ICSPT 2013 - International Conference on Signal Processing & Telecommunications
Date2013-03-24 - 2013-03-26
Deadline2013-01-15
VenueSousse, Tunisia
Keywords
Websitehttps://www.icspt.net
Topics/Call fo Papers
ICSPT 2013 is a forum for researchers, scholars and leading academic scientists to exchange and share their ideas, experiences and research results regarding all the different aspects of Signal Processing and Telecommunications. It reports progress and development of methodologies, technologies, planning and implementation, tools and standards in Signal Processing and Telecommunications.
The aim of the Conference is to promote the interface of researchers involved in the development and deployment of methods and techniques in the wide spectrum of Signal Processing and Telecommunications.
The Conference program includes lectures by eminent international experts, contributed papers, poster sessions, special symposiums, workshops, round table discussions, hardware and software presentations.
TOPICS OF INTEREST
-3D and Stereo Imaging
-3-D and Surface Reconstruction
-Algorithms and modeling for tracking and locating mobile users
-Analog and Mixed Signal Processing
-Application & Others
-Applications (Biomedical, Bioinformatics, Genomic, Seismic, Radar, Sonar, Remote Sensing, Positioning, etc.)
-Applied cryptography, Cryptanalysis, Digital Signatures
-Biometric security
-Boundary control devices
-Certification and accreditation
-Cross-layer design for security
-Data and system integrity, Database security
-Defensive information warfare
-Denial of service protection, Intrusion Detection, Anti-malware
-Distributed systems security
-Electronic commerce
-E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
-Grid security
-Information hiding and watermarking & Information survivability
-Insider threat protection, Integrity
-Intellectual property protection
-Internet/Intranet Security
-Key management and key recovery
-Language-based security
-Mobile and wireless security
-Mobile, Ad Hoc and Sensor Network Security
-Monitoring and surveillance
-Multimedia security ,Operating system security, Peer-to-peer security
-Performance Evaluations of Protocols & Security Application
-Privacy and data protection
-Product evaluation criteria and compliance
-Risk evaluation and security certification
-Risk/vulnerability assessment
-Security & Network Management
-Security and Assurance in Operational, Technological, commercial Area
-Security Engineering and Its Application
-Security Models & protocols
-Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
-Trusted computing
-Higher Order Spectral Analysis
-Illumination and Reflectance Modeling
-Image acquisition & Medical Image processing
-Image and Video Retrieval
-Image coding and compression
-Image Processing & Understanding
-Image segmentation
-Image-Based Modeling
-Information access in wireless networks
-Integration of wired and wireless networks
-Internet Signal Processing
-Knowledge Representation and High-Level Vision
-Medical Image Analysis
-Mobile ad hoc and sensor networks
-Mobile and wireless Networks
-Mobile applications, location-dependent and sensitive applications
-Motion Detection
-Remote Sensing
-Resource management in mobile, wireless and ad-hoc networks
-Routing, and communication primitives in ad hoc and sensor networks -Ubiquitous Computing Security
-Virtualization security, VoIP security, Web 2.0 security
-Architectures, protocols, and algorithms to cope with mobile & wireless Networks
-Array Signal Processing
-Audio/Speech Processing and Coding
-Biomedical Imaging Technologies
-Biometrics and Pattern Recognition
-Broadband access networks
-Cognitive and Biologically-inspired Vision
-Color and Texture
-Communication Network Architectures and Design
-Communication Network Protocols
-Communication Signal processing
-Complexity analysis of algorithms for mobile environments
-Computer Communication and Networks
-Computer Vision & VR
-Constraint processing
-Content-based Image retrieval
-Cryptography, security and privacy of mobile & wireless networks
-Data management on mobile and wireless computing
-Data Mining Techniques
-Detection and Estimation of Signal Parameters
-Digital & Mobile Signal Processing
-Discrete Algorithms and Discrete Modeling
-Distributed algorithms of mobile computing
-Distributed Source Coding
-Document Recognition
-DSP Implementation and Embedded Systems
-Emerging technologies for next generation network
-Energy saving protocols for ad hoc and sensor networks
-Face and Gesture
-Face recognition
-Face Recognition & Super-resolution imaging
-Filter Design and Structures
-FIR, IIR, adaptive Filters
-Future Internet architecture, protocols and services
-Hardware Implementation for Signal Processing
-Performance Evaluation
-Performance of mobile and wireless networks and systems
-Radar Signal Processing
-Recent trends in mobile and wireless applications
-Multiple Filtering and Filter Banks
-Multi-view Geometry Network applications -Satellite communications
-Segmentation
-Sensor Array and Multi-channel Processing
-Service creation and management environments for mobile/wireless systems
-Shape Representation
-Signal Identification
-Signal Noise Control
-Signal Processing Education
-Signal Reconstruction
-Sonar Signal Processing and Localization
-Spectral Analysis
-Speech, Audio and Music Processing
-Statistic Learning & Pattern Recognition
-Statistical & Optical Signal Processing
-Synchronization and scheduling issues in mobile and ad hoc networks
-Text processing
-Time-Frequency Signal Analysis
-Time-Frequency/Time-Scale Analysis
-Ubiquitous networks & cloud Computing
-Video Analysis and Event Recognition
-Video compression & Streaming
-Video Signal Processing
-Video Surveillance and Monitoring
-Visualization
-Watermarking
-Wireless & Mobile Issues related to OS
-Wireless multimedia systems
-Network Operation and Management
-Network Security and Privacy
-Network Services and Applications
-Neural Networks and Genetic Algorithms
-Nomadic computing, applications and services supporting the mobile user
-Nonlinear Signals and Systems
-Object Detection, Recognition and Categorization
-OS and middleware support for mobile computing and networking
-Pattern recognition and analysis
-Pattern Recognition in New Modalities
-PDE for Image Processing
-Motion Detection
-Multidimensional Signal Processing
All accepted papers will be published in one of the following journals without extra charge:
Journal of Digital Information Management
International Journal of Web Applications
International Journal of Computational Linguistics Research
International Journal of Information Studies
Journal of E-Technology
Journal of Networking Technology
Journal of Information Technology Review
Journal of Information Security Research
Journal of Intelligent Computing
Journal of Multimedia Processing and Technologies
Journal of Information & Systems Management
Journal of Data Processing
Journal of Information Organization
Journal of Electronic Systems Electronic Devices
Signals and Telecommunication Journal
Progress in Computing Applications
Progress in Signals and Telecommunication Engineering
The aim of the Conference is to promote the interface of researchers involved in the development and deployment of methods and techniques in the wide spectrum of Signal Processing and Telecommunications.
The Conference program includes lectures by eminent international experts, contributed papers, poster sessions, special symposiums, workshops, round table discussions, hardware and software presentations.
TOPICS OF INTEREST
-3D and Stereo Imaging
-3-D and Surface Reconstruction
-Algorithms and modeling for tracking and locating mobile users
-Analog and Mixed Signal Processing
-Application & Others
-Applications (Biomedical, Bioinformatics, Genomic, Seismic, Radar, Sonar, Remote Sensing, Positioning, etc.)
-Applied cryptography, Cryptanalysis, Digital Signatures
-Biometric security
-Boundary control devices
-Certification and accreditation
-Cross-layer design for security
-Data and system integrity, Database security
-Defensive information warfare
-Denial of service protection, Intrusion Detection, Anti-malware
-Distributed systems security
-Electronic commerce
-E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
-Grid security
-Information hiding and watermarking & Information survivability
-Insider threat protection, Integrity
-Intellectual property protection
-Internet/Intranet Security
-Key management and key recovery
-Language-based security
-Mobile and wireless security
-Mobile, Ad Hoc and Sensor Network Security
-Monitoring and surveillance
-Multimedia security ,Operating system security, Peer-to-peer security
-Performance Evaluations of Protocols & Security Application
-Privacy and data protection
-Product evaluation criteria and compliance
-Risk evaluation and security certification
-Risk/vulnerability assessment
-Security & Network Management
-Security and Assurance in Operational, Technological, commercial Area
-Security Engineering and Its Application
-Security Models & protocols
-Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
-Trusted computing
-Higher Order Spectral Analysis
-Illumination and Reflectance Modeling
-Image acquisition & Medical Image processing
-Image and Video Retrieval
-Image coding and compression
-Image Processing & Understanding
-Image segmentation
-Image-Based Modeling
-Information access in wireless networks
-Integration of wired and wireless networks
-Internet Signal Processing
-Knowledge Representation and High-Level Vision
-Medical Image Analysis
-Mobile ad hoc and sensor networks
-Mobile and wireless Networks
-Mobile applications, location-dependent and sensitive applications
-Motion Detection
-Remote Sensing
-Resource management in mobile, wireless and ad-hoc networks
-Routing, and communication primitives in ad hoc and sensor networks -Ubiquitous Computing Security
-Virtualization security, VoIP security, Web 2.0 security
-Architectures, protocols, and algorithms to cope with mobile & wireless Networks
-Array Signal Processing
-Audio/Speech Processing and Coding
-Biomedical Imaging Technologies
-Biometrics and Pattern Recognition
-Broadband access networks
-Cognitive and Biologically-inspired Vision
-Color and Texture
-Communication Network Architectures and Design
-Communication Network Protocols
-Communication Signal processing
-Complexity analysis of algorithms for mobile environments
-Computer Communication and Networks
-Computer Vision & VR
-Constraint processing
-Content-based Image retrieval
-Cryptography, security and privacy of mobile & wireless networks
-Data management on mobile and wireless computing
-Data Mining Techniques
-Detection and Estimation of Signal Parameters
-Digital & Mobile Signal Processing
-Discrete Algorithms and Discrete Modeling
-Distributed algorithms of mobile computing
-Distributed Source Coding
-Document Recognition
-DSP Implementation and Embedded Systems
-Emerging technologies for next generation network
-Energy saving protocols for ad hoc and sensor networks
-Face and Gesture
-Face recognition
-Face Recognition & Super-resolution imaging
-Filter Design and Structures
-FIR, IIR, adaptive Filters
-Future Internet architecture, protocols and services
-Hardware Implementation for Signal Processing
-Performance Evaluation
-Performance of mobile and wireless networks and systems
-Radar Signal Processing
-Recent trends in mobile and wireless applications
-Multiple Filtering and Filter Banks
-Multi-view Geometry Network applications -Satellite communications
-Segmentation
-Sensor Array and Multi-channel Processing
-Service creation and management environments for mobile/wireless systems
-Shape Representation
-Signal Identification
-Signal Noise Control
-Signal Processing Education
-Signal Reconstruction
-Sonar Signal Processing and Localization
-Spectral Analysis
-Speech, Audio and Music Processing
-Statistic Learning & Pattern Recognition
-Statistical & Optical Signal Processing
-Synchronization and scheduling issues in mobile and ad hoc networks
-Text processing
-Time-Frequency Signal Analysis
-Time-Frequency/Time-Scale Analysis
-Ubiquitous networks & cloud Computing
-Video Analysis and Event Recognition
-Video compression & Streaming
-Video Signal Processing
-Video Surveillance and Monitoring
-Visualization
-Watermarking
-Wireless & Mobile Issues related to OS
-Wireless multimedia systems
-Network Operation and Management
-Network Security and Privacy
-Network Services and Applications
-Neural Networks and Genetic Algorithms
-Nomadic computing, applications and services supporting the mobile user
-Nonlinear Signals and Systems
-Object Detection, Recognition and Categorization
-OS and middleware support for mobile computing and networking
-Pattern recognition and analysis
-Pattern Recognition in New Modalities
-PDE for Image Processing
-Motion Detection
-Multidimensional Signal Processing
All accepted papers will be published in one of the following journals without extra charge:
Journal of Digital Information Management
International Journal of Web Applications
International Journal of Computational Linguistics Research
International Journal of Information Studies
Journal of E-Technology
Journal of Networking Technology
Journal of Information Technology Review
Journal of Information Security Research
Journal of Intelligent Computing
Journal of Multimedia Processing and Technologies
Journal of Information & Systems Management
Journal of Data Processing
Journal of Information Organization
Journal of Electronic Systems Electronic Devices
Signals and Telecommunication Journal
Progress in Computing Applications
Progress in Signals and Telecommunication Engineering
Other CFPs
- International Conference on Information Technology & e-Services
- International Conference on Information & Intelligent Systems
- Annual Conference of Association for Medical Education in Europe (AMEE)
- 2nd International Conference on Faculty Development in the Health Professions
- 2013 8th International Conference on Intelligent Information Processing (ICIIP2013)
Last modified: 2013-01-08 23:11:02