skip to main content
10.1145/3231830acmotherconferencesBook PagePublication PagesawictConference Proceedingsconference-collections
AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
AWICT 2017: Second International Conference on Advanced Wireless Information, Data, and Communication Technologies Paris France November 13 - 14, 2017
ISBN:
978-1-4503-5310-6
Published:
13 November 2017
In-Cooperation:
CNRS

Bibliometrics
Skip Abstract Section
Abstract

This volume contains the proceedings of the second edition of the International Conference on Advanced Wireless Information, Data, and Communication Technologies (AWICT 2017). The AWICT 2017 conference represents an excellent opportunity for the students and the researchers, from both industrial and academic domains, having as main objective to present their latest ideas and research results in any one of the AWICT 2017 topics. AWICT 2017 is organized by the Laboratoire des Signaux et Systèmes (L2S UMR CNRS 8506), CentraleSupélec, Université Paris-Saclay, in collaboration with a number of national and international partners. The proceedings of AWICT 2017 are published by the Association for Computing Machinery (ACM) --- International Conference Proceedings Series (ICPS), and all accepted papers are available in the ACM Digital Library with the ISBN: 978-1-4503-5310-6. Through its technical program, the AWICT 2017 conference is established as a forum for the development, analysis, and future guidance on the burgeoning number of Advanced Wireless Information, Data, and Communication Technologies projects and applications.

Skip Table Of Content Section
research-article
Prioritizing Cloud Security Controls

As more and more organization move to the cloud, security remains a major concern. Given the unique nature of a cloud computing system, security threats take a different form in the cloud. These unique threats require unique security measures and ...

research-article
CLogVis: Crime Data Analysis and Visualization Tool

Recently, cell phone usage has increased incrementally to huge numbers. Statistics show that a total number of mobile phone users worldwide, from 2013 to 2019, is about 60 percent of the Earth's population. This reflects that the use of cell phones is ...

research-article
A new similarity measure for automatic text categorization based on vector space model

Text classification is the process of assigning a predefine class or category to an anonymous text based on its content. It is an important task in text mining. Several Text classification algorithms were developed for natural languages, such as English,...

research-article
Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function

The users of today are already about to enter the era of highly integrated modern wearable devices -- the time when smart accessories will, in turn, push aside regular Smartphones and Tablets bringing a variety of new security challenges. The number of ...

research-article
Mobility and Epidemic Process in Temporal Networks

Complex networks are distinguished to have a particular structure due to its large dimension and its many interactions, which play an important role in its characteristic. In fact, these networks are the locus of many dynamical phenomena such as birth ...

research-article
A Survey of IPv6-Based Mobility Support for P2P-SIP Networks

For many years, communications with mobile objects (smartphones, laptops, tablets, etc.) occupy most of the exchanges through internet, raising nowadays a real passion to mobile Peer-to-Peer Session Initiation Protocol (P2P-SIP) networks through which ...

research-article
Prolonging WSN lifetime using a new scheme for Sink moving based on Artificial Fish Swarm Algorithm

In this paper, we investigate the problem of energy in Wireless sensor networks. The sensors maintain their autonomy from their batteries. These networks have a limited capacity in terms of energy mostly at the communication process which could ...

research-article
Survey: Routing Protocols in Vehicular Ad Hoc Networks

Vehicular Ad-hoc Networks (VANET) is wireless ad-hoc network including a set of vehicle nodes. It is a subclass of Mobile Ad-hoc Network (MANET). The high velocity of nodes constitutes the main difference between VANET and MANET. This distinguished ...

research-article
The Application of Wireless Sensor Networks and Wearable Technologies for Educational Purposes: A Scoping Review

Past researches in wireless sensor networks (WSNs) and wearable technologies have mostly been conducted in the field of healthcare for the purpose of patients' health monitoring. However, recent studies in WSNs and wearable technologies suggest that ...

research-article
Information Management Technologies for Big Data: A Case of Oracle

During the last decade the volume, the rate of accumulation and the diversity of data in general have been steadily increasing, which leads to the rapid development of Big data and technological enhancements associated with it. Many leading companies in ...

research-article
A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control
Article No.: 11, pp 1–13https://doi.org/10.1145/3231830.3231841

Body Sensor Network (BSN) is a network of wirelessly connected physiological sensors. BSNs offer promising innovative medical and non-medical applications. In such applications and networks, security is essential, critical, and challenging. In this ...

research-article
Graph-based Resource Allocation for Disaster Management in IoT Environment

Allocation of emergency resources for the required tasks during disaster times is a non-trivial problem. In disaster situations, often times, networks for communication are greatly affected. From this perspective, Internet of Things, the new upcoming ...

research-article
Machine Learning Based Intrusion Detection System for Social Network of Europe

In modern age1, people have become dependent on social networking for communication for both in personal life and in corporate life. There are different types of users of social network, some users use social network for different good purposes like ...

research-article
Accessible Urban by Modeling the Explicit Data Using Fuzzy Logic

The paper explores the level of accessibility for people with specific mobility problems in an urban setting. The work is part on the polisocial Maps for Easy Path (MEP) project [1]. The project aiming at developing a set of innovative tools and ...

research-article
Detecting Counterpart Word Pairs across Time

Most search engines require users to input specific words to obtain useful results from the Web. However, this requirement is sometimes challenging for users who want to search for information regarding unknown words. It may be especially difficult to ...

research-article
Noise Suppression by Artificial Neural Networks

In this research paper, noise suppression ability of associative memories (e.g. Hopfield neural network) is briefly summarized. Motivated by this fact, noise suppression abilities of trained convolutional network are discussed. Introducing the concept ...

Contributors
  • Paris-Saclay University

Recommendations