Skip to content. | Skip to navigation

Personal tools

This Logo Viewlet registered to Business4 Theme
You are here: Home / Events / WORLDCOMP'16 / Program / ICWN'16: Wednesday, July 27, 2016 Schedule

ICWN'16: Wednesday, July 27, 2016 Schedule

To select a different schedule  CLICK HERE


7:00am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)
 
 
SESSION 3-ICWN:   WIRELESS NETWORKS AND NOVEL APPLICATIONS +
                  MOBILE SYSTEMS
                  Chairs: TBA
                  July 27, 2016 (Wednesday); 08:00am - 10:40am
                  (LOCATION: Copper Room)
 
08:00 - 08:20am:  A Novel Security System for Preventing DoS Attacks on
                  4G LTE Networks
                  Sundus Ayaz, Muazzam A. Khan
                  Department of CE, National University of Sciences and
                  Technology, Islamabad, Pakistan
 
08:20 - 08:40am:  Implentation of EAX Mode of Operation Within a Real-time
                  Android Chatting Application
                  Levent Ertaul, Nikhitha Vadla Konda, Dharani G. Ramasamy
                  Department of CS, California State University,
                  East Bay, California, USA
 
08:40 - 09:00am:  Open-Source Based Mobile Application for Helping Handicapped
                  Students Play Chess and Educational Video Games on Computers
                  Tong Lai Yu, Ronald Yu
                  School of CSE, California State University, San Bernardino,
                  California, USA;  Department of CS, University of Southern
                  California, Los Angeles, California, USA
 
09:00 - 09:20am:  Using SDR for Cost-Effective DTV Applications
                  J. Kwak, Y. Park, H. Kim
                  Department of CSE, Korea University, Seoul, Korea
 
09:20 - 09:40am:  A Routing Technique Based on Least Delay Path for Medical
                  Application Networks
                  R. Plovas, S. Motoyama
                  Faculdade Campo Limpo Paulista (FACCAMP),
                  Campo Limpo Paulista, SP, Brazil
 
09:40 - 10:00am:  Advanced Pattern Recognition for Optimal Bandwidth and
                  Power Utilization for Wireless Intelligent Motes for IoT
                  Applications
                  Kenny C. Gross, Kalyan Vaidyanathan, Majid Valiollahzadeh
                  Oracle Corporation, USA
 
10:00 - 10:20am: 
 
10:20 - 10:40am:  Performance of Cluster Based Multipath Routing in
                  Wireless Sensor Networks
                  P. G. V. Suresh Kumar, Daneil Abebe, M.S. Chakravarthy
                  Centre for ITSC, School of ECE, AAiT, Addis Ababa
                  University, Ethiopia;  Department of Management,
                  Samara University, Samara, Ethiopia
 
 
NOTE THE CHANGE IN ROOM LOCATION - PLEASE GO TO Ballroom 2
FOR SECURITY APPLICATIONS
 
 
SESSION 8-SAM:    BIOMETRICS AND FORENSICS
                  Co-Chairs: Dr. Haydar Teymourlouei,
                             Bowie State University, USA;
                             Dr. Khaled Ali Shehata,
                             Arab Academy for Science & Technology, Egypt
                  July 27, 2016 (Wednesday); 10:40am - 12:20pm
                  (LOCATION: Ballroom 2)
 
10:40 - 11:00am:  Subject Movement at Different Force Levels in a Fingerprint
                  Recognition System
                  Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch,
                  Brennon Morning, Evan Pulliam, Drew Radcliff, Stephen Elliott
                  Department of Technology Leadership and Innovation,
                  Purdue University, West Lafayette, Indiana, USA
 
11:00 - 11:20am:  Digital Forensic Analysis of SIM Cards
                  Mohamed T. Abdel Azim, Ahmed F. Shosha
                  Nile University, Cairo, Egypt
 
11:20 - 11:40am:  A Multimodal Biometric System with Several Degrees of Feature
                  Fusion for Target Identities Recognition
                  Sorin Soviany, Cristina Soviany, Sorin Puscoci
                  I.N.S.C.C., Romania;  Feature Analytics, Belgium
 
11:40 - 12:00pm:  Digital Forensic Analysis of Web-Browser Based Attacks
                  Sally M. Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha
                  School of Communication and Information Technology,
                  Nile University Cairo, Egypt
 
12:00 - 12:20pm:  EasyAuth - Implementation of a Multi-Factor Authentication Scheme
                  Based on Sound, Fingerprint and One Time Passwords (OTP)
                  Levent Ertaul, Ishita Thanki
                  California State University East Bay, Hayward, California, USA
 
12:20 - 01:20pm:  LUNCH (On Your Own)
 
 
SESSION 9-SAM:    CRYPTOGRAPHICS TECHNOLOGIES II
                  Chair: Dr. Greg Vert,
                         Embry Riddle Aeronautical University, USA
                  July 27, 2016 (Wednesday); 01:20am - 03:00pm
                  (LOCATION: Ballroom 2)
 
01:20 - 01:40pm:  FREE SLOT
 
01:40 - 02:00pm:  KERMAN: A Key Establishment Algorithm Based on Harvesting
                  Randomness in MANETs
                  Mohammad Reza Khalili Shoja, George Traian Amariucai,
                  Shuangqing Weiy, Jing Dengz
                  Department of ECE, Iowa State University, Iowa, USA;
                  School of EECS, Louisiana State University, Louisiana, USA;
                  Department of CS, University North Carolina at Greensboro,
                  North Carolina, USA
 
02:00 - 02:20pm:  Performance Comparison of AES-CCM and AES-GCM Authenticated
                  Encryption Modes
                  Levent Ertaul, Anup Mudan, Nausheen Sarfaraz
                  California State University East Bay, Hayward, California, USA
 
02:20 - 02:40pm:  A DNA-Based Cryptographic Key Generation Algorithm
                  Shakir M. Hussain, Hussein Al-Bahadili
                  Faculty of IT, University of Petra, Amman, Jordan
 
02:40 - 03:00pm:  FREE SLOT
 
 
03:00 - 03:40pm:  POSTER SESSION B
                  (INCLUDES POSTER + SHORT & POSITION PAPERS)
                  July 27, 2016 (Wednesday)
                  (LOCATION: Hallways of Ballrooms 1-5)
 
                  O.  A Denied-Events Based Detection Method Against SSH Brute-Force
                      Attack in Supercomputing Service Environment
                      Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong
                      Department of Supercomputing Infrastructure, KISTI,
                      Daejeon, Korea
                  O.  How to Realize a Soft Tracking of People in Temporary Reception
                      Centres
                      G. L. Masala, M. L. Ganadu
                      Department of Political Science, Communication, Engineering and
                      Information Technologies and Department of Humanities and Social
                      Sciences, University of Sassari, Sassari, Italy
                  O.  ...
 
 
SESSION 10-SAM:   COMPUTER SECURITY + SECURITY APPLICATIONS
                  Chair: Dr. Kazi Zunnurhain,
                         Northern Kentucky University, USA
                  July 27, 2016 (Wednesday); 03:40am - 05:40pm
                  (LOCATION: Ballroom 2)
 
03:40 - 04:00pm:  Using DroidDream Android Malware Behavior for Identification of
                  Other Android Malware Families
                  YeKung Kim, Kathy J. Liszka, Chien-Chung Chan
                  Department of CS, The University of Akron, Akron, Ohio, USA
 
04:00 - 04:20pm:  Anomaly Detection and Machine Learning Methods for Network
                  Intrusion Detection: an Industrially Focused Literature Review
                  Colin Gilmore, Jason Haydaman
                  TRTech., Winnipeg, Canada
 
04:20 - 04:40pm:  Cloud Application Model Personal Healthcare Record Implementation
                  Amer Jneid, Ashraf Gaffar
                  Arizona State University, Tempe, Arizona, USA;
                  Arizona State University, Meza, Arizona, USA
 
04:40 - 05:00pm:  Using OWASP Vulnerabilities to Evaluate Open Source Web Scanners
                  Kathryn Johnston, Mario A. Garcia
                  Computer Science, California State University San Bernardino,
                  San Bernardino, California, USA;  Department of Computer Science,
                  Texas A&M Corpus Christi, Corpus Christi, Texas, USA
 
05:00 - 05:20pm:  Live Migration of Virtual Machine in Cloud: Survey of Issues
                  and Solutions
                  Hani Alshahrani, Ali Alshehri, Raed Alharthi, and
                  Abdulrahman Alzahrani
                  Department of Computer Science and Engineering,
                  Oakland University, Rochester, Michigan, USA
 
05:20 - 05:40pm:  FREE SLOT
 
 
05:40 - 08:30pm:  TUTORIALS + DISCUSSIONS
                  (Please refer to the lists at the begining of the program
                  book for details)


To select a different schedule  CLICK HERE

Navigation

« December 2016 »
December
MoTuWeThFrSaSu
1234
567891011
12131415161718
19202122232425
262728293031

Important Dates

  Past Events