Conference Program
Conferences activities sites
Conference activities sites | Sites |
Main Hall : Open ceremony : Oral presentations : keynotes speech | Central Conferences Building |
Room 1 : Oral presentations | 3rd floor : Deanships Building |
Room 2 : Oral presentations | 3rd floor : Deanships Building |
Room 3 : Oral presentations | 3rd floor : Deanships Building |
Room 4 : Oral presentations | 3rd floor : Deanships Building |
Room 5 : Prayers room for women | 3rd floor : Deanships Building |
Room 6 : Prayers room for men | 3rd floor : Deanships Building |
Room 7 : Reset and internet facilities room for women | 3rd floor : Deanships Building |
Room 8 : Reset and internet facilities room for men | 3rd floor : Deanships Building |
General Conference Agenda
1st day: 03 April 2019
Time | Events | Sites |
08:00 am – 08:25 am | Onsite registration. | Main Hall |
08: 25 am – 08:30 am | Welcome speech. | Main Hall |
08:30 am – 10:00 am | Keynote Speakers: Session 1. | Main Hall |
10:00 am – 10:30 am | Coffee Break. | 3rd floor: Deanships Building. Front area: Central Conference Building. |
10:30 am – 12:15 pm | Oral presentation of participants sessions. | Main Hall, Room1, Room2, Room3, Room4. |
12:15 pm – 01:00 pm | Coffee Break and Prayer. | 3rd floor : Deanships Building Front area : Central Conference Building |
01:00 pm – 02:00 pm | Open Ceremony. | Main Hall : Central Conferences Building |
02:00 pm – 03:00 pm | Keynote Speakers: Session 2. | Main Hall |
03:00 pm – 04:00 pm | Buffet Lunch. | Front area : Central Conference Building |
2nd day: 04 April 2019
Time | Events | Sites |
08:00 am – 10:00 am | Oral presentation of participants sessions. | Main Hall, Room1, Room2, Room3, Room4. |
10:00 am – 10:30 am | Coffee Break. | 3rd floor: Deanships Building. Front area: Central Conference Building. |
10:30 am – 12:30 am | Keynote Speakers: Session 3. | Main Hall. |
12:30 am – 01:00 am | Coffee Break and Prayer. | 3rd floor: Deanships Building. Front area: Central Conference Building. |
01:00 am – 03:00 pm | Oral presentation of participants sessions | Main Hall, Room1, Room2, Room3, Room4. |
03:00 pm – 03:15 pm | Closing Ceremony. | 3rd floor: Deanships Building. Front area: Central Conference Building. |
03:15 pm – 04:00 pm | Buffet Lunch. | Front area: Central Conference Building. |
Hotel Shuttle Bus Service
For the participants’ convenience, 2019 ICCIS will operate shuttle buses between hotels and ICCIS sites as the following.
Route1 : Hotels – Jouf University (main campus) | ||
1st, 2nd day: 03 - 04 April 2019 | ||
The shuttles stop at the entrance of the hotels | ||
Hotels | Departure | Arrival |
Al Nusl Hotel | 07:15 am | 08:00 am |
Raoum Inn Hotel | 07:20 am | 08:00 am |
Fakhamat Al Orjoana & Suites | 07:15 am | 08:00 am |
North Visitor Apart-Hotel | 07:20 am | 08:00 am |
Swiss Spirit Hotel | 07:25 am | 08:00 am |
Route2 : Jouf University (main campus) – Hotels | ||
1st, 2nd day: 03 - 04 April 2019 | ||
The shuttles stop at the entrance of the Central Conferences Building | ||
Hotels | Departure | Arrival |
Al Nusl Hotel | 04:20 pm | 05:00 pm |
Raoum Inn Hotel | 04:20 pm | 05:00 pm |
Fakhamat Al Orjoana & Suites | 04:20 pm | 05:00 pm |
North Visitor Apart-Hotel | 04:20 pm | 05:00 pm |
Swiss Spirit Hotel | 04:20 pm | 05:00 pm |
Keynote Speakers Sessions
Session 1 : 03 April 2019 (Wednesday) | |||
Time | Venue | Speakers | Organization |
08:30 am – 09:00 am | Main Hall | Prof. David Keyes. | King Abdullah University of Science and Technology - KSA |
09:00 am – 09:30 am | Main Hall | Prof Jamil Ahmad. | Kohat university of Science and Technology – Pakistan |
09:30 am – 10:00 am | Main Hall | Prof. Omar M. Al-Jarrah. | Arab Open University - Kuwait |
Session 2 : 03 April 2019 (Wednesday) | |||
Time | Venue | Speakers | Organization |
02:00 pm – 02:30 pm | Main Hall | Prof. Muhammad Khurram. | King Saud University - KSA |
02:30 pm – 03:00 pm | Main Hall | Prof. Ahmed Bouridane. | North Umbria University - UK |
Session 3 : 04 April 2019 (Thursday) | |||
Time | Venue | Speakers | Organization |
10:30 am – 11:00 am | Main Hall | Prof. Mohamed-Slim Alouin. | King Abdullah University of Science and Technology - KSA |
11:00 am – 11:30 am | Main Hall | Prof. Muhammad Sarfraz. | Kuwait University - Kuwait |
11:30 am – 12:00 pm | Main Hall | Prof. Essam Al-Waqeet. | National Digital Transformation Unit - KSA |
12:00 pm – 12:30 pm | Main Hall | Prof. Amir Hussain. | Edinburgh Napier University - UK |
Closing Ceremony
Main Hall : 04 April 2019 (Thursday) | ||
Time | Activity | Speakers |
03:00 pm – 03:05 pm | Closing ceremony Speech | Dr. Nouh Sabri, Jouf University- KSA. |
03:05 pm – 03:10 pm | Honoring best paper award Honoring Conference Committees | ------- |
03:10 pm – 03:15 pm | Conference Recommendations | ------- |
Oral presentation of participants Sessions (Main Hall)
Session 1 | 03 April 2019 (Wednesday) | 10:30 am – 12:15 pm | |
Paper | Paper ID | Title | |
01- | 065 | Multi-Model Deep Neural Network Based Features Extraction And Optimal Selection Approach For Skin Lesion Classification. | |
02- | 099 | A Novel Approach For Dealing With Missing Values In Machine Learning Datasets With Discrete Values. | |
03- | 121 | Sentiment Classifier: Logistic Regression For Arabic Services’ Reviews In Lebanon. | |
04- | 083 | Ontology Based Approach For Annotating A Corpus Of Computer Science Abstracts. | |
05- | 109 | Fault Classification For Photovoltaic Modules Using Thermography And Machine Learning Techniques. | |
06- | 346 | New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning. | |
07- | 095 | Phishing Websites Classification using Association Classification (PWCAC). | |
08- | 301 | Algorithmic Solution for Effective Selection of Elicitation Techniques. |
Session 2 | 04 April 2019 (Thursday) | 08:00 am – 10:00 am | |
Paper | Paper ID | Title | |
01- | 259 | An Investigation on Detecting Bad Data Injection Attack in Smart Grid. | |
02- | 159 | Developing a Network Attack Detection System Using Deep Learning. | |
03- | 250 | Prototype: User Authentication Scheme for IoT Using NFC. | |
04- | 274 | Security Issues and challenges in IoT. | |
05- | 311 | Dynamic Interpretation Approaches for Information Security Risk Assessment | |
06- | 330 | A Context-aware Authentication Approach for Smartphones. | |
07- | 235 | Blockchain in Internet-of-Things: Architecture, Applications and Research Directions. | |
08- | 265 | A Survey of Consensus Algorithms for Blockchain Technology |
Session 3 | 04 April 2019 (Thursday) | 01:00 pm – 03:00 pm | |
Paper | Paper ID | Title | |
01- | 066 | An improved N-grams based Model for Authorship Attribution. | |
02- | 088 | Sentiment Analysis of Customer Reviews Using Ensemble Method. | |
03- | 127 | Random Forests for Diabetes Diagnosis | |
04- | 335 | Deep Learning-Based Relay Selection In D2D Millimeter Wave Communications. | |
05- | 236 | Integration Of Datamining Techniques Into The CBR Cycle To Predict Result Of Immunotherapy Treatment | |
06- | 298 | Brain Tumor Detection from MRI images using Multi-level Wavelets. | |
07- | 325 | A Proposed Noninvasive Point-Of-Care Technique For Measuring Hemoglobin Concentration. | |
08- | 239 | Enhancing Security of Biometric Systems Using Deep Features of Hand Biometrics. |
Oral presentation of participants Sessions (Room 1)
Session 1 | 03 April 2019 (Wednesday) | 10:30 am – 12:15 pm | |
Paper | Paper ID | Title | |
01- | 237 | Towards an Efficient Vehicular Clouds using Mobile Brokers | |
02- | 307 | Adaptive Novel Downlink Scheduling Policy For Anticipating The Retrogression Of The QoS And Extending The Capacity For Emerging 5G Networks. | |
03- | 312 | Hybrid Energy Efficient Routing Protocol for UWSNs. | |
04- | 317 | Evaluation and optimization of TWDM-PON system capacity over single bidirectional optical fiber: Migration promising solution for the next generation PONs. | |
05- | 322 | ProphSoc: Probability-Based Social-Based Routing Scheme In Mobile Social Network (MSN). | |
06- | 345 | Investigating Delays and Overhead of Open Flow Software Defined Networking. | |
07- | 358 | Reducing Delay and CO2 Emissions in Multi-lane Intersections using Vehicular Ad-hoc Networks. | |
08- | 349 | Framework for Real time Crowd Management and Analytics using FOG computing. |
Session 2 | 04 April 2019 (Thursday) | 08:00 am – 10:00 am | |
Paper | Paper ID | Title | |
01- | 047 | Effective cost optimization approach in Healthcare to Minimize the treatment cost of Brain-tumor Patients. | |
02- | 058 | Using Gamification and Serious Games for English Language Learning. | |
03- | 087 | Face detection authentication on Smartphones: Usability Assessment based on End-users Experience & Perceptions. | |
04- | 002 | Smart Environment Data Monitoring. | |
05- | 019 | A Novel Compact and High-Speed CMOS Parity Generator/Checker. | |
06- | 319 | Smart Traffic Lights for Emergency Response Vehicles. | |
07- | 134 | Conceptual/Functional Co-Simulation Technique for Embedded Systems. | |
08- | 240 | Sentiment Analysis of Twitter Data. | |
09- | 097 | Analysis Study of Relation Between UAV’s Motor Support Bar Length and the UAV Control Systems. |
Session 3 | 04 April 2019 (Thursday) | 01:00 pm – 03:00 pm | |
Paper | Paper ID | Title | |
01- | 042 | Efficient Utilization of Energy using Fog and Cloud based Integrated Environment in Smart Grid. | |
02- | 114 | Fog Computing as a Complementary Approach to Cloud Computing. | |
03- | 119 | Analysis of NBA Players and Shot Prediction Using Random Forest and XGBoost Models | |
04- | 001 | Survey on Social Network Analysis using Big Data Platform. | |
05- | 077 | Air Cooling Systems Analysis for Lithium Ion Polymer Battery Compartment. | |
06- | 131 | Towards Meta-Modeling of Big Data Visualization layer using analysis techniques. | |
07- | 171 | Feature Selection: Filter Methods Performance Challenges. | |
08- | 197 | IMIAD: Intelligent Malware Identification for Android Platform. | |
09- | 167 | Towards Improved Saudi Dialectal Arabic Stemming. |
Oral presentation of participants Sessions (Room 2)
Session 1 | 03 April 2019 (Wednesday) | 10:30 am – 12:15 pm | |
Paper | Paper ID | Title | |
01- | 212 | Merged technique to prevent SYBIL Attacks in VANETs. | |
02- | 148 | A Proposed Approach For Handling Tradeoff Between Security, Usability, and Cost. | |
03- | 268 | A Hybrid Intrusion Detection System for Cloud Computing Environments | |
04- | 190 | Metadata and its Impacts on National Security Agencies. | |
05- | 124 | Comparative study of crossover operators for the MTSP. | |
06- | 069 | Fault Analysis for Lightweight Block Cipher for security Analysis in WSN for Internet of Things. | |
07- | 282 | Analyzing Usability of Educational Websites Using Automated Tools. | |
08- | 291 | Review of Signature-based Techniques in Antivirus Products. |
Session 2 | 04 April 2019 (Thursday) | 08:00 am – 10:00 am | |
Paper | Paper ID | Title | |
01- | 145 | SSA-SDA: Subjectivity and Sentiment Analysis of Sudanese Dialect Arabic. | |
02- | 189 | Medical Self-Diagnostic System Using Artificial Neural Networks. | |
03- | 211 | Models of recognition algorithms based on three-dimensional threshold functions. | |
04- | 332 | Nonlinear Autoregressive Moving-average (NARMA) Time Series Forecasting Using Neural Networks. | |
05- | 336 | Multi-Instance Neural Network Architecture for Scene Classification in Remote Sensing. | |
06- | 360 | Document Categorization Engine Based on Machine Learning Techniques. | |
07- | 316 | Arabic Text Classification: A Comparative Approach Using a Big Dataset. | |
08- | 062 | Survey of Automatic Hate Speech Detection on Online Social Network. |
Session 3 | 04 April 2019 (Thursday) | 01:00 pm – 03:00 pm | |
Paper | Paper ID | Title | |
01- | 214 | Development and Web Performance Evaluation of Internet of Things testbed. | |
02- | 366 | Real-Time Driver Drowsiness Detection Using Wearable Technology. | |
03- | 255 | Cloud of Things for Healthcare: A Survey from Energy Efficiency Perspective. | |
04- | 125 | IoT Based Healthcare Infrastructure: A Case Study of Saudi Arabia. | |
05- | 096 | A Brief Review on Information and Communication Technologies for Disaster Management. | |
06- | 183 | A Survey on Authentication Techniques for the Internet of Things. | |
07- | 333 | Intelligent Intrusion Detection System Using Deep Learning In Software Defined Network. | |
08- | 195 | A Security-Centric Architecture for Big Data. | |
09- | 113 | Short Term Power Load Forecasting using Machine Learning Models for energy management in a smart community. |
Oral presentation of participants Sessions (Room 3)
Session 1 | 03 April 2019 (Wednesday) | 10:30 am – 12:15 pm | |
Paper | Paper ID | Title | |
01- | 126 | A Survey of Scheduling Algorithms in Cloud Computing. | |
02- | 110 | An Efficient Islanding Classification Technique for Single Phase Grid Connected Photovoltaic System. | |
03- | 092 | A new Improved Round Robin-Based Scheduling Algorithm-A comparative Analysis. | |
04- | 067 | Identification of stakeholder’s roles in cloud environment: A Survey. | |
05- | 223 | Applying Machine Learning Approaches to Enhance the Performance of MLFQ Architecture. | |
06- | 224 | Comparing Performance of Commercial Cloud Storage Systems: The Case of Dropbox and One Drive. | |
07- | 272 | Comparative Analysis for Task Scheduling Algorithms on Cloud Computing. | |
08- | 357 | Sensors Placement for Faults Detection in the Photovoltaic System. |
Session 2 | 04 April 2019 (Thursday) | 08:00 am – 10:00 am | |
Paper | Paper ID | Title | |
01- | 326 | Performance Evaluation of Proportional Fairness Scheduling in MmWave Network. | |
02- | 314 | Biotechnological Applications Of Bioinformatics In The Post Genomic ERA. | |
03- | 340 | Design of YAG Coated Laser Diode Driver with Feedback Mechanism. | |
04- | 174 | Influencing Factors of Social Commerce Behavior in Saudi Arabia. | |
05- | 029 | Genetic Algorithm VS Simulated Evolution: A Comparative Study of Evolutionary Optimization Techniques for Object Recognition. | |
06- | 151 | Evaluation of the impact of Clinical Decision Support Systems: Descriptive Analytics. | |
07- | 228 | Empirical Analysis of Charging Time Derived from Mobile Charging Stations. | |
08- | 106 | Text Detection Techniques in Natural Scene Images: An Empirical Study. | |
09- | 230 | Automated Breast Tumor Diagnosis Using local binary patterns (LBP) Based on Deep Learning Classification. |
Session 3 | 04 April 2019 (Thursday) | 01:00 pm – 03:00 pm | |
Paper | Paper ID | Title | |
01- | 294 | Data Model Transformation: An Ontology Approach. | |
02- | 179 | The influence of effects on Agile decisions: Measurement and Structural Models. | |
03- | 342 | Scalable Quality and Testing Lab (SQTL). | |
04- | 288 | Combining Statistical and Structural Approaches for Arabic Handwriting Recognition. | |
05- | 004 | Failure Function of the Connected (1,2)-or-(2,1)-out-of-(m,n): F Linear & Circular System. | |
06- | 043 | Simulated Kalman Filter Optimization Algorithm for Maximization of Wireless Sensor Networks Coverage. | |
07- | 172 | Oppositional Learning Prediction Operator with Jumping Rate for Simulated Kalman Filter. | |
08- | 166 | A Fitness-Based Adaptive Synchronous-Asynchronous Switching in Simulated Kalman Filter Optimizer. | |
09 | 339 | Transition to IPv6 Protocol, Where We Are? |
Oral presentation of participants Sessions (Room 4)
Session 1 | 03 April 2019 (Wednesday) | 10:30 am – 12:15 pm | |
Paper | Paper ID | Title | |
01- | 021 | Critical Requirements Elicitation Challenges in Offshore Software Development. | |
02- | 024 | An Effective Model-Based Integration Testing Technique for Component-Based Software. | |
03- | 111 | MODEM: an UML profile for Modeling and Predicting software Maintenance before implementation. | |
04- | 139 | Identification of scope creep factors and their impact on software project success. | |
05- | 146 | Test Case Generation using Unified Modeling Language. | |
06- | 165 | An adaptive activity sequencing instrument to enhance e-learning: an integrated application of overlay user model and mathematical programming on the Web. | |
07- | 257 | Android Applications Scanning: The Guide. | |
08- | 292 | Software Energy Measurement at Different Levels of Granularity. |
Session 2 | 04 April 2019 (Thursday) | 08:00 am – 10:00 am | |
Paper | Paper ID | Title | |
01- | 051 | A method of skin disease detection using image processing | |
02- | 207 | A Novel Approach to Preserve Small Scale Details in Fused Image using Guide Filter with NSCT for Visual and Infrared Images. | |
03- | 248 | Images research by content. | |
04- | 273 | An Improved Image Annotation and Retrieval System Using Hybrid Based Semantic and Context Data Analysis. | |
05- | 363 | Optimization of MEMS PZR Carbon dioxide Sensor. | |
06- | 046 | Improved Video Stabilization using SIFT-Log Polar Technique for Unmanned Aerial Vehicles. | |
07- | 120 | Convolution, Approximation and Spatial Information Based Object and Color Signatures for Content Based Image Retrieval. | |
08- | 328 | Brain Tumor Classification: Feature Fusion. |
Session 3 | 04 April 2019 (Thursday) | 01:00 pm – 03:00 pm | |
Paper | Paper ID | Title | |
01- | 149 | A Mobile App for Diagnosing Horses’ Diseases. | |
02- | 153 | SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET. | |
03- | 199 | Relationship modeling of factors for OSN-based E-Learning Deployment. | |
04- | 350 | Cold Start Predictions in Recommender System. | |
05- | 256 | Virtualization Security Challenges in Cloud Computing Environments - A survey. | |
06- | 089 | Evaluation of Different Horizon Lengths in Single-agent Finite Impulse Response Optimizer. | |
07- | 101 | Concept-based and Fuzzy Adaptive E-learning: Pilot Study. | |
08- | 103 | Intelligent decision making and planning for outbound call center. | |
09- | 264 | An Enhanced Very Short-Term Load Forecasting Scheme Based on Activation Function. |