posted by user: aircc_cfp || 7725 views || tracked by 16 users: [display]

ICCSEA 2018 : Call for Participation - 8th International Conference On Computer Science, Engineering And Applications

FacebookTwitterLinkedInGoogle

Link: http://iccsea2018.org/index.html
 
When Dec 22, 2018 - Dec 23, 2018
Where Sydney, Australia
Submission Deadline Nov 24, 2018
Notification Due Dec 11, 2018
Final Version Due Dec 15, 2018
Categories    artificial intelligence   bioinformatics   robotics   neural networks
 

Call For Papers

Call for Participation - 8thInternational Conference On Computer Science, Engineering And Applications (ICCSEA 2018)

December 22-23, 2018,Sydney, Australia

Call for Participation

We invite you to join us in Sydney, Australia on December 22-23, 2018, for 8thInternational Conference On Computer Science, Engineering And Applications (ICCSEA 2018)

The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Highlights of ICCSEA 2018 include:

  • Invited talk from eminent Professors
  • Submission of 150 papers from North America to Australia and selection of only Quality papers
  • 9thInternational Conference on Wireless, Mobile Network & Applications (WiMoA-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Ubiquitous Computing (UBIC-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference of Networks and Communications (NECO-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Soft Computing, Artificial Intelligence and Applications (SCAI-2018) December 22-23, 2018, Sydney, Australia
  • 7thInternational Conference on Signal, Image Processing and Pattern Recognition (SPPR-2018) December 22-23, 2018, Sydney, Australia
  • 10thInternational Conference on Grid Computing (GridCom-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Internet Engineering & Web Services (InWeS-2018) December 22-23, 2018, Sydney, Australia
  • 9thInternational Conference on Communications Security & Information Assurance (CSIA-2018) December 22-23, 2018, Sydney, Australia

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

350 USD (With proceedings)

For registration and details :iccsea_conf2018@yahoo.com (or) iccsea_conf2018@iccsea2018.org

Accepted Papers


  • TOMOGRAPHIC SAR INVERSIONFOR URBAN RECONSTRUCTION
  • Karima Hadj-Rabah, Faiza Hocine, AssiaKourgli and AichoucheBelhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria

  • A PSEUDO-SPLICINGALGORITHM FORPARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
  • Zheng Zhu, Aiping Li*, Rong Jiang, Yulu Qi, Dongyang Zhao, Yan Jia, National University of Defense Technology, China

  • VIEW-PODS: NAVIGATION AND READING ASSISTING WEARABLE FOR VISUALLY IMPAIRED
  • M.L.M. Fernando, W.S.M. Fernando, I.H. Dolawatta, N.T.C. Athukorala, Dr. Pradeepa Samarasinghe, Sri Lanka Institute of Information Technology New Kandy Road,Sri Lanka

  • Paradigm Based Morphological Analyser For The Gujarati Language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Development of Handcrafted Rule-Based Approach to Improve POS tagger for Indo-Aryan language
  • Dikshan N Shah1 and Dr. Harshad Bhadka2, 1Gujarat Technological University, India and 2C U Shah University, India

  • Possibilities of Python based emotion recognition
  • Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia.

  • A Post-Processing Method Based On Fully Connected CRFS for Chronic Wound Images Segmentation and Identification
  • Junnan Zhang and Hanyi Nie, NUDT, China.

  • Integrating EMOJI’S In Determining User Sentiment on Twitter
  • Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia

  • MRI And CT Image Fusion Based Structure-Preserving Filter
  • Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan

  • Bag of Embedding Words for sentiment analysis of Tweets
  • Gálvez Arias, Pierina Xiomara Guzmán Ramos, Pedro Jesús Chipana Vila, Luis Antonio , Trigoso Valeriano and Carlos Alberto, ESAN University, Peru

  • A Genetics Clustering-Based Approach For Weblog Data Cleaning
  • Amine Ganibardi and Chérif Arab Ali, University of Vincennes in Saint-Denis, France

  • A Recommendation System for Educational Data Mining Techniques
  • Mosima Anna Masethe and Sunday Ojo, Tshwane University of Technology, South Africa


  • Dexplore: A Framework For Constructing Effective Mobile Benchmark Suites
  • Zachary Yannes and Gary Tyson, Florida State University, USA

    Virtual AIS generation management system for waterway risk assessment

    JunSik Kim1 and SeungWook Hong2 and Suhyun Park3, 1Dongseo University,Korea, 2Sasang-gu,Korea and 3Dongseo University,Korea.

  • Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
  • Byeongok Choi and Chae Y. Lee, KAIST, Korea.

  • New Version Of The Application Saite Store 2.0 - Experience Report On The Development Of A Brazilian Open Virtual Library
  • Ana Emilia Figueiredo de Oliveira, Katherine Marjorie Mendonça de Assis, Camila Santos de Castro e Lima, Carla Galvão Spinillo, Elza Bernardes Monier, Maria de Fatima Oliveira Gatinho, and Marcelo Henrique Monier Alves Junior, Federal University of Maranhão, Brazil.

  • An Incentive Mechanism For Computation Offloading In Mobile Edge Computing Using Block chain Technology
  • Ramtin Ranji, Ali Mohammed Mansoor and Sakhr Ahmed Hatem, University of Malaya, Malaysia.

  • Secure Group Key Management Protocol for Grid Computing
  • Mohammad R. Hassan1, Nidal M. Turab2, Khalil H. Al-Shqeerat3 and Saleh El-Omar1,1,2Al-Ahliyya Amman University Jordan and 3 Qassim University, Saudi Arabia.

  • Scalable Dynamic Locality-Sensitive Hashing For Structured Dataset on Main Memory and GPGPU Memory
  • Toan Nguyen Mau and Yasushi Inoguchi, JAIST, Japan.

  • A novel SMP-based survivability precise evaluation metric and approach in wireless sensor network routing layer
  • Hongsong Chen 1,2and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science,China3Harbin Institute of Technology,China.

  • A Hilbert-Huang Transformation and statistic combination approach to detect LDoS attack in wireless sensor network
  • Hongsong Chen 1,2 and Zhongchuan Fu3,1 University of Science and Technology Beijing, China.2 Beijing Key Laboratory of Knowledge Engineering for Materials Science, China 3 Harbin Institute of Technology, China.

  • Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF)
  • Rudy Agus Gemilang Gultom and Tatan Kustana, Indonesia Defense University, Indonesia.

  • COMPARATIVE ANALYSIS OF THE MEASUREMENT PARAMETERS OF QOS ON A CISCO 2800 ROUTER WITH STATIC ROUTING BY APPLYING PACKET SCHEDULING ALGORITHMS
  • Malena Cecilia Castro Caro1, Luz Enith Márquez Cantillo2, José Duván Márquez Díaz3, 1Institución Universitaria ITSA, Colombia, 2Institución Universitaria ITSA, Colombia and 3Universidad del Norte, Colombia

  • DEEP LEARNING BASED LANE AND VEHICLE TRACKING FOR AUTONOMOUS CARS
  • Masum Celil Olgun, Kadir Metin Akpolat, Zakir Baytar, Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
  • Saide Işılay Baykal, Deniz Bulut, and Ozgur Koray Sahingoz, Istanbul Kultur University, Turkey

  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION
  • Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel

  • DIVERSE RANKING APPROACH IN MCDM BASED ON TRAPEZOIDAL INTUITIONISTIC FUZZY NUMBERS
  • Norzanah Abd Rahman1 and Zamali Tarmudi2, 1University Teknologi MARA (Sabah Branch), Malaysia and 2University Teknologi MARA (Johor Branch), Malaysia

  • COMPUTER VISION, DEEP LEARNING, SVM, RANDOM FOREST TO DETECT DISEASES IN BLUEBERRY LEAVES
  • Cecilia Sullca, Carlos Molina, Carlos Rodríguez and Thais Fernández, Universidad ESAN, Perú

  • Rough approximation operators on matroids via circuits
  • Lingling Mao1, Zaibin Chang1 and Jingqian Wang,2 1 Xi’an Traffic Enginering University, China 2 and Shaanxi University of Science & Technology, China

  • Residential Load Profile Analysis using Clustering Stability
  • Fang-Yi Chang1, 2Chia-Wei Tsai, 3Shu-Wei Lin and 3 Po-Chun Kuo,1,3Institute For Information Industry, Taiwan and 2,3Southern Taiwan University of Science and Technology, Taiwan.

  • SOFT COMPUTING ALGORITHMS IN TRAVEL MODE SELECTION
  • Kostandina Veljanovska, University St. Kliment Ohridski, Republic of Macedonia

  • ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
  • Igor Mishkovski1, Sanja Šćepanović2, Miroslav Mirchev1 and Sasho Gramatikov1, 1University Ss. Cyril and Methodius,Macedonia and 2Aalto University, Finland

  • FROM OPEN RELATION EXTRACTION TO SEMANTIC WEB: A RULE-BASED STRATEGY
  • Julio Hernandez, Cinvestav, Mexico

  • INFORMATION GATHERING SYSTEMS FOR PENETRATION TESTING: SURVEY AND AN IMPLEMENTATION
  • Damla Dinler and Ozgur Koray Sahingoz, Kultur University,Turkey

  • CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
  • PHadjer Benkraouda, Ezedin Barka, and Khaled Shuaib,United Arab Emirates University,UAE

  • ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
  • Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak,Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland

  • Efficient and Secured Transactions of Data in Crucial Network using Blockchain Technology
  • Manoj Athreya A, Ashwin A Kumar, Nagarajath S M and Gururaj H L, Vidyavardhaka College of Engineering, India

    Related Resources

    MoDRE 2019   9th International Workshop on Model-Driven Requirements Engineering (MoDRE)
    IWUAS 2020   2020 International Workshop on Unmanned Aircraft Systems (IWUAS 2020)
    ICSTR 2020   ICSTR Melbourne – International Conference on Science & Technology Research, 05-06 March 2020
    ECAI 2020   24th European Conference on Artificial Intelligence
    ISBDAI 2020   【Ei Compendex Scopus】2018 International Symposium on Big Data and Artificial Intelligence
    ICSS 2019   5th International Conference on Software Security
    WTDSI-SBSI 2019   Workshop de Teses e Dissertações em Sistemas de Informação
    ICMV--SPIE, Scopus, Ei Compendex 2019   SPIE--2019 The 12th International Conference on Machine Vision (ICMV 2019)--EI, Scopus and ISI
    CSEE&T 2020   32nd International Conference on Software Engineering Education & Training
    ICEE 2020   6th International Conference on Electrical Engineering