Welcome to

Warsaw, PolandWCCCT 2020

2020 World Conference on Computing and Communication Technologies
May 13-15, 2020

CALL FOR PAPERS

WCCCT 2020 will provide a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Computing and Communication Technologies.

Topics of interest for submission include, but are not limited to:



- COMPUTING TECHNOLOGIES -

Artificial Neural Networks and Fuzzy Logic
Cloud Computing
Computational Algorithms
Hybrid Models and Fuzzy Systems
Data Mining
Machine Learning
Meta Heuristics and Swarm Intelligence
Multi-Model Problems and Spatial Distribution
Neuro Fuzzy System
Optimization Methods and Solutions
Self Organizing Maps
Soft Computing
Support Vector Machine
High Performance Computing
Parallel Processing
Virtualization technologies
Web Service Computing, Social Computing, Internet of Things
Architecture, Compilers, Hardware, tools
Data Management
Distributed data systems
Big data & Data Analytics
Multicore and Cluster computing


- WIRELESS COMMUNICATION AND NETWORKING -

Network Interface Virtualization
Network Virtualization Concept and Architecture
Green Datacenter
Higher layers of protocols, application
Physical and link layers and lower layers of protocols
Simulation, Modeling and analysis and performance evaluations
Network management and services
Optical Passive and Active components and devices
Security in Mobile and Wireless Networks
WLAN and Mobile WIMAX, 3G and 4G systems
Wireless Local Loop (WLL)
Multiple Access Technology
Broadband Wireless Access
Wireless Multimedia Services
Cost-effective Rural, Urban and Community Wireless and Mesh Networks
Networking and computing in challenged environment
Policies for communication access development
Sensor networks / alert systems
Mobile-based computing
Wireless, ad-hoc, meshed, etc. networks


- COMMUNICATION TECHNOLOGIES -

Next-generation networking technologies
Cyber security & Infrastructure Management
Information Systems
Network Security
Interactive Communication
Sensor/ad hoc networks
Social interaction, Mobile communications
Ubiquitous Networks
Virtual reality, Cyber law, E-governance
Augmented Reality
Wireless Communication
Mobile Communication


- FUZZY LOGIC AND SOFT-COMPUTING -

Soft Computing based Hybrid Systems
Fuzzy Set and Fuzzy Logic Theory
Neurocomputing
Chaotic Computing
Evolutionary Computing
Fuzzy Data Science
Decision Making with Imperfect Information
Applications of Fuzzy Logic and Soft computing in Economics, Engineering, Medicine, Business etc. 


- DATA SCIENCE AND ADVANCED ANALYTICS -

Advanced Statistical Analytics
Software Techniques and Architectures in Cloud/Grid/Stream Computing
Domain-Specific Applications of Data Analytics
Programming Models and Environments for Cluster, Cloud, and Grid Computing to Support Big Data
MapReduce-based Solutions
New Computational Models for Big Data
Data Visualization at Scale
Forecast of Time Series
Game Data Science
Big Data Open Source Platforms
New Programming Models for Big Data beyond Hadoop/MapReduce
Software Systems to Support Big Data Computing
Data Management in the Social Web
Big Data as a Service
Big Data Industry Standards
Large-Scale data Management and Analysis
Big Data and Mobility
Big Data Analytics in Government, Public Sector and Society in General
Complex Big Data Applications in Verious Areas
Data-intensive Computing and MapReduce


- HIGH PERFORMANCE COMPUTING AND MACHINE LEARNING -

Parallel and Distributed Computing and Systems 
Cluster and Grid Computing 
Peer-to-Peer Architectures and Networks 
High Performance Interconnection Networks 
Partitioning, Mapping, and Scheduling 
Load Balancing and Sharing 
Fault Tolerance and Resilience in HPC Systems 
Benchmarking and Performance Assessment in HPC 
Virtualization and Virtual Machines 
Learning and Intelligence Algorithms 
Artificial Intelligence and Machine Learning at Scale 
Machine Learning on GPUs, TPUs, CPUs 
Deep Learning Techniques 
Computer Vision and Pattern Recognition 
Autonomous Vehicle Navigation 
Facial Recognition and Expression Detection 
Machine Learning in Robotics and Automation 
Open Source Tools for Artificial Intelligence 
Neural Networks and Deep Learning 
Speech & Pattern Recognition

- CYBER SECURITY ISSUES -

High Performance Cryptography 
Visualizing Large Scale Security Data 
Privacy Preserving Big Data Collection/Analytics 
Secure Software Development 
Computer Network Security 
Mobile Smart Phone and Tablet Security 
The Nature of Web Application Hacking and New Security Trends 
Web Application Security Solutions and Best Practices 
Mobile Applications and Security 
Security Threats and Vulnerabilities 
National Approaches and Policies in Cyber Security 
Cyberconflicts: Models and Deterrence Mechanisms 
Deep Understanding of and Practical Skills in Software Security 
Infusing Information Security into the Software-Development Life Cycle 
Cloud Computing and Security 
Government Cyber Security Strategy 
Cyber Security Trends 
Information Security Compliance, Regulations and Legislation 
Security Policy Formulation and Implementation 
Governance Risk and Compliance 
Web/Internet Security

- EMERGING TRENDS AND TECHNOLOGIES IN ICT APPLICATION -

Web-based system 
Green IT Technologies 
Virtualization Concept 
Social Applications 
GIS and Remote Sensing 
Distributed and Parallel Computing Information System Tools, Standards, Architectures, Platforms 
Advanced database and Web Applications 
Cloud Computing 
Distributed Processing 
Decision Support Systems 
Concepts and Development of Information Systems 
New SPI Models: SaaS, PaaS, IaaS, CaaS, XaaS 
Location and mobility semantics 
Social Network Analysis Methods and Applications 
Context-aware Computing and Location-based Services 
Web2 and Web3 new development paradigm 
Web Ontology and Development 
Semantic Web: Concepts, Technologies and Applications 
Augmented Reality 
Service Oriented Architechture

Policies of WCCCT

Review Process:
By submitting a paper to WCCCT, the authors agree to the review process and understand that papers undergo a peer-review process. Manuscripts will be reviewed by appropriately qualified experts in the field selected by the Conference Committee, who will give detailed comments and — if the submission gets accepted — the authors submit a revised ("camera-ready") version that takes into account this feedback. All papers are reviewed using a single-blind review process: authors declare their names and affiliations in the manuscript for the reviewers to see, but reviewers do not know each other's identities, nor do the authors receive information about who has reviewed their manuscript. The Committees of WCCCT 2020 invest great efforts in reviewing the papers submitted to the conference and organising the sessions to enable the participants to gain maximum benefit.

Plagiarism:
WCCCT is utterly intolerant of plagiarism. Submitted papers are expected to contain original work executed by the authors with adequate, proper and scholarly citations to the work of others. It is the job of the authors to clearly identify both their own contribution(s) and also published results / techniques on which they depend or build. Reviewers are charged to ensure these standards are met. If the author is found to commit an act of plagiarism, the following acts of sanction will be taken: 1. Reject the article submitted or delete the article from the final publications. 2. Report the authors violation to his/her supervisor(s) and affiliated institution(s) 3. Report the authors violation to the appropriate overseeing office of academic ethics and research funding agency. 4. Reserve the right to publish the authors name(s), the title of the article, the name(s) of the affiliated institution and the details of misconduct, etc. of the plagiarist”.

Dual/Double Submissions:
By submitting a manuscript to WCCCT, authors acknowledge that it has not been previously published or accepted for publication in substantially similar form in any peer-reviewed venue with publicly accessible papers, including journals, conferences, workshops, or other peer-reviewed, archival forums. Furthermore, no paper substantially similar in content has been or will be submitted to another peer-reviewed conference or workshop with publicly accessible papers during the review period. The authors also attest that they did not submit a substantially similar submission to WCCCT 2020. As a rule of thumb, the WCCCT submission should contain no more than 20 percent of material from previous publications. Violation of any of these conditions will lead to rejection.