Post-Conference Report from the WSEAS Conferences
ACC'09, MMACTEE'09, EEESD'09, LA'09
Astir Palace, Vouliagmeni Beach, Athens, Greece

September 28-30, 2009 




    * 2nd Int.Conf. on LANDSCAPE ARCHITECTURE (LA'09)

Tutorial on Applied Computing and Applications (organized by Professor Bardis -- see below)

See pictures:

Coffee-Break with Coffee, Tea, Milk, Mineral Water, Orange Juices, Cookies in the terrace with spectacular views of Saronic Gulf
... just in front of the conference rooms

Coffee-Break with Coffee, Tea, Milk, Mineral Water, Orange Juices, Cookies in the terrace with spectacular views of Saronic Gulf
... just in front of the conference rooms

Coffee-Break with Coffee, Tea, Milk, Mineral Water, Orange Juices, Cookies in the terrace with spectacular views of Saronic Gulf
... just in front of the conference rooms

Coffee-Break with Coffee, Tea, Milk, Mineral Water, Orange Juices, Cookies in the terrace with spectacular views of Saronic Gulf
... just in front of the conference rooms

organizers and volunteers....

Many Colleagues enjoyed the hot greek sun in the olympic size swimming pool of the ASTIR-PALACE WESTIN Resort

Other Colleagues enjoyed swimming in the private beach of the Hotel....

Conference Secretariat was available to help the 250 WSEAS-ers from eight to eight (08:00 - 20:00) every day!

In front of the 4 conference rooms, an Exhibition with many WSEAS books was held. Many volumes were given freely to the attendees

In front of the 4 conference rooms, an Exhibition with many WSEAS books was held. Many volumes were given freely to the attendees

In front of the 4 conference rooms, an Exhibition with many WSEAS books was held. Many volumes were given freely to the attendees

The Conference is Organized by the WSEAS and the following 8 Universities:

University Politehnica of Bucharest
Splaiul Independentei 313, Bucharest, Postal Code 060042, ROMANIA
Telephone: +4021-402 91 00 ; +4021-318 10 22 / 23 / 24 / 25
Fax: +4021-318 10 01

University of Genova
Via Balbi, 5 - 16126 Genova
Partita IVA 00754150100


Text Box: "GH.ASACHI” TECHNICAL UNIVERSITY OF IAŞI FACULTY OF ELECTRICAL ENGINEERING 53 Dimitrie Mangeron Blvd., Iaşi, 700050, ROMANIA Tel: +40 232 278680, 278683 Fax: +40 232 237627 E-mail:, Web:




Zhejiang University of Technology





Norwegian University of 
Science and Technology

Faculty of Information Technology, 
Mathematics and Electrical Engineering
Sem Salandsvei 5 Gloeshaugen, No-7494 Trondheim, NORWAY 


Executive Agency for Higher Education and Research Funding (UEFISCSU)

Universidy of Algarve, Portugal


The Cybercom Group is a high-tech consultancy that offers global sourcing for end-to-end solutions. The Group established itself as a world-class supplier in security, portal solutions, mobile services, and embedded systems. Thanks to its extensive industry and operations experience, Cybercom can offer strategic and technological expertise to these markets: telecom, industry, media, banking and financial services, retail and the public sector.

More Details:


We thank our Volunteers
* Aida Bulucea
* Ana Sikharulidze
* Brindusa Covaci
* Charalambos Chrysanthakopoulos
* Nikos Karadimas

for their assistance!
WSEAS offered them a FREE REGISTRATION in any WSEAS Upcoming Conference.

Totally, over than 250 delegates attended

The Banquet took place in the  in the COSMOS C' Room with a spectacular view in the Saronic Gulf
with live greek and international music and folklore dances

During the Banquet the organizers welcomed the WSEAS participants and gave appointment on several
other WSEAS conferences in the future

It was a fantastic night with live music, folklore dances and a wonderful banquet that only in WSEAS events you can enjoy.

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet

 Video from the Banquet


See an enhanced Photo Album of the conferences here:

Keynote Lecture:

High Dimensional Model Representation(s) as Multilinear Array Decomposition Method(s)
by Prof. Metin Demiralp, Istanbul Technical University, TURKEY.

The Keynote Lecture of Professor Pardalos is available in PDF

Plenary Lecture 1:
Formal Testing Approach for the Conformance and Interoperability of MANET Routing Protocols
by Dr. Stephane Maag, INSTITUT TELECOM (Paris), FRANCE.

Plenary Lecture 2:

Immune Network and Adaptive Control
by Prof. Marius-Constantin Popescu, University of Craiova, ROMANIA.

Plenary Lecture 3:

Monte Carlo Cellular Automaton Simulation in Biomedical Science: Cancer Research and Min Protein Dynamics
by Prof. Yongwimon Lenbury, Mahidol University, THAILAND.

Plenary Lecture 4:

Visualization and Interaction of the Virtual Human Organs for the Pre-operative Planning
by Prof. Lucio Tommaso De Paolis, Salento University, ITALY.

Plenary Lecture 5:

Potential Method in the Performance Evaluation of a Network Node
by Prof. Andrzej Chydzinski, Silesian University of Technology, POLAND.

Plenary Lecture 6:

Simulation of Power Plants and Energy Conversion Systems
by Prof. Reinhard Leithner, Technical University Braunschweig, GERMANY.

Plenary Lecture 7:

Electronic Health Record from an Australian Perspective
by Mr. Eugene Lutton, University of Newcastle, AUSTRALIA.

Plenary Lecture 8:

Decision Precising Technologies in Decision Making Systems
by Prof. Gia Sirbiladze, Iv. Javakhishvili Tbilisi State University, GEORGIA.

Plenary Lecture 9

Campus Web based Information System for Monitoring Quality of Life: A Case Study Applied to the University of Minho
by Assist. Prof. Rui Antonio Rodrigues Ramos, University of Minho, PORTUGAL.

Plenary Lecture 10:

The Operating Risk Assessment for Dependable Systems
by Prof. Ga

Plenary Lecture 11:

SEHE Scheme for Electric Energy Production from Solar Radiation using Hydrogen as an Energy Career
by Assoc. Prof. Camelia Petre, University POLITEHNICA of Bucharest, ROMANIA.

Plenary Lecture 12:

Influencing Factors of a Successful Adoption of a Product-Service System toward a Sustainable Production Consumption Paradigm
by Prof. Flavio Tonelli, University of Genoa, ITALY.

Plenary Lecture 13:

Modern Hyphenated Analytical Techniques for the Analysis of Environmental, Food and Biological Matrices
by Assoc. Prof. George A. Zachariadis, Aristotle University, GREECE.

Plenary Lecture 14:

Particulates and Nitrogen Dioxide in the Brussels Ambient Air Need Drastic Emission Reduction
by Ir. P. Vanderstraeten, Brussels Institute for Environmental Management, BELGIUM.

Plenary Lecture 15:

Climatic Variability in Eastern Mediterranean: Dynamic Mechanisms and Impact on Regional Climate
by Assist. Prof. Helena A. Flocas, University of Athens, GREECE.

Plenary Lecture 16:

A New Technique for Biological Monitoring
by Prof. Fukiko Ueda, Nippon Veterinary and Animal Science University, JAPAN.

Plenary Lecture 17:

Risk Assessment of GMOs and Associated Pesticides: A Problem For Sustainable Development? The Case of GM Maize MON 863
by Prof. Gilles-Eric Seralini, University of Caen, FRANCE.

Plenary Lecture 18:

'Clean' Energy and Poor People: Ecological Impacts of Hydroelectric Dams on Fish and Fishermen in the Amazon Rainforest
by Prof. Renato A. M. Silvano, University Federal University of Rio Grande do Sul (UFRGS), Brazil.

Plenary Lecture 19:

Desert Solar Technologies
by Prof. Christos D. Papageorgiou, National Technical University of Athens, GREECE.

Plenary Lecture 20:

Non-Regulated Exhaust Pollutants Emitted from Passenger Cars of Different Technology
by Assist. Prof. Efthimios Zervas, Democritus University of Thrace, GREECE.

Plenary Lecture 21:

Engaging the Community through a Strategy for Public Art
by  Prof. Annaliese Bischoff , University of Massachusetts, Amherst, USA

Plenary Lecture 22:

Energy Balance, Health and Environment
by Prof. Anne Vernez Moudon, University of Washington, USA

jointly with the WSEAS conferences we had the
Tutorial on Applied Computing and Applications


WSEAS    Information Technologies Research     

Head of Organizing Committee, Dr. Nikolaos G. Bardis, CEO and founder of Information Technologies Research (ITR), Adjunct Professor, University of Military Education, Hellenic Army Academy, GREECE


    Nikolaos G. Bardis received the diploma of Computer Engineering and the PhD degree from National Technical University of Ukraine (Polytechnic Institute of Kiev) in 1995 and 1999 respectively. He is an Adjunct Professor University of Military Education,- (Hellenic Army Academy, Hellenic Naval Academy, Hellenic Air force Academy), research scientist at the National Centre for Scientific Research "Demokritos"- Greece on Institute of Informatics and Telecommunications - Net Media Lab and adjunct an Assistant Professor in the Automation Department at the Technological Education Institute (T.E.I) of Chalkida (Greece). His research interests include cryptography and data security, information theory, artificial intelligence, databases, software engineering and applications in Defence and in the Military Applications. He is a member of the Technical Chamber of Greece, TPC COMSOC - IEEE, WSEAS, and ITR.     

Chairman: Ross W Tsagalidis, CEO and founder of Consulting Security Informatics (CSI).
    Ross W Tsagalidis is the CEO and founder of Consulting Security Informatics (CSI). He has more than 20 years experience in the field of Information Security Management (ISM) and Risk Management (RM). He received his M.Sc. degree in Computer Science from the Royal Institute of Technology/SU. Ross’s professional background: Corporate Security Officer in the corporate sector, Chief Information Security in the Defence Industry as well as Chief Engineer in Information Security in a Swedish Department of Defence Authority. He has also been the CEO for a Telemedicine Company in Sweden and Business Manager Nordic for a US- company. His mission is to increase the awareness, considering benefits of implementing ISM and RM, of Corporate Management and Board of Directors     

Design of Efficient Algorithms for the Development of High Efficiency Cryptographic Systems and Data Coding for Applications of Secure Information Transmission
    Marilena Mitrouli, Assistant Professor, Department of Mathematics, National University of Athens      

Nikolaos Doukas, Lecture, Department of Mathematics and Engineering Sciences, University of Military Education, Hellenic Army Academy     

Time: 20-30 min

Results and Applications of the Research were supported by a grant by the Greek Ministry of Development - General Secretariat for Research and Technology and the European Community Social Funds. The main part of this Research was carried out when the authors where attending the Operational program “PENED 2003:

Identification and Access Management (Entitlement Management)


Henrik Johansson, Director Business Unit, Cybercom Sweden East AB

Time: 30-40 min

Entitlement Management is a fairly new term and not always used in a consistent manner. We use it to describe emerging technologies enabling real-time and enterprise-wide enforcement of authorization based on an organization’s overall policies. It offers fine-grained and context-aware access controls that adapt to dynamically changing requirements. Full-blown Entitlement Management handles the entire life-cycle of access policy management creation, enforcement, monitoring, auditing and final archiving of access control policies. Standardized authorization services of this type will be base components in all future IT infrastructures.
These are some typical characteristics:
1)    Standards-based. Rather than embedding authorization in application code, a standardized language is used for access request-response queries. XACML is an obvious choice.
2)    External to applications. Maintenance of access control policies is carried out from a central point. Applications and services are protected by Policy Enforcement Points (PEP) which query the authorization service to determine if access should be granted or denied.
3)    Fine-grained. Fine-grained Access policies consider all aspects of an access request is the subject, the action, the resource being accessed and even the context of the request. High-level and generic policies can be expressed but also very detailed and precise rules matching unique situations.
4)    Context-aware. Environment parameters such as time of day or network location can be considered in access control enforcement but also other types of dynamically changing conditions such as the state of a related application, for instance in a workflow, project or document management system

Target groups: Bank, Government, middle-large public business, health care

Bjφrn Lindeberg, Director Business Development

Time: 30-40 min
The Nordic Forensic Team (NFT) is a part of the Cybercom Group AB, a Swedish Nasaq-OMX public traded company in the IT-consultancy field with at focus on IT-Security.
NFT operates in two major areas: IT-Forensics and Counter Intelligence Services (CIS). In IT-Forensics we investigate Industrial Espionage, International money laundering, Fraud and more specifically credit card fraud under PCI-DSS where we are the only Nordic/Baltic certified QFI.
In Counter Intelligence Services we operate as a private intelligence organization for major European companies. NFT is one of Europe’s largest IT-Forensic Investigators and the largest PCI-Forensic Investigator in the Nordic/Baltic region, but more importantly we are one of very few companies that have successfully investigated Industrial Espionage cases, Organized Crime and Multinational fraud schemes and provided evidence used in a court of law against criminals now behind bars.
We are a contracted IT-Forensic task force team C.E.R.T. to several world leading banks. We are hired by multiple secret services around the globe and have an exceptional track record of handling tough Industrial Espionage cases spanning borders where international police forces have a hard time acting effectively.
Target groups: Banking, Finance, Retail, Counter Intelligence, IT Security Emergency counter measures

(Payment Card Industry Data Security Standard)

Bjφrn Lindeberg, Director Business Development

Time: 30-40 min

PCI DSS - We protect your customers payment card transactions
Many consumers are still hesitant about using their credit cards over the Internet. And often quite rightly, due to the number of crimes involving stolen credit card details is increasing. In view of this, major players such as Visa, MasterCard and more, have agreed on a common standard for handling credit card information. This standard, the Payment Card Industry (PCI) Data Security Standard (DSS), is an international standard that stipulates relatively strict and concrete security requirements. This affects all players handling payment card transactions.

Cybercom helps our customers to identify the card handling environment from a technical and organizational perspective. Our work results in concrete action plans to achieve a secure Card Data Environment quickly and cost-efficiently. Our long-term approach gives our customers a guarantee that PCI DSS compliance is not a one-off occurrence.
Target groups: Banking, Finance, Retail

Connected Ambulance Care- how to get life vital information across Health Care Service points without losing focus

Henrik Johansson, Director Business Unit, Cybercom Sweden East AB

Time: 30-40 min

This session focuses on the benefits of implementing an on-line ambulance information system but also discusses the potential obstacles and ways to avoid them. The session also includes a short demo of the next generation of AmbuLink(R) Mobile from Cybercom. By combining years of experience from the medical area and modern user interface design and technology from the Connected Car concept, Cybercom provides a solution that lets the ambulance personnel focus on their main task at hand - saving lives - without risking to lose vital information!

Cybercom's AmbuLink(R) Mobile is a complete, flexible on-line ambulance information system that uses the Internet and mobile communication solutions to ensure that vital information always reaches the correct location. AmbuLink(R) can be used alongside existing information systems and can be connected to future national systems, such as the National Patient Summary.  This means that patient-specific information about medication, allergies, etc. can be accessed directly. AmbuLink(R) Mobile therefore increases patient safety and makes the work of nursing staff/paramedics that bit easier, regardless of where in the country an incident occurs.

AmbuLink(R) is developed in line with current professional requirements and in consultation with nursing staff and experienced system specialists within the healthcare sector.
Target groups: Health Care

An Internal Meeting of the Committee to arrange the last details took place in the Hotel one day before the opening of the meeting

Several discussion took place during the conferences about hot problems in science and engineering.

The most important is that all the publications are now in ISI and this SAYS MANY THINGS for those they know  what we mean ISI Publication in our CVs .  

Best Papers:
The Best Paper award honors the author(s) of a paper of exceptional merit dealing with a subject related to the Conference's technical scope, see the photos above and the list of the awardees here...)
(The papers evaluated by committees of 6 international experts, different


All the WSEAS Books are in ISI / SCI (Web of Science). Download them now from the site of ISI
 (Click on the link: List of Conferences 2004-2008 and download them in an EXCEL file from the site of ISI). As you can see from the site of ISI the criteria for including Books and Proceedings in ISI are very strict and most of the conferences of older societies are not in the ISI Index while all the WSEAS books and proceedings are inside ISI / SCI (Web of Science). Check it on the site of ISI please, now.
 NEW: The 4 most recent WSEAS journals (WSEAS Trans. on Biology and Biomedicine, WSEAS Trans. om Fluid Mechanics, WSEAS Trans. on Heat and Mass Transfer, WSEAS Trans. on Business and Economics) have been accepted in SCOPUS and so all the WSEAS Journals are now in SCOPUS. All the WSEAS Books, Proceedings and JOURNALS are also indexed in ACM. Click here:  , select "The Guide" and then type WSEAS. See the complete indexing of WSEAS Books, Proceedings, Journals in ACM, ASM, ELSEVIER other 30 indexes at: 
 NEW Letters from British Library, American Chemical Society, SWETS, see more:
 The impact (trend line) of the WSEAS Journals increase exponentially! 



Dear Professor Mastorakis,

You deserve compliments and congratulations on your making WSEAS an important international forum for exchange of
information and ideas.

    With cordial regards.


          Lotfi Zadeh

Lotfi A. Zadeh

Professor in the Graduate School

Director, Berkeley Initiative in Soft Computing (BISC)


729 Soda Hall #1776
Computer Science Division

Department of Electrical Engineering and Computer Sciences

University of California

Berkeley, CA 94720-1776

Tel.(office): (510) 642-4959

Fax (office): (510) 642-1712

Tel.(home): (510) 526-2569

Fax (home): (510) 526-2433


BISC Homepage URLs



WSEAS provided a very important tool to all the participants
A permanent username and password for accessing WSEAS conference proceedings on-line for ever.

See this photo album:

Additional features of the conferences :

1) Publication of the Proceedings in 3 media: hard-copy, CD, E-Library
4  books of WSEAS  (see details, contents, author indices and editors below) with ISBN and ISSN indexed by the major Citation Indices (ISI ranked):

(B)  CD-ROM Proceedings with pages' numbers with ISBN and ISSN indexed by the major Citation Indexes:

(C) E-Library:

and possible, for a very small number of papers:

(D) JOURNAL PUBLICATION: Expanded and enhanced versions of papers published in the conference proceedings also going to be considered for possible publication in one of the WSEAS journals that participate in the major International Scientific Indices (Elsevier, Scopus, EI, Compendex, INSPEC, CSA .... see:     ).

WSEAS provides a very important tool to all the participants; a permanent username and password for accessing WSEAS conference proceedings on-line for ever.

3) The Participants received numerous coffee-breaks, and a Welcome Drink

4) Cultural and social activities as customary in WSEAS events.

5) The conference Books (Hard-Copy Proceedings), CD-ROM proceedings and Journals (with selected papers) published by WSEAS Press continue to sell for a long time after the meeting has taken place. This is another demonstration of the prestige the scientific community attribute to the meetings organized by the WSEAS.
For example, they are distributed via AMAZON: 

What is the Permanent Procedure for additional Journal publication for a very small number of High-Quality Papers presented in the WSEAS Conferences (after the recommendation of Chairmen). So, the authors with accepted & presented papers received the following e-mail:

We have started now the procedure for the evaluation of the extended versions of your papers for possible inclusion in the WSEAS journals after new rounds of review.

INTRODUCTION: You know that our goal is to maintain very strong international journals, to increase the impact of our beloved WSEAS Transactions, really top journals as they really are. To this end, we need only high quality papers, breakthrough works of archival value, i.e. papers that are well written from any point of view, completed studies (with their numerical examples or experiments that must be compared with the previous results in the literature), excellent English language and of course correct WSEAS format. The papers also must be substantially extended version of the paper that was presented in the conference (with more than 40% new material). We need papers that will attract the attention of other scholars citing them increasing our impact. In the next few years, the WSEAS transactions must be in every academic library, in every corner of the earth. To this end, we need your high quality contribution.


a) Check very carefully if your idea is really important, breakthrough in your field and can appear in a Journal of the quality and the level of the WSEAS Transactions. If you doubt, do not send it so easily. Your paper must not be only a good idea. It must be a complete study with theoretical background, complete bibliographical references; without grammatical and syntactical errors. For theoretical works: full comparison with previous published papers is necessary. We need numerical examples, applicability of the method, originality, novelty and directions for future research. For experimental or computational works: full comparison with previous published papers is necessary. We need real experiments with the necessary documentation, while for computational work, we need full benchmarks. Of course along discussions for the applicability of the method, originality, novelty and directions for future research.
b) Complete the extended version of your paper  http://...............  (the full web address was given only to authors who presented a paper)

c) If your extended version fulfills the paragraph a), then our Editors will send it to 3 independent Reviewers outside your country. If not, our Editors are entitled to reject it from this early stage informing you properly. The positive answer of the 3 reviewers is necessary (attention: 2 yes and 1 no implies NO, i.e. rejection).

d) Our Editors will collect the reviewers' remarks and will send them again to you for acceptance/ acceptance after minor revision / acceptance after major revision / rejection

e) Possibly new rounds of review will be needed.

f) No additional fee is needed in case of acceptance. 

The final list of the papers must have the approval of our Editors and 3 Reviewers, and of course the Editor-in-Chief of the particular Journal.

We want only authors that presented their papers to complete this web form:
http://...............   (the full web address was given only to authors who presented a paper) So, in this form you will need a password (the password was given only to the authors who presented a paper).

PROCEEDINGS: The Proceedings related to the Conference are covered by:
02. INSPEC (IET, former IEE)
03. CSA (Cambridge Scientific Abstracts)
04. ELSEVIER and Elsevier Bibliographic Database
06. ACM
07. MATHSCINET of AMS (American Mathematical Society)
08. MATHEMATICAL REVIEWS of AMS (American Mathematical Society)
09. Directory of Published Proceedings
10. Computer Science Bibliography Administrator
11. American Chemical Society and its Index: Chemical Abstracts Service
12. European Library in Paris (France)
13. DEST Database (Australia)
14. Engineering Information
18. Compendex (CPX)
23. OceanBase
24. BEILSTEIN Abstracts
27. British Library
28. National Library of Greece
29. German National Library of Science and Technology
30. IARAS Index
31. World Textiles

The WSEAS journals are covered by:

01. ACM
02. INSPEC (IET, former IEE)
03. CSA (Cambridge Scientific Abstracts)
04. ELSEVIER and Elsevier Bibliographic Database
06. MATHSCINET of AMS (American Mathematical Society)
08. MATHEMATICAL REVIEWS of AMS (American Mathematical Society)
09. Computer Science Bibliography Administrator
10. British Library
11. American Chemical Society and its Index: Chemical Abstracts Service
12. European Library in Paris (France)
13. DEST Database (Australia)
14. Swets Information Services
15. Engineering Information
19. Compendex (CPX)
20. Geobase
24. OceanBase
25. BEILSTEIN Abstracts
26. World Textiles
28. Mayersche
29. Index of Information Systems Journals
30. National Library of Greece
31. IARAS Index

  • From these excellent and well-organized conferences, WSEAS Press published also 4 Books that contain the conference proceedings.
    Please, order them from the WSEAS Press:

    .: See your feedback about the Conference:               

    See the total list with your impressions from the WSEAS Conferences and Journals
    within 2009:
    within 2008:
    within 2007:
    within 2006:
    within 2005:
    within 2004:
    within 2003:
    For previous years, see:
    WSEAS will publish yours comments
    (  ) and will circulate them in a booklet!

  • Other Photos:  See this photo album:
    Several excursions took place in Acropolis, Sounion Cape in the 2nd and 3rd day of the conference


    Join us