CICSyN2011

 

Third International conference on

 

Computational Intelligence, Communication Systems and Networks

Bali, Indonesia, 26 – 28 July 2011

(Click here to view CICSyN2010 CICSyN2009 Proceedings in IEEE Digital Library)

 

 

 

Important Dates

Call for Papers

Paper Submission

IEEE Paper Templates

Registration

Venue/Rooms

Accommodation

Flights & Travel

Social Events

 

 

 

 

Keynote and Tutorial Speakers: keynote-1, tutorial, keynote-2

 

 

Important Dates

Submission of

Full/Short/Poster/WIP papers: see above

 

Notification

From: 10 May 2011

 

Camera-ready

to CPS server &

copyright form:

15 June 2011

 

 

Registration

(Payment) due from:

17 June 2011

Credit Card on EDAS

 

Conference Chairs

Suwarno, ITB

Jasmy Yunus, UTM

 

Programme Chairs

Ismail Saad, UMS

Zuwairie Ibrahim, UTM

 

Local Arrangements/

Venue Chairs

 

Ida Ayu Dwi Giriantari,

Udayana University

 

Advisory and Honorary Chairs

 

Prof Marzuki Khalid, UTM

Prof Rrosni Abdullah, USM

Prof Paulus Rihardjo, UNPAR

Prof Rosalam Sarbatly, UMS

 

General Chair:

David Al-Dabass

 

General Co-Chair:

Ajith Abraham

 

 

EUROSIM

Liaison Chair:

Richard Zobel

 

 

CD Label

Copyright page (ISBN etc)

Table of Content

Scheduled papers: check your paper

Keynote & tutorials

 

Paper submission NEW EXTENDED FINAL Deadline: 15 June 2011

Use template below to format your paper:

 

Word template (MS Word .doc format)

PDF template (PDF format)

Latex template (Latex format)

 

Then submit it through EDAS: http://edas.info

Paper Registration:  DEADLINE 17 June 2011

Payment

__________________________________________________________________

CD Label (ISBN etc)

Scheduled Papers

 

Conference Venue: Bali Rani Hotel, Jl Kartika Plaza, Kuta, www.baliranihotel.com,

 

Other hotels/travel

___________________________________________________

 

 

Papers are invited on any aspect of Computational Intelligence, Communication Systems and Networks. Papers presenting work validated by experimentation, simulation or analysis are solicited. Papers with application and experimental focus from both industry and academy, duly documenting lessons learnt from test-beds, field trials or real deployments are particularly welcome. Manuscripts must be submitted electronically through the EDAS system. The conference will be held in Bali, Indonesia.

 

Topics of interest include, but are not limited to:

 

Tracks/Themes

 

Intelligent Systems

Hybrid Intelligent Systems & Hybrid Soft Computing

Sensor Nodes, Circuits, Devices, Wireless Sensor Networks
RFIDs and their applications
Protocols and Standards
Modelling and Performance
Software Platforms and  Middleware
Tools and Techniques for Design, Deployment, Testing and Evaluation
Security, Authentication, Wireless Security, Dependability
Discrete Event and Real Time Systems

Image, Speech and Signal Processing

Transport, Logistics, Harbour, Shipping and Marine

Virtual Reality, Visualization and Computer Games

Parallel and Distributed Architectures and Systems

Internet Modelling, Semantic Web and Ontologies

Mobile ad hoc Networks

Vehicular Technology and Networks

Air Interfaces

QoS for Voice and Video in Wireless Networks
 

Applications: aerospace; remote sensing; wireless communication, intelligence and simulation, electronic circuits and systems; communication and networks; management; games, war/conflict/rebellion modelling, cognitive functions, semantics modelling/ dynamics; manufacturing; robotics; measurement; monitoring; safety critica1 systems; military. 

Exhibitors: manufacturers of software and hardware, publishers, etc., are invited to apply to exhibit their products.

 

 

Submission Guidelines

You are invited to submit:
- full paper of 6 pages (Letter format) for oral presentation,

- proposal to organize a technical session and/or workshop.

Submissions must be original, unpublished work containing new and interesting results that demonstrate current research in all areas of computational intelligence, computer systems and networks, focusing on modelling, simulation and applications in science, technology, business and commerce. Proceedings will be published by IEEE Conference Publishing Service (CPS). The conference is jointly organised by UK Simulation Society and Asia Modelling and Simulation Society and supported/co-sponsored by

 

-          EUROSIM

-          European Council for Modelling & Simulation

-          IEEE UK & RI Section

-          IEEE Indonesia Section

-          Society for Computer Simulation Int. (SCS)

 

Submission implies the willingness of at least one of the authors to register and present the paper. All papers are to be submitted electronically,- see full instructions under Paper Submission below, in PDF or Word format. All papers will be peer reviewed by at least three independent referees of the international program committee.

 

Paper Submission: CICSyN2011 is using EDAS for submission and registration, authors need to:

- create an account with EDAS by clicking on the link below

- open the list of conferences managed by EDAS & find CICSyN2011

- click on Submit button on the right to enter your paper title & abstract

- upload file.

 

Click here to submit paper

 

IEEE Author Kit will be emailed to authors individually upon acceptance of their papers.

 

Paper Templates:

Word template (MS Word .doc format)

PDF template (PDF format)

Latex template (Latex format)

 

Authors of the best papers will be invited to revise and extend their work for publication in a special issue of the International Journal of Simulation: Systems, Science and Technology.

Conference website: http://cicsyn2011.info

 

TPC

Prof. Ing. Heinz Frank, Reinhold-Wuerth-University Künzelsau, Germany

Prof. P.K. Meher, NTU, Singapore

Dr Athanasios Pantelous, UK

Dr. Harkirat Singh, Samsung, USA

Dr. Maman Abdurohman,Institut Teknologi Telkom,Bandung - Indonesia

Prof. Vijay Bhargava, University of British Columbia, Vancouver, Canada

Prof. Hai JiangArkansas State University, USA

Dr. Theodoros G. Kostis, Greece

Dr. Varun Jeoti, Petronas, Malaysia

Dr. Joanne Scillitoe, Michigan Tech Univ, USA

Prof Shubha Kher, USA

Prof Helen Karatza, Greece

Prof Anna Lekova, Bulgaria

Prof. Sudarshan Tiwari, MNNIT, Allahabad

Dr. Shekhar Verma, IIIT, Allahabad

Dr. Shrishu Verma, IIIT, Allahabad

Prof. Harnath Kar, MNNIT, Allahabad

Prof. A.G. Keshkar, VNIT, Nagpur, India

Prof. P.K. Singhal, MITS, Gwalior India

Prof. S.S. Bhadoria, MITS, Gwalior, India

Ms. Pallavi Shukla, VITM, Indore, India

Mr.  Manish Dixit, MITS, Gwalior, India

Prof. A.K. Saxena, Libya

Dr Zuzka Oplatkova, Czech Republic

Dr. Aditya Trivedi, IIITM, Gwalior, India

Prof. B.K. Mohanty, JIET, Guna, India

Mr. R.S. Tomar, IITM, Gwalior, India

Mr. B.K. Chaurasia, IIIT, Allahabad, india

Dr. Shirsu Verma, IIIT, Allahabad, India

Mr. Arvind Jain, RJIT, Gwalior, India

Mr. Prashant Purohit, RJIT, India

Mr. P. Ganeshan, British Telecom, Malaysia

Dr. S.S. Bedi, Barielly, India

Dr. Lei Shu, Japan

Dr. K. Madduletty, NITIE, Mumbai, India

Dr. Atul Negi, Hyderabad, India

Dr. S.K. Shukla, India

Prof. Suresh Kumar, Tumkur, India

Dr. C.V. Tripathi, India

Dr. Azrin Aris, Malaysia

Dr. Jongman Cho, Korea

Dr. Shwkat Ali, Australia

Mr. Valliappan Raman, USM, Malaysia

Mr. Rajit Ram, VITM, India 

Prof Eduard Babulak, Canada

Prof. Rakesh Saxena
Prof MPS Chawla
Prof. RS Tare
Prof. PK Sen

 

International Reviewers

Abu Khari A'ain

Ghulam Abbas

Mohsen Askari

Athanasios Pantelous

Mohd Zaidi Abd Rozan

Normaziah Abdul Aziz

Izhal Abdul Halin

Theodoros G. Kostis

Ruzairi Abdul Rahim

Irfan Syamsuddin

Rosni Abdulla

Shahrum Shah Abdullah

Dayang Norhayati Abg Jawawi

Shukri Abidin

Hassan Abolhassani

Athanasios Goudosis

Ajith Abraham

Kamalrulnizam Abu Bakar

Gregorio Romero

Luisa Martinez

Rohani Abu Bakar

Carlota Tovar

Ford Lumban Gaol

Wan Hussain bin Wan Ishak

Syed Abd Rahman Abu Bakar

Johari Adnan

Mohamad Noh Ahmad

Mohammad Nazir Ahmad

Waqas Ahmad

Shakeel Ahmad

Waqas Ahmed

Khalid Al-Begain

David Al-Dabass

Dhiya Al-Jumeily

Rafe' Alasem

Mikulas Alexik

Marco Remondino

Belal Alhaija

Tony Allen

Ferda Alpaslan

Ismail Amin

Shamsudin Amin

Konar Amit

Marcelo Ang, Jr

Obinna Anya

Ishak Aris

Vijay Arora

Irfan Awan

Eduard Babulak

Kambiz Badie

Youakim Badr

Gurvinder-Singh Baicher

Preeti Bajaj

Frank Ball

Abhijit Bapat

Narendra Bawane

Arijit Bhattacharya

Fabian Boettinger

Mohammad Razaa Borujerdi           

Vesna Bosilj-Vuksic

Felix Breitenecker

Adam Brentnall

John Brinkman

Agostino Bruzzone

Bustanur Busta

Hueseyin Cakmak

Piers Campbell

Richard Cant

Andre Carvalho

Sanjay Chaudhary

Russell Cheng

Monica Chis

Sung-Bae Cho

Chin Soon Chong

Monica Chris

Robert Colomb

Emilio Corchado

Roy Crosbie

Amol Deshmukh

R Deshmukh

Jafri Din

Jiri Dvorsky

Andrzej Dzielinski

Chionh Eng Wee

Mazlina Esa

Tony Fleet

Thomas Freytag

Vikram Gadre

Boon Ping Gan

G Ganesan

Viranjay M. Srivastava

Fengge Gao

Xiao-Zhi Gao

Xiaohong Gao

Yannis Goulermas

Crina Grosan

Jafar Habibi

Abdul Razak Hamdan

Habibollah Haron

Faiezah Haron

Fazilah Haron

Manaf Hashim

Uda Hashim

Aboul Ella Hassanien

George Herterich

Seth Hetu

Vlatka Hlupic

Sadiq Hussain    

Abir Hussain

Min-Shiang Hwang

Zuwairie Ibrahim

Hanif Ibrahim

Ismail Ibrahim

Subariah Ibrahim

Mohd. Yazid Idris

Mojca Indihar Štemberger

Rolly Intan

Hisao Ishibuchi

Razali Ismail

Nauman Israr

Norafida Ithnin

Teruaki Ito

Lakhmi Jain

Sudhanshu Jamuar

Safeeullah Soomro

Janos-Sebestyen Janosy

Gerrit Janssens

Don Jeng

Emilio Jiménez Macías

Rao Jinnah

Er Joo

Kasmiran Jumari

Esko Juuso

Lilia Kakaradova

Nikolaos Karadimas

Helen Karatza

S. D. Katebi

SHET KC

Arpad Keleman

Avinash Keskar

Marzuki Khalid

Noor Khafifah Khalid

Mohamed Khalil-Hani

Hisham Khamis

M Kharat

Shubha Kher

Dong-hwa Kim

Mario Koeppen

Petia Koprinkova

Anna Lekova

Michal Kratky

Vijay Kukreja

Rajeev Kumar

Tri Basuki Kurniawan

Alhad Kuwadekar

Rik Van Landeghem

Caroline Langensiepen

 

 

Registration (all figures in US$ Currency converter)

Author/

Participant

Student Paper

Student Participant

Registration BEFORE deadline of 17 June 2011

$595

$545

$220

Registration AFTER deadline of 17 June 2011

$640

$590

$250

 

 

 

 

 

 

 

 

A minimum of one registration fee is payable for each paper accepted.

When the final version of the paper is uploaded one of the authors should be nominated to attend the conference and present the paper. If this is not done then the organising committee will assume that the first author is the nominated author. The status of the nominated author will determine the registration fee that is payable for that paper. If additional authors wish to attend (and they are not the nominated author for another paper) then an additional registration fee is payable for each such author.

Attendees must pay the registration fee appropriate to their own status.

 

Scheduled Papers for Presentation: 42 (+X1) + 2 Keynotes + 2 Tutorials, 6 July 2011- Final

      

CICSyN2011 Conference Schedule at a Glance

Day-0: Monday 25 July 2011

5pm: Desk opens for early Registration, Bali Rani Hotel

6pm: Welcome get-together, Bali Rani Hotel

 Session Code:  Tue.pm1

 

Day: Tue, Wed, Thu    Time: am1, am2, pm1, pm2   

Paper Code: see following pages for a full list:         

       Track: A, B, C . .                  B3                   paper number within track

 

Time

Day-1: Tuesday 26 July 2011  (Keynote speaker-1 + Tutorial-1 + 18 papers)

9 – 11

(Chair: Al-Dabass) Opening Session. Keynote speaker-1: Prof Frank Wang, Tutorial-1: Prof Durgesh Mishra

11 –11.20

Refreshments

11.20 – 12.40, 4

Tue.am2 (chair: Kumara): A3, A4, A8, A10

12.40-1.40

Lunch

1.40- 3.40, 7

Tue.pm1 (chair: Giriantari): A11, B1, B2, B3, B4, C3, V1

3.40 -4

Refreshments

4 – 6.20, 7

Tue.pm2 (chair: Kumara): E1, F4, F5, F7, G1, G2, X1

 

 

 

 

 

Day-2: Wednesday 27 July 2011 (Keynote Speaker-2 + Tutorial-2 + 16 papers)

9 – 11

(Chair: Al-Dabass) Keynote Speaker-2: Prof  Eduard Babulak, Tutorial-2:  Prof Geetam Tomar

11 –11.20

Refreshments

11.20 – 12.40, 4

Wed.am2 (chair: Kumara):  H2,  I1, I3, I4

12.40-1.40

Lunch

1.40- 3.40, 6

Wed.pm1 (chair: Giriantari): K2, K4, K5, K7, K9, K10

3.40 -4

Refreshments

4 - 6, 6

Wed.pm2 (chair: Kumara): N1, N3, N5, N6, L1, O3

7 - 9

Dinner & Culture show in Bali Rani Hotel

 

Day-3: Thursday 28 July 2011  (9 papers)

9 – 10.40, 5

Thu.am1 (chair: Giriantari):  U1, U2, U3, U4, U5

10.40 - 11

Refreshments

11 – 12.20, 4

Thu.am2 (chair: Al-Dabass): Q1, Q2, Q4, D2

12.20

Closing of Conference and Photo Opportunity

12.40

Lunch and Depart

 

X1: Extra paper from AMS2011, #1569435757: Visualizing Work Progress Information of Construction Project by Web and VR Application, Kang

 

Seq

EDAS ID

Track: 01-A Intelligent Systems, 5 (11)

First author

Presenter

1

1569459387

Study of the Eye-tracking Methods Based on Video

Jihong Liu

 

2

1569459557

An Experimental Evaluation of Ensemble Methods for Pattern Classification

Kashif Khan

 

3

1569462573

Viral Systems Application for Knapsack Problem

Dedy Suryadi

Suryadi

4

1569462637

An Application of Artificial Intelligent Optimization Techniques to Dynamic Unit Commitment for the Western Area of Saudi Arabia

Abdulaziz Al-Shareef

Al-Shareef

5

1569462829

Face Recognition Method Based on Adaptively Weighted Block-Two Dimensional Principal Component Analysis

Lihong Zhao

 

6

1569462847

Searching Candidate Lyapunov Function with Threshold Accepting Algorithm

Faiçal Hamidi

 

7

1569462985

Modelling and Analysis of an Efficient Traffic Network Using Ant Colony Optimization Algorithm

Shahrizul Anuar Abu Nahar

 

8

1569463795

Towards an Online Diabetes Type II Self Management System: Ontology Framework

Almabrok Saleh Ahmed

Saleh Ahmed

9

1569465183

Applying Sequence Alignment in Tracking Evolving Clusters of Web Sessions Data: An Artificial Immune Network Approach

Mozhgan Azimpour-Kivi

 

10

1569465801

Enhancing the Effectiveness of Usability Evaluation by Automated Heuristic Evaluation System Usability Management System

Ashok Sivaji

Soo

11

1569472295

Multiple Vehicles' License Plate Tracking and Recognition Via Isotropic Dilation

Farrah Wong

Angeline

 

 

Seq

EDAS ID

Track: 02-B Hybrid Intelligent Systems & Hybrid Soft Computing, 4 (4)

First author

Presenter

1

1569459193

Using Kohonen Maps and Singular Value Decomposition for Plagiarism Detection

Asim Mohammed El Tahir Ali

Ali

2

1569470779

Vision Based Tracking of Multiple Dynamic Obstacles for Autonomous Robot Navigation

Prabhakar Mishra

Mall

3

1569472293

Maximum Power Point Tracking for PV Array Under Partially Shaded Conditions

Chia Seet Chin

Chin

4

1569472657

Adaptive Fuzzy Cognitive Maps for Identification of Cause and Effect Relationships of Strategy Map

Javad Jafarali Jassbi

Jassbi

 


 

Seq

EDAS ID

Track: 03-C Sensor Nodes, Circuits, Devices, Wireless Sensor Networks, 1 (4)

First author

Presenter

1

1569458933

Cooperative Distributed MISO Wireless Relay Networks Under Jamming Environments with Power Constraints

Kanghee Lee

 

2

1569459881

Noncooperative Distributed MMSE Schemes for AF SIMO Wireless Relay Networks

Kanghee Lee

 

3

1569462125

A New Routing Algorithm for Reduction Consumed Energy in Wireless Sensor Networks

Mahia Samani

Samani

4

1569473623

Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLAB

Nitika Doohan

 

 

Seq

EDAS ID

Track: 04-D RFIDs and their Applications, 1 (2)

First author

Presenter

1

1569461777

Radio Frequency Identification (RFID) Based Toll Collection System

Atif Ali Khan

 

2

1569473101

The Design of a Stride Query Tree Algorithm for RFID Systems

T-f Shih

Teng

 

 

EDAS ID

Track: 05-E Protocols and Standards, 1 (1)

First author

Presenter

1

1569465113

Toward Benchmarks for Evaluation of Forwarding Strategies in Metro Ethernet Networks

Farhad Faghani

Faghani

 

Seq

EDAS ID

Track: 06-F Modelling and Performance, 3 (7)

First author

Presenter

1

1569454767

Traffic Modeling of LTE Mobile Broadband Network Based on NS-2 Simulator

Ghassan A. Abed

 

2

1569462429

Performance of Heterogeneous Parallel Computer System with Distributed Memory Using Analytic and Simulation Techniques

Osondu Everestus Oguike

 

3

1569463049

Simulation of a Manufacturing Assembly Line Based on WITNESS

SeyedAli Mirzapourrezaei

 

4

1569467665

A High Efficiency Two-dimensional Index Queue Timer Management Algorithm for Network and Communication Systems

Heng Zhang

Zhang

5

1569470153

Applications of Graph Theory in Computer Science

Feroz Riaz

Riaz

6

1569473437

A MIMO Time-Varying System Control

Chafik Maghzaoui

 

7

1569473453

Modeling of Chemical Plant's Rectifying Towers Using Artificial Neural Networks

Jong-Hwa Kim

Choi

 


 


Seq

EDAS ID

Track: 07-G Software Platforms and Middleware, 2 (2)

First author

Presenter

1

1569462911

A Remote Control Service for Osgi-based Unmanned Vehicle Using Smartphone in Ubiquitous Environment

ByungHyug Lee

Lee

2

1569470899

EasyA: Easy and Effective Way to Generate Pairwise Test Data

Khandakar Fazley Rabbi

Khatun

 

Seq

EDAS ID

Track: 08-H Tools and Techniques for Design, Deployment, Testing and Evaluation, 1 (2)

First author

Presenter

1

1569461805

Criteria for Selection of Right Accounting Software

Manivannan Senthil velmurugan

 

2

1569471969

OFEM: An Optimum Finite Element Algorithm for Heat Transfer Problem in Two-dimensional Insulated-tip Rectangular Fin

Md. Moslemuddin Fakir Fakir

Fakir

 

Seq

EDAS ID

Track: 09-I Security, Authentication, Wireless Security, Dependability, 3 (5)

First author

Presenter

1

1569459241

Identifying Scanning Activities in Honeynet Data Using Data Mining

Mohammed H. Sqalli

Arshad

2

1569462751

A Pairwise Key Pre-Distribution Scheme Based on Prior Deployment Knowledge

Mohamed Mohamed

 

3

1569463083

A Comparative Study of Authentication Methods for Wi-Fi Networks

Khidir Mohamed Ali

Ali

4

1569464275

The Impact of Information Technology Threat on IT Appropriation and IT Avoidance

Hee Ock Rho

Rho

5

1569469677

Detection of SSDF Attack Using SVDD Algorithm in Cognitive Radio Networks

Mohsen Abbasi-Jannatabad

 

 

Seq

EDAS ID

Track: 10-J Discrete Event and Real Time Systems, 0 (1)

First author

Presenter

1

1569459175

Social and Political Impacts of Real Time ICT Systems and Networks; a Case Study of Poland

Jozef B. Lewoc

 

 


 

Seq

EDAS ID

Track: 11-K Image, Speech and Signal Processing, 6 (11)

First author

Presenter

1

1569460151

A Vision Substitution Method for the Blind Based on Image Edge Detection and Sound Mapping

Yanan Tian

 

2

1569461589

Skin Color Segmentation by Texture Feature Extraction and K-mean Clustering

Chi-Man Pun

Pun

3

1569462609

Face Detection Based on Fuzzy Granulation and Skin Color Segmentation

Mehrdad Shemshaki

 

4

1569462881

Robust Blind Digital Image Watermarking Using DWT and Dual Encryption Technique

Gursharanjeet Singh Kalra

Kalra

5

1569462935

A Comparative Analysis of Segmentation Algorithms for Hand Gesture Recognition

Rohit Gupta

Gupta

6

1569465603

VHDL Modelling of Fixed-point DWT for the Purpose of EMG Signal Denoising, NEW

Md. Rezwanul Ahsan

 

7

1569468913

Digital Watermarking Based on Patchwork and Radial Basis Neural Network

Jing-Jing Jiang

Pun

8

1569471201

Recognition of a Subset of Most Common Persian Words Using Zernike Moments and Back-Propagation Neural Network

Sharareh Shakoori Moghadam Monfared

 

9

1569472299

Adaptive Tracking of Overlapping Vehicles Via Markov Chain Monte Carlo with CUSUM Path Plot Algorithm

Wei Yeang Kow

Kow

10

1569472301

Enhancement of Particle Filter Approach for Vehicle Tracking Via Adaptive Resampling Algorithm

Wei Leong Khong

Khong

11

1569473077

Combined Feature Extraction on Medical X-ray Images

Mohammad Reza Zare

 

 

 

Seq

EDAS ID

Track: 12-L Transport, Logistics, Harbour, Shipping and Marine, 1 (1)

First author

Presenter

1

1569472297

Exploring Q-Learning Optimization in Traffic Signal Timing Plan Management

Yit Kwong Chin

Chin

 


 

Seq

EDAS ID

Track: 14-N Parallel and Distributed Architectures and Systems, 4 (7)

First author

Presenter

1

1569462773

An Enhanced Parallel & Distributed Implementation of the Harmony Search Based Supervised Training of Artificial Neural Networks

Ali R. Kattan

Kattan

2

1569462863

Distributed Community Detection in Complex Networks

Zahra Masdarolomoor

 

3

1569469553

An Adaptive Task Allocation Approach for MapReduce in a Heterogeneous Cloud

Wei-Tsung Su

Pan

4

1569470607

Architectures for FPGA-Based Implementation of Motion Estimation of Dynamic Obstacles for Autonomous Robot Navigation

Prabhakar Mishra

 

5

1569470719

Utilizing Bee Colony to Solve Task Scheduling Problem in Distributed Systems

Mostafa Haghi Kashani

Kashani

6

1569472083

A Network Virtualization Approach in Many-core Processor Based Cloud Computing Environment

Zhitao Wan

Wan

7

1569473233

Integration of Grid and Cloud with Semantics Based Integrator

Kailash Selvaraj

 

 

Seq

EDAS ID

Track: 15-O Internet Modelling, Semantic Web and Ontologies, 1 (3)

First author

Presenter

1

1569459385

Application of Internet of Things in the Community Security Management

Jihong Liu

 

2

1569467225

Managing Ict Resources in E-Learning Environment: Challenges, Issues and a Proposed Model

Ahmed Basha

 

3

1569470675

Electronic Data Interchange: A Review

Kavita Yogen

Choudhary

 

Seq

EDAS ID

Track: 17-Q Vehicular Technology and Networks, 3 (5)

First author

Presenter

1

1569460941

Assessment of Throughput Performance Under OPNET Modeler Simulation Tools in Mobile Ad Hoc Networks (MANETs

Mostafa Fazeli

Fazeli

2

1569462921

A Survey of Intelligent Transportation Systems

Sheng Hai An

An

3

1569464517

The Security of Vehicular Adhoc Networks

Farzad Sabahi

 

4

1569466681

Resource Allocation Policy of Primary Users in Proactively-Optimization Cognitive Radio Networks

Pengbo Si

Si

5

1569473417

HP- EMAA: High Performance Ethernet Traffic Monitoring and Analysis System in the Automotive Field

Hela Lajmi

 

 


 

Seq

EDAS ID

Track: 21-U Bio-informatics and Bio-Medical Simulation, 5 (5)

First author

Presenter

1

1569462317

Graphical User Interface (GUI) for Thumbprint Image Enhancement and Minutiae Extraction

Naim Nani Fadzlina

 Nani Fadzlina

2

1569463067

TechnologyTransfer to Industry of Biotechnology on Rhizopus sp Inoculum

Ign Suharto

Suharto

3

1569463663

Intelligent System for Assessing Human Stress Using EEG Signals and Psychoanalysis Tests

Norizam Bin Sulaiman

Sulaiman

4

1569465659

Comparison Between the Left and the Right Brainwaves for Delta and Theta Frequency Band After Horizontal Rotation Intervention

Zunairah Hj Murat

Hj Murat

5

1569470619

Development of Brainwave Balancing Index Using EEG

Zunairah Hj Murat

Hj Murat

 

Seq

EDAS ID

Track: 22-V Circuits, Sensors and Devices, 1 (1)

First author

Presenter

1

1569465839

A Non-invasive Method to Measure the Sweetness of Malaysian Papaya Quantitatively Using NIR Full-transmittance Technique- a Preliminary Study

Azra Afhzan Ab Rahim

Ab Rahim

 

 

Keynote Speaker-1

 

Towards 2020 Computing

 

Professor Frank Zhigang Wang, SMIEEE, FBCS

   

Chairman, IEEE Computer Society, UK & Republic of Ireland Chapter

Head, School of Computing, University of Kent

Canterbury, CT2 7NFUK, United Kingdom

Email: f.z.wang@kent.ac.uk

 

 

Prof Wang and his Future Computing Group at Kent conduct research on Cloud/Grid Computing, Green Computing (via memristor), Biologically-inspired Computing, Quantum Computing/Communication, Data Storage & Data Communication, and Data Storage and Data Warehousing, etc. The Future Computing Research aims to pursuing ground-breaking, high-risk but potentially high gain research that opens up new directions in ICT.

 

The Group has developed a Cloud/Grid Computing platform, which supports universally network applications with a speedup of 2-25. Its associated protocol is the first of its kind worldwide. Best of all, this platform requires no changes in the way users work with their applications since it conforms the existing IT infrastructures. During his presentation, he is going to show a demo of using this platform to accelerate applications, ranging from IBM DB2, MySQL, Office, Firefox Web Browser, Google Earth to Media Player (Table 1). This work has won an ACM/IEEE Super Computing Award.

 

Table 1 The developed Cloud Computing platform accelerates the access to the remote data for different distributed applications [1].

 

Applications

Performance over NFS/pNFS(PVFS)/AFS//HTTP/FTP

Performance over GOS (#tcp)

Speedup (max)

vi/Emacs

1243 s (nfs)

123 s (#tcp = 32)

10.1

Opening a 16MB document remotely over EuroAsiaGrid (rtt=20-500ms) with a 4Mbps link to the Internet

OpenOffice Writer/Calc/ Impress

180 s (nfs)

28 s (#tcp = 32)

6.4

Saving a 16 MB modified document remotely over EuroAsiaGrid with a 2 x 100Mbps link to the Internet

MySQL/
IBM DB2

23971 s (nfs)

4087 s (#tcp=64)

5.9

Backing up a 652 MB genome database via mysqldump over EuroAsiaGrid

Firefox

175 s (ftp)

31 s (#tcp=64)

5.6

Downloading a 16 MB hyperlinked object from a remote Website on EuroAsiaGrid, UK e-Science Grid, etc

MPlayer

15.3 frames/s (http)

26.9 frames/s

1.8

Playing a 36.4 MB Bondgirls video clip online from a remote Website on EuroAsiaGrid, UK e-Science Grid, etc

Google Earth

400 s (http)

52 s (#tcp=64)

7.7

Loading a 41.8 MB map into a layer of the Google Earth browser on EuroAsiaGrid, UK e-Science Grid, etc

Distributed Data Mining (DDM)

411 s (DDM over NFSv4)

175 s (DDM over GOS, #tcp = 64)

2.4

A Drosophila Melanogaster Genome database of 652MB (122 tables) over DiscoveryNet/GOS was used. This size was found to be large enough to average out the network fluctuations. Network latency = 40ms.

 

 

Prof Wang’s group has recently engaged in another research on memristor. Memristor theory was formulated by Leon Chua in 1971. Chua strongly believed that a fourth element existed to provide conceptual symmetry with the resistor, inductor, and capacitor. He called this fourth element a "memristor" that is for “memory resistor”. 37 years later, in 2008, a HP team announced the discovery of a memristor. Recently, Prof Frank Wang discovered memristor's "The Delayed Switching Effect" and applied this effect to computer memory (Fig.1) [2][3].

 

 

Fig.1 Computer memory with a transistor-free crossbar architecture. “Full Selection” means a full voltage, V, is applied across the two wires with the desired memristor at the intersection. “Half Selection” means only a half voltage, V/2, is applied across the (undesired) memristor. An inset shows low-resistance shorting bars running between cells. λ is the resolution limit of the lithography used to fabricate the memory cells. The minimum line width is λ and the minimum distance between lines is 1.2 λ, thus one cell area is 4.84λ2.

 

Since the first computer was built, scientists have been fascinated with the idea of a computer that works similarly to the human brain. Memristor behaves in a manner that mimics the junctions between the neurons in the brain. The Future Computing Group has investigated their recently discovered "The Delayed Switching Effect" in memristor neural networks. They will develop novel computational architectures, including smart memories and brain-like computers.

 

 

 REFERENCES

 

[1] Frank Wang, Sining Wu, Na Helian, Andy Parker, Yike Guo, Yuhui Deng, Vineet Khare, Grid-oriented Storage: A Single-Image, Cross-Domain, High-Bandwidth Architecture, IEEE Transaction on Computers, Vol.56, No.4, 2007.

[2] F. Wang, Na Helian, Sining Wu, Guan Lim, Yike Guo & Andy Parker, “Delayed Switching in Memristors and Memristive Systems”, IEEE Electron Device Letters, Volume 31, Issue 7, 2010

[3] F. Wang, “A newly-discovered delayed switching effect could revolutionize magnetoelectronic memory design”, 55th IEEE Conference on Magnetism and Magnetic Materials, Oral Presentation, FE-06, November 14-18 2010, Atlanta, USA

 

 

Author’s Biography

 

 

Prof. Frank Zhigang Wang

Head, School of Computing, University of Kent in Canterbury

Chair in e-Science and Grid Computing

Director of Center for Grid Computing

Cambridge-Cranfield High Performance Computing Facility(CCHPCF)

Cranfield University Campus, United Kingdom.

Email: f.wang@cranfield.ac.uk

 


Prof. Frank Wang is Head of School, School of Computing (formerly known as Computing Laboratory), University of Kent, UK. In 1987 the Computing Laboratory Extension was formally opened by Her Majesty the Queen. Kent was placed 24th out of 159 participating institutions in terms of the 4* (World Leading) research according to the UK Government's 2008 Research Assessment Exercise. Prof Wang was elected as the Chairman (UK & Republic of Ireland Chapter) of the IEEE Computer Society in 2005. He is Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing. Professor Wang's research interest includes Future Computing, Green Computing (via memristor), Grid/Cloud Computing, Biologically-inspired Computing, Quantum Computing/Communication, Data Storage & Data Communication, and Data Mining and Data Warehousing, etc. His publications include a book, 68 journal papers [13 IEEE Transactions such as IEEE Transactions on Computers, 3 ACM publications such as ACM Operating System Review, etc], 53 conference papers, and 4 book chapters (Wiley/Elsevier/Cambridge/Springer, including Encyclopedia of Computer Science and Engineering by Wiley).

 

*                         *                       *

 

Keynote Speaker-2

 

 

Cyber Security & Future Networks

 

Professor Eduard Babulak

 

EU CORDIS,
1-3 Avenue du Bourget. 
Brussels. B-1049, Belgium

Email: babulak@ieee.org

 

 

The Telecommunications and Internet Technologies have evolved dramatically during the last decade, laying solid foundation for the future generation of the Ubiquitous Internet access, omnipresent web technologies and ultimate automated information cyberspace. As a result, the current efforts in the research and development in the areas of Next Generation of Internet and Telecommunications Technologies promotes formation of inter-disciplinary international teams of experts, scientists, researchers and engineers to create a new generation of applications and technologies that will facilitate the fully-automated information cyberspace systems via Future Networks.

 

Having hundreds of millions of people all over the planet, connecting to Internet via his/her PC, laptop, or portable mobile device, etc., create opportunities to communicate of kind of information and content which may or may not be always contributing to the betterment of mankind. The emergence and accessibility of advanced data and telecommunications technologies combined with convergence of industry standards, as well as the convergence of data and telecommunications industries contribute towards the ubiquitous access to information resources via Internet.

The current and future dynamic development and innovation in the field of Future Networks and Global Information Communications Technologies (ICT) create a platform for the ubiquitous connectivity via Cyberspace anywhere at any time for anyone worldwide.

Among thousands of different interest groups and social networks in countries worldwide, there are groups that may create, distribute or promote the information that may put state security, national economy and society in danger. Given current complexity of the global Internet infrastructure, in conjunction with the human factor, creates foundation for categories that may trigger local Internet malfunction and ultimately a Cyberspace worldwide. In light of recent earthquakes in Japan, Australia and South China, it is important to prepare for the Cyberspace malfunction triggered by the natural disaster(s) worldwide. These categories are:

 

Natural disasters:

Flooding; Earthquake(s); Volcanic explosion(s), etc.;

 

Human factor:

Terrorist driven attack(s); Politically and Economically driven attack(s); War(s), etc.;

 

Hardware & Software:

Power supply, Connectivity; Reliability;

Malware and spams; Configuration; Interoperability;

 

All across the globe, there are many professional groups of experts working together to make sure that the Future Networks and Cyberspace function properly. There number of the Computer Emergency Response Teams (CERTs) that operate and cover a specific region on the planet, such as Australian CERT [1], Japanese CERT [2], US CERT [3], APCERT [4] and PacCERT [5].  The regional CERTs coordinate and monitor the Internet in collaboration with the regional network service providers, security vendors, government agencies, as well as the industry associations.

 

The author will discuss the technological trends in Future Networks, Cyber-security and CERTs.

 

Keywords: Future Networks, Computer Emergency Response Team (CERT), Cyber Security, globalization.

 

References:

[1] AusCERT: http://www.auscert.org.au/ accessed February 7th 2011;

[2] JPCERT: http://www.jpcert.or.jp/english/about/ accessed February 7th 2011;

[3] USCERT: http://www.us-cert.gov/ accessed February 7th 2011;

[4] APCERT: http://www.apcert.org/ accessed February 7th 2011;

[5] APCERT membership: http://www.apcert.org/about/structure/members.html last visited on February 7th 2011;

 

Author’s Biography

 

 

Professor Eduard Babulak is accomplished international scholar, researcher, consultant, educator, professional engineer and polyglot. Professor Babulak is Fellow of the Royal Society for the encouragement of Arts, Manufactures and Commerce (FRSA), Chartered Fellow of British Computer Society (FBCS), Senior Member of ACM, Mentor and Senior Member of IEEE, served as a Chair of the IEEE Vancouver Ethics, Professional and Conference Committee. His academic and engineering work was recognized internationally by the Engineering Council in UK, European Federation of Engineers and credited by the British Columbia and Ontario Society of Professional Engineers in Canada. Keynote Speaker at the UKSim2011 Symposium, University of Cambridge, March 2011 and March 2010; Plenary Keynote Speaker at the International Conference on Advances in Computing and Communications 2011 (ACC-2011), in Kochi, India; Invited Panel Speaker at the ITU Kaleidoscope Conference, Dec. 2010 in Pune, India; Panel Speaker at the KIZUNA WINDS Symposium Tokyo Feb 2010; Invited Speaker at National University of Yokohama and University of Electro-Communications in Tokyo, December 2009; Invited Panel Chair and Speaker at MIT, USA, May 2010 and September 2005; Expert-Evaluator for the European Commission in Brussels, June, 2007. Professor Babulak research interests are in Cyberspace, Security, Future Networks and Ubiquitous Computing and QoS, E-Commerce, E-Health, IT, MIS, Applied Informatics in Transportation, E-Manufacturing, Human Centric Computing, E-Learning, Automation and Applied Mathematics. Professor Babulak speaks 14 languages, a member of the Institution of Engineering Technology (MIET), American Society for Engineering Education (MASEE), American Mathematical Association (MAMA) and Mathematical Society of America (MMSA). He's biography was cited in the Cambridge Blue Book, Cambridge Index of Biographies and number of issues of Who's Who.

*     *     *

 

Tutorial-1

 

Secure Multi-party Computation for Preserving Privacy:
Problems, Techniques and Applications

 

Professor Durgesh Kumar Mishra

 

Professor (CSE) and Dean (R&D),

Acropolis Institute of Technology and Research, Indore, MP, India,

Ph - +91 9826047547, +91-731-4730038

Mishra_research@rediffmail.com

 

Chairman IEEE Computer Society, Bombay Chapter,

Vice Chairman,  IEEE MP-Subsection,

durgeshmishra@ieee.org, dkmishra@acropolis.in

 

 

Consider a set of parties who do not have trust in each other, nor in the channel by which they communicate. Even then the parties wish to correctly compute some common function of their local inputs, while keeping their local data secure from others. This, in a nutshell, is the problem of secure multi-party computation (SMC).  This problem is fundamentally in cryptography and in the study of distributed computations. It takes many different forms depending on the underlying network, on the function to be computed, and on the amount of distrust the parties have in each others and in the network. In this tutorial, we present several aspects of secure multi-party computation like privacy of Individuals, correctness of result and network traffic reductions.

 

We first present the definition of this problem in various situations. Our definition is drawn from the previous idea and formulizations, and incorporate aspects that were previously overlooked. We also present several problems associated with SMC. Next we show the problem of hiding the data form trusted third party (TTP) which computes the result. We present the existing solutions of SMC along with the protocols developed by us.  In our first solution, we introduced a randomly selected anonymizer between the parties and the TTP to hide the data. Apart from the randomly selection of anonymizer, the party will divide the data into number of packets and then send to different anonymizer so that the entire data will not reach to a single anonymizer and the privacy of individual will be maintained. After that, we present another problem, which enables the SMC to perform the correct computation of the result as well as the authentication of computational body.  We have introduced multiple TTPs instead of a single one. If there is only one TTP then its behavior can be suspicious. Using this multiple TTP concepts we have the option to choose a TTP from domain of TTPs for computation. In this method we divide the data in several packets and these packets are sent to multiple TTPs and a randomly selected master TTP will perform the computation after accumulating data from other TTPs. For the authentication of TTP, we have introduced the concepts of equivalence classes. With the help of this concept we remove the malicious TTP from the system for further computation. Finally, present the problem of dealing with adversaries in SMC and minimizing their effects.  We investigate the power of adversaries in several situations. We have also minimized the complexity of network traffic in entire process of SMC.

 

 


Author’s Biography

 

Dr. Durgesh Mishra.bmpDr Durgesh Kumar Mishra received M.Tech. degree in Computer Science from DAVV, Indore in 1994 and PhD degree in Computer Engineering in 2008. Presently he has been working as Professor (CSE) and Dean (R&D) in Acropolis Institute of Technology and Research, Indore, MP, India. He has around 20 years of teaching experience and over 5 years of research experience. He has completed his research work with Dr. M. Chandwani, Director, IET-DAVV Indore, MP, India in Secure Multi-Party Computation. He has published more than 60 papers in refereed International/National Journals and Conferences including IEEE and ACM. He is a Senior Member of IEEE, Chairman of IEEE Computer Society, Bombay Chapter, India. Dr. Mishra has delivered his tutorials in IEEE International conferences in India and other countries. He is also a programme committee member of several International conferences. He visited and delivered his invited talk in Taiwan, Bangladesh, Singapore, USA, UK and several places in India in Secure Multi-Party Computation of Information Security. He is an author of one book and reviewer of three International Journals of Information Security. He is Chief Editor of the Journal of Technology and Engineering Sciences. He has been a consultant to industries and Government organizations like Sale Tax and the Labour Department of the Government of Madhya Pradesh, India.

 

*     *     *

 

Tutorial-2

 

 

Cross Layer Optimization in Ad-hoc network using Directional Antenna and Switching Network

 

Prof. Geetam Singh Tomar

Principal, Malwa Institute of Technology & Management

Gwalior, India

Email: geetamtomar@gmail.com

 

In the field of wireless network new challenges have erupted with growing technologies. The challenges are to accommodate new standards, protocols and services with better performance. The parameters to cater are data rate, spatial reuse and reducing interference. In wireless communication lower three layers play a major role thus cross layer communication is required to use information available in one layer to another layer, which needs optimization of cross layer communication. In this paper we have provided a solution using directional antenna. By using this method problems like channel interference, spatial reuse have been reduced and has provided stable path by increasing the coverage range and reducing the no of hops, which has helped in eliminating frequent route errors in ad hoc networks by incorporating some changes in MAC layer and in routing layer. In this work we have used DSR (Dynamic Source Routing) protocol, because this protocol is a more appropriate for directional antennas as it has less complexity than other routing protocols.  This has achieved cross layer optimization between the MAC layer and Routing Protocol so that it gives a better performance than omni directional antennas. The option of using Microwave switching network is also being investigated to improve throughput and mitigate problems arised due to use of directional antennas.

 

 

Author’s Biography

 

IMGProf. Geetam Singh Tomar (IEEE M’ 2002), received his UG, PG, and Ph. D. degrees in electronics engineering from universities of India. He is the Director of Machine Intelligence Research Labs, Gwalior. He is also Principal, Malwa Institute of Technology & Management, Gwalior, India and R&D Advisor, MPCT Group of Colleges, Gwalior. He is actively involved in research and consultancy in the field of Air Interface and Advanced communication networks. He is actively involved in IEEE activities and has organized more than 10 International conferences in India and other countries. He is a Visiting Professor in Hannam University Korea, Thapar University Patiala, and many other institutions. He has served in IIITM and other institutes of national importance. He received International Pluto award for academic excellence in 2009 from Cambridge UK. He was listed in 100 top academicians of the world in 2009. Listed in who’s who in the world for 2008, 2009 and 2010. He is chief editor of 5 International Journals and has published more than 100 research papers in international journals and international conferences. Ha has authored and edited books through Springers and Wiley Publications.

 

*     *     *

 

 

Counter 1