This event is endorsed
and organized by

EAI International Conference on Future Intelligent Vehicular Technologies

October 17–19, 2017 | Islamabad, Pakistan

Paper submission to Special Sessions

Papers should be submitted through EAI 'Confy' system at Confy, and have to comply with the SPRINGER format (see Author's kit section).

How do I submit a paper in Confy?

  1. Go to Confy website
  2. Login or sign up as new user
  3. Scroll the list of conferences open for submission
  4. Select the Special Session youare submitting paper in Future 5V 2017
  5. Click the 'submit a paper' link and follow the instructions

Submission guidelines

  • Papers should be in English.
  • Regular papers should be up to 10 pages in length.
  • Short papers should be up to 6 pages in length.
  • Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
  • The paper submissions must follow the SPRINGER formatting guidelines (see Author's kit section).
  • Read the Publication Ethics and Malpractice Statement.

Instructions and Templates

Papers must be formatted using the SPRINGER Author's Kit. Detailed instructions and templates are available.


List of approved Special Sessions:

Special session 1: BIOmetrics, bioMedical Image and Signal Analysis (BIOMISA)

Organizer: Dr. Muhammad Usman Akram, National University of Sciences & Technology (NUST), Pakistan.

Chairs:  Dr. Shehzad Khalid, Professor, Bahria University, Islamabad, Pakistan

             Dr. Arslan Shaukat, Assistant professor, NUST, Pakistan 

Outline: Biometrics refers to the science of recognizing individuals based on their physical, physiological or behavioral traits such as face, fingerprints, iris, gait and voice etc. In last few decades, a number of biometric solutions are incorporated in various access control and identity management applications, such as laptops and border control systems. Human identification methods based on credentials, such as identification documents and PIN, cannot meet the growing demand for security in applications such as ID cards, border crossings, and access control. As a result, recognition methods based on physiological and behavioral characteristics are increasingly adopted to enforce person identification applications. However, biometric systems that are based on a single trait often suffer from limitations such as lack of invariant representation, non-universality, noisy sensor data, lack of individuality of the biometric trait and susceptibility to circumvention. There are still several challenging problems in improving the accuracy, robustness, efficiency, security, privacy and ergonomics of multibiometric systems.

More info about Special session 1 CFP

Special session 2: Big Data Management, Curation and Analytics

Organizer: Dr. Arif Ur Rahman, Department of Computer Science, Bahria University, Pakistan.

Chairs:  Dr. Arif Ur Rahman, Department of Computer Science, Bahria University, Islamabad, Pakistan

                Dr. Moneeb Gohar, Department of Computer Science, Bahria University, Islamabad, Pakistan

                Dr. Muhammad Muzammal, Department of Computer Science, Bahria University, Islamabad, Pakistan.           

Outline: Big data is a recent addition to the field of data science. It is generated in many domains including healthcare, finance, media, manufacturing, energy and transport. Complex algorithms and technology are required for extracting value from the huge amounts of data having complex formats. Moreover, big data requires proper data management and curation protocols which are helpful in analysis of the data. Big data management involves the organization, administration and governance of large volumes of structured and unstructured data. One of the basic principles for data analytics is that the quality of the analysis is dependent on the quality of the information being analyzed. Proper data curation procedures provide the technological as well as ...

More info about Special session 2 CFP

Special session 3: Delay Tolerant Opportunistic Networks

Chairs:  Prof. Dr. Khalid Hussain, Department of Computer Science and Information Technology, The University of Lahore, Islamabad Campus.

            Mr. Ahthasham Sajid, Assistant Professor, Department of Software Engineering, CESET, Islamabad

            Engr. Alamgir Safi, Assistant Professor, Department of Electrical Engineering, CESET, Islamabad

            Dr. Humaira Arshad Assistant Professor, IIU, Islamabad
Outline: Delay Tolerant Networks (DTN) is the most growing interest in wireless multi-hop networking research community under sensor networks domain specifically in Mobile based sensor networks. DTN networks places various research challenges due to drastic mobility via mobile devices over each layer of the protocol stack and non-availability of entire path from source to destination. The important features of DTN network is selection of the best forwarding nodes and co-ordination among the nodes to deliver the packets to their destination in efficient manner.

More info about Special session 3 CFP

Special session 4: Vehicular Communication Trends and Security in Emerging Technologies and Beyond

Chairs:  Dr. Suleman Khan, School of Information Technology, Monash University Malaysia.

             Dr. Syed Adeel Ali Shah, Department of Computer Science, University of Engineering and Technology, Peshawar, Pakistan.
Outline: Vehicular communications using WAVE, safety/non-safety application specifications and secure vehicular communications have been a major trend in the past decade or so. However, as the emerging communication technologies are introduced, vehicular communications face fascinating research challenges in order to evolve by incorporating these technologies. Particularly, vehicular communications based on 5G, software defined vehicular networks, vehicular cloud/fog computing and mobile edge computing for vehicles are at the very heart of the emerging technologies.

More info about Special session 4 CFP

Special session 5: Signal and Image Processing

Chairs:  Mr. Zia Ur Rahman, School of Information Science and Technology, Northwest University, Xi'an, China

                Prof. Dr. Ding-Yi Fang, School of Information Science and Technology, Northwest university, Xi'an, China

               Mr. Izaz Ahmad Khan, Assistant Professor, Bacha Khan University Charsadda, Pakistan 

             Dr. Fazl-e-Malik, Assistant Professor, Bacha Khan University Charsadda, Pakistan
Outline: Image processing is processing of images using mathematical operations by using any form of signal processing for which the input is an image, a series of images, or a video, such as a photograph or video frame; the output of image processing may be either an image or a set of characteristics or parameters related to the image. Most image-processing techniques involve treating the image as a two-dimensional signal and applying standard signal-processing techniques to it. Images are also processed as three-dimensional signals with the third-dimension being time or the z-axis. Image processing usually refers to digital image processing, but optical and analog image processing also are possible. Biometrics, on the other hand, refers to automatic recognition of people based on their distinctive anatomical or behavioral characteristics such as face, fingerprint, iris, retina, hand geometry, voice. Biometrics-based authentication ...

More info about Special session 5 CFP

Special session 6: Software Piracy- Types, Issues, and Remedies

Organizer:  Dr. Shah Nazir, Assistant Professor, Department of Computer Science, University of Swabi, Pakistan

Chairs:  Dr. Shah Nazir, Assistant Professor, Department of Computer Science, University of Swabi, Pakistan
                 Dr. Sara Shahzad, Associate Professor, Department of Computer Science, University of Peshawar
Outline:  Software theft and piracy have become a threat menace for software development industry. Software piracy involves copying and reusing the software or parts of software without proper authorization.It ultimately results in huge financial loss to the copyright holder and a continual threat to software development industry. General user community is not aware of this serious crime and most of the time peoplethink that it is not important for them to worry about. Software piracy is performed in many ways including hard-disk loading, soft lifting, counterfeit goods, rental software, and bulletin board piracy.  ...

Special session 7: Underwater  Wireless Sensor Networks (UWSNs) and Wireless Body Area Networks (WBANs)

Organizer:  Dr. Sheeraz Ahmed, Dean, Faculty of Engineering and Technology, Gomal University, D.I.Khan, Pakistan 

Chairs:  Dr. Nadeem Javaid, Associate Professor, COMSATS Islamabad, Pakistan

   Dr. Fazal-e-Hadi, Assistant Professor, Preston University, Peshawar, Pakistan

          Dr. Imran Ahmed Mughal, Assistant Professor, IMSciences, Peshawar, Pakistan

Outline:  Underwater Wireless Sensor Networks (UWSNs) has recently become a prominent area of research in the field of acoustic communications. Acoustic waves are the most accurate means of achieving adequate transmission range and data rate in underwater communications. New progresses achieved in UWSN communications make reliable data transmission across several meters conceivable. Many studies have been investigated on developing networking solutions for underwater networks, including acoustic channel modeling and physical layer transmission analysis as well as networking protocols. In radio channels, path loss depends on link length; whereas acoustic waves in underwater experience both frequency and link length dependent path loss. Furthermore, reflections from the water surface and sea bottom increase channel fading. All these factors are considered in the design of UWSN wireless systems. Hence, in UWSN communications, range and bandwidth are important bottlenecks. ...

Special session 8: Energy-efficient Techniques for WLAN, WSN, WPAN

Organizer:  Dr. Ayaz Ullah, Assistant Professor, Department of Computer Science, University of Swabi, Pakistan

Chairs:  Dr. Shah Nazir, Head of Computer Science Department, University of Swabi, Pakistan 

        Dr. Ayaz Ullah, Assistant Professor, Department of Computer Science, University of Swabi, Pakistan

       Dr. Muhammad Adnan, Lecturer, Islamia University Peshawar

        Dr. Farman Ullah, Assistant Professor, COMSATS Attock Campus

Outline:  Energy insufficiency in wireless communication devices is mainly due to wireless interface, which spend most of its time in the process of idle listening. Before any transmission, to decide whether the channel is idle or busy, idle listening is necessary to perform channel sensing. In contention-based channel access protocol, idle listening is unavoidable and is the primary source of energy consumption in WLAN. In terms of energy saving in WSNs, asynchronous MAC protocols would be the prominent protocols since they allow nodes to sleep most of the time. When it tends to have data occasionally, it is likely to spend some energy since the sender needs to continuously deliver preambles until its receiver finally wakes up. To shorten the duration of preambles, several approaches have been taken ...

Special session 9: Intelligent Systems and Robotics

Organizer:  Mr. Pir Amad Ali Shah, Mr. Syed Tanweer Shah Bukhari, University of South Asia, Lahore, Pakistan

Chairs:  Dr. Wajahat Mahmood Qazi, COMSATS Intitute of Information Technology, Pakistan 

        Dr. Yasar Ayaz, National University of Sciences & Technology, Islamabad, Pakistan

Outline:  Information explosion, exponential growth in technology and progression toward technological singularity has triggered the evolution of human society to a new era of man-machine society. An era where humans and machines work as co-partners; therefore, this combined intellect of men and machines will provide new means for discovery, problem solving and creativity. This will have impact on socio-economic structure and will transform businesses, industries to self-governing organizations. Large number of jobs will be taken by machines and new kind of jobs will be created, which will require new kind of innovation and skills. The key players of this man-machine society are the intelligent systems and cognitive robots, possessing certain level intellect, socio-cognitive abilities and self-awareness. These systems can be softbots or ...

Special Session 10: Fog Computing: Applications, Challenges, and Opportunities

Organizer:  Mr. Ihsan Ali, Researcher, University of Malaya, Malaysia

Chairs:  Dr. Saif Ul Islam, Assistant Professor, COMSATS Institute of Information Technology, Islamabad, Pakistan

        Dr. Ghufran Ahmad, Assistant Professor, COMSATS Institute of Information Technology, Islamabad, Pakistan

Outline:  With the explosive increase in end user devices, the availability of computing, storage and networking resources is becoming more scared. To provide qualitative services to users, there is a need to enhance the existing infrastructure of service provisioning. Cloud computing has been playing an important role to provide effective services by opening the access of resources from company oriented networks to individual user level. However, due to the existing and future demands of extensive and high quality-oriented services, many challenges are need to be addressed. Cloud computing solutions are becoming less effective with the existence of emerging technologies like Internet of Things (IoT) and Internet of Everything (IoE). These technologies are delay sensitive that requires the resources to be deployed in the proximity of end users. ...


Special Session 11: Applications, Architecture, and Security for Low-power Networks

Organizer:  Dr. Muazzam Ali Khan Khattak, SEECS, National University of Sciences and Technology, Islamabad, Pakistan 

Chairs:  Dr. Muazzam Ali Khan Khattak, SEECS, National University of Sciences and Technology, Islamabad, Pakistan
                 Dr. Jawad Ahmad, School of Engineering & Build Environment, Glasgow Caledonian University Glasgow, UK
                 Dr. NazarA Saqib, CEME, National University of Sciences and Technology, Islamabad, Pakistan
                 Dr. Muhammad Usman Akram, CEME, National University of Sciences and Technology, Islamabad, Pakistan
                 Engr. Jan Sher Khan, Department of Electrical and Electronics, University of Gaziantep, 27310 Gaziantep, Turkey. 
Outline:  Better medical and healthcare facilities/arrangements are the demand of today’s worlds. Currently the research community is taking alot of interest in biomedical engineering and wireless body area networking (WBAN) as the demand for autonomous health care system is increasing day by day, as well as by recent development and advances in low power sensor devices, micro and nano electronics with well equipped wireless antennas. The day is not far away when patients and medical staff including doctors and others will seamlessly monitor all the activities with their finger tips in seconds. In such environment WBAN perform the key contribution as compared to other  ...

Special Session 12: Modelling & Simulation of High Performance Scientific Computing

Organizer:  Dr. Omar Usman Khan, Assistant Professor,  FAST-National University Peshawar, Pakistan 

Chairs:       Dr. Atiq-ur Rehman, Northern Border University, Kingdom of Saudi Arabia
                        Mr. Shoaib Muhammad Khan, FAST-National University Peshawar, Pakistan
                        Mr. Mubashir Qayyum, FAST-National University Peshawar, Pakistan
Outline: Modelling and Simulation, or M & S as it is commonly referred, is becoming one of the academic programs of choice for students in all disciplines. M & S is a disciplines with its own body of knowledge, theory, and research methodology. At the core of the discipline, the fundamental notion that models are approximation for the real world. To engage, M & S, students must first create a model approximating an event. The model is then followed by simulation, which allows for the repeated observation of the model. After one or many simulations of the model, a third step takes place and that is analysis. Analysis aids in the ability to draw conclusions, verify and validate research, and made recommendations based on various iterations or simulations of the model. These basic precepts coupled with visualization, the...

Special Session 13: Future Networks: Communication Technologies, Applications, and Challenges

Organizer:  Dr. Bilal Jan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Chairs:  Dr. Murad Khan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

        Dr. Muhammad Imran, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Outline: Fifth Generation (5G) is a promising technology used for future development in the telecommunication infrastructure. In the last couple of years, the rapid growth in the number and complexity of wireless communication systems and services have caused a remarkable increase in the demand of higher bandwidth. By 2020, it is estimated that 50 billion devices will be connected to the internet. Since, the increase in objects connecting to internet require better and efficient usage of the spectrum. The future networking has solved this challenge up to certain extent but still many things needs to be addressed before applying these technologies for next generation of networks. The rapid increase in the number of wireless networks give birth to a new era of interconnectivity called Heterogeneous Wireless Networks (HetWNet). Thus, distributing the spectrum among heterogeneous...

Special Session 14: Information Centric Vehicular Communication: Named Data Networks, Software Defined Network based ICN, and Internet of Vehicles

Organizer:  Dr. Muhammad Imran, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Chairs:  Dr. Murad Khan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

        Dr. Bilal Jan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Outline: The increase in data rate in communication technologies efficiently solve many challenges in different areas of transportation system. However, improved planning, designing, developing new intelligent protocols for vehicular networks need attention from both academia and industry. Therefore, various firms and technological companies and organization develop advanced and optimized technologies to help in facilitating the users in driving, travelling time information, road management, road guidance, etc.  Recently, a lot of research efforts have been made from both academia and industry side to promote various new and emerging network paradigms. The reason is straight that during the past decade, it has ...

Special Session 15: Optical Multicarrier Generation and its Applications

Organizer:  Dr. Rahat Ullah, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                        Mr. Muhammad Arshad, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                       Engr. Mudassir Aman, Lecturer, Sarhad University of Science & IT Peshawar, Pakistan

Chairs:  Engr. Dr. Muhammad Asif, Assistant Professor, Department of Electronics, University of Peshawar, Pakistan

        Dr. Rahat Ullah, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Outline: The ongoing exponential growth and ever-increasing demand for broadband and triple play applications calls for optical frequency comb generation or optical multicarriers. Optical frequency locked and coherent multicarriers were studied in the past decade for their numerous applications such as reconfigurable optical pulse generator, wavelength division multiplexing, and optical signal processing. Optical frequency comb is deployed in numerous super channel systems due to its supportive property in optical transmissions supporting high data rates in long-distance systems, next generation optical access networks. OMC is to generate many carriers from single light source by deploying different architectures. On the other hand, due to...

Special Session 16: Computer Vision, Image Understanding and Applications

Organizer:  Dr. Javed Iqbal, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                        Dr. Ihtesham ul Islam, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Chairs:  Dr. Ihtesham ul Islam, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan
                 Dr. Javed Iqbal, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan
Outline: Computer vision is an area of computer science and engineering which enables machines to see. For the purpose, it includes theory and methods to automatically acquire, analyze and understand useful information from images, sequence of images or from multi-dimensional data generated from scanner or sensors. Computer vision tasks include image and video processing, analysis, coding, retrieval and indexing.  A computer vision system can consists in many functions unique to the application, from areas of signal processing, pattern recognition and machine learning . These functions include image acquisition and preprocessing, feature extraction, dimensionality reduction and Feature selection, classification and clustering, ensemble methods etc. By and large, there is ...

Special Session 17: Security and Privacy Enhancing Technologies in Intelligent Transportation System (ITS) and Internet of Vehicles (IoV)

Organizer:  Dr. Naveed Ahmad, Assistant Professor, University of Peshawar, Pakistan

Chairs:  Dr. Huma Javed, Assistant Professor, University of Peshawar, Pakistan
                 Dr. Aurangzeb Khan, Associate Professor, Bannu University of Science & Technology, Pakistan
Outline: The provision of vehicles with extended connectivity has introduced a wide range of new opportunities for services. The evolution in the automotive industry has brought a great deal of transformation. A broad range of technical features are provided by the intelligent vehicles today. The new generation of vehicles and vehicular networks is an emerging approach to make systems and software interconnected with people. Intelligent Transport System (ITS) and Internet of Vehicles (IoV) are the applied branches of VANETs and IoT respectively. The connected ...

Special Session 18: Big Data, Data WareHousing, Data Mining, Replication, and NoSql

Organizer:  Miss. Nazia Azim, Abdul Wali Khan University Mardan, Pakistan

Chairs:  Dr. Azhar Rauf, Assistant Professor, University ofPeshawar, Pakistan

                 Mr. Yasser H. Qureshi, Director (MIS), Planning Commission, P&D Department,Peshawar, Pakistan
                 Mr. Abdul Majid, Assistant Director, Ministry of Interior, National Database and Registration Authority, Pakistan
Outline: It would be hard to deny the seismic shift that has occurred in the database landscape. Hadoop, Spark, MongoDB, Cassandra, and many other non-relational systems today form an important and growing part of the enterprise data architecture of many. The relational model and SQL gave birth to other models. The main ones that come to mind are Object databases, Object-Relational, Spatial Database, OLAP databases and very recently XML databases. Healthcare organizations such as pharmaceutical companies, hospitals and other organizations have been aggregating data from decades and digitizing them into medical databases. Based on these data repository, the major research avenues that can be considered are: ...

Special Session 19: Technology Challenges for Communications in 5G

Organizer:  Dr. Javed Iqbal, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                        Dr. Adnan Daud Khan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

Chairs:  Dr. Affaq Qamar, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan
                 Dr. Ihtesham ul Islam, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan
Outline: In recent years, mobile networks have experienced impressive growth in data traffic and the current generation of the mobile technology continues to transform communication and information access to the population. The 5G related to the fifth generation of wireless systems is the next step in continuous innovation and evolution of the mobile industry, gaining support capacity of wireless networks 1000 times in terms of capacity, connections For billions of devices and individual users multi-GB / s experience capable of extremely low end-to-end delay and time-response times. The distribution of these networks will materialize in the next decade. The 5G technology will provide low-energy equipment and a large number of devices, including a number of densely populated users, the main role of providing a faster air interface. To achieve these goals, 5G should consist of new radio access technologies and provide current wireless technologies such as LTE, HSPA, etc. The above is achieved by updating the network with the new radio access technologies (RAT) with the evolution of existing wireless ...

Special Session 20: Next Generation Photovoltaic Devices for Vehicular Technology

Organizer:  Dr. Adnan Daud Khan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                       Dr. Javed Iqbal, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan                       

Chairs:  Dr. Adnan Daud Khan, Assistant Professor, Sarhad University of Science & IT Peshawar, Pakistan

                 Dr. Muhammad Nouman, Center for Advanced Studies in Energy, UET Peshawar, Pakistan

Outline: Over the past few years, it has become increasingly obvious that the current technique of producing energy has no future. So, unboundedness of resources is remarkably reflected in the growing prices of gas and oil. Moreover, we are observing the primarily effects of burning fossil fuels. The increase of the ocean levels, the rise in weather extremes, and the melting of the glaciers as well as the nuclear catastrophe in Fukushima, all show that nuclear energy is not the right path to follow in future.
Luckily, there is a possible solution with which a sustainable energy supply can be guaranteed i.e., renewable energy resources. These use immeasurable sources as a basis for energy supplies and can confirm a full supply with appropriate amalgamation of different technologies such as ...

Special Session 21: Service Oriented Computing: Challenges and trends

Organizer:  Dr. Saleh M. Altowaijri, Dean, Faculty of Computing and Information Technology, Northern Border University, KSA.                

Chairs:  Dr. Atiq-ur Rehman, , Assistant Professor & HOD, Northern Border University, KSA

              Dr. Adnan Rashid Chaudhry, Assistant Professor, Northern Border University, KSA

            Dr. Yamen El Touati, Assistant Professor, Northern Border University, KSA

             Dr. Shaidah Jusoh, Associate Professor, Northern Border University, KSA
             Dr. Razia Haider, Assistant Professor, Northern Border University, KSA
Outline: The computing has emerged with a ubiquitous prevalence and it has a directly affected the ancient notion of individual machine based computing. This emergence has given contribution to cloud computing and Service Oriented Architectures (SOA). The SOA and Cloud Computing can exist separately as well as coexist; however, they are complementary and can be very helpful to each other. The future of IT industry is under influence of fast adaptation of SOA, and this gives rise to many challenges and produces exciting new trends. ...

Special Session 22: Mobile Cloud Computing Technologies and Solutions

Organizer:  Professor. Abdullah GANI Dean, Faculty of Computer Science and Info Technology University of Malaya.    

Chairs:  Associate Professor Dr. Rafidah Md. Noor Deputy Director Centre of Mobile Cloud Computing Research (C4MCCR) University of Malaya, Kuala Lumpur, MALAYSIA

              Dr. Muhammad Shiraz, Assistant Professor, Department of Computer Science, Federal Urdu University of Arts, Science and Technology Islamabad, Pakistan

Outline: Mobile cloud computing (MCC) is one of the technology essential in today’s mobile environment run by using mobile devices in cloud environment. It combines the features of both mobile computing and cloud computing that use the optimal services for the mobile users. The combination of mobile cloud computing, wireless communication infrastructure, portable computing, location-based services, mobile web and many more has laid the foundation for a novel mobile cloud computing model which allowing mobile users for unlimited computing power and storage space.  ...