Submission Topics
The authors are requested to submit full papers describing original, previously unpublished, complete research, not currently under review by another conference or journal, addressing state- of- the-art research and Emerging Trends in Networks and Computer Communications in the following areas but not limited to:
Multimedia Networking System:
Technologies, protocols, and mechanisms for multimedia communications, Wireless mobile multimedia communications, Ad hoc multimedia networks, IP- based Multimedia Subsystems (IMS), QoS, Security for multimedia communications, Management, QoS, and security aspects in streaming over wireless ad hoc networks, Peer-to- Peer (P2P) traffic for IPTV services, Management and control of multimedia systems.
Mobile and Ad hoc Networks:
Architecture and routing protocols, Architectures, frameworks, Energy efficient design, cross-layer design, scalability, MAC protocols for ad-hoc and sensor networks (801.11, Bluetooth, Zigbee etc.), QoS, access control and security in mobile and ad hoc networks, Applications over ad hoc networks.
Wireless networks :
IMS, 3G/4G/5G integration, Wireless protocols, architectural and design concepts, Design and implementation of mobile information systems, Wireless technologies, communications, mechanisms, applications & services, wireless-wireline network.
Sensor Networks:
Architectures, management, performance, power and protocols for wired and wireless sensor networks, Ad hoc and wireless sensor networks, Security and reliability aspects in sensor networks and QoS in sensor networks.
Vehicular Networks:
Communication technologies in vehicular networks, frameworks and architectures for vehicular networks, Interoperability with Internet and other networks, vehicle- infrastructure communications, vehicle-to-vehicle communications.
Pervasive Education Systems:
Learning and teaching systems, E-learning methods and e-learning scenarios, tools and architectures for mobile/ubiquitous e-learning, distance learning
Security Systems :
Security analysis methodologies, middleware and distributed systems security. cryptography, certificates, information hiding, access control protection, risk, vulnerabilities, attacks, access control, wireless access control, broadband access control. Biometrics, smart cards, identification and trust methodologies. Certification, accreditation anonymity, and audit. Security management, emergency contingency planning, identify theft, life safety, wireless and mobile security. electronic surveillance and e-commerce protocols, security and trust in web- services-based applications. Peer-to-peer security, DoS. Criminal exploitation of technology. Viruses, hackers, worms, spam, and other malicious code.
Network-on-chip (NoC):
Scalable communication structures, On-chip communication, System-on- a-Chip (SoC), communication subsystem and power efficiency of complex SoCs.
E-Agriculture:
e-services for Agriculture, ICT development for personal access of farmers in rural area, On-line trading of agricultural products, Supporting agricultural education/training through ICT, Raising awareness on environmental issues through the use of web technologies, Monitoring and decision support systems for environmental protection, Improving quality of life in rural areas through ICT, Robotics and automation systems in agriculture and environmental protection, Web and mobile services for environmental/agricultural issues, Enhancing chain management and traceability in the agriculture chain through novel technologies.
Mining Networking Technologies:
Real Time Tracking, Sensing Systems, Safety and Security in Mines, Mine Video Surveillance, wireless video surveillance systems, mine monitoring, wireless monitoring mining, coal wireless video surveillance, and remote monitoring system mines.
Virtual and Augmented Reality:
Virtual (VR), augmented (AR) and mixed (MR) reality environments development and use, Immersive gaming and edutainment. 3D objects recognition and VR systems hardware and software, Computer graphics and objects techniques, Multi-user and distributed VR systems, Human-computer Interaction, Advance applications.
Modeling and Simulation Methodologies:
Intelligent Control,Agent-Based Modeling, Parallel and Distributed Modeling and Simulation,Web-Based Simulation, Natural System,Modeling and Simulation Environments, Watermarking, Semantic.
Internet of Things (IoT):
Techniques to enable IoT, such as IPv6, RFID, Electronic Product Code, event-driven software architecture and semantic web. Framework to apply IoT to: Environmental Sensing and Monitoring, Industrial Asset Management, Optimise Energy Consumption, Transportation Systems, Traffic Management Systems, Smart Cities, Waste Management, Supply Chain Control, Smart Product Management, Smart Agriculture, Smart Animal Farming, and eHealth.
Submit Comment