Introduction

The rapid advances in technology brings in newer challenges like never, before. The challenges get further compounded when world faces unprecedented happenings such as COVID-19, Pandemic, and incremental Cyber Security threats in an otherwise presumably secure environment. The interdependency of different domain provides greater areas for consideration while deducing postulates. AI, IoT, ML brings in exciting approaches to attack the complex problems being encountered. The speed with which operations are getting transformed is phenomenal. Automation, which is largely dependent on computation, is playing a bigger role in these transformations. The productivity quotient has gone up with zero rejects. Mathematical modelling has come to stay as integral component to test the computational designs, for their veracity and usefulness. Computational models are often coupled with high performance computing to solve complex physical problems arising in Engineering analysis and design.

Call for paper

IC3SE is inviting original, previously unpublished, and high-quality research papers addressing research challenges and advances in the topics mentioned below. IC3SE takes plagiarism very seriously and regard plagiarism as a professional misconduct. Papers will be screened for plagiarism and when identified the paper will be rejected. In addition, all authors of the paper will be denied to the conference and other papers by these author(s) will also be rejected. When paper accepted, IC3SE don't encourage withdrawals after the paper is being accepted, meaning it should not be submitted with the intention to get the reviews by the TPC.

Papers for presentations should conform to the IEEE format and specifications. All submissions must be in English only. Authors are invited to submit full paper (Maximum 6 pages, double- column US letter size) as PDF using the IEEE templates. The IEEE paper template can be downloaded from the link given below: https://www.ieee.org/content/dam/ieee-org/ieee/web/org/conferences/conference-template-a4.docx

CONFERENCE THEMES

Intelligent Computing

  • Artificial Intelligence
  • Bio Inspired Computing
  • Bioinformatics
  • Computer Animation
  • Computer Graphics
  • Computer Vision
  • Expert Systems
  • Gaming and Animation
  • Genetic Algorithms
  • Image Processing
  • Information Retrieval and Fusion
  • Intelligent Control Systems
  • Intelligent Systems
  • Machine Learning
  • Multimedia
  • Natural Language Processing
  • Pattern Recognition
  • Robotics
  • Soft Computing
  • System Simulation
  • Virtual Reality

Systems Software

  • Compiler Design
  • Computer System and Modeling
  • Operating System
  • Parallel and Distributed Computing
  • Programming Languages
  • System Software
  • VLSI and Embedded Systems

Data Communication and Networking

  • Agents
  • Cloud Computing
  • Computer Networks
  • Cryptography
  • Data Communications
  • Grid Computing
  • Information and Network Security
  • Mobile Computing
  • Network Management
  • Services Oriented Architecture
  • Storage Area Networks
  • Wireless Communication

Management Information System

  • Business Intelligence
  • Computer & Information Science in Sports
  • Computer in Education and Training
  • Customer Relationship Management
  • E-business Modeling
  • E-commerce
  • Economic Systems
  • Enterprise Resource Planning
  • Financial Systems
  • Human Resource Management Systems
  • Information Systems
  • Just in Manufacturing
  • Knowledge-Based Web Systems
  • Management Information System
  • Medical Informatics
  • Supply Chain Management

Blockchain

  • Theories of blockchain and distributed ledger technology
  • Distributed consensus and fault tolerance mechanisms
  • Security, privacy and trust of blockchain and distributed ledger technology
  • Decentralization, scalability, and security tradeoff
  • Performance analysis and optimization
  • Simulation and performance evaluation techniques
  • Smart contract and chain code
  • Applications and services with blockchain and distributed ledger technology
  • Protocols and algorithms based on blockchain
  • Blockchain in the Internet of things (IoT)
  • Blockchain in cyber physical systems
  • Blockchain in social networking
  • Blockchain in supply chain management
  • Blockchain in agriculture
  • Blockchain in connected and autonomous vehicles
  • Blockchain in crowdsourcing and crowdsensing
  • Blockchain in mobile cellular networks
  • Blockchain in edge and cloud computing

Database System

  • Big Data
  • Data Engineering
  • Data Mining
  • Data Warehousing
  • Database Management Systems
  • Knowledge Discovery
  • Web Mining

Software Engineering

  • Agent Oriented Software Engineering
  • Agile Software Engineering
  • Component-Based Software Engineering
  • Computer Aided Software Engineering
  • Dependable Systems Design
  • Software Architectures
  • Software Dependability Evaluation
  • Software Design Patterns
  • Software Development Tools
  • Software Economic
  • Software Metrics
  • Software Project Management
  • Software Quality Assurance
  • Software Reliability
  • Software Reuse
  • Software Reverse Engineering
  • Software Testing
  • Software Testing Tools
  • Software Verification and Validation Techniques
  • UML, OO Modeling

Internet of Things

  • Next Generation Infrastructure for IOT
  • Cloud Computing (IAAS, PAAS, SAAS) for IOT
  • Big Data for IOT
  • Open Platforms for IOT
  • Wearable Devices for IOT
  • Artificial Intelligence for IOT
  • IOT-based Smart City Solutions
  • IOT-based Smart Home
  • IOT-based Smart Education Systems
  • IOT-based Robots
  • Security, Privacy, and Trust in IOT
  • IOT Standards and Application Scenarios
  • IOT-based Enterprise Management
  • IOT-based Business Process Management
  • IOT-based Auto Driving
  • IOT-based Intelligent Manufacturing

Security

  • Biometrics
  • Computer Security
  • Cryptography
  • Data Encryption
  • Digital Signature
  • Digital Watermarking
  • Forensics
  • Fraud Control
  • Information Security
  • Intellectual Property Protection
  • Network Security
  • Optical Disc Copy Protection
  • Phonography Control
  • Rights Management Languages
  • Software Cracking
  • System Security
  • Trusted Computing
Submit Comment
Verify Code Change Another
All Comments
Important Date
  • Conference Date

    May 09

    2024

    to

    May 11

    2024

  • May 11 2024

    Registration deadline

Sponsored By
Amity School of Engineering
Uttar Pradesh Section