Loading...

Proceedings of

International Conference on Advances in Computer Science and Electronics Engineering CSEE 2014

Date
09-Mar-2014
Location
Kuala Lumpur , Malaysia
Authors
126
ISBN
978-1-63248-000-2

50 Articles Published

1. PREDICTIVE DATA ANALYSIS IN CLOUD USING BIG DATA ANALYTIC TECHNIQUES

Authors: R.POORVADEVI , S.RAJALAKSHMI , S.RAMAMOORTHY

Abstract: All the companies are nowadays migrating their applications towards cloud environment, because of the huge reduce in the overall investment and greatest flexibility provided by the cloud. The Cloud provides the larger volume of space for the storage and different set of services for all kind of applications to the cloud customers. There is not much delay and major changes required at the client level. The large amount of user data and application results stored on the cloud environment, will automatically make the data analysis and prediction process very difficult on the different clusters of cloud. It is always difficult to process, whenever a user required to analyze the data stored on the cloud as well as frequently used service by other cloud customers for the same set of query on the cloud environment.The existing data mining techniques are insufficient to analyze those huge data volumes and identify the frequent services accessed by the cloud users. In this proposed scheme we ar

Keywords: Cloud, Cloud-Storage, BigData, Map-Reduce, Clusters.

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-000-2-32

2. SECURITY NETWORK WITH VIRTUAL PRIVATE NETWORK & (IPSEC) APPLICATIONS

Authors: AHMED A. SABEEH , DHARI KH ABEDULA

Abstract: Internet communication is largely based on TCP/IP protocols. The main design of TCP/IP is for trusted peers to communicate. IP Packets have no inherent security, and therefore it is relatively easy to forge the addresses of IP packets, modify the contents of IP packets, replay old packets, and inspect the contents of IP packets in transit. In this paper, we discuss how Internet Protocol Security (IPSec) is used for secured and encrypted communication between Internet hosts. IPSec is described as an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite[1]. According to Kent et al., it can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). To discussthe use of IPSec in an TCP/IP based network, we chose Virtual Private Network (VPN) as the application in describing how IPSec provides the platform for secure and encr

Keywords: TCP/IP Security, IPSec, VPN, IKE, IKE2, AH, SA, ESP

Pages: 6 - 11 | DOI: 10.15224/978-1-63248-000-2-33

3. ALGORITHM FOR TRACKING SENSITIVE INFORMATION OF ONLINE APPLICATION IN COMPUTER MEMORY

Authors: JAFREEZAL JAAFAR , AHMAD KAMIL MAHMOOD , KHAIRUL AKRAM ZAINOL ARIFFIN , SOLAHUDDIN SHAMSUDDIN

Abstract: With the advance in technology and the introduction of cloud computing, the usage of Internet application has been increased rapidly. In addition, the online storages with password protected such as Dropbox, Box Sync, Copy and Cloud Me are already available to all users. Hence, with a rapid development and introduction of this technology, the analysis on the hard drive has become obsolete in retrieving the information from those applications. The aim of this paper is to present an algorithm to track the sensitive information from online application for both active and exile process in the computer memory. The algorithm encompasses the signature search to find the possible processes in the memory, obtain the user and machine data and then some sensitive information with regard to the online application. The algorithm will be independent of address translation algorithm that has been frequently applied in the retrieving technique in the past.

Keywords: Algorithms, Information Retrieval, Digital Forensics, Memory Analysis, Signature Search

Pages: 12 - 16 | DOI: 10.15224/978-1-63248-000-2-34

4. AN ASSESSMENT OF SOFTWARE DEVELOPMENT PRACTICES OF SMES IN BANGLADESH

Authors: HASAN SARWAR , MD. AKHTARUZZAMAN , MOHAMMAD SHAHADAT HOSSAIN CHOWDHURY

Abstract: Software Process Improvement (SPI) can help the software practitioners to enhance their capabilities in the field of software engineering. Various models have been proposed in order to improve software process framework. However, implementation of such modules often requires huge cost involvement. Small and Medium sized Software Enterprises (SMEs), in Bangladesh, naturally fail to introduce or adapt such frameworks. So it has become a need of time to observe the Software Process scenario as a part of research activity which will ensure smoother transition to improved Process Framework. In this paper, various practical models and their practices in various SMEs and the importance of SPI system are highlighted and analyzed. Survey has been conducted to assess Real life practices with a view to compare with Benchmarks like Capability Maturity Model Integration (CMMI). This attempt also suggests a direction for minimum best practice that might be helpful for small and medium sized companie

Keywords: Software Development Practices, CMMI, Small and Medium Software Enterprise, SMEs, Software Process Improvement, SPI, Software Process Optimization

Pages: 17 - 20 | DOI: 10.15224/978-1-63248-000-2-35

5. REVIEW OF CURRENT ONLINE DYNAMIC UNSUPERVISED FEED FORWARD NEURAL NETWORK CLASSIFICATION

Authors: SAMEEM ABDUL KAREEM , HAITHAM SABAH HASAN , ROYA ASADI

Abstract: Online Dynamic Unsupervised Feed Forward Neural Network (ODUFFNN) classification is suitable to be applied in different research areas and environments such as email logs, networks, credit card transactions, astronomy and satellite communications. Currently, there are a few strong methods as ODUFFNN classification, although they have general problems. The goal of this research is an investigation of the critical problems and comparison of current ODUFFNN classification. For experimental results, Evolving Self-Organizing Map (ESOM) and Dynamic Self-Organizing Map (DSOM) as strong related methods are considered; and also they applied some difficult datasets for clustering from the UCI Dataset Repository. The results of the ESOM and the DSOM methods are compared with the results of some related clustering methods. The clustering time is measured by the number of epochs and CPU time usage. The clustering accuracies of methods are measured by employing F-measure through an average of three

Keywords: Neural Network (NN) model, Feed Forward Unsupervised Classification, Training, Epoch, Online Dynamic Unsupervised Feed Forward Neural Network (ODUFFNN)

Pages: 21 - 28 | DOI: 10.15224/978-1-63248-000-2-36

6. A SYSTEMATIC REVIEW OF INTEROPERABILITY MODELS

Authors: REZA REZAEI , SAI PECK LEE , THIAM KIAN CHIEW

Abstract: Interoperability is the ability in which systems and enterprises could interrelate and incorporate to each other. With the purpose of improvement of interoperability between systems, an interoperability model isrequired. This study aims at reviewing existing research on interoperability models in order to identify a comprehensive interoperability model. In this review study, all of the existing models for interoperabilityare presented. The majority of the interoperability models focuses only on three of four interoperability types. The existing models are also not at a satisfactory level of development for improvement of interoperability between systems. Thus structuring interoperability models into one single comprehensive and complete interoperability model is necessary in order to ensure consistency and avoid redundancy. In addition, we need to identify metrics and properties to allow better development of interoperability between systems.

Keywords: Interoperability, Framework, Type, Attribute, Dimension.

Pages: 29 - 33 | DOI: 10.15224/978-1-63248-000-2-37

7. E-GOVERNMENT INTEROPERABILITY FRAMEWORKS: A REVIEW

Authors: REZA REZAEI , SAI PECK LEE , THIAM KIAN CHIEW

Abstract: Various definitions have been defined for the word “interoperability”; in general however, “interoperability” is a property through which the systems and organizations can communicate and cooperate. In e-government domain to establish “interoperability” among the organizations, using a suitable “interoperability” framework is inevitable. Numerous frameworks have been proposed in e-government interoperability domain. Selecting a suitable interoperability framework as a reference from among the existing interoperability frameworks in e-government domain is a major challenge of great importance. This paper aims at investigating the present frameworks of interoperability in e-government domain and identifying a reference interoperability framework for this domain. The results of this study show that all the existing interoperability frameworks in the e - government domain have some drawbacks. Defining a comprehensive framework of interoperability in e-government domain is therefore inevita

Keywords: Interoperability, Framework, E-Government

Pages: 34 - 38 | DOI: 10.15224/978-1-63248-000-2-38

8. FUTURE DATA MINING TOOLS : (WEB BASED MINING WITH ERP)

Authors: MOHAMMED A ABDELHADI , TIRUVEEDULA GOPI KRISHNA

Abstract: In a business context, the successful introduction of data mining requires using data mining techniques to address a real business challenge. For companies that are just getting started with analytical enterprise resource planning and customer relationship management, integrating data mining can be a daunting task. In this paper we discussed how the proof of concept should create a solid business case for furtherintegration of data mining into the company’s marketing, sales, and customer-support operations using ERP. Furthermore, current trends indicate that more companies implementing Enterprise Resource Planning systems could further benefit in using data mining techniques. Integrating a data mining technique alongside these two added value services can proof to be an optimum solution in understanding a company’s data.

Keywords: Filtering,ERP,web mining tools,hybrid systems

Pages: 39 - 43 | DOI: 10.15224/978-1-63248-000-2-39

9. WIRELESS POWER TRANSMISSION BATTERY CHARGING FOR SMART PHONE CONTROLLED UNMANNED BATTERY OPERATED VEHICLE

Authors: RAM KUMAR PAUL

Abstract: In this paper, wireless power transfer is used for charging a battery operated unmanned vehicle for the surveillance. This unmanned vehicle is operated using android smart phone application developed for the purpose. This project integrates two technologies: wireless power transfer and android technology. The working principle behind wireless power transmission is electromagnetic induction. Wireless power or wireless energy transmission is the transmission of electrical energy from a power source to an electrical load without man-made conductors. Wireless transmission is useful in cases where interconnecting wires are inconvenient, hazardous, or impossible.

Keywords: Wireless Power Transmitter, Electromagnetic Induction, mobility.

Pages: 44 - 48 | DOI: 10.15224/978-1-63248-000-2-40

10. COMPARISON OF ROUTING PROTOCOLS IN VANET SCENARIOS

Authors: P.GEETHARANI

Abstract: This paper presents a comparative test of two protocols namely-AODV and DSR in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by Ns2 to simulate the given network. To carry out the simulation process an open source simulator tool is used for this study namelyNS2. Based on the simulation results of both aforementioned protocols, the performance comparison is made and appropriate protocol is selected for individual scenario. The mobility scenarios selected on the basis of routing metrics.

Keywords: DSR, proactiveAdhocg, styling, insert

Pages: 49 - 52 | DOI: 10.15224/978-1-63248-000-2-41

11. BITCOIN MINING ACCELERATION AND PERFORMANCE QUANTIFICATION

Authors: JEGA ANISH DEV

Abstract: Since its introduction in 2009, Bitcoin, an open source, peer to peer, digital crypto currency has been growing in popularity and wide spread use. Growing attention, recognition by major financial institutions and high valued currency units (BTC) ascertains Bitcoin to a sturdy and ever increasing choice of currency. A public transaction log called the “Blockchain” keeps records of all committed transactions and Bitcoin ownership details, that is, addresses derived by cryptographic keys. Bitcoin mining, a process which results in the generation of new Bitcoins, is performed by miner operators for reception of incentives in the form of Bitcoins. This mining process is essentially operations of SHA-256 hashing of values in search of a hash digest smaller than a specific value. Once this winning hash has been discovered, a new block to Blockchain is added and BTC incentives are furnished by the Bitcoin network to the miner. This paper discusses methods of performing Bitcoin mining on non-c

Keywords: Bitcoin mining; Botnet based Bitcoin mining; combined usage of CPU and GPU for Bitcoin mining

Pages: 53 - 58 | DOI: 10.15224/978-1-63248-000-2-42

12. UTILIZING WORDNET FOR INSTANCE-BASED SCHEMA MATCHING

Authors: AHMED MOUNAF MAHDI , SABRINA TIUN

Abstract: Instance-based matching is the process of identifying the correspondences of schema elements by comparing the instances of different data sources. It is used as an alternative option when the schema-based matching fails. Instance-based matching is applied in many application areas such as website creation and management, data warehousing, database design, and data integration. Many recent approaches focus on instance-based matching. In this paper, we propose an approach that utilizes WordNet-based measure for string domain by getting the similarity coefficient in the range of [0..1]. In previous approach, the regular expression is achieved with a good accuracy for numerical instances only and is not implemented on string instances because we need to know the meaning of string to decide if there is a match or not. The using of WordNet-based measures for string instances should guarantee to improve the effectiveness in terms of Precision (P), Recall (R) and f-measure (F). In this paper w

Keywords: Schema matching, Instance-based matching, WordNetm similarity measures, Lin’s measure.

Pages: 59 - 63 | DOI: 10.15224/978-1-63248-000-2-43

13. ONTOLOGY BASED APPROACH TO FUZZY STUDENT MODEL DESIGN

Authors: SALISU MUHAMMAD SANI , TEH NORANIS MOHD ARIS

Abstract: The integration of Information and Communication Technology (ICT) in the teaching and learning process in our today’s educational environments gave birth to what is known as e-learning technology. Correct implementation of these e-learning technologies can brings about a number of potential benefits to the educational systems that can ultimately leads to achieving the desired objectives through the use of these modern and qualitative innovations. When these technologies and innovations are effectively used in the instructional process not only they will reduced the cost effectiveness of the pedagogical and other relative constrains, but can also create a conducive atmosphere for exploring effective designed components from different perspectives. An important component of these e-learning systems in use today is called the intelligent tutoring system (ITS). ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian ne

Keywords: ITS, Fuzzy Logic, Ontology, Stud. Model

Pages: 64 - 68 | DOI: 10.15224/978-1-63248-000-2-44

14. REGRESSION TEST FRAMEWORK BASED ON EXTENDED SYSTEM DEPENDENCE GRAPH FOR OBJECT-ORIENTED PROGRAMS

Authors: ABU BAKAR M.D. SULTAN , AZIM ABD GHANI , SALMI BAHROM , SAMAILA MUSA

Abstract: This paper presents a regression testing framework for object-oriented software based on extended system dependence graph model of the affected program. The approach is based on semantic analysis of the code. The goal is to identify changes in a method’s body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism. To find the affected statements due to changes in the program, we used affected statement as slicing criterion to performed slicing on the constructed graph. The methods affected are determined by analysis of the ESDG based on the affected statements. Test cases that execute the affected methods are selected from an existing test suite. New test cases are generated when necessary. The selected test cases are prioritized by assigning weight to the affected methods. A case study will be reported to provide evidence of the feasibility of the approach and its benefits in increasing the rate of fault detection and reduc

Keywords: regression testing, regression test framework, regression test case prioritization, system dependence graph.

Pages: 69 - 74 | DOI: 10.15224/978-1-63248-000-2-45

15. CLOUD COMPUTING SECURITY ISSUES AND MEASURES

Authors: ANIRUDDHA S. RUMALE , DINESH N. CHAUDHARI

Abstract: Cloud computing is advanced distributed and parallel processing, involving Grids, clusters, virtualization of resources, networking, client-server mechanism etc… Without proper security such an integrated complex system won’t last for long. This paper briefs out types of security issues that a cloud must consider before and after its implementation. Service Level Agreements (SLA) plays an important role in cloud operation and implementation, as it covers almost every aspect of cloud. Paper discusses on what a clouds SLA must contain, and why SLA can’t be implemented from users’ point of view. Paper discusses in brief the security in/for/by cloud scenario of cloud computing. Paper discusses existing methods/measures for security and can be seen as a brief on cloud computing security issues and measures. This paper can act as a theoretical base or directives while designing and implementing the cloud as it briefs out information on cloud security.

Keywords: Security in cloud, Security for cloud, Security by cloud, Trusted cloud computing, Security issues in cloud, service level agreement

Pages: 75 - 80 | DOI: 10.15224/978-1-63248-000-2-46

16. MODELING INFORMATION TECHNOLOGY (IT) VALUE: AN ONTOLOGICAL APPROACH TOWARDS IT VALUE ENGINEERING

Authors: ARMEIN Z.R. LANGI , LUKMAN ABDURRAHMAN , SUHARDI

Abstract: The use of IT has become a necessity in today's business because of its benefits, which has been felt in the daily work. Consequently impressed that IT spending into massive without considering again the abilityto control. Therefore, it needs to research values of IT in terms of relationship to business performance so, in turn, there will be created an IT value model. The methodologies adopted to do this research are meta-analysis, Resource-Based View analysis, value engineering analysis, systems engineering analysis, and business model analysis. The study results in IT value conceptual model and IT value business model. Bothmodels can lead to reposition the IT role within the business, on one hand. On the other hand, the models will increase its role such that “the picture” of business can be controlled due to IT value engineering aswell.

Keywords: IT, value, reposition, engineering, model, business.

Pages: 81 - 85 | DOI: 10.15224/978-1-63248-000-2-47

17. DEPLOYMENT OF CONTEXTUAL MOBILE PAYMENT SYSTEM: A PROSPECTIVE E-SERVICE BASED ON ICTIZATION FRAMEWORK FROM BANGLADESH PERSPECTIVE

Authors: ABDUS SATTAR , ARIF MAHMUD

Abstract: A new contextual mobile payment system has been proposed as one of the e-services based on our previously suggested ‘ICTization framework model’. This framework is supported by capability, connectivity and context provided in three separate layers namely core, management and distribution that maintain centralization, decentralization and parallelization features. Five entities are involved in the payment system namely user, merchants, network operator, bank and cell phone device manufacturer and incorporation of them is displayed in the architecture and operational steps. In this paper the mobile payment system impacting factors have been analyzed and prioritized through a survey. The proposed system supports ‘win-win’ proposition where the benefits of subscriber and bank are equally maintained and successful coordination among payer, payee and payment system are ensured as well.

Keywords: Contextual Mobile Payment System, ICT, ICTization framework, Impacting factors

Pages: 86 - 92 | DOI: 10.15224/978-1-63248-000-2-48

18. GAMELAN ACADEMIC ENTERPRISE RESOURCE PLANNING

Authors: GEDE WISUDIAWAN , NYOMAN KARNA

Abstract: Most of Indonesia's educational institutions serve a very limited number of students. This will result in financial problem in providing a good infrastructure, especially in information system. This research is to design an information system capable for enterprise resource planning for academic institution that will be applicable in most academic business process in Indonesia.

Keywords: academic information system, academic operational, human resource, billing, payment, asset, questionairre, password management.

Pages: 93 - 97 | DOI: 10.15224/978-1-63248-000-2-49

19. MODELING STUDENT/TUTOR COMPONENTS OF INTELLIGENT TUTORING SYSTEMS: A REVIEW

Authors: SALISU MUHAMMAD SANI , TEH NORANIS MOHD ARIS

Abstract: The intelligent tutoring system (ITS) is an educational software system that provides personalized and adaptive tutoring to students based on their needs, profiles and preferences. The tutor model and student model are two dependent components of any ITS system. The goal of any ITS system is to help the students to achieve maximum learning gain and improve their engagements to the systems by capturing the student’s interests through the system’s adaptive behavior. In other words an ITS system is always developed with the aim of providing an immediate and efficient solution to student’s learning problems. In recent years a lotof work has been devoted to improving student and tutor models in order enhance the teaching and learning activities within the ITS systems. The aim of this paper is to investigate the most recent state of art in the development of these two vital components of the intelligent tutoring systems.

Keywords: Tutor model; Student model;

Pages: 98 - 102 | DOI: 10.15224/978-1-63248-000-2-50

20. GOVERNING RBV-BASED IT VALUE USING COBIT 5

Authors: SUHARDI , NOVIANTO BUDI KURNIAWAN

Abstract: Implementation of IT value based on the Resource-based view within an organization becomes a very important issue, especially to define the IT resources owned by the organization in enhancing its organizational competitiveness. The goals of the IT value implementation is to increase the organization's core competences for achieving competitive advantage. Implementation should be in line with the IT value management and governance policies so that continuous improvement of the organization performance can be maintained. This paper reports an approach for governing RBV-based IT value using COBIT 5. The governing of IT value is important for guaranteeing the IT value.

Keywords: IT, Resource-based view, IT Value, IT Resources, COBIT, IT Balanced Score Card.

Pages: 103 - 107 | DOI: 10.15224/978-1-63248-000-2-51

21. BANDWIDTH AND DELAY GUARANTEED UNICAST ROUTING IN MOBILE AD HOC NETWORKS USING FUZZY LOGIC

Authors: MAMATA J. SATARADDI , VIJAYASHREE R. BUDYAL

Abstract: Mobile Ad hoc Networks comprises of mobile nodes that are communicating via either single-hop or multi-hop wireless links through a sequence of intermediate nodes. They are an autonomous collection of mobile hosts connected by wireless links with no fixed infrastructure. A unicast communication provides an efficient connectivity between the source and destination through intermediate mobile nodes. Mobility of the hostsnecessitates, maintenance of Quality of Service for unicast routing for real time applications. This paper proposes, fuzzy logic based unicast routing in Mobile Ad hoc Networks considering uncertain and imprecise parameters like bandwidth, link delay and link reliability to assure Quality of Service. The work selects a reliable, bandwidth and delay aware intermediate nodes between source and destination to provide the required Quality of Service for applications like audio, video etc. To test the performance effectiveness of the approach, we have analyzed the performance

Keywords: MANET, Unicast, QoS, Fuzzy logic

Pages: 108 - 112 | DOI: 10.15224/978-1-63248-000-2-52

22. DTMF OPERATED ROBOT FOR SPACE OPERATION WITH APPLICATIONS

Authors: JASLEEN JOSAN

Abstract: Dual-tone Multi-frequency (DTMF) Signals are used in touch-tone telephones as well as many other areas. Since analog devices are rapidly changing with digital devices, digital DTMF decoders become important. In this survey a brief review of some DTMF detector implementations is given. The Aim of this paper is to implement a DTMF detector, which is ITU complaint, on a fixed point low cost DSP. This detector should be able to detect DTMF tones in multiple-channels with as much as possible channels. Microcontrollers, as the name suggests, are small controllers. They are also used in automobiles, washing machines, microwave ovens, toys .etc. where automation is needed.

Keywords: DTMF, PWM, Path finder, Radio control , multifrequency

Pages: 113 - 118 | DOI: 10.15224/978-1-63248-000-2-53

23. EVALUATION OF CPU ARCHITECTURE BY SIMULATION TECHNOLOGIES AND BENCHMARK COMPUTER SYSTEMS

Authors: AAMIR SHABBIR PARRE , INAYAT-UR-REHMAN , KOKAB WAQAS , MANZOOR ELAHI , TASSAWAR IQBAL

Abstract: The processor architecture designers face major challenges to improve the processor’s performance. To measure the performance of the processor there are many parameter like performance of cache, TLB, IO operations, bus speed etc. different companies launch series of processors with same base configuration and a little change of variations base on cache size, cache levels, share and separate cache and many other parameters like that. There are many simulators available to measure processor's performance theoretically with several parameters. We simulate some models of Intel Pentium 4 and UltraSPARC II processors and analyze the performance of the processors regarding cache and TLB.

Keywords: component, formatting, style, styling, insert

Pages: 119 - 123 | DOI: 10.15224/978-1-63248-000-2-54

24. ORGANIZATION MAPPING USING SOCIAL NETWORK GRAPH ANALYSIS

Authors: EDWARD BENEDICT B. SUYU , LUISA B. AQUINO

Abstract: This paper studied the utilization and weight factors of graph metrics on visualization and mapping of sub-networks that exist in a given network of connected people. It is utilized in this study the use of algorithms such as the Clauset-Newman Moore Algorithm and the Harel-Koren Fast Multiscale Layout, and graph metrics such as degrees and centralities. The study showed that using such methods yields results that show network visualization that is useful for investigative purposes.

Keywords: Networks, Social Connections, Mapping, Graph

Pages: 124 - 128 | DOI: 10.15224/978-1-63248-000-2-55

25. SPREAD OF INFLUENCE ON INFORMATION PROPAGATION: TARGET VIRAL MARKETING THROUGH INFLUENTIAL NODES IN SOCIAL NETWORK

Authors: LUISA B. AQUINO , WINDELLE JOHN G. VEGA

Abstract: Social Networking sites are already widely used nowadays in different aspects most especially on communication, information dissemination, marketing and others. In Social Network Analysis, one of the most studied problems is the information dissemination, and is often related to target viral marketing. The aim of this study is to provide a framework that consolidates the use of NodeXL as a tool for analyzing variousdata, determining the key influential nodes using the different metrics and to simulate the diffusion process using the two models (ICM and LTM). We have to first gather data from a Facebook network, do some analysis using NodeXL after which we will measure the metrics of each node to determine the key influential node over the network and lastly we will simulate the diffusion process using Linear Threshold Modeling and Independent Cascade Modeling. The results shall be the basis of the effectiveness of the proposed framework on Target Viral Marketing and it will show that t

Keywords: social media, influence propagation, information propagation, viral marketing, data mining

Pages: 129 - 133 | DOI: 10.15224/978-1-63248-000-2-56

26. IMPERCEPTIBLE IMAGE-BASED STEGANOGRAPHIC SCHEME USING BIT-PLANE COMPLEXITY SEGMENTATION (BPCS)

Authors: SAMER ATAWNEH

Abstract: Image-based steganography is the practice of embedding secret information into digital images with the intention to communicate the secret information. Embedding large sizes of secret information into digital images is one of the problems that image-based steganography encounters. The distortion of digital image increases with larger capacity, meaning that both are positively correlated. The latter makes image-based steganography fingerprints perceptually and statistically visible. In this paper, we propose a new spatial-domain steganographic scheme based on Bit-Plane Complexity Segmentation (BPCS). Experimental results reveals that the proposed algorithm offers better embedding performance compared with prior BPCS-based algorithms in terms of image quality and capacity.

Keywords: Image steganography, spatial domain, Bit-Plane Complexity Segmentation

Pages: 134 - 139 | DOI: 10.15224/978-1-63248-000-2-57

27. BER ANALYSIS OF OSTBC-MIMO-OFDM SYSTEMS USING TRIPLE-POLARIZED ANTENNAS

Authors: GENG WAN , MINORU OKADA , TAKESHI HIGASHINO

Abstract: Diversity and data rate over multipath fading channels in wireless communication systems can be significantly enhanced by the combined use of orthogonal space-time block coding (OSTBC) multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) techniques. However, to obtain the maximum benefits of the above schemes, the required antenna spacing at both the transmit and receive sideswill result in high-cost antenna deployments. Hence, the use of triple-polarized antennas appears to be a cost- and space-efficient alternative. In this paper, we model the triple-polarized MIMO channel and evaluate the error performance of OSTBC-MIMO-OFDM system using proposed channel model. Simulation result shows error performance improvement when using triple-polarized antennas in OSTBC-MIMO-OFDM systems compared to that of using spatially-separated uni-polarized antennas.

Keywords: OSTBC-MIMO-OFDM, triple-polarized antenna, uni-polarized antenna

Pages: 140 - 144 | DOI: 10.15224/978-1-63248-000-2-58

28. DESIGN AND FABRICATION OF A HIGH POWER S BAND LDMOS AMPLIFIER FOR MICROWAVE POWER TRANSMISSION AND WIRELESS COMMUNICATION

Authors: BACH GIA DUONG , DOAN HUU CHUC

Abstract: In this paper, we introduce an overview of wireless power transmission for Solar Power Satellite. Specially, We present the study, design and fabrication of a 355W multi stage S – band solid – state power amplifier to be used for Solar Power Satellite. The power amplifier module with 45W peak output power is used as the basic cell of the amplification. Combining 8 of these modules, we achieve 355W. The design and simulated results were carried out by the microwave engineering professional design software, known as ADS2009 package. All simulations and experimental results will be reported.

Keywords: microwave power transmission, power amplifier, wilkinson divider/combiner.

Pages: 145 - 149 | DOI: 10.15224/978-1-63248-000-2-59

29. MULTILEVEL SYSTEM FOR THERMAL DESIGN, CONTROL AND MANAGEMENT OF ELECTRONIC COMPONENTS

Authors: I. A. KHARITONOV , K. O. PETROSYANTS , N.I. RYABOV , P.A. KOZYNKO

Abstract: The methodology and software tools for multi-level thermal and electro-thermal design of electronic components are presented. The discussion covers 2D/3D constructions of: 1) discrete and integrated semiconductor devices; 2) monolithic and hybrid ICs and VLSIs; 3) Hybrid ICs, MCMs and PCBs. The actual test validation using IR thermal measurement is demonstrated for all types of components.

Keywords: thermal design, heat conduction, semiconductor devices, circuits and VLSIs, PCBs, packages, IR temperature control.

Pages: 150 - 155 | DOI: 10.15224/978-1-63248-000-2-60

30. THE MATHEMATICAL MODEL OF 3-D PLANAR BASED ON MULTIMEDIA FLASH AND SIMULINK

Authors: DAW M. ALZENTANI , MOHAMED A. ABOUNGEM

Abstract: This work reports on a high speed flexible automation system based on Cartesian multi-axis coordinate system linear step motor developed, in the target application as a multi-use robot system. The task of this work is to constructs an interactive multimedia page for study and researches the principle’s work of drive of direct action linear step motor, Development the mathematical model and implementation of a closed loopcontrol, based MATLAB/SIMULINK, Study the static and dynamic characteristics of the motor movement which is restricted to the trajectories accessible through the given commands.

Keywords: mathematical model, 3-D Plana, MATLAB and Simulink, Multimedia Flash

Pages: 156 - 160 | DOI: 10.15224/978-1-63248-000-2-61

31. STEADY-STATE ANALYSIS OF 6/4 SWITCHED RELUCTANCE MOTOR USING MATLAB/SIMULINK ENVIRONMENT

Authors: DAW M. ALZENTANI , MOHAMED A. ABOUNGEM , SALEM ALI

Abstract: This work reports on the steady-state analysis and control strategies of switched reluctance motors (SRMs). For this purpose, a theoretical background is introduced and a mathematical model is derived. A Matlab code has been written to determine the motor magnetic characteristics. The inductance profile has also been determined and from which the induced voltage constant, which is used to find the electromagnetic torque, is obtained. A low-performance voltage control strategy is applied to the motor. Simulation results are given to evaluate the overall system performance.

Keywords: switched reluctance motor, voltage control strategy

Pages: 161 - 166 | DOI: 10.15224/978-1-63248-000-2-62

32. REDUCED-COMPLEXITY CHANNEL ESTIMATION FOR ISDB-T ONE-SEG USING MODIFIED ORTHOGONAL MATCHING PURSUIT

Authors: MINORU OKADA , TAKESHI HIGASHINO , RYAN PADERNA

Abstract: Integrated Services Digital Broadcasting for Terrestrial (ISDB-T) One-Seg is a Japanese standard for digital television specifically for mobile reception. It uses Orthogonal Frequency Division Multiplexing (OFDM) that provides robustness against multipath fading. A novel approach called Compressed Sensing (CS) has been implemented for estimating the Channel State Information (CSI). The CS improves the spectral efficiency by estimating the CSI with less measurement. However CS requires high computational cost that makes the method difficult for actual implementation. This paper proposes a new approach for channel estimation using reduced size sparse measurement matrix combined with Modified Orthogonal Matching Pursuit (MOMP) algorithm. The simulation shows that the proposed method provides less execution time for CSI calculation.

Keywords: OFDM, compressed sensing, matching pursuit, channel estimation

Pages: 167 - 171 | DOI: 10.15224/978-1-63248-000-2-63

33. ESSENTIALS OF BPM

Authors: SHAH , M. I

Abstract: Business process modeling has become an ever more popular and essential part of today’s organizations. The business process can be visually represented, depicting the activities, and independencies while at the same time highlighting any inefficiencies and potential areas for improvement. The important of embedding good business process modeling techniques into an organization cannot be underestimated. This paper introduces the audience to business process modeling, its benefits, and guidelines for introducing it into an organization and the key concepts and elements that underpin good business process modeling.

Keywords: business process modeling, benefits, guidelines, elements

Pages: 172 - 175 | DOI: 10.15224/978-1-63248-000-2-64

34. TRACING REQUIREMENTS

Authors: SHAH , M. I

Abstract: Requirements are at the core of all project deliverables. Ensuring that all project requirements are achieved by the project can be difficult to validate if no further means of tracing requirements is employed.Requirements traceability hence is a critical component of any project, as it provides the ability for a project to articulate how any given requirement has been met by the project deliverable. A great deal of research has been undertaken in this field, as requirements traceability although provides a very powerful and useful deliverable, is perceived as a very time consuming, cumbersome and labour intensive task. Due to this perception its popularity and usefulness can be compromised when short cuts are performed to minimise the time and effort that is devoted to documenting the traceability of the project requirements. This paper will look at the current state of play of requirements traceability.

Keywords: requirements, traceability, techniques, challenges

Pages: 176 - 179 | DOI: 10.15224/978-1-63248-000-2-65

35. AGILE REQUIREMENTS ENGINEERING

Authors: MURDACA , C

Abstract: The Agile Software Development Methodology is fast becoming the more popular and eagerly embraced software development methodology. It is underpinned by the Agile Manifesto which clearly articulates the methodology’s underlying principles and values. Requirements engineering is a key component of any development life cycle, yet it has gained little attention in the studies conducted in the Agile Movement. This paper aims to introduce the key features of requirements engineering in an agile setting and how requirements engineering is carried out in two of the more popular agile methods Scrum and Extreme Programming.

Keywords: agile, analaysis, development methodology, requirements engineering

Pages: 180 - 183 | DOI: 10.15224/978-1-63248-000-2-66

36. PROJECTS IN ORGANIZATIONS

Authors: MURDACA , C

Abstract: Due to the ever growing popularity of projects in organizations, a great deal of research has been carried out and continues in the project management space. This article looks at the current state of play for projects in today’s organizations and highlights the main key findings that have come out of research over the last decade.

Keywords: projects, project management, phases, success factor

Pages: 184 - 187 | DOI: 10.15224/978-1-63248-000-2-67

37. ESTIMATION OF FOREARM MOTION BY ELECTROMYOGRAM USING COMPLEX-VALUED NEURAL NETWORK

Authors: HASLINIBINTI ABDULLAH , TAKEHIKO OGAWA

Abstract: Recently, the myoelectric potential generated by the movement of human muscle used as interface for controlling a robot arm and prosthetic device has been studied. The changes of myoelectric potential by muscle motion gave the impact of the robot arm control. It is proposed that electromyography (EMG) patterns can be analyzed and clarified by Neural Network (NN) for the motion determination. Thus, this paper proposes a pattern estimation method of forearm motion by Complex-Valued Neural Network (CVNN).The forearm motion was recorded by Surface Electromyography (SEMG) method as the analysis data from the area of the back and frontof the arm intermediate part. We focused on how to estimate between the four movements in this study using Complex-Valued Neural Network (CVNN). The results show how the methodology we adopted allows us to obtain good accuracy in estimating the forearm motion.

Keywords: myoelectric potential, surface electromyography, neural network, complex-valued neural network

Pages: 188 - 191 | DOI: 10.15224/978-1-63248-000-2-68

38. DIFFERENT ROUTING PROTOCOLS AND THEIR VULNERABILITIES AND THEIR MEASURES

Authors: HIMADRI NATH SAHA , BIPASHA BANERJEE , DEBIKA BHATTACHARYYA , DEBOPAM GHOSH , ROHIT SINGH , SULAGNA MUKHERJEE

Abstract: Mobile Ad-hoc Network (MANET) is a wireless network model which is infrastructure-less and consists of mobile nodes. Since MANET does not have any centralized base station and is robust in nature, it is a major center of attraction. Due to the open nature, access to trusted authorities, the security in MANET poses a huge threat. Also energy constraint is another factor to be considered and thus, routing in MANET is a big challenge .In this paper we have discussed in depth about the various routing protocols in MANET and classify them. We have also discussed and compared their vulnerabilities in form of attacks, and classify these attacks. Brief descriptions of these attacks are given, mainly emphasizing on the network level attacks. Further we briefly review the existing secured MANET routing protocols to tackle these attacks and discuss their efficiency and shortcomings.

Keywords: reactive, proactive, hybrid, MANET, position based routing, attacks in MANET, Secured Routing Protocol

Pages: 192 - 202 | DOI: 10.15224/978-1-63248-000-2-69

39. POSITION LOCATION USING OFDM SIGNAL IN LCX LINEAR CELL MIMO SYSTEM

Authors: MINORU OKADA , TAKESHI HIGASHINO , SATOSHI TSUKAMOTO , TAKAHIRO MAEDA

Abstract: This paper proposes a new scheme of position location for radio terminals using MIMO-OFDM signal. First, this paper describes on a system configuration of LCX linear cell MIMO system and its research issues. Second, to observe channel responses depending on the terminal location, impulse responses are measured in the anechoic chamber. Third, principle of operation for positioning the radio terminals using multiple antennas and its signal processing using OFDM are described. The 2x2 spatial division multiplexing is successfully carried out using 2-port LCX as a transmitting antenna. Time difference of arrival (TDOA) is estimated at receiver by using its channel estimation function. From the experiments, the validity of averaging operation between estimated TDOAs are found to enhance positioning precision.

Keywords: position location, MIMO, LCX, Linear cell, WiFi

Pages: 203 - 206 | DOI: 10.15224/978-1-63248-000-2-70

40. SUPPLEMENTARY MINIMIZATION OF CLUTTER LEVEL FOR PULSED AND MTI RADAR

Authors: A. AL-TAIB AMER , AMER A. AMAR , M. JALBOUB

Abstract: In this paper, brief deals with a new initialization technique for digital IIR filters. The technique is suitable for IIR filters processing a finite number of samples in phased array radars. The initialization processor is complex one and utilized the first received sample to force the filter to reach its steady-state value at a single frequency irrespective of the number of processed samples. This is process is reached by initially loading the internal memories of the filter with their steady-state values. If the filter has a zero steady-state response at that particular frequency then this will ensure that the transient frequency responses of the filter will also have a zero response at that frequency. Different processors are derived for filters with real and complex coefficients.

Keywords: Digital IIR filters, MTI radar, Complex Coefficient.

Pages: 207 - 210 | DOI: 10.15224/978-1-63248-000-2-71

41. EVALUATION OF USING STORAGE BATTERIES AT RESIDENTIAL COMMUNITY LEVEL UNDER A NEW ELECTRICITY PRICING CRITERIA

Authors: AMER A. AMAR , M. JALBOUB , ABDALBASET M. IHBAL

Abstract: Over the next decades, the electricity system will face several chal-lenges originating from both supply and demand side. In the UK there is no real time retail market, and hence no real time retail electricitypricing. Therefore domestic electricity consumers in the UK pay electricity prices that do not vary from hour to hour, but are rather some kind of average price. Real time pricing information was identified as a barrier to understanding the effectiveness of various incentives and interventions. The key question is whether we can evaluate energy management, renewable energy and energy storage intervention in the behaviour of customers in real market terms. Currently only behaviour changes with respect to total consumption can be evaluated. Interventions cannot be defined for peak load behaviour. The effectiveness of the introductionof renewable energy is also hard to assess. Therefore, it is hard to justify introducing of energy storage and demand side management at local communit

Keywords: Real Time Pricing, Renewable Energy Intervention, Demand Side Management, Local Community

Pages: 211 - 215 | DOI: 10.15224/978-1-63248-000-2-72

42. DEVELOPMENT OF STATIC VOLTAGE STABILITY INDEX FOR WEAK BUS IDENTIFICATION

Authors: AMER A. AMAR , ABDALBASET M. IHBAL , M. JALBOUB

Abstract: To meet an ever-increasing electrical load demand, modern power systems are undergoing numerous changes and becoming more complex from operation, control and stability maintenance standpoints. The major problem that is associated with such a stressed system is voltage instability or collapse. A system is said to enter a state of voltage instability when a disturbance causes a progressive and uncontrollable decline in voltage, which can occur because of the inability of the network to meet the increased demand for reactive power. Therefore, the voltage stability analysis is essential in order to identify the critical buses in a power system i.e., buses which are close to their voltage stability limits and thus enable certain measures to be taken by the operators in order to avoid any incidence of voltage collapse. Based on the basic understanding of voltage collapse and voltage stability analysis, a new index of analyzing static stability is proposed utilizing the power flow solution ba

Keywords: Voltage stability, Stability indices, WSCC 9-bus test system

Pages: 216 - 219 | DOI: 10.15224/978-1-63248-000-2-73

43. GEO SPATIAL DATA STRUCTURE FOR EXPLOSIVE DETECTION

Authors: MEENAKSHI SHARMA , NITISH KUMAR

Abstract: The promise of GIS has always been that it would allow us to obtain better answers to our Questions. But this is only possible if we have tools that allow us to perform rigorous quantitative analyses designed for spatial data. GIS provides us with a suite of analysis and modeling tools, ranging from small building blocks that you can use to construct a sophisticated work-flow, to completely self-contained analysis programs. It has a greater range of analysis and modeling tools, supports batch processing, offers new graphing functionality, automatically records work-flows for future reference, supports geodatabases, and can be called programmatically. It consists of algorithms that detect movement or changes in live and recorded video to see whether the movement or changes mean a possible threat is about to occur, occurring, or has occurred. One can also monitor video footage for missing or unwanted objects. Objects that have been left behind (bag containing a bomb) can be detected when

Keywords: GIS, technology , emergency/crime, intruders, response, geographic

Pages: 254 - 254 | DOI: 10.15224/978-1-63248-000-2-112

44. A SURVEY OF FAIRNESS MECHANISM IN BITTORRENT’S PEER SELECTION PROTOCOL

Authors: PUTRA SUMARI , SALEHAH HAMZAH

Abstract: Achieving fairness in peer to peer (P2P) file sharing require user’s contribution of bandwidth resource that is peer’s download bandwidth is equal to the upload bandwidth it contributes to the system. BitTorrent,a popular file sharing employs a “tit-for tat” (TFT) peer selection strategy to guarantee fairness, whereby a peer chooses to upload to a small set of neighboring peers that providing it with the best download rates. However, despite of BitTorrent achieves excellent utilization of upload capacity, many measurement and simulating studies found its fairness are less impressive where it lack of incentive for a peer to contribute and not effective enough to penalize free riders.This paper presents a literature survey of recent works of fairness improvement including free riders prevention in BitTorrent swarm through its TFT peer selection towards better downloading times and improve system stability.

Keywords: BitTorrent, fairness, free riders, peer to peer file sharing ,swarm

Pages: 249 - 253 | DOI: 10.15224/978-1-63248-000-2-108

45. A COMPARATIVE STUDY OF VOIP, MCS, INSTANT MESSAGING PROTOCOLS AND MULTIMEDIA APPLICATIONS

Authors: HADEEL SALEH HAJ ALIWI , PUTRA SUMARI

Abstract: Nowadays, Multimedia Communication has been developed and improved rapidly in order to enable users to communicate between each other over the Internet. In general, the multimedia communication consists of audio, video and instant messages communication. This paper surveys the functions and the privileges of different VoIP protocols (i.e. InterAsterisk eXchange Protocol (IAX), Session Initiation Protocol (SIP), and H.323 protocol), Multimedia Conferencing System (MCS) (i.e. Real Time Switching Control Protocol (RSW) and Multipoint File Transfer System (MFTS), and multimedia applications (i.e. ISO MPEG-4 standards). As well as, this paper make some comparisons among them in terms of codec, transport protocol, call setup format, etc

Keywords: Multimedia, VoIP, Instant messages (IM), Multimedia Conferencing Systems (MCS), InterAsterisk eXchange Protocol (IAX), Session Initiation Protocol (SIP), H.323 protocol, Multipoint File Transfer System (MFTS), Real Time Switching Control Criteria (RSW), ISO MPEG-4 standards

Pages: 245 - 248 | DOI: 10.15224/978-1-63248-000-2-107

46. A WEB-BASED BOOKLET FOR SCHOOL–FAMILY COMMUNICATION

Authors: ALVARO ROCHA , ANTONIO JOSE ABREU SILVA

Abstract: Our purpose was to develop an innovative communication solution to improve and facilitate the interaction and the information exchange between the school and the family of students at the secondary level, mediated by an electronic booklet. We used the Design Science Research scientific methodology to guide our work. We diagnosed the need of a new solution for the traditional scholar booklet, defined the requirements for an electronic tool, developed a prototype and tested it with potential users. The electronic solution for the traditional booklet was justified and the prototype developed showed have potential to improve and facilitate the interaction and information exchange between the school and the family of the students. A new method and tool to improve and facilitate the interaction and information exchange between the school and the family has been made available

Keywords: Communication; School-Family Collaboration; Electronic Booklet; Web Applications

Pages: 239 - 244 | DOI: 10.15224/978-1-63248-000-2-78

47. THE CHALLENGES AND DIFFICULTIES OF INFORMATION SYSTEM DEVELOPMENT: A CASE STUDY OF PERHEBAT

Authors: ESUH OSSAI-IGWE LUCKY , OJENIYI ADEGOKE

Abstract: This paper presents the findings of the field work and interview conducted on the challenges and difficulties of system development at the Perbadanan Hal Ehwal Bekas Angkatan Tentera (PERHEBAT) or Armed Forces Ex-servicemen Affairs Corporation. The study employed both personal interview and observation methods. The findings revealed that infrastructures (hardware and software), manpower, materials, methods and fund were the critical challenges and difficulties faced by PERHEBAT during their system development. Therefore, the study concludes that infrastructures, manpower, materials, methods and fund play crucial role for an effective system development. Our study recommends that there should be sufficient budget to procure the right system hardware and software for right requirements. Secondly, training of staff for both IS development and management should be given urgent attention

Keywords: challenges, difficulties, information, system, PERHEBAT

Pages: 233 - 238 | DOI: 10.15224/978-1-63248-000-2-77

48. DATA CLEANING IN KNOWLEDGE DISCOVERY DATABASE (KDD)-DATA MINING

Authors: ANTONI WIBOWO , FAUZIAH ABDUL RAHMAN , MOHAMMAD ISHAK DESA , NORHAIDAH ABU HARIS

Abstract: Data quality is a main issue in quality information management. Data quality problems occur anywhere in information systems. These problems are solved by data cleaning. Data cleaning (DC)is a process used to determine inaccurate, incomplete or unreasonable data and then improve the quality through correcting of detected errors and omissions. Generally data cleaning reduces errors and improves the data quality. It is well known that the process of correcting errors in data and eliminating bad records are time consuming and involve a tedious process but it cannot be ignored. Various process of DC have been discussed in the previous studies, but there’s no standard or formalized the DC process. Knowledge Discovery Database (KDD) is a tool that enables one to intelligently analyze and explore extensive data for effective decision making. The Cross-Industry Standard Process for Data Mining (CRISP-DM) is one of the KDD methodology often used for this purpose. This paper review and emphasize

Keywords: Data Cleaning, Data Mining, DC Process, Missing Value

Pages: 229 - 232 | DOI: 10.15224/978-1-63248-000-2-76

49. NS-AKA: AN IMPROVED AND EFFICIENT AKA PROTOCOL FOR 3G (UMTS) NETWORKS

Authors: NARENDRA S. CHAUDHARI , NEETESH SAXENA

Abstract: In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of each user in the networks, (i.e., IMSI) by generating a temporary identity for each user during the authentication. The NS-AKA protocol generates minimum communication and computation overheads compared to UMTS-AKA, S-AKA, AP-AKA, and EURASIP-AKA protocols. On an average the NS-AKA protocol reduces 67% of the bandwidth consumption during the authentication process as compare to UMTS-AKA, which is the maximum reduction of bandwidth by any AKA protocol referred in the paper.

Keywords: UMTS, authentication, identity, overhead

Pages: 220 - 224 | DOI: 10.15224/978-1-63248-000-2-74

50. ARTIFICIAL BEE COLONY BASED FUZZY CLUSTERING ALGORITHMS FOR MRI IMAGE SEGMENTATION

Authors: AYAT ALROSAN , NORITA NORWAWI , WALEED ALOMOUSH , WEDIAH ISMAIL

Abstract: Fuzzy clustering algorithms (FCM) have some disadvantage. The main disadvantage is the cluster centroids initialization sensitivity and trapped in local optima. This study proposed a novel clustering method by coupling artificial bee colony with fuzzy c-means (ABC-FCM) algorithm. The technique exploits the superior capabilities of ABC in searching for optimum initial cluster centers and uses these clusters as the input for FCM, thus improving the segmentation of MRI brain images. The performance of the newly developed approach was tested using two sets of MRI images: simulated brain data and real MRI images.

Keywords: improving, segmentation, MRI, brain, images

Pages: 225 - 228 | DOI: 10.15224/978-1-63248-000-2-75

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering