Respected sir / madam,
INTERCONTINENTAL RESEARCHCONSORTIUM VOLUME - 3, ISSUE - 1, JANUARY, 2016
CALL FOR RESEARCH ARTICLES
Journal with International ISSN - both Online and PrintFACULTY MEMBERS CAN SEND STUDENT'S PROJECT AS RESEARCH ARTICLES IN THE FORM OF JOINT CONTRIBUTIONSubmission Deadline: 30th January, 2016Publication date: 31st January, 2016INTERCONTINENTAL JOURNAL OF MARKETING MANAGEMENT
ISSN:2350-0891 (Online) ISSN:2350-0883 (Print)Impact Factor - 1.235INTERCONTINENTAL JOURNAL OF BANKING, INSURANCE AND FINANCE
ISSN: 2350-0875 (Online) ISSN: 2350-0867 (Print)Impact Factor - 1.261INTERCONTINENTAL JOURNAL OF HUMAN RESOURCE MANAGEMENT
ISSN: 2350-0859 (Online) ISSN: 2350-0840 (Print)Impact Factor - 1.296SUBMISSION GUIDELINES
Research paper prepared in English in MS word not exceeding 10-12 single spaced typed pages should be submitted electronically as attachment to the following e-mail id: editor.researchscripts@gmail.com
PLEASE UPLOAD YOUR ARTICLES @ www.researchscripts.org
PUBLICATION CHARGES - ONLINE Rs. 1000/- (Rupees One Thousand only) PUBLICATION CHARGES -ONLINE AND Rs. 1500/- (Rupees One Thousand and Five hundred only) For Each additional Copies of Print Rs.300/- (Rupees Three Hundred only) (FOR SINGLE AND MULTIPLE AUTHORS)
PLEASE SEND THE ARTICLES TO THE MAIL ID GIVEN ABOVE. ARTICLES SUBMITTED UP TO 30th January 2016WILL BE PUBLISHED ON 31st January 2016.CONTACT USFor queries related to journals and articles, you can contact:Prof.Siva - 073737 16648
International Journal of Innovative Research in Information Security
Call for Paper – January 2016
(Print) ISSN: 2349-7009 | (Online) ISSN: 2349-7017 | Volume 3, Issue 01 of January 2016
Manuscript Submission to: editor@ijiris.com,admin@ ijiris.com,submit@ijiris.com
Acceptance Notification: within 1 to 3 Days
Publication Date: 10/20/31 - 01/2016
IJIRIS offers a leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of innovative research in information security and computer communication security. The journal will feature diverse research articles including core and applied computer science and information security related topics.
Authors are solicited to contribute and submitting articles that illustrate research results and industrial experiences that describe recent advances in the following areas, but are not limited to:
Information Security Areas: Applied cryptography Biometric security Security & Network Management Data and System integrity Denial of service protection Intrusion Detection Distributed Systems security E-mail & Grid security Internet/Intranet Security Key management and key recovery Mobile and wireless network security Multimedia security Privacy and data protection Security Models & protocols Trusted computing Ubiquitous Computing Security Intelligent Defence Systems | Innovative Research in Computer Science Areas: Security Architectures in Distributed Network Systems Security for P2P systems and Grid Systems Security and Privacy in Wireless Networks Secure routing schemes Emerging threats to cloud-based services Security model for new services Cloud-aware web service security Information hiding in Cloud Computing Securing distributed data storage in cloud Intrusion Detection and Information Filtering Peer-to-Peer Networks Security Security Issues in Mobile and Ubiquitous Networks Vehicular Network Security Wireless Communication Security Internet and Network Forensics RFID Security and Privacy |
Innovative Research in Technology: Innovation and product development Middleware services and agent technologies autonomic and context-aware computing Wireless computing systems and services, Energy-efficient and green pervasive computing Ad hoc networks for pervasive communications, Enabling technologies for pervasive systems Sensors and RFID in pervasive systems Smart devices and intelligent environments security and privacy issues in pervasive systems Virtual immersive communications Wearable computers Active and Programmable Networks Transportation Application: Ad Hoc & Sensor Network Congestion and/or Flow Control Content Distribution Grid Networking High-speed Network Architectures Internet Services and Applications Optical Networks Mobile and Wireless Networks Network Modelling and Simulation Multicast, Multimedia Communications Network Control and Management Network Protocols, Network Performance Network Measurement Peer to Peer and Overlay Networks Quality of Service and Quality of Experience Crosscutting Themes – Internet Technologies Open Models and Architectures: Security, Privacy and Trust; Navigation Systems Location Based Services Social Networks and Online Communities ICT Convergence Digital Economy and Digital Divide Neural Networks Pattern Recognition Computer Vision Noise Reduction Edge Detection Contour Detection Pair Programming Testing practices in XP Artificial Intelligence and Agile development Best Practices of Crystal family methodology Practices of PRINCE2 Practices of Test Driven development Key metrics of Agile Risk analysis of Agile development Pattern Recognition Image Processing Image Analysis Computer Vision Data Warehousing Actuators and Systems Integration: Intelligent sensors and actuators Multisensor fusion, Sensor array and multi-channel processing Micro/nano technology Microsensors and microactuators Instrumentation electronics MEMS and system integration Wireless sensor Network Sensor Hybrid Sensor Distributed Sensor Networks. Industrial Informatics: Industrial applications of neural networks Fuzzy algorithms Neuro-Fuzzy application Bioinformatics Real-time computer control Real-time information systems Human-machine interfaces CAD/CAM/CAT/CIM Virtual reality Industrial communications Flexible manufacturing systems Industrial automated process Data Storage Management Supply Chain Management Logistics applications Power plant automation Drives automation Information Technology Signal and Image Processing: Digital signal processing theory & methods DSP implementation Speech processing | Network Applications: Network-based automation Cloud applications Ubiquitous and pervasive applications, Collaborative applications RFID and sensor network applications Mobile applications Smart home applications Infrastructure monitoring and control applications, Remote health monitoring GPS and location-based applications Networked vehicles applications Alert applications Embedded Computer System On-board diagnostics Active safety systems Communication systems Wireless technology Communication application Navigation and Guidance Vision-based applications Speech interface Sensor fusion Networking theory and technologies Transportation information Autonomous vehicle Vehicle application of affective computing Computing technology and their Application : Broadband and intelligent networks Data Mining Data fusion Computational intelligence Information and data security Information indexing and retrieval Information processing Information systems and applications Internet applications and performances Knowledge based systems Knowledge management Software Engineering Decision making Mobile networks and services Network management and services Neural Network Fuzzy logics Expert approaches Middleware Issues: Event-based Middleware solutions for reliability Scalability of middleware Context-aware middleware Autonomic and self-managing middleware Evaluation techniques for middleware solutions Formal methods and tools for designing Verifying, and evaluating Software engineering techniques for middleware Service oriented middleware Agent-based middleware Security middleware Control Systems & Intelligent Control: Advanced control and measurement Computer and microprocessor-based control Signal processing estimation and identification techniques application specific IC’s nonlinear and adaptive control optimal and robot control intelligent control control applications Intelligent Control System Wiring/Wireless Sensor Signal Control System. Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA Quality of service and scheduling methods Capacity planning and dimensioning Cross-layer design and Physical layer based issue Interworking architecture and interoperability Relay assisted and cooperative communications Location and provisioning and mobility management Call admission and flow/congestion control Performance optimization Channel capacity modelling and analysis. analysis and processing Image and Multimedia applications Real-time multimedia signal processing Computer vision Emerging signal processing areas Remote Sensing Signal processing in education |
All submitted papers will be evaluated based on their originality and quality by the technical committee of reviewers. Papers that describe research and experimentation are encouraged. All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJIRIS web pages (www.ijiris.com). Accepted papers will be published online and indexed by Google Scholar, CiteSeerX, Scribd, Publishresearch,Citefactor, Academickeys, Mendeley, Worldcat, Citeseerx, ISI, DIIF, Academic.edu, Research Gate, Techrepublic.....
Important Dates:
Last date of Paper Submission: 30 January 2016
Acceptance Notification: Within 1 to 3 days
Online Publication: 10 / 20 / 31 January 2016
Please visit the following link for IJIRIS Published issues: http://www.ijiris.com/archives
Researcher/Scholars are invited to submit original papers in IJIRIS Paper Format: