NEWS

invited sessions

Special Sessions:

  1. Internet of Things and Cloud Computing (Chair: Ahmed Nait-Sidi-Moh) 
  2. Logistics systems optimization (Chair: Abdellah El Fallahi)
  3. Cryptology Computer Security & Applications (CCSA) (Chair: ASIMI Ahmed,)
  4. Embedded Systems and Biomedical Engineering (Chair: Rachid Latif)
  5. Advanced control and Power electronics application (Chairs: Abdelhadi ELBACHA and Zakaria BOULGHASOUL)
  6. Machine Learning Techniques and Information Security (MLTIS) (Chairs: Kareem Kamal A.Ghany)

Session 1:

Internet of Things and Cloud Computing

Aims and Scope

The Internet of Things (IoT) is a concept that emerged recently to establish an ecosystem of any object or thing connected to Internet such as cars, sensors/actuators, TVs, smartphones, and all user applications and services. It allows services and devices to be ubiquitous/pervasive by making them connected and accessed anytime and from anywhere. This revolution is based on a constant evolution of the Internet, technologies and software,  communication protocols, embedded sensors, smart physical objects able to provide/collect data in real time. This will dramatically change our way of living (e.g., smart cities, smart transportation, smart homes, healthcare) but create, however, a challenge mainly related to the enormous amount of data will to be stored, accessed, and to be analyzed.

Cloud computing (CC) is recognized by the community as a platform for big data storage and processing. Combining both IoT and CC will enable data storage and processing capabilities of individual objects or things, but requires combining effort from different communities, such as communication technologies, software engineering, Web services, embedded computing, big data analytics.

This Special Session will provide an opportunity to investigate, publish novel ideas and disseminate knowledge covering the broad area of management and organization through interaction, interoperability and collaborations of different and distributed services using Web 3.0 technologies. Authors of selected papers are invited to submit their extended papers (more than 30%) for a Special Issue called also “Internet of Things and Cloud Computing” within
the International Journal of Systems, Control and Communications. High quality papers reporting on relevant reviews of existing literature, theoretical studies, case studies, interdisciplinary research are all very welcome. The SS topics appropriate for consideration include but are not limited to:

  • Architectures for IoT/Cloud
  • Smart and connected devices
  • Data sharing and IoT
  • IoT and CC in the context of industry 4.0
  • Interoperability and interaction of devices/objects
  • Tracking and traceability of objects
  • Security and privacy in IoT
  • Information systems et communication technologies for IoT/Cloud
  • Service operations and management
  • Modeling, verification and validation approaches for IoT/Cloud
  •  Applications of the IoT and cloud computing (Logistic applications, Production
    guidance, Energy optimization and monitoring …)

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Contact:
Session chair: Dr. Ahmed Nait-Sidi-Moh, University of Picardie Jules Verne, France.
email: ahmed.nait@u-picardie.fr

Session 2:

Logistics systems optimization

The application of new technologies and intelligent algorithms in logistics processes optimization is the center of interest of many researchers during the latest decades. The optimization of logistics’ processes is an important topic which is more and more treated by various actors due to its importance to reduce the cost of the final product and satisfy the customer’s exigencies. For these reasons, optimize and reduce the non added value processes are one of the most interested battlefields of the companies and research centers working in the logistics area.

In this session, we invite researchers and industrialists to present the newest techniques of modeling, designing and solving the logistics processes.

Keywords: modeling transportation networks, intelligent optimization methods.

TOPICS:
we solicit submissions of original ideas and papers describing significant results and developments from both researchers and practitioners in a specific range of fields addressing the following topics:

  • Optimization and designing of the vehicle routing problems
  • Intelligent transportation networks
  • Resolution and management of manufacturing problems
  • Optimization of the scheduling problems
  • Evolutionary algorithms for logistics problems
  • Modeling and solving the large-scale optimization problems

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Chair of the session: Dr. Abdellah El Fallahi, National School of Applied Sciences of Tetouan.

Session 3:

Cryptology Computer Security & Applications (CCSA)

Aims and Scope

The technology revolution has made businesses more open and accessible through cyberspace services. This information technology became more relevant to their sustainable development. Rather, the increased security of its computer systems against criminal activity remains a challenge that has no borders. This is one of the areas of greatest concern in research laboratories and companies. Indeed, the privacy of Internet users is an inter-linked chain requiring a level of security combining a set of theoretical, technical, organizational, legal and human means. The aim is to have an in-depth view of all the basic elements that make up and contribute to the security of information systems within companies.

The evolving nature and complexity of the threats of cybercrime are real challenges for cyber-security requiring sophisticated cyber defenses. We are convinced by this scientific event to bring together experts in Informatics around themes contributing to the protection of information systems on the web. We want to create a space for reflection and exchange of information on different areas of Cryptology, Computer Security and Applications. This edition is intended to innovate secure collaborative solutions capable of preserving any environment of information systems.

The aim of CCSA session is to provide an opportunity for international exchange and sharing in the field of computer security. It will take place in the form of lectures by nationally and internationally renowned researchers and experts.

In a framework of research, development and innovation, the “CCSA” session is a scientific opportunity for academic researchers and also professionals in the field of information systems security to confront the latest scientific advances, needs and challenges in Cryptology, Security, Complex Systems and protection of sensitive infrastructure and data. It aims to put into effect the different research themes, to strengthen the exchange of know-how between Moroccan and foreign researchers and to work together to develop international solutions to tackle the problems encountered.

Prospective authors are invited to submit their research papers on the topics, but not limited to the following:

  • Computer Cryptology.
  • Security IT and Information systems.
  • Applications in various fields:
    • Web, Distributed Systems.
    • Complex Systems.
    • Cloud Computing.
    • Blockchain Technology.
    • Big Data, Internet of Things.
    • Data warehouse.
    • Sensor and Wireless Networks.
    • Computer and Communication Networks.
    • Security of Images and Medical Data.
    • Network Security.
    • Mobile Networks.
    • Network Function Virtualization (NFV).
    • Embedded Systems.

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Contact:
Session chair: Prof. ASIMI Ahmed, IBN ZOHR University, AGADIR, MOROCCO.
Email: asimiahmed2008@gmail.com

Session 4:

Embedded Systems and Biomedical Engineering

Aims and Scope

Now a day there has been tremendous interest on embedded system for biomedical application. Embedded system is a combination of processors, sensors, actuators, “intelligence”, “hidden computer” and massive development. Intensive with uncertain environment, this system operates in constrained environments in which computer memory and processing power are limited. They often provide their service within strict time deadline to their user and to the surrounding world. Real-time operating systems (RTOS) are used in embedded software. It is designed in such a manner that it runs on it’s without human intervention respond to events in real time. One of the fundamental requirements for embedded system is the ability to obtain the testing data from command line of the program for process control in the testing system. In the embedded system homogeneous systems such as FPGAs, CPCPU, GPGPU, DSP can be cited. Each one of these platforms to its own language taking as example the VHDL description language for the FPGAs, we also find OpenMP and OpenGL for the CPCPU and GPGPU. On the other side we find the heterogeneous system like CPU-GPU based on OpenCL or Cuda, CPU-FPGA, CPU-DSP based on OpenCL.

Biomedical technology broadly refers to the application of engineering and technology principles to the domain of living or biological systems. Usually inclusion of the term biomedical denotes a principal emphasis on problems related to human health and diseases, whereas terms like “biotechnology” can be medical, environmental, or agricultural in application. In this session we invite researchers to come up with innovative new ideas that link the biomedical field with the embedded system.

Topics

  • Automotive Embedded Systems
  • Biomedical engineering and e-health
  • Embedded Systems for UAV and Robot Navigation
  • Medical monitoring system in real time
  • OpenCL Architecture CPU-FPGA
  • Cuda Architecture CPU-GPU
  • H/W Co-Desgn and Optimization Techniques
  • Industrial Collaborative Robot
  • Wireless Medical Monitoring System
  • FPGA Implementation Algorithm
  • Embedded SLAM Bio-Inspired Algorithms
  • VHDL Optimization and HDL Coder

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Contact:
Session chair: Prof. Rachid LATIF, IBN ZOHR University, AGADIR, MOROCCO.

Session 5:

Advanced control and Power electronics application

Aims and Scope

Energy conversion is a multidisciplinary area which requires an effective integration of control method, power electronics, electrical machines and sensors. However, due to the effects of perturbations, uncertainties, component failures, or sensor faults, conventional control methods may lead to an unsatisfactory performance. In addition, the entire state is impossible to measure, and some form of estimation is necessary.Advanced methods of control are expected to contribute to improving the energy conversion in the major part of electrical machines and power electronics condition monitoring area. In fact, the growing development of powerful microprocessors has opened new research areas, where novel advanced method can be proposed to control power converters and drives.

This invited session is intended to attract research papers showing advanced method techniques devotedto electric machines and power electronics application. The scope includes but is not limited tothe following topics:

  • AC motor drives control,
  • Observers andsensorless methods,
  • Fault detection in machines and drives
  • Multilevel Converter Topologies
  • Power Electronics Applications in Renewable Energy
  • Power control methods and algorithms

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Contact:

Session chairs: Prof. Abdelhadi ELBACHA and Zakaria BOULGHASOUL, Cadi Ayyad University, MOROCCO.

email:a.elbacha@uca.ac.ma ; email:z.boulghasoul@gmail.com

Session 6:

Machine Learning Techniques and Information Security (MLTIS)

Aims and Scope

With the advancement in using Machine Learning techniques, the capabilities of Information Security techniques to model complex systems and solving more complex problems makes them a useful tool in scientific researches and applications.

Machine learning is being used decades ago in many applications such as medical applications, biometric authentication, image retrieval, and other applications. Since the emerging of the Big Data, obtained from different field such as meteorology, genomics, finance, healthcare, social media and web data, the importance of the machine learning became very crucial for the decision makers.

Optimization can be used in various applications to find the minimal cost, maximal profit, and others. It has a vital role in designing smart/intelligent systems, e.g. recommender systems, search engines, image retrieval/recognition…etc. The advance of these systems requires the development of new optimization techniques to enhance the learning algorithms of the applied machine learning techniques. In general, optimization provide offers a valuable framework for reasoning about, formulating, analyzing, and solving different problems in machine learning.

The aim of this session is to attract researchers and practitioners from academia and industry for exchanging theoretical and practical ideas, and provide a discussion environment in order to share their experiences of the state-of-the-art in Information Security related to machine learning.

Prospective authors are invited to submit their research papers on the topics, but not limited to the following:

  • Machine learning and optimization application.
  • Using machine learning techniques in big data.
  • Feature extraction using machine learning techniques.
  • Database and Data Management Security
  • Security and Privacy of Mobile/Wireless Systems
  • Cloud Computing Security and Resource Management
  • Biometrics and Encryption.
  • Big Data Analytics and Data Science.
  • Secure Medical Images.
  • Networking Technologies.
  • Blockchain Technologies.

Important dates

SUBMISSION : January 15, 2019
NOTIFICATION : January  25, 2019
CAMERA-READY : January 28, 2019
REGISTRATION : January 29, 2019

Contact:

Session chairs: Dr. Kareem Kamal A.Ghany, College of Computing and Informatics, SEU, Saudi Arabia and Faculty of Computers and Information, Beni-Suef University, Egypt
Email :kareem.ict@gmail.com

Honorary session Chairs:
Dr. Abdulaziz Abdullah Albesher,Dean, College of Computing and Informatics, SEU, Saudi Arabia
Dr. Raed Ibrahim Alhamad, Vice Dean, College of Computing and Informatics, SEU, Saudi Arabia

Session Organizers:

Dr. Mohammed Habib
Dr. Imran Usman
Dr. HazzaAlsharif

Reviewing Committee:
Dr. Ahmed Aljabr
Dr. Sultan Alhussain
Dr. SamerAtawneh
Dr. Mousa Alakhras
Dr. Marwahalmasri
Dr. Ola Motwalli
Dr. Kailash K.Moti Ram
Dr. Muhammed Ramzan
Dr. HamdanAlzahrani