9th International Confernece on

PARKROYAL Serviced Suites Kuala Lumpur

Computational Intelligence, Communication Systems and Networks

Kuala Lumpur, 29 - 30 October, Pacific Regency-Kuala Lumpur


Previous conferences: view CICSyN2016 in IJSSST online digital library

View CICSyN2009, CICSyN2010, CICSyN2011, CICSyN2012, CICSyN2013, CICSyN2014, CICSyN2015, Proceedings  in IEEE online Digital Library IEEE-Xplore

Important Dates

Call for Papers

Paper Submission


Venue and hotels


Flights & Travel

Social Events






Keynote and Tutorial Speakers:

Assoc. Prof Yong Meng TEO

Assoc. Prof Dave Parry


Important Dates

Submission of

Full/Short/Poster/WIP papers: see above



From: see above



to CPS server &

copyright form:

see above




(Payment) due from:

see above

Credit Card on EDAS


Conference Chairs/Honorary Co-Chair:

Dr Ibrahim Ibrahim Shapiai, UTM

Dr Adam Brentnall, Queen Mary, London University


Program Chairs:

Assoc. Prof Zuwairie Ibrahimi, UMP

Dr Taha Osman

Nottingham Trent University, UK


Local General Chair:



Advisory Chairs:

Prof Frank Wang, UK

Prof Philip Sallis, AUT

New Zealand

Prof Zuwairie Ibrahim UMP

University of Malaysia in Pahang

Prof Paulus Rihardjo, UNPAR


Dr Alessandra Orsoni,

University of Kingston

Norrima Mokhtar

University of Malaya.

Prof Patrick Wang, USA

Prof Jasmy Yunus, UTM

Prof Borhanuddin Mohd Bin Ali, UPM

Dr Adam Brentnall,

Queen Mary London University

Prof Ismail Saad, UMS

Prof Mahamod Ismail UKM

Prof Rosni Abdullah, USM

Prof Rosalam Sarbatly, UMS


General Chair:

David Al-Dabass


General Co-Chair:

Ajith Abraham




Liaison Chair:

Taha Osman


Published Papers: 8 Papers going to publication in IJSSST Vol.20, N5, October 2019.

Accepted Papers: 6 papers awaiting Registration






First author

Registered author



Implementing a Role Playing Game on Learning Traffic and Road Rules with Time and Distance Approximation


Arman Bernard Santos




Enhancing User Experience Using Machine Learning


Sumaiya PK

Sumaiya PK



Data Management & Cyber Security in the Digital Age of Internet of Things (IoT)


Prateek Bajaj




A Single-Band Optically Transparent Antenna for Wearable Smart Glasses


Haider Khaleel Raad




An Application of Image Processing Technology in Counting Rebars as an Alternative to Manual Counting Process


Mikale Rizton Ablidas

Mikale Rizton Manuel Ablidas



Ambulatory ECG Recording System Based on ADS 1298 and STM32L431xx Microcontroller


Rahul Kher

Rahul Kher



Low-cost Gaze Detection with Real-time Ocular Movements Using Coordinate-Convolutional Neural Networks


Shubham Jain

Shubham Jain



Simulating the Concept of Self Driving Cars Using Reinforcement and Deep Q-Learning


Akhilesh Patil




Development of Speech to Filipino Sign Language for the Deaf or Mute Filipinos Using Hidden Markov Model (HMM)


Raymond Joseph Meimban

Raymond Joseph Meimban



Bidirectional LSTM Autoencoder for Sequence Based Anomaly Detection in Cyber Security


Ashima Chawla

Ashima Chawla



Performance Evaluation of RSS Fingerprinting for Indoor Location Using LoRa


Irsan Ali

Irsan Taufik Ali



An Improved Defocus Blur with Combined Local Binary Patterns and Nearest Neighbor


Jyothi Sravani




Data-Driven Neuroendocrine-PID Controller Design for Twin Rotor MIMO System


Mohd Riduwan Ghazali




Multiobjective Evolutionary Algorithm for Hybrid Cooperative Spectrum Sensing in Cognitive Radio Networks


Ayman El-Saleh

Ayman A. El-Saleh


The conference has been cancelled due to insufficient paper submissions and registration. Papers already submitted/ accepted/ registered will be published in IJSSS, see table,- If your paper is marked in pink it means we have not received the publication fee and your paper will not be published.

If you wish to publish your paper and intend to pay soon by credit card on EDAS (or ask for invoice with bank transfer details), kindly email the general chair immediately on


Submission Deadline: 10 October 2019


Use template below to format your paper:

Word template (MS Word .doc format)

PDF template (PDF format)


Then submit it through EDAS:


Paper Registration: Deadline 14 October 2019


Publication: Proceedings will be published directly in the Int. J. of Simulation: Systems, Science and Technology,


Papers are invited on any aspect of Computational Intelligence, Communication Systems and Networks. Papers presenting work validated by experimentation, simulation or analysis are solicited. Papers with application and experimental focus from both industry and academy, duly documenting lessons learnt from test-beds, field trials or real deployments are particularly welcome. Manuscripts must be submitted electronically through the EDAS system.


Topics of interest include, but are not limited to:




Intelligent Systems

Hybrid Intelligent Systems & Hybrid Soft Computing

Sensor Nodes, Circuits, Devices, Wireless Sensor Networks
RFIDs and their applications
Protocols and Standards
Modelling and Performance
Software Platforms and  Middleware
Tools and Techniques for Design, Deployment, Testing and Evaluation
Security, Authentication, Wireless Security, Dependability
Discrete Event and Real Time Systems

Image, Speech and Signal Processing

Transport, Logistics, Harbour, Shipping and Marine

Virtual Reality, Visualization and Computer Games

Parallel and Distributed Architectures and Systems

Internet Modelling, Semantic Web and Ontologies

Mobile ad hoc Networks

Vehicular Technology and Networks

Air Interfaces

QoS for Voice and Video in Wireless Networks

Applications: aerospace; remote sensing; wireless communication, intelligence and simulation, electronic circuits and systems; communication and networks; management; games, war/conflict/rebellion modelling, cognitive functions, semantics modelling/ dynamics; manufacturing; robotics; measurement; monitoring; safety critica1 systems; military. 

Exhibitors: manufacturers of software and hardware, publishers, etc., are invited to apply to exhibit their products.


Submission Guidelines

You are invited to submit:
- full paper of 6 pages (Letter format) for oral presentation,

- proposal to organize a technical session and/or workshop.

Submissions must be original, unpublished work containing new and interesting results that demonstrate current research in all areas of computational intelligence, computer systems and networks, focusing on modelling, simulation and applications in science, technology, business and commerce.


The conference is jointly organised by UK Simulation Society and Asia Modelling and Simulation Section and technically co-sponsored by:


-                      University of Malaysia in Pahang

-                      University of Technology Malaysia

-                      EUROSIM

-                      Nottingham Trent University

-                      European Council for Modelling & Simulation

-                      Society for Computer Simulation Int. (SCS)


Submission implies the willingness of at least one of the authors to register and present the paper. All papers are to be submitted electronically,- see full instructions under Paper Submission below, in PDF or Word format. All papers will be peer reviewed by at least three independent referees of the international program committee.


Paper Submission: CICSyN2019 is using EDAS for submission and registration, authors need to:

- create an account with EDAS by clicking on the link below

- open the list of conferences managed by EDAS & find CICSyN2019

- click on Submit button on the right to enter your paper title & abstract

- upload file.


Conference website:

TPC/ International Reviewers

Prof. Ing. Heinz Frank, Reinhold-Wuerth-University Kunzelsau, Germany

Prof. P.K. Meher, NTU, Singapore

Dr Athanasios Pantelous, UK

Dr. Harkirat Singh, Samsung, USA

Dr. Maman Abdurohman,Institut Teknologi Telkom,Bandung - Indonesia

Prof. Vijay Bhargava, University of British Columbia, Vancouver, Canada

Prof. Hai JiangArkansas State University, USA

Dr. Theodoros G. Kostis, Greece

Dr. Varun Jeoti, Petronas, Malaysia

Dr. Joanne Scillitoe, Michigan Tech Univ, USA

Prof Shubha Kher, USA

Prof Helen Karatza, Greece

Prof Anna Lekova, Bulgaria

Dr Pichaya Tandayya, Thailand

Mr. Jakapan Suaboot, Thailand

Dr. Wasimon Panichpattanakul, Thailand

Prof. Sudarshan Tiwari, MNNIT, Allahabad

Dr. Shekhar Verma, IIIT, Allahabad

Prof. Harnath Kar, MNNIT, Allahabad

Prof. A.G. Keshkar, VNIT, Nagpur, India

Prof. Yuehui Chen, China

Prof. Mokhtar Beldjehem, Canada

Prof. P.K. Singhal, MITS,

Gwalior India

Prof. S.S. Bhadoria, MITS, Gwalior, India

Prof Paulus Rihardjo, Indonesia

Ms. Pallavi Shukla, VITM, Indore, India

Prof Wimpy Santosa, Indonesia

Prof. Rubiyah Yusof, Malaysia

Mr. Manish Dixit, MITS, Gwalior, India

Mr Waqas Bangyal, Pakistan

Prof. A.K. Saxena, Libya

Dr Cecilia Nugraheni, Indonesia

Dr Hadzli Hashim, Malaysia

Dr. Fazal Rehman, MAJ University, Pakistan

Dr Kinley Aritonang, Indonesia

Dr Paulus Kartawijaya, Indonesia
Dr. Taha Osman, UK

Dr Bagus Arthaya, Indonesia

Dr Zuzka Oplatkova, Czech Republic

Dr Zuwairie Ibrahim, Malaysia

Dr Kenneth Nwizege, Ken Saro-Wiwa Polytechnic, Nigeria

Dr. Aditya Trivedi, IIITM, Gwalior, India

Prof. Sung-Bae Cho, Korea

Prof. Jeng-Shyang Pan, Taiwan

Dr Ijaz Uddin, Pakistan

Dr Zuhaina Zakaria, Malaysia

Dr Ari Prihatmanto, Indonesia

Dr Miryam Wijaya, Indonesia

Prof Patrick WangProf. Hisao Ishibuchi, Japan

Pandian Vasant, Malaysia,

Lucky Adhie, Indonesia

Ali Sadiyoko, Indonesia

Dong-hwa Kim, Korea, 
Nico Saputro, Indonesia

Rian Pratikto, Indonesia

Zhang Yi, China

Noor Aziz, Malaysia

Muhammad Haron, Malaysia

Elisati Hulu, Indonesia

Min-Shiang Hwang, Taiwan

Jeng-Shyang Pan, Taiwan

Marihot Nainggolan, Indonesia

Dr. Jongman Cho, Korea

Thedy Yogasara, Indonesia

Noor Hafizah Abdul Aziz, Malaysia

Prof. B.K. Mohanty, JIET, Guna, India

Prof. Osamu Ono, Japan

Prof Robertus Triweko, Indonesia

Mr. R.S. Tomar, IITM, Gwalior, India

Dr. Er Meng Joo, Singapore

Cynthia Juwono, Indonesia

Ignatius Sandy, Indonesia

Paramasivan Saratchandran, Singapore

Mario Koeppen, Japan

Mr. B.K. Chaurasia, IIIT, Allahabad, India

Prof. Zhou Mingtao, China

Prof. Kazunori Sato, Japan

Prof Shah Rizam Mohd Shah Baki, Malaysia

Prof. Kunio Igusa, Japan

Prof Mohamed Khalil Hani, Malaysia

Dr. Shirsu Verma, IIIT, Allahabad, India

Mr. Arvind Jain, RJIT, Gwalior, India

Prof Teruaki Ito, Japan

Prof Eduard Babulak, Fiji

Prof R K Subramanian, Mauritius

Prof K.G. Subramanian, Malaysia

Dr Cecilia Nugraheni

Dr Hadzli Hashim, Malaysia

Dr. Fazal Rehman, MAJ University, Pakistan

Mr. Prashant Purohit, RJIT, India

Mr. P. Ganeshan, British Telecom, Malaysia

Dr. S.S. Bedi, Barielly, India

Dr. Lei Shu, Japan

Dr. K. Madduletty, NITIE, Mumbai, India

Dr. Atul Negi, Hyderabad, India

Dr. S.K. Shukla, India

Prof. Suresh Kumar, Tumkur, India

Dr. C.V. Tripathi, India

Dr. Azrin Aris, Malaysia

Dr Danilo Pelusi

Dr. Shwkat Ali, Australia

Mr. Valliappan Raman, USM, Malaysia

Mr. Rajit Ram, VITM, India 

Prof Eduard Babulak, Canada

Prof. Rakesh Saxena
Prof MPS Chawla
Prof. RS Tare
Prof. PK Sen

Abu Khari A'ain

Ghulam Abbas

Mohsen Askari

Athanasios Pantelous

Mohd Zaidi Abd Rozan

Normaziah Abdul Aziz

Izhal Abdul Halin

Theodoros G. Kostis

Ruzairi Abdul Rahim

Irfan Syamsuddin

Rosni Abdulla

Shahrum Shah Abdullah

Dayang Norhayati Abg Jawawi

Shukri Abidin

Hassan Abolhassani

Athanasios Goudosis

Ajith Abraham

Kamalrulnizam Abu Bakar

Gregorio Romero

Luisa Martinez

Rohani Abu Bakar

Carlota Tovar

Ford Lumban Gaol

Wan Hussain bin Wan Ishak

Syed Abd Rahman Abu Bakar

Johari Adnan

Mohamad Noh Ahmad

Mohammad Nazir Ahmad

Waqas Ahmad

Shakeel Ahmad

Waqas Ahmed

Khalid Al-Begain

David Al-Dabass

Dhiya Al-Jumeily

Rafe' Alasem

Mikulas Alexik

Marco Remondino

Belal Alhaija

Tony Allen

Ferda Alpaslan

Ismail Amin

Shamsudin Amin

Konar Amit Marcelo Ang, Jr

Obinna Anya

Ishak Aris

Vijay Arora

Irfan Awan Eduard Babulak

Kambiz Badie

Youakim Badr

Gurvinder-Singh Baicher

Preeti Bajaj

Frank Ball

Abhijit Bapat

Narendra Bawane

Arijit Bhattacharya

Fabian Boettinger

Mohammad Razaa Borujerdi

Vesna Bosilj-Vuksic

Felix Breitenecker

Adam Brentnall

John Brinkman

Agostino Bruzzone

Bustanur Busta

Hueseyin Cakmak

Piers Campbell

Andre Carvalho

Sanjay Chaudhary

Russell Cheng

Monica Chis

Sung-Bae Cho

Chin Soon Chong

Monica Chris

Robert Colomb

Emilio Corchado

Roy Crosbie

Amol Deshmukh

R Deshmukh

Jafri Din

Jiri Dvorsky

Andrzej Dzielinski

Chionh Eng Wee

Mazlina Esa

Tony Fleet

Thomas Freytag

Vikram Gadre

Boon Ping Gan

G Ganesan

Viranjay M. Srivastava

Fengge Gao

Xiao-Zhi Gao

Xiaohong Gao

Yannis Goulermas

Crina Grosan

Jafar Habibi

Abdul Razak Hamdan

Habibollah Haron

Majida Alasady (Tikrit)

Faiezah Haron

Fazilah Haron

Manaf Hashim

Uda Hashim Aboul Ella Hassanien

George Herterich

Seth Hetu

Vlatka Hlupic

Sadiq Hussain

Abir Hussain

Min-Shiang Hwang

Zuwairie Ibrahim

Hanif Ibrahim

Ismail Ibrahim

Subariah Ibrahim

Mohd. Yazid Idris

Mojca Indihar Stemberger

Rolly Intan

Hisao Ishibuchi

Razali Ismail

Nauman Israr

Norafida Ithnin

Teruaki Ito

Lakhmi Jain

Sudhanshu Jamuar

Safeeullah Soomro

Janos-Sebestyen Janosy

Gerrit Janssens

Don Jeng

Emilio Jimenez Macias

Rao Jinnah

Er Joo

Kasmiran Jumari

Esko Juuso

Lilia Kakaradova

Nikolaos Karadimas

Helen Karatza

S. D. Katebi


Arpad Keleman

Avinash Keskar

Marzuki Khalid

Noor Khafifah Khalid

Mohamed Khalil-Hani

Hisham Khamis

M Kharat

Shubha Kher

Dong-hwa Kim

Mario Koeppen

Petia Koprinkova

Anna Lekova

Michal Kratky

Vijay Kukreja

Rajeev Kumar

Tri Basuki Kurniawan

Alhad Kuwadekar

Rik Van Landeghem

Registration (all figures in US$) Currency Converter

Due to the labour intensive process of handling bank transfers a $50 surcharge applies.

Author/ Participant

Student Paper

(2 authors maximum)

Student Participant (no paper) or Co-Author (No Pack)

Credit Card

Bank Transfer

Credit Card

Bank Transfer

Credit Card

Bank Transfer

Registration BEFORE early bird deadline







Registration AFTER early bird deadline







Registration: Only one method of payment is available on EDAS:

Credit Card: payment is accepted online and confirmation is instant.


Here is the procedure:


1. go to EDAS at and click on Register yellow tab at the top, a list of conferences will appear

2. Scroll down to conference name (e.g. CICSyN2019) line and click on the extreme right green money symbol at the end of this line, a new page will appear

3. Click on the extreme right button (Trolley symbol) after USD $595, a new table will immediately appear under a new line Registered, but no paid.

4. Under this table a list of credit card symbols and SWIFT. Click on the credit card symbol.  


5. A new page will appear, enter all card details, scroll down to the bottom and click Pay for Registration


6. REMEMBER: NO payment received by the set deadline means your paper will NOT be in the Proceedings.


If you have problems meeting this deadline email immediately.


Best wishes and look forward to meeting you at the conference.

Conference Chairs.


Keynote Speaker-1, to be confirmed

Effects of Social Interactions on System Vulnerabilities


Yong Meng TEO

Department of Computer Science

National University of Singapore




More than 40% of computer and organizational security professionals believe that their greatest security threat is insider threats where employees jeopardized security through data leaks or similar errors [1]. Though insider threats are of growing interest and importance in system security, it is not well understood and investigated. This talk discusses the role of social interactions in an organization and the insider threats it presents on system vulnerabilities.


To investigate this, we propose an approach consisting of three key steps. Firstly, users roles, security policies and their interactions are modeled as facts and interaction rules. Secondly, a reasoning engine consumed these facts and interaction rules, and together with a model of the hardware system configuration produces an attack graph. An attack graph represents the cumulative effect of attack steps, showing how series of individual steps or network paths can potentially enable an intruder to gain privileges in the system. Lastly, the attack graph can be analyzed to obtain an objective measure of risks and to prioritize security hardening measures among others. For examples, How likely is it that an intruder could gain privilege X? Which user group and system component are most vulnerable? In this talk, we present preliminary results that investigate the impact of security leakage arising from user interactions on system vulnerabilities.



1.                  Unintentional Insider Threats: Social Engineering, Technical Report, Software Engineering Institute, Carnegie Mellon University, Jan 2014.




web-page-0613TEO Yong Meng is an Associate Professor of Computer Science at the National University of Singapore (NUS) and an Affiliate Professor at the NUS Business Analytics Centre. He was a Visiting Professor at the Chinese Academy of Science in China from 2010-2014. He received his PhD and MSc in Computer Science from the University of Manchester. His research interest is on systems modeling and simulation. His recent work focuses on modeling the performance of heterogeneous parallel systems and emergent properties in complex systems among others. He has over 150 journal and conference publications and a number of best paper awards including the Best Applied Paper Award at the annual Wintersim Conference in 2015 and the Best Paper Award at the 10th International Conference on Algorithms and Architectures for Parallel Processing in 2010. Another paper, co-authored with his PhD student won the ACM SIGSIM Best PhD Student Paper Award in 2009. At NUS, he leads the Computer Systems Research Group and is the technical leader for Systems Research. He has received various research grants including European Commission, Fujitsu Computers (Singapore) Pte Ltd, Fujitsu Laboratories Ltd (Japan), Sun Microsystems/Oracle (USA), NVIDIA and PSA Corporation.



Keynote Speaker-2


Computational Intelligence in Disaster Management


Professor David Parry

Head, Department of Computer Science

Auckland University of Technology

New Zealand.




Unfortunately the scale and frequency of natural disasters is increasing driven by climate change, increasing population and loss of biodiversity. Computational intelligence offers enormous promise in the management of disasters to reduce loss of life and humans suffering. Disaster management is split into four phases, mitigation, preparedness, response and recovery. CI has particular application in the areas of mitigation and response. Enormous data flows are available from dedicated imaging systems and sensor networks, but also increasingly from citizen science/ IoT devices that can help forecast the occurrence and likely effect of disasters. This information, when combined and analysed with modern machine learning and knowledge-based approaches can identify the possible combinations of disaster events - for example storm surges and landslips and inform the mitigation process. After the event, understanding the interplay of different natural events, for example volcanic ash and rainfall, can be used to support the optimal deployment of response resources as well as understanding the movement of people and the state of the infrastructure needed to support recovery.

In this talk I will discuss some of the novel data-collection and analysis approaches that are becoming available in this field as well as identifying some open questions and wicked problems that may be of interest to the simulation and modelling community




Dave Parry is the head of the Department of Computer Science at AUT. He was awarded a degree in Physics from Imperial College London, followed by a masters in medical physics from St. Bartholomews Medical College. He gained a research MSc. in Computer Science from the University of Otago, New Zealand. His research interests include Health Informatics, Ontology based information retrieval, AI in healthcare and activity understanding using sensor devices. Recently he has been involved in an international project concerned with developing the field of disaster eHealth. He has published over 100 papers in these areas and is a fellow of the Australasian College of Health Informatics.


Counter 1