{"id":28162,"date":"2019-04-21T21:33:12","date_gmt":"2019-04-21T13:33:12","guid":{"rendered":"http:\/\/people.utm.my\/nurazaliah\/?p=28162"},"modified":"2019-05-02T21:34:16","modified_gmt":"2019-05-02T13:34:16","slug":"4th-international-conference-of-reliable-information-and-communication-technology-2019-irict-2019","status":"publish","type":"post","link":"https:\/\/people.utm.my\/nurazaliah\/2019\/04\/21\/4th-international-conference-of-reliable-information-and-communication-technology-2019-irict-2019\/","title":{"rendered":"4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019)."},"content":{"rendered":"<p><a href=\"http:\/\/irict.co\/irict2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/irict.co\/irict2019\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<header class=\"entry-header\">\n<h1 class=\"post-title entry-title\"><a href=\"http:\/\/irict.co\/irict2019\/call-for-paper\/\" rel=\"bookmark\">Call for Papers<\/a><\/h1>\n<\/header>\n<div class=\"entry-content clearfix\">\n<h5><\/h5>\n<p class=\"ht\">All submitted papers will be reviewed and evaluated based on the originality, technical, research content, contributions, and readability.<\/p>\n<h4>Submission of Full Papers<\/h4>\n<hr \/>\n<p>Prospective authors are invited to submit their full papers in English. The papers should address the burning and targeted issues of this conference. The abstract should not be more than 400 words which should include the aims and objectives, methods, results and conclusion of the paper. The length of the full paper should not be more than ten pages including the references. Please refer to the following\u00a0paper template:<a href=\"http:\/\/irict.co\/wp-content\/uploads\/2018\/02\/IRICT2018-Springer-Word-format.docm\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-76\" src=\"http:\/\/www.ysrgst.org\/irict\/wp-content\/uploads\/2014\/05\/download.png\" alt=\"download\" width=\"79\" height=\"81\" \/><\/a><strong>Click\u00a0 on<\/strong>\u00a0<a href=\"http:\/\/irict.co\/wp-content\/uploads\/2018\/02\/IRICT2018-Springer-Word-format.docm\">Springer Template\u00a0<\/a><strong>to download the\u00a0IRICT\u00a02019\u00a0paper template<\/strong><\/p>\n<p><strong>Submit your paper to<\/strong>\u00a0<a href=\"https:\/\/easychair.org\/conferences\/?conf=irict2019\">IRICT\u00a02019\u00a0EasyChair account<\/a><\/p>\n<h4><strong>Conference Tracks<\/strong><\/h4>\n<hr \/>\n<p>The topics are included below, but not limited to:<\/p>\n<p><strong>\u00a0<\/strong><strong>1. Artificial Intelligence and Soft Computing<br \/>\n<\/strong><\/p>\n<p><strong><em>Topics:<\/em><\/strong><\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Natural Language Processing<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fuzzy Logic<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Knowledge Acquisition and Expert Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Design Automation<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reasoning and Decision Support Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hybrid Algorithms<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Genetic Algorithms<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Machine Learning<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Deep Learning<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Multi-Objective Optimization<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Computational Intelligence<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Neural Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evolutionary Algorithms<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Differential Evolution<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Combinatorial Optimization<\/p>\n<p class=\"lc\"><strong>2. Data Science and Big Data Analytics<\/strong><\/p>\n<p class=\"lc\"><em><strong>Topics:<\/strong><\/em><\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data mining and knowledge discovery<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Machine learning<br \/>\n\u2013\u00a0 \u00a0 \u00a0 \u00a0Pattern recognition<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Big Data Analytics and data science<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data-driven problem solving<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Distributed Database Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Mining<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Warehouse<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Knowledge Data Engineering<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Behavioral Mining<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Decision Trees<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bioinformatics<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Chemoinforamtics<\/p>\n<p class=\"lc\"><strong>3. Business Intelligence\u00a0<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 Business Analytics<br \/>\n\u2013\u00a0 \u00a0 Customer Analytics<br \/>\n\u2013\u00a0 \u00a0 Financial Analytics<br \/>\n\u2013\u00a0 \u00a0 Bioinformatics<br \/>\n\u2013\u00a0 \u00a0 Talent Analytics<br \/>\n\u2013\u00a0 \u00a0 Information Analytics<br \/>\n\u2013\u00a0 \u00a0 Marketing Analytics<br \/>\n\u2013\u00a0 \u00a0 BI and Analytics in Intelligence and Security Informatics<br \/>\n\u2013\u00a0 \u00a0 Predictive analytics and knowledge management approaches<br \/>\n\u2013\u00a0 \u00a0 Big data solutions and applications<br \/>\n\u2013\u00a0 \u00a0 Social media intelligence and analytics<br \/>\n\u2013\u00a0 \u00a0 Business Intelligence Systems Implementation<br \/>\n\u2013\u00a0 \u00a0 Business Intelligence, Analytics in Healthcare<br \/>\n\u2013\u00a0 \u00a0 Business Intelligence for Organizational Performance Management<br \/>\n\u2013\u00a0 \u00a0 Predictive Analytics: Definition, Implementation, and Usage<\/p>\n<p><strong>4. Internet of Things (IoT)\u00a0<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><\/p>\n<p>\u2013\u00a0 \u00a0 Web Technologies for the IoT<br \/>\n\u2013\u00a0 \u00a0 Real World Applications of IoT technology<br \/>\n\u2013\u00a0 \u00a0 Internet of Things Architecture<br \/>\n\u2013\u00a0 \u00a0 Social Acceptance of IoT Systems<br \/>\n\u2013\u00a0 \u00a0 Smart Home<br \/>\n\u2013\u00a0 \u00a0 Smart Cities<br \/>\n\u2013\u00a0 \u00a0 IoT for healthcare<br \/>\n\u2013\u00a0 \u00a0 IoT security<br \/>\n\u2013\u00a0 \u00a0 IoT Data Analytics<\/p>\n<p><strong>5. Intelligent Communication Systems\u00a0<\/strong><\/p>\n<p><strong><em>Topics:<\/em><\/strong><\/p>\n<p>\u2013\u00a0\u00a0 \u00a0 \u00a0\u00a0Computer Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Communications<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Computing<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Sensor Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networked Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Architecture<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Operations and Management<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Analyzing &amp; Programming<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LAN &amp; WAN Technologies<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Internet Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Future Internet Engineering<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network issues in quantum technologies<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Industrial Computer Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networked Control Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Green Networking<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ad hoc and Sensor Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vehicular Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Networking and Services<\/p>\n<p><strong>6.\u00a0 Advances in Information Security<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Access control<br \/>\n\u2013\u00a0 \u00a0 Applied cryptography<br \/>\n\u2013\u00a0 \u00a0 Authentication and authorization<br \/>\n\u2013\u00a0 \u00a0 Biometric security<br \/>\n\u2013\u00a0 \u00a0 Data and system integrity<br \/>\n\u2013\u00a0 \u00a0 Database security<br \/>\n\u2013\u00a0 \u00a0 Distributed systems security<br \/>\n\u2013\u00a0 \u00a0 Grid security<br \/>\n\u2013\u00a0 \u00a0 Information hiding and watermarking<br \/>\n\u2013\u00a0 \u00a0 Intrusion detection<br \/>\n\u2013\u00a0 \u00a0 Key management and key recovery<br \/>\n\u2013\u00a0 \u00a0 Network security<br \/>\n\u2013\u00a0 \u00a0 Security for mobile computing<br \/>\n\u2013\u00a0 \u00a0 Trusted computing<br \/>\n\u2013\u00a0 \u00a0 Data and Network Security &amp; Safety<br \/>\n\u2013\u00a0 \u00a0 Cryptographic Applications for Networks<\/p>\n<p><strong>7. Computational Vision and Robotics Technology<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 Computer vision, AI applications<br \/>\n\u2013\u00a0 \u00a0 Computer games and animation<br \/>\n\u2013\u00a0 \u00a0 Computational geometry<br \/>\n\u2013\u00a0 \u00a0 Shape\/range\/motion analysis<br \/>\n\u2013\u00a0 \u00a0 Signal\/image processing<br \/>\n\u2013\u00a0 \u00a0 Image matching, medical imaging<br \/>\n\u2013\u00a0 \u00a0 Pattern\/face recognition<br \/>\n\u2013\u00a0 \u00a0 Architecture, languages<br \/>\n\u2013\u00a0 \u00a0 Parallel computer vision<br \/>\n\u2013\u00a0 \u00a0 Interactive computational models<br \/>\n\u2013\u00a0 \u00a0 Biological vision, alternative eyes<br \/>\n\u2013\u00a0 \u00a0 Renewable Energy and Sustainability<\/p>\n<p><strong>8. Multimedia Applications and Services<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 Media Representation and Algorithms<br \/>\n\u2013\u00a0 \u00a0 Audio, Image, Video Processing, Coding and Compression<br \/>\n\u2013\u00a0 \u00a0 Multimedia Sensors and Interaction Modes<br \/>\n\u2013\u00a0 \u00a0 Multimedia Privacy, Security and Content Protection<br \/>\n\u2013\u00a0 \u00a0 Multimedia Standards and Related Issues<br \/>\n\u2013\u00a0 \u00a0 Advances in Multimedia Networking and Streaming<br \/>\n\u2013\u00a0 \u00a0 Multimedia Databases, Content Delivery and Transport<br \/>\n\u2013\u00a0 \u00a0 Wireless and Mobile Multimedia Networking<\/p>\n<p><strong>9. Advanced Information Systems<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 Knowledge management, decision making and big data<br \/>\n\u2013\u00a0 \u00a0 Enterprise systems, processes, modelling and management<br \/>\n\u2013\u00a0 \u00a0 Diversity, inclusion and cross cultural issues<br \/>\n\u2013\u00a0 \u00a0 HCI, the user experience and human centred IS<br \/>\n\u2013\u00a0 \u00a0 Health Informatics<br \/>\n\u2013\u00a0 \u00a0 IS innovation, strategy and IT governance<br \/>\n\u2013\u00a0 \u00a0 IS development, design and project management<br \/>\n\u2013\u00a0 \u00a0 IS education, training and learning technologies<br \/>\n\u2013\u00a0 \u00a0 IS in emergencies and responsive systems<br \/>\n\u2013\u00a0 \u00a0 IS research, theory, philosophy and methods<br \/>\n\u2013\u00a0 \u00a0 Social media and related technologies<br \/>\n\u2013\u00a0 \u00a0 Green IS and sustainability<\/p>\n<p><strong>10. Software Engineering<\/strong><\/p>\n<p><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 Development Environments and Tools<br \/>\n\u2013\u00a0 \u00a0 Programming languages, Hybrid and Native applications<br \/>\n\u2013\u00a0 \u00a0 Agile or Model driven development<br \/>\n\u2013\u00a0 \u00a0 Energy Efficient, resource aware development<br \/>\n\u2013\u00a0 \u00a0 Testing, Maintenance, Debugging techniques and tools<br \/>\n\u2013\u00a0 \u00a0 Analysis and Re-engineering of Mobile Apps<br \/>\n\u2013\u00a0 \u00a0 Cloud support and scalability<br \/>\n\u2013\u00a0 \u00a0 Empirical studies, Industry experiences<br \/>\n\u2013\u00a0 \u00a0 Static and Dynamic Analysis<br \/>\n\u2013\u00a0 \u00a0 User experience and New input devices<br \/>\n\u2013\u00a0 \u00a0 Applications of Mobile Apps<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/irict.co\/irict2019\/ &nbsp; Call for Papers All submitted papers will be reviewed and evaluated based on the originality, technical, research content, contributions, and readability. Submission of Full Papers Prospective authors are invited to submit their full papers in English. The papers should address the burning and targeted issues of this conference. The abstract should not be [&hellip;]<\/p>\n","protected":false},"author":6541,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-28162","post","type-post","status-publish","format-standard","hentry","category-conference"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/posts\/28162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/users\/6541"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/comments?post=28162"}],"version-history":[{"count":1,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/posts\/28162\/revisions"}],"predecessor-version":[{"id":28163,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/posts\/28162\/revisions\/28163"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/media?parent=28162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/categories?post=28162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/nurazaliah\/wp-json\/wp\/v2\/tags?post=28162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}