en

Call for paper Global Summit on Computer  Information Technology [GSCIT’ 2016]

Call for paper Global Summit on Computer Information Technology [GSCIT’ 2016]

Tunisia 30 Jul 2016
GSCIT’ 2016

GSCIT’ 2016

Scientific organisation, Browse similar opportunities

OPPORTUNITY DETAILS

Total reward
0 $
Scientific organisation
Area
Host Country
Deadline
30 Jul 2016
Study level
Opportunity funding
Full funding
Eligible Countries
This opportunity is destined for all countries
Eligible Region
All Regions

[GSCIT’ 2016] Global Summit on Computer & Information Technology 

16-18 July, Sousse, Tunisia  

 -------------------------------------------------------------------------
Important Dates
Submission:  21 April, 2016 
Notification: Within 2 weeks
Camera Ready: 30 July, 2016
Registration: 20 June, 2016

------------------------------------------------------------------------- 

******** Call for Papers: http://www.gscit.org/ ******** 

Venue: El Mouradi Palace, located in the heart of the resort of Port el Kantaoui.
------------------------------------------------------------------------- 

We seek novel paper submissions to be presented or posted (as a poster paper) in GSCIT’2016 with topics broadly including, but not limited to : (for detailed list, http://www.gscit.org/ctopicpf/

Visit GSCIT’ 2016 Conferences :

 

International Conference on Education & eLearning Innovations ICEELI’ 2016
International Conference on Computer Vision and Pattern Recognition ICCVPR’2016
International Conference on Cloud Computing; Cryptography and Data Security ICCCCDS’ 2016
International Conference on Computer Technologies Innovations and Applications ICCTIA’ 2016
International Conference on Web Applications and Networking ICWAN’ 2016
International Conference on Information Systems and IoT ICISI’ 2016

International Conference on Education & eLearning Innovations ICEELI’16

• E-Learning • Learning Management Systems (LMS) • Tutoring Systems (ITS) • Online/Virtual Laboratories • eLearning Standards (SCORM) • Virtual Universities • Infrastructural Development in Education • Emerging Technologies in Education • eScience Cyber infrastructure • Network Security and Infrastructure • Security in Education and E-Learning • System Design and Architecture • E-content Development • Knowledge Management • ePortfolios • Intellectual Property Rights and Plagiarism • User-Generated Content • Videos for Learning • Topics in Education • Education and Globalization • Impact of Education on Development • Learning Difficulties • Cloud Computing & E-Learning • Cloud Architecture for Education • Challenges in Cloud Computing Environments • Network Infrastructures • Networking Technologies • Infrastructure Requirements for E-Learning Implementation and Delivery • Digital Libraries and Repositories • Network Infrastructure and Services • Computer Supported Collaborative Work • Collaborative Virtual Environments • Web 3D Applications and VReality • Mobile/Wireless Technologies • Impact of Web Tech in Education • Pedagogical Innovations in Education • Tutoring, Mentoring and Coaching • Teaching Models and Techniques • Collaborative & Problem-based Learning • Trends in Education and E-Learning Infrastructures • E-Learning/ Mobile Learning/ Distance Learning/ Virtual Learning • Scalability of Learning Systems • Integration with ERP systems Web 2.0 and Social Networking: Blogs, Wikis • Education in Practice • Educational Innovations and Best Practices • Skills and discipline Transfer • Curriculum Design and Development • Quality Assurance/Standards and Accreditation • Tutor development and Follow up Procedures International Conference on Computer Vision and Pattern Recognition ICCVPR’ 2016 • Computer Vision • 2D/3D object detection and recognition • 3D shape recovery • Advanced vision sensors • Biologically motivated vision • Computational photography • Early computer vision • Illumination and reflectance modeling • Motion, tracking and video analysis • Occlusion and shadow detection • Reconstruction/camera motion est. • Shape modeling and encoding • Vision for graphics, Vision for robotics • Pattern Recognition and Machine Learning • Statistical, syntactic and structural PR • Machine learning, Data mining • Artificial neural networks • Classification • Analysis in pixel/voxel images • Image, Speech, Signal and Video Processing • Sensor array & multichannel signal processing • Segmentation, features and descriptors • Texture and color analysis • Enhancement, restoration and filtering • Coding, compression and resolution • Document Analysis, Biometrics and Pattern Recognition Applications • Pattern Recognition for Bioinformatics • Pattern Recognition for Surveillance • Gesture and Behavior Analysis • Mixed and Augmented Reality • Signal Processing for Astronomy • Human Computer Interaction • Character and Text Recognition • Human body motion and gesture based interaction • Facial expression recognition • Group interaction: analysis of verbal and non-verbal communication • Biometric systems and applications • Multi-biometrics • Forensic biometrics and its applications • Face, Iris, Gate, Fingerprint recognition • Soft biometrics • Medical Image Analysis • Algorithms for molecular biology • Biological image and signal analysis • Biological databases • Deformable object tracking • Medical and biological imaging • Molecular and cellular image analysis • Segmentation of medical images • VR/AR in medical education, diagnosis and surgery

International Conference on Cloud Computing, Cryptography and Data Security ICCCCDS’16

• Novel cryptographic protocols • ID-based and certificateless cryptosystems • Broadcast encryption, signcryption, etc • Designed confirmer or undeniable signatures • Identification / authentication schemes • Key agreement • Predicate encryption • SW / HW implementation • Secure operating systems • Efficient software implementation • FPGA or ASIC implementation • RFID security • Middleware security • Cloud Computing • Cloud Application Architectures • Cloud Application Scalability and Availability • Cloud Applications Performance and Monitoring • Cloud Domain • Cloud Middleware Frameworks • Cloud Traffic Characterization and Measurements • Cloud Traffic Engineering and Control-Plane Architectures • Cloudsourcing • Collective Intelligence/Crowd Computing • Context-aware Computing and Peer to Peer Computing • Context-Awareness and its Data Mining • Cyber Security • Data Center Network Management, Reliabilty, Optimization • Data Center Operations • Data Grids • Data Models for Production Systems and Services • Defence Systems • Development Methods for Cloud Applications • Disaster Recovery • Distributed Data Center Architectures and Services • Distributed Information Systems • Cloud Applications & Secure Environments • e-Business • e-Commerce • e-Governance • e-Government • e-Learning • e-Society • Green Cloud Networking • Incident Response Issues • Internet Architecture • Internet of Services • Internet of things • Internet Routing of Cloud data • Internet technologies • Intra-Cloud vs Inter-Cloud Management • IPSec Quality of Service • Load Balancing • MANET Security • Mobile Cloud Networking, Follow-Me-Cloud • Network on the fly, Virtual control, Virtual radio, Isolation • New Novel Mechanism and Application for Cloud Computing • Outsourced Production Environments • Peer to Peer Data Management • Performance Development and Management • Secure Communications • Security and Data Management • Security Challenges and Content Authoring • Security Stack • Security, Privacy, Confidentiality in Cloud networking • Semantic Web Technologies • Service and Systems Design and QoS Network Security • Service Composition • Service Discovery • Service Innovation • Service Marketing and Management • Service Modeling and Specification • Service Monitoring and Control • Service Strategy • Smart Homes and its Business Model • Storage Area Networks, Optical Interconnect, Fiber Channel • Technology-Enabled Information • Trust, Privacy and Data Security • Ubiquitous Systems • Virtual Ethernet Switching, Data Center Bridging • Virtualization of Wireless Equipment • Web Services • Wireless Sensor Network Security

International Conference on Computer Technologies Innovations & Applications ICCTIA’2016

• CPS and Internet of things • Access Network Technologies • Network, Communication Systems and System Architectures • Real-time Communication and Collaboration for Smart things • Sensor Networking Technologies • CPS (Cyber, Physical and Social) Technologies • Case Studies in Areas of Smart Grid, Healthcare, Agriculture, • Logistics, Environmental monitoring and Transport, etc • Information Technology • Databases, Indexing • Cryptography, Watermarking, Networks and Security • Semantic Web, Knowledge Management • Metamodeling, Domain-Specific Modeling, Aspect-Oriented Modeling • Numerical Algorithms and Analysis • Computational Simulation and Analysis • Data Visualization and Virtual Reality • Health Informatics • Reliability, Security, Privacy and Trust • Information and System Security • Network Security and Privacy • Authorization and Access Control • Mobile, Internet, and Cloud Security • Networks & Internet Technologies • Smart Grids and Energy Efficiency • Routing, Switching, Traffic Engineering and Control • Performance Analysis, Measurements, and Testbeds • Reconfigurable and Cognitive Networks • Wireless Communications • Wireless Technologies (HSPA, LTE, WiFi, UWB, etc.) • Wireless Localization Techniques • Multi-Antenna and MIMO Techniques • Self Organizing Networks • Heterogeneous Networks • Machine-to-Machine Communications • Cross Layer Optimization in Wireless Networks

International Conference on Web Applications and Networking ICWAN’ 2016

• Network Technologies and Communication Systems • Intelligent Systems • Soft computing • Sensors and sensor networks • Acoustic and under water communication • Security and authentication • Air Interface, Microwave Technology, Wavepropagation and antennas • Mathematical Modeling and simulation • Data Mining • Parallel and distributed systems • Mobile communication and Adhoc Networks • IT and Management • RFIDs and applicatons • Embedded systems • Networking Services • Monitoring, correlation and diagnosis • Performance management, fault management and reconfiguration • Resource allocation and optimization • IT services, business impact analysis and business process management • Configuration and accounting • Security, trust and privacy • Energy management and optimization • QoS management • IP operations and management • Broadband access networks • Overlay and virtual networks • Wireless and mobile networks • Hybrid and next-generation networks • Data Center Networks • Cyber-Physical Systems and Smart Cities • Sensor networks, opportunistic and mobile ad-hoc networks • Pervasive systems including Body Area Networks, Vehicular and Home Networks • Cloud computing and Grid Environments • Enterprise Systems and Federations • SOA and Web services • Multimedia and data services • Data centers • Social networks, cloud based applications • Self-Management and adaptation • Economic models for management • Policy-based and declarative models of management • Virtualization • Control theory and optimization • Content centric networking • Stochastic models and machine learning in management

International Conference on Information Systems and IoT ICISI’ 2016

• Intelligent Systems and Applications • Information Systems Analysis and Specification • Telematics and Middleware Platforms • Service-Oriented Architectures • Steganography Technology • Supply-chain Management • Systems Development and Evaluation • Databases and Information Systems • Data Mining & Data warehouses • Document Analysis • Medical Image Analysis • Game Playing • Biomedical Applications • Mobile Network Security • Information Systems Analysis and Specification • Bioinformatics • Multi-agent Systems & Simulations • Natural Language Processing • Expert and Knowledge Based Systems • Signal and Digital Image Processing • Databases and Information Systems • Information Retrieval • IT Management & Development • Human-Computer Interaction • Infonomics and e-Technology • Infonomics • Information Visualization • Information Management • Information Quality • Technology-Enabled Information • e-Learning • e-Commerce • e-Business • e-Government • e-Society • System Design and Security for e-Services • Synchronizing e-Security • Internet Systems and Tools • Internet Architectures • Web and Internet Tools • Web Design • Web methodologies • Internet based knowledge engineering • Distributed computing environments • Architectures for internet and intranets • Java, Corba, XML • Security Aspects • Privacy • Cryptology • Mobile Internet • Internet Search Technologies • Optimization Techniques • Protection and Security • Privacy • Fault Tolerance • Internet Computing • Parallel and Distributed Processing • Java based Applications for Web • Software Agents • Expert Systems • Knowledge-based Systems • Computer Vision • Entertainment Systems • Developing entertainment systems and applications • Platforms for entertainment systems • Speech technology & its usability for entertainment systems • Networking requirements for entertainment systems • Traffic generated by entertainment applications • QoS/SLA on entertainment systems • Reliability and high availability of entertainment systems • Identify aspects in entertainment systems • Real-time access to entertainment systems • Customized access entertainment systems • Navigation and entertainment systems • Integration and interoperability aspects in entertainment systems • Entertainment systems and applications • Networking and system support for entertainment systems • Wireless and mobile technologies for entertainment • Wireless multimedia for entertainment • Systems for music and movie distribution • Games on mobile and resource-constrained devices • Mobile video entertainment systems • Car/flight/train entertainment systems • Ubiquitous entertainment systems • Interactive television • Technologies for sport and entertainment • WiFi wireless home entertainment systems • Wearable technologies for entertainment • P2P Systems and Applications • P2P architectures, techniques, paradigms • P2P programming and data handling • P2P security features • Data and compute intensive applications • P2P networks and protocols • P2P management • P2P Trust and reputation management • Fault tolerance in P2P, quality of availability, accounting in P2P • Self-adaptiveness in P2P overlay networks • Self-configurable P2P systems • Case studies, benchmarking • Copyright and intellectual property, • Electronic marketplace, Digital asset management and trading systems • Platforms, environments, testbeds • Online Communications, Collaborative Systems, and Social Networks • Theory, frameworks, mechanisms, and tools for online communication • Methodologies and languages for on-line communications • Web services and XML use for online communications • Tools for assessing online work, distributed workload • Shared business processes • Collaborative groups and systems • Theory and formalisms of group interactions • Group synergy in cooperative networks • Online gambling, gaming, children groups • Identity features, risks, jurisdiction for online communications • Specifics emergency and e-coaching on online communications • B2B and B2E cooperation • Privacy, identify, security on online communications • Individual anonymity, group trust, and confidentiality on online groups • Conflict, delegation, group selection • Community costs in collaborative groups • Building online social networks with popularity contexts, persuasion, etc. • Technology support for collaborative systems • Techniques, mechanisms, and platforms for remote cooperation • Social and Legal Aspect of Internet Computing • Principles, theories, and challenges of legal and social aspects • Strategies, modeling, and requirements engineering of legal and social aspects • Architectures, implementations, and deployment consideration of legal and social aspects • Cyber threats, emerging risks, systemic concerns, and emergency preparedness • Social computing and lifestyle computing • Service marketing and customer relationship management • Market structures and emerging business models • Emerging legal issues due to new computing environment • File / information sharing networks and user behavior • Knowledge modeling, management, and application • Negotiation and contracting as well as contract monitoring and enforcement • E-democracy, e-policy, and governance • Legal and social ontologies • Privacy and copyright in collaborative environments and social networks • Intellectual property rights • Trust, security, and privacy • Counterfeit forensic • Identity management and access control • Security and privacy in location-based services ------------------------------------------------------------------------- Submission could be in the form of : 1- Abstract (paper not exceeding 2 pages ) 2- Full papers: Prepare your manuscript (maximum 6 pages) 3- Poster Presentation: is a graphically based approach to presenting research

Submission link : http://www.gscit.org/submission/ -------------------------------------------------------------------------

Journal Publication

Conferences proceedings will be submitted for publication to CPS- Conference Publications Services which submitts to IEEE Xplore and the IEEE Computer Society Digital Library (CSDL). All conferences and conference proceedings must meet IEEE's quality standards. IEEE reserves the right not to publish any proceedings that do not meet these standards. Please visit the site for author guidelines. 

ISI Journals:

  • Journal of Information Systems Impact Factor: 1.838

  • Journal of Engineering Applications of Artificial Intelligence Impact Factor: 1.947
  • ADVANCED ENGINEERING FORUM (ISSN: 2234-9898) 
  • Recent Advances in Electrical & Electronic Engineering

Reviewing Process: Each submitted paper will be blindly reviewed by at least two members of an international technical program committee with appropriate expertise.
 

Best Regards
Dr Rachid Sammouda
GSCIT'2016 General Chair.
---------------------------------------------------------------------------- 

  • Visit World Symposium on Mechatronics Engineering & Applied Physics @ http://www.wsmeap.org

  • Visit ICCAT’ 2016 International Conference on Computer Applications & Technology, from 05-07 November, in Rome, Italy. http://www.iccat.net/

  • ICARCAD’ 2017 is under the patron of: Unità di Ricerca AIS del Dipartimento di Architettura e Progetto di Sapienza. (Research Unit AIS. Department of Architecture and Design. Sapienza University of Rome), International conference on Architectural Research & Computer-Aided Design, from 28-29 January 2017, Sousse, Tunisia.  http://www.icarcad.com

 

Other organizations


Choose your study destination


Choose the country you wish to travel to study for free, work or volunteer

Featured tags


free scholarships 2024 fully funded scholarships 2024 Free Scholarships Bachelor 2024-2025 scholarships Master Scholarship 2024-2025 contests 2025 phd scholarships 2024 Pan-african scholarship 2024-2025