posted by user: aircc_cfp || 9988 views || tracked by 15 users: [display]

ICCSEA 2018 : Call for Participation - 8th International Conference On Computer Science, Engineering And Applications

FacebookTwitterLinkedInGoogle

Link: http://iccsea2018.org/index.html
 
When Dec 22, 2018 - Dec 23, 2018
Where Sydney, Australia
Submission Deadline Nov 24, 2018
Notification Due Dec 11, 2018
Final Version Due Dec 15, 2018
Categories    computer science   information technology   applications   engineering
 

Call For Papers

Call for Participation - 8thInternational Conference On Computer Science, Engineering And Applications (ICCSEA 2018)

December 22-23, 2018,Sydney, Australia

Call for Participation

We invite you to join us in Sydney, Australia on December 22-23, 2018, for 8thInternational Conference On Computer Science, Engineering And Applications (ICCSEA 2018)

The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Highlights of ICCSEA 2018 include:

  • Invited talk from eminent Professors
  • Submission of 150 papers from North America to Australia and selection of only Quality papers
  • 9thInternational Conference on Wireless, Mobile Network & Applications (WiMoA-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Ubiquitous Computing (UBIC-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference of Networks and Communications (NECO-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Soft Computing, Artificial Intelligence and Applications (SCAI-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Signal, Image Processing and Pattern Recognition (SPPR-2018) December 22-23, 2018, Sydney, Australia
  • 10thInternational Conference on Grid Computing (GridCom-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Internet Engineering & Web Services (InWeS-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Communications Security & Information Assurance (CSIA-2018) December 22-23, 2018, Sydney, Australia

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

350 USD (With proceedings)

For registration and details :iccsea_conf2018@yahoo.com (or) iccsea_conf2018@iccsea2018.org

Accepted Papers


  • TOMOGRAPHIC SAR INVERSIONFOR URBAN RECONSTRUCTION
  • Karima Hadj-Rabah, Faiza Hocine, AssiaKourgli and AichoucheBelhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria

  • A PSEUDO-SPLICINGALGORITHM FORPARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
  • Zheng Zhu, Aiping Li*, Rong Jiang, Yulu Qi, Dongyang Zhao, Yan Jia, National University of Defense Technology, China

  • VIEW-PODS: NAVIGATION AND READING ASSISTING WEARABLE FOR VISUALLY IMPAIRED
  • M.L.M. Fernando, W.S.M. Fernando, I.H. Dolawatta, N.T.C. Athukorala, Dr. Pradeepa Samarasinghe, Sri Lanka Institute of Information Technology New Kandy Road,Sri Lanka

  • Paradigm Based Morphological Analyser For The Gujarati Language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Development of Handcrafted Rule-Based Approach to Improve POS tagger for Indo-Aryan language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Possibilities of Python based emotion recognition
  • Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia.

  • A Post-Processing Method Based On Fully Connected CRFS for Chronic Wound Images Segmentation and Identification
  • Junnan Zhang and Hanyi Nie, NUDT, China.

  • Integrating EMOJI’S In Determining User Sentiment on Twitter
  • Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia

  • MRI And CT Image Fusion Based Structure-Preserving Filter
  • Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan

  • Bag of Embedding Words for sentiment analysis of Tweets
  • Gálvez Arias, Pierina Xiomara Guzmán Ramos, Pedro Jesús Chipana Vila, Luis Antonio , Trigoso Valeriano and Carlos Alberto, ESAN University, Peru

  • A Genetics Clustering-Based Approach For Weblog Data Cleaning
  • Amine Ganibardi and Chérif Arab Ali, University of Vincennes in Saint-Denis, France

  • A Recommendation System for Educational Data Mining Techniques
  • Mosima Anna Masethe and Sunday Ojo, Tshwane University of Technology, South Africa


  • Dexplore: A Framework For Constructing Effective Mobile Benchmark Suites
  • Zachary Yannes and Gary Tyson, Florida State University, USA

    Virtual AIS generation management system for waterway risk assessment

    JunSik Kim1 and SeungWook Hong2 and Suhyun Park3, 1Dongseo University,Korea, 2Sasang-gu,Korea and 3Dongseo University,Korea.

  • Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
  • Byeongok Choi and Chae Y. Lee, KAIST, Korea.

  • New Version Of The Application Saite Store 2.0 - Experience Report On The Development Of A Brazilian Open Virtual Library
  • Ana Emilia Figueiredo de Oliveira, Katherine Marjorie Mendonça de Assis, Camila Santos de Castro e Lima, Carla Galvão Spinillo, Elza Bernardes Monier, Maria de Fatima Oliveira Gatinho, and Marcelo Henrique Monier Alves Junior, Federal University of Maranhão, Brazil.

  • An Incentive Mechanism For Computation Offloading In Mobile Edge Computing Using Block chain Technology
  • Ramtin Ranji, Ali Mohammed Mansoor and Sakhr Ahmed Hatem, University of Malaya, Malaysia.

  • Secure Group Key Management Protocol for Grid Computing
  • Mohammad R. Hassan1, Nidal M. Turab2, Khalil H. Al-Shqeerat3 and Saleh El-Omar1,1,2Al-Ahliyya Amman University Jordan and 3 Qassim University, Saudi Arabia.

  • Scalable Dynamic Locality-Sensitive Hashing For Structured Dataset on Main Memory and GPGPU Memory
  • Toan Nguyen Mau and Yasushi Inoguchi, JAIST, Japan.

  • A novel SMP-based survivability precise evaluation metric and approach in wireless sensor network routing layer
  • Hongsong Chen 1,2and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science,China3Harbin Institute of Technology,China.

  • A Hilbert-Huang Transformation and statistic combination approach to detect LDoS attack in wireless sensor network
  • Hongsong Chen 1,2 and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science, China 3 Harbin Institute of Technology, China.

  • Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF)
  • Rudy Agus Gemilang Gultom and Tatan Kustana, Indonesia Defense University, Indonesia.

  • COMPARATIVE ANALYSIS OF THE MEASUREMENT PARAMETERS OF QOS ON A CISCO 2800 ROUTER WITH STATIC ROUTING BY APPLYING PACKET SCHEDULING ALGORITHMS
  • Malena Cecilia Castro Caro1, Luz Enith Márquez Cantillo2, José Duván Márquez Díaz3, 1Institución Universitaria ITSA, Colombia, 2Institución Universitaria ITSA, Colombia and 3Universidad del Norte, Colombia

  • DEEP LEARNING BASED LANE AND VEHICLE TRACKING FOR AUTONOMOUS CARS
  • Masum Celil Olgun, Kadir Metin Akpolat, Zakir Baytar, Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
  • Saide Işılay Baykal, Deniz Bulut, and Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION
  • Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel

  • DIVERSE RANKING APPROACH IN MCDM BASED ON TRAPEZOIDAL INTUITIONISTIC FUZZY NUMBERS
  • Norzanah Abd Rahman1 and Zamali Tarmudi2, 1University Teknologi MARA (Sabah Branch), Malaysia and 2University Teknologi MARA (Johor Branch), Malaysia

  • COMPUTER VISION, DEEP LEARNING, SVM, RANDOM FOREST TO DETECT DISEASES IN BLUEBERRY LEAVES
  • Cecilia Sullca, Carlos Molina, Carlos Rodríguez and Thais Fernández, Universidad ESAN, Perú

  • Rough approximation operators on matroids via circuits
  • Lingling Mao1, Zaibin Chang1 and Jingqian Wang,2 1 Xi’an Traffic Enginering University, China 2 and Shaanxi University of Science & Technology, China

  • Residential Load Profile Analysis using Clustering Stability
  • Fang-Yi Chang1, 2Chia-Wei Tsai, 3Shu-Wei Lin and 3 Po-Chun Kuo,1,3Institute For Information Industry, Taiwan and 2,3Southern Taiwan University of Science and Technology, Taiwan.

  • SOFT COMPUTING ALGORITHMS IN TRAVEL MODE SELECTION
  • Kostandina Veljanovska, University St. Kliment Ohridski, Republic of Macedonia

  • ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
  • Igor Mishkovski1, Sanja Šćepanović2, Miroslav Mirchev1 and Sasho Gramatikov1, 1University Ss. Cyril and Methodius,Macedonia and 2Aalto University, Finland

  • FROM OPEN RELATION EXTRACTION TO SEMANTIC WEB: A RULE-BASED STRATEGY
  • Julio Hernandez, Cinvestav, Mexico

  • INFORMATION GATHERING SYSTEMS FOR PENETRATION TESTING: SURVEY AND AN IMPLEMENTATION
  • Damla Dinler and Ozgur Koray Sahingoz, Kultur University,Turkey

  • CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
  • PHadjer Benkraouda, Ezedin Barka, and Khaled Shuaib,United Arab Emirates University,UAE

  • ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
  • Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak,Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland

  • Efficient and Secured Transactions of Data in Crucial Network using Blockchain Technology
  • Manoj Athreya A, Ashwin A Kumar, Nagarajath S M and Gururaj H L, Vidyavardhaka College of Engineering, India

    Related Resources

    NLE Special Issue 2024   Natural Language Engineering- Special issue on NLP Approaches for Computational Analysis of Social Media Texts for Online Well-being and Social Order
    ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
    ACIE 2024   CPS--2024 4th Asia Conference on Information Engineering (ACIE 2024)
    CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
    CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
    GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
    DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
    MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
    ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
    PCDS 2024   The 1st International Symposium on Parallel Computing and Distributed Systems