IC3IoT 2018 | 15-17 February 2018

Call for Papers

The International conference has invited talks, pre-conference tutorials and technical paper presentations. Authors are invited to submit full length original research contributions and review articles not exceeding six pages as per the IEEE format shall be submitted. The manuscript should not have been published in any journals / magazines or conference proceedings and not under review in any one of the above. The topics (but not limited to) are as follows

Topics of interest include, but are not limited to, the following:

COMPUTING COMMUNICATIONS SECURITY INTERNET OF THINGS (IoT)
SPECIAL SESSIONS

COMPUTING

  • Artificial Intelligence and Machine Learning
  • Autonomic and Trusted Computing
  • Bio Inspired Computing
  • Biomedical Computing & Bioinformatics
  • Cloud, Cluster, Grid and P2P Computing
  • Computational Intelligence
  • Computer Animation
  • Computer Architecture and VLSI
  • Computer Graphics, Simulation and Modeling
  • Computer Vision
  • Context Awareness and Personalization
  • Cryptography and Applied Mathematics
  • Digital Rights Management
  • Digital System and Logic Design
  • Expert Systems
  • Gaming and Animation
  • Genetic Algorithms
  • Green Computing
  • Image Processing

COMMUNICATIONS

  • Agents
  • Cloud Computing & Communication
  • Cognitive Radio and Cognitive Networks
  • Communications Software
  • Computer Networks
  • Control Systems and Applications
  • Information Retrieval and Fusion
  • Intelligent Control Systems
  • Intelligent Systems
  • Mobile Computing
  • Multimedia
  • Natural Language Processing and Machine
  • Translation
  • Nature Inspired Computing
  • Parallel and Distributed Algorithms
  • Pattern Recognition and Analysis
  • Reconfigurable Computing
  • Robotics and Machine Vision
  • Security, Trust and Privacy
  • Signal and Image Processing
  • Soft Computing
  • System Simulation
  • Ubiquitous Computing
  • Virtual Reality
  • Cryptography
  • Data Communications
  • Future Internet and Next-Generation Networking
  • Architectures
  • Grid Computing
  • High Performance Networks and Protocols
  • Human Computer Interaction and Interface
  • Information and Network Security
  • Information Theory and Coding
  • Internet measurement, modeling, and visualization
  • MEMS Technologies for Communications
  • MIMO Communications in Computer Networks
  • Mobile Computing
  • Network Management
  • Network Simulation and Emulation
  • Optical Networks and Systems
  • QoS and Resource Management
  • RFID Networks and Protocols
  • Satellite and Space Communications
  • Sensor Networks and Embedded Systems
  • Agricultural Informatics and Communication
  • Community Information Systems
  • Computational Economics
  • Digital Photogrammetry, Remote Sensing, GIS and GPS
  • Disaster Management
  • e-governance, e-Commerce, e-business, e-Learning

SECURITY

  • Biometrics
  • Computer Security
  • Cryptography
  • Data Encryption
  • Digital Signature
  • Digital Watermarking
  • Forensics
  • Fraud Control
  • Information Security

INTERNET OF THINGS (IoT)

  • Applications and interaction for social networking
  • Business models and processes: Internet of Things
  • Case studies in areas of Healthcare, Agriculture,
  • Logistics and Transport
  • Large-Scale Recommendation Systems and Social
  • Media Systems
  • Large-scale Social Media and Recommendation
  • Systems
  • Link and Graph Mining
  • Machine learning based on Big Data
  • Representation Formats for Multimedia Big Data
  • Scalable Mining of Heterogeneous Social and Information Networks
  • Scientific Applications of Big Data
  • Security Applications of Big Data
  • Semantic-Based Data Mining and Data Pre-
  • Processing
  • SME-centric Big Data Analytics
  • Social Web Search and Mining
  • Streaming Data Processing
  • Text Analysis techniques
  • Visualization Analytics for Big Data
  • Visualization and communication of Big Data
  • Web Mining
  • Real-life Case Studies of Value Creation through Big Data Analytics
  • Optimizing Big Data with Search
  • Parallel and Distributed Algorithms for Frequent
  • Pattern Mining
  • Predictive analytics
  • Privacy in Big Data Mining
  • Privacy Preserving Big Data Analytics
  • Query Processing, Data Modeling, and Analysis
  • Software Metrics
  • Software Project Management
  • Software Quality Assurance
  • Software Reliability
  • Software Reuse
  • Software Reverse Engineering
  • Software Testing
  • Software Testing Tools
  • Software Verification and Validation Techniques
  • UML, OO Modeling
  • Communication systems and architectures for the Internet of Things
  • Context-awareness and Location-awareness
  • Future tech. bridging the physical and virtual worlds
  • Green Internet of Things
  • Impacts on the security, privacy and risks on the
  • Physical World
  • Internet of Services
  • IoT architectures, platforms and applications
  • IoT services
  • Location and discovery of things on the Internet
  • Machine to Machine Communication
  • Mobile Internet of Things
  • Mobile Services
  • Network Design and Architecture
  • Networking and Communication Protocols
  • Performance Evaluation and Modeling
  • Robustness of environmental mgnt. with the IoT
  • Security, Privacy and Trust
  • Semantic Web of Things
  • Sensor Webs
  • Smart Environment
  • Smart Objects
  • Smarter Sensors
  • Software Architecture and Middleware
  • The Connected Home
  • The Smart City
  • Wearable Technology
  • Web of Things

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email.The authors of the accepted papers will be allowed to make corrections in accordance with the suggestions of the reviewers and submit final camera-ready papers within the stipulated deadline.

 
Go to top of page