EI-CPSIOT 2019 2019 : 2019 2nd International Conference on Cyber Physical Systems and IoT(CPSIOT 2019)
Call For Papers
★2019 2nd International Conference on Cyber Physical Systems and IoT(CPSIOT 2019)-- Ei Compendex & Scopus—Call for papers
｜September 25-27,2019｜Amsterdam, Netherlands｜http://www.cpsiot.org/
★CPSIOT 2019 presents researchers, engineers, and academics with an unprecedented opportunity to associate and interact with some of the foremost experts in the field of Cyber Physical Systems and IoT from around the globe. CPSIOT2019 aims to be the must-visit conference of the year for the field, and will be the ideal forum for the exchange of ideas and innovations that promise to change the face of the industry. For researchers, an engineers, or industry professionals, this conference could mark an important point in your career.
★Publication and Indexing
All accepted papers will be published in the digital conference proceedings- International Conference Proceedings Series by ACM which will send to be indexed by all major citation databases such as Ei Compendex, Scopus, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc.
A selection of papers will be recommended to be published in journals.
★Program Preview/ Program at a glance
September 25: Conference registration + Tutorial(pending) + Icebreaker reception
September 26: Invited Speech + Technical Sessions + Closing Ceremony
September 27: One day Tour/ Halfday tour/Field trip
1. PDF version submit via CMT:https://cmt3.research.microsoft.com/CPSIOT2019
2.Submit Via email directly to: firstname.lastname@example.org
Ms. Tiya T. Deng
Call for papers (http://www.cpsiot.org/cfp.html):
Big data model
•Human computer interactions
•Human in the loop systems
•Real time systems
•Ubiquitous and pervasive computing
Ubiquitous and pervasive computing for enhanced user interactions with CPS
Control of CPS
Mobile computing and devices for CPS
Cloud computing and distributed systems to support scalability and manage complexity of CPS
Analysis, verification, and synthesis of hybrid systems
Big Data system and data analytics for CPS
Simulation of CPS applications
Security and privacy of CPS
Networking systems for CPS applications (e.g., vehicular networking or industrial networking)
Experimental prototypes of CPS
Use case and user study of CPS
Cyber-physical multimedia systems and applications
Wearable cyber-physical systems and applications
Emerging applications in CPS, including social space, crowdsourcing, art, healthcare, and human computer interactions
•Interoperability of IoT Systems: Service discovery and composition, synchronization in distributed systems, overcoming siloization of IoT systems, semantic data description frameworks.
•IoT Interactions: Novel methods and techniques for seamless human-to-object and object-to-object interactions, including Augmented Reality and Virtual Reality interactions.
•Web Technologies for the IoT: Web-based discovery, search, and service composition to facilitate interactions between devices on the IoT and with users.
•Physical World Event Processing and Understanding: Novel data collection, deep learning, reality mining, and prediction methods based on physical world observations. This might include real-time decision making, event processing, and extracting information from large datasets.
•Real World Applications of IoT technology: Evaluation of challenges of real world deployments of Industry 4.0, Industrial Internet, and GS1 implementations, including planned deployments (e.g., in advanced Manufacturing and Logistics).
•Internet of Things Architecture: Novel information architecture design on field, edge, and cloud devices; object access and networking technology; investigation of technologies that support the mobility of functions and executions across system entities.
•Integration of Physical and Virtual Artifacts and Events: Advanced object identification, classification, and localization
•Social Acceptance of IoT Systems: Data security, authentication and authorization. Privacy protection, data sharing technologies (incl. blockchain technology), tampering protection and detection in IoT systems.