LEARN MORE ABOUT Workshop on Software Engineering and Knowledge Discovery 2017

Software Engineering and Knowledge Discovery are two developing areas in the Information technology. These two fields are interrelated and have important roles in business, education, health, government, and society. Even though, these fields are considered quite mature, research in these areas are yet evolving with the objective of providing better performance of offered services.

Software Engineering is concerned with developing and maintaining software systems that behave reliably and efficiently, and satisfy all the requirements that customers have defined for them. It is important because of the impact of large, expensive software systems and the role of software in safety-critical applications. It integrates significant mathematics, computer science and practices whose origins are in engineering.

Knowledge Discovery is an interdisciplinary area that focuses on methodologies for identifying novel, valid, useful and meaningful patterns from data. Knowledge Discovery also includes the evaluation of patterns and identification of which add to knowledge. 

Two tracks of submissions are solicited: Software Engineering:

  • Software Lifecycle 
  • Software Management 
  • Software Engineering Process 
  • Software Engineering Tools 
  • Software Analysis and Design Methods 
  • Software Quality Assurances 
  • Open Source Software 
  • Software Measurement 
  • Requirements Engineering 
  • Agile Methodology 
  • Extreme Programming 
  • Empirical Software Engineering 
  • Software Engineering Education 

Submission Guidelines

The link of Paper and poster submissions https://easychair.org/conferences/?conf=icsekd2017

Meet Our Speakers
team-1
Associate Prof. in Information Management and IS and a Director of PhD Programme at International Business School Suzhou
team-1
Professor & Funded Investigator (FI) in the Insight Centre for Data Analytics in Dublin City University
team-1
Director of ICT at The Arab League Educational, Cultural and Scientific Organization ALECSO
team-1
Professor at the Computer Science. Dept. Monastir University, Tunisia
 
Visitors
58411
SCHEDULE

  • 08 May
    Day 1
  • 09 May
    Day 2
10:30 - 11:15 Prof. Ray Walshe
Standardisation in Big Data: Innovation and Excellence
This talk will highlight some of the European and Global Initiatives which are driving ICT Standards and in particular the Big Data Reference Architecture (BDRA). Standard. A brief history of Big Data standards evolution will lead to an introduction to the main SDO's in Europe and their roles. The talk will include sample uses cases for the Big Data Reference architecture and how they are used to identify and define big data roles, activities, functional components and their relationships. A description of the types of functional components leveraged by the roles and how they interact to create an operational big data architecture will be presented and show how this Reference architecture can facilitate a shared understanding across multiple products, organisations, and disciplines about current architectures and future direction.
11:15 - 12:00 Dr. Victor Chang
IoT security– overview, recommendations and the IoT Security Framework

Internet of Things (IoT) plays significant role in our daily life, including smart city, mobile services, wireless senor networks, big data analytics and emerging services. Despite of promising future of IoT, security and privacy still pose threats its development due to several vulnerabilities and privacy issues exploited. In this keynote, the overview and recommendation on current security solutions, such as location privacy, attribute-based encryption, ad hoc network security, light-weight authentication, identify management and intrusion detection will be covered. While currently there is no a IoT framework that can integrate all different security solutions as an unified service, the developed IoT security framework has integrated major security services and solutions together, known as integrated multi-layered security, to ensure the robustness and validity of the reliable IoT Security Framework. Technologies and architecture behind the framework will be explained in details. Large scale penetration testing and ethical hacking have been performed to demonstrate that IoT Security Framework is live, resilient and beneficial, making important research and enterprise contributions

09:30 - 10:15 Prof. Mohamed JEMNI
Toward Empowering Mobile Applications Development in the Arab World

Recent stats from the International Telecommunication Union (ITU) unveiled that mobile broadband is the fastest-growing ICT service in history, and around 4 billion of the global mobile phone population have Internet access using their mobile devices. In light of these considerations, there is no doubt that mobile technologies are entirely changing our lives, including particularly the way we learn. Therefore, recognizing the potentials of mobile technologies and its status in the region, the Arab League Educational, Cultural, and Scientific Organization (ALECSO), has proposed a Pan-Arab wide mobile initiative, aiming to empower Mobile Applications development in the Arab word.  The project aims to provide developers with a necessary technological and institutional environment for the promotion of an emerging digital creative Arab Mobile industry, related to the fields of education, culture, science, and learning games. In this talk, we will present an overview of the AlecsoApps project and we will describe each of its component and related activities.

10:15 - 11:00 Prof.Dr. Brahim Hnich
Smart Big Data applications for road traffic security, social online shopping, and online education

In this talk, our objective is to present three diverse cases studies of smart Big Data applications: a smart online vehicle tracking system for security applications, a social online shopping system,  and an online educational platform. For each application, we outline its main features and highlight the main challenges. We then how how we can  model and implemented these applications as Big Data applications and show how one can use the data collected in order to automatically discover new knowledge that brings more value to the users of these applications.

GET YOUR TICKETS

HURRY UP!!

All submitted papers will be under peer review and accepted papers will be published in the conference proceeding. The abstracts will be indexed and available at major academic databases.

  • 00
    Days
  • 00
    Hours
  • 00
    Mins
  • 00
    Secs
Sponsors
  • IGI-Global
  • Ibn Zoher University
  • Monastir University
  • IEEE
  • IEEE Tunisia Section
  • IEEE SMCS Tunisia Chapter
  • JUST
  • Sentidohotels