International Conference on Communication Network and Security
(ICCNS 2011)

International Conference on Communication Network and Security (ICCNS 2011)

 

About The Event

 

About ICCNS 2011

One of the most dramatic technological developments in the era of information technology is the deployment of communication networks. This on-going revolution has raised and continues to raise fundamental challenges in the fields of science, engineering and industrial technologies. It requires new solutions, formulations and techniques for scientists and engineers from the communities of systems engineering and communications. The realization of wireless connectivity is bringing fundamental changes to telecommunications and computing and profoundly affects the way we compute, communicate, and interact. It provides fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography.

This confernce shall provide a new forum for dissemination of knowledge on both theoretical and applied research on computer communication, network and security with an ultimate aim to bridge the gap between these coherent disciplines of knowledge. This forum accelerates interaction between the above bodies of knowledge, and fosters a unified development in the next generation communication.

Subject Coverage 

The conference invites paper from all areas under the broad spectrum of Communication Network, Security and their applications. The areas are as follows:
  • Hardware support, System architectures, Services and system support
  • Algorithm/protocol design and analysis
  • Mobile environments
  • Applications
  • Wireless communications and networks
  • Autonomous, robotic and intelligent systems and control
  • Biological/biomedical systems and control
  • Internet and web based systems
  • Software systems and communication systems
  • Artificial intelligence and intelligent information systems
  • Distributed and cooperative control systems
  • Mechatronic and micromechatronic systems
  • Quantum systems and nano-systems
  • Economic, environmental and social system engineering
  • Modelling, identification, analysis and control of time delay systems
  • Networked control systems (NCS)
  • Network control, e.g., admission/flow/congestion control
  • Power control and mobility management of wireless networks
  • Network scheduling and bandwidth allocation
  • Quality of service (QoS) and quality of performance (QoP)
  • Protocol-based feedback control and control-oriented communication protocols
  • Informatics in control and communication
  • Design and analysis of quantisers and coder/decoders
  • Control with partial/intermittent/delayed information feedback
  • Distributed control under power, rate and distortion constraints
  • Integrated control, computing and communication systems (ICCCS)
  • Applications of game theory and Markov decision theory to ICCCS
  • Computationally efficient control and communication algorithms
  • Fault detection, diagnostics and prognostics
  • Sensors and actuators networks
  • Distributed consensus, agreement, and optimisation
  • Stochastic dynamic games and teams
  • Evolving complex network models and design algorithms
  • New features and theoretic analysis of complex network systems
  • Synchronisation and control of complex dynamical networks
  • Emergent behaviours and patterns on complex networks
  • Complex networks and social/economic/biological systems
  • Complex dynamic networks and multi-agent systems
  • Case studies and application examples of any related topics
  • Cellular planning for GSM, UMTS, WCDMA, cmda2000, BFWA, PMR, wifi and 802.11
  • Transmission infrastructure and site location
  • Channel assignment and modelling
  • Frequency hop set design
  • Netted radar placement
  • Spectrum licensing and auctions and International spectrum management
  • Spectrum trading, Revenue generation and Subscriber service pricing policy
  • Application of codes
  • Radio resource management and allocation
  • Bluetooth scatternet formation
  • Point to point link topology, propagation modelling and ray tracing
  • Key performance indicators, surrogates and quality of service measurement
  • Traffic modeling, Routing
  • Subscriber location issues
  • Billing
  • Effective source code design and Software system design
  • Requirements analysis and Fast data structures
  • Object oriented design methodologies and Human-computer interaction
  • User interface development
  • High performance computing, Parallel processing
  • Geographical information
  • Graphics, Visualisation, simulation environments and tool kits
  • Heuristics and meta-heuristic algorithm design and application
  • Genetic algorithms
  • Tabu search, Simulated annealing, Neighbourhood searching
  • Constraint programming
  • Mathematical modelling and mathematical programming formulations
  • Randomisation
  • Expert systems, Agents, Artificial intelligence, Neural networks and Ambient intelligence
  • Emergent approaches
  • Integrated mobile marketing communications
  • Telematics
  • Wireless advertising/wireless CRM
  • Pervasive computing technologies
  • Incoming and outgoing wireless links
  • Efficacy of mobile communications
  • Teaching mobile communication applications
  • Critical success factors for mobile communication diffusion
  • Metric mobile business enterprise
  • Mobile communication security issues and requirements
  • PDAs in health services delivery
  • Interaction and integration in mobile communications
  • Location management for mobile communications
  • Business models for mobile communications
  • Groupware, Roomware
  • Mobile ad hoc networking and Nomadic communication
  • Portable communications and Cross-cultural mobile communication issues
  • Wireless information assurance
  • Mobile and handheld devices in the classroom and Tele-learning
  • Security in cellular networks (2G, 2.5G, 3G, B3G, 4G, etc.)
  • Security in wireless LANs (IEEE 802.11 WLAN, WiFi, and HiperLAN/2)
  • Security in wireless PANs (Bluetooth and IEEE 802.15)
  • Security in wireless MANs (IEEE 802.16 and WiMAX)
  • Security in sensor and ad hoc networks
  • Security in mobile IP and wireless internet
  • Security in integrated wireless networks and satellite networks
  • Security in wired and wireless integrated networks
  • Security in wireless communications and IP networks
  • Security in internet and WWW
  • Security in high-speed networks and peer-to-peer networks
  • Security in optical systems and networks
  • Security in VoIP and e-mail
  • Security in domain name service
  • Security in integrated networks and content-delivery networks
  • Security in and communications distributed systems
  • Attacks, security mechanisms, and security services
  • Access control, Authentication and Authorisation
  • Multicast security
  • Distributed access control
  • Data integrity and Data confidentiality
  • Non-repudiation
  • Firewall and Privacy protection
  • Security specification techniques, Encryption and decryption, and Secure routing protocols
  • Formal analyses and Security group communications
  • Intrusion detection
  • Key management, Trust establishment and Revocation of malicious parties
  • Security policies, Fraudulent usage and Dependability and reliability
  • Anonymity, Prevention of traffic analysis
  • Secure PHY/MAC/routing protocols
  • Secure location determination and Denial of service
  • Network security performance evaluation
  • Tradeoff analysis between performance and security
  • Network forensics
  • Design or analysis of security protocols and Security standards
  • Energy efficiency (sleep mode, etc.)
  • Applications
  • Location techniques
  • Routing, Medium access control (MAC)
  • Coverage, Connectivity and Longevity
  • Scheduling,  Synchronisation and Network resource management
  • Energy efficient protocols (PHY, MAC, routing, application)
  • Lightweight protocols
  • Fault tolerance and diagnostics
  • Foundations
  • Data storage and query processing
  • In-network processing and aggregation
  • Learning of models from data
  • Mobility
  • Performance analysis
  • Sensor tasking and control
  • Security, privacy, and data integrity
  • Modelling of systems and physical environments
  • Network protocols
  • Simulation tools and environments
  • System architectures and operating systems

Invite friends

Contact Us

Page Views : 980

Venue Map