This volume contains the proceedings of the second edition of the International Conference on Advanced Wireless Information, Data, and Communication Technologies (AWICT 2017). The AWICT 2017 conference represents an excellent opportunity for the students and the researchers, from both industrial and academic domains, having as main objective to present their latest ideas and research results in any one of the AWICT 2017 topics. AWICT 2017 is organized by the Laboratoire des Signaux et Systèmes (L2S UMR CNRS 8506), CentraleSupélec, Université Paris-Saclay, in collaboration with a number of national and international partners. The proceedings of AWICT 2017 are published by the Association for Computing Machinery (ACM) --- International Conference Proceedings Series (ICPS), and all accepted papers are available in the ACM Digital Library with the ISBN: 978-1-4503-5310-6. Through its technical program, the AWICT 2017 conference is established as a forum for the development, analysis, and future guidance on the burgeoning number of Advanced Wireless Information, Data, and Communication Technologies projects and applications.
Proceeding Downloads
Prioritizing Cloud Security Controls
As more and more organization move to the cloud, security remains a major concern. Given the unique nature of a cloud computing system, security threats take a different form in the cloud. These unique threats require unique security measures and ...
CLogVis: Crime Data Analysis and Visualization Tool
Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones is ...
A new similarity measure for automatic text categorization based on vector space model
Text classification is the process of assigning a predefine class or category to an anonymous text based on its content. It is an important task in text mining. Several Text classification algorithms were developed for natural languages, such as English,...
Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function
The users of today are already about to enter the era of highly integrated modern wearable devices -- the time when smart accessories will, in turn, push aside regular Smartphones and Tablets bringing a variety of new security challenges. The number of ...
Mobility and Epidemic Process in Temporal Networks
Complex networks are distinguished to have a particular structure due to its large dimension and its many interactions, which play an important role in its characteristic. In fact, these networks are the locus of many dynamical phenomena such as birth ...
A Survey of IPv6-Based Mobility Support for P2P-SIP Networks
For many years, communications with mobile objects (smartphones, laptops, tablets, etc.) occupy most of the exchanges through internet, raising nowadays a real passion to mobile Peer-to-Peer Session Initiation Protocol (P2P-SIP) networks through which ...
Prolonging WSN lifetime using a new scheme for Sink moving based on Artificial Fish Swarm Algorithm
In this paper, we investigate the problem of energy in Wireless sensor networks. The sensors maintain their autonomy from their batteries. These networks have a limited capacity in terms of energy mostly at the communication process which could ...
Survey: Routing Protocols in Vehicular Ad Hoc Networks
Vehicular Ad-hoc Networks (VANET) is wireless ad-hoc network including a set of vehicle nodes. It is a subclass of Mobile Ad-hoc Network (MANET). The high velocity of nodes constitutes the main difference between VANET and MANET. This distinguished ...
The Application of Wireless Sensor Networks and Wearable Technologies for Educational Purposes: A Scoping Review
Past researches in wireless sensor networks (WSNs) and wearable technologies have mostly been conducted in the field of healthcare for the purpose of patients' health monitoring. However, recent studies in WSNs and wearable technologies suggest that ...
Information Management Technologies for Big Data: A Case of Oracle
During the last decade the volume, the rate of accumulation and the diversity of data in general have been steadily increasing, which leads to the rapid development of Big data and technological enhancements associated with it. Many leading companies in ...
A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control
Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this ...
Graph-based Resource Allocation for Disaster Management in IoT Environment
Allocation of emergency resources for the required tasks during disaster times is a non-trivial problem. In disaster situations, often times, networks for communication are greatly affected. From this perspective, Internet of Things, the new upcoming ...
Machine Learning Based Intrusion Detection System for Social Network of Europe
In modern age1, people have become dependent on social networking for communication for both in personal life and in corporate life. There are different types of users of social network, some users use social network for different good purposes like ...
Accessible Urban by Modeling the Explicit Data Using Fuzzy Logic
The paper explores the level of accessibility for people with specific mobility problems in an urban setting. The work is part on the polisocial Maps for Easy Path (MEP) project [1]. The project aiming at developing a set of innovative tools and ...
Detecting Counterpart Word Pairs across Time
Most search engines require users to input specific words to obtain useful results from the Web. However, this requirement is sometimes challenging for users who want to search for information regarding unknown words. It may be especially difficult to ...
Noise Suppression by Artificial Neural Networks
In this research paper, noise suppression ability of associative memories (e.g. Hopfield neural network) is briefly summarized. Motivated by this fact, noise suppression abilities of trained convolutional network are discussed. Introducing the concept ...