{"id":78,"date":"2022-01-03T11:20:34","date_gmt":"2022-01-03T11:20:34","guid":{"rendered":"https:\/\/cyber-conf.com\/syscom2022\/?page_id=78"},"modified":"2022-01-03T11:48:23","modified_gmt":"2022-01-03T11:48:23","slug":"call-for-papers","status":"publish","type":"page","link":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/call-for-papers\/","title":{"rendered":"Call For Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"78\" class=\"elementor elementor-78\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a760751 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a760751\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1c6bf58\" data-id=\"1c6bf58\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-16c6f15\" data-id=\"16c6f15\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20d15af elementor-widget elementor-widget-heading\" data-id=\"20d15af\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Call For Papers<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff02f9b elementor-widget elementor-widget-text-editor\" data-id=\"ff02f9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to:<\/p><p><strong>Tracks<\/strong><\/p><p>Track 1- Edge computing and Cloud computing<\/p><p>Track 2- Big data analytics for smart devices<\/p><p>Track 3- Blockchain, Federated learning, and other distributed methods<\/p><p>Track 4- Future communication systems and smart technology<\/p><p>Track 5- Data integrity, availability, and security for smart devices<\/p><p>Track 6- Smart transportation in smart cities<\/p><p>Track 7- Smart healthcare and MIoT<\/p><p>Track 8- Intelligent manufacturing sector<\/p><p>Track 9- Lightweight cryptography for smart devices<\/p><p>Track 10- Quantum computing in 5G\/6G communication systems<\/p><p>\u00a0<\/p><p><strong>Topics<\/strong><\/p><p>Smart villages and smart agricultural engineering<\/p><p>Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure communication<\/p><p>Agricultural Engineering Cloud IoT Applications<\/p><p>Using cloud IoT for smart livestock management<\/p><p>Agro IoT systems for urban and vertical farming<\/p><p>Smart Energy System Industrial Applications<\/p><p>Intelligent Transportation, Electric Vehicles, and Vehicle Electronics<\/p><p>Information Systems and Geo-Smart systems<\/p><p>Home Automation And Smart Building<\/p><p>Smart Agriculture And Smart Environment<\/p><p>Intelligent Learning System And Smart Education<\/p><p>Digital Business And Smart Economy<\/p><p>Smart Healthcare sector<\/p><p>Computer Science And Information Technology<\/p><p>Smart Power Systems and Artificial Intelligence<\/p><p>Machine Learning and Smart Power System ML Integrated<\/p><p>Architecture in Distributed Energy Resources and Prosumers Market<\/p><p>Prediction of electricity demand using machine learning<\/p><p>Grid hardware maintenance and anomaly detection<\/p><p>Smart feeder monitoring system based on artificial intelligence<\/p><p>Security solutions based on machine learning to secure smart power systems<\/p><p>Cyber-attacks, security data detection, and critical loads in power systems are all issues that need to be addressed.<\/p><p>Case Studies on AI\/ML Integration in the Energy Sector<\/p><p>Soft computing and computational intelligence<\/p><p>Signal processing and computational imaging<\/p><p>Wireless Networks Computational Intelligence<\/p><p>Applications of computational intelligence<\/p><p>Biomedical signal processing and telemedicine computational approaches<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f77fe5f\" data-id=\"f77fe5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Call For Papers We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to: Tracks Track 1- Edge computing and Cloud computing Track 2- Big data analytics for smart devices Track 3- Blockchain, Federated learning, and other distributed<a class=\"more-link\" href=\"https:\/\/cyber-conf.com\/syscom2022\/index.php\/call-for-papers\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Call For Papers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/78"}],"collection":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":7,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions\/121"}],"wp:attachment":[{"href":"https:\/\/cyber-conf.com\/syscom2022\/index.php\/wp-json\/wp\/v2\/media?parent=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}