Call for Papers

GSCIT’ 2017 reports progress and development of methodologies, technologies, planning and implementation, tools and standards in Computer & Information Technology through its various conferences.

An important goal of the summit is to provide a solid platform for a diverse gathering of scholars, researchers, developers, educators, and practitioners where they can discuss ideas, innovations, applications and systems. This hub of scientific activity leads to more developments and research breakthroughs. The summit makes concerted effort to reach out to participants affiliated with diverse entities (such as: universities, institutions, corporations, government agencies, and research centers/labs) from all over the world.

Call for Papers www.gscit.org

Venue: Hannibal Palace, Port El Kantaoui, Sousse, Tunisia.

GSCIT’ 2017 is dedicated to cutting edge research that addresses scientific needs of academic researchers and industrial professionals to explore new horizons of knowledge on various computer related applications and research. GSCIT’ 2017 is scheduled to include high-quality paper presentation sessions revealing the latest research findings, and to engage participants in interesting discussion sessions. We seek novel paper submissions to be presented or posted (as a poster paper) in the following 6 main international conferences hosted by GSCIT’2017 with topics broadly including, but not limited to (detailed conference topics of interest are available through their individual links at gscit.org):

Submission instructions are available at: http://www.gscit.org/submission/

frenchNon-English speaking sessions

Submissions & Presentation Language: GSCIT’ 2017 supports French language presentations and papers. Articles should have English Title and Abstract. Article body could be in French.

 

 Reviewing Process: Each submitted paper will be blindly reviewed by at least two members of an international technical program committee with appropriate expertise.

International Conference on Education & eLearning Innovations ICEELI’17

  • E-Learning
  • Learning Management Systems (LMS)
  • Tutoring Systems (ITS)
  • Online/Virtual Laboratories
  • eLearning Standards (SCORM)
  • Virtual Universities
  • Infrastructural Development in Education
  • Emerging Technologies in Education
  • eScience Cyber infrastructure
  • Network Security and Infrastructure
  • Security in Education and E-Learning
  • System Design and Architecture
  • E-content Development
  • Knowledge Management
  • ePortfolios
  • Intellectual Property Rights and Plagiarism
  • User-Generated Content
  • Videos for Learning
  • Topics in Education
  • Education and Globalization
  • Impact of Education on Development
  • Learning Difficulties
  • Cloud Computing & E-Learning
  • Cloud Architecture for Education
  • Challenges in Cloud Computing Environments
  • Network Infrastructures
  • Networking Technologies
  • Infrastructure Requirements for E-Learning Implementation and Delivery
  • Digital Libraries and Repositories
  • Network Infrastructure and Services
  • Computer Supported Collaborative Work
  • Collaborative Virtual Environments
  • Web 3D Applications and VReality
  • Mobile/Wireless Technologies
  • Impact of Web Tech in Education
  • Pedagogical Innovations in Education
  • Tutoring, Mentoring and Coaching
  • Teaching Models and Techniques
  • Collaborative & Problem-based Learning
  • Trends in Education and E-Learning Infrastructures
  • E-Learning/ Mobile Learning/ Distance Learning/ Virtual Learning
  • Scalability of Learning Systems
  • Integration with ERP systems Web 2.0 and Social Networking: Blogs, Wikis
  • Education in Practice
  • Educational Innovations and Best Practices
  • Skills and discipline Transfer
  • Curriculum Design and Development
  • Quality Assurance/Standards and Accreditation
  • Tutor development and Follow up Procedures

International Conference on Computer Vision and Pattern Recognition ICCVPR’ 2017

  • Computer Vision
  • 2D/3D object detection and recognition
  • 3D shape recovery
  • Advanced vision sensors
  • Biologically motivated vision
  • Computational photography
  • Early computer vision
  • Illumination and reflectance modeling
  • Motion, tracking and video analysis
  • Occlusion and shadow detection
  • Reconstruction/camera motion est.
  • Shape modeling and encoding
  • Vision for graphics, Vision for robotics
  • Pattern Recognition and Machine Learning
  • Statistical, syntactic and structural PR
  • Machine learning, Data mining
  • Artificial neural networks
  • Classification
  • Analysis in pixel/voxel images
  • Image, Speech, Signal and Video Processing
  • Sensor array & multichannel signal processing
  • Segmentation, features and descriptors
  • Texture and color analysis
  • Enhancement, restoration and filtering
  • Coding, compression and resolution
  • Document Analysis, Biometrics and Pattern Recognition Applications
  • Pattern Recognition for Bioinformatics
  • Pattern Recognition for Surveillance
  • Gesture and Behavior Analysis
  • Mixed and Augmented Reality
  • Signal Processing for Astronomy
  • Human Computer Interaction
  • Character and Text Recognition
  • Human body motion and gesture based interaction
  • Facial expression recognition
  • Group interaction: analysis of verbal and non-verbal communication
  • Biometric systems and applications
  • Multi-biometrics
  • Forensic biometrics and its applications
  • Face, Iris, Gate, Fingerprint recognition
  • Soft biometrics
  • Medical Image Analysis
  • Algorithms for molecular biology
  • Biological image and signal analysis
  • Biological databases
  • Deformable object tracking
  • Medical and biological imaging
  • Molecular and cellular image analysis
  • Segmentation of medical images
  • VR/AR in medical education, diagnosis and surgery

International Conference on Cloud Computing, Cryptography and Data Security ICCCCDS’17

  • Novel cryptographic protocols
    • ID-based and certificateless cryptosystems
    • Broadcast encryption, signcryption, etc
    • Designed confirmer or undeniable signatures
    • Identification / authentication schemes
    • Key agreement
    • Predicate encryption

    SW / HW implementation

    • Secure operating systems
    • Efficient software implementation
    • FPGA or ASIC implementation
    • RFID security
    • Middleware security

    Cloud Computing

    • Cloud Application Architectures
    • Cloud Application Scalability and Availability
    • Cloud Applications Performance and Monitoring
    • Cloud Domain
    • Cloud Middleware Frameworks
    • Cloud Traffic Characterization and Measurements
    • Cloud Traffic Engineering and Control-Plane Architectures
    • Cloudsourcing
    • Collective Intelligence/Crowd Computing
    • Context-aware Computing and Peer to Peer Computing
    • Context-Awareness and its Data Mining
    • Cyber Security
    • Data Center Network Management, Reliabilty, Optimization
    • Data Center Operations
    • Data Grids
    • Data Models for Production Systems and Services
    • Defence Systems
    • Development Methods for Cloud Applications
    • Disaster Recovery
    • Distributed Data Center Architectures and Services
    • Distributed Information Systems

    Cloud Applications & Secure Environments

    • e-Business
    • e-Commerce
    • e-Governance
    • e-Government
    • e-Learning
    • e-Society
    • Green Cloud Networking
    • Incident Response Issues
    • Internet Architecture
    • Internet of Services
    • Internet of things
    • Internet Routing of Cloud data
    • Internet technologies
    • Intra-Cloud vs Inter-Cloud Management
    • IPSec Quality of Service
    • Load Balancing
    • MANET Security
    • Mobile Cloud Networking, Follow-Me-Cloud
    • Network on the fly, Virtual control, Virtual radio, Isolation
    • New Novel Mechanism and Application for Cloud Computing
    • Outsourced Production Environments
    • Peer to Peer Data Management
    • Performance Development and Management
    • Secure Communications
    • Security and Data Management
    • Security Challenges and Content Authoring
    • Security Stack
    • Security, Privacy, Confidentiality in Cloud networking
    • Semantic Web Technologies
    • Service and Systems Design and QoS Network Security
    • Service Composition
    • Service Discovery
    • Service Innovation
    • Service Marketing and Management
    • Service Modeling and Specification
    • Service Monitoring and Control
    • Service Strategy
    • Smart Homes and its Business Model
    • Storage Area Networks, Optical Interconnect, Fiber Channel
    • Technology-Enabled Information
    • Trust, Privacy and Data Security
    • Ubiquitous Systems
    • Virtual Ethernet Switching, Data Center Bridging
    • Virtualization of Wireless Equipment
    • Web Services
    • Wireless Sensor Network Security

International Conference on Computer Technologies Innovations & Applications ICCTIA’2017

  •  CPS and Internet of things
  • Access Network Technologies
  • Network, Communication Systems and System Architectures
  • Real-time Communication and Collaboration for Smart things
  • Sensor Networking Technologies
  • CPS (Cyber, Physical and Social) Technologies
  • Case Studies in Areas of Smart Grid, Healthcare, Agriculture,
  • Logistics, Environmental monitoring and Transport, etc
  • Information Technology
  • Databases, Indexing
  • Cryptography, Watermarking, Networks and Security
  • Semantic Web, Knowledge Management
  • Metamodeling, Domain-Specific Modeling, Aspect-Oriented Modeling
  • Numerical Algorithms and Analysis
  • Computational Simulation and Analysis
  • Data Visualization and Virtual Reality
  • Health Informatics
  • Reliability, Security, Privacy and Trust
  • Information and System Security
  • Network Security and Privacy
  • Authorization and Access Control
  • Mobile, Internet, and Cloud Security
  • Networks & Internet Technologies
  • Smart Grids and Energy Efficiency
  • Routing, Switching, Traffic Engineering and Control
  • Performance Analysis, Measurements, and Testbeds
  • Reconfigurable and Cognitive Networks
  • Wireless Communications
  • Wireless Technologies (HSPA, LTE, WiFi, UWB, etc.)
  • Wireless Localization Techniques
  • Multi-Antenna and MIMO Techniques
  • Self Organizing Networks
  • Heterogeneous Networks
  • Machine-to-Machine Communications
  • Cross Layer Optimization in Wireless Networks

International Conference on Web Applications and Networking ICWAN’ 2017

Network Technologies and Communication Systems
  • Intelligent Systems
  • Soft computing
  • Sensors and sensor networks
  • Acoustic and under water communication
  • Security and authentication
  • Air Interface, Microwave Technology, Wavepropagation and antennas
  • Mathematical Modeling and simulation
  • Data Mining
  • Parallel and distributed systems
  • Mobile communication and Adhoc Networks
  • IT and Management
  • RFIDs and applicatons
  • Embedded systems
Networking Services
  • Monitoring, correlation and diagnosis
  • Performance management, fault management and reconfiguration
  • Resource allocation and optimization
  • IT services, business impact analysis and business process management
  • Configuration and accounting
  • Security, trust and privacy
  • Energy management and optimization
  • QoS management
  • IP operations and management
  • Broadband access networks
  • Overlay and virtual networks
  • Wireless and mobile networks
  • Hybrid and next-generation networks
  • Data Center Networks
  • Cyber-Physical Systems and Smart Cities
  • Sensor networks, opportunistic and mobile ad-hoc networks
  • Pervasive systems including Body Area Networks, Vehicular and Home Networks
  • Cloud computing and Grid Environments
  • Enterprise Systems and Federations
  • SOA and Web services
  • Multimedia and data services
  • Data centers
  • Social networks, cloud based applications
  • Self-Management and adaptation
  • Economic models for management
  • Policy-based and declarative models of management
  • Virtualization
  • Control theory and optimization
  • Content centric networking
  • Stochastic models and machine learning in management

International Conference on Information Systems and IoT ICISI’ 2017

Intelligent Systems and Applications
  • Information Systems Analysis and Specification
  • Telematics and Middleware Platforms
  • Service-Oriented Architectures
  • Steganography Technology
  • Supply-chain Management
  • Systems Development and Evaluation
  • Databases and Information Systems
  • Data Mining & Data warehouses
  • Document Analysis
  • Medical Image Analysis
  • Game Playing
  • Biomedical Applications
  • Mobile Network Security
  • Information Systems Analysis and Specification
  • Bioinformatics
  • Multi-agent Systems & Simulations
  • Natural Language Processing
  • Expert and Knowledge Based Systems
  • Signal and Digital Image Processing
  • Databases and Information Systems
  • Information Retrieval
  • IT Management & Development
  • Human-Computer Interaction
Infonomics and e-Technology
  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security
Internet Systems and Tools
  •  Internet Architectures
  •  Web and Internet Tools
  •  Web Design
  •  Web methodologies
  •  Internet based knowledge engineering
  •  Distributed computing environments
  •  Architectures for internet and intranets
  •  Java, Corba, XML
  •  Security Aspects
  •  Privacy
  •  Cryptology
  •  Mobile Internet
  •  Internet Search Technologies
  •  Optimization Techniques
  •  Protection and Security
  •  Privacy
  •  Fault Tolerance
  •  Internet Computing
  •  Parallel and Distributed Processing
  •  Java based Applications for Web
  •  Software Agents
  •  Expert Systems
  •  Knowledge-based Systems
  •  Computer Vision
Entertainment Systems
  •  Developing entertainment systems and applications
  •  Platforms for entertainment systems
  •  Speech technology & its usability for entertainment systems
  •  Networking requirements for entertainment systems
  •  Traffic generated by entertainment applications
  •  QoS/SLA on entertainment systems
  •  Reliability and high availability of entertainment systems
  •  Identify aspects in entertainment systems
  •  Real-time access to entertainment systems
  •  Customized access entertainment systems
  •  Navigation and entertainment systems
  •  Integration and interoperability aspects in entertainment systems
  •  Entertainment systems and applications
  •  Networking and system support for entertainment systems
  •  Wireless and mobile technologies for entertainment
  •  Wireless multimedia for entertainment
  •  Systems for music and movie distribution
  •  Games on mobile and resource-constrained devices
  •  Mobile video entertainment systems
  •  Car/flight/train entertainment systems
  •  Ubiquitous entertainment systems
  •  Interactive television
  •  Technologies for sport and entertainment
  •  WiFi wireless home entertainment systems
  •  Wearable technologies for entertainment
P2P Systems and Applications
  •  P2P architectures, techniques, paradigms
  •  P2P programming and data handling
  •  P2P security features
  •  Data and compute intensive applications
  •  P2P networks and protocols
  •  P2P management
  •  P2P Trust and reputation management
  •  Fault tolerance in P2P, quality of availability, accounting in P2P
  •  Self-adaptiveness in P2P overlay networks
  •  Self-configurable P2P systems
  •  Case studies, benchmarking
  •  Copyright and intellectual property,
  •  Electronic marketplace, Digital asset management and trading systems
  •  Platforms, environments, testbeds
Online Communications, Collaborative Systems, and Social Networks
  •  Theory, frameworks, mechanisms, and tools for online communication
  •  Methodologies and languages for on-line communications
  •  Web services and XML use for online communications
  •  Tools for assessing online work, distributed workload
  •  Shared business processes
  •  Collaborative groups and systems
  •  Theory and formalisms of group interactions
  •  Group synergy in cooperative networks
  •  Online gambling, gaming, children groups
  •  Identity features, risks, jurisdiction for online communications
  •  Specifics emergency and e-coaching on online communications
  •  B2B and B2E cooperation
  •  Privacy, identify, security on online communications
  •  Individual anonymity, group trust, and confidentiality on online groups
  •  Conflict, delegation, group selection
  •  Community costs in collaborative groups
  •  Building online social networks with popularity contexts, persuasion, etc.
  •  Technology support for collaborative systems
  •  Techniques, mechanisms, and platforms for remote cooperation
Social and Legal Aspect of Internet Computing
  •  Principles, theories, and challenges of legal and social aspects
  •  Strategies, modeling, and requirements engineering of legal and social aspects
  •  Architectures, implementations, and deployment consideration of legal and social aspects
  •  Cyber threats, emerging risks, systemic concerns, and emergency preparedness
  •  Social computing and lifestyle computing
  •  Service marketing and customer relationship management
  •  Market structures and emerging business models
  •  Emerging legal issues due to new computing environment
  •  File / information sharing networks and user behavior
  •  Knowledge modeling, management, and application
  •  Negotiation and contracting as well as contract monitoring and enforcement
  •  E-democracy, e-policy, and governance
  •  Legal and social ontologies
  •  Privacy and copyright in collaborative environments and social networks
  •  Intellectual property rights
  •  Trust, security, and privacy
  •  Counterfeit forensic
  •  Identity management and access control
  •  Security and privacy in location-based services