Technical Program
19th International Conference on Hybrid Intelligent Systems (HIS 2019)
and
The 15th International Conference on Information Assurance and Security (IAS 2019)
Draft Technical Programme
December 10, 2019 : VIT Bhopal University Visit and free day
December 11, 2019
===============
09:00 - 10:00 : Conference Inauguration
10:00 - 10:30: Coffee break
10:30 - 11:20 : Plenary 1
Prof. Dr. Arturas Kaklauskas, Vilnius Gediminas Technical University, Lithuania
11:20 - 12:10: Plenary 2
Prof. Dr. Stephen Huang, Department of Computer Science, University of Houston, USA
12:10-13:00: HIS - Session 1
2 Dimension Reduction With Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) In Indonesian Language Text Documents Clustering
Muhammad Ihsan Jambak, Ahmad Ikrom Izzuddin Jambak, Rahmad Tirta Febrianto, Danny Matthew Saputra and Muhammad Irfan Jambak
4 State estimation of moving vehicle using Extended Kalman ?lter: A cyber physical aspect
Ankur Jain
14 Modelling, analysis and simulation of a patient admission problem: A social network approach
Veera Babu Ramakurthi, Vijayakumar Manupati, Suraj Panigrahi, M.L.R. Varela, Goran Putnik and P.S.C. Bose
15 Short-Term Load Forecasting: An Intelligent Approach based on Recurrent Neural Network
Atul Patel,?Monidipa Das?and?Soumya Ghosh
12:10-13:00: IAS - Session 1
3 Network packet analysis in real time traffic and study of snort IDS during the variants of DoS attacks
Nilesh Kunhare, Ritu Tiwari and Joydip Dhar
4 Securing Trustworthy Evidences for Robust Forensic Cloud in spite of Multi-Stakeholder Collusion Problem
Sagar Rane, Sanjeev Wagh and Arati Dixit
5 Threat-Driven Approach for Security Analysis of Safety Critical System: A Case Study with a Telemedicine System
Raj Kamal Kaur, Lalit Kumar Singh, Babita Pandey and Aditya Khamparia
10 Key-based Obfuscation using Strong Physical Unclonable Function: A Secure Implementation
Surbhi Chhabra and Kusum Lata
Lunch: 13:00 - 14:00
14:00-16:00: HIS - Session 2
17 Design and Analysis of Anti-windup Techniques for Anti-Lock Braking System
Prangshu? Saikia and Ankur Jain
18 Wind-power intra-day multi-step predictions using general PDE sum models of Polynomial networks based on Operational Calculus
Ladislav Zjavka and Václav Sná?el
33 Diversity In Recommendation System: A Cluster Based Approach
Naina Yadav, Rajesh Kumar Mundotiya, Anil Kumar Singh and Sukomal Pal
38 Analyzing and Enhancing Processing Speed of k-medoid algorithm using efficient large scale processing frameworks
Ayshwarya Jaiswal, Vijay Kumar Dwivedi and Om Prakash Yadav
40 Data clustering using environmental adaptation method
Tribhuvan Singh, Krishn Kumar Mishra and Ranvijay Singh
44 An adversarial learning mechanism for dealing with the class-imbalance problem in land-cover classification
Shounak Chakraborty,?Indrajit Kalita?and?Moumita Roy
49 Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems
Rekha Yadav, Krishna Reddy Reddy and Amit Kumar Tyagi
69 Congestion Control in Vehicular Ad-hoc Networks (VANET’s): A Review
Lokesh Giripunje, Deepika Masand and Shishir Kumar Shandilya
70 Advances in Cyber Security Paradigm: A Review
Shahana Gajala Qureshi and Shishir Kumar Shandilya
71 Weighted mean variant with exponential decay function of Grey Wolf Optimizer under Swarm Based Algorithm
Alok Kumar, Avjeet Singh, Lekhraj . and Anoj Kumar
16:00-16:30: Coffee Break
18:00-21:00: Conference Banquet
December 12, 2019
===============
09:00 - 10:15 : HIS Session 3
78 Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data
Praneet Saurabh, Dhananjay Bisen, Abhishek Mukherjee and Lalit Kane
79 Detection and Prevention of Black Hole Attack using Trusted and Secure Routing in Wireless Sensor Network
Praneet Saurabh, Dhananjay Bisen, Ritu Prasad and Bhavana Barmaiya
80 Recursive Tangent Algorithm for Path Planning in Autonomous Systems
Shetty Adhiraj, Annapurna Jonnalagadda and Aswani Kumar Cherukuri
83 Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks Localization
Nebojsa Bacanin, Eva Tuba, Ivana Strumberger, Miodrag Zivkovic and Milan Tuba
85 Facial Expression Recognition using Histogram of Oriented Gradients with SVM-RFE Selected Features
Sumeet Saurav, Sanjay Singh and Ravi Saini
10:15 - 10:45: Coffee break
10:45 - 11:45 : Plenary 3
Dr. Pawan Lingras, Saint Mary's University, Canada
11:45 - 12:30: Closing Ceremony and Validitory function
HIS 2019 Virtual Presentations
=======================
3 Reducing Data Volume in Instance Based Learning
Maria Do Carmo Nicoletti?and?Luis Andre Claudiano
12 Aspect Detection for Arabic Language
Sana Trugui, Ines Boujelben, Salma Jamoussi and Yassine Ben Ayed
27 Heterogeneous Engineering in Intelligent Logistics
Yury Iskanderov?and Mikhail Pautov
28 Extracting Unknown Repeated Pattern in Tiled Images
Prasanga Neupane, Archana Tuladhar, Shreeniwas Sharma and Ravi Tamang
32 Convolutional Deep Learning Network for Handwritten Arabic Script Recognition?
Mohamed Elleuch and Monji Kherallah
34 Contribution on Arabic Handwriting recognition using deep Neural Network
Zouhaira Noubigh, Anis Mezghani and Monji Kherallah
39 Multiple criteria fake reviews detection based on spammers indicators within the belief function theory
Malika Ben Khalifa, Zied Elouedi and Eric Lefevre
41 Soft Computing, Data Mining, and Machine Learning approaches in Detection of Heart Disease: A Review?
Keshav Srivastava and Dilip Kumar Choubey
42 A novel Computer-Aided Detection System based on Textural Analysis incorporating different Machine Learning methods for Breast DCE-MRI
Raouia Mokni, Norhene Gargouri, Alima Damak, Dorra Sallemi and Wiem Feki
45 An integrated fuzzy ANP-TOPSIS approach to rank and assess E-commerce web sites
Rim Rekik
47 Implementation of Block Chain Technology in Public Distribution System
Pratik Thakare, Nitin Dighore, Ankit Chopkar, Aakash Chauhan, Diksha Bhagat and Milind Tote
59 Three-layer security for Password Protection using RDH, AES and ECC
Nishant Kumar, Suyash Ghuge and Jaidhar C.D
65 Clothing Classification using Deep CNN Architecture based on Transfer Learning
Mohamed Elleuch, Anis Mezghani, Mariem Khemakhem and Monji Kherallah
66 Identification of Botnet Attacks using Hybrid Machine Learning Models
Amritanshu Pandey, Sumaiya Thaseen and Aswani Kumar
81 Marathi Handwritten Character Recognition using SVM and KNN Classifier
Diptee Chikmurge?and?Shiram R
IAS 2019 Virtual Presentations
=======================
2 Automated Access Control Negotiation for Secured Inter-Organizational Workflow Systems?
Asmaa El Kandoussi
12 A Survey on Countermeasures against Man-in-the-browser Attacks
Sampsa Rauti
16 Towards Cyber Attribution by Deception
Sampsa Rauti
19 Tangle The Blockchain: Toward IOTA and Blockchain integration for IoT Environment
Hussein Hellani, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat and Mourad Kmimech
22 Towards a better security in public cloud Computing?
Sonia Amamou, Zied Trifa and Maher Khmakhem