INSTRUCTIONS FOR AUTHORS
Authors are invited to submit original and unpublished research works on above and other topics related to 3ICT 2019. Submitted papers must not have been published or simultaneously submitted elsewhere. Please, indicate clearly the corresponding author and include up to 6 keywords and an abstract of no more than 400 words. Papers must be formatted according to CPS format; see formatting instructions and style sheets. Submitted research papers may not overlap with papers that have already been published or that are simultaneously submitted to a journal or a conference with proceedings. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, contributions, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the conference. Conference proceedings would be published in IEEE Computer Society's Conference Publishing Services.
COPYRIGHT SUBMISSION
Authors can record copyright in two ways:
- The Easy Way: Login to your EDAS page, click on the +sign at the right of Copyright form, then click on IEEE Copyright Submission (red circles), and complete by answering few questions.
- Other option: Download the copyright form, fill up the paper details and author details, print form, have it signed, and scan it. Then upload the scanned copy, please download the copyright form
Details instraction can be found in (Click here)
PRESENTATION SUBMISSION
Authors are requested to submit their power point presentation electronically using edas, the due date for submitting the power point is 19th of September, you can download the power point template PPT Template
PAPER SUBMISSION
Authors are requested to submit their papers electronically using the Online EDAS conference management system in PDF format before the deadline (see Important Dates). The submission processes will be managed by EDAS. If you have used this system before, you can use the same username and password. If this is your first time using EDAS, you will need to register for an account by clicking "create a new account" button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.
Paper Format
LaTeX
Bibliography
Word : Paper and Bibliography
Please follow this link for complete IEEE template
Create and format your manuscript (s) by following IEEE guidelines
IMPORTANT DATES
THE CONFERENCE TOPICS
-
Cyber security
- Cyber security for cloud Based systems
- Electronic crimes in organizations
- Information Security Awareness
- Data Security & Privacy
- Cyber security risk analysis and management
- IoT Security & Privacy
- Cyber Security Architecture & Design
- Human Behavior-Based Security
- Security solutions and strategies in IoT
- Security Policy & Management
-
Smart Cities
- Smart city and infrastructural development
- Smart city governance
- Renewable Energy & Smart Grids
- Smart cities and the integration of information systems
- New Technologies for Smart Environment.
- Smart cities and internet of things for enhanced decision making
- Mobile Crowd-sourcing for Smart Cities.
- Socio-technical challenges in the implementation of smart city initiatives
- Smart cities and socio-economic development
- Smart cities and policy developments
-
Cloud Computing
- Future of Cloud Computing
- Systems software and hardware for CC
- Challenges and Future Directions of Cloud Computing
- Cloud Computing Service-Oriented Architecture
- Cloud infrastructure for mobile application development
- Performance, scalability, and reliability of CC
- Cloud Computing Technologies
- Cloud Security & Management
- Cloud computing architectures
- Green cloud networking
-
Internet of Things
- IOT Applications in Medical Field, Transportation, Smart Homes, Business, Industry, etc
- IOT Test bed, Deployment, and Application Support
- Intelligent Infrastructure
- Programming Languages and Run-Time Systems
- Embedded Systems and Design Methods
- Social Implications for IOT
- IOT and HPC
- Data Analysis and Visualization
- Environment Monitoring & Quality Aspects
- Future of IOT and Big Data
- Green computing & Energy Efficiency
-
Telecommunication and Networking
- Ad hoc mobile networks
- The Future of Telecommunication & protocols
- Advanced Network Technologies in Telecommunications
- Network applications & services
- Wireless Networking, Antenna, and Propagation
- Radio-frequency identification (RFID) technology
- RF and Microwave Communication
- Wireless Sensor Networks and Applications
- Mobil Communications
- Localization and Navigation Systems
-
Informatics
- e-Business
- e-Learning
- e-Government
- e-Health
- Information Systems
- Multimedia
- Technology Management
- Educational Technology
- Technology's Impacts on Society
- Soft computing
- Knowledge Management
-
Software Engineering
- Software Architecture and Design
- Software analysis, Evolution, and Understanding
- Software product line engineering
- Software Testing, verification, and validation
- Software Reuse, Metrics, and visualization
- Recommender systems for software engineering
- Process Management & Improvement
- Design Patterns and Frameworks
- Design & Process Engineering & Science
- Business Process Reengineering & Science
- Data Mining and Knowledge Recovery
- Reliability & Cost Modeling and Analysis
- Software Agent Technology & Process Models
-
Robotics, Computer Vision, and HCI
- Robot Vision
- Human Computer Interaction
- Machine learning
- Pattern Recognition.
- Bio Metrics
- Face recognition-detection
- Video Surveillance
- Electronic Nose
- Medical image processing
- Motion detection
- Image Compression
- The application of soft computing techniques in image retrieval