30-31 Oct. 2018
Filter Results
-
[Front matter]
Publication Year: 2018, Page(s):i - xxv
|
PDF (2824 KB)
-
Building for Cognitive and Social Training Personalized and Intelligent Accessible Interfaces
Publication Year: 2018, Page(s):1 - 4The main objective of the project is to employ innovative technological advancements merged with evidence-based practices in order to teach, improve and generalise social skills for children with neurodevelopmental disorders, specifically children with High Functioning Autism as well as children with Attention Deficit Disorder. BrightBRAINs aims to teach core social skills necessary to improve soc... View full abstract»
-
NutritionBuddy: a Childhood Obesity Serious Game
Publication Year: 2018, Page(s):5 - 8Childhood obesity is a public health challenge which is associated with eating disorders and causes crucial long-term health effects. Therefore, there is a necessity for an innovative approach for preventing and treating childhood obesity. Serious games for health are designed to entertain players while attempting to convey serious content, promote and facilitate learning, and try to modify some a... View full abstract»
-
A Cloud Computing Platform for the Holistic Approach to the Needs of Children and Their Families in Natural Disasters Incidents
Publication Year: 2018, Page(s):9 - 15The main objective of our proposed system is to employ cloud computing technology in order to develop a platform for comprehensive management of natural disasters. More specifically, the platform will pertain to the natural disasters of flood, extreme storms and earthquake, which occur most commonly in Europe. The platform will promote a holistic management approach, in the way of addressing issue... View full abstract»
-
Interactive Voice Response Server Voice Network Administration Using Hidden Markov Model Speech Recognition System
Publication Year: 2018, Page(s):16 - 21This paper describes our experience to create a secure Telephony Amazigh Spoken System over the network. The designed system was created by combining HMM automatic speech recognition and IVR technologies. It allows the user to control from distance the security network and backup system using his voice to network tasks administration managing and his biological voiceprint for security identificati... View full abstract»
-
A Proposal of Blockchain-Based Electronic Voting System
Publication Year: 2018, Page(s):22 - 27The Estonian electronic voting system which is a leading electronic voting system still suffers from universal verifiability issues and may need improvement of its availability. To solve the problems, in this paper we propose a blockchain-based electronic voting system. A blockchain is a distributed database, where the complete data is shared among all participants in the network. A blockchain sys... View full abstract»
-
An Efficient New Cohesion Indice Based on the Quality Measure of Association Rules
Publication Year: 2018, Page(s):28 - 35$M_{GK}$ This article shows us a new algorithm for extracting valid association rule (AR) based on MGK, to allow the construction of a new cohesion indice as a masterpiece of an implicative and cohesitive hierarchical classification (ICHC). The objective is to shed light on the values of the AR-supports valid based on MGK and to show some properties of the said new cohesion. View full abstract»
-
Comparative Study of Popular Cryptographic Techniques
Publication Year: 2018, Page(s):36 - 43In computer network, information has been broadly exchanging over the communication system but the security over the communication system is not very sufficient and the data can be breached by interceptors. To provide security over the communication system, cryptography technique is used. In this process, the primary information is changed over into jumbled data with the help of key. DNA cryptogra... View full abstract»
-
Logistics and Supply Chain Analytics: Benefits and Challenges
Publication Year: 2018, Page(s):44 - 50With the aim of reviewing and characterizing the potential use of supply chain and logistics analytics. The present paper uses a systematic literature review (SLR) to describe the budding area of big data analytics (BDA) in logistics supply chain management (SCM), provide the benefits, summarize an architectural framework and methodology, give and present examples from industrial case studies revi... View full abstract»
-
Health Management for Sustainable Development
Publication Year: 2018, Page(s):51 - 56Digital Health Care brings not only advantages but also increasing of social-economic gap between developed and poor countries. Revenue could gain only some number of countries, which will get the more attractive position at global market of trans border online patient-doctor communications. The global competition boosts a digital Health Care market in every country to be always at the “edge” of i... View full abstract»
-
News Credibility Measure Utilizing Ontologies & Semantic Weighing Schemes (NCMOSWS)
Publication Year: 2018, Page(s):57 - 64The media news sources have increased dramatically. This brings to the service news credibility issue which emerges to become one of the most important issues concerning assessment of news items with respect to either the news editors' personnel or the readers of news items. We tried to measure news credibility via machine and introduce a novel approach via building NCMOSWS; a model that utilizes ... View full abstract»
-
Network Optimization Through Traffic Patterns and Efficient Bandwidth Consumption in Large DCN
Publication Year: 2018, Page(s):65 - 71This paper presents large-scale analysis of traffic patterns in eighteen data centres (DCs). Data centre network (DCN) design emerges with improved architecture, as very little real information is available on existing DC traffic and characteristics. We analyzed traffic patterns of different organizations operating diverse applications. Data gathered for this analysis is over a time span of one ye... View full abstract»
-
Training Software Apparatus for a Plasma Physics Course
Publication Year: 2018, Page(s):72 - 77The article presents high school educational tool generating problems for a test work on plasma chemistry courses based on the Algorithm for a wave functions fast calculating in the central field aproximation for many-electron atoms based on an iterative procedure similar in ideology to the Hartree-Fock method is described as well as the interface of the resulting task generating program. The work... View full abstract»
-
IoT Infrastructure Secured by TLS Level Authentication and PKI Identity System
Publication Year: 2018, Page(s):78 - 83Internet of Things (IoT) networks continuously connect devices and provide environmental information, offering new possibilities for business and personal life. The need for security has never been greater in such ecosystems due to the fast expansion registered lately. The paper proposes a Public Key Infrastructure (PKI) authentication model for IoT networks which provides trust and full control o... View full abstract»
-
Archain: a Novel Blockchain Based Archival System
Publication Year: 2018, Page(s):84 - 89In this paper, we present a novel archival system called ARCHAIN, developed for the State Archive-keeping Committee of the Republic of Tatarstan (Russia). Blockchain is the principal part of the system, which stores transactions (facts of transfer of documents to the archive) in a protected form. The developed system uses a permissioned blockchain model due to the customer's requirement for the pr... View full abstract»
-
Continuous User Authentication in Mobile Phone Browser Based on Gesture Characteristics
Publication Year: 2018, Page(s):90 - 95Conventional authentication methods like passwords, PINs, graphical keys do not provide the required level of security. Those authentication methods might be defeated by peeping or using keyloggers to reveal PINs and passwords. Using authentication by fingerprint also could be vulnerable in case an intruder seizes mobile phone after an authentication procedure. Due to that weakness of static mobil... View full abstract»
-
A Review of Nonlinear Image-Denoising Techniques
Publication Year: 2018, Page(s):96 - 100This paper discusses different nonlinear techniques for removing noise from images; i.e., image denoising. These techniques differ in terms of algorithm design, purpose, effectiveness, and efficiency. In this paper, different denoising techniques are described briefly where their advantages and disadvantages are discussed. The performances of these techniques are analyzed and compared according to... View full abstract»
-
Sea and Ship Waves Spectrum Measurement Using Wireless Sensor Network in Java Sea
Publication Year: 2018, Page(s):101 - 104There are many potential applications using floated Wireless Sensor Network (WSN), such as sea surveillance and ship detection. To detect ship existence, we may observe the ship from its waves. In this paper, we develop a framework using WSN to measure sea and ship waves. The framework consists of hardware and software components. We use accelerometer and Arduino Uno for hardware. We design and im... View full abstract»
-
Blockchain-Based Smart Contracts for Sustainable Power Investments
Publication Year: 2018, Page(s):1 - 8Proposed is a communication system, integrating a distributed ledger with ambient intelligence and a data fusion scheme. It introduces a clear distinction between the financial profitability of investment projects and their contribution to environmental sustainability while ensuring performance measurability and flexibility for both aspects of project management as well as the possibility to trade... View full abstract»
-
Decentralized e-Health Architecture for Boosting Healthcare Analytics
Publication Year: 2018, Page(s):113 - 118In this paper, we present an overview of the problems associated with the analysis and security of medical data and offer a solution that will provide the basis for improving the quality of medical services. We propose the architecture of a decentralized health data ecosystem based on a blockchain that will allow us to operate with vast volumes of clinical data, while also protecting confidential ... View full abstract»
-
State of the Art in Artificial Immune-Based Intrusion Detection Systems for Smart Grids
Publication Year: 2018, Page(s):119 - 126This paper gives a survey of the state of the art in research considering artificial immune-based intrusion detection systems for smart grids. We considered publications of the last five years (2013-2018). The paper starts with a short introduction to the smart grid and artificial immune systems before presenting the noteworthy publications relevant to artificial immunity of smart grids. Finally w... View full abstract»
-
Performance Analysis of Petal Ant Routing (PAR) and Dynamic Source Routing (DSR) in MANET Using Network Simulator (NS2)
Publication Year: 2018, Page(s):127 - 132The system in which wireless device self configure, establish and communicate from one end to the other using wireless channel with no existing fixed network is known as Mobile ad hoc network (MANET). The MANET is another varient of Ad-hoc network, which creates short-lived network using wirelss mobile devices. In ddition to MANET, the behaviour of this kind of temporary networks depends on routin... View full abstract»
-
Smart Contract Based Multi-Party Computation with Privacy Preserving and Settlement Addressed
Publication Year: 2018, Page(s):133 - 139While the multiple party computation (MPC) has been suggested for over two decades, we still have not witnessed implementations that make MPC or its derivates deployed in a palpable reality. Difficulties stem from serial security and trust issues, typically expressed in data leakage, lazy calculation, and deny of payment etc. Many solutions rely on a third party to organize parties co-working, how... View full abstract»
-
The Use of 5G Mobile Technology in Creating a Sustainable Society: A Systems Engineering Approach
Publication Year: 2018, Page(s):140 - 144This paper proposes a systems engineering framework approach regarding the role of the fifth-generation (5G) technology system in creating a sustainable society. The basic concept of this study was developed from the world view that supports the treatment of the 5G system as a key enabler of innovations that run on the principle of sustain ability. This article is composed of three viewpoints that... View full abstract»
-
Intentional Collisions for Preventing Illegal Overhearing by Eavesdropper Node in Wireless Sensor Networks
Publication Year: 2018, Page(s):145 - 150In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes themselves forward the data messages. Each intermediate wireless sensor node broadcast data messages in its wireless transmission range to forward them to... View full abstract»
Abstract