CFP: COMS2: International Conference on Computing Science, Communication and Security

Submission deadline: March 25, 2020

Conference date(s):
March 26, 2020 - Yesterday

Go to the conference's page

Conference Venue:

Faculty of Computer Applications, Ganpat University
Kherva, India

Topic areas


International Conference on Computing Science, Communication and Security (COMS2) will be held in Ganpat University, Mehsana, Gujarat during 26th to 28th March 2020. It aims to bring together leading academicians, researchers, scientists, practitioners and professionals both the industry and the academic and provide them a platform to exchange their newest research findings, experiences, surveying works and views on various aspects of computing science, communication and networking and Security. It will also develop an academic and industry collaboration through this platform to serve research community best way at larger scale.

  • Track 1: Computing
    Accessible Computing, Quantum Computing, High Performance Computing, Distributed and parallel systems, Cognitive Computing, Cloud Computing, Fog Computing, Edge Computing, Mobile and Ubiquitous computing, Grid Computing, Green Computing, Embedded Computing, Scalable Computing, Cluster Computing, Autonomic and Trusted Computing, High Performance Computing, Supercomputing, Scientific Computing, Data Compression and Green Computing, and Mobile computing.
  • Track 2:Communication
    Connected Machines, Networking, Wireless/ Mobile Communication, Ad Hoc Networks, Sensor Network, Communication Network and Information Theory, Signal Processing, Satellite Communication Systems, 4G/5G Network Evolutions, Open Spectrum Solutions, Cognitive Radio, Satellite and Space Communications, Antenna and Propagation, 5G, Global coverage via 6G/7G, Signal processing in telecommunications, Remote spatial sensing, Delay Tolerant Networking, Warfare, Optical Networking Technologies, Emerging Technologies for Next Generation Network, WiMAX/WiBro Services and QoS Management, High Speed Network and Software-Defined Networks (SDN)
  • Track 3:Technology Trends
    Internet of Things (IOT), Blockchain, Cyber-Physical Systems, Big Data, Data Warehousing, Data Mining and Analytics, Smart Cities, Machine to Machine, Data Analytics, Mobile Applications, Digital Transformation, Social Computing, Ambient Intelligence, Data Science, Multimedia Animation, Computer Architecture & VLSI, Embedded Systems and Augmented Reality (AR) and Virtual Reality (VR).
  • Track 4:Artificial Intelligence and Robotics
    Deep Learning, Neural Networks, Fuzzy Logic, Expert Systems, Agents and Multi-agent Systems, Natural Language Processing, Computational Optimization Robotics, Sentiment Analysis, Autonomous Vehicles, Advanced Control Engineering, Behavior-based Robotics and Transportation, Bionic Equipment and Control Engineering, Computational Anatomy and Physiology, Graphics and Visualization, Intelligent Software, Intelligent Systems and Computational Intelligent, Interventional Software and User interface, Machine Learning and Artificial Intelligence, Robotics and Medical Robot, Text mining, Theory and Algorithms, Unmanned Aerial Vehicles, Unmanned Aircraft Systems and Intelligent Transport System.
  • Track 5:Machine Vision, Image processing, Bioinformatics
    Human Computer Interaction, Computer Vision, Image Processing, Computer Graphics, Brain-Machine Interface, Geographical Information Systems (GIS) and Global Navigation Satellite Systems (GNSS), Video Analysis, Medical Diagnosis, Segmentation Techniques, Bioinformatics and Computational Biology, Genetic and Evolutionary Computation, Biomedical, Bio-engineering and Brain-machine interfaces.
  • Track 6:Security and Privacy
    Access Control, Cryptography, Security and Privacy, Trust based Security, Cyber Security, Biometrics Security, Surveillance, Internet Security, Intrusion Detection, Secure Transactions, Secure Protocols, Stenography, Cloud Computing Security and Privacy, Fault Tolerance and Diagnosis, Forensic Analysis of Cyber Crimes, Network Intrusion Detection and Prevention, Prevention of data loss or leakage, Proxies and middleware for wireless networks, Secure Routing, Security & Privacy for Emerging Technologies, Spam Protection and System Security.
Key Features:

Supporting material

Add supporting material (slides, programs, etc.)