Loading...

Proceedings of

5th International Conference on Advances in Computing, Control and Networking ACCN 2016

Date
26-Sep-2016
Location
Bangkok , Thailand
Authors
63
ISBN
978-1-63248-104-7

20 Articles Published

1. SYSTEM VIRTUAL MACHINES IN THE CONTEXT OF RECONFIGURABLE COMPUTING

Authors: BERND KLAUER , DOMINIK MEYER , JAN HAASE , MARCEL ECKERT

Abstract: System virtualization techniques are broadly used to distribute computing power, to boot different operating systems virtually on top of a host OS, to enable security features like encapsulation or to provide redundancy and migration concepts. Virtual machines (VMs) targeting different Instruction Set Architectures (ISA) are usually implement by efficient emulation or binary translation techniques. This paper uses reconfigurable hardware to support (guest) operating system virtualization and not virtualization of hw-accelerators inside an operating system. The main idea of this paper is to replace emulation / binary translation by (re)configuration. Instead of emulating a processor-ISA on a CPU with another ISA, the required guest-processor will be configured into an FPGA and booted with a guest operating System (OS) as requested by a VM manager. This approach allows to overcome limitations of conventional system virtualization approaches, like the Popek and Goldberg theorem and provid

Keywords: FPGA, Virtual Machine, Reconfigurable Computing

Pages: 1 - 8 | DOI: 10.15224/978-1-63248-104-7-01

2. LEVERAGING EMBEDDED SYSTEMS’ SECURITY BY HACKERS’ ATTACK DETECTION

Authors: ARIEL LUTENBERG , BRUNO C. PORCHER , FABIAN VARGAS , FEDERICO ZACCHIGNA , LETICIA BOLZANI POEHLS , RAPHAEL S. FERREIRA

Abstract: In recent years, computer systems belonging to large companies, governments as well as personal computers have been experiencing an increasing wave of attacks that disrupt their normal operation or leak sensitive data. In this context, this paper presents a hardware-based approach which aims at detecting several types of attacks that degrade system security. The approach is based on a dedicated watchdog, which is tightly connected to the processor bus. Compared to existing approaches, the proposed technique can be applied to any application code “as it is”, i.e., it does not need application code recompilation. Additionally, the approach does not use of any kind of supervisor software (e.g., an Operating System - OS) to manage memory usage. To validate the approach, a case-study based on the LEON3 softcore processor and security-vulnerable code snippets from benchmark test codes have been implemented. Experimental results indicate that this approach is able to detect an intrusion tenta

Keywords: Hacker’s Attack, Malicious Code Injection, User Code Basic Block, Dynamic Integrity Checking, Secure Embedded System.

Pages: 9 - 12 | DOI: 10.15224/978-1-63248-104-7-02

3. IMPLEMENTATION OF LINEAR EQUATIONS TO DETERMINE WEIGHT OF UNADJUSTED USE CASE WEIGHT IN USE CASE POINTS FOR ESTIMATING SOFTWARE DEVELOPMENT EFFORT

Authors: APOL PRIBADI SUBRIADI , DESY GITAPRATAMA , SHOLIQ

Abstract: The estimates of the number of resources required in a software development project is an important part of the project planning stage. Estimates are activities that predict the output of a project by reviewing existing resources such as time, cost, risks to be faced, and the effort required to complete the project. Methods such as Use Case Points (UCP), which are based on the number of actors and use case complexity are popular as methods for estimating effort in software development projects. However, the weight calculation for the Unadjusted Use Case Weight (UUCW) as part of the UCP still has something called “not mathematically valid operations.” Therefore, it takes an alternative way to calculate the weight of the UUCW. In this study, we implement a linear equation to determine the UUCW. The linear equation is derived from the value of the weight of UUCW on UCP original (UCP proposed by Karner). A linear line is created in which the x-axis is the center point of the transaction am

Keywords: Use Case Points, Unadjusted Use Case Weight (UUCW), Effort Estimation, Software Development Project

Pages: 13 - 17 | DOI: 10.15224/978-1-63248-104-7-03

4. KIRUCRETE SYSTEM STANDARD SYSTEM FOR BIUILDING CONCRETE SHELLS

Authors: ALEXANDRINO JOSE BASTO DIOGO , ANTONIO MORAIS

Abstract: this article aims to explore new construction processes, capable of facilitate and optimize the production cycle of structural forms based on the double curvature. We intend to explore the potential of an adaptable rigid formwork system capable of producing sinlastic and anticlastic surfaces. An integrated approach that takes into account the generation of form, structural mechanics, and its construction process, in order to generate architectural artifacts of great structural and constructive efficiency, with a strong artistic expression. This system combines cable net with cut linear pieces in a way that material bends. The system is based on a cable network supported by a frame and covered with an adaptive formwork covered with shotcrete.

Keywords: Duble curvature, Concrete shells, Constrution logistiscs, Cable net, Formwork, Structural shapes.

Pages: 18 - 23 | DOI: 10.15224/978-1-63248-104-7-04

5. MODEL OF SENDER NODE ENERGY SAVINGS ACHIEVABLE WITH LOCATION-AWARE MANET TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Tracking location in mobile environment has been a subject of research for quite long and significant progress has been reached [33-48]. The next stage remains devising new functionalities/applications and improving ways of doing existing activities making use of location-awareness. One area of such an improvement will be in the field of MANET communication over which ubicomp will rely. A big area missing in MAUC remains the software engineering approaches into metrics development, gathering and modelling which can be used for prediction and better gearing of future investments of resources [2]. The particular area of concern here is energy considerations in ubicomp. How much energy savings can be achieved by a sender node in location-aware MANET transmission? Is there any pattern of trend that the sender energy savings follow under different sets of node densities? How to gather information on probabilities of saving less or greater than a particular percentage of energy?. Need for fo

Keywords: Ubicomp-Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, SES-Sender Energy Savings, MANET-Mobile Adhoc Network, CBR-Constant Bit Rate, BRE-Basic Reference Energy

Pages: 24 - 34 | DOI: 10.15224/978-1-63248-104-7-05

6. MODEL OF OVERALL ENERGY CONSUMPTION FAIRNESS RATIO ACHIEVABLE IN MANET USING LOCATION-AWARE TRANSMISSION IN UBICOMP

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Many researchers in mobile networking are of the opinion that MANET transmission helps to contain energy in ubicomp [56]. Location-aware transmission can complement the objective of saving energy in MANETs. MANET transmission will achieve the functionality using automatic cooperative strategy with nodes present in the topography. In such situations, gauging degree of cooperation and Fairness of load distributions, taking into consideration all underlying features like hardware specifications, battery power, and more specifically, ratio of energy being required by the MANET node compared to the sender node itself, together with known corresponding trends, is desirable. Such studies have been presented [19, 20]. Following these research [19, 20], a third set of answers to address issue of “how to gauge Fairness features being reached in MANETs”, is provided in this paper, with a metric OFR along with its corresponding model of trend over varying node densities. This paper adds up to the

Keywords: Ubicomp- Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, ECR- Energy Consumption Ratio, Min_R- Minimum Ratio, Max_RMaximum Ratio, OFR- Overall Fairness Ratio, MANETMobile Adhoc Network, CBR- Constant Bit Rate.

Pages: 35 - 45 | DOI: 10.15224/978-1-63248-104-7-06

7. MODEL OF SENDER NODE EXTRA ENERGY SAVINGS ACHIEVABLE IN MANET AGAINST DIRECT NODE-TO-NODE TRANSMISSION USING LOCATION-AWARE TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Quite extensive research is ongoing concerning enhancement of location tracking in Mobile environment and significant development have been put forward [35-50]. As and when new components for Mobile network are put forward, new functionalities will be devised or ways of doing existing activities will be improved. MAUC, however, still lacks the software engineering approaches into metrics and models development to sustain predictability and govern future investments of resources for development and further research [2]. One particular sub-area within the area of energy considerations in ubicomp is modelling of sender node energy savings using location-aware MANET transmission provided in another paper [14]. The next set of investigation involves quantifying and modelling the extra energy savings achievable against Direct Node-to-Node transmission, the pattern of trend for this extra savings under different sets of node densities and method of predicting the trend equations for use in pr

Keywords: Ubicomp- Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, SLNTNES- Sender Less Node-to-Node Energy Savings, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, BRE- Basic Reference Energy.

Pages: 56 - 65 | DOI: 10.15224/978-1-63248-104-7-08

8. MODEL OF OVERALL NODE EXTRA ENERGY SAVINGS ACHIEVABLE IN MANET AGAINST DIRECT NODE-TO-NODE TRANSMISSION USING LOCATION-AWARE TRANSMISSION IN UBICOMP.

Authors: NAWAZ MOHAMUDALLY , M. KALEEM GALAMALI

Abstract: Lots of new components to support location tracking in mobile environment are being put forward following widespread research [36-51]. Upon significant milestones being reached, subsequent novel functionalities are being devised and existing ones improved. However, still lacking in the field of MAUC is the software engineering approaches into metrics and models development to enable predictability bounding and governing future investments of resources for development and further research [2]. One particular sub-area within the area of energy considerations in ubicomp is modelling of overall node energy savings using location-aware MANET transmission provided in another paper [15]. The next set of investigation involves quantifying and modelling the extra overall nodes energy savings achievable against Direct node-to-node transmission, the pattern of trend for this extra saving under different sets of node densities and method of predicting the trend equations and using them for predict

Keywords: Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, OLNTNES- Overall Less Node-to-Node Energy Savings, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate, BRE- Basic Reference Energy.

Pages: 66 - 75 | DOI: 10.15224/978-1-63248-104-7-09

9. MODEL OF ENERGY CONSUMPTION RATIO ACHIEVABLE IN MANET USING LOCATION-AWARE TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Efficient Location tracking is still subject to research and new functionalities/applications depending on it are continuing to appear on the market [37-52]. An area where improvements will be very desirable is MANET communication over which ubicomp will rely. A big section missing in MAUC remains the software engineering approaches into metrics development and gathering appropriate models which can be used for prediction and better gearing of future investments and research [2]. A particular sub-section of concern here is energy considerations in MANETs. Quite some results of prior research has been put forward [14-17] which are more directly concerned with energy. The subsequent level is “metrics indirectly concerned with energy for transmission”. One such topic of research is: “What is the ratio of energy consumption for each node over the energy consumed by the sender? What are the corresponding patterns of trend observable for different sets of node densities? How to predict the t

Keywords: Ubicomp- Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, ECR- Energy Consumption Ratio, MANET- Mobile Adhoc Network, CBR- Constant Bit Rate. PCN_ECR_NN- % communicating nodes for ECR node_number.

Pages: 76 - 86 | DOI: 10.15224/978-1-63248-104-7-10

10. MODEL OF MAXIMUM ENERGY CONSUMPTION RATIO ACHIEVABLE IN MANET USING LOCATION-AWARE TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: It is claimed that MANET transmission helps to save energy in ubicomp [55]. This strategy may be complemented by applying location-aware transmission in MANET, resulting in a situation of automatic cooperation between all nodes present in the topography. In situations of cooperation, a desirable transparent information remains Fairness of load distribution, taking into consideration all underlying features like hardware peculiarities, battery availability and especially of concern here, ratio of energy being required by the MANET node compared with the sender node itself, together with known corresponding trends. Such a study is provided in another paper [18], whereby a future work identified was “how to gauge Fairness features being reached”, as concerns the proportion of nodes spending more or less energy than the sender node. A first set of answers to this issue was provided in another paper [19]. In this paper, a second set of answers is provided with a metric Max_R with its corres

Keywords: Ubicomp- Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, ECR- Energy Consumption Ratio, Min_R- Minimum Ratio, Max_RMaximum Ratio, MANET- Mobile Adhoc Network, CBRConstant Bit Rate.

Pages: 87 - 97 | DOI: 10.15224/978-1-63248-104-7-11

11. MODEL OF MINIMUM ENERGY CONSUMPTION RATIO ACHIEVABLE IN MANET USING LOCATION-AWARE TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Researchers claim that use of MANET transmission help to save energy in ubicomp [54]. Another strategy would be by applying location-aware transmission in MANET. The resulting method of operation remains a cooperation being required from all nodes present in the topography. A desirable feature in cooperation is to know “what is the proportion of energy being required by the MANET node compared with the sending node itself, together with corresponding trends?” Such a study is provided in another paper [18] whereby a future work identified was “How to gauge Fairness features being reached”, as concerns the proportion of nodes spending more or less energy than the sender node. To bring answers to this issue, in this paper, another metric Min_R is put forward together with the corresponding model of trend over varying node densities. This paper adds up to the area of modelling in ubicomp and will be used by designers to better bound the resources and architecture needs for ubicomp. This pa

Keywords: Ubicomp- Ubiquitous Computing, MAUCMobile and Ubiquitous Computing, ECR- Energy Consumption Ratio, Min_R- Minimum Ratio, MANETMobile Adhoc Network, CBR- Constant Bit Rate.

Pages: 98 - 107 | DOI: 10.15224/978-1-63248-104-7-12

12. OBSERVER DESIGN AND IMPLEMENTATION FOR PACKED-BED THERMAL ENERGY STORAGE SYSTEMS

Authors: ALESSANDRO PISANO , CRISTIAN SCHIRRU , ELIO USAI

Abstract: This paper investigates the problem of designing a state observer for a Packed Bed Thermal Energy Storage System. In previous studies (see e.g. [21]), a mathematical model of the system, taking the form of two coupled partial differential equations, was derived and validated through comparison with experimental measurements. In this paper, the previously derived model is approximated by a lumped linear time-invariant model and then employed to design a Luenberger state observer capable of reconstructing the solid and fluid temperature profiles on the basis of few collocated fluid temperature measurements. Theoretical design and experimental results are presented throughout the paper.

Keywords: Thermal Energy Storage System. Sensible heat storage, Packed-bed technology; State observer.

Pages: 108 - 112 | DOI: 10.15224/978-1-63248-104-7-13

13. A NEW TIME SERIES BASED FUZZY LOGIC APPROACH FOR PREDICTION OF ATMOSPHERIC TEMPERATURE

Authors: MANISH PANDEY , NEERAJ KUMAR , SACHIN CHAUHAN , SANDEEP KUMAR SINGH

Abstract: Temperature prediction could be a temporal and statistic based mostly method. Weather prediction has drawn heap of analysis interest in recent years. The prediction of temperature has essential applications in numerous fields like climate watching, weather prediction, agriculture, energy, aviation, communication, pollution spread etc. The fuzzy aggregation has powerful logic expression ability and is in a position to precise inaccurate and unsure in sequence. during this paper, a Fuzzy data – Rule base technique is employed to predict the close part temperature for Indian coastal cities. The current study utilizes historical temperature likewise as info of varied meteorologic parameters to develop a prediction method in fuzzy rule domain to estimate temperature. Daily observations of Mean water level Pressure, ratio and Temperature for all three seasons area unit analyzed to predict the Temperature for a given values of Mean water level Pressure and ratio. Symbolic logic has principall

Keywords: Event, fuzzy logic, time series analysis, time series data mining

Pages: 113 - 117 | DOI: 10.15224/978-1-63248-104-7-14

14. DETECTION OF VENTRICULAR FIBRILLATION BASED ON NEURO-FUZZY SYSTEM AND PHASE SPACE RECONSTRUCTION

Authors: SANG-HONG LEE

Abstract: This study proposes feature extraction using wavelet transform (WT), sequential increment method, and phase space reconstruction (PSR) to classify normal sinus rhythm (NSR) and ventricular fibrillation (VF) from ECG episodes. We implemented four pre-processing steps to extract features from ECG episodes. In the first step, we use the WT for multi-scale representation and analysis, and then we extract wavelet coefficients from ECG episodes. In the second step, we use sequential increment method to extract peaks from the wavelet coefficients. In the third step, we make a three-dimensional phase space reconstruction (PSR) using the successive peaks. In the final step, we calculate the Euclidean distance between the peaks that are plotted in a three-dimensional phase space diagram and origin (0, 0), and then extract 20 features from the Euclidean distances by using statistical methods, including frequency distributions and their variabilities. We apply the 20 features as inputs to a neural

Keywords: ventricular fibrillation, automated external defibrillator, neuro-fuzzy system, electrocardiogram, wavelet transform.

Pages: 118 - 119 | DOI: 10.15224/978-1-63248-104-7-15

15. ANALYSIS OF PERFORMANCE PREDICTION MODELS IN PREDICTING DENGUE FEVER PATIENTS NUMBER IN EACH GROUP OF MALANG, INDONESIA

Authors: EDWIN RIKSAKOMARA , EKA MULYA A. LULUS CONDRO T. , FEBRILIYAN SAMOPA , PUJIADI , RADITYO P.W , WIWIK ANGGRAENI

Abstract: Dengue Fever is one of acute and deadly diseases that commonly happens in tropical area. The spread of it is also influenced by geographical condition. Indonesia, Particularly in Malang that is a tropical area with a geographical condition supports the development of this disease. It needs a fat-moving action to the early step precaution so that the number of patients can be reduced. As the primary decision for an early prevention, it needs predictions about several cases of dengue fever of some period in the future. The result of this prediction is needed by Public Health Office of Malang as one of instances that responsible of dengue fever cases. This research analyses performance as a prediction model in getting the predictions in a number of dengue fever cases in Malang, Indonesia for some different group of data. The models suggested are Multiplicative Holt-Winters, Additive Holt-Winters, Multiplicative Decomposition and Autoregressive Moving Average (ARIMA). Those models are appl

Keywords: Performance, Model Predictions, Holt-Winters, Decomposition, ARIMA, Early Detection, Dengue

Pages: 120 - 125 | DOI: 10.15224/978-1-63248-104-7-16

16. SPORTS SKILL ANALYSIS USING MOTION FREQUENCY

Authors: MASUMI YAJIMA , TAKESHI MATSUDA , TOSHIYUKI MAEDA

Abstract: This paper addresses sports skill discrimination using motion picture data, focused on volleyball attack skill. We attempt to certify the hypothesis that expert skills have relatively low frequency motions rather than novice skills as the similarity of human postural control. For this purpose we proceed experiments and analyze sports skills as for frequency of motion using time series motion pictures of volleyball attacks. In this paper, volleyball play is analyzed with motion picture data recorded by hi-speed cam-coder, where we do not use physical information such as body skeleton model, and so on. Time series data are obtained from the motion picture data with four marking points, and analyzed using Fast Fourier Transform (FFT) and clustering data mining method. As the experiment results, we have found that y-axes of novice data may have more highfrequency data, and that implies novice motions may have high frequency motions, and that may support our hypothesis.

Keywords: Time Series Data, Sports Skill Analysis, Motion Picture, Fast Fourier Transform

Pages: 126 - 129 | DOI: 10.15224/978-1-63248-104-7-17

17. AN ADAPTIVE AND SMART SECURITY ARCHITECTURE FOR WEB SERVICE - SMARTWSSEC ARCHITECTURE

Authors: EL HOUSSAIN BEN MESSAOUD , OUAFAA DIOURI

Abstract: Vulnerabilities in Web based applications will always be present. Several measures were taken to extenuate the effects of this reality but with limited success. In fact, we are bombarded by new technologies to harden systems and monitor and respond to threats, like firewalls, IDS (intrusion detection system) and IPS (Intrusion Prevention System). However, the flow of attacks and threats is so important to the point that the configuration and reconfiguration of these tools becomes difficult to insure in time. In this paper we introduce “a framework for dynamic security Policy for Web services” called SmartWSSec. The main goal of our architecture is to guarantee better security for web services based on adaptive security models. It aims to identify the appropriate actions that must be taken when a zero day attack occurred resulting on a smart protection for web service in a self-adaptive manner. The proposed architecture uses a knowledge based mechanism to learn and adjust the system whe

Keywords: Adaptive and dynamic security, Knowledge database, prevention, reaction, Security policy, Smart engine, Web service, WS-SecurityPolicy

Pages: 130 - 138 | DOI: 10.15224/978-1-63248-104-7-18

18. MULTIFACETED TRUST ASSESSMENT FRAMEWORK FOR CONTAINER BASED EDGE COMPUTING PLATFORM

Authors: BUKHARY IKHWAN ISMAIL , EHSAN MOSTAJERAN , HONG ONG , KHALID MOHAMMAD SALEEM , MOHAMMAD FAIRUS KHALID , MOHD NIZAM MOHD MYDIN

Abstract: In Edge Computing platform, services are decentralized from cloud center to the edge of the platform supporting on-premises and latency sensitive applications. For this reason, traditional security mechanisms are not suitable to ensure trustworthiness of distributed and multi- tenant attributes of edge platform. Similarly by utilizing Docker as edge server, trustworthiness of host, containers and service becomes a high priority issue. Therefore in such platform run-time security assessment of the edge stack must be applied to ensure trustworthiness of resources and service. In this paper, we propose multifaceted trust framework to quantify trustworthiness of the edge servers based on security assessment of the edge stack. A chain measurement is applied to assessment process to allow insurance of the effect of each edge server’s trustworthiness history on the container orchestration.

Keywords: Edge Computing, Trust Framework, Docker

Pages: 139 - 144 | DOI: 10.15224/978-1-63248-104-7-19

19. MULTIFACETED TRUST ASSESSMENT FRAMEWORK FOR CONTAINER BASED EDGE COMPUTING PLATFORM

Authors: BUKHARY IKHWAN ISMAIL , EHSAN MOSTAJERAN , HONG ONG , KHALID MOHAMMAD SALEEM , MOHAMMAD FAIRUS KHALID , MOHD NIZAM MOHD MYDIN

Abstract: In Edge Computing platform, services are decentralized from cloud center to the edge of the platform supporting on-premises and latency sensitive applications. For this reason, traditional security mechanisms are not suitable to ensure trustworthiness of distributed and multi- tenant attributes of edge platform. Similarly by utilizing Docker as edge server, trustworthiness of host, containers and service becomes a high priority issue. Therefore in such platform run-time security assessment of the edge stack must be applied to ensure trustworthiness of resources and service. In this paper, we propose multifaceted trust framework to quantify trustworthiness of the edge servers based on security assessment of the edge stack. A chain measurement is applied to assessment process to allow insurance of the effect of each edge server’s trustworthiness history on the container orchestration.

Keywords: Edge Computing, Trust Framework, Docker

Pages: 139 - 144 | DOI: 10.15224/978-1-63248-104-7-19

20. BEE ALGORITHM FOR THE VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS

Authors: MALEK ALZAQEBAH , SALWANI ABDULLAH , SANA JAWARNEH

Abstract: The natural honeybee’s behavior has been modelled by researchers to solve optimization problems. This paper introduces the Bee algorithm based on honeybee behavior for the vehicle routing problem with time windows (VRPTW). The algorithm has been tested on Solomon instances. The encoding of the problem and the operations needed to implement algorithm are outlined. Experiments show that on the considered instances, using BA performs almost as well as planning for long-term, while using much less computation time. Overall, computational investigations show that the proposed algorithm is good and promising approach for the VRPTW.

Keywords: Foraging behaviour; bee algorithm; vehicle routing problem with time windows.

Pages: 145 - 148 | DOI: 10.15224/978-1-63248-104-7-51

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering