Click - icsst 2015

Conference Schedule
2015 Portsmouth Conferences
Portsmouth, UK
January 15-16, 2015
2015 International Conference on Knowledge
(ICK 2015)
20154th International Conference on Network and Computer Science
(ICNCS 2015)
2015
4th
International Conference on Security Science and Technology
(ICSST 2015)
Conference Schedule
This conference is made possible with the support of
Welcome to 2015Portsmouth Conferences
1
Conference Schedule
The American Society for Research (ASR) welcomes you to attend ASR 2015 conferences in beautiful and
historic Portsmouth!
Each year, ASR endeavors to provide a perfect balance between professional and personal development. We
hope that over the 2 days your work and that of your institution or company will be enhanced both by what
you learn and those with whom you connect. Our field is enriched by the dialogue among colleagues from
around the world which occurs during presentation sessions as well as informal conversations.
We hope this is a memorable, valuable, and enjoyable experience!
Table of Contents
Items
Welcome
Table of Contents
Announcement
General Conference Information
Instructions for Oral Workshop
Conference Keynote Speakers
Conference Schedule
Session 1
Session 2
Hotel Information
Coming Conferences
Pages
2
2
3
4
4
5-6
7-8
9-12
13-17
18
19-25
2
Conference Schedule
ANNOUNCEMENT
*ICK 2015 conference papers will be published in International Journal of Knowledge Engineering (ISSN:
2382-6185).

Indexed by Elsevier: Google Scholar, DOAJ, Engineering & Technology Digital Library, Crossref,
ProQuest.
*ICNCS 2015 conference papers will be published in International Journal of Future Computer and
Communication (ISSN: 2010-3751).

Indexed by Elsevier: Google Scholar, Engineering & Technology Digital Library, and Crossref, DOAJ,
Electronic Journals Library, EI (INSPEC, IET).
*ICSST 2015 conference papers will be published in International Journal of Engineering and Technology
(ISSN: 1793-8244).

Indexed by Elsevier: Chemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital
Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library,
Index Copernicus, EI (INSPEC, IET)..
A best presentation will be selected from each session, announced and award a certificate at the
end of session
3
Conference Schedule
General Conference Information
Take a look at 2015 Portsmouth conferences offer you...
•
There are 2 sessions, on topics as Security Science and Technology and Network and Computer
Science.
•
Inspiring and thought-provoking keynote presentations from Prof. BRANISLAV VUKSANOVIC and Dr.
Violeta Holmes (see page 5-6 for details on the keynote speakers)
•
Plenty of opportunities to network and forge connections with your fellow attendees from across the
globe, including Keynote Speech Session and Oral presentation Sessions.
•
Explore the rich and colorful attraction in Portsmouth.
Instructions for Oral Workshop
Devices Provided by the Conference Organizer:
• Laptops (with MS-Office & Adobe Reader)
• Projectors & Screen
• Laser Sticks
Materials Provided by the Presenters:
• PowerPoint or PDF files
Duration of each Presentation (Tentatively):
• Regular Oral Session: About15 Minutes Presentation including 3 Minutes of Q&A
• Keynote Speech: 40 Minutes of Presentation including 5 Minutes of Q&A
4
Conference Schedule
Conference Keynote Speakers
Prof. BRANISLAV VUKSANOVIC,
University of Portsmouth, Portsmouth, UK
Branislav Vuksanovic was born in Osijek, Croatia in 1962. He graduated from the University of Belgrade,
Serbia with degree in Electrical and Power Engineering. He holds MSc degree in Measurement and
Instrumentation from South Bank University, London and a PhD in Active Noise Control from the
University of Huddersfield, UK.
Previously, he worked as a Project Engineer for Croatian Electricity Board in Osijek, Croatia. During his
academic career he worked as a Research Fellow at Sheffield and Birmingham Universities on Optical
Brain Imaging and Medical Video Compression projects. He also worked as a Lecturer at the University of
Derby where he was a member of Sensors and Controls Research Group. Currently he works as a Senior
Lecturer at the University of Portsmouth, School of Engineering. He has published papers in the field of
active noise control, biomedical signal processing and pattern recognition for intrusion detection and
knowledge based authentication. He also published one book in Digital Electronics and Microcontrollers
field.
Dr Branislav Vuksanovic is a member of IET, ILT and IACSIT. His current research interests are in the
application of pattern recognition techniques for power systems and analysis of ground penetrating radar
and ECG data.
5
Conference Schedule
Dr. Violeta Holmes,
University of Huddersfield, UK
DrVioleta Holmes leads the High Performance Computing (HPC) Research Group at the University of
Huddersfield. Her research interests and expertise are in the areas of HPC systems infrastructure,
computer clusters, grids, cloud computing, intelligent agents, and embedded systems. She was awarded
the status of Chartered Engineer (IET) and Fellowship of Higher Education Academy and is a member of
the British Computer Society (BCS) and the Institute of Engineering and Technology (IET).
She joined the School of Computing and Engineering at the University of Huddersfield in 2007as a senior
lecturer in embedded system and digital signal processing, parallel computer architectures, computer
clusters and grids.
In 2010 she co-founded the HPC Research Group which aims to promote the links between high
performance computer users, developers and researchers across various research groups and institutes
at the University of Huddersfield, and throughout the UK and internationally. Under her leadership, the
HPC Research Group was instrumental in establishing collaboration between the University of
Huddersfield and the Science and Technology Facilities Council (STFC) Daresbury Laboratory. Since
2012 she has been working with 3M Buckley Innovation Centre at the University of Huddersfield in
deploying HPC research and development facilities (Iceotope system) for SMEs and industry. She is
currently working on TSB (Innovate UK) funded Energy Efficient Computing project – collaboration
between the University of Huddersfield and Tectre Enterprise Solutions.
DrVioleta Holmes obtained her degree in Electronics and Physics from the ETF Electronic and Technical
Physics Faculty, University of Belgrade, Yugoslavia (Serbia). She continued her postgraduate studies in
the UK and completed an MSc in Control Engineering from Bradford University, followed by a PhD from
the University of Huddersfield in the application of artificial intelligence in distributed computer control. Her
career in Higher Education, as a researcher and lecturer in computing and engineering, spans over 25
years
6
Conference Schedule
Conference Schedule
Day 1, Thursday, January 15, 2015– Onsite Registration Only
Registration: Hall
09:30am-12:00pm
14:00pm-17:00pm
Arrival, Registration and Conferencematerials collection
**Certificate for Participation can be collected at the
registration counter**
Day 2, Friday, January 16, 2015
Simple Version:
Conference Room 1
10:00a.m.-12:00a.m.
10:00am-10:05am

Opening Remarks
Keynote Speech I:
Dr. Violeta Holmes,
10:05am-10:50am
University of Huddersfield, UK
Morning
10:50am-11:10am
Coffee Break
Keynote Speech II:
Prof. BRANISLAV VUKSANOVIC,
11:10am-11:55am
University of Portsmouth, Portsmouth,
UK
11:55am-12:00am
Plenary Photo
Lunch
12.00pm-13:00pm
Conference Room 1
7
Conference Schedule
13:00pm-15:15pm
Session 1
15:15pm-15:35pm
Coffee break
15:35pm-18:05pm
Session 2
Full Schedule:
Conference Room 1
Plenary Speech+ Plenary Photo
10:00a.m.-12:00a.m.
10:00am-10:05am

Opening Remarks
Keynote Speech I:
10:05am-10:50am
Dr. Violeta Holmes,
University of Huddersfield, UK
Morning
10:50am-11:10am
Coffee Break
Keynote Speech II:
11:10am-11:55am
Prof. BRANISLAV VUKSANOVIC,
University of Portsmouth, Portsmouth,
UK
11:55am-12:00am
Plenary Photo
Lunch
12:00pm-13:00pm
8
Conference Schedule
Afternoon
Authors’ Oral Presentation
13:00pm-15:15pm
Session 1(SALON TERRAZA)
Security Science and Technology
Session Chair:
ST005
A Method for Shellcode Extraction from Malicious Document Files using Entropy
and Emulation
KazukiIwamotoand Katsumi Wasaki
Secure Brain Corporation,Japan
Abstract—We propose a method for the dynamic analysis of malicious documents
that can exploit various types of vulnerability in applications. Static analysis of a
document can be used to identify the type of vulnerability involved. However, it
can be difficult to identify unknown vulnerabilities, and the application may not be
available even if we could identify the vulnerability. In fact, malicious code that is
executed after the exploitation may not have a relationship with the type of
vulnerability in many cases.In this paper, we propose a method that extracts and
executes “shellcode”to analyze malicious documents without requiring identification
of the vulnerability or the application.Our system extracts shellcode by executing
byte sequences to observe the features of a document file in a priority order decided
on the basis of entropy.Our system was used to analyze 88 malware samples and
was able to extract shellcode from 74 samples.Of these, 51 extracted shellcodes
behaved as malicious software according to dynamic analysis.
ST012
Index Terms—Malware, Shellcode, Entropy, Dynamic Analysis, Vulnerability
Wavelet Based Color Steganography
AnushKolakalur, IoannisKagalidis, BranislavVuksanovic
University of Portsmouth, UK
Abstract—This paper describes the algorithm developed with the aim to hide
a“secret” color video sequence within anothercolor video sequence. An approach to
apply a wavelet transform in order to decompose the cover video sequenceand then
replace the less significant wavelet bandwith“secret” video frames has been
implemented and tested. On the receiver side, process is reversed and the
hiddencolor video recovered from stego color video.Proposed algorithm has been
implemented usingMatlab and PSNR and MSE error metrics employed to evaluate
the quality of both video sequences.
K02
Index Terms—(DWT) discrete wavelets transform, LSB, PSNR, and Steganography
Improving Recommendation using Trust and Sentiment Inference from OSNs
Dimah Hussain Alahmadi and Xaio-Jun Zeng
9
Conference Schedule
University Of Manchester, UK
Abstract—Recommender systems (RSs) provide personalised suggestions of
information or products relevant to users’ needs. Although RSs have made
substantial progresses in theory and algorithm development and have achieved many
commercial successes, how to utilise the widely available information in Online
Social Networks (OSNs) has been largely overlooked. Noticing such a gap in the
existing research in RSs and taking into account a user’s selection being greatly
influenced by his/her trusted friends and their opinions, this paper proposes a
framework of Implicit Social Trust and Sentiment (ISTS) based RSs, which
improves the existing recommendation approaches by exploring a new source of
data from friends’ short posts in microbloggings as micro-reviews. The impact
degree of friends’ sentiment and level being trusted to a user’s selection are
identified by using machine learning methods including Naive Bayes, Logistic
Regression and Decision Trees. As the verification of the proposed framework,
experiments using real social data from Twitter microblogger are presented and
results show the effectiveness and promising of the proposed approach.
K04
K05
Index Terms—Recommender systems, machine learning, trust, sentiment analysis,
microblogging.
Proposal of Chance Index in Co-occurrence Visualized Network
Yukihiro Takayama and Ryosuke Saga
Osaka Prefecture University, Japan
Abstract—This study describes a chance discovery method for network that
usebetweeness centrality and similarity. In prior research of chance discovery, in the
chance discovery process, it is required that analysts infer chance from visualized
network, because it is difficult that to solve problem like to guess the cause from the
data such as non-parametric problem. However, this reasoning process has problem
that chance discovery is difficult because chance discovery depends on experience
or background knowledge of analysts. Therefore, to solve this problem, we pay
attention the mathematical element with the network, and propose chance index that
is index of network. Chance index have three calculation methods: the sum of the
reciprocal, the product of the reciprocal, and the average reciprocal. Using the
proposal method on three kinds of data, results show that proposal method is useful
method and chance index that use average reciprocal is most useful calculation
method.
Index Terms—Network analysis, betweenness centrality, chance discovery, data
mining
Mining customer feedback documents
Eduard Alexandru Stoica and Esra Kahya Özyirmidokuz
“Lucian Blaga” University of Sibiu, România / Erciyes University, Turkey
Abstract—Managing customer feedback data has become a necessity for firms in
order for them to gain competitive advantage in the sector. Analyzing customer
complaints’ data to find useful information that’s hidden is an important step in
understanding customers. This important, hidden knowledge must be extracted
automatically to allow firms to gain a better understanding of the general market and
of their own and their competitors' customers. A firm can learn the needs of
customers and show how its products and services satisfy these needs by analyzing
10
Conference Schedule
these documents.
The aim of this research is to summarize and extract data from unstructured
customer feedback documents which are about ignoring subscriptions to a
telecommunication firm in Turkey. The data are transformed to a collection of
documents by generating a document for each record. Text processing techniques
are applied. Cosine similarity analysis is used to classify documents into relevant
categories. Clusters are determined.
K302
CS011
Index Terms—Data mining, text mining, customer feedback data, natural language
processing
Spray Characteristics and Wall Impingement of Diesel-CNG Dual Fuel Jet Using
Schlieren Imaging Technique
Mhadi A. Ismael, M. R. Heikal, and M. B. Bahroom
University of Bahri, Sudan
Abstract—Natural gas for direct-injection (DI) compression ignition (CI) engines is
considered to be the best optimized method due to its high volumetric efficiency,
high thermal efficiency and low emissions. However, CNG has the penalty of high
auto-ignition temperature and lower cetane number. An effective way to use CNG in
CI engines is to inject the CNG with a pilot of diesel fuel for ignition purposes. This
research is an experimental investigation of the direct injection of CNG jet, diesel
spray and combination of fuels (i.e. natural gas with pilot of diesel fuel) in a constant
volume chamber using an optical method. The jets were created using two parallel
injectors. A low pressure CNG injector (electronic) was used at different injection
pressures ranging from 14 bar to 18 bar, while a diesel sprayed injector was used for
a high pressure common rail injector ranging from 500 to 700 bar. The Schlieren
technique was used for flow visualization and a high speed video camera was used
for image acquisition. Series of images of a jet at different time intervals from the
beginning of the injection were taken to determine the macroscopic characteristics
such as jet penetration rate, jet cone angle and jet tip velocity. The jet radial and
height travel along the wall under different injection pressures and temperatures
were also measured. Image processing software was developed and used for the
analysis.
Index Terms—CNG, Diesel-CNG dual fuel, spray wall impingement, schlieren,
image processing.
Enhanced Timing-sync Protocol for Sensor Networks
Shi-Kyu Bae
DongYang University, South Korea
Abstract—The prominent time synchronization protocol for wireless sensor
networks (WSN), Timing-sync Protocol for Sensor Networks (TPSN), was
developed to provide high synchronization accuracy among nodes. Until now,
TPSN’s approach has been adopted in many other WSN synchronization schemes.
However, TPSN has some room for improvement. First, performance of TPSN
depends on the efficiency of the hierarchical structure, which requires more efficient
structure construction. Secondly, level discovery process is done only once. So, if
one of the nodes that were deployed in the middle of the network dies due to power
exhaustion, network-wide synchronization will fail.
In this paper, I propose a new tree construction algorithm for TPSN, which has
11
Conference Schedule
low complexity and gives better efficiency to TPSN’s synchronization process. In
addition, tree constructions are performed many times fully or partially depending
on network states. The proposed method’s performance has been evaluated by
simulation. The results are shown to be better than the original method used in
TPSN.
CS014
CS306
Index Terms—Time Synchronization, TPSN, Wireless Sensor Network, Tree
Construction.
Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing
Protocols Using OPNET
Adel Aneiba and Mohammed Melad
Benghazi University, Libya
Abstract—Routing is a critical issue in MANET and therefore, this is the focus of
this paper, along with the performance analysis of its routing protocols. In this paper
the performance of four MANET routing protocols (AODV, DSR, OLSR and GRP)
are compared. To evaluate and validate the performance of these protocols, a
feasibility study in the form of simulations were carried out. In these experiments,
the four protocols were tested under different scenarios and circumstances using a
simulation tool called OPNET. The performance of these routing protocols is
analyzed based on two performance metrics: delay and throughput. The simulation
results have shown that on average, under heavy FTP traffic condition, the OLSR
protocol outperforms the other three protocols with respect to the mentioned metrics
under two scenarios (20 and 80 mobile nodes) that have been created in OPNET.
Index Terms—FTP, MANET, OPNET, routing protocols.
Cloud Computing: A Detailed Relationship To Grid and Cluster Computing
Ikechukwu Nwobodo
Typical Systems Ltd, UK
Abstract—Cloud computing continues to maintain a rapid growth while constituting
a viable alternative to conventional computing. Cloud computing is an emerging
business computing model that enable users access to IT resources via internet
infrastructure at any PC connected node across the globe without hardware
constraints. Cloud computing concept is a development trend based on several
successful researches in computing areas such as virtualization, grid computing,
cluster computing and distributed computing. Cloud, cluster and grid computing
share some common features towards achieving utility or service oriented computing
although marginal differences exist on their processes and approaches in many ways.
This paper will be exploring the evolutionary relationships in terms of features and
component of cloud computing technological innovation in comparison to cluster
and grid computing.
Index Terms—Cloud computing, grid computing, cluster computing, utility
computing
12
Conference Schedule
Coffee Break
15:15pm-15:35pm
Afternoon
Authors’ Oral Presentation
15:35pm-18:05pm
Session 2(SALON TERRAZA)
Network and Computer Science
Session Chair: Assoc. Prof. Ryosuke Saga, Osaka Prefecture
University, Japan
CS101-P1
CS003
Study of Early Warning of Copyright Infringement Risks in Information Resources for
presenter only
Wende Zhang, Chan Li and Yixin Lan
Fuzhou University, China
Abstract–The main aim of this study is to assess the potential copyright infringement
risks (CIR) in information resources by using the extension theory. At first, the analytic
hierarchy process (AHP)is employed to determine the weights of the existing early
warning indicators system. Secondly, a modelis built based on the extension theory to
evaluate the potential CIR in information resources. Finally, a real-world application is
presented to show the effectiveness and usefulness of our approach. The main findings of
this study are as follows: (1) the early warning extension theory model is effective in
distinguishing the degree of the potential CIR in information resources; (2) the
information resources of XX University is identified as located in the non-warning level,
which meaning there is only a slim chance of infringing copyright. This paper introduces
the extension theory into the evaluation of the potential CIR in information resources.
The results contribute to providing decision support for the decision maker in handling
the potential CIR in information resources.
Index Terms—Information resources, Copyright Infringement risks, Early warning,
Extension theory
The Acceptance of Educational Data Mining Technology among Students in Public
Institutions of Higher Learning in Malaysia
Muslihah Wook, Zawiyah M. Yusof and Mohd Zakree Ahmad Nazri
National Defence University of Malaysia, Malaysia
Abstract—Accepting the emergence of data mining technology by students is crucial to
the successful implementation of the technology in education institutions. Although
previous studies have empirically show the result of acceptance or adoption of data
mining technology in numerous fields, however, they are focused at organisational-level.
Hence, there is a need to explain what are the determinants could influence the
acceptance of data mining technology at individual-level since they are the most affected
by the technology. Therefore, this study adapts selected constructs in the Technology
13
Conference Schedule
Acceptance Model 3 (TAM3) to conceptualise the research problem, namely in terms of
perceived usefulness, perceived ease of use, relevance for analysing, anxiety of
educational data mining technology, self-efficacy and facilitating conditions. To examine
the model, this study surveyed 158 students from four public Institutions of Higher
Learning in Malaysia. Pearson product-moment correlation coefficient is utilised to
analyses the relationship between the constructs. The findings have revealed that most of
the constructs have a high level of correlation.
K07
K201
CS005
Index Terms—Acceptance, data mining, educational data mining, institutions of higher
learning (IHLs), technology acceptance model 3 (TAM3).
Factor Analysis for Game Software Using Structural Equation Modeling with
Hierarchical Latent Dirichlet Allocation in User’s Review Comments
Rikuto Kunimoto, Hiroshi Kobayashi and Ryosuke Saga
Osaka Prefecture University, Japan
Abstract—While the market investigation is important in game software development,
there is a problem that there is no effective way to pursue the factor of user's software
evaluation. In this research, we paid attentions to corpus (electric existence of
documents) considered that the factor relationships about the user's evaluation were
expressed potentially as their opinions. As the way to achieve this idea, we tried to
extract useful knowledge by using SEM and topic model for visual and quantitative
analysis process. As the related work, there are several researches about Game software
market using text mining methods (LSI, or LDA). However, they have the problem
concerning to objectivity or explanations because the relationships between topics are not
defined based on technical algorithms and expressed only as the frequency of the words
that constructs the topics. Experimental results showed that our proposal process can
extract effectively the topics that users pay attentions when they evaluate the game
software and we can interpret it.
Index Terms—Causal Analysis, factor expression, game software, structural equation
modeling, topic model, hierarchical latent dirichlet allocation.
Youth Knowledge on the Law of Youth Development in Malaysia
Asmah Laili Yeon, SitiAlida John Abdullah, Rozita Arshad, Zainal Amin Ayub, Alias
Azhar, SafiahSuhaimi, Tuan Nurhafiza Raja Abdul Aziz
College of Law, Government and International Studies, Universiti Utara Malaysia
Abstract—This paper examines youth knowledge on the law of youth development in
Malaysia. Knowing the law is an added value to youth because they can assist the
government in developing youth programmes and activities. This study is a socio-legal
study. A survey has been conducted among youth in Malaysia to investigate their
awareness on the law of youth development. 267 youths has responded to the survey. The
findings show that about 70% of respondents agree that Malaysia has laws which protect
the interest of youth. However, less than 50% of respondents have knowledge that
about the Youth Societies and Youth Development Act 2007 which states main policies
relating to youth development. The overall finding shows that less than 60% respondents
are aware about youth policy. It is suggested that more promotion and activities be
initiated to improve awareness concerning law and regulations among youth in Malaysia.
Index Terms—Knowledge, youth law, youth policy, awareness
Evaluation of the Energy Impact on Indoor Small Cells and Backhaul
14
Conference Schedule
Moraes A. R. L., Farias F. S., Costa J. C. W. A
Federal University of Para, Brazil
Abstract—The use of heterogeneous networks, based on the macro and small cells
composition, significantly reduces the power consumption in wireless networks. On the
other hand, the implementation of the backhaul infrastructure responsible for ensuring
communication and traffic support generated by the small cells causes a reverse
regarding to the electric energy consumption. Thus, this study presents a model of
predicting traffic for the next 15 years, from 2015 to 2030, aiming to define the energy
impacts of using small cells for indoor coverage. Furthermore, this study shows the
discretized impact of each backhaul structure component in the growth of electric energy
consumption.
CS006
CS015
CS016
Index Terms—Backhaul, energy efficiency, small cells, traffic model.
An Energy Efficiency Assessment for Indoor Small Cells using Copper-based Backhaul
Moraes A. R. L., Farias F. S., Costa J. C. W. A
Federal University of Para, Brazil
Abstract—Heterogeneous networks (HetNets) are being adopted as the main alternative
for reducing the energy consumption in wireless network. This adoption forces the
backhaul architectures expansion, and consequently it increases the overall network
energy consumption. In the last years, copper technology has been disregarded to
backhaul indoor small cells. However, lately the copper-based technology turned out as
an effective option due to the femtocelltechnology based on wireless over cable
(FemtoWoC). In this paper, it was assessed two backhaul architectures, using copper in
the last mile, to connect FemtoWoC in the network. It was also evaluated the
energy-effiency achieved compared to the results in scenarios using conventional
femtocells.
Index Terms—Energy Efficiency, Mobile Backhaul, Small Cells.
Effect of Simulation on Students’ Interest in Programming Language in Secondary
Schools in Enugu Education Zone of Nigeria
Rebecca ChinasaOdo, AnicetusIkechukwuOdo
Enugu State University of Science and Technology, Nigeria
Abstract—The researcher investigated the effect of simulation method on students’
interest in programming language in secondary schools in Enugu education zone of
Nigeria using quasi-experimental design. The instrument for data collection was pretest posttest non equivalent control group. The population for the study comprised all senior
secondary school class 2 (SS2) science students in a single sex school in Enugu
Education Zone of Enugu State. Data were collected from a sample of 225 students
selected from four secondary schools two boys’ schools and two girls’ schools. A
reliability coefficient of 0.89 was obtained from the instrument through test retest. Mean
and standard deviation scores were used to answer the research questions, while two-way
analysis of Covariance (ANCOVA) was used to test the hypotheses at 0.05 level of
significant. The findings show that students taught using simulation method achieved
higher than those taught with traditional method. It was recommendations that ministry
of education should revisit the instructional materials used in teaching.
Index Terms—Interest, Programming language, secondary school, simulation.
Automated Water Treatment Alternative for Domestic use in Enugu State of Nigeria
15
Conference Schedule
Anicetus Ikechukwu Odo, Rebecca Chinasa Odo
Enugu State University of Science and Technology, Nigeria
Abstract—Many households in Enugu depend on water sourced from municipal water
system for domestic use, especially for drinking purposes. Unfortunately, this source is
not safe enough for drinking primarily due to poor water distribution network. As water
travels from the Point of Treatment (POT) to the Point of Use (POU), it comes in contact
with numerous contaminants via broken and rusty pipes. This study proposes a system
that reduces or totally eliminates pollutants from domestic water at the point where it is
used. Most of the naturally present pollutants (Bacteria, Viruses, Minerals, Heavy
Metals, etc) are usually removed at the POT but results of tests carried out on water at
various POUs within Enugu show that some levels of pollutants are present (Turbidity of
15 NTU, Colour of 25 units, Trihalomethane of 0.10mg/L, Odour> 3 Threshold). These
values are clearly outside the standards set by the World Health Organisation (WHO) for
household and indeed drinking water [1]. By channelling water through a system of
activated carbon filter, these pollutants are removed at POU. The system is made-up of a
reservoir, filter and dispenser subsystems. Water enters the reservoir from the POT and
from where the filter is fed. The output Water from the filter enters another reservoir
from where it is dispensed. These processes of storage, treatment and dispensing are fully
automated using a microcontroller chip to ensure efficiency and convenience. This study
will be beneficial to the Ministry of water resources and the general public.
CS206
K202
Index Terms—Control, Automation, Filtration, Water, Pollutant
Designing Medical CBIR System with Edge Density Criterion
Kulwinder Singh Mann and Er. Jagbir Singh Gill
PTU Guru Nanak Dev Engineering College Ludhiana, India
Abstract—The Medical Image can be understood by its visual features also known as
image signatures. These features when modified or enhanced under certain geometrical
functions, it improves the resultant retrieval by the increase of 94% in the performance
with the Comparison of 85% in the case of the nearest neighbor and in the case of normal
image Retrieval it comes out to be 75 %. This Research includes the approach of
calculating edge density is applicable for the five human body parts- Hands, Pelvis,
Breast, Brain and Chest and is cam parable to the system in the previous work in
literatures. The Result acquired for the proposed system comprises of edge density
concepts.
Index Terms—Medical images, edge density, geometric feature vector, content based
image retrieval.
Knowledge Management, Innovation and Organizational Performance
Samina Nawab, Tahira Nazir, Muhammad Mohsin Zahid and Syed Muhammad Fawad
COMSATS Institute of Information Technology, WahCantt Pakistan
Abstract—In the 21st century the boundaries of business are expanding everyday and the
management of different portfolios is not an easy task. Organizations are striving for
innovation and to gain a competitive edge. Knowledge Management put emphasis on
particularly this issue. This study has focused on the role of middle management in the
implementation of knowledge management with the help of KM processes and strategies
which eventually leads to innovation. Also the critical success factors of knowledge
management on innovation are discussed in the study. The study concludes that the
Knowledge Management processes which are Knowledge Creation, Knowledge
16
Conference Schedule
organizing, Knowledge Storage , Knowledge Sharing & Knowledge Utilization have
significant but indirect impact on banking industry, and the results showed that these
processes are contributing in the enhancement of innovation in banking industry.
Index Terms—Knowledge Management, Organizational Innovation, Organizational
Performance.
17
Conference Schedule
ConferenceVenue
Holiday Inn Portsmouth
http://www.icncs.org/venue.html
Add: Pembroke Road, Portsmouth, PO1 2TA, United Kingdom
Tel: 44-0871 942 9065
Directions
By Air








Gatwick Airport (LGW)
Distance: 80.0 MI/128.75 KM NORTH EAST to Hotel
Leave M23 at J 8, join M25 leave at J10 at the roundabout take first exit and merge on to A3 signposted Guildford and Portsmouth
Continue on A3 till A27 and take J12 on to M275 follow signs to City Centre and Seafront and the hotel is on the right hand side
Bournemouth International Airport (BOH)
Distance: 50.0 MI/80.47 KM SOUTH WEST to Hotel
Follow signs for M27 East. Leave M27 at junction 12 you will then join M275 which will take you into Portsmouth City Centre.
Follow Southsea signs or seafront, when approaching the sea front hotel is on your next right after the Kings Road roundabout.
Southampton International Airport (SOU)
Distance: 22.0 MI/35.41 KM SOUTH WEST to Hotel
Take M27 eastbound towards Portsmouth
By Train





Station Name: Station - Portsmouth Harbour
Distance: 0.5 MI/0.8 KM WEST to Hotel
Shuttle Charge (one way): £ 5.00 GBP View More
Taxi Charge (one way): £ 5.00 GBP
Bear left onto Saint George's Road at Cambridge Junction roundabout take the 2nd exit onto Museum Road - B2154 signposted Southsea At Kings
Road Roundabout take the 3rd exit onto A288 for Seafront onto the A288 Turn right onto Pembroke Road
18
Conference Schedule
Welcome to American Society for
(www.asr.org) Upcoming Conferences:
DATE
NAME
Research
PAPER WILL BE PUBLISHED BY
All accepted papers of ICMM 2015 will be published
by Applied Mechanics and Materials Journal (ISSN:
1660-9336).
Feb 12-13,
2015
Busan,
South Korea
ICMM 2015
2015
6th
International
Conference on Mechatronics
and Manufacturing
http://www.icmm.org/
ICAEE 2015
2015 the 2nd International
Conference on Advances in
Electronics Engineering
http://www.icaee.org/
ICAPM 2015
2015
5th
International
Conference on Applied Physics
and Mathematics
http://www.icapm.org/
ICMLC 2015
2015
7th
International
Conference
on
Machine
Learning and Computing
http://www.icmlc.org/
Mar19-20,
2015
Florence,
Italy
ICEIT 2015
2015
4th
International
Conference on Educational and
Information Technology
http://www.iceit.org/
19
Indexed by Elsevier: SCOPUS www.scopus.com and
EiCompendex (CPX) www.ei.org. Cambridge Scientific
Abstracts (CSA)www.csa.com, Chemical Abstracts (CA)
www.cas.org, Google and Google Scholar google.com,
ISI (ISTP, CPCI, Web of Science) www.isinet.com,
Institution of Electrical Engineers (IEE) www.iee.org,
etc.
All accepted papers of ICAEE 2015 will be published
by International Journal of Information and
Electronics Engineering (IJIEE) (ISSN: 2010-3719)
Indexed by Google Scholar, Electronic Journals
Library,Engineering&
Technology
Digital
Library,Crossref and ProQuest, DOAJ, Ei (INSPEC, IET).
All accepted papers of ICAPM 2015 will be published
by International Journal of Applied Physics and
Mathematics (IJAPM) (ISSN: 2010-362X)
Indexed by EI (INSPEC, IET),Chemical Abstracts
Services (CAS), DOAJ,Electronic Journals Library,
Engineering & Technology Digital Library, Nanowerk
Database, Crossref, Google Scholar and ProQuest.
All accepted papers of ICMLC 2015 will be published
by International Journal of Machine Learning and
Computing (IJMLC) (ISSN: 2010-3700)
Indexed byEngineering& Technology Digital Library,
Google Scholar, Crossref, ProQuest, Electronic Journals
Library, DOAJ and EI (INSPEC, IET).
All accepted papers of ICEIT 2015 will be published
by Journal of Information and Education Technology
(IJIET). (ISSN: 2010-3689)
Indexed byEI (INSPEC, IET),Cabell's Directories, DOAJ,
Electronic Journals Library, Engineering & Technology
Digital Library, EBSCO, Google Scholar, Crossref and
ProQuest.
Conference Schedule
April 6-7,
2015
Orlando,
USA
ICICN 2015
2015
3rd
International
Conference on Information and
Computer Networks
http://www.icicn.org/
ICFD 2015
2015 International Conference
on Fluid Dynamics
http://www.icfd.org/
ICCEB 2015
2015
4th
International
Conference
on
Computer
Engineering
and
Bioinformatics
http://www.icceb.org/
ICTLE 2015
2015
4th
International
Conference on Traffic and
Logistic Engineering
http://www.ictle.org/
20
All accepted papers of ICICN 2015 will be published
by Journal of Advances in Computer Networks
(ISSN: 1793-8244)
Indexed byEngineering& Technology Digital Library,
EBSCO, DOAJ, Electronic Journals Library, Ulrich's
Periodicals Directory, International Computer Science
Digital Library (ICSDL), ProQuest, and Google Scholar.
All accepted papers of ICFD 2015 will be published
by Applied Mechanics and Materials Journal (ISSN:
1660-9336)
Indexed byElsevier: SCOPUS www.scopus.com and
EiCompendex (CPX) www.ei.org. Cambridge Scientific
Abstracts (CSA)www.csa.com, Chemical Abstracts
(CA) www.cas.org, Google and Google Scholar
google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com, Institution of Electrical Engineers
(IEE) www.iee.org, etc.
All accepted papers of ICCEB 2015 will be published
by International Journal of Engineering and
Technology (IJET) (ISSN: 1793-8236).
Indexed byChemical Abstracts Services (CAS), DOAJ,
Engineering & Technology Digital Library, Google
Scholar, Ulrich Periodicals Directory, Crossref,
ProQuest, Electronic Journals Library, Index
Copernicus, EI (INSPEC, IET).
All accepted papers of ICTLE 2015 will be published
by Journal of Traffic and Logistics Engineering (JTLE)
(ISSN: 2301-3680)
Indexed byUlrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital
Library and Electronic Journals Digital Library.
Conference Schedule
All accepted papers of ICCIT 2015 will be publishedin
the one of the following Journal with ISSN.
Journal of Software (JSW, ISSN 1796-217X)
ICCIT 2015
2015 International Conference
on Computer and Information
Technology
http://www.iccit.org/
International Journal of Computer Theory and
Engineering (IJCTE) (ISSN: 1793-8201)
Indexed byIndex Copernicus, Electronic Journals
Library, EBSCO, Engineering & Technology Digital
Library, Google Scholar, Ulrich's Periodicals Directory,
Crossref, ProQuest, WorldCat, and EI (INSPEC, IET),
Cabell's Directories.
International Journal of Computer and Electrical
Engineering (IJCEE) (ISSN: 1793-8163)
Indexed byUlrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital
Library, Crossref, ProQuest, EI (INSPEC, IET), and
Electronic Journals Library
Lecture Notes on Information Theory (ISSN:
2301-3788)
Indexed by EI(INSPEC, IET), Ulrich's Periodicals
Directory, Google Scholar, EBSCO, Engineering &
Technology Digital Library and etc.
All accepted papers of ICEEE 2015 will be publishedin
the one of the following Journal with ISSN.
Applied Mechanics and Materials Journal (ISSN:
1660-9336)
Indexed by Elsevier: SCOPUS www.scopus.com and
EiCompendex (CPX) www.ei.org. Cambridge Scientific
Abstracts (CSA)www.csa.com, Chemical Abstracts (CA)
www.cas.org, Google and Google Scholar google.com,
ISI (ISTP, CPCI, Web of Science) www.isinet.com,
Institution of Electrical Engineers (IEE) www.iee.org,
etc.
April 28-29,
2015
Ankara,
Turkey
ICEEE 2015
2015
2nd
International
Conference on Electrical and
Electronics Engineering
http://www.iceee.org/
International Journal of Electronics and Electrical
Engineering (ISSN: 2301-380X)
Indexed byUlrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital
Library, etc.
Journal of Automation and Control Engineering
(ISSN: 2301-3702)
Indexed byEI (INSPEC, IET), Ulrich's Periodicals
Directory, Google Scholar, EBSCO, Engineering &
Technology Digital Library and etc.
International Journal of Electrical Energy (ISSN:
2301-3656)
Indexed byEI(INSPEC, IET), Ulrich's Periodicals
Directory, Google Scholar, EBSCO, Engineering &
Technology Digital Library and etc.
21
Conference Schedule
All accepted papers of IOAC 2015 will be published
by Applied Mechanics and Materials Journal (ISSN:
1660-9336)
May 9-10,
2015
Bali,
Indonesia
ICOAC 2015
2015 International Conference
on Automatic Control
http://www.icoac.org/
Indexed byElsevier: SCOPUS www.scopus.com and
EiCompendex (CPX) www.ei.org. Cambridge Scientific
Abstracts (CSA)www.csa.com, Chemical Abstracts (CA)
www.cas.org, Google and Google Scholar google.com,
ISI (ISTP, CPCI, Web of Science) www.isinet.com,
Institution of Electrical Engineers (IEE) www.iee.org,
etc.
All accepted papers of ICMML 2015 will be published
by Advanced Materials Research (ISSN: 1022-6680).
ICMMT 2015
2015
6th
International
Conference on Material and
Manufacturing Technology
http://www.icmml.org/
Indexed byElsevier: SCOPUSwww.scopus.com and
EiCompendex
(CPX) www.ei.org/. Cambridge
Scientific Abstracts (CSA) www.csa.com, Chemical
Abstracts (CA) www.cas.org, Google and Google
Scholar google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com , Institution of Electrical Engineers
(IEE)www.iee.org , etc
All accepted papers of ICRE 2015 will be publishedin
the one of the following Journal with ISSN.
Advanced Materials Research (ISSN: 1022-6680).
ICRE 2015
2015 International Conference
on Reliability Engineering
http://www.icre.org/
Indexed byElsevier: SCOPUSwww.scopus.com and
EiCompendex
(CPX) www.ei.org/. Cambridge
Scientific Abstracts (CSA) www.csa.com, Chemical
Abstracts (CA) www.cas.org, Google and Google
Scholar google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com , Institution of Electrical Engineers
(IEE)www.iee.org , etc
Journal of Engineering and Technology (IJET) (ISSN:
1793-8236).
Indexed byChemical Abstracts Services (CAS), DOAJ,
Engineering & Technology Digital Library, Google
Scholar, Ulrich Periodicals Directory, Crossref,
ProQuest, Electronic Journals Library, Index
Copernicus, EI (INSPEC, IET).
All accepted papers of ICLB 2015 will be published by
Advanced Materials Research (ISSN: 1022-6680).
ICLB 2015
2015 International Conference
on Lithium Batteries
http://www.iclb.org/
22
Indexed byElsevier: SCOPUSwww.scopus.com and
EiCompendex
(CPX) www.ei.org/. Cambridge
Scientific Abstracts (CSA) www.csa.com, Chemical
Abstracts (CA) www.cas.org, Google and Google
Scholar google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com , Institution of Electrical Engineers
(IEE)www.iee.org , etc
Conference Schedule
ICCSN 2015
2015 the 7th International
Conference on Communication
Software and Networks
http://www.iccsn.org/
All accepted papers of ICCSN 2015 will be
publishedin the one of the following Journal with
ISSN.
WIT
Transactions
on
Information
and
Communication Technologies (ISSN: 1743-3517)
Indexed byEICompendex, Scopus and ISI.
Journal of Communications (JCM) (ISSN: 1796-2021;
DOI: 10.12720/jcm)
Indexed
byEICompendex;
SCOPUS;
ULRICH's
Periodicals Directory; Google Scholar; INSPEC; etc.
All accepted papers of ICIIP 2015 will be publishedin
the one of the following Journal with ISSN.
WIT
Transactions
on
Information
and
Communication Technologies (ISSN: 1743-3517)
June 6-7,
2015
Chengdu,
China
ICIIP 2015
2015 the 4th International
Conference
on
Intelligent
Information Processing
http://www.iciip.org/
Indexed byEICompendex, Scopus and ISI.
Journal of Industrial and Intelligent Information
(ISSN: 2301-3745; DOI: 10.12720/jiii)
Indexed by EI(INSPEC, IET), Google Scholar, EBSCO,
Engineering & Technology Digital Library and etc.
All accepted papers of ICWOC 2015 will be
publishedin the one of the following Journal with
ISSN.
WIT
Transactions
on
Information
and
Communication Technologies (ISSN: 1743-3517)
ICWOC 2015
ICDDM 2015
July 2-3,
2015
Chicago,
USA
ICKD 2015
2015 the 4th International
Conference on Wireless and
Optical Communications
http://www.icwoc.org/
The 2015 4th International
Conference on Database and
Data Mining
http://www.icddm.org/
The 2015 4th International
Conference onKnowledge
Discovery
http://www.ickd.org/
23
Indexed byEICompendex, Scopus and ISI.
International Journal of Future Computer and
Communication
(ISSN:
2010-3751;
DOI:
10.7763/IJFCC)
Indexed byGoogle Scholar, Engineering & Technology
Digital Library, and Crossref,DOAJ, Electronic Journals
Library, EI (INSPEC, IET).
All accepted papers of ICDDM 2015 will be published
by WIT Transactions on Information and
Communication Technologies (ISSN: 1743-3517)
Indexed byEICompendex, Scopus and ISI.
All accepted papers of ICKD 2015 will be published
by International Journal of Computer Theory and
Engineering (IJCTE)(ISSN: 1793-8201)
Indexed by Electronic Journals Library, EBSCO,
Engineering & Technology Digital Library, Google
Scholar, INSPEC, Ulrich's Periodicals Directory,
Crossref, ProQuest, WorldCat, and EI(INSPEC, IET).
Conference Schedule
ICOIP 2015
ICROM 2015
The 2015 4th International
Conference onOptoelectronics
and Image Processing
http://www.icoip.org/
2015
2nd
International
Conference on Robotics and
Mechatronics
http://www.icrom.org/
ICAME 2015
2015 the 4th International
Conference on Advances in
Mechanics Engineering
http://www.icame.org/
July 20-21,
2015,
Madrid,
Spain
All accepted papers of ICDDM 2015 will be published
by WIT Transactions on Information and
Communication Technologies (ISSN: 1743-3517)
Indexed byEICompendex, Scopus and ISI.
All accepted papers of ICROM 2015 will be published
by Applied Mechanics and Materials (ISSN:
1660-9336)
Indexed by Elsevier: SCOPUSwww.scopus.com and
EiCompendex (CPX) www.ei.org/. Cambridge Scientific
Abstracts (CSA) www.csa.com, Chemical Abstracts
(CA) www.cas.org, Google and Google Scholar
google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com , Institution of Electrical Engineers
(IEE)www.iee.org , etc
All accepted papers of ICROM 2015 will be published
by Applied Mechanics and Materials (ISSN:
1660-9336)
Indexed by Elsevier: SCOPUSwww.scopus.com and
EiCompendex (CPX) www.ei.org/. Cambridge Scientific
Abstracts (CSA) www.csa.com, Chemical Abstracts
(CA) www.cas.org, Google and Google Scholar
google.com, ISI (ISTP, CPCI, Web of Science)
www.isinet.com , Institution of Electrical Engineers
(IEE)www.iee.org , etc
Submitted conference papers will be reviewed by
technical committees of the Conference. All accepted
papers will be published in one of the following
Journals.
International Journal of Electronics and Electrical
Engineering(IJEEE) (ISSN: 2301-380X)
ICCSS 2015
2015
5th
International
Conference on Circuits, System
and Simulation
http://www.iccss.org/
included in Ulrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital
Library and Electronic Journals Digital Library.
International Journal of Information and Electronics
Engineering(IJIEE) (ISSN: 2010-3719)
included in Google Scholar, Electronic Journals Library,
Engineering & Technology Digital Library, Crossref and
ProQuest, DOAJ, Ei (INSPEC, IET).
24
Conference Schedule
All accepted papers will be published in one of the
indexed Journals after being selected.
International Journal of Computer Theory and
Engineering (IJCTE) (ISSN: 1793-8201)
DOI: 10.7763/IJCTE
Editor-in-Chief: Prof. WaelBadawy
ICCCD 2015
2015 the 5th International
Conference on Computer and
Communication Devices
http://www.icccd.org/
Abstracting/Indexing: Index Copernicus, Electronic
Journals Library, EBSCO, Engineering & Technology
Digital Library, Google Scholar, Ulrich's Periodicals
Directory, Crossref, ProQuest, WorldCat, and EI
(INSPEC, IET), Cabell's Directories.
International
Journal
of
Computer
and
Communication Engineering (IJCCE)(ISSN: 2010-3743)
DOI: 10.7763/IJCCE
Editor-in-Chief: Dr. Maode Ma
Aug 22-23,
2015
New Taipei,
Taiwan
Abstracting/ Indexing: EI (INSPEC, IET), Google
Scholar, Engineering & Technology Digital Library,
ProQuest, and Crossref, Electronic Journals Library
All accepted papers will be published in one of the
indexed Journals after being selected.
ICOSP 2015
2015 International Conference
on Signal Processing
http://www.icosp.org/
ICRAS 2015
2015
5th
International
Conference on Robotics and
Automation Sciences
http://www.icras.org/
25
WIT Transactions on Information and Communication
Technologies (ISSN: 1743-3517)
Indexed by EI Compendex, Scopus and ISI.
International Journal of Signal Processing Systems
(IJSPS) (ISSN: 2315-4535)
Indexing: Ulrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital
Library, etc.
The ICRAS 2015 proceedings will be published by
IEEE and all the papers will be archived in the IEEE
Xplore and indexed by EiCompendex and ISI.
Conference Schedule
Note
26
Conference Schedule
27