Technical Program

 

19th International Conference on Hybrid Intelligent Systems (HIS 2019)

and

The 15th International Conference on Information Assurance and Security (IAS 2019)

Draft Technical Programme

December 10, 2019 : VIT Bhopal University Visit and free day

December 11, 2019
===============

09:00 - 10:00 : Conference Inauguration

10:00 - 10:30: Coffee break

10:30 - 11:20 : Plenary 1
Prof. Dr. Arturas Kaklauskas, Vilnius Gediminas Technical University, Lithuania

11:20 - 12:10: Plenary 2
Prof. Dr. Stephen Huang, Department of Computer Science, University of Houston, USA

12:10-13:00: HIS - Session 1
2 Dimension Reduction With Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) In Indonesian Language Text Documents Clustering
Muhammad Ihsan Jambak, Ahmad Ikrom Izzuddin Jambak, Rahmad Tirta Febrianto, Danny Matthew Saputra and Muhammad Irfan Jambak

4 State estimation of moving vehicle using Extended Kalman ?lter: A cyber physical aspect
Ankur Jain

14 Modelling, analysis and simulation of a patient admission problem: A social network approach
Veera Babu Ramakurthi, Vijayakumar Manupati, Suraj Panigrahi, M.L.R. Varela, Goran Putnik and P.S.C. Bose

15 Short-Term Load Forecasting: An Intelligent Approach based on Recurrent Neural Network
Atul Patel,?Monidipa Das?and?Soumya Ghosh


12:10-13:00: IAS - Session 1

3 Network packet analysis in real time traffic and study of snort IDS during the variants of DoS attacks
Nilesh Kunhare, Ritu Tiwari and Joydip Dhar

4 Securing Trustworthy Evidences for Robust Forensic Cloud in spite of Multi-Stakeholder Collusion Problem
Sagar Rane, Sanjeev Wagh and Arati Dixit

5 Threat-Driven Approach for Security Analysis of Safety Critical System: A Case Study with a Telemedicine System
Raj Kamal Kaur, Lalit Kumar Singh, Babita Pandey and Aditya Khamparia

10 Key-based Obfuscation using Strong Physical Unclonable Function: A Secure Implementation
Surbhi Chhabra and Kusum Lata

Lunch: 13:00 - 14:00

14:00-16:00: HIS - Session 2

17 Design and Analysis of Anti-windup Techniques for Anti-Lock Braking System
Prangshu? Saikia and Ankur Jain

18 Wind-power intra-day multi-step predictions using general PDE sum models of Polynomial networks based on Operational Calculus
Ladislav Zjavka and Václav Sná?el

33 Diversity In Recommendation System: A Cluster Based Approach
Naina Yadav, Rajesh Kumar Mundotiya, Anil Kumar Singh and Sukomal Pal

38 Analyzing and Enhancing Processing Speed of k-medoid algorithm using efficient large scale processing frameworks
Ayshwarya Jaiswal, Vijay Kumar Dwivedi and Om Prakash Yadav

40 Data clustering using environmental adaptation method
Tribhuvan Singh, Krishn Kumar Mishra and Ranvijay Singh

44 An adversarial learning mechanism for dealing with the class-imbalance problem in land-cover classification
Shounak Chakraborty,?Indrajit Kalita?and?Moumita Roy

49 Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems
Rekha Yadav, Krishna Reddy Reddy and Amit Kumar Tyagi

69 Congestion Control in Vehicular Ad-hoc Networks (VANET’s): A Review
Lokesh Giripunje, Deepika Masand and Shishir Kumar Shandilya

70 Advances in Cyber Security Paradigm: A Review
Shahana Gajala Qureshi and Shishir Kumar Shandilya

71 Weighted mean variant with exponential decay function of Grey Wolf Optimizer under Swarm Based Algorithm
Alok Kumar, Avjeet Singh, Lekhraj . and Anoj Kumar


16:00-16:30: Coffee Break

18:00-21:00: Conference Banquet

December 12, 2019
===============

09:00 - 10:15 : HIS Session 3

78 Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data
Praneet Saurabh, Dhananjay Bisen, Abhishek Mukherjee and Lalit Kane

79 Detection and Prevention of Black Hole Attack using Trusted and Secure Routing in Wireless Sensor Network
Praneet Saurabh, Dhananjay Bisen, Ritu Prasad and Bhavana Barmaiya

80 Recursive Tangent Algorithm for Path Planning in Autonomous Systems
Shetty Adhiraj, Annapurna Jonnalagadda and Aswani Kumar Cherukuri

83 Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks Localization
Nebojsa Bacanin, Eva Tuba, Ivana Strumberger, Miodrag Zivkovic and Milan Tuba

85 Facial Expression Recognition using Histogram of Oriented Gradients with SVM-RFE Selected Features
Sumeet Saurav, Sanjay Singh and Ravi Saini

10:15 - 10:45: Coffee break

10:45 - 11:45 : Plenary 3
Dr. Pawan Lingras, Saint Mary's University, Canada


11:45 - 12:30: Closing Ceremony and Validitory function


HIS 2019 Virtual Presentations
=======================

3 Reducing Data Volume in Instance Based Learning
Maria Do Carmo Nicoletti?and?Luis Andre Claudiano

12 Aspect Detection for Arabic Language
Sana Trugui, Ines Boujelben, Salma Jamoussi and Yassine Ben Ayed

27 Heterogeneous Engineering in Intelligent Logistics
Yury Iskanderov?and Mikhail Pautov

28 Extracting Unknown Repeated Pattern in Tiled Images
Prasanga Neupane, Archana Tuladhar, Shreeniwas Sharma and Ravi Tamang

32 Convolutional Deep Learning Network for Handwritten Arabic Script Recognition?
Mohamed Elleuch and Monji Kherallah

34 Contribution on Arabic Handwriting recognition using deep Neural Network
Zouhaira Noubigh, Anis Mezghani and Monji Kherallah

39 Multiple criteria fake reviews detection based on spammers indicators within the belief function theory
Malika Ben Khalifa, Zied Elouedi and Eric Lefevre

41 Soft Computing, Data Mining, and Machine Learning approaches in Detection of Heart Disease: A Review?
Keshav Srivastava and Dilip Kumar Choubey

42 A novel Computer-Aided Detection System based on Textural Analysis incorporating different Machine Learning methods for Breast DCE-MRI
Raouia Mokni, Norhene Gargouri, Alima Damak, Dorra Sallemi and Wiem Feki

45 An integrated fuzzy ANP-TOPSIS approach to rank and assess E-commerce web sites
Rim Rekik

47 Implementation of Block Chain Technology in Public Distribution System
Pratik Thakare, Nitin Dighore, Ankit Chopkar, Aakash Chauhan, Diksha Bhagat and Milind Tote

59 Three-layer security for Password Protection using RDH, AES and ECC
Nishant Kumar, Suyash Ghuge and Jaidhar C.D

65 Clothing Classification using Deep CNN Architecture based on Transfer Learning
Mohamed Elleuch, Anis Mezghani, Mariem Khemakhem and Monji Kherallah

66 Identification of Botnet Attacks using Hybrid Machine Learning Models
Amritanshu Pandey, Sumaiya Thaseen and Aswani Kumar

81 Marathi Handwritten Character Recognition using SVM and KNN Classifier
Diptee Chikmurge?and?Shiram R

IAS 2019 Virtual Presentations
=======================

2 Automated Access Control Negotiation for Secured Inter-Organizational Workflow Systems?
Asmaa El Kandoussi
12 A Survey on Countermeasures against Man-in-the-browser Attacks
Sampsa Rauti
16 Towards Cyber Attribution by Deception
Sampsa Rauti
19 Tangle The Blockchain: Toward IOTA and Blockchain integration for IoT Environment
Hussein Hellani, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat and Mourad Kmimech

22 Towards a better security in public cloud Computing?
Sonia Amamou, Zied Trifa and Maher Khmakhem