ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

GSCIT 2017 - 2017 Global Summit on Computer & Information Technology GSCIT 2017

Date2017-07-01 - 2017-07-02

Deadline2017-05-21

VenueSousse, Tunisia Tunisia

Keywords

Websitehttp://www.gscit.org

Topics/Call fo Papers

2017 Global Summit on Computer & Information Technology
GSCIT 2017, July 01-02, Sousse, Tunisia
Important Dates
Submission deadline: 21 May, 2017
Notification: Within 2 weeks
Camera Ready: 30 July, 2017
Registration: As mentioned in the acceptation letter. An additional amount of 100 Euro for the registration after the deadline
***Call for Papers www.gscit.org***
Venue: Hannibal Palace, Port El Kantaoui, Sousse, Tunisia.
GSCIT’ 2017 is a Global Summit on Computer & Information Technology, from 01-02 July, in Sousse, Tunisia. The summit is hosting multiple conferences in different areas of Computer & Information Technology. CIT is a major platform for researchers and industry practitioners from different fields of computer and information technology promising multidisciplinary exchanges in computer and information technology. We are attracting many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. Such research highlights foundational work that strives to push beyond limits of existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services.
Researchers from around the globe are interested in sharing their unpublished, fresh and in-depth ideas. Make sure you are part of this strong event!
***Call for Papers www.gscit.org***
International Conference on Education & eLearning Innovations ICEELI’17
E-Learning
Learning Management Systems (LMS)
Tutoring Systems (ITS)
Online/Virtual Laboratories
eLearning Standards (SCORM)
Virtual Universities
Infrastructural Development in Education
Emerging Technologies in Education
eScience Cyber infrastructure
Network Security and Infrastructure
Security in Education and E-Learning
System Design and Architecture
E-content Development
Knowledge Management
ePortfolios
Intellectual Property Rights and Plagiarism
User-Generated Content
Videos for Learning
Topics in Education
Education and Globalization
Impact of Education on Development
Learning Difficulties
Cloud Computing & E-Learning
Cloud Architecture for Education
Challenges in Cloud Computing Environments
Network Infrastructures
Networking Technologies
Infrastructure Requirements for E-Learning Implementation and Delivery
Digital Libraries and Repositories
Network Infrastructure and Services
Computer Supported Collaborative Work
Collaborative Virtual Environments
Web 3D Applications and VReality
Mobile/Wireless Technologies
Impact of Web Tech in Education
Pedagogical Innovations in Education
Tutoring, Mentoring and Coaching
Teaching Models and Techniques
Collaborative & Problem-based Learning
Trends in Education and E-Learning Infrastructures
E-Learning/ Mobile Learning/ Distance Learning/ Virtual Learning
Scalability of Learning Systems
Integration with ERP systems Web 2.0 and Social Networking: Blogs, Wikis
Education in Practice
Educational Innovations and Best Practices
Skills and discipline Transfer
Curriculum Design and Development
Quality Assurance/Standards and Accreditation
Tutor development and Follow up Procedures
International Conference on Computer Vision and Pattern Recognition ICCVPR’17
Computer Vision
2D/3D object detection and recognition
3D shape recovery
Advanced vision sensors
Biologically motivated vision
Computational photography
Early computer vision
Illumination and reflectance modeling
Motion, tracking and video analysis
Occlusion and shadow detection
Reconstruction/camera motion est.
Shape modeling and encoding
Vision for graphics, Vision for robotics
Pattern Recognition and Machine Learning
Statistical, syntactic and structural PR
Machine learning, Data mining
Artificial neural networks
Classification
Analysis in pixel/voxel images
Image, Speech, Signal and Video Processing
Sensor array & multichannel signal processing
Segmentation, features and descriptors
Texture and color analysis
Enhancement, restoration and filtering
Coding, compression and resolution
Document Analysis, Biometrics and Pattern Recognition Applications
Pattern Recognition for Bioinformatics
Pattern Recognition for Surveillance
Gesture and Behavior Analysis
Mixed and Augmented Reality
Signal Processing for Astronomy
Human Computer Interaction
Character and Text Recognition
Human body motion and gesture based interaction
Facial expression recognition
Group interaction: analysis of verbal and non-verbal communication
Biometric systems and applications
Multi-biometrics
Forensic biometrics and its applications
Face, Iris, Gate, Fingerprint recognition
Soft biometrics
Medical Image Analysis
Algorithms for molecular biology
Biological image and signal analysis
Biological databases
Deformable object tracking
Medical and biological imaging
Molecular and cellular image analysis
Segmentation of medical images
VR/AR in medical education, diagnosis and surgery
International Conference on Cloud Computing & Cryptography ICCCC’17
Novel cryptographic protocols
ID-based and certificate less cryptosystems
Broadcast encryption, signcryption,
Designed confirmer
Identification / authentication schemes
Key agreement, Predicate encryption
SW / HW implementation
Secure operating systems
Efficient software implementation
FPGA or ASIC implementation
RFID security, Middleware security
Cloud Applications & Secure Environments
e-Business, e-Commerce, e-Governance, e-Government, e-Learning, e-Society
Green Cloud Networking
Incident Response Issues
Internet Architecture, Internet of Services, Internet Routing of Cloud data, Intra-Cloud vs Inter-Cloud Management
IPSec Quality of Service, Load Balancing, MANET Security
Mobile Cloud Networking, Follow-Me-
Network on the fly, Virtual control, Virtual radio, Isolation
New Novel Mechanism and Application for Cloud Computing
Outsourced Production Environments
Peer to Peer Data Management
Performance Development and Management
Security Challenges and Content Authoring
Security Stack, Security, Privacy, Confidentiality in Cloud networking
Semantic Web Technologies
Service and Systems Design and QoS Network Security
Service Composition, Discovery, Innovation, Marketing and Management, Modeling and Specification, Monitoring and Control, Strategy
Smart Homes and its Business Model
Virtual Ethernet Switching, Data Center
Virtualization of Wireless Equipment
Wireless Sensor Network Security
Cloud Computing
Cloud Application Architectures
Cloud Applications Performance and Monitoring
Cloud Middleware Frameworks
Collective Intelligence Context-aware Computing and Peer to Peer Computing
Context-Awareness & Data Mining
Data Centers, Data Grids
Data Models for Production Systems and Services
Distributed Information Systems
International Conference on Computer Technologies Innovations & Applications ICCTIA’17
CPS and Internet of things
Access Network Technologies
Network, Communication Systems and System Architectures
Real-time Communication and Collaboration for Smart things
Sensor Networking Technologies
CPS (Cyber, Physical and Social) Technologies
Case Studies in Areas of Smart Grid, Healthcare, Agriculture,
Logistics, Environmental monitoring and Transport, etc
Information Technology
Databases, Indexing
Cryptography, Watermarking, Networks and Security
Semantic Web, Knowledge Management
Metamodeling, Domain-Specific Modeling, Aspect-Oriented Modeling
Numerical Algorithms and Analysis
Computational Simulation and Analysis
Data Visualization and Virtual Reality
Health Informatics
Reliability, Security, Privacy and Trust
Information and System Security
Network Security and Privacy
Authorization and Access Control
Mobile, Internet, and Cloud Security
Networks & Internet Technologies
Smart Grids and Energy Efficiency
Routing, Switching, Traffic Engineering and Control
Performance Analysis, Measurements, and Testbeds
Reconfigurable and Cognitive Networks
Wireless Communications
Wireless Technologies (HSPA, LTE, WiFi, UWB, etc.)
Wireless Localization Techniques
Multi-Antenna and MIMO Techniques
Self Organizing Networks
Heterogeneous Networks
Machine-to-Machine Communications
Cross Layer Optimization in Wireless Networks
Publications:
Conferences proceedings will be indexed in IEEE Conference Publishing System (CPS)
The Editors of the following international Journals welcome the submission of extended versions of papers that the program committee deems excellent.
International Journal of Computing and Optimization
ISI Journals:
Journal of Information Systems Impact Factor: 1.838
Journal of Engineering Applications of Artificial Intelligence Impact Factor: 1.947
ADVANCED ENGINEERING FORUM (ISSN: 2234-9898)
Recent Advances in Electrical & Electronic Engineering
Submission instructions are available at: http://www.gscit.org/submission/
Non-English speaking sessions: GSCIT accepts presentations in French keeping in mind that submitted final papers must be in English to ensure publication through IEEE Xplore Digital Library.
Reviewing Process: Each submitted paper will be blindly reviewed by at least two members of an international technical program committee with appropriate expertise.

Last modified: 2017-04-27 22:36:37