Call for Participation-7th International Conf on Advances in Computing and Information Technology

ACITY 2018


Software Systems



Call for Participation
We invite you to join us in Sydney, Australia on December 23-24, 2017 for 7th International Conference on Advances in Computing and Information Technology (ACITY 2017)
The conference provides an excellent international forum for sharing knowledge and results in theory, methodology and new advances and research results in the fields of Computing and Information Technology.
Accepted Papers for Oral Presentation
Advances in Computing and Information Technology
Cloud Computing Security Threats and Attacks with their Mitigation Techniques
Naseer Amara, Nanjing University of Aeronautics and Astronautics, China
Enterprise Systems or Best of Breed (BoB) Systems: Which one to Choose?
Shamsul Chowdhury, Roosevelt University, USA
Optimize Trigonometry Function Programming Using Simplified Swarm Optimization Algorithm
Wei-Chang Yeh, National Tsing Hua University,Taiwan and Chia-Ling Huang, Kainan University,Taiwan
New Era of Megadata and Its Influences on Data Protection Legal Reform in the EU
Chun Hung Lin, Feng Chia University,Taiwan.
Scope: A Lightweight Cryptographic Approach for Private Cope Data Coding
Ngoc Hong Tran, Binh Quoc Nguyen and Dung Hai Dinh, Vietnamese German University, Vietnam, Cao Vien Phung, Technische Universität Carolo-Wilhelmina zu Braunschweig, Germany and Leila Bahri, KTH, Sweden
Determinants of Instagram-Businessadoption in Kuwait: Case-Studies Approach
Nabeel Al-Qirim, UAE University,UAE, Kamel Rouibah, Kuwait University, Kuwait and Ali Tarhini, Sultan Qaboos University, Oman
Benchmarking federal ICT standards in the UAE with state of the art literature
Nabeel Al-Qirm, Yousef Al-Hammadi,and Mohammed Abu Omar, UAE University, UAE
Digital Image Processing and Pattern Recognition
Seamless Mosaic of UAV Images for Dense Urban Area
Ming Li, Ruizhi Chen, Xuan Liao and Weilong Zhang, Wuhan University, China
A Direct Transformation for Scanning Direction of Run Data in Binary Images
Yoshihiro Shima, Meisei University, Japan
Emotion Recognition of Stressed Speech using Teager Energy and Linear Prediction Features
Surekha Reddy B and T. Kishore Kumar, NIT Warangal, India
Speech Enhancement Using Combined Masking and Normalization in Signal Subspace Approach
Sudeep Surendran and T. Kishore Kumar, National Institute of Technology Warangal, India.
Naive Bayesian fusion for action recognition from Kinect
Amel Ben Mahjoub and Mohamed Atri, Monastir University, Tunisia, Mohamed Ibn Khedher and Mounim A. El Yacoubi, University of Paris Saclay, France
The research of sand-hole detection in casting parts based on image processing algorithm
Ting Lei, Jing Xu and Huiying Tang, Wuhan Donghu University, China
Clustering Based Local Tone Mapping Algorithm for Displaying HDR Images on LDR Devices
Taeuk Kang, Junghyun Lee and Jechang Jeong, Hanyang University, Seoul, Korea
Computer Networks & Data Communications
Secure Group Key Management Protocol for Grid Computing
Mohammad R. Hassan1, Nidal M. Turab2, KhalilH. Al-Shqeerat3Saleh El-Omar1 1,2Al-Ahliyya Amman University Amman-Jordan,3Qassim University, Saudi Arabia.
A Multi-Dimentional Algorithm Design Approach for Extending the Lifetime of Wireless Sensor Network (Wsn)
Obota Monday Elom,Ebonyi State College of Education Ikwo,Ebonyi State,Nigeria
Ease of Secured Communication within a Specific Horizon Using Multi Set-Cover and Dominant Pruning
Sadia Sharmin and Shantanu Shipan Sarker,Bangladesh University of Engineering, Bangladesh
An Unmanned Aerial Vehicle Based Forest Patrol System
Songsheng LI,Guangdong College of Business and Technology, Zhaoqing, China
Application Based On Fuzzy Logic to Detect and Prevent Cyberbullying through Smartphones
José Á. Concepción-Sánchez, Pino Caballero-Gil and Jezabel Molina-Gil,University of La Laguna, Tenerife, Spain
Access Control System Based On Raspberry Pi and Android Smartphones
Jonay Suárez-Armas and Pino Caballero-Gil,University of La Laguna, Tenerife, Spain
Wireless and Mobile Network
Localization Systems For Wireless Sensor Networks
Wanis Alfitouri Hasan, The Higher And Intermediate Institute Of Comprehensive Professions, Bani Walid, Libya
New Methods Of Routing For UAV Intranets
Rohan De Silva , School Of Engineering And Technology, CQ University Sydney Campus, 400 Kent Street, Sydney, Australia
Spectrum Sensing Approach Based On Qos Requirements In White-Fi Networks
Nabil Giweli, Seyed Shahrestani, Hon Cheung, Western Sydney University, Sydney, Australia
Artificial Intelligence, Soft Computing and Application
A Z Structure Convolutional Neural Network Implemented By Fpga In Deep Learning
Min Zhu1, Miao Zhang1, JianJun Lin 1, Qihong Luo2 and Chunling Yang1,1 School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin, China,2Xinjiang Xinxin Mining Industry Co. LTD Fukang Smelting Plant, Fukang, China.
Estimating Signal At Start Time Of Finite Interval
Kreangkri Ratchagit,Division of Mathematics, Faculty of Science, Maejo University,Chiang Mai 50290, Thailand
Quantitative Analysis In Heuristic Evaluation Experiments Of E-Commerce Websites
Xiaosong Li, Ye Liu, Zizhou Fan and Will Li,Unitec Institute of Technology, Auckland, New Zealand
A Comparative Study To Understanding About Poetics Based On Natural Language Processing
Zhang Lingyi1 and Gao Junhui2 1Wuxi No.1 High School, Wuxi, China,2Wuxi Fan Mei International Learning Center, Wuxi, China
Non-linear Modeling and Classification of Susceptible Flood Regions Using the Patterns of Neural Network in a Typical Basement Complex Terrain.
J.K Adedeji and F.O Olotu , Department of Physics and Electronics, AdekunleAjasin University,Nigeria.
Development Of A Radial Basis Function Network To Estimate The Head Generated By Electrical Submersible Pumps On Gaseous Petroleum Fluids
Morteza Mohammadzaher1 and Abdullah AlQallaf 2, 1Department of Mechanical and Industrial Engineering, Sultan Qaboos University, Muscat, Oman,2 Department of Electrical Engineering, Kuwait University Kuwait City, Kuwait
Software Security
The cooperation of immune agents for intrusion detection system
Noria Benyettou1, Abdelkader Benyettou1, Vincent Rodin2,1Laboratoire SIMPA,Universitédes Sciences et Technologie d’Oran,ALGERIE,2European University of Brittany,France
A Secured And Optimized Document Management Tool Using Advanced Encryption Standard And Nosql
Armando D Pagkalinawan Jr1 and Dr. Aleta C. Fabregas1,1Polytechnic University of the Philippines
Enahanced Signature Authentication Approach to Detect DDOS (Distribute Denial of Service) Attack VANET
Rajwinder Kaur and Usvir kaur, Sri Guru Granth Sahib World University, India
Intrusion Detection System: Misuse Detection And Anomaly Based Statistical Detection
CHAMKAR Samir Achraf,RAJAALLAH El Mostafa,Ibn Tofail University,Kenitra, Morocco
A Study On Automotive Attack Database And Data Flow Diagram For Concretization Of Heavens, A Car Security Model
Se-Han Lee1 , Kwang-Woo Go1 , Gwang-Hyun Ahn1 , Hee-Sung Park1, Cheol-Kyu Han1, Jun-Bo Shim1, Geun-Chul Kang1 and Hyun-Jung Lee2,1Information Technology Research Institute, Seoul, Korea,2Security Platform Development Team, Fescaro, Seong-Nam, Republic Of Korea
Secure Rfid Based Authentication Protocol For Smart Hospital System
Ayimasso Ulrich Samuel and Tian Hua,Taiyuan University of Technology,China
Registration Participants
Non-Author / Co-Author/ Simple Participants (no paper)
350 USD (With proceedings)
Here's where you can reach us: acityconf@yahoo.com (or) acityconf@acity2018.org