2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) - Conference Table of Contents | IEEE Xplore

International Conference and Workshop on Computing and Communication (IEMCON)

2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)

DOI: 10.1109/IEMCON53756.2021

27-30 Oct. 2021

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2021 IEEE 12th Annual

Machine learning (ML) experts have been using black-box classifiers for modeling purposes. However, the users of these systems are raising questions about the transparency of the predictions of the models. This lack of transparency results in non-acceptance of the predictions, especially in critical applications. In this paper, we propose a DDoS explainer model that provides an appropriate explana...Show More
Gaze point reflects the eyes' fixation on a visual field but doesn't express the meaning of a fixation point and scan-path on the same area of interest as much as text-based expression. Text-based expressions are the most common type of emoticons. Emojis are derived from emotion and icons. In an instance when one is feeling happy, not-happy, overjoyed, or upset emoticons can help express the most ...Show More
Network security is of vital importance, and Information Technology admins must always be vigilant. But they often lack the expertise and skills required to harden the network properly, in with the emergence of security threats. The router plays a significant role in maintaining operational security for an organization. When it comes to information security, information security professionals main...Show More
Understanding the behavior of a virus spreading inside a computer network is crucial. In recent years, devices have become increasingly interconnected via communication protocols. Since computer networks are more ubiquitous than ever before, one infected device threatens several others. In order to better defend against network infections, the current methods need more novel means to combat networ...Show More
Traffic Engineering (TE) is a critical topic in network routing and switching. The topic has been intensively investigated. New network architecture has also been proposed to improve TE, e.g., Multi-Protocol Label Switching (MPLS) architecture. MPLS has been widely used to in the past 15 years or so. However, the overhead associated with MPLS architecture is high, particularly the Resource Reserva...Show More
The purpose of this study was to develop the “Roomeet” communication tool for supporting the online learning management of teachers during the Covid-19 pandemic. The research design uses research and development. The data collection technique used a questionnaire, while the data analysis technique used descriptive statistics and qualitative data analysis, with steps of data reduction, data display...Show More
Millions of people across the world are affected by visual impairments. The proposed application is designed for visually impaired people consists of three components which are face recognition with emotion, obstacle identification through distance measurement, extract and convey critical information like text, labels, and currency details. Most works reported in the literature depends on the avai...Show More
The lack of trust is one of the barriers that hinders the acceptance of ridesharing. In the past years, one of the hot research issue in the context of ridesharing is to enhance trust. Such trust based ridesharing problem can be described as an optimization problem in which a large number of constraints must be satisfied. Due to complexity of this optimization problem, exact methods are limited an...Show More
Indoor positioning systems are becoming more and more popular nowadays. There are many challenges in designing such systems. An effective method of designing these systems is to employ Wi-Fi technology along with the fingerprinting algorithm. This algorithm consists of an offline or setup phase and an online or exploitation phase. A challenge that these systems face is the offline phase, in which ...Show More
The clustering is an interesting technique for unsupervised document organization in the World Wide Web (WWW). The most widely used partitioning clustering algorithm is K-means. However, it has an issue with random initialization, which might lead to local optimum situations. In fact, metaheuristics-based clustering has demonstrated their efficiency to reach a global solution instead of local one....Show More
Smart grid architecture and Software-defined Networking (SDN) have evolved into a centrally controlled infrastructure that captures and extracts data in real-time through sensors, smart-meters, and virtual machines. These advances pose a risk and increase the vulnerabilities of these infrastructures to sophisticated cyberattacks like distributed denial of service (DDoS), false data injection attac...Show More

SECURITY For INTERNET OF THINGS-IOT

Sanaa. S. Abd El dayem

Publication Year: 2021,Page(s):0070 - 0073
Internet of things (IOT) is a hot and rising subject these days. Nowadays, a wide range of gadgets should be associated and a wide range of data is exchanged. This makes human life every day simpler and considerably keener than previously. This life mode is defenseless against a few security dangers. As be known, the portable systems, commonly, are more presented to malevolent assaults that may pe...Show More
Lost & Found BD is a web and mobile application based platform to store and share the data of missing people, pets, doc files etc. Users can have the full opportunity utilizing features of each section as the site is being developed in such way. Each section has its own credibility to help users finding missing people, pets and document files in a more efficient way. Sections like news, dynamic se...Show More
A Bayesian Attack Graph (BAG) is an essential model for red teams in cyber security to detect the most vulnerable components of a system. It is a probabilistic graphical model in which each node is initially assigned a probability value called local probability. For realistic and better analysis of BAGs, it is essential to evaluate local probabilities precisely. For that purpose, in this paper, we...Show More
With the rapid development and progress of the Internet of Things and artificial intelligence, more and more businesses have combined housing with emerging technologies to create smart homes to improve residents' quality of life. Many services similar to the three major application scenarios of 5G will be applied to different smart devices in future smart homes. Therefore, the overall network traf...Show More
Network functionalities in conventional computer networks have been facilitated by implementing hardware middle-boxes. However, with the introduction of Virtualized Network Functions (VNFs) technologies, Cloud Service providers (CSPs) are able to offer VNFs as services to clients, along with general virtualized applications. CSPs provision and allocate resources to the VNFs, as required by the cli...Show More
Smart homes provide users with a more convenient, comfortable, and safe living environment through various automation equipment, high-tech home appliances, and network services. With the development of the Internet of Things and widespread smart home, there are many Internet-enabled services in smart homes. Each kind of service has distinct service quality requirements. Remote disaster warning and...Show More
This paper presents an efficient color based tracking method applied on a sequence of live video frames for use in real time applications such as surveillance, video conferencing, and robot navigation. The proposed integrated system architecture consists of an attached camera that communicates with the FPGA through HDMI interface. The deployed computer vision algorithm in the FPGA can capture vide...Show More
The accelerated spread of the COVID-19 (coronavirus) disease has put stress on healthcare systems. Some safety measures are provided, such as keeping social distance and wearing a mask, which can help curb transmission and save lives. This paper aims to detect whether a person is wearing a mask or not with video surveillance to enforce health and safety regulations in real-time. We propose a solut...Show More
In this paper, we developed an active learning model for seagrass detection in Landsat-8 satellite images. We first trained a patch-based deep convolutional neural network (DCNN) model using domain experts labeled region of interest (ROIs) in the images as ground truth. We then applied the trained DCNN model to a whole image to produce a pixelwise classification. Finally, we sampled large patches ...Show More
Marine surveillance deals with the complex problem of modeling and estimating natural and human processes while operating with limited information acquisition resources. The complexity of the problem and the scarcity of resources, such as power, processing, and communications, requires agile distributed sensing and computing that provides scalability, diversity in information acquisition, and adap...Show More
Due to the variety of underwater object species and small object, the traditional object detection model is difficult to adapt to underwater object detection in accuracy and real-time. In this paper, a lightweight detection model FL-YOLOV3-TINY is proposed, which improves the detection accuracy and real-time performance while shrinking the model size. In FL-YOLOV3-TINY, first, the model reduces th...Show More
The hand gesture recognition technology brought a new era to the artificial intelligence branch of human-computer interaction. This initiative will nevertheless provide a more natural and dynamic form of communication by use of gestures. The gesture is made by the user who is detected by the machine via the image processing and the operation unique to the machine is carried out, thereby eliminatin...Show More
Skin cancer is very dangerous and deadly diseases in today's world. Between Malignant and Benign skin cancers, Malignant is the deadliest and Benign is curable. Due to the significant growth rate of Malignant and Benign skin cancer, its high treatment costs, and the mortality rate, the need for early detection of skin cancer has been increased. In most cases, these cells are manually identified an...Show More
Technology and law enforcement are now commonly used hand in hand to improve public safety. Most police departments only use CCTV cameras at a few major intersections for remote surveillance. The public is waiting too long for emergency response lines, therefore using new technologies to improve the current policing system has become one of the police's main goals. The paper presents a coordinated...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2021 IEEE 12th Annual