Click - icsst 2015
Transcription
Click - icsst 2015
Conference Schedule 2015 Portsmouth Conferences Portsmouth, UK January 15-16, 2015 2015 International Conference on Knowledge (ICK 2015) 20154th International Conference on Network and Computer Science (ICNCS 2015) 2015 4th International Conference on Security Science and Technology (ICSST 2015) Conference Schedule This conference is made possible with the support of Welcome to 2015Portsmouth Conferences 1 Conference Schedule The American Society for Research (ASR) welcomes you to attend ASR 2015 conferences in beautiful and historic Portsmouth! Each year, ASR endeavors to provide a perfect balance between professional and personal development. We hope that over the 2 days your work and that of your institution or company will be enhanced both by what you learn and those with whom you connect. Our field is enriched by the dialogue among colleagues from around the world which occurs during presentation sessions as well as informal conversations. We hope this is a memorable, valuable, and enjoyable experience! Table of Contents Items Welcome Table of Contents Announcement General Conference Information Instructions for Oral Workshop Conference Keynote Speakers Conference Schedule Session 1 Session 2 Hotel Information Coming Conferences Pages 2 2 3 4 4 5-6 7-8 9-12 13-17 18 19-25 2 Conference Schedule ANNOUNCEMENT *ICK 2015 conference papers will be published in International Journal of Knowledge Engineering (ISSN: 2382-6185). Indexed by Elsevier: Google Scholar, DOAJ, Engineering & Technology Digital Library, Crossref, ProQuest. *ICNCS 2015 conference papers will be published in International Journal of Future Computer and Communication (ISSN: 2010-3751). Indexed by Elsevier: Google Scholar, Engineering & Technology Digital Library, and Crossref, DOAJ, Electronic Journals Library, EI (INSPEC, IET). *ICSST 2015 conference papers will be published in International Journal of Engineering and Technology (ISSN: 1793-8244). Indexed by Elsevier: Chemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library, Index Copernicus, EI (INSPEC, IET).. A best presentation will be selected from each session, announced and award a certificate at the end of session 3 Conference Schedule General Conference Information Take a look at 2015 Portsmouth conferences offer you... • There are 2 sessions, on topics as Security Science and Technology and Network and Computer Science. • Inspiring and thought-provoking keynote presentations from Prof. BRANISLAV VUKSANOVIC and Dr. Violeta Holmes (see page 5-6 for details on the keynote speakers) • Plenty of opportunities to network and forge connections with your fellow attendees from across the globe, including Keynote Speech Session and Oral presentation Sessions. • Explore the rich and colorful attraction in Portsmouth. Instructions for Oral Workshop Devices Provided by the Conference Organizer: • Laptops (with MS-Office & Adobe Reader) • Projectors & Screen • Laser Sticks Materials Provided by the Presenters: • PowerPoint or PDF files Duration of each Presentation (Tentatively): • Regular Oral Session: About15 Minutes Presentation including 3 Minutes of Q&A • Keynote Speech: 40 Minutes of Presentation including 5 Minutes of Q&A 4 Conference Schedule Conference Keynote Speakers Prof. BRANISLAV VUKSANOVIC, University of Portsmouth, Portsmouth, UK Branislav Vuksanovic was born in Osijek, Croatia in 1962. He graduated from the University of Belgrade, Serbia with degree in Electrical and Power Engineering. He holds MSc degree in Measurement and Instrumentation from South Bank University, London and a PhD in Active Noise Control from the University of Huddersfield, UK. Previously, he worked as a Project Engineer for Croatian Electricity Board in Osijek, Croatia. During his academic career he worked as a Research Fellow at Sheffield and Birmingham Universities on Optical Brain Imaging and Medical Video Compression projects. He also worked as a Lecturer at the University of Derby where he was a member of Sensors and Controls Research Group. Currently he works as a Senior Lecturer at the University of Portsmouth, School of Engineering. He has published papers in the field of active noise control, biomedical signal processing and pattern recognition for intrusion detection and knowledge based authentication. He also published one book in Digital Electronics and Microcontrollers field. Dr Branislav Vuksanovic is a member of IET, ILT and IACSIT. His current research interests are in the application of pattern recognition techniques for power systems and analysis of ground penetrating radar and ECG data. 5 Conference Schedule Dr. Violeta Holmes, University of Huddersfield, UK DrVioleta Holmes leads the High Performance Computing (HPC) Research Group at the University of Huddersfield. Her research interests and expertise are in the areas of HPC systems infrastructure, computer clusters, grids, cloud computing, intelligent agents, and embedded systems. She was awarded the status of Chartered Engineer (IET) and Fellowship of Higher Education Academy and is a member of the British Computer Society (BCS) and the Institute of Engineering and Technology (IET). She joined the School of Computing and Engineering at the University of Huddersfield in 2007as a senior lecturer in embedded system and digital signal processing, parallel computer architectures, computer clusters and grids. In 2010 she co-founded the HPC Research Group which aims to promote the links between high performance computer users, developers and researchers across various research groups and institutes at the University of Huddersfield, and throughout the UK and internationally. Under her leadership, the HPC Research Group was instrumental in establishing collaboration between the University of Huddersfield and the Science and Technology Facilities Council (STFC) Daresbury Laboratory. Since 2012 she has been working with 3M Buckley Innovation Centre at the University of Huddersfield in deploying HPC research and development facilities (Iceotope system) for SMEs and industry. She is currently working on TSB (Innovate UK) funded Energy Efficient Computing project – collaboration between the University of Huddersfield and Tectre Enterprise Solutions. DrVioleta Holmes obtained her degree in Electronics and Physics from the ETF Electronic and Technical Physics Faculty, University of Belgrade, Yugoslavia (Serbia). She continued her postgraduate studies in the UK and completed an MSc in Control Engineering from Bradford University, followed by a PhD from the University of Huddersfield in the application of artificial intelligence in distributed computer control. Her career in Higher Education, as a researcher and lecturer in computing and engineering, spans over 25 years 6 Conference Schedule Conference Schedule Day 1, Thursday, January 15, 2015– Onsite Registration Only Registration: Hall 09:30am-12:00pm 14:00pm-17:00pm Arrival, Registration and Conferencematerials collection **Certificate for Participation can be collected at the registration counter** Day 2, Friday, January 16, 2015 Simple Version: Conference Room 1 10:00a.m.-12:00a.m. 10:00am-10:05am Opening Remarks Keynote Speech I: Dr. Violeta Holmes, 10:05am-10:50am University of Huddersfield, UK Morning 10:50am-11:10am Coffee Break Keynote Speech II: Prof. BRANISLAV VUKSANOVIC, 11:10am-11:55am University of Portsmouth, Portsmouth, UK 11:55am-12:00am Plenary Photo Lunch 12.00pm-13:00pm Conference Room 1 7 Conference Schedule 13:00pm-15:15pm Session 1 15:15pm-15:35pm Coffee break 15:35pm-18:05pm Session 2 Full Schedule: Conference Room 1 Plenary Speech+ Plenary Photo 10:00a.m.-12:00a.m. 10:00am-10:05am Opening Remarks Keynote Speech I: 10:05am-10:50am Dr. Violeta Holmes, University of Huddersfield, UK Morning 10:50am-11:10am Coffee Break Keynote Speech II: 11:10am-11:55am Prof. BRANISLAV VUKSANOVIC, University of Portsmouth, Portsmouth, UK 11:55am-12:00am Plenary Photo Lunch 12:00pm-13:00pm 8 Conference Schedule Afternoon Authors’ Oral Presentation 13:00pm-15:15pm Session 1(SALON TERRAZA) Security Science and Technology Session Chair: ST005 A Method for Shellcode Extraction from Malicious Document Files using Entropy and Emulation KazukiIwamotoand Katsumi Wasaki Secure Brain Corporation,Japan Abstract—We propose a method for the dynamic analysis of malicious documents that can exploit various types of vulnerability in applications. Static analysis of a document can be used to identify the type of vulnerability involved. However, it can be difficult to identify unknown vulnerabilities, and the application may not be available even if we could identify the vulnerability. In fact, malicious code that is executed after the exploitation may not have a relationship with the type of vulnerability in many cases.In this paper, we propose a method that extracts and executes “shellcode”to analyze malicious documents without requiring identification of the vulnerability or the application.Our system extracts shellcode by executing byte sequences to observe the features of a document file in a priority order decided on the basis of entropy.Our system was used to analyze 88 malware samples and was able to extract shellcode from 74 samples.Of these, 51 extracted shellcodes behaved as malicious software according to dynamic analysis. ST012 Index Terms—Malware, Shellcode, Entropy, Dynamic Analysis, Vulnerability Wavelet Based Color Steganography AnushKolakalur, IoannisKagalidis, BranislavVuksanovic University of Portsmouth, UK Abstract—This paper describes the algorithm developed with the aim to hide a“secret” color video sequence within anothercolor video sequence. An approach to apply a wavelet transform in order to decompose the cover video sequenceand then replace the less significant wavelet bandwith“secret” video frames has been implemented and tested. On the receiver side, process is reversed and the hiddencolor video recovered from stego color video.Proposed algorithm has been implemented usingMatlab and PSNR and MSE error metrics employed to evaluate the quality of both video sequences. K02 Index Terms—(DWT) discrete wavelets transform, LSB, PSNR, and Steganography Improving Recommendation using Trust and Sentiment Inference from OSNs Dimah Hussain Alahmadi and Xaio-Jun Zeng 9 Conference Schedule University Of Manchester, UK Abstract—Recommender systems (RSs) provide personalised suggestions of information or products relevant to users’ needs. Although RSs have made substantial progresses in theory and algorithm development and have achieved many commercial successes, how to utilise the widely available information in Online Social Networks (OSNs) has been largely overlooked. Noticing such a gap in the existing research in RSs and taking into account a user’s selection being greatly influenced by his/her trusted friends and their opinions, this paper proposes a framework of Implicit Social Trust and Sentiment (ISTS) based RSs, which improves the existing recommendation approaches by exploring a new source of data from friends’ short posts in microbloggings as micro-reviews. The impact degree of friends’ sentiment and level being trusted to a user’s selection are identified by using machine learning methods including Naive Bayes, Logistic Regression and Decision Trees. As the verification of the proposed framework, experiments using real social data from Twitter microblogger are presented and results show the effectiveness and promising of the proposed approach. K04 K05 Index Terms—Recommender systems, machine learning, trust, sentiment analysis, microblogging. Proposal of Chance Index in Co-occurrence Visualized Network Yukihiro Takayama and Ryosuke Saga Osaka Prefecture University, Japan Abstract—This study describes a chance discovery method for network that usebetweeness centrality and similarity. In prior research of chance discovery, in the chance discovery process, it is required that analysts infer chance from visualized network, because it is difficult that to solve problem like to guess the cause from the data such as non-parametric problem. However, this reasoning process has problem that chance discovery is difficult because chance discovery depends on experience or background knowledge of analysts. Therefore, to solve this problem, we pay attention the mathematical element with the network, and propose chance index that is index of network. Chance index have three calculation methods: the sum of the reciprocal, the product of the reciprocal, and the average reciprocal. Using the proposal method on three kinds of data, results show that proposal method is useful method and chance index that use average reciprocal is most useful calculation method. Index Terms—Network analysis, betweenness centrality, chance discovery, data mining Mining customer feedback documents Eduard Alexandru Stoica and Esra Kahya Özyirmidokuz “Lucian Blaga” University of Sibiu, România / Erciyes University, Turkey Abstract—Managing customer feedback data has become a necessity for firms in order for them to gain competitive advantage in the sector. Analyzing customer complaints’ data to find useful information that’s hidden is an important step in understanding customers. This important, hidden knowledge must be extracted automatically to allow firms to gain a better understanding of the general market and of their own and their competitors' customers. A firm can learn the needs of customers and show how its products and services satisfy these needs by analyzing 10 Conference Schedule these documents. The aim of this research is to summarize and extract data from unstructured customer feedback documents which are about ignoring subscriptions to a telecommunication firm in Turkey. The data are transformed to a collection of documents by generating a document for each record. Text processing techniques are applied. Cosine similarity analysis is used to classify documents into relevant categories. Clusters are determined. K302 CS011 Index Terms—Data mining, text mining, customer feedback data, natural language processing Spray Characteristics and Wall Impingement of Diesel-CNG Dual Fuel Jet Using Schlieren Imaging Technique Mhadi A. Ismael, M. R. Heikal, and M. B. Bahroom University of Bahri, Sudan Abstract—Natural gas for direct-injection (DI) compression ignition (CI) engines is considered to be the best optimized method due to its high volumetric efficiency, high thermal efficiency and low emissions. However, CNG has the penalty of high auto-ignition temperature and lower cetane number. An effective way to use CNG in CI engines is to inject the CNG with a pilot of diesel fuel for ignition purposes. This research is an experimental investigation of the direct injection of CNG jet, diesel spray and combination of fuels (i.e. natural gas with pilot of diesel fuel) in a constant volume chamber using an optical method. The jets were created using two parallel injectors. A low pressure CNG injector (electronic) was used at different injection pressures ranging from 14 bar to 18 bar, while a diesel sprayed injector was used for a high pressure common rail injector ranging from 500 to 700 bar. The Schlieren technique was used for flow visualization and a high speed video camera was used for image acquisition. Series of images of a jet at different time intervals from the beginning of the injection were taken to determine the macroscopic characteristics such as jet penetration rate, jet cone angle and jet tip velocity. The jet radial and height travel along the wall under different injection pressures and temperatures were also measured. Image processing software was developed and used for the analysis. Index Terms—CNG, Diesel-CNG dual fuel, spray wall impingement, schlieren, image processing. Enhanced Timing-sync Protocol for Sensor Networks Shi-Kyu Bae DongYang University, South Korea Abstract—The prominent time synchronization protocol for wireless sensor networks (WSN), Timing-sync Protocol for Sensor Networks (TPSN), was developed to provide high synchronization accuracy among nodes. Until now, TPSN’s approach has been adopted in many other WSN synchronization schemes. However, TPSN has some room for improvement. First, performance of TPSN depends on the efficiency of the hierarchical structure, which requires more efficient structure construction. Secondly, level discovery process is done only once. So, if one of the nodes that were deployed in the middle of the network dies due to power exhaustion, network-wide synchronization will fail. In this paper, I propose a new tree construction algorithm for TPSN, which has 11 Conference Schedule low complexity and gives better efficiency to TPSN’s synchronization process. In addition, tree constructions are performed many times fully or partially depending on network states. The proposed method’s performance has been evaluated by simulation. The results are shown to be better than the original method used in TPSN. CS014 CS306 Index Terms—Time Synchronization, TPSN, Wireless Sensor Network, Tree Construction. Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET Adel Aneiba and Mohammed Melad Benghazi University, Libya Abstract—Routing is a critical issue in MANET and therefore, this is the focus of this paper, along with the performance analysis of its routing protocols. In this paper the performance of four MANET routing protocols (AODV, DSR, OLSR and GRP) are compared. To evaluate and validate the performance of these protocols, a feasibility study in the form of simulations were carried out. In these experiments, the four protocols were tested under different scenarios and circumstances using a simulation tool called OPNET. The performance of these routing protocols is analyzed based on two performance metrics: delay and throughput. The simulation results have shown that on average, under heavy FTP traffic condition, the OLSR protocol outperforms the other three protocols with respect to the mentioned metrics under two scenarios (20 and 80 mobile nodes) that have been created in OPNET. Index Terms—FTP, MANET, OPNET, routing protocols. Cloud Computing: A Detailed Relationship To Grid and Cluster Computing Ikechukwu Nwobodo Typical Systems Ltd, UK Abstract—Cloud computing continues to maintain a rapid growth while constituting a viable alternative to conventional computing. Cloud computing is an emerging business computing model that enable users access to IT resources via internet infrastructure at any PC connected node across the globe without hardware constraints. Cloud computing concept is a development trend based on several successful researches in computing areas such as virtualization, grid computing, cluster computing and distributed computing. Cloud, cluster and grid computing share some common features towards achieving utility or service oriented computing although marginal differences exist on their processes and approaches in many ways. This paper will be exploring the evolutionary relationships in terms of features and component of cloud computing technological innovation in comparison to cluster and grid computing. Index Terms—Cloud computing, grid computing, cluster computing, utility computing 12 Conference Schedule Coffee Break 15:15pm-15:35pm Afternoon Authors’ Oral Presentation 15:35pm-18:05pm Session 2(SALON TERRAZA) Network and Computer Science Session Chair: Assoc. Prof. Ryosuke Saga, Osaka Prefecture University, Japan CS101-P1 CS003 Study of Early Warning of Copyright Infringement Risks in Information Resources for presenter only Wende Zhang, Chan Li and Yixin Lan Fuzhou University, China Abstract–The main aim of this study is to assess the potential copyright infringement risks (CIR) in information resources by using the extension theory. At first, the analytic hierarchy process (AHP)is employed to determine the weights of the existing early warning indicators system. Secondly, a modelis built based on the extension theory to evaluate the potential CIR in information resources. Finally, a real-world application is presented to show the effectiveness and usefulness of our approach. The main findings of this study are as follows: (1) the early warning extension theory model is effective in distinguishing the degree of the potential CIR in information resources; (2) the information resources of XX University is identified as located in the non-warning level, which meaning there is only a slim chance of infringing copyright. This paper introduces the extension theory into the evaluation of the potential CIR in information resources. The results contribute to providing decision support for the decision maker in handling the potential CIR in information resources. Index Terms—Information resources, Copyright Infringement risks, Early warning, Extension theory The Acceptance of Educational Data Mining Technology among Students in Public Institutions of Higher Learning in Malaysia Muslihah Wook, Zawiyah M. Yusof and Mohd Zakree Ahmad Nazri National Defence University of Malaysia, Malaysia Abstract—Accepting the emergence of data mining technology by students is crucial to the successful implementation of the technology in education institutions. Although previous studies have empirically show the result of acceptance or adoption of data mining technology in numerous fields, however, they are focused at organisational-level. Hence, there is a need to explain what are the determinants could influence the acceptance of data mining technology at individual-level since they are the most affected by the technology. Therefore, this study adapts selected constructs in the Technology 13 Conference Schedule Acceptance Model 3 (TAM3) to conceptualise the research problem, namely in terms of perceived usefulness, perceived ease of use, relevance for analysing, anxiety of educational data mining technology, self-efficacy and facilitating conditions. To examine the model, this study surveyed 158 students from four public Institutions of Higher Learning in Malaysia. Pearson product-moment correlation coefficient is utilised to analyses the relationship between the constructs. The findings have revealed that most of the constructs have a high level of correlation. K07 K201 CS005 Index Terms—Acceptance, data mining, educational data mining, institutions of higher learning (IHLs), technology acceptance model 3 (TAM3). Factor Analysis for Game Software Using Structural Equation Modeling with Hierarchical Latent Dirichlet Allocation in User’s Review Comments Rikuto Kunimoto, Hiroshi Kobayashi and Ryosuke Saga Osaka Prefecture University, Japan Abstract—While the market investigation is important in game software development, there is a problem that there is no effective way to pursue the factor of user's software evaluation. In this research, we paid attentions to corpus (electric existence of documents) considered that the factor relationships about the user's evaluation were expressed potentially as their opinions. As the way to achieve this idea, we tried to extract useful knowledge by using SEM and topic model for visual and quantitative analysis process. As the related work, there are several researches about Game software market using text mining methods (LSI, or LDA). However, they have the problem concerning to objectivity or explanations because the relationships between topics are not defined based on technical algorithms and expressed only as the frequency of the words that constructs the topics. Experimental results showed that our proposal process can extract effectively the topics that users pay attentions when they evaluate the game software and we can interpret it. Index Terms—Causal Analysis, factor expression, game software, structural equation modeling, topic model, hierarchical latent dirichlet allocation. Youth Knowledge on the Law of Youth Development in Malaysia Asmah Laili Yeon, SitiAlida John Abdullah, Rozita Arshad, Zainal Amin Ayub, Alias Azhar, SafiahSuhaimi, Tuan Nurhafiza Raja Abdul Aziz College of Law, Government and International Studies, Universiti Utara Malaysia Abstract—This paper examines youth knowledge on the law of youth development in Malaysia. Knowing the law is an added value to youth because they can assist the government in developing youth programmes and activities. This study is a socio-legal study. A survey has been conducted among youth in Malaysia to investigate their awareness on the law of youth development. 267 youths has responded to the survey. The findings show that about 70% of respondents agree that Malaysia has laws which protect the interest of youth. However, less than 50% of respondents have knowledge that about the Youth Societies and Youth Development Act 2007 which states main policies relating to youth development. The overall finding shows that less than 60% respondents are aware about youth policy. It is suggested that more promotion and activities be initiated to improve awareness concerning law and regulations among youth in Malaysia. Index Terms—Knowledge, youth law, youth policy, awareness Evaluation of the Energy Impact on Indoor Small Cells and Backhaul 14 Conference Schedule Moraes A. R. L., Farias F. S., Costa J. C. W. A Federal University of Para, Brazil Abstract—The use of heterogeneous networks, based on the macro and small cells composition, significantly reduces the power consumption in wireless networks. On the other hand, the implementation of the backhaul infrastructure responsible for ensuring communication and traffic support generated by the small cells causes a reverse regarding to the electric energy consumption. Thus, this study presents a model of predicting traffic for the next 15 years, from 2015 to 2030, aiming to define the energy impacts of using small cells for indoor coverage. Furthermore, this study shows the discretized impact of each backhaul structure component in the growth of electric energy consumption. CS006 CS015 CS016 Index Terms—Backhaul, energy efficiency, small cells, traffic model. An Energy Efficiency Assessment for Indoor Small Cells using Copper-based Backhaul Moraes A. R. L., Farias F. S., Costa J. C. W. A Federal University of Para, Brazil Abstract—Heterogeneous networks (HetNets) are being adopted as the main alternative for reducing the energy consumption in wireless network. This adoption forces the backhaul architectures expansion, and consequently it increases the overall network energy consumption. In the last years, copper technology has been disregarded to backhaul indoor small cells. However, lately the copper-based technology turned out as an effective option due to the femtocelltechnology based on wireless over cable (FemtoWoC). In this paper, it was assessed two backhaul architectures, using copper in the last mile, to connect FemtoWoC in the network. It was also evaluated the energy-effiency achieved compared to the results in scenarios using conventional femtocells. Index Terms—Energy Efficiency, Mobile Backhaul, Small Cells. Effect of Simulation on Students’ Interest in Programming Language in Secondary Schools in Enugu Education Zone of Nigeria Rebecca ChinasaOdo, AnicetusIkechukwuOdo Enugu State University of Science and Technology, Nigeria Abstract—The researcher investigated the effect of simulation method on students’ interest in programming language in secondary schools in Enugu education zone of Nigeria using quasi-experimental design. The instrument for data collection was pretest posttest non equivalent control group. The population for the study comprised all senior secondary school class 2 (SS2) science students in a single sex school in Enugu Education Zone of Enugu State. Data were collected from a sample of 225 students selected from four secondary schools two boys’ schools and two girls’ schools. A reliability coefficient of 0.89 was obtained from the instrument through test retest. Mean and standard deviation scores were used to answer the research questions, while two-way analysis of Covariance (ANCOVA) was used to test the hypotheses at 0.05 level of significant. The findings show that students taught using simulation method achieved higher than those taught with traditional method. It was recommendations that ministry of education should revisit the instructional materials used in teaching. Index Terms—Interest, Programming language, secondary school, simulation. Automated Water Treatment Alternative for Domestic use in Enugu State of Nigeria 15 Conference Schedule Anicetus Ikechukwu Odo, Rebecca Chinasa Odo Enugu State University of Science and Technology, Nigeria Abstract—Many households in Enugu depend on water sourced from municipal water system for domestic use, especially for drinking purposes. Unfortunately, this source is not safe enough for drinking primarily due to poor water distribution network. As water travels from the Point of Treatment (POT) to the Point of Use (POU), it comes in contact with numerous contaminants via broken and rusty pipes. This study proposes a system that reduces or totally eliminates pollutants from domestic water at the point where it is used. Most of the naturally present pollutants (Bacteria, Viruses, Minerals, Heavy Metals, etc) are usually removed at the POT but results of tests carried out on water at various POUs within Enugu show that some levels of pollutants are present (Turbidity of 15 NTU, Colour of 25 units, Trihalomethane of 0.10mg/L, Odour> 3 Threshold). These values are clearly outside the standards set by the World Health Organisation (WHO) for household and indeed drinking water [1]. By channelling water through a system of activated carbon filter, these pollutants are removed at POU. The system is made-up of a reservoir, filter and dispenser subsystems. Water enters the reservoir from the POT and from where the filter is fed. The output Water from the filter enters another reservoir from where it is dispensed. These processes of storage, treatment and dispensing are fully automated using a microcontroller chip to ensure efficiency and convenience. This study will be beneficial to the Ministry of water resources and the general public. CS206 K202 Index Terms—Control, Automation, Filtration, Water, Pollutant Designing Medical CBIR System with Edge Density Criterion Kulwinder Singh Mann and Er. Jagbir Singh Gill PTU Guru Nanak Dev Engineering College Ludhiana, India Abstract—The Medical Image can be understood by its visual features also known as image signatures. These features when modified or enhanced under certain geometrical functions, it improves the resultant retrieval by the increase of 94% in the performance with the Comparison of 85% in the case of the nearest neighbor and in the case of normal image Retrieval it comes out to be 75 %. This Research includes the approach of calculating edge density is applicable for the five human body parts- Hands, Pelvis, Breast, Brain and Chest and is cam parable to the system in the previous work in literatures. The Result acquired for the proposed system comprises of edge density concepts. Index Terms—Medical images, edge density, geometric feature vector, content based image retrieval. Knowledge Management, Innovation and Organizational Performance Samina Nawab, Tahira Nazir, Muhammad Mohsin Zahid and Syed Muhammad Fawad COMSATS Institute of Information Technology, WahCantt Pakistan Abstract—In the 21st century the boundaries of business are expanding everyday and the management of different portfolios is not an easy task. Organizations are striving for innovation and to gain a competitive edge. Knowledge Management put emphasis on particularly this issue. This study has focused on the role of middle management in the implementation of knowledge management with the help of KM processes and strategies which eventually leads to innovation. Also the critical success factors of knowledge management on innovation are discussed in the study. The study concludes that the Knowledge Management processes which are Knowledge Creation, Knowledge 16 Conference Schedule organizing, Knowledge Storage , Knowledge Sharing & Knowledge Utilization have significant but indirect impact on banking industry, and the results showed that these processes are contributing in the enhancement of innovation in banking industry. Index Terms—Knowledge Management, Organizational Innovation, Organizational Performance. 17 Conference Schedule ConferenceVenue Holiday Inn Portsmouth http://www.icncs.org/venue.html Add: Pembroke Road, Portsmouth, PO1 2TA, United Kingdom Tel: 44-0871 942 9065 Directions By Air Gatwick Airport (LGW) Distance: 80.0 MI/128.75 KM NORTH EAST to Hotel Leave M23 at J 8, join M25 leave at J10 at the roundabout take first exit and merge on to A3 signposted Guildford and Portsmouth Continue on A3 till A27 and take J12 on to M275 follow signs to City Centre and Seafront and the hotel is on the right hand side Bournemouth International Airport (BOH) Distance: 50.0 MI/80.47 KM SOUTH WEST to Hotel Follow signs for M27 East. Leave M27 at junction 12 you will then join M275 which will take you into Portsmouth City Centre. Follow Southsea signs or seafront, when approaching the sea front hotel is on your next right after the Kings Road roundabout. Southampton International Airport (SOU) Distance: 22.0 MI/35.41 KM SOUTH WEST to Hotel Take M27 eastbound towards Portsmouth By Train Station Name: Station - Portsmouth Harbour Distance: 0.5 MI/0.8 KM WEST to Hotel Shuttle Charge (one way): £ 5.00 GBP View More Taxi Charge (one way): £ 5.00 GBP Bear left onto Saint George's Road at Cambridge Junction roundabout take the 2nd exit onto Museum Road - B2154 signposted Southsea At Kings Road Roundabout take the 3rd exit onto A288 for Seafront onto the A288 Turn right onto Pembroke Road 18 Conference Schedule Welcome to American Society for (www.asr.org) Upcoming Conferences: DATE NAME Research PAPER WILL BE PUBLISHED BY All accepted papers of ICMM 2015 will be published by Applied Mechanics and Materials Journal (ISSN: 1660-9336). Feb 12-13, 2015 Busan, South Korea ICMM 2015 2015 6th International Conference on Mechatronics and Manufacturing http://www.icmm.org/ ICAEE 2015 2015 the 2nd International Conference on Advances in Electronics Engineering http://www.icaee.org/ ICAPM 2015 2015 5th International Conference on Applied Physics and Mathematics http://www.icapm.org/ ICMLC 2015 2015 7th International Conference on Machine Learning and Computing http://www.icmlc.org/ Mar19-20, 2015 Florence, Italy ICEIT 2015 2015 4th International Conference on Educational and Information Technology http://www.iceit.org/ 19 Indexed by Elsevier: SCOPUS www.scopus.com and EiCompendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA)www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc. All accepted papers of ICAEE 2015 will be published by International Journal of Information and Electronics Engineering (IJIEE) (ISSN: 2010-3719) Indexed by Google Scholar, Electronic Journals Library,Engineering& Technology Digital Library,Crossref and ProQuest, DOAJ, Ei (INSPEC, IET). All accepted papers of ICAPM 2015 will be published by International Journal of Applied Physics and Mathematics (IJAPM) (ISSN: 2010-362X) Indexed by EI (INSPEC, IET),Chemical Abstracts Services (CAS), DOAJ,Electronic Journals Library, Engineering & Technology Digital Library, Nanowerk Database, Crossref, Google Scholar and ProQuest. All accepted papers of ICMLC 2015 will be published by International Journal of Machine Learning and Computing (IJMLC) (ISSN: 2010-3700) Indexed byEngineering& Technology Digital Library, Google Scholar, Crossref, ProQuest, Electronic Journals Library, DOAJ and EI (INSPEC, IET). All accepted papers of ICEIT 2015 will be published by Journal of Information and Education Technology (IJIET). (ISSN: 2010-3689) Indexed byEI (INSPEC, IET),Cabell's Directories, DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, EBSCO, Google Scholar, Crossref and ProQuest. Conference Schedule April 6-7, 2015 Orlando, USA ICICN 2015 2015 3rd International Conference on Information and Computer Networks http://www.icicn.org/ ICFD 2015 2015 International Conference on Fluid Dynamics http://www.icfd.org/ ICCEB 2015 2015 4th International Conference on Computer Engineering and Bioinformatics http://www.icceb.org/ ICTLE 2015 2015 4th International Conference on Traffic and Logistic Engineering http://www.ictle.org/ 20 All accepted papers of ICICN 2015 will be published by Journal of Advances in Computer Networks (ISSN: 1793-8244) Indexed byEngineering& Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar. All accepted papers of ICFD 2015 will be published by Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed byElsevier: SCOPUS www.scopus.com and EiCompendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA)www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc. All accepted papers of ICCEB 2015 will be published by International Journal of Engineering and Technology (IJET) (ISSN: 1793-8236). Indexed byChemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library, Index Copernicus, EI (INSPEC, IET). All accepted papers of ICTLE 2015 will be published by Journal of Traffic and Logistics Engineering (JTLE) (ISSN: 2301-3680) Indexed byUlrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library. Conference Schedule All accepted papers of ICCIT 2015 will be publishedin the one of the following Journal with ISSN. Journal of Software (JSW, ISSN 1796-217X) ICCIT 2015 2015 International Conference on Computer and Information Technology http://www.iccit.org/ International Journal of Computer Theory and Engineering (IJCTE) (ISSN: 1793-8201) Indexed byIndex Copernicus, Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET), Cabell's Directories. International Journal of Computer and Electrical Engineering (IJCEE) (ISSN: 1793-8163) Indexed byUlrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library, Crossref, ProQuest, EI (INSPEC, IET), and Electronic Journals Library Lecture Notes on Information Theory (ISSN: 2301-3788) Indexed by EI(INSPEC, IET), Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and etc. All accepted papers of ICEEE 2015 will be publishedin the one of the following Journal with ISSN. Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and EiCompendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA)www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc. April 28-29, 2015 Ankara, Turkey ICEEE 2015 2015 2nd International Conference on Electrical and Electronics Engineering http://www.iceee.org/ International Journal of Electronics and Electrical Engineering (ISSN: 2301-380X) Indexed byUlrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library, etc. Journal of Automation and Control Engineering (ISSN: 2301-3702) Indexed byEI (INSPEC, IET), Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and etc. International Journal of Electrical Energy (ISSN: 2301-3656) Indexed byEI(INSPEC, IET), Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and etc. 21 Conference Schedule All accepted papers of IOAC 2015 will be published by Applied Mechanics and Materials Journal (ISSN: 1660-9336) May 9-10, 2015 Bali, Indonesia ICOAC 2015 2015 International Conference on Automatic Control http://www.icoac.org/ Indexed byElsevier: SCOPUS www.scopus.com and EiCompendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA)www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc. All accepted papers of ICMML 2015 will be published by Advanced Materials Research (ISSN: 1022-6680). ICMMT 2015 2015 6th International Conference on Material and Manufacturing Technology http://www.icmml.org/ Indexed byElsevier: SCOPUSwww.scopus.com and EiCompendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com , Institution of Electrical Engineers (IEE)www.iee.org , etc All accepted papers of ICRE 2015 will be publishedin the one of the following Journal with ISSN. Advanced Materials Research (ISSN: 1022-6680). ICRE 2015 2015 International Conference on Reliability Engineering http://www.icre.org/ Indexed byElsevier: SCOPUSwww.scopus.com and EiCompendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com , Institution of Electrical Engineers (IEE)www.iee.org , etc Journal of Engineering and Technology (IJET) (ISSN: 1793-8236). Indexed byChemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library, Index Copernicus, EI (INSPEC, IET). All accepted papers of ICLB 2015 will be published by Advanced Materials Research (ISSN: 1022-6680). ICLB 2015 2015 International Conference on Lithium Batteries http://www.iclb.org/ 22 Indexed byElsevier: SCOPUSwww.scopus.com and EiCompendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com , Institution of Electrical Engineers (IEE)www.iee.org , etc Conference Schedule ICCSN 2015 2015 the 7th International Conference on Communication Software and Networks http://www.iccsn.org/ All accepted papers of ICCSN 2015 will be publishedin the one of the following Journal with ISSN. WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) Indexed byEICompendex, Scopus and ISI. Journal of Communications (JCM) (ISSN: 1796-2021; DOI: 10.12720/jcm) Indexed byEICompendex; SCOPUS; ULRICH's Periodicals Directory; Google Scholar; INSPEC; etc. All accepted papers of ICIIP 2015 will be publishedin the one of the following Journal with ISSN. WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) June 6-7, 2015 Chengdu, China ICIIP 2015 2015 the 4th International Conference on Intelligent Information Processing http://www.iciip.org/ Indexed byEICompendex, Scopus and ISI. Journal of Industrial and Intelligent Information (ISSN: 2301-3745; DOI: 10.12720/jiii) Indexed by EI(INSPEC, IET), Google Scholar, EBSCO, Engineering & Technology Digital Library and etc. All accepted papers of ICWOC 2015 will be publishedin the one of the following Journal with ISSN. WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) ICWOC 2015 ICDDM 2015 July 2-3, 2015 Chicago, USA ICKD 2015 2015 the 4th International Conference on Wireless and Optical Communications http://www.icwoc.org/ The 2015 4th International Conference on Database and Data Mining http://www.icddm.org/ The 2015 4th International Conference onKnowledge Discovery http://www.ickd.org/ 23 Indexed byEICompendex, Scopus and ISI. International Journal of Future Computer and Communication (ISSN: 2010-3751; DOI: 10.7763/IJFCC) Indexed byGoogle Scholar, Engineering & Technology Digital Library, and Crossref,DOAJ, Electronic Journals Library, EI (INSPEC, IET). All accepted papers of ICDDM 2015 will be published by WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) Indexed byEICompendex, Scopus and ISI. All accepted papers of ICKD 2015 will be published by International Journal of Computer Theory and Engineering (IJCTE)(ISSN: 1793-8201) Indexed by Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI(INSPEC, IET). Conference Schedule ICOIP 2015 ICROM 2015 The 2015 4th International Conference onOptoelectronics and Image Processing http://www.icoip.org/ 2015 2nd International Conference on Robotics and Mechatronics http://www.icrom.org/ ICAME 2015 2015 the 4th International Conference on Advances in Mechanics Engineering http://www.icame.org/ July 20-21, 2015, Madrid, Spain All accepted papers of ICDDM 2015 will be published by WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) Indexed byEICompendex, Scopus and ISI. All accepted papers of ICROM 2015 will be published by Applied Mechanics and Materials (ISSN: 1660-9336) Indexed by Elsevier: SCOPUSwww.scopus.com and EiCompendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com , Institution of Electrical Engineers (IEE)www.iee.org , etc All accepted papers of ICROM 2015 will be published by Applied Mechanics and Materials (ISSN: 1660-9336) Indexed by Elsevier: SCOPUSwww.scopus.com and EiCompendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com , Institution of Electrical Engineers (IEE)www.iee.org , etc Submitted conference papers will be reviewed by technical committees of the Conference. All accepted papers will be published in one of the following Journals. International Journal of Electronics and Electrical Engineering(IJEEE) (ISSN: 2301-380X) ICCSS 2015 2015 5th International Conference on Circuits, System and Simulation http://www.iccss.org/ included in Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library. International Journal of Information and Electronics Engineering(IJIEE) (ISSN: 2010-3719) included in Google Scholar, Electronic Journals Library, Engineering & Technology Digital Library, Crossref and ProQuest, DOAJ, Ei (INSPEC, IET). 24 Conference Schedule All accepted papers will be published in one of the indexed Journals after being selected. International Journal of Computer Theory and Engineering (IJCTE) (ISSN: 1793-8201) DOI: 10.7763/IJCTE Editor-in-Chief: Prof. WaelBadawy ICCCD 2015 2015 the 5th International Conference on Computer and Communication Devices http://www.icccd.org/ Abstracting/Indexing: Index Copernicus, Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET), Cabell's Directories. International Journal of Computer and Communication Engineering (IJCCE)(ISSN: 2010-3743) DOI: 10.7763/IJCCE Editor-in-Chief: Dr. Maode Ma Aug 22-23, 2015 New Taipei, Taiwan Abstracting/ Indexing: EI (INSPEC, IET), Google Scholar, Engineering & Technology Digital Library, ProQuest, and Crossref, Electronic Journals Library All accepted papers will be published in one of the indexed Journals after being selected. ICOSP 2015 2015 International Conference on Signal Processing http://www.icosp.org/ ICRAS 2015 2015 5th International Conference on Robotics and Automation Sciences http://www.icras.org/ 25 WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) Indexed by EI Compendex, Scopus and ISI. International Journal of Signal Processing Systems (IJSPS) (ISSN: 2315-4535) Indexing: Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library, etc. The ICRAS 2015 proceedings will be published by IEEE and all the papers will be archived in the IEEE Xplore and indexed by EiCompendex and ISI. Conference Schedule Note 26 Conference Schedule 27