(+603) 2180 5202 azaliah@utm.my

WATER DISRUPTION: IMPORTANT NOTICE

Gangguan bekalan air sementara di beberapa kawasan di KL, Selangor bermula 24 April


9 pagi (24/4/2019) hingga 11 malam (26/4/2019):

• Jalan Semarak (Jalan Sultan Yahya Petra)

9 pagi (24/4/2019) hingga 11 malam (26/4/2019) 

• Bandar Putra Heights

Where should you go to if both your home and your office are affected? ..while the daily operation still running as usual?..work, meeting, school, etc *sigh. Though my house and my office is almost 50km and in a different district, apparently we do get the supply from the same water source

4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019).

http://irict.co/irict2019/

 

Call for Papers

All submitted papers will be reviewed and evaluated based on the originality, technical, research content, contributions, and readability.

Submission of Full Papers


Prospective authors are invited to submit their full papers in English. The papers should address the burning and targeted issues of this conference. The abstract should not be more than 400 words which should include the aims and objectives, methods, results and conclusion of the paper. The length of the full paper should not be more than ten pages including the references. Please refer to the following paper template:downloadClick  on Springer Template to download the IRICT 2019 paper template

Submit your paper to IRICT 2019 EasyChair account

Conference Tracks


The topics are included below, but not limited to:

 1. Artificial Intelligence and Soft Computing

Topics:

–       Natural Language Processing
–       Fuzzy Logic
–       Knowledge Acquisition and Expert Systems
–       Design Automation
–       Reasoning and Decision Support Systems
–       Hybrid Algorithms
–       Genetic Algorithms
–       Machine Learning
–       Deep Learning
–       Multi-Objective Optimization
–       Computational Intelligence
–       Neural Networks
–       Evolutionary Algorithms
–       Differential Evolution
–       Combinatorial Optimization

2. Data Science and Big Data Analytics

Topics:

–       Data mining and knowledge discovery
–       Machine learning
–       Pattern recognition
–       Big Data Analytics and data science
–       Data-driven problem solving
–       Distributed Database Systems
–       Data Mining
–       Data Warehouse
–       Knowledge Data Engineering
–       Behavioral Mining
–       Decision Trees
–       Bioinformatics
–       Chemoinforamtics

3. Business Intelligence 

Topics:
–    Business Analytics
–    Customer Analytics
–    Financial Analytics
–    Bioinformatics
–    Talent Analytics
–    Information Analytics
–    Marketing Analytics
–    BI and Analytics in Intelligence and Security Informatics
–    Predictive analytics and knowledge management approaches
–    Big data solutions and applications
–    Social media intelligence and analytics
–    Business Intelligence Systems Implementation
–    Business Intelligence, Analytics in Healthcare
–    Business Intelligence for Organizational Performance Management
–    Predictive Analytics: Definition, Implementation, and Usage

4. Internet of Things (IoT) 

Topics:

–    Web Technologies for the IoT
–    Real World Applications of IoT technology
–    Internet of Things Architecture
–    Social Acceptance of IoT Systems
–    Smart Home
–    Smart Cities
–    IoT for healthcare
–    IoT security
–    IoT Data Analytics

5. Intelligent Communication Systems 

Topics:

–       Computer Networks
–       Data Communications
–       Mobile Computing
–       Wireless Sensor Networks
–       Networked Systems
–       Networks Architecture
–       Networks Operations and Management
–       Networks Analyzing & Programming
–       LAN & WAN Technologies
–       Internet Networks
–       Future Internet Engineering
–       Network issues in quantum technologies
–       Industrial Computer Networks
–       Networked Control Systems
–       Green Networking
–       Ad hoc and Sensor Networks
–       Vehicular Networks
–       Cloud Networking and Services

6.  Advances in Information Security

Topics:
–     Access control
–    Applied cryptography
–    Authentication and authorization
–    Biometric security
–    Data and system integrity
–    Database security
–    Distributed systems security
–    Grid security
–    Information hiding and watermarking
–    Intrusion detection
–    Key management and key recovery
–    Network security
–    Security for mobile computing
–    Trusted computing
–    Data and Network Security & Safety
–    Cryptographic Applications for Networks

7. Computational Vision and Robotics Technology

Topics:
–    Computer vision, AI applications
–    Computer games and animation
–    Computational geometry
–    Shape/range/motion analysis
–    Signal/image processing
–    Image matching, medical imaging
–    Pattern/face recognition
–    Architecture, languages
–    Parallel computer vision
–    Interactive computational models
–    Biological vision, alternative eyes
–    Renewable Energy and Sustainability

8. Multimedia Applications and Services

Topics:
–    Media Representation and Algorithms
–    Audio, Image, Video Processing, Coding and Compression
–    Multimedia Sensors and Interaction Modes
–    Multimedia Privacy, Security and Content Protection
–    Multimedia Standards and Related Issues
–    Advances in Multimedia Networking and Streaming
–    Multimedia Databases, Content Delivery and Transport
–    Wireless and Mobile Multimedia Networking

9. Advanced Information Systems

Topics:
–    Knowledge management, decision making and big data
–    Enterprise systems, processes, modelling and management
–    Diversity, inclusion and cross cultural issues
–    HCI, the user experience and human centred IS
–    Health Informatics
–    IS innovation, strategy and IT governance
–    IS development, design and project management
–    IS education, training and learning technologies
–    IS in emergencies and responsive systems
–    IS research, theory, philosophy and methods
–    Social media and related technologies
–    Green IS and sustainability

10. Software Engineering

Topics:
–    Development Environments and Tools
–    Programming languages, Hybrid and Native applications
–    Agile or Model driven development
–    Energy Efficient, resource aware development
–    Testing, Maintenance, Debugging techniques and tools
–    Analysis and Re-engineering of Mobile Apps
–    Cloud support and scalability
–    Empirical studies, Industry experiences
–    Static and Dynamic Analysis
–    User experience and New input devices
–    Applications of Mobile Apps

The 15th International Conference on Information Security Practice and Experience

Welcome to ISPEC 2019

 

Call For Papers

Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:

  • Cryptology
  • Applied cryptography
  • Mobile security
  • Cloud security
  • Access control
  • Privacy enhanced technology
  • Viruses and malware
  • Software security
  • Database security
  • Web security
  • Operating system security
  • Intrusion detection
  • Big data security and privacy
  • Biometric Security
  • Implementation
  • Network security
  • Key management
  • Security and privacy in ubiquitous computing
  • Formal methods for security
  • Digital forensics
  • Security for critical infrastructures
  • Embedded systems security
  • Lightweight security
  • Smart grid security
  • Cyber security for urban transportation
  • Cyber-physical security
  • Cryptocurrency

Important Dates

Submission Deadline 8th June, 2019, 15:59 UTC
Acceptance Notification 29th July, 2019
Camera-ready Copy Due 3rd September, 2019
Conference 26th – 28th November, 2019

Author Instructions

Authors are invited to submit original papers. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other conference with proceeding or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding the bibliography and appendices and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference to present their work. Submitted papers should follow the formatting instructions of the Springer LNCS Style. Please kindly refer to Springer LNCS Author Information for style and formatting guidelines.

Conference Proceedings

The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series.

Journal Special Issues

Selected papers presented at the ISPEC 2019 will be invited to consider submission (after significant extension) for special issues in the following journals:

Impact Factor: 3.557

Special Issue on Deep Learning: Security and Forensics Research Advances and Challenges

  •  Wiley Concurrency and Computation Practice and Experience                                                                  Impact Factor: 1.114

Special Issue on Trust Management and Security Enforcement in Internet of Things (TMSEIoT 2019)

The Information Age Is Dead. We’re Now in the Conversation Age

Thirty years ago, pundits said we’d entered the “Information Age,” in which information was seen as a valuable resource, equally (if not more) important and essential than the bricks, mortar, equipment, and people that existed in the nondigital world.

Over the decades, the concept of the Information Age has completely permeated the business world. The number of emails and texts and social media posts grow exponentially. The Information Age seems to be everywhere.

Take marketing, for instance. Every company now has a website chock-a-block with information: white papers, videos, e-books, product info, and presentations. The hot topic at industry conferences is “content marketing.”

Sales is similarly now driven mostly by customer data. Salespeople are goaded to become data entry clerks to populate CRM databases. Sales managers run analytics to find “insights” about whom their salespeople should be selling to.

Management, ditto. No manager worth their salt doesn’t have at least 50 how-to management books on their shelves. And every day, hundreds of slides, full of information, appear on the screens of boardrooms and conference rooms.

There’s only one problem: TMI.

Everyone, in business and elsewhere, now has more information–way, way more–than they could ever possibly use. Everyone is drowning in information. Offering more information to people is like throwing a case of Perrier at a drowning man.

But, but … (you may ask) what about all those smartphones? Aren’t they all about information? Uhhh, nope. What people do on their phones–talking, emailing, texting, and social media–isn’t about information and data. It’s about conversation and connection.

Take journalism, for instance. While a few large outlets, like The New York Times, continue to publish long, substantive articles, most journalism is now reduced to short articles intended to spark comments and conversations.

Consider: Entire governments now rise and fall on the basis of manipulated social media, which isn’t really “media” (like TV) but rather a series of conversations. Calling it “fake news” misses the point; it’s the conversation, not the information, that wields power.

Generations Y and Z are famously glued to their phones, but they’re not consuming information; they’re deeply involved in multiple conversations conducted through programs like Instagram. Ditto Gen-Xers with Facebook and Boomers with Fox News.

In short, the Information Age is dead and the Conversation Age has arrived.

Here’s the bad news: if you and your company don’t adapt to the Conversation Age, you can kiss your future goodbye. The big winners in your market–and indeed in every market–will be the first who “get it.”

 

original article by https://www.inc.com/geoffrey-james/the-information-age-is-dead-were-now-in-conversation-age.html?cid=sf01002&fbclid=IwAR1HIx0PACNsTo8j8y_XndBk6oAsLw5Gb5HXgcmkwxcVtAUedpTGXB-uS8k