Submission Preparation Checklist
As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.- The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The submission file is in OpenOffice, Microsoft Word, or RTF document file format.
- Include no less than 15 references in your article.
- The text is single-spaced; uses a 10-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
- The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.
- Keep plagiarism below 10%, noting that self-plagiarism is also unacceptable, and keep the AI rate under 10%. Additionally, provide a plagiarism report along with your original manuscript.
Track 1: Cyber Security and Data Privacy
Track 1: Cyber Security & Data Privacy Policy
Scope
The Cyber Security & Data Privacy Track welcomes submissions on the latest research, applications, and policy issues related to the security of computer systems and networks, and the protection of individual privacy in the digital age.
- IoT and Network Security
- Computer Forensics
- Privacy preserving
- Web Services and Semantic Web
- Cryptography and Data Security
- Block-chain applications
- Web Applications Security
- Vulnerability analysis and Risk Management
- Firewall, Honeynet and Intrusion Detection Systems
- Security in Fog / edge Computing
- Security of Virtual Machines
- Security threats & Countermeasures
- Security, trust and privacy challenges
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Track 2: Computer and Communication Networks
Track 2: Computer and Communication Networks
Scope
This track solicits original research on all aspects of computer and communication networks, including:
- Network architecture and protocols
- Routing and traffic management
- Wireless networks and mobile computing
- Network security
- Network performance evaluation
- Cloud networking
- Internet of Things (IoT) networking
- Software-Defined Networking (SDN)
- Network Virtualization
- Network Services and Applications
- Mobile Ad hoc and Sensor Networks
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Track 3: Artificial Intelligence and Soft Computing
Track 3: Artificial Intelligence and Soft Computing
Scope
The scope of an Artificial Intelligence (AI) and Soft Computing conference track typically encompasses a broad range of topics, addressing both theoretical and practical aspects of these fields. Here’s an overview of key areas that are often covered:
- Automation and Expert Systems
- Computer Vision and Speech Understanding
- Data Mining Applications
- Soft Computing
- Fuzzy Systems and Probabilistic Reasoning
- Knowledge Discovery
- Computational Intelligence and Recommender Systems
- Machine Learning and Neural Network
- Natural language processing
- Computer vision and robotics
- Optimization and Approximation Algorithms
- Hybrid Intelligent Systems
- Swarm intelligence
- Artificial immune systems
- Feature Selection and Transformation
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Track 4: Data Science, Analytics and Applications
Track 4: Data Science, Analytics and Applications
Scope
The scope of a track dedicated to Data Science, Analytics, and Applications at a conference typically includes a comprehensive range of topics that cover the methodologies, technologies, and practical applications of data science and analytics in various fields. Here’s an overview of the key areas often included:
- Big Data Technologies
- Business and Data Analytics
- Decision Support Systems
- Dimensional Modelling
- Text Analytics
- Data Warehouse Management
- Web Analytics
- Statistics Exploratory Data Analysis
- Predictive Modelling
- Information Retrieval
- Information Integration
- Data Management and Quality
- Mobile Data Management
- Management of Sensor Data
- Data Modeling and Visualization
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Track 5: Software Engineering and Information Systems
Track 5: Software Engineering and Information Systems
Scope
The scope of the track on Software Engineering and Information Systems encompasses a broad range of topics that are critical to the design, development, deployment, and maintenance of software systems. Key areas of focus typically include:
- Software Requirements, Architecture and Evolution
- Software Testing, Verification and Validation
- Empirical Software Engineering
- Software Metrics and Measurement
- Mobile and Ubiquitous Software Systems
- Intelligent Software Engineering
- Model-based Software Engineering
- Human-Centered Software Engineering
- Strategic Information Systems
- ICT Governance
- Green Technology and Sustainability
- Computational and Systems Biology
- Computational Modeling
- Simulation in Science and Engineering
- Computer Games and Simulation
- Databases and Visualization
- Mobile Computing
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Track 6: Navigating Ethical Frontiers: AI Ethics in Practice
Track 6: Navigating Ethical Frontiers: AI Ethics in Practice
Scope
This track aims to explore the multifaceted ethical challenges and considerations that arise in the development, deployment, and use of artificial intelligence (AI). As AI technologies continue to advance and integrate into various aspects of society, it is crucial to address the ethical implications to ensure they are beneficial, fair, and just. The scope of this track includes, but is not limited to, the following themes:
- Bias and Fairness in AI
- Transparency and Explainability in AI
- Accountability and Responsibility in AI
- Human-AI Interaction and Collaboration
- The Future of Work and AI
- AI and Social Justice
- AI and Global Governance
- Legal and Regulatory Landscape of AI
- Public Education and Engagement on AI Ethics
- Emerging Issues in AI Ethics
Submission Requirements
- Submissions must present novel and significant contributions to the field.
- Papers should be clearly written, well-organized, and adhere to the Author’s guidelines.
- Authors must disclose any potential conflicts of interest.
Review Process
All submissions will undergo a single-blind peer review by experts in the relevant field. Decisions on acceptance will be based on originality, technical merit, clarity, and potential impact.
Publication
Accepted papers will be published in a dedicated section of the Conference proceeding titled "Computer and Communication Networks".
Additional Considerations
- Authors are encouraged to highlight the practical implications of their research.
- Submissions on emerging network technologies and those addressing current challenges are particularly welcome.
Disclaimer
This is a brief overview of the track policy. Please refer to the author’s guidelines for detailed submission instructions and publication ethics.
Copyright Notice
All papers accepted for publication in the ICCDA 2024 conference proceedings will be copyrighted by the International Conference on Computing and Data Analytics (ICCDA) 2024. This signifies that authors retain the copyright to their work, but ICCDA 2024 holds the exclusive right of publication. By submitting a paper, authors agree to grant ICCDA 2024 non-exclusive rights to distribute their work electronically and in print for the purpose of conference promotion and dissemination of knowledge.
Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.