{"id":57,"date":"2022-01-03T11:09:34","date_gmt":"2022-01-03T11:09:34","guid":{"rendered":"https:\/\/cyber-conf.com\/syscom2022\/?page_id=57"},"modified":"2022-12-01T06:01:13","modified_gmt":"2022-12-01T06:01:13","slug":"publication-2","status":"publish","type":"page","link":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/publication-2\/","title":{"rendered":"Publication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"57\" class=\"elementor elementor-57\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2dc98d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dc98d3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b776a05\" data-id=\"b776a05\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7e7053c\" data-id=\"7e7053c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e913d9f elementor-widget elementor-widget-heading\" data-id=\"e913d9f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Paper Publication<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2343bf4 elementor-widget elementor-widget-text-editor\" data-id=\"2343bf4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"background-color: var(--global--color-background);\"><b>All papers, both invited and contributed, will be reviewed by at least 2 experts from the committees. After a careful reviewing process before the final decision and detailed presentation at the conference. Conference proceedings will be published in Springer&#8217;s Lecture Notes in Networks and Systems (LNNS) series (Scopus Indexed)<\/b><\/span><\/p><p><strong>\u00a0<\/strong><\/p><p><b>After further revision, some papers will be published in special issues of various SCI\/ESCI\/WoS\/Scopus\/EI indexed journals. A list of some of the journals is given below:<\/b><\/p><ul><li>Technological Forecasting and Social Change, Elsevier (SSCI Indexed) (IF=5.846)<\/li><li>Enterprise Information Systems, Taylor &amp; Francis (SCI indexed) (IF=2.145)<\/li><li>Journal of Global Information Management (JGIM) (SCI, SSCI indexed) (IF=1.21)<\/li><li>Sensors, MDPI (SCI indexed) (IF=3.27)<\/li><li>Journal of Information Technology Research (JITR) (Scopus, EI indexed)<\/li><li>International Journal on Computer Science and Engineering (IJCSE) (Scopus, EI indexed)<\/li><li>International Journal of Embedded Systems (IJES) (Scopus, EI indexed)<\/li><li>International Journal of Cloud Applications and Computing (IJCAC) (Scopus, Web of Science indexed)<\/li><li>International Journal of Software Science and Computational Intelligence (IJSSCI)(Web of Science indexed)<\/li><li>International Journal of High Performance Computing and Networking (IJHPCN)<\/li><li>International Journal of Innovative Computing and Applications (IJICA) (Scopus, EI indexed)<\/li><li>International Journal of High Performance Systems Architecture (IJHPSA) (Scopus, EI indexed)<\/li><li>International Journal of Distributed Sensor Networks, SAGE Publishing<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ed7daa4\" data-id=\"ed7daa4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Paper Publication All papers, both invited and contributed, will be reviewed by at least 2 experts from the committees. After a careful reviewing process before the final decision and detailed presentation at the conference. Conference proceedings will be published in Springer&#8217;s Lecture Notes in Networks and Systems (LNNS) series (Scopus Indexed) \u00a0 After further revision,<a class=\"more-link\" href=\"https:\/\/cyber-conf.com\/syscom2022\/index.php\/publication-2\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Publication&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/57"}],"collection":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":31,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/57\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/57\/revisions\/363"}],"wp:attachment":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/media?parent=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}