Call for Papers
WICT 2022 invites authors to submit full papers to the general track, one of the special tracks or symposiums. Submitted papers should be original and contain contributions of theoretical, experimental or application nature, or be unique experience reports focusing on (but not limited to) the following topics:
|
GENERAL TRACK:
Bioinformatics and Computational Biology:
Microarrays, Molecular Dynamics and Simulation, Molecular Sequence Classification, Alignment and Assembly, Computational Systems Biology, Gene Pattern Discovery And Identification, Comparative Genomics, Biomedical Engineering, Biological Data Mining and Knowledge Discovery, Data Integration And Visualization, Image Processing In Biological Sciences, Protein Modeling, Evolution and Phylogenetics, Medical Informatics, Computational Drug Discovery, Cancer Informatics, etc.
Computer Graphics and Virtual Reality:
Computer Animation, Computer Graphics, Compression Methods, Computational Geometry, Color and Texture, Visualization, Surface Modeling, Computer Art and Entertainment, Interactive Digital Media, 3D Reconstruction, Visual Computing And Graphics, Graphics Algorithms and Applications, Virtual Environments, Virtual Laboratories, Virtual Reality Tools/Languages, Human-Computer Interfaces, Haptic Devices, etc.
Data Mining:
Regression/Classification, Segmentation/Clustering/Association, Deviation and Outlier Detection, Visual Data Mining, Web Mining, Mining Text And Semi-Structured Data, Temporal and Spatial Data Mining, Multimedia Mining (Audio/Video), Mining Large Scale Data, Distributed and Grid Based Data Mining, Data Cleaning and Preparation, Feature Selection and Transformation, Attribute Discretisation and Encoding, etc.
e-Learning:
Computer-Supported Collaborative Learning, Live and Virtualized Collaborative Learning, Collaborative Learning Applications and Case Studies, E-Learning Design and Methodologies, Audio and Video Technologies for E-Learning, E-Learning Technologies and Tools, On-Demand E-Learning, Assessment Methodologies, Virtual Learning Environments, e-Universities, etc.
e-Business:
e-Business systems, Electronic negotiation and protocols, Payment systems, e-Procurement methods, Techniques for B2B e-Commerce, Service-oriented e-Commerce, Trust, security, and privacy, Development of e-Business and applications, Supply chain management, e-Retailing and web design, Applications of new technologies to e-Business, Middleware technologies to support e-business, Case studies and applications, B2B and B2C applications, Entrepreneurial E-Business Best Practices, Legal, Ethical, Cultural, Training and Social Issues related to E-Business, Knowledge Management through New Generation E-Business, etc.
e-Government:
e-Democracy and e-Voting, e-Government, Technologies to Prevent Corruption, Methods and Tools for e-Government, Policies and Strategies, Trust and Security in e-Government, Enterprise Architecture for e-Government, Case Studies, etc.
Artificial Intelligence:
Applications on AmI, Context-aware, Ambient Assisted Living, Ubiquitous Computing, Artificial Intelligence for AmI, Distributed Computing for AmI, Home Automation, Pervasive Computing, Agent & Multiagent Systems for AmI, Mobile Sensing and Mobile Computing, Computational Creativity, Sentient Computing, e-Health, Context Modelling, e Learning, etc.
Web Services and Semantic Web:
Web Services and Semantic Web, Enhancements to the Basic Web Services Platform, Workflow/Process Management, Quality-of-Service (Qos), Web Service Architectures, Fault-Tolerant Architectures, E-Commerce Applications using Web Services, Mobile and Wireless Applications, On-Demand Utility Using Web Services, Applications of Web Services, Semantic Web for E-Business and E-Learning, Trust Networks on Semantic Web, Semantic Web Mining, Semantic Web Services, Semantic Searching Semantic Interoperability, Autonomous Semantic Web Services, etc.
Grid and Cloud Computing:
Software Technologies in Grid Systems, Policy Requirements and Implications, Grid Technology and Security, Grid Middleware and Toolkits, Grid Monitoring, Management and Organization Tools, Cloud Computing, Internet-Based Computing Models, Resource Management, Scheduling and Run-Time Environments, Creation and Management of Virtual Enterprises, Autonomic & Utility Computing on Global Grids, Data Grid Management Systems, Metadata, Ontologies and Provenance, P2P Computing, etc.
Ambient Intelligence:
Applications on AmI, Context-aware, Ambient Assisted Living, Ubiquitous Computing, Artificial Intelligence for AmI, Distributed Computing for AmI, Home Automation, Pervasive Computing, Agent & Multiagent Systems for AmI, Mobile Sensing and Mobile Computing, Computational Creativity, Sentient Computing, e-Health, Context Modelling, e Learning, etc.
Body Sensor Networks:
In-body, on-body, and around body networks, Sport and leisure applications, Sensor technology and biocompatibility, Home monitoring and assisted living applications, Wearable and implantable sensor integration and development platforms, Wearable biomotion sensors to monitor human activity for diagnosis, therapy, training, sports, Links from the body to environment sensing, smart dwellings, and home monitoring, Networking and security issues for BSN, Pervasive health care and patient monitoring, Integrating BNS into the healthcare system, Novel wireless communication technologies Wearable system design issues, Lower power electronics, power sources and energy harvesting BSN architecture and platforms, Entertainment and lifestyle applications, Assistive technologies for independent aging, Programming Environment of BSN nodes, BSN Sensor Interface, Wireless Sensing, Vision Sensor Networks (VSN), Medical applications, etc.
Computational Finance and Economics:
Portfolio Optimization, Risk Management, Asset Allocation, Trading Systems, Forecasting, Financial Data Mining, Hedging Strategies, Risk Arbitrage, Behavioral Finance, Exotic Options, Algorithmic Trading, High Frequency Trading, Agent-Based Computational Economics, Computational Intelligence Based Models For Financial Engineering Applications, Neural Networks, Probabilistic Modeling/Inference, Fuzzy Sets, Rough Sets, & Granular Computing, Time Series Analysis, Non-Linear Dynamics, Evolutionary Algorithms, Swarm Intelligence, etc.
Cybercrime (Legal and Technical Issues):
Intrusion Investigations, Cybercrime Laws, Charging Cybercrimes, Peer To Peer Applications, Search and Seizure Policy Procedures, Protecting and Storing Digital Evidence Equipment, Hacking, Cracking And Malicious Codes, Cryptography, Information Assurance, Intellectual Property Rights In Cyberspace, Internet Security, Trademarks and Domain Names Protection, E-Signature And Computer Forensic, etc.
Computer Network Security:
Access Control, Intrusion Detection & Prevention, Identification, Authentication and Non-Repudiation, Identity Management, Biometrics Security and Privacy, Human Factors and Human Behaviour, Recognition Techniques, Digital Forensics, Network Security, Security For Grid and Cloud Computing, Security In Distributed Systems, Sensor and Mobile Ad Hoc Network Security, Trust Management and Reputation Systems, Ubiquitous Computing Security, Wireless Network Security, etc.
Data Mining for Information Security:
Data Mining in Intrusion Detection, Data Mining for Cyber Forensics, Credit Card Fraud Detection, Information Security and Privacy in Healthcare Applications, Cyber Security, Homeland Security, Intrusion Detection using Intelligent Agents, Intelligence Surveillance, Legal Standards for Data Mining, Counterterrorism Technology And Privacy, Information Warfare, Information Hiding And Security, Security and Criminal Detection, Web Data Mining for Security Applications, Ethical Hacking, Intrusion Detection in Sensor Network, Social Implications, Mining Data Streams for Intrusion Detection, Intelligent Intrusion Detection Systems, Cyber Forensic and Malicious Code Analysis, Spam Filtering Algorithms and Fraud Analysis, Privacy-Preserving Data Mining and Data Mining Over Data Streams, Secured Mobile Payment Systems, Enterprise Security Infrastructures, etc.
Academic Integrity, Plagiarism Detection and Software Misuse:
Academic Dishonesty, Integrity and Use of Anti-Plagiarism Detectors, Source Archives for Plagiarism Detection, External Plagiarism Detection, Intrinsic Plagiarism Detection, Authorship Attribution/Identification/Classification, Code Clones and Software Misuse Detection, Plagiarism Detection in Secured Systems, Lessons Learned from Universities Policies and Rules Against Plagiarism, etc.
Intrusion Detection and Forensics:
Host and Network Based Approaches, Anomaly and Specification-Based Approaches, Lightweight, Data Mining and Soft Computing Approaches, Hybrid Approaches to Information Discovery and Intrusion Detection, Formal Models, Framework And Architectures, Botnets And Vulnerabilities, Malware, Worm, Virus and Spyware, Insider Attack Detection and Investigation, High Performance and Real-Time Environments, Including Large-Scale, High Data Volume/ High-Speed Networks, Highly Distributed and Heterogeneous Environments, Embedded System and Small Scale Environments, Special Environments, Including Wireless, Mobile, Sensor Networks and Smart Grid, Virtual and Cloud Environments, Social Network Analysis, Deception Systems and Honeypots, Incident Response and Live Analysis, Traceback and Attribution, Event Reconstruction Methods and Tools, Attacks Against IDS, IDS Protection and Tolerance, Anti-Forensics and Anti-Anti-Forensics, Visualization Techniques, Performance Evaluation, Metrics and Benchmarking, Commercial Products and Their Directions, Test Beds and Datasets, etc.
Scheduling For Large Scale Distributed System:
Scheduling for Large Scale Distributed System, Grid Scheduling Architectures, Cluster, Grid, Heterogeneous Platforms Scheduling, P2P Scheduling, Scheduling for Cloud Systems, Parallel Scheduling Systems, Resource Allocation and Management, Network Resource Allocation, Advance Resource Reservation and Scheduling, Multi-Level Scheduling Strategies, Scheduling of High Performance Parallel Applications, Production Scheduling, Load Sharing and Load Balancing Techniques, Scheduling Workload Measuring and Modeling, Scheduling Data Intensive Jobs
Scheduling on Heterogeneous Nodes, Co-Scheduling, Evaluation and Benchmarking of Scheduling Systems, Simulation of Scheduling Systems, New Scheduling Models, Bio-Inspired Scheduling Algorithms, etc.
Nature Inspired Optimization Algorithms And Their Applications:
Theory of Nature Inspired Optimization Algorithms, Parameter Settings in Nature Inspired Optimization Algorithms, Adaptive Nature Inspired Optimization Algorithms, Multi-Objective Nature Inspired Optimization Algorithms, Nature Inspired Optimization Algorithms for Noisy Problems, Nature Inspired Optimization Algorithms for Constrained Optimization, Hybridization of Nature Inspired Optimization Algorithms With Local Search and Other Soft Computing Approaches, Comparison of Nature Inspired Optimization Algorithms with Other Techniques, Parallel Implementation, Real World/ Novel Applications, New Concepts for Nature Inspired Optimization Algorithms, etc.
The Role of Technology in Education and Health:
The Role of Technology In Education and Health, Enhancing Assessment and Feedback Through Technology, Using Web 2.0 Technology To Improve Collaboration Across The Education and Health Sectors, Innovative Tools And Technologies To Support Learning, Design Principles For Collaborative Learning, Networked Learning Communities, Development and Evaluation of Learning Environments, Learning Systems Platforms And Architectures, E-Learning And Knowledge Management Releasing, Sharing, and Using Openly Accessible Online Teaching Materials (OER), ICT In Education And Health Care: Sociotechnical Approaches, Using Technology To Enhance Pedagogic Quality Whilst Maintaining Cost Efficiencies, Using Technology To Enhance Digital Inclusion, Using Technology To Support Those With Learning Difficulties, etc.
Data Management:
Querying Languages (Optimization, Query Routing, Network Clustering), Distributed and Parallel Aspects of Databases, Dynamic Aspects of Databases (Updates, Views, Real-Time And Sensor Data, Approximate Query Answering, Data Streams), Incompleteness, Inconsistency, and Uncertainty in Databases, Schema Mapping and Query Extraction, Data Integration, Exchange and Modeling Data Availability, Provenance and Flows, Metadata Management Et Querying, Semantic-Web Data and Ontologies, Constraints (Specification, Reasoning, Mining), Privacy and Security of Date Automatic Verification of Database-Driven Systems, Model Theory, Logics, Algebras, Data Structures Design and Database Languages, Domain-Specific Databases (Multi-Media, Scientific, Spatial, Temporal, Text), Scalability of Data Sharing Systems, Ontology Mapping in P2P Networks, Peer Data Management Systems, etc.
Collaborative Design in Knowledge-based Environment:
Architecture of Product Data Communication Systems, CAD Kernels Management In Active Semantic Network, Computer Supported Collaborative Design (CSCD), Conflict Management in Collaborative Design, Design of Product Data Repository and Retrieval Systems, Distributed Design Network Based On Cloud Computing, Intelligent Collaborative Design, Modular and Multi-Agent Collaborative Design, Ontology-Based Design Evaluation and Optimization, Product Data Communication in Active Semantic Network, Reusable Design Components in Knowledge-Based Environment, Semantic Web Service for Collaborative Design, Tracking of Design Changes in Collaborative Design, Web-Based Collaborative Design, etc.
Software Engineering:
Distributed, Web-Based and Internet-Scale Software Engineering, Enterprise Software, Middleware and Tools, Intelligent Software Design Techniques, Intelligent Software Maintenance, Knowledge Acquisition, Knowledge Visualization, Knowledge-Based Software Engineering, Model-Driven Software Engineering, Ontologies and Methodologies, Patterns and Frameworks, Process and Workflow Management, Program Comprehension and Visualization, Quality of Services, Reengineering and Reverse Engineering, Requirements Engineering, Semantic Web, Service-Centric Software Engineering, Software Architecture, Software Assurance, Quality, Reuse, Safety and Security, Software Economics and Metrics, Software Evolution, Software Testing and Analysis, Software Requirements Engineering, etc.