International Conference on New Computer Science and Engineering Trends
Total Page:16
File Type:pdf, Size:1020Kb
INTERNATIONAL CONFERENCE ON NEW COMPUTER SCIENCE AND ENGINEERING TRENDS Saturday and Sunday 3rd-4th December 2021 NCSET2021 is an International forum for new trends in Computer Science and Engineering. The conference welcome unpublished papers in different tracks in the fields of Computer Science and Engineering. NCSET2020 for the first time gathers research specialists from different backgrounds for a discussion meeting. It will build a fruitful relationship between the authors for future collaboration. All papers are reviewed using a blind review process: authors declare their names and affiliations in the manuscript for the reviewers to see, but reviewers do not know each other’s identities, nor do the authors receive information about who has reviewed their manuscript. IMPORTANT DATES Submission Deadline: Open Acceptance Notification: Two weeks from the submission Special Session Proposal Deadline: April 30, 2021 Special Session Acceptance Notification: Within a week from the submission. NCSET2021 welcomes original papers in the following areas, but not limited to: 1. Networks 2. Computational Intelligence • Computer and Network Security • Computer networks • Fuzzy Computation • Cross-border network-based information systems • Evolutionary Computation • Design and performance evaluation of new • Neural Computation network application and systems • Ant colony optimization • Designing, deploying and using networked • Artificial immune systems systems in specialized sectors (i.e. Health, • Bioinformatics and bioengineering Education, Manufacturing) • Evolvable hardware and software • Emerging networking trends • Evolving neural networks and fuzzy • Enterprise networks systems • Grid, cluster and Internet computing • Granular computing • Internetworking and network protocols • Hardware implementation • Mobile computing, mobile networks, and mobile • Hybrid optimisation algorithms agents • Image and signal processing • Mobility and m-commerce issues • Multi-objective optimization • Network architectures, services, switching, • Memetic and hybrid algorithms routing, and applications • Pattern recognition • Network convergence • Robotic and control applications • Network management and security • Swarm Intelligence • Network measurements, performance analysis and evaluation • Time series analysis • Network pricing issues and strategies • Telecommunications • Network Resource and QoS • Transportation systems • Optical network • Other related topics ..... • Outsourcing of networking and data communication services 3. Modeling, Simulation, • Peer-to-peer and Control • Pervasive Computing Environments • Sensor, mesh, and ad hoc networks • Standards and network interoperability issues • Modeling method and optimization • Strategic use of networking technologies • System modeling and simulation • Success factors of networked systems • Software development and system simulation • Telecommuting, remote access and VPN • Modeling and dynamic analysis of • IoT and IoE mechanical system • Smart City • Computer information engineering and • Advanced communication techniques image processing • Antenna technologies • Communication and information system • Communication theory • Simulation Tools and Platforms • Communications protocols • Computational Modeling, Simulation, • Satellite techniques and theories Optimization and Algorithm • Broadband & Photonics techniques • Optimization Methods • Other related topics..... • Control Theory and Applications: • Control Theory • Linear Control • Non-Linear Control • Next generation intelligent control architectures • Energy Efficiency and methods. • Software Engineering for IoT and IoE • Intelligent Control • Smart City and Transportation • Adaptive Control • Education and Learning • Predictive Control • Business, Finance and Management • Multiagent based planning, control and • Biomedical Experiments and Simulations intelligence • Healthcare Services and Health • Distributed/decentralized intelligent control Informatics • Neural networks, fuzzy logic and genetic • Encryption (All Aspects) algorithms • Firewall, Access Control, Identity • Swarm intelligence, learning and control Management • Intelligent control of networked dynamic systems • Experiments on Using Security Solutions • Intelligent control of wireless ad hoc and sensor and Proof-of-Concepts networks • Intrusion and Detection Techniques • Embedded intelligent control • Social Engineering and Ethical Hacking: • Biological learning control systems Techniques and Case Studies • Hybrid dynamical systems • Security • Petri nets • Access Control • Hierarchical control • Applied Cryptography • Discrete event systems • Biometrics Security and Privacy • Information-based models for control • Critical Infrastructure Protection • Distributed control systems • Data Integrity • System modeling, simulation and architectures • Data Protection • Cybernetics • Database Security and Privacy • Computer and microprocessor-based control • Digital Forensics • Hierarchical control • Digital Rights Management • Instrumentation networks and software • Ethical and Legal Implications of Security • Field-buses and Privacy • Real-time systems control • Formal Methods for Security • Other related topics.. • Human Factors and Human Behavior Recognition Techniques • Identification, Authentication and Non- Repudiation 4. IoT and Big Data • Identity Management • Information Hiding • Big Data Research • Information Systems Auditing • Emerging Services and Analysis • Insider Threats and Countermeasures • Internet of Things (IoT) Fundamentals • Intellectual Property Protection • Internet of Things (IoT) Applications • Intrusion Detection & Prevention • Big Data Multi-Discipline • Management of Computing Security • Security , Privacy , and Trust • Network Security • IoT Technologies • Organizational Security Policies • Analytics, Intelligence and Knowledge • Peer-to-Peer Security Engineering • Personal Data Protection for Information • Data Center Enabled Technologies Systems • Networking and Social Networks • Privacy • Data Management for Large Data • Privacy Enhancing Technologies • Machine to Machine Communications • Reliability and Dependability • Risk Assessment • Mobile Robots and Intelligent • Secure Software Development Methodologies Autonomous Systems • Security and Privacy for Big Data • Modeling and identification • Security and Privacy in Complex Systems • Motion planning and learning • Security and Privacy in Crowdsourcing • Peer-to-Peer Security • Security and Privacy in IT Outsourcing • Personal Data Protection for Information • Security and Privacy in Location-Based Services Systems • Security and Privacy in Mobile Systems • Privacy • Security and Privacy in Pervasive/Ubiquitous • Privacy Enhancing Technologies Computing • Reliability and Dependability • Security and Privacy in Smart Grids • Risk Assessment • Security and Privacy in Social Networks • Secure Software Development • Security and Privacy in the Cloud Methodologies • Security and Privacy in Web Services • Security and Privacy for Big Data • Security and Privacy Policies • Security and Privacy in Complex Systems • Security Area Control • Security and Privacy in Crowdsourcing • Security Deployment • Security and Privacy in IT Outsourcing • Security Engineering • Security and Privacy in Location-Based • Security in Distributed Systems Services • Security Information Systems Architecture • Security and Privacy in Mobile Systems • Security Management • Security and Privacy in • Security Metrics and Measurement Pervasive/Ubiquitous Computing • Security Protocols • Security and Privacy in Smart Grids • Security Requirements • Security and Privacy in Social Networks • Security Verification and Validation • Security and Privacy in the Cloud • Sensor and Mobile Ad Hoc Network Security • Security and Privacy in Web Services • Service and Systems Design and QoS Network • Security and Privacy Policies Security • Security Area Control • Software Security • Security Deployment • Trust Management and Reputation Systems • Security Engineering • Ubiquitous Computing Security • Security in Distributed Systems • Wireless Network Security • Security Information Systems Architecture • Security Management 5. Security • Security Metrics and Measurement • Security Protocols 6. • Security Requirements • Access Control • Security Verification and Validation • Applied Cryptography • Sensor and Mobile Ad Hoc Network • Biometrics Security and Privacy Security • Critical Infrastructure Protection • Service and Systems Design and QoS • Data Integrity Network Security • Data Protection • Software Security • Database Security and Privacy • Trust Management and Reputation • Digital Forensics Systems • Digital Rights Management • Ubiquitous Computing Security • Ethical and Legal Implications of Security and • Wireless Network Security Privacy • Formal Methods for Security • Human Factors and Human Behavior Recognition Techniques 7. Advanced Robotics • Identification, Authentication and Non-Repudiation • Identity Management • Aerial and underwater robotics • Information Hiding • Bio-inspired robotics • Information Systems Auditing • Cable robots, cognitive robotics • Insider Threats and Countermeasures • Cognitive Approach for Robotics • Intellectual Property Protection • Collaborative robotics • Intrusion Detection & Prevention • Collective and Social Robots • Management of Computing Security • Control and Supervision Systems • Network Security • Human-Robots Interfaces • Organizational Security Policies • Humanoid Robots • Humanoids