The conference welcome papers on the following (but not limited to) research topics: |
Information System Security |
Telecommunication and Networks |
Data Resource Management |
Information Security Models |
Network Monitoring |
Information Classification Methods |
Security, Ethical, and Social Challenges |
Cyber Security Models |
Cyber Security Risk Evaluation |
Artificial Intelligence Technologies in Business |
Using Information Technology for Strategic Advantages |
Access Control Mechanisms and Data Classification |
Information Technology Security Evaluation Criteria |
Data Classification and Clustering |
Security and Robustness in Wireless Networks |
Access Control Systems |
Mobile Secure Gateway |
Cloud Computing Security Models |
Information Security and Event Management |
Intelligent Database Security |
Cloud Computing Security Issues and Challenges |
Information Redundancy in Cloud Computing |
Cloud Computing Security Management |
Cloud Computing Security Issues and its Challenges |
Digital Right Management and Multimedia Protection |
Robotics Modeling |
Robotics Modeling, Planning and Control |
Dynamics and Motion Control of Robot Manipulators |
Motion planning, and Mobile Robots |
Environmental Interaction using Exteroceptive Sensory Data |
Intelligent Robotics and Autonomous Agent |
The Technology of Actuators and Sensors |
Theory, Algorithm and Implementation of the Robotics Motion |
Motions of Manipulators in Terms of Trajectories Through Space |
Robotics, Vision, and Control |
Neural network and Learning Machines |
Theory of Applied Robotics: Kinematics, Dynamics, and Control |
Motion Planning and Trajectories generation Algorithm |
Robotics Modeling and Simulation |
Rigid Motions and Homogeneous Transformations |
Dynamical Systems and Stability Theory |
Computer Vision and Vision based Control |
E-Commerce Transactions |
Electronic Fund Transfer |
Supply Chain Management |
Internet Marketing |
Online Transaction Processing |
Electronic Data Interchange and the Barriers for Implementation |
Inventory Management |
Automated Data Collection Systems |
E-commerce Systems |
E-Commerce Applications and Issues |
Customer Relationship Management |
Enterprise Business Systems |
Decision Support Systems |
Secure Electronic Transaction in E-Commerce |
Reliability Modeling and Prediction for E-Commerce Systems |
Key Factors for Developing a Successful E-Commerce System |
E-Commerce Security Protocols |