Greetings & Welcome

About the Conference

About

The First International Conference of Smart Systems and Emerging Technologies provides an excellent forum, which contributes new results in all areas of Artificial Intelligence, Internet-of-Things, Emerging Technologies, Unmanned Systems, Communication and Networking, and Cyber-Security in line with technological advances in the Kingdom under the umbrella of the Vision 2030.

Goal

Bringing together researchers and practitioners from academia and industry to focus on smart systems and technologies related to computer science, information technology, and engineering as well as interdisciplinary research and applications.

The conference focuses on all technical and practical aspects of Smart Systems and Emerging Technologies with applications in real-world and scientific problems.

Submissions

SMARTTECH 2020 seeks to promote research that carries a strong conceptual message (e.g., introducing a new concept or model, opening a new line of inquiry within traditional or interdisciplinary areas, or introducing new techniques or new applications of known methods). SMARTTECH 2020 welcomes all submissions, whether aligned with the current theory of computation research directions or deviating from them.

Be a Part of

SMARTTECH 2020

SMARTTECH 2020 will be held at Prince Sultan University, Riyadh, Saudi Arabia.

3 - 5 November 2020

Committees Chairs

General Chairs

Program Chairs

Publication Chair

Advisory Board

Sponsorship Committee Chairs

IEEE Liaison Committee Chairs

Publicity Chair

Conference Schedule

Tuesday, November 3, 2020

Registration

8:00-8:30

Opening Words

By Anis Koubaa and Ahmad Azar

8:30-8:45

Keynote Speaker

By Prof. Mohamed-Slim Alouini

8:45-9:45

Session 1: Artificial Intelligence, Computer Vision | 10:00-11:00

Automatic Gun Detection From Images Using Faster R-CNN

By Rana M. Alaqil , Jaida A. Alsuhaibani, Batool A. Alhumaidi, Raghad A.
Alnasser, Rahaf D. Alotaibi, Hafida Benhidour

10:00-10:20

DriftNet: Aggressive Driving Behaviour Detection using 3D
Convolutional Neural Networks

By Alam Noor, Bilel Benjdira, Adel Ammar, and Anis Koubaa

10:20-10:40

Automatic Smart UAV search of lost floating target in ocean
environment based on high dense clustering

By Mehrez Boulares and Ahmed Barnawi

10:40:11:00

Session 2: Communication and Networking, Next Generation Protocols | 11:00-12:00

Application of future 6G technology to support heavy data traffic in
highly mobile networks

By Rafael Kunst, Edison Pignaton, Ting Zhou, Honglin Hu

11:00-11:20

Avoiding Forwarding Loop Across Multiple Domains Without Controller
Synchronization in SDN

By Nauman Khan, Rosli Bin Salleh , Zahid Khan , Anis Koubaa

11:20-11:40

A Novel mmWave Defected Ground Structure Based Microstrip Antenna for
5G Cellular Applications

By Abdullah Qayyum, Arbab Haseeb Khan, Shahab Uddin, Owais Ahmad, Jan
Sher Khan and Shahid Bashir

11:40-12:00

Break

12:00-1:00

Session 3: Unmanned Systems, Robotic Control | 1:00-2:00

Artificial Bee Colony Optimized Self-tuning PI Speed Controller for
FCS-MPCC of Permanent Magnet Synchronous Machines

By M. H. Arshad, Abubakr H. Elsayed, M. A. Abido, A. Salem

1:00-1:20

Backstepping H-Infinity Control of Unmanned Aerial Vehicles with Time
Varying Disturbances

By Ahmad Taher Azar, Fernando E. Serrano, Anis Koubaa, Nashwa Ahmad Kamal

1:20-1:40

Adapted Fuzzy Fractional Order proportional-integral controller for DC
Motor

By Arezki Fekik, Hakim Denoun, Ahmad Taher Azar, Anis Koubaa, Nashwa
Ahmad Kamal5, Mustapha Zaouia, Mohamed Lamine Hamida, and Nacira Yassa

1:40:2:00

Session 4: Cybersecurity, Machine Learning | 2:00-3:20

Assessment of Machine Learning Techniques for Building an Efficient
IDS

By Sotirios Panagiotis Chytas, Leandros Maglaras, Abdelouahid Derhab and
George Stamoulis

2:00-2:20

Phishing Detection Using Machine Learning Technique

By Junaid Rashid, Toqeer Mahmood, Muhammad Wasif Nisar, Tahira Nazir

2:20-2:40

Using Machine Learning for Intrusion Detection System in Wireless Body
Area Network

By Fheed Alsubaie, Mousa Al-Akhras, Hamdan A. Alzahrani

2:40-3:00

Enhancing the security of financial transactions in Blockchain by
using machine learning techniques: towards a sophisticated security
tool for banking and finance.

By Dalila Boughaci and Abdullah Alkhawaldeh

3:00-3:20

Wednesday, November 4, 2020

Keynote Speaker II

By Prof. Fakhri Karray

8:30-9:30

Session 5: Artificial Intelligence, Medical Applications | 9:40-11:20

Deep Transfer Learning for Nucleus and Micronucleus Recognition

By Tarik Alafif, Sameer Qari, Ayman Albassam, and Abdulmajeed Alrefaei.

9:40-10:00

Diabetic Retinopathy Lesions Detection using Faster-RCNN from retinal
images

By Tahira Nazir, Aun Irtaza, Junaid Rashid, Marriam Nawaz and Toqeer
Mahmood

10:00-10:20

Agent-based simulation for COVID-19 outbreak within a semi-closed
environment

By Mohammad Shanaa and Sherief Abdallah

10:20:10:40

Predicting COVID-19 Spread Level using Socio-Economic Indicators and
Machine Learning Techniques

By Alaeddine Mihoub; Hosni Snoun; Moez Krichen; Riadh Bel Hadj Salah;
Montassar Kahia

10:40-11:00

Image Pattern Analysis towards Classification of Skin Cancer through
Dermoscopic Images

By Khushbakht Iqtidar, Amna Iqtidar, Waqas Ali, Sumair Aziz, Muhammad
Umar Khan

11:00-11:20

11:20-12:00

  • Atrial Fibrillation Detection Using a Double-Layer Bi-Directional LSTM Neural Networks

    Mona Alsaleem and Md Saiful Islam

  • A Novel Approach for POS Tagging of Pashto Language

    Haris Ali Khan, Muhammad Junaid Ali and Umme-Hanni

  • Blockchain-based Key Management Protocol for Resource-Constrained IoT Devices

    Ahmed Alrehaili and Aabid Mir

  • Secure IoT based E-Health Application System

    Muhammad Naeem Tahir, Sahar Malik, Urooj Rashid

  • A Survey of Security Challenges with 5G-IoT

    Aabid Mir, Megat F. Zuhairi, Shahruniza Musa, Toqeer Ali Syed and Ahmed Alrehaili

  • A Brief Overview of Biometrics in Cybersecurity: A Comparative Analysis

    Nuha Alanezi, Najla Alharbi, Zainab Alharthi and Omar Alhazmi

  • Feature Selection to Optimize DoS Detection in Wireless Sensor Networks

    Mousa Al-Akhras, Abdulaziz I. Al-issa, Mohammed S. ALsahli, Mohammed Alawairdhi

  • Human-Robot Interaction: A Myo Armband Using EMG and IMU Signals

    Uzair Muhammad, Khadija Amjad Sipra, Muhammad Waqas, Shanshan Tu, Anis Koubaa

  • Steering Algorithm for Nonholonomic Mechanical Systems using Sliding Mode Control

    Waseem Abbasi and Fazal ur Rehman

  • Combination of Blockchains to Secure Smart Home Internet of Things

    Hilalah F. Alturkistani, Nourah K. AlSa'awi

Break

12:00-1:00

Session 6: Emerging Technologies, Intelligent Applications | 1:00-1:40

Application of Business Intelligence Solution Development and
Implementation in a Small-Sized Enterprise

By Hind Alaskar, Tanzila Saba

1:00-1:20

Feature Based Optical Flow Model for Obstacle Detection on a Camera
Phone

By Abdulmalik Danlami Mohammed, Tim Morris

1:20-1:40

Session 7: Emerging Technologies, Energy | 1:20-2:40

Containerization: For Over-the-Air Programming of Field Deployed
Internet-of-Energy Based on Cost Effective LPWAN

By Rameez Asif, Kinan Ghanem and James Irvine

1:40-2:00

Improving the Performance of Solar Panels by Automated Water Cooling
System and IoT

By Yousif Al-Wajih, Muhammad Mysorewala, Ahmed Mohammed, Shehab Mostafa

2:00-2:20

A signal analysis approach towards detection and classification of
power quality disturbances

By Abdullah, Muhammad Umar Khan, Waqas Ali, Muhammad Faisal Shehzad,
Sumair Aziz

2:20:2:40

Session 8: Emerging Technologies, Eletrical Engineering | 2:40-3:40

Hybrid Image Fusion Method Based On Discrete Wavelet Transform (DWT),
Principal Component Analysis (PCA) and Guided Filter


By Andleeb Noor, Saima Gaffar, M. T Hassan, Mir Junaid, Aabid Mir and
Amandeep Kaur

2:40-3:00

High Speed Half-Precision Floating-Point Fused Multiply and Add Unit
Using DSP Blocks

By S.Sankar Ganesh, J.Jean Jenifer Nesam, Umashankar Subramaniam

3:00-3:20

Supervised Machine Learning Based Artificial Neural Network Approach
for the Control of Matrix Converter

By Muhammad Ishaq, Muhammad Hammad Afzal

3:20-3:40

Thursday, November 5, 2020

Session 9: Artificial Intelligence, Activity Recognition | 8:30-9:30

Feature Compression Based on Discrete Cosine Transform for Handwritten
Digit Recognition

By Ali Mohammed Al-Mohammedi and Irfan Ahmed

8:30-8:50

Fusion of Global and Local Deep Features Using Bag of Words and VLAD
Encoding for Human Activity Recognition

By Amany Abdelbaky and Saleh Aly

8:50-9:10

A Tensor Approach for Activity Recognition and Fall Detection Using
Wearable Inertial Sensors

By Elhocine Boutellaa, Khalida Ghanem, Hakim Tayakout, Oussama Kerdjidj,
Farid Harizi, Salah Bourennane

9:10-9:30

Break - 10 minutes

9:30-9:40

Session 10: Internet-of-Things, IoT Applications | 9:40-11:00

Raspberry Pi Assisted Safety System for Elderly People: An Application
of Smart Home

By Habab Jan, Hikmat Yar, Javed Iqbal, Haleem Farman, Zahid Khan and Anis
Koubaa

9:40-10:00

Vulnerabilities and Security Issues in IoT Protocols

By Raghad Abdulghani, Marwa Alrehili, Abrar Almuhanna, Omar Alhazmi

10:00-10:20

Pervasive Communications Technologies For Managing Pandemics

By Mohammad Ilyas, Basit Qureshi

10:20-10:40

Voice Command and Hand Gestures for Smart Home

By May Alsaif and Abdulrahman Albarrak

10:40-11:00

Session 11: Artificial Intelligence, Medial Applications II | 11:00-12:00

A Machine Learning Based Robust Approach to Identify Dementia
Progression Employing Dimensionality Reduction in Cross Sectional MRI
Data

By Afreen Khan, Swaleha Zubair

11:00-11:20

Cardiotocography: An indicator to predict Vaginal and Cesarean
Deliveries

By Muhammad Umar Khan, Sara Ibraheem, Maira Sohail, Sumair Aziz, Syed
Zohaib Hassan Naqvi and Zurria Kiyani

11:20-11:40

Electrohysterogram based Term and Preterm Delivery Classification
System

By Muhammad Umar Khan, Zurria Kiyani, Maira Sohail, Sumair Aziz, Sara
Ibraheem and Syed Zohaib Hassan Naqvi

11:40:12:00

Break

12:00:1:00

Session 12: Cybersecurity, Security Applications | 1:00-2:20

ASAF: Android Static Analysis Framework

By Aala Al Khayer, Iman Almomani, Khaled Elkawlak

1:00-1:20

Nonlinear System as a Stream-Cipher

By Rhouma Rhouma and Rabie Bechikh

1:20-1:40

Machine Learning with Blockchain for Secure E-voting System

By Muhammad Asaad Cheema, Nouman Ashraf, Asad Aftab, Hassaan Khaliq
Qureshi, Muhammad kazim, Ahmad Taher Azar

1:40-2:00

DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple
and Google

By Shahid Anjum

2:00-2:20

Session 13: Artificial Intelligence, Prediction and Detection |

Prediction Framework for Water Quality Parameters Monitoring via
Remote Sensing

By Gehad Hassn, Masoud E Shaheen, Shereen A. Taie

2:30-2:50

Racism Detection in Twitter Using Deep Learning and Text Mining
Techniques for the Arabic Language

By Afaf Alotaibi And Mozaherul Hoque Abul Hasanat

2:50-3:10

Vibration Signal Analysis Towards Early Detection of Machine Faults

By Sumair Aziz, Muhammad Ahmed, Imran Abbass, Syed Zohaib Hassan Naqvi,
Muhammad Umar Khan

3:10-3:30

Closing Words

3:30-3:40

Tracks (Co-Chairs)

Track 1. Artificial Intelligence

Track 2. Internet of Things (IoT)

  • Uthman Baroudi

    King Fahd University of Petroleum and Minerals, Saudi Arabia

  • Zahid Khan

    Prince Sultan University, Saudi Arabia

Track 3. Emerging Technologies

Track 4. Unmanned Systems

Track 5. Communication and Networking

Track 6. Security


Submissions & Publication

Papers should describe original and unpublished work about the above or related topics. All manuscripts will be reviewed by three members of the program committee. Authors are invited to submit their papers in English of up to 6 double-column pages IEEE format, with up to 2 extra pages with additional fees. The format of the paper should follow IEEE guidelines for the two-column IEEE-sponsored conference proceedings. Templates for Microsoft Word and LaTeX are available here. Authors may use the online submission system hosted by EasyChair Conference System to submit their papers. The submission Web page for SMARTTECH2020 can be found here

Our

Keynote Speakers

Mohamed-Slim Alouini

King Abdullah University of Science and Technology, Saudi Arabia

Fakhri Karray

University of Waterloo, Canada

Our

Conference Sponsors

Our

Academic Sponsors