{"id":141,"date":"2022-03-22T06:09:01","date_gmt":"2022-03-22T06:09:01","guid":{"rendered":"https:\/\/cyber-conf.com\/syscom2022\/?page_id=141"},"modified":"2022-03-22T07:34:17","modified_gmt":"2022-03-22T07:34:17","slug":"review","status":"publish","type":"page","link":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/review\/","title":{"rendered":"Review"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"141\" class=\"elementor elementor-141\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b139666 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b139666\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1e79aa\" data-id=\"b1e79aa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61ee34c elementor-widget elementor-widget-heading\" data-id=\"61ee34c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Paper Review<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34e119c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34e119c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5cfc1f7\" data-id=\"5cfc1f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d97cb5 elementor-widget elementor-widget-text-editor\" data-id=\"3d97cb5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p style=\"text-align: justify;\"><span style=\"color: #000000;\">All submissions to this conference will be sent to at least 2 independent reviewers selected from a group of well-established researchers by the Editor-in-Chief and evaluated based on originality, technical and research content, relevance to conference, contributions, and readability. The full paper submissions will be chosen based on technical merit, interest, applicability, and how well they fit a coherent and balanced technical program.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">We will first check plagiarism status of each submitted paper, and there is a hard rule that the similarity rate can not exceed 18%. We take plagiarism case very seriously, which include self-plagiarism of authors&#8217; own published papers. Papers with high percentage of plagiarism and self-plagiarism will not be considered. If an author is found to commit an act of plagiarism, the following acts of sanction will be taken:<\/span><\/p><p style=\"text-align: left;\"><span style=\"color: #000000;\">1. Reject the paper submitted or delete the paper from the final publications.<\/span><\/p><p style=\"text-align: left;\"><span style=\"color: #000000;\">2. Report the authors violation to his\/her supervisor(s) and affiliated institution(s).<\/span><\/p><p style=\"text-align: left;\"><span style=\"color: #000000;\">3. Report the authors violation to the appropriate overseeing office of academic ethics and research funding agency.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">4. Reserve the right to publish the authors name(s), the title of the article, the name(s) of the affiliated institution and the details of misconduct, etc. of the plagiarist.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">5. Each paper should clearly indicate the nature of its technical\/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors\u2019 personal details, the acknowledgments section of the paper and any other reference that may disclose the authors\u2019 identity.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3bb8916\" data-id=\"3bb8916\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Paper Review All submissions to this conference will be sent to at least 2 independent reviewers selected from a group of well-established researchers by the Editor-in-Chief and evaluated based on originality, technical and research content, relevance to conference, contributions, and readability. The full paper submissions will be chosen based on technical merit, interest, applicability, and<a class=\"more-link\" href=\"https:\/\/cyber-conf.com\/syscom2022\/index.php\/review\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Review&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":13,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":195,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/141\/revisions\/195"}],"wp:attachment":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}