posted by user: yaseramd1 || 12742 views || tracked by 27 users: [display]

ICICS 2015 : The 6th IEEE International Conference on Information and Communication Systems

FacebookTwitterLinkedInGoogle

Link: http://www.icics.info/icics2015/
 
When Apr 7, 2015 - Apr 9, 2015
Where Amman, Jordan
Submission Deadline Nov 1, 2014
Notification Due Jan 1, 2015
Final Version Due Feb 15, 2015
Categories    software engineering   networks   security   databases
 

Call For Papers

ICICS 2015 Call for Papers
The 6th International Conference on Information and Communication Systems

April 7-9, 2015 ─ Amman, Jordan

URL: http://www.icics.info/icics2015/

The International Conference on Information and Communication Systems (ICICS 2015) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments, and applications in all areas of Computer and Information Sciences. The topics that will be covered in the ICICS 2015 include, but are not limited to: Artificial Intelligence, Mobile Computing, Networking, Information Security and Cryptography, Intrusion Detection and Computer Forensics, Web Content Mining, Bioinformatics and IT Applications, Database Technology, Systems Integration, Information Systems Analysis and Specification, Communications, and Human-Computer Interaction.
Researchers are encouraged to submit original research contributions in all major areas, which include, but not limited to:

- Databases and Information Systems Integration
- Artificial Intelligence
- Machine Learning
- Bioinformatics
- Data Mining
- Robotics and Autonomous Systems
- Knowledge Management
- Natural Language Processing
- E-Business
- E-Learning
- Gaming
- Health Information Systems
- Applications of Fuzzy Logic
- Applications of Neural Network
- Data Warehouses
- Human Computer Interaction
- Mobile Applications
- Embedded Systems
- Software Engineering
- Software Measurement
- Algorithms and Applications
- Computer Architecture
- Computer Graphics
- VLSI and its applications
- Computer Networks
- Wireless and Mobile Computing
- Computer Simulation
- Information Security
- Information Systems
- Semantic Web Technologies
- Multimedia and Image Processing
- Parallel and Distributed Systems
- Cloud Computing
- Reliability and Fault-Tolerance
- Internet and Collaborative Computing
- Nano Technology

Prospective authors are invited to submit full papers following the guideline posted on the conference website http://www.icics.info/icics2015. Submitted papers will be peer-reviewed (check review process in the conference website), and prospective authors are expected to present their papers at the conference (IEEE no show policy will be applied). The papers that are accepted and presented at the conference will appear in CD proceedings. All accepted papers will be submitted for publication to IEEE Xplore. Best paper will be selected by peer reviews and will be announced during the social event at the conference. Submission web page is https://easychair.org/conferences/?conf=icics2015.

Extended version of the selected papers will be published in renowned Journals.

Important Dates

Full paper submission: Dec. 1st, 2014
Notification of Decision: Feb. 1st, 2015
Camera-Ready and Registration: Feb. 15th, 2015



Related Resources

IEEE ICCR 2024   IEEE--2024 6th International Conference on Control and Robotics (ICCR 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
SOICT 2024   The 13th International Symposium on Information and Communication Technology
CSW 2024   2024 3rd International Conference on Cyber Security
Sensors journal 2024   Special Issue on Energy-Efficient Communication Networks and Systems: 2nd Eition
JoL 2024   International Journal of Law
OCOIP 2024   The 2nd International Conference on Optical Communication and Optical Information Processing
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
ICCIS 2024   6th International Conference on Communication and Intelligent Systems
ICICS 2024   ICICS 2024: 26th International Conference on Information and Communications Security