{"title":"[Title page]","authors":"","doi":"10.1109/aicis51645.2020.00002","DOIUrl":"https://doi.org/10.1109/aicis51645.2020.00002","url":null,"abstract":"","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134592450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing a Distributed Certificate Authority Using Elliptic Curve Cryptography for Big Data Environment","authors":"O. Shareef, A. Sagheer","doi":"10.1109/AiCIS51645.2020.00031","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00031","url":null,"abstract":"Improving security is necessary to secure the exchange of confidential documents and protection against unauthorized accesses in the big data environment. Sharing data across a large-scale distributed system by a group of non-trusted parties can lead to illegal modification and unauthorized access. Thus, a secure and fast authentication service to authenticate the user connecting to the system is imperative. Based on Elliptic Curve Cryptography (ECC), a Distributed Certificate Authority (DCA) scheme has been designed and implemented which can efficiently improve the authentication of big data in a distributed environment. The role of authentication is distributed amongst the many nodes included in groups. Each group has its own revocation and signature list instead of each node, and this way reduces system overhead and avoids consuming much time when verifying the nodes without a centralized server. The proposed scheme is demonstrated on a big dataset of social networks. The scheme has been analyzed on the basis of security criteria and compare it with previous schemes to evaluate its performance. The experiment shows that the proposed scheme is capable of consumes less memory and reduces time consumption.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127674191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion Analysis and Trajectory Tracking Control of Propeller-Type Climbing Robot","authors":"S. K. Mahmood, S. Bakhy, M. A. Tawfik","doi":"10.1109/AiCIS51645.2020.00016","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00016","url":null,"abstract":"Every day, human being increasingly depends on using robots in the life. Where, they are capable of replacing human beings to perform dangerous and tedious operations with a high efficiency and a low cost for the terrestrial and space applications. During the past decades, the need for robots capable for climbing vertical wall has been increased. In this paper, the mathematical model for wall climbing robot (WCR) based on the dynamics of robot has been derived. MATLAB/SIMULINK has been used to simulate the model. Trajectory tracking problem of WCR has also been discussed. Where, the fuzzy-backstepping controller has been adopted. A propeller type wall climbing robot, which has designed by authors in previous work, is used for an experiment of the trajectories tracking control. Some developing steps have been achieved to develop the robots in order to meet the test requirements. In addition to the wall tests, the robot was tested in Kangaroo mode to track inclined line with initial error in pose on the ground. The vision system was suggested to provide information about robot pose (position and orienting). The experimental result confirms the validity of the proposed method.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdul Sattar Salim Awadh Al-Jubory, M. A. Aljubory, Basam mohammed Yaseen
{"title":"Evaluate The Reality of The Requirements for The Application of Electronic Management and its Role in Enhancing Performance","authors":"Abdul Sattar Salim Awadh Al-Jubory, M. A. Aljubory, Basam mohammed Yaseen","doi":"10.1109/AiCIS51645.2020.00036","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00036","url":null,"abstract":"The research aims to determine requirements of Electronic Management Applications and its role in Enhancing Institutional Performance in the Northern Technical University / Formations of Kirkuk, and to achieve the goal of the research, two main hypotheses were developed from each of them four sub hypotheses and a questionnaire form was designed as a tool for data collection, and the research was based on the Spss24 program And Excel in data analysis. The Northern Technical University / Kirkuk Formations were chosen as the study community, and 40 sample forms were distributed for the study, and all were retrieved The research reached a set of conclusions, the most prominent of which is that the Northern Technical University / Kirkuk Formations “possesses sufficient human requirements for the application of electronic management, while the percentage of its possession of financial, administrative and technical requirements is weak and somewhat insufficient to implement electronic management.” The research presented a set of proposals, “including a necessity. Learning about the experiences of others in the field of electronic management, benefiting from them, and paying attention to research and development as a path that helps generate new knowledge in order to create the required homogeneity between electronic management and institutional performance.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT/IoE Smart Health Care System using Fog Computing Features","authors":"Rawia Talal, Abdul-Bary Raouf Suleiman","doi":"10.1109/AiCIS51645.2020.00015","DOIUrl":"https://doi.org/10.1109/AiCIS51645.2020.00015","url":null,"abstract":"A competent and structured approach to improve the health and well-being of humanity is provided by the Internet of everything technology. One of the practical ways to provide healthcare services based on IoE is to monitor human health in real-time using smart healthcare that sends the data to the gateway through a particular wireless communication protocol. The real-time data is then transmitted to a remote Fog computing node for real-time, visualization, processing, and analyzing. In this paper, we enhance such a health monitoring system by taking advantage of the concept of fog computing providing embedded advanced techniques and services, such as gathering raw data from different sources and filter the duplicity to produce summary information which is known as data aggregation. Fog computing also stores the aggregated information in distributed storage which provides many advantages like availability, low cost, and scalability. Finally, fog computing provides notification service at the edge of the network which contributes to avoid critical situations. Cisco packet tracer 7.2 is used to program and implement the proposed smart health care platform.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"15 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114044533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the Organizing Chair","authors":"","doi":"10.1109/icitiit49094.2020.9071538","DOIUrl":"https://doi.org/10.1109/icitiit49094.2020.9071538","url":null,"abstract":"In this conference, we attracted 223 participants and a keynote talk. The keynote talk was bestowed by Prof. Dr. Michael Gerndt, who received Ph.D in Computer Science in 1989 from University of Bonn. Since 2000, he is Professor for architecture of Parallel and Distributed systems at Technische Universitat Munchen (TUM). We had 41 paper presentations from various leading organizations, including IIT India, IIIT India, NIT India and so forth. It was inaugurated by Prof. Dr. Virendra Bhavsar from University of New Brunswick, Canada.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}