Limited good quality papers will be accepted for oral presentation and publications

Scope

5th International Conference on Signal, Image Processing and Multimedia (SPM 2018)

5 thInternational Conference on Signal, Image Processing and Multimedia (SPM 2018) is a forum for presenting new advances and research results in the fields of Signal, Image Processing and Multimedia. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences. Topics of interest include, but are not limited to, the following

Topics of Interest

Signal and Image Processing, Applied Digital Signal Processing, Audio, Image, Video processing, Coding and Transmission
  • Computer Graphics and Visualization
  • Computer Vision
  • Digital Signal Processing in Communications
  • Emerging Technologies
  • Emerging Technologies in Digital Signal Processing
  • Image & Signal Processing Applications
  • Image Acquisition and Display
  • Image and Video Processing & Analysis
  • Image Formation
  • Image Scanning, Display, and Printing
  • Machine learning, Computer Graphics, Biological Vision
  • Storage and Retrieval
  • Multimedia
  • Digital Multimedia Broadcasting
  • Education and Training
  • Multimedia analysis and Internet
  • Multimedia and Artificial Intelligence
  • Multimedia Applications
  • Multimedia Communication and Networking
  • Multimedia Content Understanding
  • Multimedia Databases and File Systems
  • Multimedia Human-Machine Interface and Interaction
  • Multimedia Interface and Interaction
  • Multimedia Security and Content Protection
  • Multimedia Signal Processing
  • Multimedia Standards and Related Issues
  • Multimedia Systems and Devices
  • Operating System Mechanisms for Multimedia
  • Virtual Reality and 3-D Imaging
  • Wireless, Mobile Computing and Multimedia


Second Batch : (Submissions after November 17, 2018)

Submission Deadline CLOSED
Authors Notification CLOSED
Registration & Camera-Ready Paper Due CLOSED


Paper Submission

Authors are invited to submit papers for the conference through Paper Submission System by CLOSED. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from SPM 2018, after further revisions, will be published in the special issue of the following journals

SIPIJ

Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing

More Details

VLSICS

International journal of VLSI design & Communication Systems (VLSICS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of VLSI Design & Communications

More Details

IJMA

The International Journal of Multimedia & Its Applications (IJMA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Multimedia & its applications

More Details

IJESA

International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications

More Details


Proceedings

Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library




Program Committee Members


  • Solomiia Fedushko, Lviv Polytechnic National University, Ukraine
  • Yuriy Syerov, Lviv Polytechnic National University, Ukraine
  • Abdalah Rababah, Jordan University of Science and Technology, Jordan
  • Abdulhamit Subasi, Effat University, Saudi Arabia
  • Aihua Mao, South China University of Technology, China
  • A.Geetha Devi, PVP Siddhartha Institute of Technology,Vijayawada
  • Ajao Lukman Adewale, Federal University of Technology, Nigeria
  • Amine Laghrib, Faculté des Sciences Beni-Mellal, Marocco
  • Amir Rastegarnia, University of Malayer, Iran
  • Amir Rastegarnia, University of Malayer, Iran
  • Anita Dixit,SDM College of Engineering and Technology,India
  • Barhoumi Walid, SIIVA-LIMTIC Laboratory, Tunisia
  • Barhoumi Walid, SIIVA-LIMTIC Laboratory, Tunisia
  • Carlo Sau, University degli Studi di Cagliari, Italy
  • Chaker LARABI, University de Poitiers , France
  • Chin-Chen Chang Feng Chia University,Taiwan
  • Chuanzong Zhang, Aalborg University, Denmark
  • Dac-Nhuong Le, Haiphong University, Vietnam
  • Dinesh R, Samsung Electro-Mechanics, India
  • Fabio Gasparetti, Roma Tre University, Italy
  • Hamid Ali Abed AL-Asadi,Basra University, Iraq
  • Hanming Fang, Logistical Engineering University, China
  • Harjeet Kaur, Army Institute of Technology, India
  • Hassan Ugail, University of Bradford, UK
  • Issac Niwas Swamidoss, Nanyang Technological University, Singapore
  • Klimis Ntalianis, Athens University of Applied Sciences, Greece
  • Lark Kwon Choi The University of Texas at Austin, USA
  • marzak bouchra, Hassan II University, Morocco
  • Mohammadreza Balouchestani,Indiana Purdue Fort Wayne University,USA
  • Mohammed Fatehy Soliman, Suez Canal University, Egypt
  • Mokhtar Mohammadi, Shahrood University of Technology, Iran
  • Nalin D. K. Jayakody, National Research Tomsk Polytechnic University, Russia
  • Naveed Ahmed, University of Sharjah, UAE
  • Partha Pratim Bhattacharya, Mody University of Science & Technology,India
  • Parul dawar, Guru Gobind Singh Indraprastha University, India
  • Pedro Donadio,Federal University of Amazonas,Brazil
  • Petrellis N, TEI of Thessaly, Greece
  • Qiong(Jennifer) Zhou,Florida State University,USA
  • Raad Ahmed Hadi, Iraqi University, Iraq
  • Ramgopal Kashyap, SISTec, India
  • R.Vijayakumar,Mahatma Gandhi University,India
  • Sahadev Roy, National Institute of Technology, India
  • Salem Nasri, Qassim University, Saudi Arabia
  • Samuel Baraldi Mafra, Federal University of Parana (UFPR), Brazil
  • Sankalap Arora, DAV University, India
  • S Mitra,TRIPURA INSTITUTE OF TECHNOLOGY,INDIA
  • Soon-Geul Lee, Kyung Hee University,Korea
  • Supriya Karmakar,Mellanox Technologies,USA
  • Tasher Ali Sheikh, North Eastern regional Institute of Science and Technology, India
  • Touahni. Raja, IBN Tofail University, Morocco
  • Upasna Vishnoi,Sr. Digital Design Engineer,USA
  • Waldir Sabino da Silva Junior,Universidade Federal do Amazonas (UFAM),Brazil
  • Wee kuok kwee, Multimedia University , Malaysia
  • Zeyu Sun, Luoyang Institute of Science and Technology,China



Accepted Papers


A MACHINE LEARNING APPROACH TO DETECT AND CLASSIFY 3D TWO-PHOTON POLYMERIZATION MICROSTRUCTURES USING OPTICAL MICROSCOPY IMAGES
Israel Goytom and Gu Yinwei
Ningbo University, Faculty of Science, 315200, China

ABSTRACT

For 3D microstructures fabricated by two-photon polymerization an effective approach of machine learning for detection and classification in their optical microscopic images is state and demonstrated in this paper. It is based on Faster R-CNN, Multi-label classification (MLC) and Residual learning framework Algorithms for reliable, automated detection and accurate classification of Two Photo Polymerization (TPP) microstructures. From finding and detecting the microstructures from a different location in the microscope slide, matching different shapes of the microstructures classify them among their categories is fully automated. The results are compared with manual examination and SEM images of the microstructures for the accuracy test.Some modifications of ordinary optical Microscope so as to make it automated and by applying Deep learning and Image processing algorithms we can successfully detect, label and classify 3D microstructures, designing the neural network model for each phase and by training them using the datasets that we have made, the dataset is a set different images from different angles and their annotation we can achieve High accuracy. The accurate microstructure detection technique in the combination of image processing and computer vision help to simulate the values of each pixel and classify the Microstructures.

KEYWORDS

Multi-label classification, Faster R-CNN Two-Photon Polymerization, computer vision, 3D Microstructures


VIDEO SEQUENCING BASED FACIAL EXPRESSION DETECTION WITH 3D LOCAL BINARY PATTERN VARIANTS
Kennedy Chengeta and Professor Serestina Viriri
University of KwaZulu Natal, South Africa
School of Computer Science and Mathematics, South Africa

ABSTRACT

Facial expression recognition in the field of computer vision and texture synthesis is in two forms namely static image analysis and ynamic video textures.The former involves 2D image texture synthesis and the latter dynamic textures where video sequences are extended into the temporal domain taking into account motion.The spatial domain texture involves image textures comparable to the actual texture and the dynamic texture synthesis involves videos which are given dynamic textures extended in a spatial or temporal domain. Facial actions cause local appearance changes over time, and thus dynamic texture descriptors should inherently be more suitable for facial action detection than their static variants. A video sequence is defined as a spatial temporal collection of texture in the temporal domain where dynamic features are extracted. The paper uses LBP-TOP which is a Local Binary Pattern variant to extract facial expression features from a sequence of video datasets. Gabor Filters are also applied to the feature extraction method. Volume Local Binary Patterns are then used to combine the texture, motion and appearance. A tracker was used to locate the facial image as a point in the deformation space. VLBP and LBP-TOP clearly outperformed the earlier approaches due to inclusion of local processing, robustness to monotonic gray-scale changes, and simple computation. The study used Facial Expressions and Emotions atabase(FEED) and CK+ databases. The study for the LBP -TOP and LGBP-TOP achieved bettered percentage recognition rate compared to the static image local binary pattern with a set of 333 sequences from the Cohn–Kanade database.

KEYWORDS

Local binary patterns on Three Orthogonal Planes(LBPTOP) · Volume Local Binary Patterns(VLBP)


NEAR-DROWNING EARLY PREDICTION TECHNIQUE USING NOVEL EQUATIONS (NEPTUNE) FOR SWIMMING POOLS
B David Prakash, IAG Firemark Singapore,

ABSTRACT

Safety is a critical aspect in all swimming pools. This paper describes a near-drowning early prediction technique using novel equations (NEPTUNE). NEPTUNE uses equations or rules that would be able to detect neardrowning using at least 1 but not more than 5 seconds of video sequence with no false positives. The backbone of NEPTUNE encompasses a mix of statistical image processing to merge images for a video sequence followed by Kmeans clustering to extract segments in the merged image and finally a revisit to statistical image processing to derive variables for every segment. These variables would be used by the equations to identify near-drowning. NEPTUNE has the potential to be integrated into a swimming pool camera system that would send an alarm to the lifeguards for early response so that the likelihood of recovery is high.

KEYWORDS

Near-drowning Detection, Drowning Detection, Statistical Image Processing, K-means Clustering, Swimming Pools


DEFECT DETECTION IN STEEL PLATE USING ULTRASONIC SIGNALS THROUGH FOURIER ANALYSIS
Mubarak Ahmad, Abdul Basit and Zinghua Liu
Beijing University of Technology, China.

ABSTRACT

Non Destructive testing (NDT) of structural materials is an emerging technology in many industries. Ultrasonic NDT is one of the methods which are widely used by different researchers in this field. Pulse Echo and through Transmission are fundamental testing approaches which use reflected and transmitted sound energy respectively. These techniques are highly defect orientation dependent. Using electromagnetic acoustic transducers (EMATs) a quantitative characterization method using Rayleigh waves is introduced for estimating surface crack depth in pitch-catch mode. Time of Flight (TOF) is a method which uses transmitted and reflected sound energy to detect the defects which is defect orientation dependent in the material. Material (structural) noise, instrumental noise and thermal noise are the dominant sources of noise in the received signals. To evaluate the signals for detecting, characterizing the defects and positioning signal processing is the most important part. For the analysis of different kind of received signals Fourier Transform is widely used. In this paper we have analysed received ultrasonic signals obtained from Steel plate having different size of cracks using Fourier Transforms.

KEYWORDS

NDT, Ultrasonic Testing, TOF, Fourier transform, EMAT



A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS
Mabrouka Gmiden1, Mohamed Hedi Gmiden2 and Hafedh Gmiden2
1,2Computer and Embedded System Lab (CES), National Engineers School of SfaxTunisia
ABSTRACT

The design of cryptographic mechanisms in automotive systems has been a major focus over the last ten years as the increase of cyber attacks against in-vehicle networks. The integration of these protocols into CAN bus networks is an efficient solution for leaving security level, but features of CAN bus make the performance requirements within cryptographic schemes very challenging. In the literature most of academic researches focused on designing security mechanisms for the CAN bus. Yet, very few research proposals are interested in analyzing performances requirements by using cryptographic protocols. In this paper, we investigate effects of implementing cryptographic approaches on performance by proposing an analysis methodology for implementing cryptographic approach in CAN bus communication and measuring real-time performances. Next, we propose our system which presents a tool for determining the impact of implementing of cryptographic solutions. On the other hand we have proposed an intrusion detection system using the same platform. Our tool allows the implementation of any security strategy as well as the real-time performance analysis of CAN network.


SIGNAL SUPERPOSITION MODEL WITH MINERALOGY BASED SPECTROSCOPIC DIELECTRIC MODEL IN WIRELESS UNDERGROUND SENSOR NETWORKS
K.A. Nethravathi,
Department of Electronics & Communication Engineering, R.V. College of Engineering, Bangalore, India
ABSTRACT

The propagation of EM waves in soil is defined by permittivity and permeability which are in turn affected by the soil parameters such as soil moisture and texture. Therefore, a suitable Dielectric Model like MBSDM is required for the channel characterization of WUSN. Effect of soil parameters and environmental conditions on signal propagation is modelled using One Ray Model and Superposition Model. The simulation of these stages is done in MATLAB for UG-UG, UG-AG and AG-UG scenarios. The system is further implemented on the ZYNQ ZC-702 hardware platform. The BER for same inter-node distance is found to be increasing in the order BPSK, BFSK, 4-PAM, QPSK and 16-QAM modulation is analysed.


QOS ENHANCEMENT IN 6LOWPAN BY IPV6 PACKET COMPRESSION AND DYNAMIC BANDWIDTH ALLOCATION
Vinila Nagaraj1 Kiran V2 Padmaja K V3,
1,2Department of Electronics and Communication, RVCE, Bangalore
3 Department of Electronics and Instrumentation, RVCE, Bangalore
ABSTRACT

Low Power Wireless Personal Area Networks (LoWPAN) based on IEEE 802.15.4 are characterized by low throughput, short communication range, nodes with limited processing power and memory. Therefore there is a need for efficient algorithms which can process and transmit IPv6 packets with available resources and can as well maintain the required QoS parameters. Towards this effort this paper presents a compression scheme to improve data throughput and thereby enhance the QoS. Further this paper also presents dynamic bandwidth allocation based on priority queue data structure which also contributes to improvement of QoS parameters.


CELL ASSOCIATION FOR MULTI BAND 5G CELLULAR HETNETS BASED ON NBS
Ahmed Zakaria 1 and Aziza I. Hussein2,
1Telecommunication Engineer, Telecom Egypt, Asyut, Egypt
2Computer & Systems Eng. Dept. Minia University, Minia, Egypt Electrical & Computer Eng. Dept.Effat University, Jeddah, KSA
ABSTRACT

A future mobile trend is that traffic generated by smartphones will dominate even more than it does today. Recently, smartphone traffic is expected to increase by 10 times and total mobile traffic for all devices by 8 times and more than 90 percent of mobile data traffic will come from smartphones. For this reasons mobile users will need to be actively pushed onto the 5th generation mobile (5G), builds upon today's 4G mobile network technology, which promises to offer a higher connection speeds with lower latency, or time delays. In 5G, whatever the technology used, a user association technique is needed to determine whether a user is associated with a particular base station (BS) before data transmission starts. User association plays an indispensable role in enhancing the load balancing, the spectrum efficiency, and the energy efficiency of networks. The challenge here, is to make the appropriate association that achieve the minimum required data rate for each user with acceptable complexity. In this paper, the pragmatic user association is formulated as an optimization problem, which is resolved by Nash Bargaining Solution (NBS). Simulation results show that the proposed algorithm can enable network operators to support fair resource allocation and ensure that users can be served equitably by both macro cell and pico cell. Also this paper provide an algorithm with low-complexity and reaches to near-optimal solution with a high performance guarantee


FW-TR: A NEW GENERATION OF FIREWALLS BASED ON TRUST-RISK ASSESSMENT OF FILTERING RULES AND POLICIES
Faouzi JAIDI
ESPRIT School of Engineering, Tunis, Tunisia
ABSTRACT

Firewalls as an approved and highly deployed security mechanism have an important role in setting up reliable security policies to ensure the protection of private and critical systems and infrastructures. While a firewall is considered as an essential node in Information Systems (IS) security and represents the backbone of security solutions, its effectiveness is highly dependent on the efficiency of its configuration and the reliability and coherence of its filtering policy. Enhancing the efficiency of access control solutions via improving the quality and capacity of firewalls attracted several researchers which led to several generations of firewall technologies. In this context, we introduce the novel concept of FW-TR firewall that integrates a trust-risk assessment approach in firewall solutions. Evaluating and involving the trust-risk associated to the filtering rules and policy in a firewall solution helps primary in: (i) strengthening the quality of the firewall filtering service; (ii) discovering firewall misconfigurations; (iii) analyzing firewall rules for anomalies detection; and (iv) changing the firewall behavior facing critical and malicious scenarios. The current paper defines a framework for organizing thinking about incorporating policies and rules trust-risk values in firewall filtering solutions that constitute what we called FW-TR: the new generation of firewalls.


ROBUST APPLICATION DETECTION USING TRAFFIC BURSTINESS
Hussein Oudah, Bogdan Ghita, Taimur Bakhshi
Center for Security, Communications and Network Research, University of Plymouth, Plymouth, United Kingdom
ABSTRACT

Traffic classification is an essential tool for network management and security. Traditional techniques such as port-based and payload analysis are ineffective as major Internet applications use dynamic port numbers and encryption. Recent studies have used statistical properties of flows to classify traffic with high accuracy, minimising the overhead limitations associated with other schemes such as deep packet inspection (DPI). Classification accuracy of statistical flow-based approaches, however, depends on the discrimination ability of the traffic features used. To this effect, the present paper customised the popular tcptrace utility to generate classification features based on traffic burstiness and periods of inactivity (idle time) for everyday Internet usage. An attempt was made to train a C5.0 decision tree classifier using the proposed features for eleven different Internet applications, generated by ten users. Overall, the newly proposed features reported a significant level of accuracy (~98%) in classifying the respective applications.


INflUENTIAL NODES DETECTION IN DYNAMIC SOCIAL NETWORKS
Nesrine HAFIENE 1,3,Wafa KAROUI 1,2 and Lotfi BEN ROMDHANE 1,3
1Université de Sousse, Laboratoire MARS*LR17ES05 ISITCom, 4011 Hammam Sousse, Tunisie
2Université de Tunis El Manar, ISI, 2080 Ariana, Tunisie
3Université de Sousse, ISITCom,4011 Hammam Sousse, Tunisie
ABSTRACT

The problem of influence maximization aims at identifying the influential nodes allowing to reach the objectives of viral marketing on social networks. The previous researches concern mainly the development of a heuristic or efficient algorithms on a static social network. When a network changes, the results of various algorithms such as the detection of influential nodes must be updated. In this article, we offer a new interesting approach to resolve the problem of the influential nodes detection in evolution social networks. This approach can be considered to be an extension to our previous algorithm SND, which combines the structural and semantic aspects to identify the influential nodes in static social networks. Experimental results prove the effectiveness of SNDUPDATE in the detection of the most influential nodes which maximize the spread of influence in dynamic social networks.


LATENCY AND ENERGY OPTIMIZATION USING MAC-AWARE ROUTING FOR WSNS
Sara Hebal and Lemia Louail
LRSD laboratory, Computer Science Department, Faculty of Sciences, University Ferhat Abbas Sétif 1, Algeria
ABSTRACT

Protocols for wireless sensor networks are generally designed following the layered protocol stack in which layers are independent. Uncorrelated decisions coming from different layers may effect certain metrics such as the latency of communications and/or the energy consumption. Cross-layer approaches overcome this problem by exploiting the dependencies between the layers. In this paper, we propose LEMAR-WSN (Latency and Energy MAC-aware Routing for Wireless Sensor Networks), a new cross-layer routing approach using information of the TDMA schedule and exploiting the information of the energy consumed by each node in order to optimize the latency of communications and the energy consumption when relaying information to the sink in a wireless sensor network. Simulations show that our approach improves the average latency of communications up to 20% and the average energy consumption up to 5% compared to a similar existing approach.


WISE DISSEMINATION AFTER AN EFFICIENT COLLECTION OF DATA BY CONFIDENCE INTERVAL IN WSN BASED ON IOT
Bedr-Eddine BENAISSA and Fedoua LAHFA
Department of Computer sciences, Abou Bekr Belkaid University, Tlemcen, Algeria
ABSTRACT

The operation of a sensor network raises a lot of problems and those at several levels algorithmic, location, deployment, data collection, coverage and reduction of energy consumption, its batteries, to optimize the service life network. This last point has attracted significant attention from researchers. This article reports a new method of energy optimization of a sensor node by minimizing the transmission frequencies of measured data, to the base station. The node (mote) has several sensors measuring different environmental values, our work is to categorize the data captured in predefined classes numbered beforehand that we have named "confidence intervals", so each captured value is stored in a class and only its number is sent to the base station if and only if a change of class from the previous value is observed. The results show that the collection of data by confidence interval surprisingly reduces the energy of the sensors of the motes.

ENCRYPTION MODEL USING PYTHON FOR SMART METER DATA PRIVACY
Warsame Ali, Aniekan Eno-Ibanga, John Fuller, Penrose Cofie and Samir Abood,
Prairie View A&M University, USA
ABSTRACT

The implementation of smart grids and advanced metering infrastructure have lately been on the rise in different parts of the world for several good reasons. The smart grid is a cost-efficient, energy saving system for power generation and delivery while providing excellent power reliability and quality. As the smart grid involves data transmitted over a communication network, cybersecurity of the whole system is a serious issue. A 128-bit Advanced Encryption Scheme (AES) implemented on Smart meters resulted in encrypted energy usage data that is secure and only recoverable by its intended recipient.


ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
JACKELOU S. MAPA, College of Information Technology SAINT JOSEPH INSTITUTE OF TECHNOLOGY,
Montilla Boulevard, Butuan City, Philippines
ABSTRACT

Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. This study is about implementation of detecting malwares on android applications, which would be the basis of all future development regarding malware detection. The Main reason why the researchers came up with this study is that majority of the smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, we propose a permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android apps. In this paper, we propose a framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and to determine if the installed application is malicious or not. Our result show that, in a collection of 26 malicious application, the framework is able to correctly determine the application's behavior consistently and efficiently.


AN ONTOLOGY-BASED HIERARCHICAL BAYESIAN NETWORK CLASSIFICATION MODEL TO PREDICT THE EFFECT OF DNA REPAIRS GENES IN HUMAN AGEING PROCESS
Hasanein Alharbi1
Al-Mustaqbal University College, Iraq
ABSTRACT

Conventional Data Mining (DM) algorithms treated data simply as numbers ignoring the semantic relationships among them. Consequently, recent researches claimed that ontology is the best option to represent the domain knowledge for data mining use because of its structural format. Additionally, it is reported that ontology can facilitate different steps in the Bayesian Network (BN) construction task. To this end, this paper investigates the advantages of consolidating the Gene Ontology (GO) and the Hierarchical Bayesian Network (HBN) classifier in a flexible framework, which preserves the advantages of both, ontology and Bayesian theory. The proposed Semantically Aware Hierarchical Bayesian Network (SAHBN) is tested using data set in the biomedical domain. DNA repair genes are classified as either ageing-related or non-ageing-related based on their GO biological process terms. Furthermore, the performance of SAHBN was compared against eight conventional classification algorithms. Overall, SAHBN has outperformed existing algorithms in eight experiments out of eleven.


DESIGN OF MINIATURIZED SIW BAND PASS FILTER AT [32-36] GHZ
Rahali Bouchra1Otmani Amina1 Abdeldjelil Amina1Belkacem Hadjira11 STIC Laboratory,
University of Tlemcen, Algeria
ABSTRACT

A new inductive SIW band pass filter designed and optimized in this article. A third order Kaband SIW band pass filter centered in 33.8 GHz with 750 MHz bandwidth, is conceived, modeled and simulated. Good agreement between the simulated HFSS and simulated results by CST is observed.


LIGHT WEIGHT AUTHENTICATION FOR LOW-END AUTOMOTIVE CONTROL UNITS WITH HARDWARE BASED INDIVIDUAL KEYS
Sergei Bauer1, Martin Brunner2 and Peter Schartner3
1KAI Kompetenzzentrum für Automobil und Industrieelektronik, Villach, Austria
2Infineon Technologies AG, Munich, Germany
3Alpen-Adria Universität Klagenfurt, Austria
ABSTRACT

Security inside connected vehicles has gained substantial public attention in recent years. Closing existing security gaps of in-vehicle networks will be an enabling feature for connecting autonomously interacting systems in a more secure way. Economic requirements paired with growing ecological awareness demand well performing and low resource consuming solutions for security features in lowend devices. We introduce a novel approach for deriving a secret key using an efficient lightweight ciphering technique. The proposed method counteracts a known security issue in automotive device communication. By evaluating the method on a typical low-end automotive platform we could demonstrate the realistic applicability of the solution. Authenticated encryption could be achieved with 10% of the platform's resources in terms of program code size and RAM usage, reflecting the lightweight nature of the approach. This approach allows automotive communication systems to be enhanced by enabling authentication and confidentiality between the communicating devices, while at the same time meeting the high demands that automotive device suppliers are confronted with.


FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES
Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem,
University of Oran 1 Ahmed Ben Bella BP 1524, El M'Naouer Es Senia, 31 000 Oran, Algeria
ABSTRACT

The classification by inductive learning finds its originality in the fact that humans often use it to resolve and to handle very complex situations in their daily lives. However, the induction in humans is often approximate rather than exact. Indeed, the human brain is able to handle imprecise, vague, uncertain and incomplete information. Also, the human brain is able to learn and to operate in a context where uncertainty management is indispensable. In this paper, we propose a Boolean model of fuzzy reasoning for indexing the monitoring sub-plans, based on characteristics of the classification by inductive learning. Several competing motivations have led us to define a Boolean model for CBR knowledge base systems. Indeed, we have not only desired experiment with a new approach to indexing of cases by fuzzy decision tree, but we also wanted to improve modelling of the vague and uncertain of the natural language concepts, optimize response time and the storage complexity.


MICROSOFT DEVOPS APPLICATIONS ARCHITECTURE IN A UNIVERSITY ENVIRONMENT
J. Gutierrez and A. Sevillano
Universidad Peruana de Ciencias Aplicadas, Peru
ABSTRACT

In the following paper, applications developed under the DevOps methodology will be presented using Microsoft tools. This will allow a contribution to the academic community with different applications that will optimize the work of Virtual Companies through the online development of the different activities in which these companies are involved.


SURVEY: THE EVOLUTION OF THE USAGE OF AUGMENTED REALITY IN INDUSTRY 4.0.
Abir GALLALA, Bassem HICHRI and Peter PLAPPER
Research Unit in Engineering Sciences, University of Luxembourg, Luxembourg
ABSTRACT

The usage of Augmented Reality (AR) in industrial and modern manufacturing are more and more growing since the fourth industrial revolution. Using AR boost the digitization of the industry production lines, gain time and money and improve maintenance tasks as well as the human-machine interaction. This paper is a literature review of the use of AR in industries including the use cases in different type of application such as: design, simulation, maintenance, remote assistance, human-robot interaction and robot programming.


RANDOMIZED DYNAMIC TRICKLE TIMER ALGORITHM FOR INTERNET OF THINGS
Muneer Bani Yassein, Ansam Alnadi, Asmaa Bataineh
Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan
ABSTRACT

Routing Protocol for Low Power and Lossy Networks (RPL) is one of the most utilized routing protocols. It designed to adapt with thousands of nodes in energy-constrained networks. It is a proactive distance vector protocol which has two major components objective function and trickle algorithm. Our work focus on the trickle timer algorithm, it is used to control, maintain and follow the control messages over the network. Short listen problem is the main blot in trickle algorithm. Several studies focused on enlarging the listen period. However, as it was suffering from node starvation when the period is short, it suffers from time and energy wasting when the period is enlarged. Notice that the time and power consumption are sensitive factors in Low Power and Lossy Networks. In this paper, we propose a randomized dynamic trickle algorithm, it contributes in the improvement of trickle and solving the above-mentioned problems by controlling the t variable in a dynamic randomly way, where t is the border line between listening and transmitting period. The performance of the proposed algorithm is validated through extensive simulation experiments under different scenarios and operation conditions using Cooja 2.7 simulator. Simulation results compared with the standard trickle timer algorithm based on convergence time, packet delivery ratio (PDR) and power consumption performance metrics. The results of the simulations denote a high improvement in term of convergence time, power consumption and packet delivery ratio.


BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET
Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh, Mohammad Al-Rousan Danah Arrabi
Faculty of Computer & Information Technology Jordan University of Science and Technology Jordan-Irbid
ABSTRACT

MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly with no centralized management, with each node acts as a packet sender, packet receiver, and a router at the same time. The nature of this network means that the dynamic topology and the absence of a centralized management cause several security issues and attacks that occur in this kind of networks, such as the black hole attack, the wormhole attack and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the network normal behavior, by introducing themselves as the node with the shortest path to the destination and use this way to do malicious behavior over the network.


VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT
JunSik Kim1, SeungWook Hong 2 and Suhyun Park3
1Division of Computer Engineering, Dongseo University, Busan, Korea 2ONE Data Technology, Sasang-gu, Busan, Korea 3Division of Computer Engineering, Dongseo University, Busan, Korea
ABSTRACT

The virtual Automatic Identification System (AIS) generation management system is a system for analyzing waterway risk by generating virtual AIS data which contains location information of a specific area. The system uses the data as an input data of the IALA Waterway Risk Assessment (IWRAP).


AN ENHANCED TECHNIQUE OF SELF-CORRECTING LOCALIZATION ALGORITHM FOR VEHICULAR NODE POSITION ACCURACY IN THE DISTRIBUTED VANET
Hanan H. Al Malki1 and Abdellatif I. Moustafa 1,2
1Department of Computer Engineering College of Computers and Information Systems, Umm AL-Qura University, Makkah, Saudi Arabia 2Department of Computer Engineering College of Computers and Information Systems, Faculty of Eng., AL Azhar University, Cairo, Egypt
ABSTRACT

Applications for intelligent transportation utilize the Global Positioning Systems (GPS) signals on the Vehicular Adhoc Networks (VANETs) to improve road safety, traffic management and transportation system efficiency. However, Vehicular Nodes (VNs) using those applications may face the deterioration or complete loss of GPS signals due to many reasons such as changes in node velocity and/or positioning, dense foliage, compact high buildings and/or distance between vehicular nodes. Although several solutions have been developed to solve this issue through internal communication with surrounding vehicle nodes (i.e., beacons), the VNs remain to suffer the poor positioning accuracy or errors in localization estimation. In this paper, an Extended Self-Correcting Localization (ESCL-VNET) algorithm is developed to enhance the positioning accuracy and improve the localization estimation of a given VN over the distributed VANET. The technique integrates the use of Received Signal Strength Indication (RSSI) technique to enable the VNs to estimate their locations and the use of Signal to Interference Noise Ratio (SINR) values obtained through the Dedicated Short-Range Communications (DSRC) messaging by the other VNs to weight the localizations using the Weighted Centroid Localization (WCL) process. A simulation program was developed to conduct performance evaluation of the ESCL-VNET algorithm and to assess the given results. The simulation shows that the new ESCL-VNET algorithm can generate a more accurate position estimation or localization than in the case of the standard SCL-VNET. The ESCL-VNET algorithm may contribute to the development of better and more efficient localization applications as part of robust Intelligent Transportation System (ITS).


DATA MANAGEMENT PLATFORM SUPPORTING VOLUNTEER OCCUPATION SERVICES
Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui
LIST: Luxembourg Institute of Science and Technology, Luxembourg
ABSTRACT

This paper deals with the Data Management Services, which acts as a link between the User Requirements, the System Requirements and the development of the core IT software components supporting the occupation services performed during the Sponsor project. This gives an overview of the main services provided by the platform, the chosen architecture model including the relationships between the different conceptual models and the data models implemented within the platform. As a result, the outcomes of this deliverable will constitute an input for the development of the platform as a services-oriented platform providing and publishing a complete API for managing organizations, opportunities and volunteers.


CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS
Kiavash Satvat1, Mahshid Hosseini, and Maliheh Shirvanian2
1Department of Computer Science, University of Illinois at Chicago, Chicago, USA 2Department of Computer Science, University of Alabama at Birmingham, Alabama, USA
ABSTRACT

Single-Board Computers (SBC) refer to pocket-sized computers built on a single circuit board. A number of studies have explored the use of these highly popular devices in a variety of domains, including military, agriculture, healthcare, and more. However, no attempt was made to signify possible security risks that misuse of these devices may bring to organizations. In this study, we perform a series of experiments to validate the possibility of using SBCs as an espionage gadget. We show how an attacker can turn a Raspberry Pi device to an attacking gadget and benefit from short-term physical access to attach the gadget to the network in order to access unauthorized data or perform other malicious activities. We then provide experimental results of placing such tools in two real-world networks. Given the small size of SBCs, traditional physical security measures deployed in organizations may not be sufficient to detect and restrict the entrance of SBCs to their premises. Therefore, we reiterate possible directions for network administrators to deploy defensive mechanisms for detecting and preventing such attacks.


PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES
Alessio Coletta1, 2
1Security and Trust Unit, Bruno Kessler Foundation, Trento, Italy 2Department of Information Engineering and Computer Science, University of Trento, Italy
ABSTRACT

Cyber Physical Systems (CPS), like IoT and industrial control systems, are typically vulnerable to cyber threats due to a lack of cyber security measures and hard change management. Security monitoring is aimed at improving the situational awareness and the resilience to cyber attacks. Solutions tailored to CPS are required for greater effectiveness. This work proposes a monitoring framework that leverages the knowledge of the system to monitor in order to specify, check, and predict known critical conditions. This approach is particularly suitable to CPS, as they are designed for a precise purpose, well documented, and predictable to a good extent. The framework uses a formal logical language to specify quantitative critical conditions and an optimisation SMT-based engine that checks observable aspects from network traffic and logs. The framework computes a quantitative measure of the criticality of the current CPS system: checking how criticality changes in time enables to predict whether the system is approaching to a critical condition or reaching back a licit state. An important novelty of the approach is the capability of expressing conditions on the time of the observations and of dealing with unobservable variables. This work presents the formal framework, a prototype, a testbed, and first experimental results that validate the feasibility of the approach.


SECURE STRATEGY FOR OPTICAL IMAGE ENCRYPTION SYSTEM BASED ON AMPLITUDE MODULATION, PHASE MODULATION AND MODIFIED LOGISTIC MAP
Ahmed M. Elshamy1,Aziza I. Hussein2,3,Hesham F. A. Hamed4,M. A. Abdelghany4,and Hamdy M. Kelash5
1Department of Network and Security, College of Information Technology, Fujairah University, Fujairah, UAE 2Department of Computer & Systems Engineering, Faculty of Engineering, Minia University, Minia, Egypt 3Electrical & Computer Engineering Department, Effat University, Jeddah, KSA 4Department of Communication & Electronics, Faculty of Engineering, Minia University, Minia, Egypt 5Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
ABSTRACT

This paper presents an optical image encryption system based completely on amplitude modulation, phase modulation in the discrete Fourier transform and modified chaotic logistic map. Amplitude modulation and phase modulation are accomplished by the use of spatial light modulator (SLM). SLMs are normally used to control incident light in amplitude-best, phase-best or the mixture (amplitude-phase). The random amplitude modulation based on chaotic Baker map is carried out in time domain, while the random phase modulation is accomplished in the frequency domain. In this paper, we proposed a technique to regulate and enhance protection in chaotic logistic map method leading to increased variety of key space of the logistic map. This causes our encryption system to become extra sturdy against brute pressure. An exhaustive analysis of the proposed encryption system is undergone and shows positive results in encryption metrics when compared to several different photo encryption techniques. The analysis demonstrates the highly valued security and immunity to noise of the photograph encryption. The proposed modified logistic map with amplitude and phase modulation is suitable for real-time application.


RESEARCH ON NETWORK ANOMALY DETECTION METHOD BASED ON IMPROVED MSPCA
Zhenru Pan1 and Huaibin Wang 2
1&2Department of Computer Science and Engineering, Tianjin University of Technology, China
ABSTRACT

Network anomaly detection, as an important means of network supervision, is of great significance for ensuring the reliable operation of the network.This paper proposes a network anomaly detectionalgorithm based on improved MSPCA.The main idea is to control the scale of the PCA filter by introducing the energy contribution efficiency ECE,and then filtering wavelet coefficient matrix with Bayesian PCA.The algorithm overcomes the shortcomings of the traditional MSPCA algorithm, such as high time complexity and difficulty in parameter selection.It is possible to more effectively separate abnormal data in the network.The experimental results show that compared with other detection algorithms, the improved MSPCA detection algorithm has achieved good detection results.


SECURITY PROTOCOL FOR POLLUTION ATTACK USING NETWORK CODING
Kiattikul Sooksomsatarn
Department of Computer Science, School of Information and Communication Technology, University of Phayao, Maeka, Muang, Phayao 56000, Thailand
ABSTRACT

Network coding is a technique for maximizing the use of available bandwidth capacity. We are interested in applying network coding to multimedia content distribution. This is desirable because many popular network applications for content distribution consume high bandwidth and international bandwidth; both are scarce in countries such as New Zealand. Existing work has addressed the use of network coding for content distribution, however work on network coding and security does not consider the trade-off between quality of service and security for multimedia. Network coding is vulnerable to a pollution attack or a packet modification attack. It has detrimental effect particularly on network coding because of specific characteristic of network coding that allows nodes to modify received packets at any time. Many pollution attack defence mechanisms use computationally expensive techniques leading to higher communication cost. Therefore, the focus of this work is on developing protocols to address both open problems and validate the protocols using a combination of formal and simulation techniques. More importantly, our novel contribution is reduction of complexity of algorithms appropriate for streaming content distribution with network coding.


AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT
SungWon Ahn, Minho Park, Soongsil University, Korea
ABSTRACT

When low-interaction honeynet systemsare not powerful enough and high-interaction honeynet systems require a lot of resources, hybrid solutions offer the benefits of both worlds. Affected by this trend, more and more hybrid honeynet systems have been proposed to obtain wide coverage of attack traffic and high behavioral fidelity in recent years. However, these system themselves contain some limitations such as the high latency, the lack of prevention method for compromised honeypots, the waste of resources and the fingerprinting problem of honeypot that hinder them to achieve their goals. To address these limitations, we propose a new honeynet architecture called Efficient ElasticHybrid Honeynet. Utilizing the advantages of combining SDN and NFV technologies, this system can reduce the response time for attack traffic, isolate compromised honeypots effectively, defeat the fingerprinting problem of honeypots, and optimize the resources for maintenance and deployment. Testing our system with real attack traffic, the results have showed that Efficient Elastic-Hybrid Honeynet system is not only practical, but also very efficient.


ARTIFICIAL IMMUNE SYSTEMS BASED MECHANISM FOR THWARTING NETWORK PORT SCANNING TRAFFIC <
Nuha Almasalmeh1, Firas Saidi2, Zouheir Trabelsi3, 1&3United Arab Emirates University, UAE, 2University of Manouba, Tunisia,
ABSTRACT

Network coding is a technique for maximizing the use of available bandwidth capacity. We are interested in applying network coding to multimedia content distribution. This is desirable because many popular network applications for content distribution consume high bandwidth and international bandwidth; both are scarce in countries such as New Zealand. Existing work has addressed the use of network coding for content distribution, however work on network coding and security does not consider the trade-off between quality of service and security for multimedia. Network coding is vulnerable to a pollution attack or a packet modification attack. It has detrimental effect particularly on network coding because of specific characteristic of network coding that allows nodes to modify received packets at any time. Many pollution attack defence mechanisms use computationally expensive techniques leading to higher communication cost. Therefore, the focus of this work is on developing protocols to address both open problems and validate the protocols using a combination of formal and simulation techniques. More importantly, our novel contribution is reduction of complexity of algorithms appropriate for streaming content distribution with network coding.


PAPR AND SPECTRUM ANALYSIS OF 4G AND 5G TECHNIQUES
Roopdeep kaur and Dr. Ashutosh Kumar Singh, Thapar University, India
ABSTRACT

GFDM is a method of wireless communication that produces ISI/ICI which will influence the performance of Symbol Error Rate when contrasted with an Orthogonal Frequency Division Multiplexing. In GFDM a single cyclic prefix (CP) is embedded for the whole block, but in case of OFDM cyclic prefix embedded for each transmitted symbol. It will boost the system spectral efficiency. Additionally, in Wavelet based GFDM, there is no need of cyclic prefix, that will further boost up the efficiency of spectrum. GFDM is better technique because it has low PAPR, which helps in low power consumption. Power spectral density (PSD) of GFDM is less this shows GFDM provides lesser leakage of energy on the side lobes which helps in reduction of OOB radiation. Wavelet based GFDM is good method for the needs of future wireless communication. Meyer wavelet has overall better spectral efficiency and low PAPR as compared to other techniques.

Invited Talk

Dhinaharan Nagamalai
Wireill, Australia

Brajesh Kumar K
IIT-Roorkee, India




Venue

Visa Information

Citizens of the following countries can obtain a visa on arrival: Australia, Andorra, Austria, Belgium, Brunei, Denmark, Finland, France, Germany, Greece, Holland (Netherlands), Hong Kong, Iceland, Ireland, Italy, Japan, Liechtenstein, Luxembourg, Malaysia, Monaco, New Zealand, Norway, Paraguay, Portugal, San Marino, Singapore, South Korea, Spain, Sweden, Switzerland, United Kingdom, United States of America and Vatican City.

Citizens of other countries will require a visa to enter the United Arab Emirates. If you are flying to the UAE using Emirates Airlines or Air Arabia, the airline can get you the necessary visa if you make the request in advance. Please check with the airlines directly.

The Conference can apply for a visa on your behalf. For more details email conference secretary

More information :
Venue
Crowne Plaza Dubai.
Mailing Address

Crowne Plaza Dubai, Sheikh Zayed Road, P.O. Box 23215, Dubai, United Arab Emirates

tel: +971 4 33 11 11 1
Fax: +971 4 33 14
Email: conventionteam.cpdubai@ihg.com
Directions

From :Dubai International Airport - Al Twar - Dubai - United Arab Emirates
to : Crowne Plaza Dubai ,Sheikh Zayed Al Nahyan Road P.O. 23215, Dubai , United Arab Emirates


View Larger Map




Speakers


Jackelou S. Mapa,
Information Technology Program Head, Philippines.

Hasanein Alharbi,
Al-Mustaqbal University College - Babylon, Iraq

Baghdad Atmani,
University of Oran 1 Ahmed Ben Bella, Algeria

JunSik Kim,
Dongseo University, Republic of Korea

Kiavash Satvat,
University of Illinois at Chicago, USA

Alessio Coletta,
University of Trento, Italy

Ahmed M. ELShamy,
Fujairah University, UAE

Minho Park
Soongsil University, Korea

Israel Goytom,
MSE Faculty of Science, China

Kennedy Chengeta,
University of KwaZulu Natal, South Africa

Mabrouka Gmiden
National Engineers School of Sfax-Tunisia