NCS2019 2020 Nov. 23, 2019 to Nov. 24, 2019, Zurich, Switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Finding Maximal Localizable Region in Wireless Sensor Networks by Merging Rigid Clusters Saroja Kanchi Localization of Wireless Sensor Network (WSN) is the problem of finding the geo-locations of sensors ...
Toward A Framework to Implement A Master Data Management under SOA Chafika Benkherourou Master Data Management (MDM) and Service Oriented Architecture (SOA) are gaining increased prominence within the ...
Cognitive Cities an Architectural Framework for the Cities of the Future Cristiana Carvalho1 , Filipe Cabral Pinto1 , Isabel Borges1 , Gonçalo Oliveira Digital transformation has changed management models in cities. The use of tools supported by information ...
Anomaly-based Intrusion Detection for Hyper Large Industrial IoT Networks Mohammad Rmayti , Alexis Polvé During the last decade, the world witnessed a significant transformation in manufacturing policies called Industry ...
Prediction and Causality Analysis of Churn Using Deep Learning Muzaffar Shah , Darshan Adiga , Shabir Vyeth In almost every type of business a retention stage is very important in customer life ...
A Novel Machine Learning System for Sentiment Analysis and Extraction Osama Alokaily The huge volume of online reviews makes it difficult for a human to process and ...
Fuzzy logic for E-recruitment Abdessamad Ouznini , Youssef Fakir , Mohamed Fakir , Bouzekri Moustaid In this study, we create a job matching system that articulate over semantic web technologies ...
A Comparison of Unsupervised Anomaly Detection Methods on a Unified Host and Network Dataset Donald Brown , Catherine Beazley , Karan Gadiya , Rakesh Ravi , David Roden , Boda Ye , Brendan Abraham , And Malathi Veeraraghavan Systems administrators need to efficiently detect and respond to cybersecurity breaches to protect their network. ...
An Artificial Neural Network Approach for the Classification of Human Lower Back Pain Shubham Mayorga In today’s world, the problem of lower back pain is one of the fastest growing ...
Prediction of Workpiece Quality: An Application of Machine Learning in Manufacturing Industry Günther Schuh , Paul Scholz , Sebastian Schorr , Durmus Harman , Matthias Möller , Jörg Heib , Dirk Bähre A significant amount of data is generated and could be utilized in order to improve ...
Automated Music Making with Recurrent Neural Network Yao Lu , You Peng Today, the growing market of entertainment has placed a higher demand for music. Quality music ...
In Hindsight: A Smooth Reward for Steady Exploration Hadi Schmidt-thieme In classical Q-learning, the objective is to maximize the sum of discounted rewards through iteratively ...
A Hybrid Model for Evacuation Simulation and Efficiency Optimization in Large Complex Buildings Hao Yuan , Guo Yu , Yifan Ma , Jieneng Chen , Xiongda Chen Traditional methods for simulating the flow of people includes the Cellular Automaton, artificial potential field, ...
Quality Model to the Adaptive Guidance Hamid Oussala The need for adaptive guidance systems is now recognized for all software development processes. The ...
Collaborative and Fast Decryption Using Fog Computing and A Hidden Access Policy Ahmed Saidi , Omar Amira Nowadays, IOT (Internet Of Things) devices are everywhere and are used in many domains including ...
Managed Cloud Operations Andrei Carabas In today’s fast-moving world, advances in technology occur at an alarming rate. Keeping up is ...
Semantic Document Classification based on Strategies of Semantic Similarity Computation and Correlation Analysis Shuo Yang , Ran Wei , Hengliang Du Document (text) classification is a common method in ebusiness, facilitating users in the tasks such ...
Automated Generation of Computer Graded Unit Testing-Based Programming Assessments for Education Sébastien Moffarts Automatic assessment of code, in particular to support education, is an important feature that several ...
SFERANET: Automatic Generation of Football Highlights Vincenzo Scotti , Licia Tedesco We present a methodology for automatic generation of football match “highlights”, relying on the commentator ...
Automation Regression Testing for SAS.AM Website Harutyun Ali This research study is focused on a company which operated in online shopping. The company ...
Secure and Privacy-aware Data Collection Architecture Approach in Fog Node Based Distributed IoT Environment Moussa Konstantas In the era of Internet of Thing, data are collected from heterogeneous wireless protocols such ...
An Intelligent Mobile Application to Manage College Database and Recommendation Using Data Mining Yu Zhang , Yixian Qi , Qi Lu College application is critical and complicated task for high school students. Generally speaking, one student ...
TRIT: A Robust Tracker Based on Triplet Network Peng Cai In this paper, a target tracking algorithm, TriT(Triplet Network Based Tracker), based on Triplet network ...
Customized Garment Fashion Recommendation System Using Data Mining Techniques Shukla Sharma , Ludovic Koeh , Pascal Bruniaux , Xianyi Zeng The fashion industry has moved so fast in a few years and expected to grow ...
Abstractive text summarization using Transformer based deep learning Xin Liu Extractive and abstractive are two main text summarization techniques, unlike previous works which treat them ...
Motion estimation from noisy image sequences using new frequency weighting functions El Ismail Motion estimation is a signal-matching technique. It is a key component of target tracking, medical ...
Split Multi-stage Vector Quantization Based Steganography for Secure Wideband Speech Coder Merouane Laskar Speech steganography is a technique of covert communication which conveys secret speech hidden in cover ...
Segmentation of Single and Overlapping Leaves by Extracting Appropriate Contours Rafflesia Debnath Leaf detection and segmentation is a complex image segmentation problem as leaves are most often ...
Lane Detection for Prototype Autonomous Vehicle Sertap Kamçi , Dogukan Aydin Unmanned vehicle technologies are an area of great interest in theory and practice today. These ...
Nature-inspired Meta-heuristic Optimization Algorithms: Grey Wolf Optimization, Dolphin Swarm Optimization, And Bacterial Foraging Optimization Büsra Rümeysa Mete , Dogukan Arslan In mathematical sense, optimization can be defined as minimizing or maximizing a function. Meta-Heuristic Optimization ...
Lifetime Extension of Ad Hoc Wireless Network with Shadowing Effects Amir J. Majid Lifetime extension algorithm is implemented on an ad hoc wireless networks with shadowing effects, and ...
Measurement and Characterization of the Stationary Noise in Narrowband Power Line Communication Raja Attia Understanding the interference scenario in power lines network is a key step to characterize the ...
Token Bucket-based Throughput Constraining in Cross-layer Schedulers Jeremy Blondia In this paper we consider upper and lower constraining users' service rates in a slotted, ...
SS EMS :A Smart and Secure Framework of Energy Management System Jaspreet Kalra Nowadays every infrastructure work smartly as smart home, smart industry, smart academia etc. They use ...
Methodology to Evaluate WSN Simulators: Focusing on Energy Consumption Awareness Michel Bakni , Luis Chacon , Yudith Cardinale , Guillaume Terrasson , And Octavian Curea Nowadays, there exists a large number of available network simulators, that dier in their design, ...
Design a simple printed antenna with DGS structure for UWB/SWB applications Tarek Messatfa , Fouad Chebbara , Abdelkarim Belhedri , And Abderrahim Annou In this paper a circular microstrip patch antenna with Defected Ground Structure (DGS) has been ...
A Fair Electronic Voting System Using Blockchain Changhyun Lee E-government systems have ensured reliable data and prevented the forgery and modulation of that information, ...
Public-Key Based Authentication Architecture for IoT Devices Using PUF Haji Akhundov , Erik Sluis , Said Taouil Nowadays, Internet of Things (IoT) is a trending topic in the computing world. Notably, IoT ...
Securing Digital Signature Algorithm Against Side Channel Attacks Mohamed. Ahmed , S. Shalaby Many software implementations for the schemes used for public key cryptosystems, of which elliptic curve ...
Cognizance of data to action techniques for IoT environments Pushpinder Kaur Chouhan , Md Israfil Biswas , Naveed Khan , Chris Nugent , And Philip Morrow The Internet of Things (IoT) is a system of interrelated things (devices, machines, objects, animals, ...
Security Framework for IoT Devices Against Cyber-attacks Aliya Lebda Internet of Things (IoTs) is the interconnection of heterogeneous smart devices through the Internet with ...
Layman’s Understanding Approach to the Internet of Things (IoT) Concepts and Applications Rajeev Kanth , Tuomas Korpi , Arto Toppinen , Kimmo Myllymäki , Jatin Chaudhary , Jukka Heikkonen The term “Internet of Things (IoT)” and its ecosystem is expanding very rapidly, and therefore, ...
Hybrid Application Layer Protocol Design for IoT Environments Erdal Erdem One of the important factors affecting communication performance in the Internet of Things is the ...