- Applied Electromagnetic Theory
- Applied Functional Analysis
- Applied Statistics
- Approximation Theory
- Chaos Theory
- Combinatorics
- Complexity Theory
- Computability Theory
- Computational Methods in Mechanics and Physics
- Continuous Modelling
- Continuum Mechanics
- Control Theory
- Cryptography
- Differential Equations
- Discrete Mathematics
- Discrete Geometry
- Dynamical Systems
- Elastodynamics
- Evolutionary Computation
- Financial Mathematics
- Fuzzy Sets and Logic
- Game Theory
- Graph Theory
- Information Theory
- Inverse Problems
- Linear and Nonlinear Programming
- Mathematical Biology
- Mathematical Chemistry
- Mathematical Economics
- Mathematical Methods of Engineering
- Mathematical Physics
- Mathematical Psychology
- Mathematical Sociology
- Matrix Theory
- Neural Networks
- Nonlinear Processes in Physics
- Non-Standard Analysis
- Numerical Analysis
- Operations Research
- Optimal Control
- Optimization
- Probability
- Representation Theory
- Scientific Computing
- Statistical Finance
- Stochastic Processes
- Theoretical Statistics
- Tropical Mathematics
- Wave Motion
- 3G Communication Networks
- 4G Communication Networks
- Adaptive Modeling
- Algorithmic information theory
- Analysis of algorithms and problem complexity
- Antenna Applications
- Approximation Algorithms
- Broad Band Communication
- Cloud Computing
- Clustering Models
- Coding Theory And Techniques
- Communication Security
- Communications Protocols
- Computability theory
- Computational Game Theory
- Computer and Intelligent Communication
- Computer Architecture
- Computer Networks Architecture
- Computer Security
- Computer System Implementation
- Computer-aided engineering
- Computers in Medicines
- Computing in Chemistry
- Computing in Life Sciences
- Computing in Physics
- Computing Medical Sciences
- Cryptography
- Database Management Systems
- Demodulation
- Distance Learning
- Distributed Computing
- Distributed Computing Architecture
- Embedded Wireless Systems
- Energy Efficient Routing & Traffic Engineering
- Ethics in Computing
- Fading Channels
- Fault Tolerance
- Filtering Techniques
- Formal languages
- Formal semantics
- Green Computing
- Grid Computing
- Hacking
- Human Computer Interaction
- Information Theory
- Intelligent Computing
- Internet architecture design
- Internet Architecture Design
- Internet of Things
- Logics and meanings of programs
- Machine Learning
- Management Information Systems
- Mathematical logic
- Mathematical Software
- Microwave Communication
- Mobile and Optical Networks
- Mobile Communication
- Modeling & Simulation of Communication Systems
- Modulation
- Multiplexing
- Network Architecture & Protocol
- Network Management
- Network Security
- Noise Reduction
- Numerical Analysis Applications
- Operation Research Applications
- Optical Communication
- Optimization methods
- Optimization methods
- Pervasive Computing
- Query Optimization
- Queuing Theory
- Rendering Algorithms
- Satellite Communication
- Security and protection
- Security and protection
- Social Computing
- Social Networking
- Software Agents
- Software Engineering
- Storage Area Networks
- Synchronization
- System Software
- Systems Performance Analysis
- Theory Behind Databases
- Theory of computation
- Transactional Coherence and Consistency
- Transmission Diversity
- Type theory
- Ubiquitous Computing
- Virtual Human Simulation
- Wired Communication
- Wireless Communication
- Wireless Networks
- Wireless Sensor Networks

### Author Guidelines

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail. All the papers should be of 6 pages length.

Start here to submit a paper to this conference.

Step one of the submission process

Copyright © 2017 Core Conferences. All Rights Reserved.