has been frequently discussed over the recent decades of fast development of internet technologies. Led by some giant companies of internet, the e-
commerce industry has benefited numerous Small to Medium-sized Enterprises (SMEs) around the world. However, there are several common barriers to SMEs
to adopt e-commerce approach. The focus of the work is specifically on Physiological and Technological Barriers in the adoption of E-commerce within the
British SMEs. Researching on this topic can deliver the direct knowledge base for the SMEs' owners to think over when making the relevant decisions.

Presenter bio: I'm a postgraduate student in WMG, University of Warwick. Many of the courses I have learnt are related with the topic. Thus researching on the area and
composing the paper is not just from my interest but also from the knowledge base that I have built in my minds.

1:40 An Analytical Study Evaluating the Applicability of a Developed Innovative E-Sourcing System for Automobile Based
Firm
Bokolo Anthony, Jnr, Mazlina Abdul Majid and Awanis Bt Romli
Over the years several studies have contributed to e-businesses, but at the moment there are fewer studies that have supporting e-sourcing operation in
automobile based firms. Therefore, this paper aims to develop an innovative e-sourcing system for automobile based firms based on Model View Control (MVC)
architecture to facilitate procurement operation among buyers and sales staffs. The developed system aims to lessen the work of sales staff thereby reducing
tedious task faced by the sales staff. Additionally, the proposed system replaces the traditional system by reducing paperwork in the form of maintaining various
files manually. The system also supports in maintaining and storing of customers' information. Besides, the system save time and facilitate customers in ordering
automobile product whenever they want to without visiting the company. Moreover, the developed innovative e-sourcing system was evaluated using
questionnaire data to assess the applicability of the system in managing automobile ordering between the customer and sales staff based on data collected
from fifty respondents. Accordingly, descriptive analysis was carried out to analyze the collected data by deploying Microsoft Excel. Results from the analyzed
data reveal that the developed innovative e-sourcing system is applicable in supporting sales of automobile based products.

Presenter bio: I am currently an Associate Professor at Universiti Malaysia Pahang (UMP), Malaysia with more than 15 years' experience as an academic lecturer at Faculty of
Computer Systems & Software Engineering, UMP. I received my PHD in Computer Science from University of Nottingham, UK. I hold various responsibilities in the
administrative works including 6 years as Deputy Dean of Research and Graduate Studies. I am currently the Head of Software Engineering Research Group and Editor in
Chief for International Journal of Computer Systems & Software Engineering. I am one of the academic program committee in UMP and other universities due to my vast
experiences in teaching master and undergraduate courses. My research expertise is Software Agent, Software Usability Testing, Educational Software and Modelling &
Simulation.

2:00 Investigating the Impact of Contactless Payment Technologies on the Students' adoption at the University of Bahrain
Amerah Abdulrazzaq and Maan Aljawder
The Kingdom of Bahrain witnessed many advancements in the FinTech domain recently. One of these obvious advancements is the introduction of few
contactless payment software and technologies. Within the first two quarters of 2018, several institutions introduced contactless payment mobile apps such as
BenefitPay, bWallet, VIVA Cash and MaxWallet. These mobile apps received vast adoption rate in a relatively short period of time by the citizens in the Kingdom.
This study is conducted to investigate the impacts of contactless payment technologies on the students of University of Bahrain. The study focusses on
investigating the adoption factors of contactless payment technologies and their impact on the willingness of students to adopt these technologies. For the
operationalization of this study a modified version of Technology Acceptance Model (TAM) is proposed and tested through a survey, while the statistical
package for social sciences (SPSS) is used for data analyses.

Presenter bio: Associate prof. IS department, University of Bahrain since 2004 Associate prof. Information Sys. department, University of Qatar 1989-2004 Associate prof.
Computer Science Department, College of Science, University of Baghdad 1983-1998 Author of a book in Arabic (Information Storage and retrieval)and Translator to a
Book Managing Data.....) Over 30 papers(published locally and internationally, in Arabic and in English Author of 1 book and translator to 1 book in information retrieval

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 12/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

S4: Biomedical and Healthcare


Room: S45-11-Zain E-Learning Center
Chairs: Hessa Al-Junaid, Sid Ahmed Chouakri

1:00 A Mobile Cloud-based System for Alzheimer's Disease


Amal Saleh Ghanem and Hamad A Alkhal
The recent advances in cloud computing have been widely used in different domains and highly employed for designing cloud-based solutions in healthcare.
With the could-based solutions, services can be accessed by patients from anywhere using their own mobiles. In this paper, a cloud-based system is presented
as a solution to address the needs of Alzheimer's patients and their caregivers. Those needs are tackled by developing two mobile applications to streamline the
care-giving process, and thus act as if the caregiver is in presence all the time with the patient. The privacy and confidentiality of this problem is also considered
using the latest set of technologies available. The proposed solution as a cloud-based system has been proven to be practical, affordable, accurate and efficient.

Presenter bio: Amal Saleh Ghanem received her BSc Degree in Computer Science from University of Bahrain, Kingdom of Bahrain in 2001; MSc Degree in Computer Science
from Manchester University, UK in 2004; and PhD Degree in Computer Science from Curtin University of Technology, Australia in 2010. Her research interests include data
mining, machine learning, Cloud Computing and database management systems. Dr. Amal is an Assistant Professor in the Department of Computer Science at the
University of Bahrain and a certified AWS instructor. Amal can be contacted at: aghanim@uob.edu.bh

1:20 The Influence of Content and Device Awareness on QoE for Medical Video Streaming over Small Cells: subjective and
objective quality evaluations
Ikram Ur Rehman, Moustafa M Nasralla, Ikechukwu Maduka, Nada Y Philip and Ajaz Ali
Small cell networks are expected to be an integral part of future 5G networks in order to meet the increasingly high user demands for traffic volume, frequency
efficiency, and energy and cost reductions. Small cell networks can play an important role in enhancing the Quality of Service (QoS) and Quality of Experience
(QoE) in mobile health (m-health) applications, and in particular, in medical video streaming. This paper presents content-aware and device-aware medical
Quality of Experience evaluations in terms of subjective (e.g. MOS) and objective (e.g. PSNR and SSIM) quality metrics obtained over small cell networks.
Furthermore, we address the following two main research questions: (1) How significant is ultrasound video content type in determining medical QoE? (2) How
much of a role does the display device play in medical experts' diagnostic experience? The former is answered through the content classification of ultrasound
video sequences based on their spatio-temporal features and validating their significance through medical experts' subjective ratings. The latter is answered by
conducting a subjective experiment of the ultrasound video sequences across multiple devices, ranging in screen size and resolution.

Presenter bio: Dr. Ikram Ur rehman is a faculty member in the department of Engineering and Digital Technologies at Coventry University Group. He completed his PhD
from the school of computing at Kingston University, London. His thesis was entitled "medical QoS and medical QoE for ultrasound video streaming over 4G and beyond
small cell networks". He has been involved in the investigation and development of 4G and beyond network technologies such as LTE/LTE-Advanced, Small Cells, Internet
of Things and Device-to-Device communication. Additionally, the exploitation of Artificial Intelligence and Machine Learning algorithms to assess the influence of QoS on
QoE for video traffic. His current research interest is to expand his horizon and leverage the knowledge gained over the years into the future 5G technology and deep
learning form of machine learning technique.

Presenter bio: Dr. Moustafa Mazin Nasralla is currently an assistant professor at the Department of engineering, Faculty of Communications and Networks Engineering,
Prince Sultan University, Riyadh, Saudi Arabia. He was an assistant professor at Prince Sattam University and he was a member of the Wireless Multimedia and Networking
(WMN) Research group. He received his PhD from the Faculty of Science, Engineering and Computing (SEC), Kingston University, London, UK. He received the B.Sc. degree
in electrical engineering from Hashemite University, Jordan, in 2010, and the M.Sc. degree in networking and data communications from Kingston University London,
United Kingdom, in 2011 with honours. His PhD research project was entitled: ‘Video Quality and QoS-Driven Downlink Scheduling for 2D and 3D Video over LTE
Networks'. His research interests include the latest generation of wireless Communication systems, e.g., 5G, LTE-A, LTE wireless networks, IoT, Big Data, SON, OFDMA, etc.

1:40 Psychological Stress Detection from Social Media Data using a Novel Hybrid Model
Mohammed Mahmood Ali
Psychological stress is considered as the biggest threat to individual's health. Hence, it is vital to detect and manage stress before it turns into severe problem.
However, conventional stress detection strategies rely on psychological scales and physiological devices, which require active individual participation making it
labor-consuming, complex and expensive. With the rapid growth of social networks, people are willing to share moods via social media platforms making it
practicable to leverage online social interaction data for stress detection. The developed novel hybrid model Psychological Stress Detection (PSD), automatically
detect the individual's psychological stress from social media. It comprises of three modules Probabilistic Naïve Bayes Classifier, Visual (Hue, Saturation, Value)
and Social, to leverage text, image post and social interaction information we have defined the set of stress-related textual 'F = {f1, f2, f3, f4}', visual 'vF = {vf1,
vf2}', social 'sf' to detect and predict stress from social media content. Experimental results show that the proposed PSD model improves the detection
performance when compared to TensiStrength and Teenchat framework, PSD achieves 95% of Precision rate. PSD model would be useful in developing stress
detection tools for mental health agencies and individuals

Presenter bio: I have completed my Ph.D in the area of surveillance of instant messages using Ontology and data mining from Osmania university, under esteemed
guidance of prof. Dr.Lakshmi Rajamani

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 13/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

2:00 Proposed Disease Prediction System Based on Data Mining Algorithm


Najwa Fadhil, ALhadeethy
The development of Big data in biomedical and healthcare communities offers an exact analysis of medical data benefits such as primary disease detection,
patient care, and public services. But, the analysis accuracy is reduced. The value of medical data is incomplete. Moreover, several regions exhibit unique
features of certain regional diseases which may decline the prediction of disease outbreaks. In the proposed system, novel decision tree based algorithms are
used which leads to considering more factors in general and predictions with high accuracy compared to other studies in Disease Prediction. It uses the 2 kinds
of novel algorithms for classification which. Data mining are used for the medical applications like a prediction of disease, determination of disease treatment,
and prediction of healthcare costs. Associated with other kinds of prediction, disease prediction is a significant method in today's medical world. The Disease
Prediction has a substantial part in data mining. One of this research aims is to offer a novel KBayesTreeRegression based multimodal disease risk prediction
(KBayesTreeRegression-MDRP) algorithm to provide the prediction accuracy of above 94.8% with a convergence speed, which is faster than existing techniques.
. Recent technologies are utilized in the medical field to enhance the medical services in cost-effective manner. Data Mining methods are also utilized to inspect
the numerous factors which are responsible for diseases for instance food type, diverse working environment, educations, living atmosphere, pure water
availability, health care services, cultural, environmental and agricultural factors. Medical decision support systems are implemented to support clinicians in their
diagnosis. They typically work through an examination of medical datasets and also knowledge base of clinical expertise. The excellence of medical diagnostic
decisions can be augmented through improvements to these systems. Data mining provides a way to get the information suppressed in the data. They can find
patterns hidden in large and complex collections of data, where these patterns elude traditional statistical approaches to analysis Keywords- Data Mining -
Disease Prediction - Healthcare Community - System Performance

Presenter bio: Name : Najwa Fadhil Abbas Alhadeety Nationality : Iraq Date of birth: 17 march 1980 Education : Master degree in computers and Information Technology -
University of Technology - Iraq Working as a lecturer in JAZEERA University - ICT Department - Dubai

Sunday, November 18 2:20 - 3:10


LB-1: Lunch Break Day-1
Room: S22-BTC Food Court

Sunday, November 18 3:10 - 4:50


S8: Internet of Things
Room: S45-108-Zain E-Learning Cente
Chairs: Mohamed Eltoweissy, Chitra Balakrishna

3:10 Design of Chipless RFID Tag Based on Stepped Impedance Resonator for IoT Applications
Wazie Mohammed Abdulkawi and Abdel Fattah Sheta
The current growth in the identification, following, and sensing applications for the Internet of Things (IoT) have pushed the chipless RFID technology to gain
much attention due to its remarkable advantages compared to conventional barcodes. New chipless RFID tag based on steeped impedance resonator (SIR) is
presented in this paper. This tag has a data capacity of 6-bits in the range from 2 to 2.6 GHz for a size of 5.4×2.6×0.05 cm3. The proposed tag consists of an SIR
circuit and two cross-polarized ultra-wideband (UWB) antennas to transmit and receive the interrogation and response signal of the chipless Radio Frequency
IDentification (RFID) tag. The prototype of the tag is designed on a Taconic TLX-8 substrate of dielectric constant 2.55 and thickness 0.5 mm. The proposed
passive SIR chipless RFID tag can be used in many industrial and IoT applications.

Presenter bio: Engr. Wazie Abdulkawi is currently pursuing PhD at Electrical Engineering Department in King Saud University. He received MS in Electrical Engineering
degree from King Saud University in 2013. He obtained B. Sc. in Communication Engineering degree from Ibb University, Ibb, Yemen in 2007.

3:30 A Proposal For Server-less Cloud-based Infrastructure For A Smart Metering System In The Kingdom Of Bahrain
Ahmed Alnaser and Wael M El-Medany
Replacing the normal electricity and water meters with smart ones is one of the major transformations toward smart cities in the Kingdom of Bahrain. This
transformation eliminates the need for manual reading and the estimated monthly billing values. The current approach of the system infrastructure is having the
smart meters connected to a network and communicates with a server which reads the data from the meters on periodic times. The current system requires the
connection to be active and the servers to be turned on all the time or at least for the time taken to connect to all meters or when any request is received from a
user. Our proposed solution benefits from the server-less infrastructure which uses cloud managed services to eliminate the need for the server-based
infrastructure. The proposed solution minimize the computing to its minimum requirement while enhancing the security for the system. In this paper, we are
discussing the current system and the related issues with the required resources. Also, we are presenting the proposed system while comparing both systems
for the used resources, security, complexity, availability, maintenance requirement, and reliability.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 14/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Presenter bio: Ahmed E. Al-Naser received the Bachelor’s degree in computer science from the University of Bahrain, Bahrain in 2004. He is currently working toward
Master’s degree in cybersecurity from the University of Bahrain. He has been working in the information technology field since 2004.

3:50 Zero-Trust Architecture for Internet of Things


Hesham Moosa and Ghassan Juma
Internet of Things (IoT) is growing exponentially. The world is starting to accept and adopt this new technology which promises better control over and
information about our surroundings. However, many researchers are trying to grab attention towards the security risks associated. Most of the risks are due to
the heterogeneity of IoT devices and the fact that most of them are computationally-constrained and power-constrained. This prevents them from using the
same security standards as normal computers. Our research tackles the network aspect of IoT security. Current solutions do not account for internal threats,
which necessitate the need to adopt more stringent security architectures. Our solution is to apply the novel zero-trust security (ZTS) model to IoT in order to
protect from those threats. In this paper, we will study the risks related to the network security of IoT devices. We then present ZTS as a solution to mitigate
those risks. A proof-of-concept architecture will be developed to depict how IoT devices will fit in within the ZTS context. Finally, a way forward for current IoT
devices to shift to ZTS architecture will be laid out and discussed.

Presenter bio: Hesham Hasan is a full-time software developer at Ramsis Engineering who supports projects related to the company's in-house ERP system. He is also a
M.Sc. in Cyber Security student at University of Bahrain. His specializations include cyber security, software engineering, and artificial intelligence. Recently, he presented a
research paper related to lightweight encryption for IoT in an international conference in the UK and served as a reviewer for a number of local conferences.

4:10 Homeland Security Video Surveillance System for Smart Cities


Yasser Ismail, Mohamed Hammad and Wael M El-Medany
A novel Motion Estimation architecture, used for homeland security video surveillance systems, proposed in this paper. The proposed architecture is suitable to
be adopted in H.265 High Efficient Video Coding (H.265/HEVC) encoder of video surveillance systems. The proposed architecture uses level A and level B data
reuse to minimize memory I/O while fully utilizing the hardware resources. An efficient local memory is used for performing data reuse while loading both the
current block and the search area inside the Processing Element (PE) array. The proposed architecture has a smooth and a regular data flow. The video
resolution accuracy of the proposed architecture is very high. Subjective and quantitative measures are used to measure the performance of the proposed
architecture. Our architecture can be adopted in the encoder of video surveillance systems and any High Quality (HQ) video related applications such as High
Definition (HD) broadcasting. The time verification of the proposed architecture is tested using Modelism-version10.4a.

Presenter bio: Wael Elmedany is currently an associate professor of Computer Engineering at University of Bahrain, Kingdom of Bahrain, and senior member of IEEE society.
Elmedany holds a PhD degree in Electrical Engineering, Manchester University, Uk. Elmedany is the founder and managing editor of International Journal of Computing
and Digital Systems (IJCDS). He is the founder and organizer of MobiApps, DPNoC, and WoTBD workshops and symposium series. He is also an editor of many journals
special issues, member of editorial boards for many international journals, and member of technical program committees of many conferences. He is also reviewer in many
international journals and conferences, and acts as chairperson in many conferences. El-Medany has over forty publications in a well-known international conferences and
journals, His research interests in cyber security, ASIC design, FPGA, embedded systems, network on chip, remote monitoring systems, and reconfigurable computing.

4:30 Internet of Things: Architectures, challenges and applications


Fatima Mohsin, Eman AlSalem and Zainab Mirza
Internet of Things (IoT) is one of the biggest and powerful technology inventions, it is basically a number of networks that connect the devices, vehicles,
buildings and other aspects of our lives. This could be in the form of sensors, software, tags and network connectivity. As we are living in a glorious and
prosperous era and moving towards a big evolution in life, where the world is being governed, ruled, and manipulated by the internet forces and the new
computing inventions. This paper presents a comprehensive overview of IoT and the main enabling technologies. Also, it describes the IoT architecture, its
security concerns and mentions the related key challenges of the heterogeneous services that provided by IoT enabled assisted living technologies specifically in
smart homes.

Presenter bio: Fatima Mohsin is currently a master's student at the University of Bahrain, got her bachelor in Information Systems and post graduate diploma in Education
from the same university. As cybersecurity major, she is interested in smart cities, Internet of Things (IoT), and big data. Along with her interest in social psychology and
how it evolves with cybersecurity.

S7: Cloud Computing


Room: S45-06-Zain E-Learning Center
Chairs: Muain Aljamlan, Fawzi Mohammed Munir Al-Naima

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 15/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

3:10 Is Bitcoin Mining Halal? Investigating the Sharia Compliance of Bitcoin Mining
Faisal Hammad
Cloud Computing has powered a wide range disruptive technology that changed the economic landscape of many industries. One of these disruptive
technologies is Block Chains and the emergence of cryptocurrencies like Bitcoins. This research explores the Islamic perspective of Bitcoin Mining. For a Bitcoin
transaction to be processed it needs to be 'mined', which is the process to solving a mathematical equation as well as approve Bitcoin transactions distributing it
over various ledgers. The research will highlight the notion of anonymity of the source and destination of the funds in Bitcoin which seen as problematic with
Islamic Banking scholars. Especially since anonymity is the cornerstone of Bitcoin and the feature that allowed Bitcoin and other cryptocurrencies to spread. This
research will rely on leading Islamic Banking scholars in the Kingdom of Bahrain to evaluate Bitcoin Mining's compliance with Sharia.

Presenter bio: Dr Faisal Hammad is an Assistant Professor of Information Systems in the University of Bahrain. Dr Faisal earned his PhD from the University of Nottingham
in the UK, and his MSc from the George Washington University in the USA. Dr Hammad won the best poster award in the Research Showcase in the UK for his work on
improving older adults’ usage of technology. Dr. Faisal has a vast interest in Cloud Computing and is certified Amazon Web Services (AWS) Solution Architect, also he is a
certified AWS Academy instructor. His research interests include Human-Computer Interaction, Cloud Computing, Big Data, and Digital Innovation

3:30 Performance Evaluation of Datacenter Network Topologies via NS-2 Simulations


Ahmed Abdulhameed and Rana Ahmed
A datacenter provides the core computing and storage elements for cloud computing paradigm. The Datacenter network (DCN) topology defines the structure
in which servers and the networking devices are interconnected within a data center. This paper presents the results of a comparative simulation study for four
well-known DCN topologies, basic tree, Google fat tree, Facebook fat tree and Dcell, using a NS2 simulation environment. The traffic patterns used in the
simulations are one-to-one, one-to-all and the all-to-all. The simulation results for these four topologies are also compared under various parameters changes
including packet size and the TCP window size. The simulation results capture the performance metrics which are the average packet delay and the throughput.
The simulation study shows that for less than 20 servers, the Dcell topology has smaller latency and higher throughput compared to the other topologies, while
the Facebook fat tree topology performs better when the number of servers in the data center is large.

Presenter bio: Dr Rana Ahmed is a Professor at American University of Sharjah, UAE. He got his PhD (Electrical Engineering) from Duke University, NC, USA. His current
research interests are in wireless networks, computer networks and fault-tolerant computing systems.

3:50 Friendly Online Technology Development Cloud Service for Bahraini Students based on E-Advisor
Surendran Rajendran and Tamilvizhi T
Cloud Computing is a modern technology that spread over the world through various Cloud services. Everything as a service (Xaas) is the magic of Cloud
Computing. Today, many of the E-Accessibility is running with help of Cloud Computing's Resource Management Technique. Resource Management Technique
has resource selection, resource matchmaking, resource monitoring, resource scheduling, resource allocation and resource accessibility. The proposed
Technology Development service is working based on Elastic Resource Management Technique, E-Advisor and priority based Mapreduce. The students are very
difficult to reach the Technology Development services in worldwide. This work proposes a unique Cloud portal for Technology Development services for
Bahraini Students based on E-Advisor. Here E- Advisor is act as a Cloud broker and it's controlled by the government. This simulated work is implemented in
Cloudsim with proposed priority based Mapreduce algorithms and increased Quality of Services (QoS) Attributes. This online Cloud service is very useful for
Bahraini Students, staff and Industry experts. It produces the high impact in the education field in Bahrain with title of 'Bahrain Technology Development 2020'.
This Cloud portal provides an enhanced and accessible service for students.

Presenter bio: R.Surendran was born on 10th May 1983 at Kumbakonam, India. He completed his Bachelor's Degree in Information Technology in the year 2005 from Anna
University, India. He completed his Master degree in Information Technology and doctorate degree in Computer Science and Engineering in the year 2009 and 2014 from
Sathyabama University, India. Presently he is working as an Assistant Professor in the College of Computer Studies of AMA International University, Bahrain. He is having
eleven years of teaching experience. He has published many papers in reputed International Journals and Conferences. His research interests include Cloud Computing and
Green Computing.

4:10 How to Improve the Resource Utilization in Cloud Data Center?


Surendran Rajendran and Tamilvizhi T
Nowadays all departmental applications are migrating to the Cloud services due to the more efficiency. Cloud utilizes more number of data centers for the
storage, computation and service. Data center consists of various Cloud Resources to achieve the tasks. Resource Utilization is an important Consideration to
save the energy of resources in Data Center. The Cloud Computing has different Techniques to utilize the resources efficiently. This research work use to
improve the resource utilization factor with help of Quality of Service (QoS) parameters. It also saves the time and energy of resources in the Green Cloud
Computing network. Resource providers should follow the Green Service Level Agreement (GSLA) in this proposed Cloud Network. This proposed research work
is follows the Green Resource Management Techniques (GRMT). Green Resource Management Techniques (GRMT) is consists of green based adaptive fault
tolerance resource selection, green based virtualization of resource allocation, green based match making and scheduling algorithms, green based cloud
balancing, green based cloud technology. This work handle only two components, such as green based adaptive fault tolerance resource selection and green
based virtualization of resource allocation. It is used to decreases the energy consumption, Carbon dioxide (CO2) emission and dynamic cost.

Presenter bio: R.Surendran was born on 10th May 1983 at Kumbakonam, India. He completed his Bachelor's Degree in Information Technology in the year 2005 from Anna
University, India. He completed his Master degree in Information Technology and doctorate degree in Computer Science and Engineering in the year 2009 and 2014 from
Sathyabama University, India. Presently he is working as an Assistant Professor in the College of Computer Studies of AMA International University, Bahrain. He is having

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 16/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

eleven years of teaching experience. He has published many papers in reputed International Journals and Conferences. His research interests include Cloud Computing and
Green Computing.

4:30 Challenges of Large Scale Data Processing in the Cloud


Shabeera Tharol Padinilath and S D Madhu Kumar
We are living in a world of big data. The word "big data" not only means a huge amount of data but also their representation and the velocity of access also
differs from that of traditional data. Many different approaches have been proposed for data distribution, management, and processing of large-scale data
processing applications. The large-scale data processing applications can be implemented in in-house clusters or in the cloud. Cloud computing offers large-
scale data processing services in an economic way. This paper gives an insight into these approaches and their challenges.

Presenter bio: Dr. Shabeera T P is a Lecturer in the Department of Computer Engineering at the AKNM Government Polytechnic College, Thirurangadi, Kerala, India. She has
a Ph.D. in Computer Science and Engineering from National Institute of Technology Calicut. She is a member of IEEE and ACM and a lifetime member of Computer Society
of India. Her doctoral thesis was in the area of Resource Management is clouds. Her research interests include cloud computing and big data. She has published six papers
in the International journals and six papers in international Conferences.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 17/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Monday, November 19

Monday, November 19 8:00 - 8:30


R2: Registration-Day2
Room: S45-Zain E-Learning Center

Monday, November 19 8:30 - 8:50


KS-4: Keynote Speaker
Artificial Intelligence Research at the Communication and Information Research Center
Prof. Abdulnasir Hossen, Sultan Qaboos University, Sultanate of Oman

Room: S45-101-Zain E-Learning Center


Chair: Abdulla Alqaddoumi

The Communication and Information Research Center (CIRC) at Sultan Qaboos University (SQU) in Oman was established in 2002 to promote and advance research
and education through Government/University/ Industry partnerships in focused and shared competitive ICT research programs. A number of challenges on the
horizon are FOSS deployment, IoT, smart cities, Artificial Intelligence, telemedicine, mobile multimedia access, quality of service, information security. The presentation
will cover the current and previous research work and community service activities at CIRC, besides the new plans to collaborate with other institutes in the region.
Emphasis on certain research activities in artificial intelligence will be covered during the talk. What is AI, new definitions, what is the AI Industry revolution 4.0,
Automation, what are the necessary future skillsets and areas of investments. New technologies and labor market. Areas of AI studies at SQU. Proposed AI research in
Education. Artificial intelligence in medicine and use of artificial neural networks in diagnosis. Non-invasive diagnosis techniques using biomedical signal processing
are required in hospitals not only to simplify diagnosis methods and to reduce pressure on hospitals, but also to have more accurate automatic systems for diagnosis.
Examples on identification and classifications of patients with obstructive sleep apnea, congestive heart failure, preeclampsia, parkinsonian tremors will be given in the
presentation.

Monday, November 19 8:55 - 9:20


KS-5: Keynote Speaker
IoT and Cloud based open source platforms for healthy and independent living - Present and Future
Dr Princy Johnson is a Senior Lecturer in the School of Engineering at Liverpool John Moores University, UK

Room: S45-101-Zain E-Learning Center


Chair: Aisha Bushager

The provision of flexible platforms to support smart and healthy living at home is increasingly important both to improve quality of life for citizens and to ensure that
they remain productive when working and to enable the development of sustainable health and social care systems. Personal pressures arise as individuals age and
begin to experience age-related conditions, often concurrently. Some of these conditions are caused by or accelerated by lifestyles and behaviour but the impact can,
in many cases, be mitigated by effecting changes in lifestyle and behaviour choices. Currently, there are several commercial and government funded projects to
enable development of open source flexible platforms. The search is still not over. What novel processes and techniques are needed to aid in the development of such
large scale platforms. This keynote will touch upon innovative techniques and methodologies that will support development of such scalable learning platforms

Monday, November 19 9:20 - 9:45


SB-3: Short Break
Room: S45-Zain E-Learning Center

Monday, November 19 9:45 - 11:25


S9: Cyber Security
Room: S45-108-Zain E-Learning Cente
Chairs: Hesham al-Ammal, Mazen Ali

9:45 Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Zakaria Saleh and Ahmad Mashhour
Access to information and data is becoming an essential part of nearly every aspect of modern business operations. Unfortunately, accessing information
systems comes with increased chances of intrusion and unauthorized access. Acquiring and maintaining evidence from a computer or networks in the current
high-tech world is essential in any comprehensive forensic investigation. Software and hardware tools are used to easily manage the evidence and view all
relevant files. In an effort to enhance computer access security, keystroke authentication, is one of the biometric solutions that were proposed as a solution for

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 18/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

enhancing users' identification. This research proposes using user's keystroke errors to determine guilt during forensics investigations, where it was found that
individuals keystroke patters are repeatable and variant from those of others, and that keystroke patterns are impossible to steal or imitate. So, in this paper, we
investigate the effectiveness of relying on "user's mistakes" as another behavioral biometric keystroke dynamic.

10:05 Smart Transportation System: An Investigation of the security challenges


Nawal Alsaffar, Hayat Mohamed Abdulla Ali and Wael M El-Medany
The world today is moving toward the connected environment because of the advance in the information technology, smart cities is a result of this evolution.
One of the important technologies that get high attention within the framework of the smart cities is the smart transportation. The smart transportation or the
intelligent transportation system (ITS) solved many issues related to the transportation. However, it might be exposed to many security and privacy issues.
Therefore, this research aims to investigate the security issues, privacy issues and the solutions for the smart transportation. Furthermore, the contribution of this
research will promote the researchers to the different types of the security and privacy issues with the solutions so that they can use the outcomes as a base for
their further researches.

Presenter bio: Mrs. Nawal Alsaffar started her career as senior demonstrator at the department of Information Systems, University of Bahrain since 2004. She received the
bachelor degree in Computer Science from the University of Bahrain in 2004. She got an executive diploma in project management from the Arab Open University in 2010.
Right now, she is doing her master in IT at the University of Bahrain. She got some professional certificates such as COBIT 5 and she attend many courses including AWS,
Oracle 9, and communication skills. Her research interest is mainly in Internet of Thing (IoT) and its applications.

10:25 The role of User Entity Behavior Analytics to detect network attacks in real time
Manya Salitin and Ali H Zolait, AZ
This paper aims to assess the value and success of using behavior analytics in securing the network from not-before-seen attacks such as zero-day attacks. This
paper uses a systematic literature review and self-administrated survey and interviews with convenience sampling of high profile network users and top security
vendors. Survey and interviews with various security experts are utilized to verify the matter-of-fact effectiveness of the solutions based on behavior analytics.
During collecting the primary data via a survey, researchers will go for a structured interview with vendors who are selling solutions to understand the
performance of behavior analytics-based solutions and the distinct features of their solutions.The endeavor of this paper is to highlight the weaknesses and
strengths of different UEBA solutions and their effectiveness for detecting network attacks in real-time interaction. This research contrasts top fifteen UEBA
technologies based on use cases and capabilities and highlights common usage scenarios. Based on the evidence, recommendations will be given.

Presenter bio: Dr. Zolait is the Assistant Professor of Management Information Systems. He is considered a prominent scholar and leader in the field of Technology
Acceptance. He has published articles on aspects of Information Security, Internet Banking, and Information Systems Performance in Organization, Web Maturity
Evaluation, Information Systems, and Performance Analysis. His work has been published in leading, ISI & Scopus indexed, International Journals such as Government
Information Quarterly, Behavior & Information Technology, Journal of Systems and Information Technology, Journal of Financial Services Marketing. He is the Editor-
International Journal of Technology Diffusion (IJTD). Before coming to University of Bahrain, he was the stoops distinguished assistant professor of E-commerce and
Management Information Systems at Graduate School of Business- University of Malaya - Malaysia. He was the Visiting Research Fellow at He literally developed hundreds
of students at all level.

10:45 Multiple Encrypted Random Forests using Compressed Sensing for Private Classification
Mohamed Waleed Fakhr
Recently there has been a huge interest in private computing. In particular; to perform privacy preserving classification tasks. Homomorphic encryption offers
secure asymmetric encryption solution to this problem, however, it comes with a high storage and computation cost. Compressed sensing (CS) on the other
hand is much lighter; however, lacks privacy since the encryption uses a symmetric key which is the random projection matrix. A novel privacy preserving
classification approach is proposed in this paper which employs multiple encrypted random forests with two compressed sensing encryption levels. At the first
level, each feature vector is CS-encrypted using a different random matrix for each forest. At query time, the user selects one matrix randomly from a set of R
different matrices, and gets R encrypted results of which only one will be used. At the second level, the class-label information at each tree leaf is encrypted
using a different CS matrix for each tree. During recognition, the cloud adds all the encrypted leaf CS vectors for each of the R forests and sends to the user,
where only one of them goes through sparse recovery to find the class label. Experiments on COREL1K and CIFAR10 image classification tasks show that the
proposed approach achieves classification accuracy similar or better than nearest neighbour classifier with plaintext features. Also, correlation-based results
show that the multiple-forest approach offers good level of semantic security between the feature vectors while the class-label CS encryption approach offers
excellent privacy to prevent the cloud from knowing the class-label.

Presenter bio: Mr. Moath Waleed Mohammed is a senior student, Electronics Engineering Department, University of Bahrain. He is an accomplished member of IEEE branch
at UOB. He has been elected as IEEE student-branch chair at UoB-SB in August 2018. Moath has a great interest in the fields of Digital Processing, Communications and
Machine learning fields.

11:05 The influencing factors of internet banking in dubai

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 19/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Aiysha Hameed Jasim


In this paper, the effectiveness of human factors on the e-banking system in Dubai had been identified and analyzed. The study targets are to aspect the human
factors by literature review. Moreover, the statistical analysis has been studied for these factors. The study has focused on the costumers have dealing with the
local and international banks in Dubai and utilized survey of questionnaire to get the significant information. The investigation to uncover security mindfulness
among the clients of e-banking in Dubai and to discover out the effect of the components on the choice of the clients to utilize the electronic framework.

Presenter bio: Aiysha Hameed Jasim, working as Director Manger in Medical center in UAE, had master degree in IT from IIUM. had bachelor degree in software
Engineering from Al Ain University.

S10: Telecommunication and Networks-2


Room: S45-06-Zain E-Learning Center
Chairs: Magdy Bayoumi, Akram Zeki

9:45 5G and Effect of Key Coexistence Factors


Zaid Ahmed Shamsan and Abdulaziz Al-hetar
The main goal of this paper is to address the spectrum coexistence issue of 5G systems by investigating the intersystem interference phenomenon. The
intersystem interference is highly highlighted in two considered frequency bands, 800- and 3500-MHz, due to the congested various wireless systems within
these spectrum bands in addition that the 5G systems will employ all available frequency spectrum including the millimeter waves. Some main coexistence
factors will be analyzed and interpreted in related to the coexistence scenarios between 5G and a wireless fixed link. Results are provided for the sake of more
understanding and comprehension of the coexistence issue.

Presenter bio: Dr. Shamsan is currently an assistant professor, Electrical Engineering Department, Engineering Faculty, at Al-Imam Mohammad Ibn Saud Islamic University.
He was a Postdoctoral Research Fellow with the Wireless Communication Center, Faculty of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Malaysia, (April
2010-April 2012). He obtained his PhD and M.Eng. from Universiti Teknologi Malaysia (UTM), Malaysia, in Electrical, Electronics and Telecommunications Engineering in
2010 and 2007, respectively. Shamsan received the bachelor degree in Electronics and Communications Engineering from Sudan University of Science and Technology,
Sudan, in 2002. His research interests include LTE-Advanced system, rain fading mitigation, LMDS system analysis, coexistence and spectrum sharing analysis, OFDM
System, and propagation channel prediction.

10:05 X-band Conformal Antenna Array For Low Cost CubeSats


Hisham Khalil
This paper present, a design of X-band conformal slot antenna array for cube satellite. To increase the perfect attachment of the antenna onto the platform of
unit two (U2) CubeSat, the low profile broadband feeding structure is used to reduce EMC issues. The array of 1×6 elements has been simulated in HFSS with
the gain of 11.15dB and SLL of 19.62dB. the center frequency is 10 GHz and VSWR is ≤2

Presenter bio: Hisham Khalil was born in 1985. He received the Master’s degree in electronic engineering in 2012 and working on Ph.D. in electromagnetic field and
microwave technology from the Capital University of Science and Technology, Pakistan. He became a Assistant Professor in 2013, and teaches courses in microwave and
antennas. His research interests include analysis and design of printed antennas, conformal arrays, and electromagnetic.

10:25 Quantized Run Length Encoding QRLE -New Compression Method-: Application to ECG Transmission via IEEE802.11b
WLAN Channel
Sid Ahmed Chouakri and Abdelmalik Taleb-Ahmed
A new method of signal compression, called Quantized Run Length Encoding QRLE, based upon the 'classical' run length method combined to discrete wavelet
transform thresholding, intended for a simulated transmission via the IEEE 802.11b WLAN channel, is presented in this work. The key idea of our new method
consists of quantifying each pair of zero followed by its corresponding run number, issued from the RLE, by one value consisting on the run number value plus
an offset of predetermined integer value. In this work, the suitable offset was adjusted to 1024(≡210). This leads to quantizing the 'new' run number on 11 bits
while the non null ECG thresholded ECG signal samples are quantized on 10 bits. The trivial advantage of this method is suppression, and consequently gaining,
of all zeros. We have applied the algorithm to real ECG signals, exhibiting some cardiac status, extracted from the MIT-BIH arrhythmia data base, transmitted via
a 'simulated' IEEE 802.11b WLAN channel. To evaluate the new QRLE based ECG compression algorithm, we have simulated transmitting the compressed ECG
signal via the IEEE 802.11b WLAN channel. In terms of compression efficiency, the algorithm achieves compression ratio of around 10:1, normalized root mean
squared error (NRMSE) of 0.1% and (mean± standard deviation) of the difference between the restituted ECG signal and the original one of around (10-4) ±
0.02. Moreover, a comparative study with respect to selected ECG compression algorithms show the higher performance of the developed new technique called
'Quantized run length encoding QRLE'.

Presenter bio: Professor CHOUAKRI, SID AHMED, engineering educator, researcher; PhD (hon.), Univ. of Tlemcen, Algeria, 2008. Rschr., Prof. Univ. of Sidi Bel Abbès, Algeria,
since 1997. Teaching at the department of telecommunications; faculty of electrical engineering. Member of Laboratory of Telecommunications and Digital Signal
Processing as well as head of the research team: "Imagerie et Telemedecine" He received the engineering degree in Computer Science from the National Institute of
electricity and electronics of Boumerdes, Algeria in 1992 and the Master degree and PhD in Electronics from the University of Tlemcen, Algeria in respectively, 1997 and

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 20/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

2008. Domains of interest: biomedical engineering, signal processing (digital filtering, time-frequency analysis, wavelet transform…), Hardware systems, real time systems,
wireless for telemedicine, telecardiology

10:45 Road Lane-Lines Detection in Real-Time for Advanced Driving Assistance Systems
Wael Farag
In this paper, a fast and reliable lane-lines detection and tracking technique is proposed. The proposed technique is well suited to be used in Advanced Driving
Assistance Systems (ADAS) or self-driving cars. The main emphasis of the proposed technique in on simplicity and fast computation capability so that it can be
embedded in affordable CPUs that are employed by ADAS systems. The proposed technique is mainly a pipeline of computer vision algorithms that augment
each other and take in raw RGB images to produce the required lane-line segments that represent the boundary of the road for the car. Each used algorithm is
described in details, implemented and its performance is evaluated using actual road images and videos captured by the front mounted camera of the car. The
whole pipeline performance is also tested and evaluated on real videos. The evaluation of the proposed technique shows that it reliably detects and tracks road
boundaries under various conditions. The usefulness and the shortcomings of the proposed technique are also discussed in details.

Presenter bio: Wael Farag earned his Ph.D. from the University of Waterloo, Canada in 1998; M.Sc. from the University of Saskatchewan, Canada in 1994; and B.Sc. from
Cairo University, Egypt in 1990. His research, teaching and industrial experience focus on embedded systems, mechatronics, autonomous vehicles, renewable energy, and
control systems. He has a combined of 17 years of industrial and senior management experience in: Automotive (Valeo), Oil & Gas (Schneider) and Construction Machines
(Caterpillar) positioned in several countries including Canada, USA & Egypt. Moreover, he has 10 Years of academic experience at: Wilfrid Laurier University, Cairo
University, and American University of the Middle East. Spanning several topics of electrical and computer engineering. He is the holder of 2 US patents; ISO9000 Lead
Auditor Certified and Scrum Master Certified.

11:05 Comparison of 2D and 3D Propagation in Wi-Fi Networks


Reham Almesaeed
Accurate and realistic modelling of the wireless channel is vital for precise evaluation of the system level performance of wireless transmission systems.
Therefore, channel models have evolved from basic theoretic empirical models that focused on large scale fading to more advanced and standardized models.
In addition, the introduction of advanced Multiple-Input Multiple Output (MIMO) techniques such as massive MIMO, Full Dimension (FD)-MIMO, and 3D
beamforming requires the development of accurate 3D wireless channel models to fully exploits these MIMO technologies. This paper highlights the impact of
3D propagation on MIMO performance in Wi-Fi system, precisely in terms of physical (PHY) throughout and Signal-to-Noise Ratio (SNR).

Presenter bio: Reham Almesaeed received her MSC degree in Communication Networks and signal processing from University of Bristol, UK in 2010. She completed her
PhD in Telecommunication Engineering at University of Bristol, UK in 2017. Her teaching and research include: Wi-Fi, 5G systems, MIMO, wireless propagation, C-RAN,
network protocols. In 2008, she started her career as graduate assistant in University of Bahrain, Computer Engineering department.

S11: Informatics-2 (Education & E-Learning Systems)


Room: S45-11-Zain E-Learning Center
Chairs: Mohammed Redha Qader, Athraa Almosawi

9:45 Integration of ethics in e-Learning through Virtual Academic Counsellor


Abdul Hafeez Muhammad Younis
It is vital for e-Learning stakeholders to overcome the factors which influences the students to deviate from educational objective. A Delphi study with the help
of e-Learning experts was conducted to investigate and control this issue. It was found that there is deficiency of face-to-face interactions among students and
teachers in e-Learning. Moreover, lack of counselling and traditional policies in independent e-learning environment also become the cause of this ethical
dilemma. Different approaches to control this issue were also discussed and investigated to propose a model. It is recommended to involve members of the
society as virtual academic counsellor in e-Learning to develop ethical and moral values of students. The study fulfils an identified need that how ethics can be
integrated in e-Learning management system of academic institution to produce ethically competent graduates. It is expected that by following provided
guidelines, the passing graduates will have field specific knowledge along with good ethical building to serve not just their families and societies but the entire
nation.

Presenter bio: AbdulHafeez Muhammad is is currently working as Sr. Assistant professor at department of computer science in Bahria University, Lahore campus, Pakistan.
He earned his PhD (IT) from Kulliya of Information and Communication Technology, International Islamic University Malaysia. He is graduated MS in Software Engineering
form International Islamic University Islamabad, Pakistan. His research areas are ICT based educational technologies and management, e-learning and software
engineering management He has almost 15 years experience of teaching, research and management in same field. He is author of more than 20 research Articles (ISI,
Scopus, and IEEE) and Book chapters. He is also Reviewer and Members of IEEE, ISI and Scopus based International journals

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 21/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

10:05 Evaluating Students' Satisfaction of E-Learning Using Decision Support Systems (DSS)
Akram Zeki, Ali Al-Rahmi, Ahmad Kaseri Ramin, Waleed Al-Rahmi and Noraffandy Yahaya
E-learning is a form of education that is increasingly being used in higher education in the developed world. The aim of the study was to evaluating students'
satisfaction of e-Learning. In this research, we apply and use the theory of technology acceptance model (TAM). We employ structural equation modelling (SEM)
approach with SmartPLS software to investigate students' adoption process. Findings indicates that the perceived ease of use, perceived usefulness and
intention to use e-learning among university students have a positive impact and substantially associated with learning performance and learning satisfaction.
The study concludes that university students in Malaysia have positive perceptions towards e-learning and intend to practice it for educational purposes.

Presenter bio: Akram M. Zeki (PhD in Computer Science from University Technology Malaysia) is an Associate Professor at Department of Information System at Faculty of
Information and Communication Technology at International Islamic University Malaysia. His research interest including of Watermarking, Steganography, Information
Security and Image Processing and Multimedia, he is very interesting to work in the field of IT and Islam and develop Islamic Applications. He is supervising few master and
PhD students; he is leading few research grants under his university or under national grant. Dr. Akram published 7 books, more than 50 Articles in Journals, 45 book’s
chapters and more than 100 conference papers. Beside that he received few awards from university and national level.

10:25 A Multifunction Reminder Platform for an Educational Environment


Abdulaziz Guerouat
In this paper, I present a multifunction reminder platform that is dedicated to an educational environment. I consider the reminder as a two-dimensional
function, i.e. depending on two variables, time and space. It automatically produces alarms with notifications whenever these two variables take specific values.
In other words, when a student approaches an educational or administrative location based on his GPS geo coordinates. The two-dimensional function reminder
helps a student to better manage time and avoid delays in accomplishing tasks. I identified different educational uses for such a reminder that relate to the daily
life of a student. The reminder function is demonstrated for the library case study.

Presenter bio: -PhD in Computer Science obtained from the University of Magdeburg, Germany -Research Interests include: Communication Protocol Engineering and
Testing, Smart Cities, Mobile Computing, Data Mining

10:45 Accuracy vs. Cost in Decision Trees: A Survey


Mona Al Hamad and Ahmed M. Zeki
Decision Trees have been applied widely for classification in many fields such as finance, marketing, engineering and medicine. The increased field of
application, made the requirement for understanding various aspects of decision trees in deep. This paper introduces the concept of decision trees, their various
areas of application in data mining, summarize the standard decision tree algorithms, and identify their main advantages and disadvantages. It mainly aimed to
clarify relationship between the classification accuracy and classification cost in decision trees as balancing the two is very important in many fields such as
medical diagnosis.

Presenter bio: Mona got her bachelor degree in Computer Engineering from the University of Bahrain in 2007. In 2010, she got executive diploma in project management
from the Arab Open University. Right now, she is doing her master in IT at the University of Bahrain. As part from self and career development, she got some professional
certificates such as COBIT 5 and other courses including adobe flash, communication skills, self-development, supervisory skills, and time management courses. She is
working as a demonstrator at the department of Information Systems, University of Bahrain since 2007. Her research interest is mainly Data Mining.

Presenter bio: Ahmed M. Zeki holds a PhD in Computer Science. Currently, he is an Assistant Professor at the Department of Information Systems, College of Information
Technology (CIT), University of Bahrain (UOB). He is a member of ACS, ARISE, ISOC. He teaches courses like Data Mining and Artificial Intelligence among others. His
research is mainly focused on Pattern Recognition and Data Mining. He has published a number of papers in international journals and international conferences,
participated in several research exhibitions and received several local and international awards.

11:05 Hybrid Circuit Simulation and Modeling Cloud-Based System Using an integrated IoT for Electronics and Computer
Engineering e-Learning Courses
Hasan Alaswad, Shaffee Mayoof, Sameer AlJishi and Ahmed Tarafa
This paper shows the design and implementation of hybrid circuits cloud-based enables students to design, simulate, and model both Analog and Digital
circuits and integrates the IoT by adding ability to include sensors and interact with the design on real laboratory to act as a comprehensive laboratory device to
draw circuits, integrate different components, apply different inputs and simulate, capture, measure, and detect any defect or heated elements. The system
scales by elastic features of the cloud computing. The cloud system proposes an integrated environment for digital, analog and internet-of-things modeling,
integration and decomposition. The cloud system to show how cloud-based simulator can transform the eLearning and enhance the digital learning teaching
and studying environments. The lab device can be integrated into circuits level with the cloud system to run real circuits simultaneously with the simulation.
provide in-browser cloud system for schematic capture and circuit simulation & emulation. As a testimony of the system of the modeling and simulation
discipline, a list of about 100 types of equipment's included and tested.

Presenter bio: Shaffee Nasr Mayoof, Head of Development and Co-Founder of Script Solutions, Shaffee Mayoof has more than 18 years’ experience in the ICT Industry.
Script IT Solutions has created a global footprint as a leading provider of cloud circuit simulator. Shaffee holds a BSc in Computer Engineering from University of Bahrain.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 22/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Monday, November 19 9:45 - 4:00


S12: Internet of Things - Workshop
Room: S45-12-Zain E-Learning Center
Chair: Chitra Balakrishna

9:45 International Workshop on Internet of Things (IoT): Technology and Applications


Princy Johnson, Gopi Krishna S Garge and Chitra Balakrishna
An understanding of the way the IoT systems work is necessary for end users to enable them to maximise their benefits from IoT. This workshop on IoT serves as
a boot strap to initiate end users into the IoT ecosystem and appreciate its utility, characteristics as well as risks. The workshops are targeted towards industry
professionals, faculty, students, and enthusiasts. The workshop content is designed with the current market trends and provides information on use-case
scenarios and corresponding solutions. The workshop content provides sufficient awareness to the participants to be able to engage in discussions for
implementation of functional IoT solutions. The workshop addresses the generic approach to building an IoT system. It is intended to help users to understand
solutions for specific problem areas in smart home, industrial automation, transport and mobility, healthcare and in general, smart city initiatives. The workshop
will include a series of talks and a couple of Q&A sessions.

Presenter bio: Dr Princy Johnson is a Senior Lecturer in the School of Engineering at Liverpool John Moores University. She received her PhD from King’s College London.
Her research interests include energy-efficient protocols for wireless sensor and mobile networks, Optimisation tools for Data Analysis, intelligent algorithms for
personalised interface for healthcare and transport applications, and leadership skills for engineers. Dr Johnson is a registered PRINCE2 ® practitioner and an avid
collaborator. She has put together a cohesive collaborative team from across Europe and coordinated the consortium through research activities and various UK and EU
funding calls. She is an executive committee member of Rail Research UK Association (RRUKA) since September 2011. She was the Lead co-chair of the workshop on
PERSONALIZED MOBILE APPLICATIONS FOR SMART CITIES AND SMART CITIZENS (PMA 2017) at the 28th Annual IEEE International Symposium on Personal, Indoor and
Mobile Radio Communications (PIMRC’17), Oct 2017. She jointly organised and co-chaired a 2-day IEEE workshop on IoT: Sensor Technologies, Applications and
Entrepreneurship with Sensor City, Liverpool and IEEE WIE UK&I chapter in October 2017). https://www.ljmu.ac.uk/about-us/staff-profiles/faculty-of-engineering- and-
technology/department-of-electronics-and-electrical-engineering/princy-johnson

Presenter bio: Gopi Garge is the Founder-Director of SmartLancs Ltd, UK, a consulting start-up that focuses on technology and solutions for Smart Cities, eHealth and
related areas such as interconnectivity, interoperability and security. He is also the founder-Director of Ignatia Sensors Ltd., UK a technology company focusing on
solutions for assisted living, and associated with Geospoc UK Ltd., a company focusing on GIS solutions for industry verticals. Prior to this, he headed the Network Services
group at the Indian Institute of Science (IISc) in Bangalore, India. His interests include IoT systems and safety-criticality, Data validity and sanitisation (Big Data), and Edge
Computing. He is a Fellow of the IPv6 Forum and serves as a member of the IEEE P1931.1 working group.

Presenter bio: Chitra Balakrishna, Ph.D. MBCS, FHEA, CEH is currently the Program Leader, Cyber Security at Open University, Milton Keynes, United Kingdom. She has over
18 years of experience spanning across academia and industry in the areas of Cyber Security, Data Networking, Mobile Communications, Technologies and Applications.
She has several academic publications and a book by John Wiley Publications to her credit. Additionally, she has led various ERDF funded and EPSRC pilot projects
addressing mobile and wireless sensor technologies and IoT security. In 2017, she successfully completed a HEA funded project on cyber security education
http://www.cyberedge.uk and currently holds the GSIKE UK-Gulf partnership fund with University of Bahrain. She has founded and chaired successful IEEE sponsored
workshops on Smart cities, IoT and cyber security since 2009. Her current research interests relate to cyber security within the context of smart cities, eHealth and Internet
of Things.

11:25 P2 Prayer

Monday, November 19 11:25 - 11:50


P2: Prayer
Room: S45-Zain E-Learning Center

Monday, November 19 11:50 - 4:30


PS-2: Poster Session
Room: S45-Zain E-Learning Center

Monday, November 19 11:50 - 1:30


S13: Machine Learning and Robotics
Room: S45-108-Zain E-Learning Cente

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 23/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Chairs: Nabil Hewahi, Ebrahim Abdulla Mattar

11:50 Performance Analysis of Machine Learning Classifiers for ASD Screening using Rapidminer
Alrence S Halibas, Leslyn Reazol, Erbeth Gerald Delvo and Jannette Tibudan
Several machine learning classifiers have been used for Autism Spectrum Disorder screening, however, literature in finding the best classifier for this application
domain is limited. Hence, this paper presents a comparison of five (5) supervised machine learning algorithms: Decision Tree, Naïve Bayes, k-nn, Random Tree,
and Deep Learning using small datasets (n=1100) on child, adolescent and adult ASD screening in finding the most appropriate classifier. These algorithms,
which are evaluated using a broad set of prediction performance metrics including accuracy, precision/recall measures, and Receiver Operating Characteristics,
are compared against each other. The experiment result suggests that the Deep Learning classifier gives the best performance (with more than 96%) in almost
all metrics while the Random Tree classifier came out as the least performing classifier in all the performance metrics.

Presenter bio: Dr. Alrence Santiago Halibas completed her BS Computer Engineering, Master of Engineering and PhD in Technology Management in 2000, 2003 and 2009,
respectively, in the Philippines. She has a strong and extensive teaching and administrative experience in the academe. Furthermore, she is a holder of several IT
certifications, an ISO auditor, an active researcher, and a reviewer of international peer-reviewed journals. Dr. Halibas joined La Salle University, Philippines in 2000 as a
lecturer. After a 3 year stint, she was appointed Associate Dean and eventually promoted to Dean where she served for three consecutive terms. She moved to Oman and
joined Gulf College in 2012, where she is currently the Programme Leader of the Faculty of Computing Sciences. Her research interests include quality assurance,
educational management, learning analytics, teaching and learning pedagogies, innovation and entrepreneurship, web usability, and software engineering.

12:10 Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning
Sadam Al-Azani and El-Sayed M El-Alfy
In this study, we explore the idea of applying word embedding based features with machine learning techniques to detect Arabic spam tweets. In addition, the
effects of text domain of the collected corpus to learn word embedding techniques is analyzed. This is evaluated using a publicly available dataset of 3503
tweets alongside with three popular classifiers for binary classification problem, namely: Na\"ive Bayes, Decision tress and SVM. The experimental results revel
that word embeddings based features able to recognize tweets generated automatically from those generated by human and outperform the baseline. An
accuracy rate of 87.33% is achieved using skip-gram word2vec technique with SVM. In addition, word embedding models are domain independent such that the
models learnt using corpus collected from twitter outperform others significantly.

Presenter bio: Sadam Al-Azani, PhD candidate in computer science at King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia. He hold a master degree in
computer science(2014) from KFUPM. He received the BSc Degree in Computer Science(2004) from Thamar University, Yemen. He is a lecturer in the Faculty of Computer
Science and Information Systems at Thamar University, Yemen. He is interested in Artificial intelligence, Social Big data, Social sensing, Natural language processing,
Machine learning.

12:30 Gender Identification Using 3D Touch Sensor


Ahmed Ibrahim and Mohamed Elsayed
Gender identification has immense value in science and technology. It helps optimizing a software application pertaining to users' gender. In this study, we show
how the 3D touch sensor can be used for gender identification. The 3D touch sensor is newly introduced in the handheld mobile devices. This sensor measures
how much force the user applies to the touch screen. Therefore, these biometric measurements can be exploited for gender identification. This study develops a
special iOS application to collect 3D touch sensor's data from a user. Discrete wavelet transform based features extracted from such data can then be used to
train ensemble bagged tree classifier for the purpose of gender identification. The developed iOS application and proposed classifier are tested using data
collected from 19 males and 16 females. The results are evaluated in terms of sensitivity and specificity, giving averaged values of 79.1% and 81.3% respectively;
however, the sensitivity/specificity could exceed 93% in some cases. Therefore, a 3D touch sensor has a potential value in providing biometric data useful for
gender identification.

Presenter bio: Mr. Ahmed Ibrahim is a researcher and IT specialist at RFTONICS, King Saud University. He has master of Science (MSc) Optics, Image, Vision & Multimedia
for Biometrics from University of Paris-Est Créteil (UPEC) in 2016, and bachelor of computer science from Assiut University in 2007. During his study, he acquired a sold
understanding in machine learning, biosignal/Image processing and algorithms development. Since he has joined RFTONICS, he is involved in developing algorithms in
biomedical engineering and implementing it using state-of the-art software libraries

12:50 An Optimized Machine Learning Approach using Kohonen's Self Organizing Map showing Gene Dependency for Cancer
Mediation Biomarkers
Abhisek Das
All Cancers are genetic, which means that they result from the unnatural function of one or more genes. For thousands of years, lots of effort has been
employed by a number of researchers to identify the possible set of biomarkers for cancer detection. To analyse such a vast set of gene expression, a number of
machine learning techniques are being used. In this article, we have employed Kohonen's Self Organising Map mechanism to optimize the huge dataset of gene
expressions to provide an easy way of representing multidimensional dataset in much lower dimensional spaces. Furthermore, we also have demonstrated an
important test to determine whether a test sample of genes is cancerous or not. By mapping the test sample with a few cancer affected gene samples, we have
clustered the optimized data set to check the number of clusters, which has helped us identifying the genes which are actually affected by cancer disease.
Hence, this paper reports an easy optimization technique to identify the cancer affected genes thereby, facilitating easy diagnosis of cancer.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 24/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Presenter bio: Dr. Abhishek Das is currently working as the Head and Associate Professor in the Dept. of Computer Sc. & Engineering at Aliah University, Kolkata. His
Research Area is in Medical Image Processing, Computer Vision and IoT. He has received a Post Doctoral Research position from University of West Scotland, UK by a
Fellowship received from the European Commission. He is a Member of IEEE and a Honorary Senior Member of IACSIT Singapore. He has several publications in
International and National Journals and peer-reviewed Conferences. He is also a TPC Committee Member of IEEE International conferences in South-East Asia and Editor of
the Journal of Image Processing and Pattern Recognition progress(A UGC approved Journal) and Journal on Image Processing & Computer Vision of IGI Global Publishers,
USA.

1:10 Retinal Image Laser Marks Detection using a Convolutional Neural Networks
Mustafa Ali Abuzaraida and Osama Mohamed Elrajubi
This paper presents a retinal image classifier based on Convolutional Neural Networks which are widely used tools for deep learning. This classifier uses some
texture based features to decide if an input image shows evidence of previous photocoagulation laser treatments. The solution proposed as well as the datasets
used in the training and performance evaluation are presented in detail. The results obtained are described and analyzed. Finally, some considerations on
possible improvements and future developments are made to close the article.

Presenter bio: Akram M. Zeki (PhD in Computer Science from University Technology Malaysia) is an Associate Professor at Department of Information System at Faculty of
Information and Communication Technology at International Islamic University Malaysia. His research interest including of Watermarking, Steganography, Information
Security and Image Processing and Multimedia, he is very interesting to work in the field of IT and Islam and develop Islamic Applications. He is supervising few master and
PhD students; he is leading few research grants under his university or under national grant. Dr. Akram published 7 books, more than 50 Articles in Journals, 45 book’s
chapters and more than 100 conference papers. Beside that he received few awards from university and national level.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 25/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

S14: Optimization, Modeling and Simulation


Room: S45-06-Zain E-Learning Center
Chairs: Alauddin Yousif Al-Omary, Youssef Harrath

11:50 A Novel Graph-Based Algorithm for Solving the Right Partner Problem
Youssef Harrath, Abdul Fattah Salman and Abdulla Alqaddoumi
This research work investigates the problem of selecting the right partner problem. It consists of pairing $n$ given students based on their choices of likes and
dislikes with the aim to maximizing the degree of overall satisfaction of students' choices. The problem is modeled using graphs with special weights on edges
and vertices. Two graph-based algorithms are proposed and tested using various problem instances of different sizes. The experimental results showed very
promising performances for both algorithms.

Presenter bio: Dr. Abdulla Alqaddoumi received his B.Sc. in Computer Science from University of Bahrain, Kingdom of Bahrain in 2002. He completed his M.Sc. in Advanced
Computing Science at University of Manchester, UK in 2005. He completed his Ph.D from New Mexico State University in 2016. Dr. Abdulla Alqaddoumi serves as Assistant
Professor in the Department of Computer Science at the University of Bahrain. His research interest includes Knowledge Representation, Optimization, Parallel Processing,
Programming Languages and Graph Theory.

12:10 Single Machine Scheduling Problem in Uncertain Environment


Amine Mahjoub and Jihene Kaabi
The most current models of the combinatorial optimisation problems assume that the input data is perfectly known and reliable. In practice, this assumption is
often wrong since only data estimations are available or the data is often subject to future changes due to some online disturbances. In this paper, we consider
the scheduling problem of minimising the number of tardy tasks on a single machine with uncertain data. The uncertainty is related to an unavailability of the
machine which can happen at the beginning of the schedule. We will discuss the robustness approach and we will present different robust solutions with
different criteria for the studied problem

Presenter bio: Jihene Kaabi is Assistant Professor in the College of Information Technology at the University of Bahrain. She received her Bachelor degree in Applied
Mathematics from the Faculty of Science, Monastir-Tunisia in 1999. She obtained two Master degrees; the first in Operations Research, Combinatorial, and Optimization
from Polytechnic Institute, GrenobleFrance in 2000 and the second in Automatic and Computer Science from the University of Science & Technique, Besançon-France in
2001. She received her Ph.D in Automatic and Computer Science from the University of Science & Technique, Besançon-France in 2004. Her research interests focus on
scheduling, Production Manufacturing, Maintenance, Multiobjective Optimization, Genetic Algorithms. She developed many research papers in the field of optimization
problems using genetic algorithms and other heuristic approaches.

12:30 A solution to skewed load distribution problem in shortest path methods


Jaspreet Singh
Ad hoc networks are infrastructureless and lack any central administration. Due to scarcity of resources, most tasks require distributed participation. The shortest
path methods are the most widely used routing methods due to their simplicity and efficient operation under low traffic conditions. But as the load in the
network increases, it puts stress on the few nodes which form the shortest path. Most of these overloaded nodes tend to lie towards the centre of network. This
creates a skewed load distribution in such networks and affects the overall performance. In this paper, we confirm the skewed load behaviour of one such
shortest path method for ad hoc networks. We analyze the load on different nodes and relate them to their position in the network. Our experiment verifies a
strong negative correlation between distance of node from network centre and its RouteCache table size. We also propose a metric called RouteCache Index
(RCI), which estimates the load (connections) on a node. Then we propose a multipath routing method, which uses the RCI metric. This proposed method
overcomes the skewed load behaviour and improves the performance of such networks.

Presenter bio: Meryem Kuzu 4th year student in CE, UOB Instructor at Clever Play

12:50 QCI and QoS Aware Downlink Packet Scheduling Algorithms for Multi-Traffic Classes over 4G and beyond Wireless
Networks
Moustafa M Nasralla and Ikram Ur Rehman
The recent advancements in wireless technologies and applications make downlink scheduling and resource allocation a hot topic of research. Hence, fair
scheduling and balanced Quality of Service (QoS) delivery for different types of traffic (e.g., video, VoIP, and best-effort) are vital for the next generation wireless
networks. In this paper, we compare and analyse different downlink scheduling strategies in terms of network-centric performance metrics such as average
packet loss ratio, average throughput, system fairness, and system spectral efficiency. In addition, we show the effect of the QoS Class Identifier (QCI)
parameters on different delay-aware scheduling algorithms. Furthermore, we propose to modify the Log-rule, Linear-rule, and Modified Largest Weighted Delay
First (MLWDF) scheduling strategies by including the QCI parameters in order to balance the QoS delivery for different traffic-classes with improvement to the
overall system performance. Through simulation, we show that the proposed scheduling algorithms utilising the QCI and QoS parameters introduce a
remarkable multi-objective improvement of the QoS performance parameters for different traffic classes (i.e. real-time and non-real-time).

Presenter bio: Dr. Moustafa Mazin Nasralla is currently an assistant professor at the Department of engineering, Faculty of Communications and Networks Engineering,
Prince Sultan University, Riyadh, Saudi Arabia. He was an assistant professor at Prince Sattam University and he was a member of the Wireless Multimedia and Networking

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 26/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

(WMN) Research group. He received his PhD from the Faculty of Science, Engineering and Computing (SEC), Kingston University, London, UK. He received the B.Sc. degree
in electrical engineering from Hashemite University, Jordan, in 2010, and the M.Sc. degree in networking and data communications from Kingston University London,
United Kingdom, in 2011 with honours. His PhD research project was entitled: ‘Video Quality and QoS-Driven Downlink Scheduling for 2D and 3D Video over LTE
Networks'. His research interests include the latest generation of wireless Communication systems, e.g., 5G, LTE-A, LTE wireless networks, IoT, Big Data, SON, OFDMA, etc.

Presenter bio: Dr. Ikram Ur rehman is a faculty member in the department of Engineering and Digital Technologies at Coventry University Group. He completed his PhD
from the school of computing at Kingston University, London. His thesis was entitled "medical QoS and medical QoE for ultrasound video streaming over 4G and beyond
small cell networks". He has been involved in the investigation and development of 4G and beyond network technologies such as LTE/LTE-Advanced, Small Cells, Internet
of Things and Device-to-Device communication. Additionally, the exploitation of Artificial Intelligence and Machine Learning algorithms to assess the influence of QoS on
QoE for video traffic. His current research interest is to expand his horizon and leverage the knowledge gained over the years into the future 5G technology and deep
learning form of machine learning technique.

1:10 The Simulation Models for Human Pedestrian Movement of a Departure Process in an Airport
Anis Izzati Ab Fauzan, Noor Akma Abu Bakar, Mazlina Abdul Majid, Mario Allegra and Muhamed Fakhreldin
The emergence of simulating human movement and behaviour rose in order to imitate and replace human interference with this complex demeanour. It is so
diverse and uncontrollable to the extent it is almost impossible to undergo exhaustive experiments. Hence, simulating this model is crucial. Especially in
designing a public area where human density is too much concentration and the need for properly planned traffic or human movement is very much needed.
For that, simulations and modelling are always the best options for investigating human behaviour. In this research work, the aim is to investigate how effective
and to what extent the ABS, DES and hybrid of both give benefits to the society adequately. Its expected results will be an improved and better version of
human pedestrian movement in the airport of the departure process simulation model.

Presenter bio: I am currently an Associate Professor at Universiti Malaysia Pahang (UMP), Malaysia with more than 15 years' experience as an academic lecturer at Faculty of
Computer Systems & Software Engineering, UMP. I received my PHD in Computer Science from University of Nottingham, UK. I hold various responsibilities in the
administrative works including 6 years as Deputy Dean of Research and Graduate Studies. I am currently the Head of Software Engineering Research Group and Editor in
Chief for International Journal of Computer Systems & Software Engineering. I am one of the academic program committee in UMP and other universities due to my vast
experiences in teaching master and undergraduate courses. My research expertise is Software Agent, Software Usability Testing, Educational Software and Modelling &
Simulation.

S15: Future Vehicular Communications & Self Driving Cars


Room: S45-11-Zain E-Learning Center
Chairs: Sarah Al-Shareeda, Etienne Alain Feukeu

11:50 Broadcast Storm Mitigation in VANETs Using RMS


Etienne Alain Feukeu
The necessity to improve safety measures and reduce accident risks on public roads has prompted and identified the Wireless Access in Vehicular Environment
(WAVE) technology as a prominent and efficient candidate for future vehicular communication. In view to achieve its main objective under WAVE standard, all
nodes or mobile involved should exchange or broadcast safety messages at the rate of l to l0 Hz based on the congestion state of the network. However, in a
congested environment, the Broadcast Storm (BSt) problem naturally occurs and exhausts the available channel bandwidth thereby rendering exchange and
sharing of vital information impossible. In our recent work, the Dynamic Broadcast Storm Mitigation Algorithm (DBSMA) proved to be a good candidate for the
BSt problem mitigation for Cooperative Awareness Messages (CAMs) only. The present work improved the DBSMA (IDBSMA) to cater for both CAMs and
DENMs type messages. The developed IDBSMA approach was tested under two cases scenario conditions and simulation results demonstrated the
outperformance of the IDBSMA over the DBSMA algorithm in three dimensions. Firstly, in terms of broadcasting delay, secondly in terms of performance within
the preset range and lastly in terms of Reserved Margin Space (RMS) to account for the DENMs messages.

Presenter bio: Etienne Alain Feukeu has completed his PhD in 2015 from Tshwane University of Technology and postdoctoral studies from Vaal University of Technology.
He has received several research awards from National Research Fundation (NRF) of South Africa. He has published more than 20 papers at reputed international
conferences and journals (IEEE and Elsevier); he has been serving as TPC, reviewers and editorial board member at numerous conferences and various reputed ISI Journals.
His field of expertise include: Wireless Communication, Signal Processing, Vehicular Ad hoc Network (VANETs), Link Adaptation, Doppler Shift Mitigation and Congestion
Management

12:10 Teaming Up Authentications To Balance Anonymity and Efficiency of Vehicular Networks


Sarah Al-Shareeda and Fusun Ozguner
The type of the utilized authentication framework in internet of vehicles / vehicular network affects the number of vehicles that can concurrently capture the
wireless medium. Some frameworks have less communication overhead while others have more anonymous traits; therefore, using a single authentication is a
biased stance. In this work, we introduce an authentication interchange scheme that intermingles between three frameworks: Public Key Infrastructure (PKI),
Group Signature (GS), and our Identity-based Cryptographic (IBC) authentication. Our scheme is context-aware, i.e., every certain time interval, the PKI vehicle
checks its context; if the vehicle encounters a crowded neighborhood, it switches to a lower-overhead IBC authentication. If the car's context is sparse, it alters to
a more anonymous GS framework. We prove the scheme security by a valid argument using the strategies of attacker games and forking lemmas. To analyze
the effectiveness of the scheme, we defines several performance metrics as well as the communication scenario. The results show that the interchanged scheme

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 27/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

achieves better performance than the case of having one pure secure authentication throughout the network lifetime; our approach is computably fast and does
not compromise the autos' anonymity. Also, the scheme achieves less vehicle drop rate in comparison with the available pure frameworks.

Presenter bio: Sarah Al-Shareeda is a recent PhD graduate from the Department of Electrical and Computer Engineering, The Ohio State University and a Fulbright Science
and Technology Award's fellow. Her research interest is in security and privacy, cryptography, vehicular networks, smart transportation systems, wireless sensor networks,
and cyber physical systems.

12:30 The Simulation on Vehicular Traffic Congestion Using Discrete Event Simulation (DES): A Case Study
Noor Akma Abu Bakar, Mazlina Abdul Majid, Khalid Adam, Ainil Fahsha Nasrun Adi, Younis M. Younis and Muhamed Fakhreldin
The bottleneck networks of the vehicular traffic flow required the clear understanding and the insights of congestion factors, determines the time and location
of traffic breakdown. The congestion propagates through the network caused by the numbers of vehicles continuously growing. There have been lots of
research studies to resolve the issues. Simulation and modelling to the related issues seem significance to the operational research specifically the traffic flow
dynamic for the design, analysis and the management. Hence, this work focused on a simulation model for the vehicular traffic flow in order to reduce the traffic
congestion for a smooth and low-density traffic flow system. Three scenarios from a traffic flow system based on queuing environment which is current traffic
flow system as S1, the newly proposed models as S2 and S3 have been suggested to improve the traffic flow of the intersection. The method of comparing the
performance of simulation results and difficulties, alternative road, the predictive strategy as decision support model with the potential alternative road has
been identified with developing traffic flow simulation using Discrete Event Simulation (DES). DES is as the well-known traditional approach to catering the
problems regarding the queuing system, and run simulation models on the different traffic scenarios for bottleneck analysis. The lower values for the cumulative
average all the parameters indicated the traffic congestion is decreased and to avoid the traffic jam. The experimental results and statistical analysis showed that
the proposed simulation model S2 and S3 for vehicular traffic flow is better than the current traffic flow system S1. It can be summarized that model 3 (S3) can
be applied to the new vehicular traffic flow system with the better simulation results has been produced from the experimental simulations.

Presenter bio: I am currently an Associate Professor at Universiti Malaysia Pahang (UMP), Malaysia with more than 15 years' experience as an academic lecturer at Faculty of
Computer Systems & Software Engineering, UMP. I received my PHD in Computer Science from University of Nottingham, UK. I hold various responsibilities in the
administrative works including 6 years as Deputy Dean of Research and Graduate Studies. I am currently the Head of Software Engineering Research Group and Editor in
Chief for International Journal of Computer Systems & Software Engineering. I am one of the academic program committee in UMP and other universities due to my vast
experiences in teaching master and undergraduate courses. My research expertise is Software Agent, Software Usability Testing, Educational Software and Modelling &
Simulation.

12:50 Behavior Cloning for Autonomous Driving using Convolutional Neural Networks
Wael Farag
In this paper, we propose using a Convolutional Neural Network (CNN) to learn safe driving behavior and smooth steering maneuvering as an empowerment of
autonomous driving technologies. The training data is collected from a front-facing camera and the steering commands issued by an experienced driver driving
in traffic as well as urban roads. This data is then used to train the proposed CNN to facilitate what we call it behavioral cloning. The proposed Behavior Cloning
CNN is named as "BCNet" and its deep seventeen-layer architecture has been selected after extensive trials. The BCNet got trained using Adam's optimization
algorithm as a variant of the Scholastic Gradient Descent (SGD) technique. The paper goes through the development and training process in details and shows
the image processing pipeline harnessed in the development. The proposed approach proved successful in cloning the driving behavior embedded in the
training data set after extensive simulations.

Presenter bio: Wael Farag earned his Ph.D. from the University of Waterloo, Canada in 1998; M.Sc. from the University of Saskatchewan, Canada in 1994; and B.Sc. from
Cairo University, Egypt in 1990. His research, teaching and industrial experience focus on embedded systems, mechatronics, autonomous vehicles, renewable energy, and
control systems. He has a combined of 17 years of industrial and senior management experience in: Automotive (Valeo), Oil & Gas (Schneider) and Construction Machines
(Caterpillar) positioned in several countries including Canada, USA & Egypt. Moreover, he has 10 Years of academic experience at: Wilfrid Laurier University, Cairo
University, and American University of the Middle East. Spanning several topics of electrical and computer engineering. He is the holder of 2 US patents; ISO9000 Lead
Auditor Certified and Scrum Master Certified.

1:10 Tuning of PID Track Followers for Autonomous Driving


Wael Farag
In this paper, a Proportional-Integral-Differential (PID) controller that facilitates track maneuvering for self-driving cars is proposed. Three different design
approaches are used to find and tune the controller hyper-parameters, one of them is specifically proposed in this paper for this specific application. The
proposed controller uses only the Cross-Track-Error (CTE) as an input to the controller, whereas the output is the steering command. Extensive simulation
studies in complex tracks with many sharp turns, have been carried out to evaluate the performance of the proposed controller at different speeds. The analysis
shows that the proposed technique outperforms the other ones. The usefulness and the shortcomings of the proposed tuning mechanism are also discussed in
details.

Presenter bio: Wael Farag earned his Ph.D. from the University of Waterloo, Canada in 1998; M.Sc. from the University of Saskatchewan, Canada in 1994; and B.Sc. from
Cairo University, Egypt in 1990. His research, teaching and industrial experience focus on embedded systems, mechatronics, autonomous vehicles, renewable energy, and
control systems. He has a combined of 17 years of industrial and senior management experience in: Automotive (Valeo), Oil & Gas (Schneider) and Construction Machines
(Caterpillar) positioned in several countries including Canada, USA & Egypt. Moreover, he has 10 Years of academic experience at: Wilfrid Laurier University, Cairo
University, and American University of the Middle East. Spanning several topics of electrical and computer engineering. He is the holder of 2 US patents; ISO9000 Lead
Auditor Certified and Scrum Master Certified.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 28/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

Monday, November 19 1:30 - 2:20


LB-2: Lunch Break Day-2
Room: S22-BTC Food Court

Monday, November 19 2:20 - 4:00


S16: Software Engineering and Cloud Computing
Room: S45-108-Zain E-Learning Cente
Chairs: Faisal Alqaed, Aisha Bushager

2:20 Bahrain Parks Cloud Platform: Live Suit of Tools for Planning, Designing, and Managing Public Parks
Joao Pinelo Silva and Motaz Taiseer Mestarehi
The paper introduces an open source cloud platform for the efficient, knowledge-based, sustainable and inclusive development of urban parks - Bahrain Parks
developed at the University of Bahrain. We describe the local context at the genesis of the initiative, its components, the rationale for the creation of a
comprehensive, live, database, and the suite of web applications that deliver information to different audiences from professionals to the general public. We
describe the data structure on MySQL hosting and the development of both backend and frontend in R Shiny, and the various web applications and how these
leverage the data to useful information for supporting decision-making on park maintenance, planning, and design. We describe the technologies used. We
share findings regarding the official acceptance and attempts to integrate the application in workflows at several agencies. We argue that the project belongs to
the sphere of e-governance. To our knowledge, the project is unique as it is being developed to incorporate an evidence-based design process,
comprehensively. Furthermore, it embeds explicit and implicit public participation in decision-making, through park rating and usage.

Presenter bio: interested in the environmental impact on and of buildings while studying Architecture at University of Bahrain, what caught my attention most was how the
surrounding environment and climate shapes the concrete envelopes we live and work in. How can we as architects reduce the climatic impact on the buildings in the
region? Can we achieve designs that limit energy use? How powerful can passive solutions be, compared to mechanical solutions? Could the micro-climate be improved
through specific urban planning solutions? How urban planning and social spaces improve the quality of our daily activities? I m currently working as a research assistant
on Bahrain Parks and several other projects concerned with the built environment.

2:40 Can Blockchain Spark off the Reincarnation of India's Living Dead?
Pankaj Pandey
A large number of studies have found a negative correlation between economic growth and corruption. Therefore, governments implement various anti-
corruption measures particularly technology-based mechanisms. The government of India has launched various initiatives such as Digital India and Digital India
Land Records Modernization Program (DILRMP) to modernize land records in the country and curb the corruption at various levels of land transactions.
However, despite a push for reform through the DILRMP, India's current land title management system remains plagued with deficiencies. The current system of
land records and property ownership is rife with corruption. DILRMP is heavily dependent on the government functionaries to act as a trusted third party for the
verification of data and processing of deeds. This leaves a space for unscrupulous elements to trick the system and register a fraudulent deed, transfer land
titles, and so on. This paper investigates the usefulness of an emerging technology called Blockchain and its integration with India's biometric identity program
called Aadhaar for management of land records and property registration. This paper proceeds with relevant case studies, by identifying the requirements and
outlining the concept and system architecture for such a solution. From our analysis, we conclude that the blockchain technology in association with Aadhaar
would be an effective mechanism to bring in much-needed transparency in the government functionaries, eradicate fraud and corruption, and enhance
socioeconomic benefits.

Presenter bio: Dr. Pankaj Pandey is a Research Scientist at the Norwegian University of Science and Technology, Gjøvik, Norway. He holds a Bachelor’s degree in
Information Technology from the Uttar Pradesh Technical University, Lucknow, India. He obtained his first Master’s degree from École Supérieure d'Ingénieurs en
Électronique et Électrotechnique, Paris, France, and a second Master’s degree from the Nanyang Technological University, Singapore. He completed his Ph.D. in
Information Security from the Norwegian University of Science and Technology, Gjøvik, Norway. He obtained his second Ph.D. in Applied Economics from the University of
Antwerp, Antwerp, Belgium. His research interests lie in the area of emerging technologies, risk management, and their application in various fields, including cyber
security, digital economics, etc.

3:00 Cost Effective Techniques for the Utilization of Cloud Resources on the Deployment of Student Web Apps
Sunitha Cheriyan
Cloud Azure PaaS model is a developer's choice and it is in the rapid development from the recent years, where there is a demand in the web application and
deployment. It is challengeable to select the right app service plan with least cost for any kind of web deployments. The computing resources required for the
commercial apps and student's academic based project apps having a huge difference in terms of its technical components and costs. Normally student

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 29/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

developers deploy their apps in a limited budget. Academies are demanding computing resources comparatively less than the industries demanding in every
aspect. The key issue is to know how the costs, computing resources and services are measured and distributed. In this paper, we have analysed various Azure
App Service Plans to control cost and maximize the utilization of computing resources in an effective way. The cloud services are mainly designed for the various
business needs as a self-service system. The industries and academies are using the same self-service system for their various needs. However, their
requirements vary in terms of usage, storage, performance, demands and result. As part of the comparative study, we have analysed and tested sample student
apps using Azure pricing tiers as a test case. A switching mechanism is developed and suggested to manage the web apps when it is deployed and used in the
cloud environment. Through out the paper we experimented on the Azure's various service models.

Presenter bio: Sunitha Cheriyan is a lecturer in the Higher College of Technology, Muscat where she has been a faculty member in the Information Technology Department.
Her research interests lie in the area of programming languages, ranging from theory to design and implementation. She has collaborated actively with researchers in the
area of Web mining, Ontology, Recommender Systems and Cloud Computing.

3:20 Resource Management in Internet of Things: A Routing Perspective


Jaisooraj J, S D Madhu Kumar and Aindrila Ghosh
Internet of Things (IoT), the latest and most popular development in the field of Information and Communication Technology (ICT), requires the intermingling of
different technologies like networking, cloud, and analytics. Networking portion of IoT is handled mainly by the Low Power Lossy Networks (LLNs), which in turn
plays notable role in the proper functioning of other components including cloud platforms. As a result, resource management within LLNs is an issue that can't
afford to be left out. The paper analyzes this concern through an elaborate study of LLN routing protocols including RPL, LOADng, and opportunistic routing
protocols. The study has been conducted so as to flash light on resource management capabilities of these protocols. Accordingly, a mapping has been
provided between the features of different protocols and the resources managed by each of those features. Finally, the paper enlists concerns demanding
immediate attention, coupled with possible solutions, so as to ensure the efficient functioning of an approaching smart world.

Presenter bio: B. Tech in Computer Science and Engineering from Kerala University (2008-2012) M. Tech in Computer Science and Engineering from Kerala University
(2013-2015) Currently doing PhD in Computer Science and Engineering at National Institute of Technology Calicut

3:40 Locating Bug IDs and Development Logs in Open Source Software Projects (OSS): An Experience Report
Bilyaminu Romo Auwal
The development logs of software projects, contained in Version Control (VC) systems can be severely incomplete when tracking bugs, especially in open source
projects, resulting in a reduced traceability of defects. Other times, such logs can contain bug information that is not available in bug tracking system (BT
system) repositories, and vice-versa: if development logs and BT system data were used together, researchers and practitioners often would have a larger set of
bug IDs for a software project, and a better picture of a bug life cycle, its evolution and maintenance. Considering a sample of 10 OSS projects and their
development logs and BT systems data, thus the two objectives of this paper are (i) to determine which of the keywords 'Fix', 'Bug' or the '#' identifier provide
the better precision; and (ii) to analyse their respective precision and recall at locating the larger amount possible of bug IDs manually. Overall, our results
suggest that the use of the '#' identifier in conjunction with the bug ID digits (e.g., #1234) is more precise for locating bugs in development logs, than the use of
the 'Bug' and 'Fix' keywords. Such keywords are indeed present in the development logs, but they are less useful when trying to connect the development
actions with the bug traces in software project.

Presenter bio: Lecturer in Digital Technology at Coventry University Group and SAP Certified Associate Business Consultant. Expert in Mining Software Repository (MSR)
Tools, web authoring and web management, ERP and SAS Base Programming, particularly interested in Software Maintenance and Evolution, Open-Source Software (OSS)
Development, Software Architecture, and OSS-Component Re-use. Public speaker, dissemination of research findings to diverse audiences at international conferences and
workshops across Europe, the Middle East and Africa (EMEA) and Asia. Fellow at the Royal Society of Art and Manufacturing UK; Fellow Higher Education Academy UK; and
Member of the Brunel University Software Engineering Lab (BSEL), a Brunel University London-based active software engineering research group.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 30/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

S17: Data Mining and Knowledge Representation


Room: S45-06-Zain E-Learning Center
Chairs: Ahmed M. Zeki, Hadeel Alobaidy

2:20 Data Mining for Intelligent Academic Advising from Noisy Dataset
Amal Saleh Ghanem and Hadeel Alobaidy
This paper proposes an approach to address the common problem of classification from educational dataset with irrelevant or redundant attributes. In
particular, the paper focuses on using this approach to improve academic advising through intelligent prediction of students' performance. This is achieved by
using a composition of the two popular classification methods: Decision Trees and Naïve Bayesian Classifiers. Naïve Bayesian Classifier is built using the
significant attributes in the students' dataset that are identified by the Decision Tree. The results show that the proposed approach succeeded in identifying the
main attributes affecting students' performance. Moreover, the evaluation results show that using a composition of Naïve Bayesian and Decision Trees in one
approach outperformed the results of each classifier individually.

Presenter bio: Amal Saleh Ghanem received her BSc Degree in Computer Science from University of Bahrain, Kingdom of Bahrain in 2001; MSc Degree in Computer Science
from Manchester University, UK in 2004; and PhD Degree in Computer Science from Curtin University of Technology, Australia in 2010. Her research interests include data
mining, machine learning, Cloud Computing and database management systems. Dr. Amal is an Assistant Professor in the Department of Computer Science at the
University of Bahrain and a certified AWS instructor. Amal can be contacted at: aghanim@uob.edu.bh

2:40 Ontology Driven Support to Association Rules


Farrukh Arslan
One of the data mining techniques - to find associative combinations of items - is called Association Rules. For this problem, there are several algorithms such
as Apriori, FP - Growth, and CT-Pro. One of the advantages of the Apriori algorithm is that it produces maximum rules. Ontology is a set of hierarchically
structured terms to describe a domain that can be used as the basic framework of a knowledge base. In this work, we illustrate that how the hierarchical type of
ontology can be utilized by the Apriori algorithm to improve the results. The Apriori with ontology implements the IR which is a parameter to determine the
degree of association between combinations of items in a dataset. The series of experiments show that the proposed idea can improve the results as compared
to the default Apriori algorithm.

Presenter bio: Farrukh Arslan holds BS degree in Electrical Engineering from University of Engineering and Technology, Pakistan and MS degree in Electrical and Computer
Engineering from Purdue University, USA. Currently, he is working towards a Ph.D. degree in the Department of Electrical and Computer Engineering, Purdue University,
West Lafayette, IN, USA.

3:00 A Text Mining Approach for Mapping OCL Navigation Expressions


Abdulaziz Guerouat
One problem of exploiting information captured by an OO system model such as class models is mapping user queries on the model. This is particularly due to
the informal character of the user queries. This paper presents an approach based on text mining for identifying and interpreting user queries. This would
enable a matching between the interpreted user query and the corresponding entities specified by the system model. Now navigation expressions in OCL can
be derived from the system model that have a formal character and are able to answer the user questions against the class model.

Presenter bio: -PhD in Computer Science obtained from the University of Magdeburg, Germany -Research Interests include: Communication Protocol Engineering and
Testing, Smart Cities, Mobile Computing, Data Mining

3:20 Restructuring Concept Based Censor Production Rules


Nabil Hewahi
In this paper we present a new structure for the Concept Based Censor Production Rule (CBCPR). CBCPR is an extension of a rule called censor production rule.
CBCPR and censor production rules can be used in real time systems. Censor production rule lacks the existence of what so called concept. This lacking might
make the matching and firing of the rules take quite some more time. To avoid this problem, CBCPR has been introduced to include the idea of concept in its
structure. Despite that CBCPR solved the problem, its structure needs to be restructured so that it can put more than one concept related to similar conditions
in one structure. This restructuring makes the writing of CBCPR easier and it also expedites the execution process. Utilizing the given time in a better way means
giving more opportunities to check more censor conditions and produce a more certain result. The proposed restructuring will also make the computation
easier and faster for the certainty values for various concepts related to one rule structure.

Presenter bio: Nabil M. Hewahi, obtained his PhD degree in Computer Science from Jawaherlal Nehru University, New Delhi, India in 1994, and M.Tech degree in Computer
Science and Engineering from Indian Institute of Technology, Bombay, India in 1991. He is now with the university of Bahrain-Bahrain and the Islamic university of Gaza-
Palestine. Dr. Hewahi is a full professor of Computer Science (Artificial Intelligence) since 2006. He published over 65 papers in well known journals and conferences. His
main research interest is Intelligent Systems including machine learning and knowledge representation.

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 31/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

S18: Informatics-3
Room: S45-11-Zain E-Learning Center
Chairs: Ali H Zolait, AZ, Faisal Hammad

2:20 Analysis of Customers Comments on Social Media Websites of Cosmetic Brands


Imran Ahmad
In this article we discuss several techniques of sentiment analysis and compare them with social media contents from business competitors. User generated
contents in a very big number is freely available on different social media sites now a day. Mostly companies increase their competitive advantages keep an eye
on their competing companies and closely analyze the data that are generated by their customers on their social media sites. In this article I integrate the
several techniques using a framework to analyze and make a comparison between social media content and business competitors. These techniques include the
competitive analysis, text mining and quantitative analysis. Specifically, this article is going to analyze the three big brands of cosmetics (MAC, soft touch, Nivea,
Revlon and L'Oreal) and will compare the competitive analysis among them on social media sites. When I analyzing these five big brands I found some
similarities among their social media usage. This article discusses the suggestions of my discussions and provides the strong recommendations for helping
companies to build their strong competitive analysis strategies on social media. We discuss the implications of our findings and provide recommendations to
help companies develop their social media competitive analysis strategies.

Presenter bio: Mr.Imran Ahmad is the Assistant Professor of Computer Science in the Department of Computer Science at Riphah International University Lahore Pakistan.
He is also the Incharge Undergraduate BS Program. He has More than 19 years’ teaching plus administrative experience at university level (BS/MS). Mr.Imran Ahmad is a
highly motivated and confident person having completed MS in Computer Science from the COMSATS Institute of Information Technology, Islamabad, Pakistan, MSc in
Computer Science with Gold Medal from the University of Peshawar, Peshawar, Pakistan, BSc in Computer Science with Gold Medal from University of Peshawar, Peshawar,
Pakistan. Currently, he is currently PhD Scholar at Gomal University DIKhan, Pakistan. Mr.Imran Ahmad published more than 40 scientific papers and articles. He is member
of the Data Science and Analytics Research Group at Riphah International University Lahore, Pakistan.He has delivered more than 25 presentations at national and
international level.

2:40 Smart Advisory System- Case Study for the Department of Information Systems in Nizwa University
Yaqoob Khamis Al-Anbari
Academic advisers help the students in choosing their courses each semester according to the program adv isory plan. This process, which seems
straightforward, involves a lot of decision making operations. Improper decision making, in the part of the student or the academic adviser, will have dare
consequences in the academic progress of the students. The increasing burden borne by the academic adviser, increasing the number of students who are
supervised by one academic adviser, the pressures of work and the presence on non-academic factor affect the accuracy of the decision taken leading to
improper selection of courses for registration. Smart Advisor System (SAS) is proposed as a solution to close this gap. SAS is working to find the most suitable
course combination each semester, based on the academic progress of the student and, most importantly the academic capabilities of the student. This thesis
proposes a heuristic approach Smart Academic Advisor System. This system uses the registration data obtained from the Registration and Records Department
in the University of Nizwa and adopts the registration rules and regulation of the University of Nizwa. To validate the (SAS) results, 89 random registration cases
were selected from the department of information systems in CEMIS. 29 cases belong to normal students (Cumulative average above or equal 2 out of 4), and
60 cases belong to students under academic probation (Cumulative average below 2 out of 4). Results demonstrated by SAS provide solid ground to progress in
the heuristic approach. SAS can be further enhanced to care for various decisions taken by the academic advisors. Systems like SAS can be indispensable tool to
support academic advising activities and to relief the academic advising burden.

3:00 Usability of the Academic Transcript


Mona Al-Mahari, Hesham al-Ammal and Lamya Aljasmi
In this paper we study the usability of the text-based online students' transcripts. The usability test depends on the effectiveness, efficiency, control, and
learnability usability characteristics of the academic transcript. The user experience and the aesthetic Nielsen design heuristic were studied as well. The usability
test criteria designed to fit each usability feature. Those include the ability to plan for upcoming semesters, finding the major GPA, customizing the displayed
information, easiness of use, and attractiveness.

Presenter bio: Muna Mansoor Al-Mahari is a Demonstrator in University of Bahrain- Department of Computer Science since 2010 till the date. She received her Bachelor
degree in Computer Science in 2009 from University of Bahrain. The Master degree was finished in the same university recently in 2018.

3:20 A Tutoring Web Service for E-Learning System


Ali Seridi

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 32/33
11/12/2018 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) Program [3ICT'18] EDAS (270947 - waelelmedany@gmail.com):

The service-oriented architecture (SOA), continues to gain ground as an approach that enables agility, flexibility and cost savings. It has been adopted by
different IT communities. The field of e-learning was no exception to the rule, as a multitude of work for the adoption of SOA was proposed. In a preliminary
study we conducted, we focused our efforts on proposing a global service-oriented architecture for e-learning systems that promotes the reuse of its various
functionalities as remote modules (services). In this article, we focus on the tutoring aspect of elearning systems. The idea is to offer and make available a web
service that is not an integral part of the e-learning system, but remains independent as a web service, this independence allowing it to extend any e-learning
platform with the tutoring function. This service has been designed to meet SOA requirements in terms of autonomy, reuse, interoperability and remote access.
Offering the tutoring aspect as an independent service allows the different existing platforms without this functionality to benefit from it without making major
changes to the code, especially since SOA standards allow easy communication between heterogeneous platforms developed in different languages and
systems. In order to validate our approach, we developed and tested the tutoring web service. It is a tool that allows the tutor to closely monitor the progress of
each learner in his studies, in his collaboration and in his different interactions with other learners and with the tutor. Many other statistics through this web
service, which allows the tutor to have an idea about the seriousness of the learner and to predict the risk of dropping out of courses.

Presenter bio: Assistant professor at Computer science department , University of 8 May 1945 - Guelma, Algeria. Member of Labstic Laboratory , University of 8 May 1945 -
Guelma, Algeria.

3:40 Utilization of Social Media for Rural Women Entreprenuer Project: A Case Study of Setiu Wetland
Mustafa Bin Man, Wan Aezwani Wan Abu Bakar, Masita Abdul Jalil, Noraida Haji Ali and Suriyani Muhamad
Entrepreneurship empowerment towards rural women remains crucial to attain better living standard among rural communities. To help improve the living
livelihood through e-business, the community needs to be equipped with entrepreneurship skill explicitly and Information and Communication (ICT) skill
implicitly. This paper presents a study case of rural women entrepreneur in Setiu Wetland, Terengganu, Malaysia under NRGS research grant from the period of
2015 to 2018 by a group of UMT researchers and academicians. The study utilizes facebook social media as the electronic business (e-business) and networking
platform in marketing and establishing the local products of Setiu Wetland women entrepreneurs. Through the six (6) months period of tracking the
respondent's income rate, the outcome of this NRGS project depicts 17% of women entrepreneurs achieve linear proportion of increasing income rate, 33% of
decreasing income rate and the rest 50% of income shows a fluctuating rate.

Presenter bio: Mustafa Man is an Associate Professor in School of Informatics and Applied Mathematics, Universiti Malaysia Terengganu (UMT). Prior to being confirmed by
the company and finished his studies in Universiti Teknologi Malaysia (UTM) in the field of Computer Science in 2012. He has received Computer Science Diploma,
Computer Science Degree, Degree (Master Science from Universiti Putra Malaysia). In 2012, he has been awarded a "MIMOS Prestigious Awards" for his PhD by MIMOS
Berhad. He was selected as the winner of this award is a very diligent student, working diligently to complete his PhD studies. He has shown a strong and in depth interest
in the field of research and development based on the integration of multiple types of databases. His current research involved in data integration, data mining, image
processing, IoT and Augmneted Reality. (http://staff.umt.edu.my/~mustafaman/)

Monday, November 19 4:00 - 4:30


CS: Closing Session
Room: S45-101-Zain E-Learning Center
EDAS at 172.30.0.206 (Mon, 12 Nov 2018 12:07:53 -0500 EST) [User 270947 using Win7:Chrome 70.0 0.334/4.399 s] Request help

https://edas.info/showProgram.php?_qf__showProgram=&c=24985&program_include%5Bmaster%5D=1&program_include%5Bsummary%5D=1&program_include%5Bsummary_pagebreak_day%5D=1&program_… 33/33

You might also like