The World congress on Computing and Information Technology (WCIT)

beadkennelAI and Robotics

Oct 15, 2013 (3 years and 11 months ago)

481 views


The World congress on Computing and Information Technology (WCIT)

The Second International Conference on Digital Enterprise and Information Systems (DEIS 2013)

The Second International Conference on e
-
Technologies and Networks for Development (ICeND 2013)

The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)

The First International Conference on Green Computing, Technology and Innovation

(
ICGCTI2013
)





WCIT
Venue


:
Asia Pacific University of Technology and Innovation, Kuala Lumpur, Malaysia
.

University Address

:
Bukit Jalil Highway, Taman Teknologi Malaysia, 57100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur, Malaysia

Phone



:
+ 603
-

8996 1000
FAX
:
+ 603
-

8996 1001

Website


:
http://www.apu.edu.my/










The nearest Airport to

go to

the university is the following:



Kuala Lumpur International Airport


When you arrive
at
the airport listed above, you can ride a taxi to
go to
the university.
Inform
the taxi driver for the address and he will take you there.






















Detailed Schedule for Conferences
,
4



6
March 2013


Asia Pacific University of Technology and Innovation

(
APU
)

Technology Park Malaysia

Bukit Jalil,
57000, Kuala Lumpur, Malaysia.


4
th

March 2013

8.30
-
9.00 AM

Registration at

APU Reception Counter

9.00
-
9.30 AM

Opening
Session

9.30
-
10.30 AM

Keynote
Session

1 @ Auditorium 3

Prof. Yoshiro Imai

10.30
-
11.00 AM

Morning break



Ground Floor besides Cafeteria

11.00
-
11.45
PM

Keynote
Session

2 @ Auditorium 3

Prof. Nazaraf Shah

11.45
-
12.30 PM

Keynote
Session

3 @ Auditorium 3

Prof. Azizah Abd Manaf


12
.
3
0
-
1
.
3
0 PM

Lunch

-

Ground Floor besides Cafeteria

1.3
0
-
3
.00 PM

Presentation

Session 1 @ Level 1
-

Room 3 (L1
-
3)

Title:
Embedded Systems and Software

/ Digital Data Mining

/ Signal Processing, Pattern Recognition
and Applications

Presentation Session 2 @ Level 1
-

Room 5 (L1
-
5)

Title:
Information Assurance and Security

Management

Presentation Session 3 @ Level 1
-

Room 8 (L1
-
8)

Title:
Green Computing, Technology and Innovation

3
.00
-
3
.30 PM

Coffee break



Ground Floor besides Cafeteria

3
.30
-
5.
0
0 PM

Presentation Session 4 @ Level 1
-

Room 3 (L1
-
3)

Title:
Cyber Security

Presentation Session 5 @ Level 1
-

Room 5 (L1
-
5)

Title:
Cryptography and Data Protection / Multimedia Networking / Mobile
-
Commerce / e
-
Learning
/ e
-
Commerce

Presentation Session 6 @ Level 1
-

Room 8 (L1
-
8)

Title:
User Interfaces, Visualization and
Modeling / Information Technology Management / Digital
Management Products / Ubiquitous Computing, Services and Applications / Miscellaneous


Detailed Schedule for Conferences
,
4



6
March 2013


5
th

March 2013

8.30
-
9.00 AM

Registration at

APU
Reception Counter

9.00
-
9.45

AM

Keynote
Session

4 @ Auditorium 3

Dr. Nur Izura Udziri


9.45
-
10.30 AM

Keynote
Session

5 @ Auditorium 3

Prof. Eyas El
-
Qawasmeh

10.30
-
11.00 AM

Morning break



Ground Floor besides Cafeteria

11.00
-
12
.
0
0 PM

Keynote
Session

6 @ Auditorium 3

Zuriati Ahmad Zukarnain

12
.
0
0
-
1
.
3
0 PM

Lunch

-

Ground Floor besides Cafeteria

1.3
0
-
3
.00 PM

Presentation Session
7

@ Level 1
-

Room 3 (L1
-
3)

Title:
Authentication and Access Control Systems

/ Information Hiding

/ Fraud Management

/
Operating Systems and Database Security

Presentation Session
8

@ Level 1
-

Room
6

(L1
-
6
)

Title:
Computational Intelligence

/

Miscellaneous

Presentation Session
9

@ Level 1
-

Room 8 (L1
-
8)

Title:
e
-
Services / Ad hoc and Sensor Networks

/ Internet and Web Applications

3
.00
-
3
.30 PM

Coffee break



Ground Floor besides Cafeteria

3
.30
-
5.
0
0 PM

Presentation Session
1
0

@ Level 1
-

Room 3 (L1
-
3)

Title:
Threats,
Vulnerabilities, and Risk Management / Network Security

/ Cyber Warfare and Physical
Security / VOIP, Wireless and Telecommunications Network Security

Presentation Session
1
1

@ Level 1
-

Room
6

(L1
-
6
)

Title:
Digital Forensic

Presentation Session
1
2

@ Le
vel 1
-

Room 8 (L1
-
8)

Title:
Information Content Security / Sensor Networks and Social Sensing / Information Ethics / Data
Mining

/ Miscellaneous






Detailed Schedule for Conferences
,
4



6
March 2013


6
th

March 2013

9.00
-
12.00 PM

Tour to PutraJaya

Start of CyberSec Intensive Training



Hosting Country
: Malaysia

Participants Countries
: USA, Japan, New Zealand, Jordan, Libya, Indonesia, China, South Africa, Taiwan, Philippines,
Malaysia, Nepal, Australia, Saudi Arabia, Singapore, Morocco, Tunisia,
Ireland, Germany, Vietnam, Algeria, Libya, Italy,
Nigeria, United Arab Emirates, Egypt, Korea and Lebanon.









DETAILED PROGRAM

Concurrent

Sessions
:
March 4, 2013 (Monday)

Title

Embedded Systems and Software/ Digital Data
Mining/ Signal Processing,
Pattern Recognition
and Applications

Information Assurance and Security Management
/ Cyber Security

Green Computing, Technology and Innovation

Room

Level 1
-

Room 3 (L1
-
3)

Level 1
-

Room 5

(L1
-
5
)

Level 1
-

Room
8 (L1
-
8
)

Time

1:30 pm


3:00 pm

1:30 pm


3:00

pm

1:30 pm


3:00 pm

Chair

Mohamad Firdaus Che Abdul Rani

Hadi Khorasani Zadeh

Muhammad Ehsan Rana


105
-

Implementation of a Real Time Operating System on
Altera’s Cyclone IV FPGA (Hamid
Shahnasser
-

USA)


142
-

English Vocabulary Learning Support
System Based
on Stochastic Word Proficiency Model Estimating Elusive
Words for Students (Daisuke Kitakoshi


Japan)


129
-

Joint Decoding and Correlation Channel Parameter
Estimation in Wyner
-
Ziv Video Coding (
Amal Punchihewa
-

New Zealand
)


109
-

On the
Yule Walker Equations for the All
-
Pole
Coefficients (Adnan Al
-
Smadi


Jordan)


158
-

Content Based Image Retrieval (CBIR) of Face
Images in WHT, DCT, DWT and CT Transform Domain
(Mohamed Arteimi


Libya)


145


Service Oriented Business Intelligence For
Monitoring Academic Quality (
Irya Wisnubhadra


Indonesia
)


172
-

Requirement Analysis using Extended VORD Method
(Dewi Rosmala


Indonesia)


171
-

Requirement Definition Using SEAM Approach (Case
study of Academic Information System Development)
(Falahah
Suprapto


Indonesia)


174
-

E
-
Business Security Challenges (Mohamad Ibrahim
Ladan


Lebanon)

135
-

A Replay Attack Resistance DRM Scheme based on
Physical Level File Location (Cheng Qu
-

China)


125
-

Effective Corporate Governance: Combining an ICT
security incident and Organisational Learning (Hennie
Kruger
-

South Africa)


106
-

Information Security Management Beyond
Certification and Accreditation (John A. Anderson
-

United
States)


138
-

A Multi
-
Servers Remote User Authentication Scheme
using a S
marter Smart Card (Jinn
-
Ke Jan
-

Taiwan)


117
-

Virtual Information Security Testing System Mark II
(Epsilon2) (Lin De Luna
-

Philippines)


127
-

Efficient Local Recoding Anonymization For Datasets
Without Attribute Hierarchical Structure ( RasoolAghdam
-

Japan)


169
-

Fuzzy Description Of Security Requirements For
Intrusion Tolerat Web
-
Services (Wan Nurhayati Wan Ab.
Rahman
-

Malaysia)


134
-

Digital banking security, risk and credebility concerns
in South Africa (RabelaniDagada
-

South Africa)


144
-

Industrial Espionage Threat in Corporate South Africa
(RabelaniDagada
-

South Africa)


167
-

Canary Files: Generating fake files to assist in the
detection of critical data loss in complex computer
netw
orks( Ben Whitham
-

Australia)

132
-

Green IT
Capability and Sustainable
Development (RabiahEladwiah Abdul Rahim
-

Malaysia)


123
-

Measuring Carbon Footprint of Computing
Technology


A Case Study at ICIMOD (Sushil Pandey


Nepal)


137
-

Hardware Design Space Exploration of Cordic
Algorithm for Run
-
T
ime Reconfigurable Platform
(Tze Hon Tan


Malaysia)


120
-

On Power Consumption in IPv6 Over Low
Power Wireless Personal Area Network (6LoWPAN)
(MohammadrezaSahebi
-

Malaysia)


135
-

An Accelerated Coordination of Resource
Utilization in Stochastic Auton
omous
\
\

Moving
Multiagents (Isamu Shioya
-

Japan)


141
-

Towards Moblie SSoftware Devlopment
(Selvakumar Samuel
-

Malaysia)




Concurrent

Sessions: March 4, 2013 (Monday)

Title

Green Computing, Technology and Innovation

Cryptography and Data Protection /
Multimedia
Networking / Mobile
-
Commerce / e
-
Learning /

e
-
Commerce

User Interfaces, Visualization and Modeling /
Information Technology Management /
Digital
Management Products /

Ubiquitous Computing, Services and Applications
/ Miscellaneous

Room

Level
1
-

Room 3 (L1
-
3)

Level 1
-

Room 5

(L1
-
5
)

Level 1
-

Room
8 (L1
-
8
)

Time

3:30 pm


5:00 pm

3:30 pm


5:00 pm

3:30 pm


5:00 pm

Chair

Selvakumar Samuel

Yogeswaran Nathan

David Tan


136
-

A New Approach for Enhancing High School
Students’ Energy Literacy and
Awareness of Carbon
Reduction (Yao
-

Ming Chu
-

Taiwan)


138
-

The Influence of Creativity Contest on Parents
and Children’s Concept of Water Conservation
Technologies (Tzu
-
Hsiang Ger


Taiwan)


133
-

The Fuctional Mechanisms and Key Factors for
The Energy Technology Knowledge
-
Sharing Web
-
Based Plateform (Mei
-
Chen Chang
-

Taiwan)


116
-

Lifting Mechanism for Pepper Harvester Vehicle
(Firas & Vinesh
-

Malaysia)


131
-

Development of Active RFID Syste
m for Power
Efficiency (Raed Abdulla


Malaysia)


127
-

An Intelligent Traffic Controller Based On Fuzzy
Logic (Lai Nai Shyan
-

Malaysia)

170


Understanding Teacher Identity through the use
of EPortfolios with Pre
-
Service Teachers (Mingming
Zhou
-

Singapore
)


123
-

How
Is
Quantum Cryptography used for Secure
Financial Transaction
s
? (Sanwar Ali
-

USA)


129
-

A Comparative Study of Classical and Quantum
Cryptography Approaches: Review and Critical
Analysis (Soha S. Zaghloul
-

SA)


166


Personalized Media
Recommendation Algorithm
Based on Smart Home (Ruichun Tang
-

China)


112
-

Short
-
Term Use Of Cell Phones Has No Significant
Effect On The Salivary Oxidant/Antioxidant Profile
(Ahmad M. Khalil
-

SA)


190


A Proposed Virtual Learning Environment (VLE)
For Isabela State University (ISU) (Irma Plata
-

Philippines)


174


A Review On The Success Factors Of Learning
(Nadia Parsazadeh
-

Malaysia)


178


End
-
to
-
End Architecture For E
-
commerce Security
(Hous
sa El Ismaili
-

Morocco)



139
-

Web Interaction Design: From Navigation Objects To
User Interface Elements Presentation (AzrulHazriJantan


Malaysia)


138


Trajectories’ Classification To Enhance Decision
Making (
WidedOueslati


Tunisia)


136
-

Felex
Builder: A Semi
-
Supervised Lexical Resource
Builder For Opinion Mining In Product Reviews (
Miguel
Arcilla


Philippines)


160


A Framework Of Remote Diabetic Monitoring System
For Developing Countries (Media Ayu


Malaysia)


141
-

An Assessment For Focusin
g The Change Of Data
Quality (Dq) With Timeliness In Information Manufacturing
System (Ims) (Mohammad Shamsul Islam


Ireland)


107
-

A New Framework for Software Library Investment
Metrics (Mohammed Shatnawi
-

Jordan)


116
-

AI
-
Based System for Arabic
Search Engine
(QusaiAbuein


Jordan)


170
-

Mobile Cloud Based Learning Material Repository
Using Android And Google Drive Application (Savitri Galih


Indonesia)


147


Estimating Missing Values Of Skylines I Incomplete
Database ( Hamidah Ibrahim
-

Malays
ia)


Concurrent

Sessions:
March 5, 2013 (Tuesday)

Title

Authentication and Access Control Systems

/
Information Hiding

/ Fraud Management

/
Operating Systems and Database Security

Computational Intelligence

/

Miscellaneous

e
-
Services /
Ad hoc and Sensor Networks /
Internet and Web Applications

Room

Level 1
-

Room 3 (L1
-
3)

Level 1
-

Room 6

(L1
-
6
)

Level 1
-

Room
8 (L1
-
8
)

Time

1:30 pm


3:00 pm


1:30 pm


3:00 pm

1:30 pm


3:00 pm

Chair

Nor Azlina
Binti Abdul Rahman

Zailan Arabee Abdul Salam

Mueen Uddin


128
-

A Proposal and Implementation of the
Shoulder
-
Surfing Attack Resistant Authentication
Method Using Two Shift
Functions

(Yoshihiro Kita
-

Japan)


142
-

Digital Video Watermarking on Cloud
Computing
Environments (Chu
-
Hsing Lin
-

Taiwan)


158
-

Inherent ID: A Novel Approach to detect
Counterfeit Consumer Goods using Product Inherent
Features (Christian Horn
-

Germany)


130
-

RAM Forensics against Cyber Crimes Involving
Files (Mohammed I.
Al
-
Saleh
-

Jordan)


118
-

Automated Malware Detection for Android
(
Kevin Joshua Abela
-

Philippines)


148
-

An Associative Model Based On Quantum Search
Algorithms (Noritaka Shigei


Japan)


149
-

An Area Reduction Technique For Logic Synthesis Of
Neural
Networks (Noritaka Shigei


Japan)


161
-

Combination Of Statistical And Language Processing
Methods In News Summarization: A Case Study For
Vietnamese News(Vo Thanh Hung


Vietnam)


146
-

Migration Of Legacy Systems To Service Oriented
Architecture (Wafa
Souiou


Algeria)


155
-

Identifying Geometrical Objects In Image: Using Image
Analysis(Fathi Hamed


Libya)


156
-

Assessing The Students’ Awareness In Information
Security Threats In E
-
Learning : A Case Study (Yuzaimi Yunus


Malaysia)


134


Parallel Particle Swarm Optimization For Image
Segmentation (Paulus Mudjihartono
-

Indonesia)


140


The Affects Of Caching In Browser Stage On The
Performance Of Web Items Delivery (Hamidah Ibrahim
-

Malaysia)


154


Heterogeneity XACML Policy Eval
uation Engine (Teo Poh
Kuang
-

Malaysia)


132
-

Static Conversion of Dynamic Information for Mobile
Phone Forensics (Reza Adinehnia
-

Malaysia)

125
-

Exponential Random Graph Modeling for Micro
-
blog
Network Analysis (Dong
-
Hui Yang
-

China)


113
-

Performan
ce Evaluation of Enhanced Routing
Discovery under Different Mobility Models in MANETs
(Abdalla M. Hanashi
-

Libya)


131
-

Fault Tolerance Models in Ad Hoc Wireless Sensor
Networks (Soha S. Zaghloul
-

SA)


132
-

A Hierarchical
-
Cellular Fault Management Sche
me
for Ad Hoc Wireless Sensor Networks (Soha S. Zaghloul
-

SA)


187


A Survey On Security Solutions In Wireless Sensor
Networks (Hind Annahidh
-

SA)


149


MMO Front
-
End and Back
-
End Databases for Small
Game Developers (Mudasser F. Wyne


USA)


164
-

World
-
altering Features of Semantic Web Service
Description Languages (HadiSaboohi
-

Malaysia)


128


GlobalAd: Online On
-
Demand Advertising
Techniques (Roger Lee
-

USA)


186
-

Environmental Monitoring and Data Collection
System with Mobile Devices
(Masahito Shiba
-

Japan)




Concurrent

Sessions:
March

5, 2013 (Tuesday)

Title

Threats, Vulnerabilities
and Risk Management /
Network Security

/
Digital Forensic


Cyber W
arfare and Physical Security

/

VOIP, Wireless and Telecommunications Network
Security

Information Content Security /
Sensor Networks
and Social Sensing /
Information Ethics /
Data
M
i
ning

/ Miscellaneous

Room

Level 1
-

Room 3 (L1
-
3)

Level 1
-

Room 6

(L1
-
6
)

Level 1
-

Room
8 (L1
-
8
)

Time

3:30 pm


5:00 pm

3:30 pm


5:00 pm

3:30 pm


5:00 pm

Chair

Khoo Li Jing

Nurul Haniza Mohtar

Abdulaleem Zaid Mohammed Al
-
Othmani




171
-

Empirical Assessment Of Data Protection And
Circumvention Tools Availability In Mobile Networks
(Borka Jerman Blazic
-

Ireland)


140
-

The Methodology of Interviewing
Psychiatric
Patients: to Know Patient’s Privacy Concern in
Behavior Monitoring System( Nasriah Zakaria
-

Malaysia)


120
-

Automated Signature Creator for a Signature
Based Intrusion Detection System (Frances
Bernadette de Ocampo
-

Philippines)


119
-

Computer Forensics Investigation An Approach
To Evidence In Cyberspace (Fabrizio Solinas
-

Italy)


146
-

Malware Proof on Mobile Phone Exhibits
Based on GSM/GPRS Traces (Marko Schuba
-

Germany)


121

-

A Novel Evidence Integrity Preservation
Framework (EIPF) for Virtualised Environments: A
Digital Forensic Approach (Uchenna Peter Daniel Ani


Nigeria)


143
-

Passive Approach for Detection and
Localization of Video Forgery (Jyh
-
Jong Tsay
-

Taiwan)


170
-

On The Selection Of Write Blockers For Disk
Acquisition: A Comparative Practical Study (Mousa
Al Falayleh
-

UAE)

164
-

Adaptive Security and Trust (Paul Robertson
-

United States)


166
-

Blacklisting Of Malicious Web Pages By Evaluation
Of Domain
Registration Information (Ralph
EdemAgbefu
-

Japan)



113
-

The Cyber Dogs of War: Joint transatlantic efforts
of future leaders in the prevention of cyberwarfare(
NadiyaKostyuk
-

United States)


116
-

Awaken the Cyber Dragon: China’s Cyber Strategy
and Its
Impact on ASEAN (Miguel Alberto Gomez
-

Philippines)


139: TULUNGAN: A Self
-
Promoting
-
Resistant
Reputation System for Collaborative Web Filtering
Systems( Alexis Pantola
-

Philippines)


*122
-

A Virtualized Honeynet Intrusion Prevention
System In Scada
Systems (Kaveh Shaerpour
-

Malaysia)




172
-

Enhanced IDEA Algorithm for Strong Encryption
Based on Efficient Strong Rotor Banks (FatmaAly
-

Egypt)


173
-

A New Gaussian Cipher with Optimal Keyed
Process (KAM
-
FA) (Fatma Aly
-

Egypt)


130
-

Battle For
Online Freedom of Speech
-
Identity:
Authenticity Or Anonymity (Lasa Sun
-

Australia)


182
-

An Integrated Intelligent Fuzzy System for Data
Mining (Dong
-
Min Woo
-

Korea)


171
-

Behavioral Segmentation For Web Searching
Users Using Self
-
Organizing Kohonen
Maps
(RawanGhnemat
-

Jordan)


142
-

Generic Heuristics Encoding and Phylogenies
(ChadiKallab
-

Lebanon)


189
-

Decision Making Principle from the Perspective
of Possibilistic Theory (
NureizeArbaiy
-

Malaysia
)


179
-

A Skype ML Datasets Validation and Detec
tion
Mechanism Using Machine Learning Approach
(HamzaAwad
-

Malaysia)


177
-

An Injury Recognition Model Using Single
Rotatable Infrared Sensor (Chin Ann Ong
-

Malaysia)


151
-

Implementing Stochastic Gradient Descent based
on Historical Network Distance f
or Available
Bandwidth Prediction (Ettikan Karuppiah
-

Malaysia)




**Any re
-
schedule presentation can be in any session.

No specific sessions for them.

**Papers whose authors will not attend


164

-

Load
-
Adaptive Beacon Scheduling Algorithm for IEEE 802.15.4 Mesh Topology
Improving Throughput and QoS in WMSNs (Mohamad Baseri


Iran)


142*

-

Telematics Solution for Teleco Industry in the Developing World ( Arfaat Shah
-

United Kingdom)



122*
-

Training feed
-
forward artificial neural Networks For Pattern
-
Classification Using
The Harmony Search Algorithm (Ali Kattan
-

Iraq
)


152*

-

An Enterprise
-
grade Secure Data Storage And Sharing System (Xu Meng
-

Singapore)


136*

-

Application of Secret Sharing

Techniques on Confidential Forensic Investigation
(Shuhui Hou
-

China)


1
22*

-

Voice
-
over
-
IP (Voip) Bandwidth Optimization: A Survey of Schemes and
Techniques
(Uchenna Peter Daniel Ani


Nigeria)