Warning: include(/home/sdiwcn5/public_html/conferences/7th-international-informatics-applications/wp-content/plugins/wp-super-cache/rest/load.php): failed to open stream: No such file or directory in /home/sdiwcn5/public_html/conferences/6th-international-informatics-applications/wp-content/plugins/wp-super-cache/wp-cache.php on line 67

Warning: include(): Failed opening '/home/sdiwcn5/public_html/conferences/7th-international-informatics-applications/wp-content/plugins/wp-super-cache/rest/load.php' for inclusion (include_path='.:/usr/lib/php:/usr/local/lib/php') in /home/sdiwcn5/public_html/conferences/6th-international-informatics-applications/wp-content/plugins/wp-super-cache/wp-cache.php on line 67

Warning: Cannot modify header information - headers already sent by (output started at /home/sdiwcn5/public_html/conferences/6th-international-informatics-applications/wp-content/plugins/wp-super-cache/wp-cache.php:67) in /home/sdiwcn5/public_html/conferences/7th-international-informatics-applications/wp-content/plugins/wp-super-cache/wp-cache-phase2.php on line 60
The Sixth International Conference on Informatics and Applications | Just another WordPress site
The submission deadline has been extended to July 7, 2017

Home

You are invited to participate in The Sixth International Conference on Informatics and Applications (ICIA2017) that will be held in Takamatsu Sunport Hall Building, Japan on July 31 - August 2, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

The conference welcomes papers on the following (but not limited to) research topics:
Access Controls Anti-cyberterrorism
Assurance of Service Biometrics Technologies
Cloud Computing Computational Intelligence
Computer Crime Prevention and Detection Computer Forensics
Computer Security Confidentiality Protection
Critical Computing and Storage Critical Infrastructure Management
Cryptography and Data Protection Data Compression
Data Management in Mobile Peer-to-Peer Networks Data Mining
Data Stream Processing in Mobile/Sensor Networks Distributed and Parallel Applications
E-Government E-Learning
E-Technology Embedded Systems and Software
Forensics, Recognition Technologies and Applications Fuzzy and Neural Network Systems
Green Computing Grid Computing
Image Processing Indexing and Query Processing for Moving Objects
Information Content Security Information Ethics
Information Propagation on Social Networks Information and Data Management
Internet Modeling Mobile Networking, Mobility and Nomadicity
Mobile Social Networks Mobile, Ad Hoc and Sensor Network Management
Multimedia Computing Network Security
Peer-to-Peer Social Networks Quality of Service, Scalability and Performance
Real-Time Systems Resource and Knowledge Discovery Using Social Networks
Self-Organizing Networks and Networked Systems Semantic Web, Ontologies
Sensor Networks and Social Sensing Signal Processing, Pattern Recognition and Applications
Social Networks Social Search
Soft Computing Techniques Software Engineering
Ubiquitous Computing, Services and Applications User Interfaces and Usability Issues for Web Applications
User Interfaces,Visualization and Modeling Web Services Architecture, Modeling and Design
Web Services Security Wireless Communications
XML-Based Languages Effective Computing

All the submitted papers will be reviewed by a minimum of two reviewers, and all the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, BEST registered papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: