posted by user: Busra || 15891 views || tracked by 25 users: [display]

NECO 2018 : Call for Participation - 7th International Conference of Networks and Communications (NECO 2018)

FacebookTwitterLinkedInGoogle

Link: http://iccsea2018.org/neco/index.html
 
When Dec 22, 2018 - Dec 23, 2018
Where Sydney , Australia
Submission Deadline Nov 24, 2018
Notification Due Dec 11, 2018
Final Version Due Dec 15, 2018
Categories    networks   communications   security   privacy
 

Call For Papers

Call for Participation - 7th International Conference of Networks and Communications (NECO 2018)

December 22-23, 2018,Sydney, Australia


Call for Participation


We invite you to join us in Sydney, Australia on December 22-23, 2018, for 7thInternational Conference of Networks and Communications (NECO 2018)


The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects on Computer Networks, Network Protocols and Wireless Networks, Data Communication Technologies, and Network Security.

Highlights of SPPR 2018 include:



  • Invited talk from eminent Professors
  • Submission of 150 papers from North America to Australia and selection of only Quality papers
  • 8th International Conference on Computer Science, Engineering and Applications (ICCSEA-2018) December 22-23, 2018, Sydney, Australia
  • 9th International Conference on Wireless, Mobile Network & Applications (WiMoA-2018) December 22-23, 2018, Sydney, Australia
  • 10th International Conference on Grid Computing (GridCom-2018) December 22-23, 2018, Sydney, Australia.
  • 7th International Conference On Soft Computing, Artificial Intelligence And Applications (SCAI-2018) December 22-23, 2018, Sydney, Australia
  • 9th International Conference on Ubiquitous Computing (UBIC-2018) December 22-23, 2018, Sydney, Australia
  • 7th International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2018) December 22-23, 2018, Sydney, Australia
  • 9th International Conference on Internet Engineering & Web Services (InWeS-2018) December 22-23, 2018, Sydney, Australia
  • 9th International Conference on Communications Security & Information Assurance (CSIA-2018) December 22-23, 2018, Sydney, Australia

Registration Participants


Non-Author / Co-Author/ Simple Participants (no paper)


350 USD (With proceedings)


For registration and details mail: neco_2018@yahoo.com (or) neco_conf2018@iccsea2018.org

Accepted Papers


  • TOMOGRAPHIC SAR INVERSIONFOR URBAN RECONSTRUCTION

  • Karima Hadj-Rabah, Faiza Hocine, AssiaKourgli and AichoucheBelhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria

  • A PSEUDO-SPLICINGALGORITHM FORPARTIAL FINGERPRINT RECOGNITION BASED ON SIFT

  • Zheng Zhu, Aiping Li*, Rong Jiang, Yulu Qi, Dongyang Zhao, Yan Jia, National University of Defense Technology, China

  • VIEW-PODS: NAVIGATION AND READING ASSISTING WEARABLE FOR VISUALLY IMPAIRED

  • M.L.M. Fernando, W.S.M. Fernando, I.H. Dolawatta, N.T.C. Athukorala, Dr. Pradeepa Samarasinghe, Sri Lanka Institute of Information Technology New Kandy Road,Sri Lanka

  • Paradigm Based Morphological Analyser For The Gujarati Language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Development of Handcrafted Rule-Based Approach to Improve POS tagger for Indo-Aryan language

  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India


  • Possibilities of Python based emotion recognition

  • Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia.


  • A Post-Processing Method Based On Fully Connected CRFS for Chronic Wound Images Segmentation and Identification

  • Junnan Zhang and Hanyi Nie, NUDT, China.

  • Integrating EMOJI’S In Determining User Sentiment on Twitter

  • Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia

  • MRI And CT Image Fusion Based Structure-Preserving Filter

  • Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan


  • Bag of Embedding Words for sentiment analysis of Tweets

  • Gálvez Arias, Pierina Xiomara Guzmán Ramos, Pedro Jesús Chipana Vila, Luis Antonio , Trigoso Valeriano and Carlos Alberto, ESAN University, Peru

  • A Genetics Clustering-Based Approach For Weblog Data Cleaning

  • Amine Ganibardi and Chérif Arab Ali, University of Vincennes in Saint-Denis, France


  • A Recommendation System for Educational Data Mining Techniques

  • Mosima Anna Masethe and Sunday Ojo, Tshwane University of Technology, South Africa



  • Dexplore: A Framework For Constructing Effective Mobile Benchmark Suites

  • Zachary Yannes and Gary Tyson, Florida State University, USA


    Virtual AIS generation management system for waterway risk assessment

    JunSik Kim1 and SeungWook Hong2 and Suhyun Park3, 1Dongseo University,Korea, 2Sasang-gu,Korea and 3Dongseo University,Korea.


  • Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
  • Byeongok Choi and Chae Y. Lee, KAIST, Korea.


  • New Version Of The Application Saite Store 2.0 - Experience Report On The Development Of A Brazilian Open Virtual Library

  • Ana Emilia Figueiredo de Oliveira, Katherine Marjorie Mendonça de Assis, Camila Santos de Castro e Lima, Carla Galvão Spinillo, Elza Bernardes Monier, Maria de Fatima Oliveira Gatinho, and Marcelo Henrique Monier Alves Junior, Federal University of Maranhão, Brazil.


  • An Incentive Mechanism For Computation Offloading In Mobile Edge Computing Using Block chain Technology

  • Ramtin Ranji, Ali Mohammed Mansoor and Sakhr Ahmed Hatem, University of Malaya, Malaysia.


  • Secure Group Key Management Protocol for Grid Computing

  • Mohammad R. Hassan1, Nidal M. Turab2, Khalil H. Al-Shqeerat3 and Saleh El-Omar1,1,2Al-Ahliyya Amman University Jordan and 3 Qassim University, Saudi Arabia.


  • Scalable Dynamic Locality-Sensitive Hashing For Structured Dataset on Main Memory and GPGPU Memory

  • Toan Nguyen Mau and Yasushi Inoguchi, JAIST, Japan.


  • A novel SMP-based survivability precise evaluation metric and approach in wireless sensor network routing layer

  • Hongsong Chen 1,2and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.
    2 Beijing Key Laboratory of Knowledge Engineering for Materials Science,China3Harbin Institute of Technology,China.


  • A Hilbert-Huang Transformation and statistic combination approach to detect LDoS attack in wireless sensor network

  • Hongsong Chen 1,2 and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.
    2 Beijing Key Laboratory of Knowledge Engineering for Materials Science, China 3 Harbin Institute of Technology, China.


  • Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF)

  • Rudy Agus Gemilang Gultom and Tatan Kustana, Indonesia Defense University, Indonesia.


  • COMPARATIVE ANALYSIS OF THE MEASUREMENT PARAMETERS OF QOS ON A CISCO 2800 ROUTER WITH STATIC ROUTING BY APPLYING PACKET SCHEDULING ALGORITHMS
  • Malena Cecilia Castro Caro1, Luz Enith Márquez Cantillo2, José Duván Márquez Díaz3, 1Institución Universitaria ITSA, Colombia, 2Institución Universitaria ITSA, Colombia and 3Universidad del Norte, Colombia


  • DEEP LEARNING BASED LANE AND VEHICLE TRACKING FOR AUTONOMOUS CARS

  • Masum Celil Olgun, Kadir Metin Akpolat, Zakir Baytar, Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey


  • PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS

  • Saide Işılay Baykal, Deniz Bulut, and Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey


  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION

  • Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel


  • DIVERSE RANKING APPROACH IN MCDM BASED ON TRAPEZOIDAL INTUITIONISTIC FUZZY NUMBERS

  • Norzanah Abd Rahman1 and Zamali Tarmudi2, 1University Teknologi MARA (Sabah Branch), Malaysia and 2University Teknologi MARA (Johor Branch), Malaysia


  • COMPUTER VISION, DEEP LEARNING, SVM, RANDOM FOREST TO DETECT DISEASES IN BLUEBERRY LEAVES
  • Cecilia Sullca, Carlos Molina, Carlos Rodríguez and Thais Fernández, Universidad ESAN, Perú


  • Rough approximation operators on matroids via circuits

  • Lingling Mao1, Zaibin Chang1 and Jingqian Wang,2 1 Xi’an Traffic Enginering University, China 2 and Shaanxi University of Science & Technology, China


  • Residential Load Profile Analysis using Clustering Stability

  • Fang-Yi Chang1, 2Chia-Wei Tsai, 3Shu-Wei Lin and 3 Po-Chun Kuo,1,3Institute For Information Industry, Taiwan and 2,3Southern Taiwan University of Science and Technology, Taiwan.


  • SOFT COMPUTING ALGORITHMS IN TRAVEL MODE SELECTION

  • Kostandina Veljanovska, University St. Kliment Ohridski, Republic of Macedonia


  • ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES

  • Igor Mishkovski1, Sanja Šćepanović2, Miroslav Mirchev1 and Sasho Gramatikov1, 1University Ss. Cyril and Methodius,Macedonia and 2Aalto University, Finland


  • FROM OPEN RELATION EXTRACTION TO SEMANTIC WEB: A RULE-BASED STRATEGY

  • Julio Hernandez, Cinvestav, Mexico


  • INFORMATION GATHERING SYSTEMS FOR PENETRATION TESTING: SURVEY AND AN IMPLEMENTATION

  • Damla Dinler and Ozgur Koray Sahingoz, Kultur University,Turkey


  • CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
  • PHadjer Benkraouda, Ezedin Barka, and Khaled Shuaib,United Arab Emirates University,UAE


  • ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
  • Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak,Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland


  • Efficient and Secured Transactions of Data in Crucial Network using Blockchain Technology

  • Manoj Athreya A, Ashwin A Kumar, Nagarajath S M and Gururaj H L, Vidyavardhaka College of Engineering, India



    Related Resources

    IJCSA 2018   International Journal on Computational Science & Applications
    IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
    CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
    Special Issue A&DC IoT 2019   SENSORS (Q1) Special Issue: Algorithm and Distributed Computing for the Internet of Things
    AISCA 2019   3rd International Conference on Artificial Intelligence, Soft Computing And Applications
    ICCCN 2019   International Conference on Computer Communications and Networks
    SIPM 2019   7th International Conference on Signal Image Processing and Multimedia
    SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
    MoWIN 2019   8th International Conference on Mobile & Wireless Networks
    SDS 2019   Call for Papers / Participation The 6th Swiss Conference on Data Science (IEEE technically co-sponsored)