Academy & Industry Research Collaboration Center (AIRCC)

Volume 8, Number 18, December 2018

5th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2018),
December 22-23, 2018, Dubai, UAE
Volume Editors : Dhinaharan Nagamalai, Jan Zizka
ISBN: 978-1-921987-96-0                                                                                                                  Download full Proceedings

Android Untrusted Detection with Permission Based Scoring Analysis 
Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines

An Ontology Based Hierarchical Bayesian Network Classification Model to Predict The Effect of DNA
Repairs Genes in Human Ageing Process
 
Hasanein Alharbi, Al-Mustaqbal University College, Iraq

Fuzzy Boolean Reasoning for Diagnosis of Diabetes 
Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem, University of Oran 1 Ahmed Ben Bella,
Algeria


Virtual AIS Generation Management System for Waterway Risk Assessment 
Jun Sik Kim1, Seung Wook Hong2 and Suhyun Park1, 1Dongseo University, Korea and 2ONE Data
Technology, Korea


Data Management Platform Supporting Volunteer Occupation Services 
Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui, LIST: Luxembourg Institute
of Science and Technology, Luxembourg


Camouflaged with Size: A Case Study of Espionage Using Acquirable Single Board Computers 
Kiavash Satvat1, Mahshid Hosseini1 and Maliheh Shirvanian2, 1University of Illinois at Chicago, USA and
2University of Alabama at Birmingham, USA


Predicting Security Critical Conditions of Cyber Physical Systems with Unobservables and Observation Times 
Alessio Coletta1,2, 1Bruno Kessler Foundation, Italy and 2University of Trento, Italy

Secure Strategy for Optical Image Encryption System Based on Amplitude Modulation, Phase Modulation
and Modified Logistic Map
 
Ahmed M. Elshamy1, Aziza I. Hussein2,3, Hesham F. A. Hamed2, M. A.Abdelghany2 and Hamdy M. Kelash4,
1Fujairah University, UAE, 2Minia University, Egypt, 3Effat University, KSA and 4Menoufia University, Egypt


An Elastic Hybrid Honeynet for Cloud Environment 
Nguyen Khac Bao, Sung Won Ahn and Minho Park, Soongsil University, Korea

A Machine Learning Approach to Detect and Classify 3D Two-Photon Polymerization Microstructures
Using Optical Microscopy Images
 
Israel Goytom and Gu Yinwei, Ningbo University, China

Video Sequencing Based Facial Expression Detection with 3D Local Binary Pattern Variants 
Kennedy Chengeta1 and Serestina Viriri2, 1University of KwaZulu Natal, South Africa and 2Westville
Campus, South Africa


Near-Drowning Early Prediction Technique Using Novel Equations (NEPTUNE) for Swimming Pools 
B David Prakash, IAG Firemark, Singapore

A Preferment Platform for Implementing Security Mechanism for Automotive Can Bus 
Mabrouka Gmiden, Mohamed Hedi Gmiden and Hafedh Gmiden, National Engineers School of Sfax-Tunisia

Randomized Dynamic Trickle Timer Algorithm for Internet of Things 
Muneer Bani Yassein, Ansam Alnadi and Asmaa Bataineh, Jordan University of Science and Technology,
Jordan


Black Hole Attack Security Issues, Challenges & Solution in MANET 
Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh Mohammad Al-Rousan and Danah Arrabi,
University of Science and Technology, Jordan


Security Protocol for Pollution Attack Using Network Coding 
Kiattikul Sooksomsatarn, University of Phayao, Thailand