posted by user: Busra || 10952 views || tracked by 9 users: [display]

WiMoA 2018 : Call for Participation - 10th International Conference on Wireless, Mobile Network & Applications

FacebookTwitterLinkedInGoogle

 
When Dec 22, 2018 - Dec 23, 2018
Where Sydney, Australia
Submission Deadline Nov 24, 2018
Notification Due Dec 11, 2018
Final Version Due Dec 15, 2018
Categories    networking   engineering   image processing   technology
 

Call For Papers

Call for Participation - 10th International Conference on Wireless, Mobile Network & Applications (WiMoA 2018)

December 22-23, 2018,Sydney, Australia

Call for Participation

We invite you to join us in Sydney, Australia on December 22-23, 2018, for 10th International Conference on Wireless, Mobile Network & Applications (WiMoA 2018)

The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc and sensor networks.

Highlights of WiMoA 2018 include:

  • Invited talk from eminent Professors
  • Submission of 150 papers from North America to Australia and selection of only Quality papers
  • 8thInternational Conference on Computer Science, Engineering and Applications (ICCSEA-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Ubiquitous Computing (UBIC-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference of Networks and Communications (NECO-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Soft Computing, Artificial Intelligence and Applications (SCAI-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Signal, Image Processing and Pattern Recognition (SPPR-2018) December 22-23, 2018, Sydney, Australia
  • 10thInternational Conference on Grid Computing (GridCom-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Internet Engineering & Web Services (InWeS-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Communications Security & Information Assurance (CSIA-2018) December 22-23, 2018, Sydney, Australia

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

350 USD (With proceedings)

For registration and details mail:wimoa_conf2018@yahoo.com (or) wimoa_conf2018@iccsea2018.org

Accepted Papers


  • TOMOGRAPHIC SAR INVERSIONFOR URBAN RECONSTRUCTION
  • Karima Hadj-Rabah, Faiza Hocine, AssiaKourgli and AichoucheBelhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria

  • A PSEUDO-SPLICINGALGORITHM FORPARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
  • Zheng Zhu, Aiping Li*, Rong Jiang, Yulu Qi, Dongyang Zhao, Yan Jia, National University of Defense Technology, China

  • VIEW-PODS: NAVIGATION AND READING ASSISTING WEARABLE FOR VISUALLY IMPAIRED
  • M.L.M. Fernando, W.S.M. Fernando, I.H. Dolawatta, N.T.C. Athukorala, Dr. Pradeepa Samarasinghe, Sri Lanka Institute of Information Technology New Kandy Road,Sri Lanka

  • Paradigm Based Morphological Analyser For The Gujarati Language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Development of Handcrafted Rule-Based Approach to Improve POS tagger for Indo-Aryan language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Possibilities of Python based emotion recognition
  • Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia.

  • A Post-Processing Method Based On Fully Connected CRFS for Chronic Wound Images Segmentation and Identification
  • Junnan Zhang and Hanyi Nie, NUDT, China.

  • Integrating EMOJI’S In Determining User Sentiment on Twitter
  • Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia

  • MRI And CT Image Fusion Based Structure-Preserving Filter
  • Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan

  • Bag of Embedding Words for sentiment analysis of Tweets
  • Gálvez Arias, Pierina Xiomara Guzmán Ramos, Pedro Jesús Chipana Vila, Luis Antonio , Trigoso Valeriano and Carlos Alberto, ESAN University, Peru

  • A Genetics Clustering-Based Approach For Weblog Data Cleaning
  • Amine Ganibardi and Chérif Arab Ali, University of Vincennes in Saint-Denis, France

  • A Recommendation System for Educational Data Mining Techniques
  • Mosima Anna Masethe and Sunday Ojo, Tshwane University of Technology, South Africa

  • Dexplore: A Framework For Constructing Effective Mobile Benchmark Suites
  • Zachary Yannes and Gary Tyson, Florida State University, USA

    Virtual AIS generation management system for waterway risk assessment

    JunSik Kim1 and SeungWook Hong2 and Suhyun Park3, 1Dongseo University,Korea, 2Sasang-gu,Korea and 3Dongseo University,Korea.

  • Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
  • Byeongok Choi and Chae Y. Lee, KAIST, Korea.

  • New Version Of The Application Saite Store 2.0 - Experience Report On The Development Of A Brazilian Open Virtual Library
  • Ana Emilia Figueiredo de Oliveira, Katherine Marjorie Mendonça de Assis, Camila Santos de Castro e Lima, Carla Galvão Spinillo, Elza Bernardes Monier, Maria de Fatima Oliveira Gatinho, and Marcelo Henrique Monier Alves Junior, Federal University of Maranhão, Brazil.

  • An Incentive Mechanism For Computation Offloading In Mobile Edge Computing Using Block chain Technology
  • Ramtin Ranji, Ali Mohammed Mansoor and Sakhr Ahmed Hatem, University of Malaya, Malaysia.

  • Secure Group Key Management Protocol for Grid Computing
  • Mohammad R. Hassan1, Nidal M. Turab2, Khalil H. Al-Shqeerat3 and Saleh El-Omar1,1,2Al-Ahliyya Amman University Jordan and 3 Qassim University, Saudi Arabia.

  • Scalable Dynamic Locality-Sensitive Hashing For Structured Dataset on Main Memory and GPGPU Memory
  • Toan Nguyen Mau and Yasushi Inoguchi, JAIST, Japan.

  • A novel SMP-based survivability precise evaluation metric and approach in wireless sensor network routing layer
  • Hongsong Chen 1,2and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science,China3Harbin Institute of Technology,China.

  • A Hilbert-Huang Transformation and statistic combination approach to detect LDoS attack in wireless sensor network
  • Hongsong Chen 1,2 and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science, China 3 Harbin Institute of Technology, China.

  • Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF)
  • Rudy Agus Gemilang Gultom and Tatan Kustana, Indonesia Defense University, Indonesia.

  • COMPARATIVE ANALYSIS OF THE MEASUREMENT PARAMETERS OF QOS ON A CISCO 2800 ROUTER WITH STATIC ROUTING BY APPLYING PACKET SCHEDULING ALGORITHMS
  • Malena Cecilia Castro Caro1, Luz Enith Márquez Cantillo2, José Duván Márquez Díaz3, 1Institución Universitaria ITSA, Colombia, 2Institución Universitaria ITSA, Colombia and 3Universidad del Norte, Colombia

  • DEEP LEARNING BASED LANE AND VEHICLE TRACKING FOR AUTONOMOUS CARS
  • Masum Celil Olgun, Kadir Metin Akpolat, Zakir Baytar, Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
  • Saide Işılay Baykal, Deniz Bulut, and Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION
  • Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel

  • DIVERSE RANKING APPROACH IN MCDM BASED ON TRAPEZOIDAL INTUITIONISTIC FUZZY NUMBERS
  • Norzanah Abd Rahman1 and Zamali Tarmudi2, 1University Teknologi MARA (Sabah Branch), Malaysia and 2University Teknologi MARA (Johor Branch), Malaysia

  • COMPUTER VISION, DEEP LEARNING, SVM, RANDOM FOREST TO DETECT DISEASES IN BLUEBERRY LEAVES
  • Cecilia Sullca, Carlos Molina, Carlos Rodríguez and Thais Fernández, Universidad ESAN, Perú

  • Rough approximation operators on matroids via circuits
  • Lingling Mao1, Zaibin Chang1 and Jingqian Wang,2 1 Xi’an Traffic Enginering University, China 2 and Shaanxi University of Science & Technology, China

  • Residential Load Profile Analysis using Clustering Stability
  • Fang-Yi Chang1, 2Chia-Wei Tsai, 3Shu-Wei Lin and 3 Po-Chun Kuo,1,3Institute For Information Industry, Taiwan and 2,3Southern Taiwan University of Science and Technology, Taiwan.

  • SOFT COMPUTING ALGORITHMS IN TRAVEL MODE SELECTION
  • Kostandina Veljanovska, University St. Kliment Ohridski, Republic of Macedonia

  • ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
  • Igor Mishkovski1, Sanja Šćepanović2, Miroslav Mirchev1 and Sasho Gramatikov1, 1University Ss. Cyril and Methodius,Macedonia and 2Aalto University, Finland

  • FROM OPEN RELATION EXTRACTION TO SEMANTIC WEB: A RULE-BASED STRATEGY
  • Julio Hernandez, Cinvestav, Mexico

  • INFORMATION GATHERING SYSTEMS FOR PENETRATION TESTING: SURVEY AND AN IMPLEMENTATION
  • Damla Dinler and Ozgur Koray Sahingoz, Kultur University,Turkey

  • CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
  • PHadjer Benkraouda, Ezedin Barka, and Khaled Shuaib,United Arab Emirates University,UAE

  • ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
  • Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak,Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland

  • Efficient and Secured Transactions of Data in Crucial Network using Blockchain Technology
  • Manoj Athreya A, Ashwin A Kumar, Nagarajath S M and Gururaj H L, Vidyavardhaka College of Engineering, India

    Related Resources

    International Conference on Health 2024   Fourteenth International Conference on Health, Wellness & Society- Health, Wellness, and Society Research Network and Malmö University, Malmö, Sweden
    CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
    Call for Chapters - CRC Press 2024   Internet of Things: Challenges and Advances
    COMIT 2024   8th International Conference on Computer Science and Information Technology
    MoMM 2024   The 22nd International Conference on Advances in Mobile Computing & Multimedia Intelligence
    ISCSIC 2024   2024 8th International Symposium on Computer Science and Intelligent Control(ISCSIC 2024)
    ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics
    CNCIT 2024   2024 3rd International Conference on Networks, Communications and Information Technology (CNCIT 2024)
    WiMob - CWN 2024   Eleventh International Workshop on Cooperative Wireless Networks (WiMob – CWN’24)
    PEMWN 2024   Performance Evaluation & Modeling in Wired and Wireless Networks