allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

call For Participation - 10th International Conference on Networks & Communications (NeTCoM 2018)

google+
Views: 16                 

When :  2018-12-22

Where :  Dubai, UAE

Submission Deadline :  N/A

Categories :   Networks & Communications ,  Computer Science & Information Technology ,  Computational Science   

https://netcom2018.org/index.html

Call for Participation - 10thInternational Conference on Networks & Communications (NeTCoM 2018)

December 22-23, 2018,Dubai, UAE

Call for Participation

We invite you to join us in Sydney, Australia on December 22-23, 2018, for 10thInternational Conference on Networks & Communications (NeTCoM 2018) 

The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Highlights of NeTCoM 2018 include:

  • Invited talk from eminent Professors
  • Submission of 150 papers from North America to Australia and selection of only Quality papers
  • 5th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2018) December 22 ~ 23, 2018, Dubai, UAE
  • 10th International Conference on Network and Communications Security (NCS-2018) December 22 ~ 23, 2018, Dubai, UAE
  • 5thInternational Conference on Signal, Image Processing and Multimedia (SPM-2018) December 22 ~ 23, 2018, Dubai, UAE
  • 10thInternational Conference on Wireless & Mobile Networks (WiMoNe-2018) December 22 ~ 23, 2018, Dubai, UAE
  • 10thInternational Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC-2018) December 22 ~ 23, 2018, Dubai, UAE

Registration Participants

Non-Author / Co-Author/ Simple Participants (no paper)

350 USD (With proceedings)

For registration and details :netcom2018conf@yahoo.com (or) netcom_conf@netcom2018.org

Accepted Papers

  • ENCRYPTION MODEL USING PYTHON FOR SMART METER DATA PRIVACY
  • Warsame Ali, Aniekan Eno-Ibanga, John Fuller, Penrose Cofie and Samir Abood, Prairie View A&M University, USA

  • ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
  • JACKELOU S. MAPA, College of Information Technology SAINT JOSEPH INSTITUTE OF TECHNOLOGY, Philippines

  • AN ONTOLOGY-BASED HIERARCHICAL BAYESIAN NETWORK CLASSIFICATION MODEL TO PREDICT THE EFFECT OF DNA REPAIRS GENES IN HUMAN AGEING PROCESS
  • Hasanein Alharbi, Al-Mustaqbal University College, Iraq

  • DESIGN OF MINIATURIZED SIW BAND PASS FILTER AT [32-36] GHZ
  • Rahali Bouchra1Otmani Amina1 Abdeldjelil Amina1Belkacem Hadjira11 STIC Laboratory, University of Tlemcen, Algeria

  • LIGHT WEIGHT AUTHENTICATION FOR LOW-END AUTOMOTIVE CONTROL UNITS WITH HARDWARE BASED INDIVIDUAL KEYS
  • Sergei Bauer1, Martin Brunner2 and Peter Schartner3 1KAI Kompetenzzentrum fur Automobil und Industrieelektronik, Austria 2Infineon Technologies AG, Munich, Germany 3Alpen-Adria Universitat Klagenfurt, Austria

  • FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES
  • Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem, University of Oran 1 Ahmed Ben Bella BP 1524, Algeria

  • MICROSOFT DEVOPS APPLICATIONS ARCHITECTURE IN A UNIVERSITY ENVIRONMENT
  • J. Gutierrez and A. Sevillano, Universidad Peruana de Ciencias Aplicadas, Peru

    Shurug Alkhalifa and Hind AlMahmoud, King Saud University, Saudi Arabia

  • SURVEY: THE EVOLUTION OF THE USAGE OF AUGMENTED REALITY IN INDUSTRY 4.0.
  • Abir GALLALA, Bassem HICHRI and Peter PLAPPER, University of Luxembourg, Luxembourg

  • RANDOMIZED DYNAMIC TRICKLE TIMER ALGORITHM FOR INTERNET OF THINGS
  • Muneer Bani Yassein, Ansam Alnadi, Asmaa Bataineh, Jordan University of Science and Technology, Irbid, Jordan

  • BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET
  • Muneer Bani Yassein, Ismail Hmeidi, Yaser Khamayseh, Mohammad Al-Rousan Danah Arrabi, University of Science and Technology Jordan

  • VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT
  • JunSik Kim1, SeungWook Hong 2 and Suhyun Park3 1Dongseo University, Busan, Korea 2ONE Data Technology, Sasang-gu, Busan, Korea 3Division of Computer Engineering, Dongseo University, Busan, Korea

  • AN ENHANCED TECHNIQUE OF SELF-CORRECTING LOCALIZATION ALGORITHM FOR VEHICULAR NODE POSITION ACCURACY IN THE DISTRIBUTED VANET
  • Hanan H. Al Malki1 and Abdellatif I. Moustafa 1,2 1Umm AL-Qura University, Makkah, Saudi Arabia 2 Faculty of Eng., AL Azhar University, Cairo, Egypt

    A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS

    Mabrouka Gmiden1, Mohamed Hedi Gmiden2 and Hafedh Gmiden2 1,2National Engineers School of SfaxTunisia

  • Bit rate and Task Scheduling for Multimedia Big Data in Mobile Clouds
  • Byeongok Choi and Chae Y. Lee, KAIST, Korea.

  • SIGNAL SUPERPOSITION MODEL WITH MINERALOGY BASED SPECTROSCOPIC DIELECTRIC MODEL IN WIRELESS UNDERGROUND SENSOR NETWORKS
  • K.A. Nethravathi, R.V. College of Engineering, Bangalore, India

  • QOS ENHANCEMENT IN 6LOWPAN BY IPV6 PACKET COMPRESSION AND DYNAMIC BANDWIDTH ALLOCATION
  • Vinila Nagaraj1 Kiran V2 Padmaja K V3, 1,2RVCE, Bangalore 3RVCE, Bangalore .

  • CELL ASSOCIATION FOR MULTI BAND 5G CELLULAR HETNETS BASED ON NBS
  • Ahmed Zakaria 1 and Aziza I. Hussein2, 1Telecommunication Engineer, Telecom Egypt, Asyut, Egypt 2Computer & Systems Eng. Dept. Minia University, Minia, Egypt Electrical & Computer Eng. Dept.Effat University, Jeddah, KSA.

  • FW-TR: A NEW GENERATION OF FIREWALLS BASED ON TRUST-RISK ASSESSMENT OF FILTERING RULES AND POLICIES
  • Faouzi JAIDI, ESPRIT School of Engineering, Tunis, Tunisia .

  • ROBUST APPLICATION DETECTION USING TRAFFIC BURSTINESS
  • Hussein Oudah, Bogdan Ghita, Taimur Bakhshi, University of Plymouth, Plymouth, United Kingdom .2 Beijing Key Laboratory of Knowledge Engineering for Materials Science,China3Harbin Institute of Technology,China.

  • LATENCY AND ENERGY OPTIMIZATION USING MAC-AWARE ROUTING FOR WSNS
  • Sara Hebal and Lemia Louail, University Ferhat Abbas Sétif 1, Algeria .

  • WISE DISSEMINATION AFTER AN EFFICIENT COLLECTION OF DATA BY CONFIDENCE INTERVAL IN WSN BASED ON IOT
  • A. Senthil Thilak, Sujatha V Shet and S.S. Kamath, National Institute of Technology Karnataka, India .

  • DESIGN OF FAULT-TOLERANT STRUCTURES FOR EFFICIENT COMMUNICATION IN AD HOC AND SENSOR NETWORKS USING EFFICIENTLY DOMINATABLE GRAPHS
  • A. Senthil Thilak, Sujatha V Shet and S.S. Kamath, National Institute of Technology Karnataka, India

  • INFLUENTIAL NODES DETECTION IN DYNAMIC SOCIAL NETWORKS
  • NesrineHAFIENE1,3,WafaKAROUI1,2 and LotfiBENROMDHANE1,3, 1Université de Sousse, Tunisie, 2Université de Tunis El Manar, Tunisie, 3Université de Sousse, Tunisie

  • CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS
  • Kiavash Satvat1, Mahshid Hosseini, and Maliheh Shirvanian2 1 University of Illinois at Chicago, Chicago, USA 2University of Alabama at Birmingham, Alabama, USA

  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSS-TECHNOLOGY SELECTION
  • Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein,Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel

  • PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES
  • Alessio Coletta1, 2 1Security and Trust Unit, Bruno Kessler Foundation, Italy 2 University of Trento, Italy

  • SECURE STRATEGY FOR OPTICAL IMAGE ENCRYPTION SYSTEM BASED ON AMPLITUDE MODULATION, PHASE MODULATION AND MODIFIED LOGISTIC MAP
  • Ahmed M. Elshamy1,Aziza I. Hussein2,3,Hesham F. A. Hamed4,M. A. Abdelghany4,and Hamdy M. Kelash5 1Fujairah University, UAE 2Minia University,Egypt 3 Effat University, Jeddah, KSA 4Minia University, Minia, Egypt 5Menoufia University, Menouf, Egypt

  • RESEARCH ON NETWORK ANOMALY DETECTION METHOD BASED ON IMPROVED MSPCA
  • Zhenru Pan1 and Huaibin Wang 2, Tianjin University of Technology, China

  • SECURITY PROTOCOL FOR POLLUTION ATTACK USING NETWORK CODING
  • Kiattikul Sooksomsatarn, University of Phayao, Maeka, Muang, Thailand .

  • AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT
  • SungWon Ahn, Minho Park, Soongsil University, Korea

  • ARTIFICIAL IMMUNE SYSTEMS BASED MECHANISM FOR THWARTING NETWORK PORT SCANNING TRAFFIC
  • Nuha Almasalmeh1, Firas Saidi2, Zouheir Trabelsi3, 1&3United Arab Emirates University, UAE, 2University of Manouba, Tunisia,

  • A MACHINE LEARNING APPROACH TO DETECT AND CLASSIFY 3D TWO-PHOTON POLYMERIZATION MICROSTRUCTURES USING OPTICAL MICROSCOPY IMAGES
  • Israel Goytom and Gu Yinwei Ningbo University, Faculty of Science, 315200, China

  • NEAR-DROWNING EARLY PREDICTION TECHNIQUE USING NOVEL EQUATIONS (NEPTUNE) FOR SWIMMING POOLS
  • B David Prakash, IAG Firemark Singapore

  • DEFECT DETECTION IN STEEL PLATE USING ULTRASONIC SIGNALS THROUGH FOURIER ANALYSIS
  • Mubarak Ahmad, Abdul Basit and Zinghua Liu, Beijing University of Technology, China.

  • VIDEO SEQUENCING BASED FACIAL EXPRESSION DETECTION WITH 3D LOCAL BINARY PATTERN VARIANTS
  • Kennedy Chengeta1 and Serestina Viriri, 1University of KwaZulu Natal,South Africa 2Westville Campus,South Africa

  • PAPR AND SPECTRUM ANALYSIS OF 4G AND 5G TECHNIQUES
  • Roopdeep kaur and Dr. Ashutosh Kumar Singh, Thapar University, India

    User Name : judy
    Posted 06-12-2018 on 16:45:43 AEDT


    Related CFPs

    SEAS 2019   8th International Conference on Software Engineering and Applications (SEAS 2019)
    IJCAx   International Journal of Computer-Aided technologies
    IJNLC   International Journal on Natural Language Computing
    ICAIT 2019   8th International Conference on Advanced Computer Science and Information Technology

    All Rights Reserved @ Call for Papers - Conference & Journals