Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3231053acmotherconferencesBook PagePublication PagesicfndsConference Proceedingsconference-collections
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICFNDS'18: International Conference on Future Networks and Distributed Systems Amman Jordan June 26 - 27, 2018
ISBN:
978-1-4503-6428-7
Published:
26 June 2018

Reflects downloads up to 21 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

The main objective of this conference is to bring together, at a truly international level, people with shared interests in future networks and distributed systems. ICFNDS continues to grow and attract high quality submissions fulfilling the steering committee vision of establishing ICFNDS as a premier meeting that encourages researchers and practitioners to exchange and share their experiences.

research-article
IoT standardisation: challenges, perspectives and solution
Article No.: 1, Pages 1–9https://doi.org/10.1145/3231053.3231103

The success and widespread adoption of the Internet of Things (IoT) has increased many folds over the last few years. Industries, technologists and home users recognise the importance of IoT in their lives. Essentially, IoT has brought vast industrial ...

research-article
Integrating smart city applications in 5G networks
Article No.: 2, Pages 1–5https://doi.org/10.1145/3231053.3231055

Typical smart city applications generally require two different communications infrastructures, a wide area cellular network to provide connectivity and long-range communications and efficient communication strategies for transmitting short data packets,...

research-article
Quicker re-allocation of regions in opensimulator framework
Article No.: 3, Pages 1–7https://doi.org/10.1145/3231053.3231056

Scalability is one of the major issues to cope with, in digital spaces, called virtual worlds, usually parallel and distributed in nature. In our previous work, we developed a framework for scaling these environments to cope with issues in static and ...

research-article
DDoS attacks on the internet of things and their prevention methods
Article No.: 4, Pages 1–5https://doi.org/10.1145/3231053.3231057

The Internet of Things (IoT) vulnerabilities provides an ideal target for botnets, making them a major contributor in the increased number of Distributed Denial of Service (DDoS) attacks. The increase in DDoS attacks has made it important to address the ...

research-article
Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET
Article No.: 5, Pages 1–9https://doi.org/10.1145/3231053.3231058

One of the most important challenges that MANET face is how to connect nodes together also how to adapt the dynamically changes in the network topology. A novel clustering algorithm that ensures an increase in stability and adaptability of MANET has ...

research-article
LPBR: location prediction based routing protocol for mobile IoT systems
Article No.: 6, Pages 1–5https://doi.org/10.1145/3231053.3231059

Recent advances in the Internet of Things(IoT) had created unparalleled opportunities and new applications. Low power communication technologies for IoT are critical for this success of IoT applications. IoT communication scenarios include mobile nodes ...

research-article
Loop unrolling effect on parallel code optimization
Article No.: 7, Pages 1–6https://doi.org/10.1145/3231053.3231060

Parallel code optimization has many challenges to improve the code performance. Loop unrolling is an optimization technique applied to the loops to reduce the frequency of branches. This optimization is a useful technique to enhance the performance of ...

research-article
IoT system to control greenhouse agriculture based on the needs of Palestinian farmers
Article No.: 8, Pages 1–9https://doi.org/10.1145/3231053.3231061

Technology can play an important role in greenhouse agriculture. In this paper we look at the role of IoT (Internet of Things) in greenhouse agriculture in Palestine, questionnaires and interviews were used to collect data from agricultural engineers to ...

research-article
Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare
Article No.: 9, Pages 1–7https://doi.org/10.1145/3231053.3231062

As we are within the era of the internet of things (IoT) its increasing integration to our everyday lives means that the devices involved produce massive amounts of data every second from billions of devices. The current approach used to handle this ...

research-article
Wimax technology for maritime intelligent transport systems communication
Article No.: 10, Pages 1–8https://doi.org/10.1145/3231053.3231063

Intelligent transport systems offer effective solutions for the management of road, air and sea traffic. Despite their great success, these systems have several constraints and the multiple challenges that are not limited only to the security of the ...

research-article
Organizational management role in information security management system
Article No.: 11, Pages 1–8https://doi.org/10.1145/3231053.3231064

This paper proposes an organizational management model for implementing the Information Security Management System (ISMS) Plan, Do, check and Act (PDCA) framework to achieve an improved balance between the effectiveness and efficiency of an ...

research-article
Market segmentation and analysis of online shopping in Jordan and the region
Article No.: 12, Pages 1–7https://doi.org/10.1145/3231053.3231065

This paper aims at studying the market strength of eight countries from the Middle East, in addition to utilizing Data Mining (DM) tools to come up with a model for market segmentation, for that Weka software was used and Simple K Means clustering ...

research-article
Multipath routing in a 3D torus network on chip
Article No.: 13, Pages 1–8https://doi.org/10.1145/3231053.3231066

We propose an efficient multipath routing algorithm for routing multiple data packets in parallel over node-disjoint paths on a 3D torus Network-on-Chip. We show how to build node-disjoint paths between any two nodes of the 3D torus topology and how to ...

research-article
A survey on IoT contribution in smart goods ordering cycle: Amazon buttons
Article No.: 14, Pages 1–8https://doi.org/10.1145/3231053.3231067

Internet of Things (IoT) is an emerging technology with a wide range of applications including smart homes, cars, offices and so on. It plays an important role in data gathering regardless of time and environment. Amazon Dash button is one of the smart ...

research-article
CryptDBaaS: query over encrypted DBaaS without third-party
Article No.: 15, Pages 1–7https://doi.org/10.1145/3231053.3231068

Information storage systems usually take great care for protecting their sensitive or confidential data, even users personal data. Hence the need to implement the concept of information security as part of the system. Information security primary focus ...

research-article
A traffic tracking algorithm for a fast detection of active network sources
Article No.: 16, Pages 1–6https://doi.org/10.1145/3231053.3231069

Denial of Service attack is a cyber-attack that overwhelms the victim resources (system resources and network bandwidth) and makes them unavailable to legitimate users. To take the edge of this problem, packet filtering schemes at the front end of ...

research-article
Training neural networks using Salp Swarm Algorithm for pattern classification
Article No.: 17, Pages 1–6https://doi.org/10.1145/3231053.3231070

Pattern classification is one of the popular applications of neural networks. However, training the neural networks is the most essential phase. Traditional training algorithms (e.g. Back-propagation algorithm) have some drawbacks such as falling into ...

research-article
Feature selection using binary particle swarm optimization with time varying inertia weight strategies
Article No.: 18, Pages 1–9https://doi.org/10.1145/3231053.3231071

In this paper, a feature selection approach that based on Binary Particle Swarm Optimization (PSO) with time varying inertia weight strategies is proposed. Feature Selection is an important preprocessing technique that aims to enhance the learning ...

research-article
Rank based binary particle swarm optimisation for feature selection in classification
Article No.: 19, Pages 1–6https://doi.org/10.1145/3231053.3231072

Feature selection (FS) is an important and challenging task in machine learning. FS can be defined as the process of finding the best informative subset of features in order to avoid the curse of dimensionality and maximise the classification accuracy. ...

research-article
Graphical authentication based on anti-shoulder surfing mechanism
Article No.: 20, Pages 1–6https://doi.org/10.1145/3231053.3231073

Authentication is one of the most important mechanisms to ensure system accessibility by legitimate users. Various authentication tools exist based on numerous techniques. Distinguishing factors of such authentication tools are the underlying passwords ...

research-article
A study of current trends in the design of processors for the internet of things
Article No.: 21, Pages 1–10https://doi.org/10.1145/3231053.3231074

The advent of processors in early 70s has made a significant impact on our society. Since then, the continuous increase in integration density and speed, lower power consumption and better integrability with advances in communication technologies have ...

research-article
Analysis of social network for telecommunication companies
Article No.: 22, Pages 1–7https://doi.org/10.1145/3231053.3231075

Social Network Analysis (SNA) is defined as the science of grouping members and finding influencers member inside each group by utilizing advanced set of algorithms. Most specialized data mining software firms, such as IBM, SAS, python and R, create ...

research-article
Detection and prevention of malicious cryptocurrency mining on internet-connected devices
Article No.: 23, Pages 1–10https://doi.org/10.1145/3231053.3231076

As technology evolves, more and more devices are connected to the Internet. The popularity and increasing significance of cryptocurriences are drawing attention, and crybercriminals are trying to utilize the resources and steal the processing power of ...

research-article
Low-energy smart trash bin architecture for dynamic waste collection system
Article No.: 24, Pages 1–7https://doi.org/10.1145/3231053.3231077

Currently, most of waste collection systems are static, which are inefficient and expensive. Performing dynamic waste collection has proven to be more efficient. In order to implement and sustain dynamic waste collection, a low power smart trash bin is ...

research-article
Embedded key cryptosystem for cloud computing applications
Article No.: 25, Pages 1–7https://doi.org/10.1145/3231053.3231078

As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a ...

research-article
A distributed security protocol designed for the context of internet of things
Article No.: 26, Pages 1–5https://doi.org/10.1145/3231053.3231079

In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and ...

research-article
Parallel genetic algorithm with elite and diverse cores for solving the minimum connected dominating set problem in wireless networks topology control
Article No.: 27, Pages 1–9https://doi.org/10.1145/3231053.3231080

Finding an efficient communication structure among wireless network access points and wireless sensor nodes is essential in optimizing energy consumption and minimizing broadcast latency. Wireless networks Can control their nodes for efficient resource ...

research-article
A new mechanism for textual password hardening using adopted typing rhythm
Article No.: 28, Pages 1–8https://doi.org/10.1145/3231053.3231081

This paper presents a novel mechanism for hardening textual passwords using an adopted password keying rhythm. The proposed mechanism uses the adopted rhythm of keying a password along with the password itself for authenticating users. This approach is ...

research-article
Malware detection using DNS records and domain name features
Article No.: 29, Pages 1–7https://doi.org/10.1145/3231053.3231082

As billions of people depend on Internet application to perform day to day tasks, the prevalent of malwares and online attacks cause a huge loss to global Internet economy prevalent. Domain name system is one of the core components of the Internet, ...

research-article
Evaluating health information apps on real life smart phone use
Article No.: 30, Pages 1–6https://doi.org/10.1145/3231053.3231083

As the population is increasing day by day and the people are more interesting to know about their health information especially the elderly people, so they interact with the online technologies. Now it is important to design the Interface in such a way ...

Contributors
  • Cardiff Metropolitan University
  • Manchester Metropolitan University
  • King Fahd University of Petroleum and Minerals
  • Middle East University, Jordan
  • National School of Applied Sciences, Ibn Tofail University

Index Terms

  1. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations