<div dir="ltr"><div class="gmail_signature"><div dir="ltr"><div><div>CALL FOR PAPERS</div><div><br></div><div><br></div><div>The Fourth International Conference on Informatics & Applications (ICIA2015)</div><div><br></div><div>July 20-22, 2015 » Takamatsu, Japan</div><div>Kagawa University</div><div><br></div><div>Venue: Takamatsu Symbol Tower</div><div><br></div><div><a href="http://sdiwc.net/conferences/icia2015/">http://sdiwc.net/conferences/icia2015/</a></div><div><br></div><div><a href="mailto:icia2015@sdiwc.net">icia2015@sdiwc.net</a></div><div><br></div><div>==============================================================</div><div><br></div><div>IMPORTANT DATES:</div><div><br></div><div>Submission Deadline<span class="" style="white-space:pre"> </span>open from now until June 20, 2015</div><div>Notification of Acceptance<span class="" style="white-space:pre"> </span>June 20, 2015 or 3 weeks from the submission date</div><div>Camera Ready Submission<span class="" style="white-space:pre"> </span>July 05, 2015</div><div>Registration Deadline<span class="" style="white-space:pre"> </span>July 05, 2015, It is recommended to do it few days before</div><div>Conference Dates<span class="" style="white-space:pre"> </span>July 20-22, 2015</div><div><br></div><div>==============================================================</div><div>PAPER SUBMISSION GUIDELINES:</div><div><br></div><div>- Researchers are encouraged to submit their work electronically. Full paper must be submitted (Abstracts are not acceptable).</div><div>- Submitted paper should not exceed 15 pages, including illustrations. All papers must be without page numbers.</div><div>- Papers should be submitted electronically as pdf format without author(s) name.</div><div>- Paper submission link: <a href="http://sdiwc.net/conferences/icia2015/openconf/openconf.php">http://sdiwc.net/conferences/icia2015/openconf/openconf.php</a></div><div><br></div><div><br></div><div>All registered papers will be included in SDIWC Digital Library</div><div>==============================================================</div><div><br></div><div>The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.</div><div><br></div><div>RESEARCH TOPICS ARE NOT LIMITED TO:</div><div><br></div><div>-Access Controls<span class="" style="white-space:pre"> </span></div><div>-Anti-cyberterrorism</div><div>-Assurance of Service<span class="" style="white-space:pre"> </span></div><div>-Biometrics Technologies</div><div>-Cloud Computing<span class="" style="white-space:pre"> </span></div><div>-Computational Intelligence</div><div>-Computer Crime Prevention and Detection<span class="" style="white-space:pre"> </span></div><div>-Computer Forensics</div><div>-Computer Security<span class="" style="white-space:pre"> </span></div><div>-Confidentiality Protection</div><div>-Critical Computing and Storage<span class="" style="white-space:pre"> </span></div><div>-Critical Infrastructure Management</div><div>-Cryptography and Data Protection<span class="" style="white-space:pre"> </span></div><div>-Data Compression</div><div>-Data Management in Mobile Peer-to-Peer Networks<span class="" style="white-space:pre"> </span></div><div>-Data Mining</div><div>-Data Stream Processing in Mobile/Sensor Networks<span class="" style="white-space:pre"> </span></div><div>-Distributed and Parallel Applications</div><div>-E-Government<span class="" style="white-space:pre"> </span></div><div>-E-Learning</div><div>-E-Technology<span class="" style="white-space:pre"> </span></div><div>-Embedded Systems and Software</div><div>-Forensics, Recognition Technologies and Applications<span class="" style="white-space:pre"> </span></div><div>-Fuzzy and Neural Network Systems</div><div>-Green Computing<span class="" style="white-space:pre"> </span>Grid Computing</div><div>-Image Processing<span class="" style="white-space:pre"> </span></div><div>-Indexing and Query Processing for Moving Objects</div><div>-Information Content Security<span class="" style="white-space:pre"> </span></div><div>-Information Ethics</div><div>-Information Propagation on Social Networks<span class="" style="white-space:pre"> </span></div><div>-Information and Data Management</div><div>-Internet Modeling<span class="" style="white-space:pre"> </span></div><div>-Mobile Networking, Mobility and Nomadicity</div><div>-Mobile Social Networks<span class="" style="white-space:pre"> </span></div><div>-Mobile, Ad Hoc and Sensor Network Management</div><div>-Multimedia Computing<span class="" style="white-space:pre"> </span></div><div>-Network Security</div><div>-Peer-to-Peer Social Networks<span class="" style="white-space:pre"> </span></div><div>-Quality of Service, Scalability and Performance</div><div>-Real-Time Systems<span class="" style="white-space:pre"> </span></div><div>-Resource and Knowledge Discovery Using Social Networks</div><div>-Self-Organizing Networks and Networked Systems<span class="" style="white-space:pre"> </span></div><div>-Semantic Web, Ontologies</div><div>-Sensor Networks and Social Sensing<span class="" style="white-space:pre"> </span></div><div>-Signal Processing, Pattern Recognition and Applications</div><div>-Social Networks<span class="" style="white-space:pre"> </span>Social Search</div><div>-Soft Computing Techniques<span class="" style="white-space:pre"> </span></div><div>-Software Engineering</div><div>-Ubiquitous Computing, Services and Applications<span class="" style="white-space:pre"> </span></div><div>-User Interfaces and Usability Issues for Web Applications</div><div>-User Interfaces,Visualization and Modeling<span class="" style="white-space:pre"> </span></div><div>-Web Services Architecture, Modeling and Design</div><div>-Web Services Security<span class="" style="white-space:pre"> </span>Wireless Communications</div><div>-XML-Based Languages<span class="" style="white-space:pre"> </span></div><div><br></div><div>Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. </div><div><br></div><div>Best selected papers will be published in one of the following special</div><div>issues provided that the author do major improvements and extension within</div><div>the time frame that will be set by the conference and his/her paper is</div><div>approved by the chief editor:</div><div><br></div><div>International Journal of New Computer Architectures and their Applications (IJNCAA)</div><div>International Journal of Digital Information and Wireless Communications (IJDIWC)</div><div>International Journal of Cyber-Security and Digital Forensics (IJCSDF)</div><div>International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM)</div><div><br></div><div style="font-weight:bold"><br></div></div></div></div>
</div>