2nd Smart Cities Symposium (SCS 2019)
Buy conference proceeding
- Location: Bahrain, Bahrain
- Conference date: 24-26 March 2019
- ISBN: 978-1-83953-107-1
- Conference number: CP758
- The following topics are dealt with: smart cities; town and country planning; traffic engineering computing; Internet of Things; sustainable development; learning (artificial intelligence); mobile computing; cloud computing; road traffic; road vehicles.
1 - 20 of 65 items found
-
Public Food Project - Framework for Public Food Network for Smart Cities
- Author(s): K. Dokic ; T. Lauc ; B. Radisic
- + Show details - Hide details
-
p.
(6 pp.)
This paper provides the Public Food Network framework for smart cities. Smart cities paradigm i s a kind of answer to increased human density in urban areas, while the Public Food Network framework i s a kind of improvement of urban gardening. The framework i s based on the idea that city governments have to enable growing fruit and vegetables in public areas so citizens could take fruits and vegetables for free. City governments do not have to invest much money to achieve this goal. The provided framework i s based on artificial intelligence that takes care of plants irrigation and plant disease control. Public Food Nodes that are the basis of the provided framework are based on Internet of Things technologies and standards. The project concerning the provided framework i s in the early development phase, but the most significant value of this project i s the idea of free food growing for citizens based on AI and IoT technologies with minimum servicing. Technology development makes this idea feasible and free public food stops being a subject of sociological analysis and becomes a technical problem.
-
Internet of Things and Intelligent Peltier Cold/Hot Air Conditioning system
- Author(s): M.M.M. Al-Khalidy and A.M.I. Ahmed
- + Show details - Hide details
-
p.
(6 pp.)
The objective of this paper is to develop a new air conditioning system and completely ecofriendly air-condition. Where, the principle of operation of the current air conditioning system depends on refrigerant gas like Freon, Ammonia, etc., by using these refrigerant gases the air conditioning system can get maximum output. One of the major disadvantages for these refrigerant gases is global warming and harmful gas emission. To protect the environment, these problems can be solved by using thermoelectric modules. Thermoelectric modules working under the principle of Peltier effect. The proposed air conditioner system can be used as an air-cooler in summer or as a heater in winter and it will not emit harmful or toxic gases like Hydro chlortoluron carbon etc. The project is on the line with the latest technology like the Internet of Things IOT where it uses a smartphone app to make the air-conditioner easy and very convenient with today standers.
-
Ethnicity Recognition Under Difficult Scenarios Using HOG
- Author(s): S. Al-Azani and E.-S.M. El-Alfy
- + Show details - Hide details
-
p.
(5 pp.)
With the rapid advance of globalization, analyzing nationality and race/ethnicity groups is becoming an emerging research topic that has multi-disciplinary real-world applications such as surveillance systems and targeted advertisements. This paper presents an approach to automatically predict the ethnicity groups of individuals based on their facial characteristics. Several ethnicity groups are considered in this study including: Asian, Indian, and others (like Hispanic, Latino and Middle Eastern). The proposed approach extracts features based on the Histogram of Oriented Gradients (HOG) texture descriptor. Then, it trains a support vector machine (SVM) to detect ethnicity with promising achievable results when evaluated on a publicly available dataset of labelled images.
-
Improving Obfuscated key Generation Phase for Secret Pairwise Vehicular Communication Sessions
- Author(s): S. Al-Shareeda and F. Ozguner
- + Show details - Hide details
-
p.
(6 pp.)
Intelligent vehicles in vehicular networks can share secret communication sessions that no outsider decrypts. The hybrid encryption of Elliptic Curve Integrated Encryption Scheme (ECIES) and the symmetric encryption of the Advanced Encryption Standard (AES) are harnessed by the existing standards to accomplish this purpose. In addition, in a previous study, we introduced a third alternative: the Boneh-Goh-Nissim-Blom (BGN-Blom) scheme for confidentializing the communication in such secret sessions. BGN-Blom generates a somewhat homomorphically encrypted keys between any two involved communicating vehicles avoiding the critical length of AES keys and the need for pre-authentication in ECIES. This work extends the original BGN-Blom model by three extra modifications that achieve similar security measures and are more cost-effective in terms of computation and communication overheads.
-
Evaluation of Web Application Session Security
- Author(s): J. Hasan and A.M. Zeki
- + Show details - Hide details
-
p.
(4 pp.)
Sessions variables are widely used in web applications, almost in every web application. It has been used to keep the state of logged in or authenticated users mainly, and to monitor the number of users currently using the web application. It has other useful usage as a security feature to logout the user automatically from the web application after the session timer expires. Due to the criticality of the information the sessions holds, it is important to evaluate its security. In this paper, some types of attacks on the sessions will be listed, different ways of storing sessions on the client, and the best utilization of the sessions. The outcome of this paper is whether to recommend using session variables or not, when to be used, and for what purpose it should or shouldn't be used.
-
A novel approach to mitigate IoT Gateway disconnectivity using fallback mechanism
- Author(s): H. Tarpara ; J. Kotak ; J. Pathak ; Y. Chudasama
- + Show details - Hide details
-
p.
(5 pp.)
In the architecture of Internet of Things (IoT), gateway plays a critical role which provides connectivity to end nodes with the server/IT edge services. The server provides commands or necessary data to the gateways or vice-versa to drive particular IoT application. However, this scenario requires continuous connectivity of server and gateways for smooth functioning of the IoT system. Any attack or development mistakes on server may keep gateways starving for commands to be pushed to end nodes. This kind of scenario is critical to handle in industrial IoT because it deals with the critical infrastructure. In this paper, we are proposing a fallback mechanism (theoretical model) which can be incorporated within the IoT gateway to handle such disconnectivity issues of server to minimize the damage that can be caused to the complete system.
-
A Comparative Analysis on Security of MQTT Brokers
- Author(s): J. Kotak ; A. Shah ; A. Shah ; P. Rajdev
- + Show details - Hide details
-
p.
(5 pp.)
In the era of rapid revolution of Internet of Things (IoT), the security of IoT devices as well as its application protocols has become significant. MQTT (MQ Telemetry Transport) is a light weight protocol used for communication between IoT devices. It is being extensively used in a low bandwidth environment (e.g. smart cities, home automation, etc.). There are multiple vendors for clients and brokers which are used for publishing/subscribing to topics and which act as an intermediate server respectively. As different brokers are developed by different developers, it may have different implementation flaws which impact the security of the communication between IoT devices in various ways. In this paper, we analyze various brokers available on internet from security point of view by performing DoS attack and information gathering techniques on the broker, compare the outcomes and try to find out the least vulnerable broker that can be used for secure communication between IoT devices.
-
Literature Review for Videoconferencing in Court “E-Justice-Kingdom of Bahrain”
- Author(s): F. Ali and H. Al-Junaid
- + Show details - Hide details
-
p.
(5 pp.)
Videoconferencing is becoming more popular and reliable as a tool to avoid bringing criminal defendants to courts for certain proceedings; and allows children to testify without facing the criminal. This article is a literature review to evaluate the using videoconferencing technology and argues against the traditional practice especially for physical or sexual abuse children as witnesses of violent acts. It brings to bear the literature from several countries and addresses these specific situations. The literature suggests that videoconferencing have a positive impact on the way the court is practicing the justice system. The authors argue that the courts should start equipping their courtroom with reliance videoconferencing tools and utilize modern communication technology. Additionally, the authors advocate that the courts should take serious steps to apply a well-structure of videoconferencing systems and start designing a strategic plan of training needs of those who participate in videoconference proceedings. The courts in the Kingdom of Bahrain lacks such remote testimonies technology. Finally, the authors conclude by stressing that courts with videoconferencing equipment can enhance the communication between children and defendants and their attorneys and enhance the quality of procedures and suggest the use of such technology in children cases as a first area of videoconferencing application in Kingdom of Bahrain courts. Further, qualitative studies should be undertaken to evaluate the impact of the technology in criminal proceedings especially for children.
-
The Smart Mosque of the Arabian Gulf: Solutions from the past for a sustainable, energy-efficient Mosque
- Author(s): H.E. Al-Khalifa
- + Show details - Hide details
-
p.
(6 pp.)
This study examines the smart mosque as a concept, developed through innovations in materials and technologies adopted to provide thermal comfort conditions and energy- efficient environments, in order to promote a sustainable mosque. The paper first provides a theoretical underpinning of the smart solutions applied in historical mosques with a critical review of its philosophical and practical framework. Second, it will examine the efforts made by the Gulf states authorities in the last decade to pursue smart mosque projects in the region, by reviewing a number of possible smart solutions which can be applied to the mosques in order to achieve sustainability in design. Although this concept is relatively new, this paper will argue that there are many historical mosques in the wider Islamic region, as well as those from the Arabian Gulf, that responded to the prevailing environmental conditions, within the technological and scientific constraints at the time, wherein the `smart design concept' was evident in its design through its architectural and interiors programs. This paper concludes that although, historically, mosques' architectural features addressed environmental issues, current designs, particularly in the Gulf region, have many shortcomings when faced with current environmental concerns.
-
Smart cultural heritage: technologies and applications
- Author(s): M. Khalaf
- + Show details - Hide details
-
p.
(6 pp.)
Technology is changing the face of our cities and the way we are interacting with them. Cultural heritage forms a large and growing part of every city today. This paper reviews a number of available smart technologies and looks at different examples of their application in the cultural heritage field. It also looks at the smart cultural heritage initiatives in the Kingdom of Bahrain and points out areas that need further attention to achieve smarter cultural heritage for the Kingdom of Bahrain.
-
Launching Smart Cities to Support the Economic Diversification in the GCC Region
- Author(s): G.A. Mousa ; E.A. Elamir ; A.M. Desoky
- + Show details - Hide details
-
p.
(6 pp.)
This study seeks to explore the initiatives of the Gulf Cooperation Council (GCC) countries to launch smart cities through developing a framework of smart cities consisting of five pillars namely: infrastructure, health and primary education, technological readiness, innovation and finally, macroeconomic environment. These five pillars are measured using data collected from the Global Competitiveness Report over ten years from 2009 to 2018. Concerning the first pillar, the infrastructure pillar, the results show that the GCC countries achieved a global advanced rank among 138 countries although there is a relative stability in the trend of the rank of the GCC countries during the study period from 2009 to 2018. However, the results reveal that there is an improvement in the rank of the GCC countries in two more pillars which are macroeconomic environment and health and primary education during the study period. Concerning technological readiness and innovation pillars, the GCC countries achieved significant improvement and progress in the trend of their global rank among 138 countries in the world. Furthermore, there is a rapid increase in the GCC countries in adopting modern technology. Finally, it can be argued that the GCC countries have initiatives and basic foundations to launch smart cities.
-
Designing of an Immaculate Smart City with Cloud Based Predictive Analytics
- Author(s): N. Sengupta and R. Chinnasamy
- + Show details - Hide details
-
p.
(7 pp.)
The major objective of a smart city is to provide ripest and rightest services to its residents with minimal human intervention. The data collected from various sensors, receptors and receivers can be stored in a reliable, cost effective and manageable cloud storage. Predictive analytics such as predictive modelling and machine learning can be used to analyze the latest and past data from the cloud to forecast the near and far future. The predictive analytics will immediately send notifications and the appropriate actions to be taken to the concerned system so that the residents can get equable life. Waste management such as sewage management and trash management are one of the major exertion in a smart city. In this paper, predictive analytics is applied on the cloud data collected from various sensors attached on the waste management resources such as trash bins and sewage pipes. Firstly, group of trash bins and sewage pipes are attached with radio wave sensors which in turn connected to an IoT enabled receiver to provide cost effective data collection. Secondly, the data from the receivers are stored in a cloud. Thirdly, predictive analytics are proposed for applying on the data in the cloud. Finally, actions like redirecting the trash collection truck and sewage clearing robot based on the priority can be done automatically and long term actions can be directed to the concerned authorities with notifications and alerts to take necessary actions. In this paper, designing of an immaculate smart city is proposed which can be achieved by developing IoT based trash collection and sewage cleaning system. For analysis purpose synthetic data is considered where levels for garbage cleaning bins at different time are represented with different numbers.
-
Scalable Parallel SVM on Cloud Clusters for Large Datasets Classification
- Author(s): M.S.M. Haque ; G. Latif ; M.R. Hasan ; M. Arifuzzaman ; S.S. Shafin ; Q.A. Rahman
- + Show details - Hide details
-
p.
(5 pp.)
This paper proposes a new parallel support vector machine (PSVM) that is efficient in terms of time complexity. Support vector machine is one of the popular classifiers for analysis of data and classification of patterns. However, SVM requires a large memory (in the range of 100 GB or more) in order to process big-data (i.e., in the range of 1 TB data or more). This paper proposes to execute SVMs in parallel on several clusters to analyze and classify big-data. In this approach, the data are divided to n equal partitions. Each partitioned data is used by an individual cluster to train an SVM. The outcomes of each of the SVMs executed on several clusters are then combined by another SVM referred as final SVM. The inputs to this final SVM are the support vectors (SVs) of the SVMs that were executed on different clusters, while the desired output is the corresponding output of the respective SV. We evaluated our proposed method on high performance computing (HPC) clusters and amazon cloud clusters (ACC) using different benchmark datasets. Experimental results show that the proposed method is efficient in terms of training time with minimal error rate and memory requirement, compared to the existing stand-alone SVM.
-
Evaluation of Bayesian Classifier for Salt Dome Detection using Texture analysis
- Author(s): G.M. BinMakhashen ; H. Luqman ; M. Ahmed
- + Show details - Hide details
-
p.
(6 pp.)
Seismic data analysis is an important process for oil and gas exploration. Usually, this data contains large noise and amplitude variations which hinders inferring geologic features such as salt domes accurately. The automatic detection of salt domes is always encouraged because it compensates for the limitations of manual picking, and it serves as an indicator of the existence of oil and natural gas reservoirs. In this paper, we investigate and study the performance of three texture feature extraction methods for detecting salt domes using Bayesian classifier. The Bayesian classifier is trained using one source of seismic data and evaluated using another seismic data source. Accordingly, the study tests statistically the machine learning model generalization using different seismic sources as well as the effectiveness of the texture features in this domain. Experiments confirm that the machine learning models can achieve perfect recognition accuracy using Gabor features on a single seismic source. However, these trained machine-learning models require additional training to generalize to other seismic sources.
-
Using Gabor Filter Bank with Downsampling and SVM for Visual Sign Language Alphabet Recognition
- Author(s): G.M. Bin Makhashen ; H.A. Luqman ; E.-S.M. El-Alfy
- + Show details - Hide details
-
p.
(6 pp.)
With the increasing advances in computer vision, the research on automated human gesture and sign language has attracted the attention of many researchers. It has many applications for human-computer interaction helping persons with hearing impairment in smart environments. In this paper, we focus on static hand visual features to build a system for recognizing hand and finger gestures representing different sign language alphabets. After hand segmentation, the proposed method employs texture based features extracted by down-sampling Gabor-transformed images using multiple scales and orientations. Then, a support vector machine is used for multi-class classification. The evaluation of the proposed approach on a benchmark dataset for the American sign language has reported over 95% overall accuracy with several signs perfectly recognized.
-
Magneto-caloric-effect-based Quasi-static Cooling System
- Author(s): A. Saad ; A. Jamal ; A. Othman ; K. Daif ; Z. Bahri ; O. Al-Abbasi ; M. Nabhan
- + Show details - Hide details
-
p.
(5 pp.)
This project aims at building a quasi-static cooling system that utilizes the magneto-caloric characteristics of Gadolinium. The proposed technique presents itself as an attractive choice for smart cities and a better alternative to the vapor-compression-based cooling systems used in the industry today. With its electromagnet-based novel static design feature, the system does not use any refrigerant or moving parts (except for the needed air pump and valves), hence featuring environment friendliness, suppression of vibration, noise as well as wear-out, extended lifetime, and eventually reduced cost. A novel cycle of operation was tailored in order to accommodate the usage of an impressively compact custom-designed 0.45T electromagnet as the source of magnetic field, hence omitting the usual need of rotating machines. Computer simulations estimated the system to deliver about 2 °C of cooling from an ambient 20.4 °C to 18.68 °C; and in heating mode, about 3 degrees of heating, from 20.4 to 23.33 °C. The experimental testing resulted in errors around 40 % in cooling mode and 65 % in heating. By using more efficient composite magnetocalorific materials (e.g. LaFeSi) and a stronger magnetic field,, the merits of the proposed cooling system become more apparent contributing to the quiet, sustainable, and healthy environment characterizing smart cities.
-
Blockchain Security Architecture: A Review Technology Platform, Security Strength and Weakness
- Author(s): L. Al-Abbasi and W. El-Medany
- + Show details - Hide details
-
p.
(5 pp.)
Blockchain, is the new trending revolution innovation that leverages business process and data sharing, by eliminating the centralization or intermediates. The technology has been attracting huge attention and many organizations are looking to adopt it. The decentralization, security immutability, data sharing and other blockchain advantages that have been explored reinforce that. Decision makers need to understand all potential risks to the blockchain technology to take the right decision for their business and users. The aim of this research is to study the blockchain technology Platform architecture, the security strength and weakness of the technology, how the technology addresses the information security key areas, integrity, availability and confidentiality, to help all stakeholders and decision makers in designing and architecting their blockchain applications.
-
IoT Security: A review of Cybersecurity Architecture and Layers
- Author(s): H.Y. Ali and W. El-Medany
- + Show details - Hide details
-
p.
(7 pp.)
With the fast advancement in Technology, it started to get in every aspect of our lives. Especially that these devices are getting smaller, low power consuming and connects to the internet along with other IoT devices most or all the time thus internet of things devices are becoming a major part and can be seen everywhere in consumers houses or businesses. With these devices several risks in term of security and privacy are emerging, especially with data becoming so valuable for spying or profiting. This paper will explain privacy, its aspect and meanings to obtain a clear definition of types and ways privacy is invaded or violated. There are several laws regarding information, data privacy and protection, example of old and recent court cases with corresponding rulings. For a better understanding of how they are violated thus what should be considered or protected. There are different Layers of IoT security architecture available and described in order to protect the availability, confidentiality and integrity of IoT devices, besides a few suggested areas that need to be considered or addressed. Types of data and information that can be collected, aspects and attacks to IoT devices in terms of machine and deep learning and the data yielded from them, also the solutions approached are recommended by the author.
-
MPC Track Follower for Self-Driving Cars
- Author(s): W. Farag and Z. Saleh
- + Show details - Hide details
-
p.
(6 pp.)
In this paper, a comprehensive Model-Predictive-Control (MPC) controller that enables effective complex track maneuvering for Self-Driving Cars (SDC) is proposed. The paper presents the full design details and the implementation stages of the proposed SDC-MPC. The controller receives several input signals such as an accurate car position measurement from the localization module of the SDC measured in global map coordinates, the instantaneous vehicle speed, as well as, the reference trajectory from the path planner of the SDC. Then, the SDC-MPC generates a steering (angle) command to the SDC in addition to a throttle (speed/brake) command. The proposed cost function of the SDC-MPC (which is one of the main contributions of this paper) is very comprehensive and is composed of several terms. Each term has its own sub-objective that contributes to the overall optimization problem. The main goal is to find a solution that can satisfy the purposes of these terms according to their weights (contribution) in the combined objective (cost) function. Extensive simulation studies in complex tracks with many sharp turns have been carried out to evaluate the performance of the proposed controller at different speeds. The analysis shows that the proposed controller with its tuning technique outperforms the other classical ones like PID.
-
Smart Emergency Response System for Road Accidents with Automatic Accident Detection
- Author(s): A. Shubham ; K. Deogharia ; A. Bundela ; A. Chaturvedi ; L. Sharma ; S. Srivastava ; A. Kshitij
- + Show details - Hide details
-
p.
(6 pp.)
Almost four hundred people lose their lives per day in road accidents in Indian subcontinent alone [3]. We know that the first few minutes play a vital role in deciding the fate of the victim involved in the accident. The Emergency Response Support System (ERSS) around the world are now improving their infrastructure to find the accurate location of the distress call. On the other hand, sometimes it is not possible for the victim to call the emergency services. Till now, most of the accident detection and response mechanisms focused on using specialised hardware solutions to detect the crash with a few exceptions. This paper presents a way of detecting road accidents through a smartphone that avoids false positives. An Android smartphone-based prototype architecture of our accident detection system along with empirical results are being presented.