2ndInternational Conference on Communication Technologies (ComTech-2019) will provide a forum for researchers, developers and practitioners from both academia and industry to meet and share cutting-edge technologies in the field of Telecommunications, Software Engineering & Information/Cyber Security. Prospective authors are encouraged to submit high quality technical papers for presentation at the conference, reporting original research that has not been previously published and is not currently submitted for consideration elsewhere. The conference will include a peer review program of technical sessions and high level key note speeches.
Committee: |
Technical Program: |
|
Dr. Saddaf Rubab Dr. Abdul Waheed Dr. Fawad Khan |
CFP
Telecommunication Track
- Antennas, Propagation and RF Design
- Transmission Technologies and Communication Theory
- Spectrum Efficient Management, Sensing and Cognitive Radio
- Multiple Antenna Systems and Services
- Cooperative Communications, Distributed MIMO and Relaying
- Wireless / Radio Access Technologies
- Mobile Network Applications and Services
- Ad-hoc, Mesh, Machine-to-Machine and Sensor Networks
- Wireless Networks and Security
- Green Communications and Networks
- Satellite Networks, Positioning Technologies, Localization and Navigation
- Vehicular Communications, Networks and Transportation Systems,
- Smart Grid, Electric Vehicles, and Vehicular Electronics
- Optical Networks and NGN
- 5G Cellular systems and SON
- Network Security
- Telecommunication Policy & Regulations
- Future Trends and Emerging Technologies
Software Track
- Distributed Computing
- Cloud Computing
- Requirements Engineering
- User Centric Design
- Modeling Techniques & Methods in Software Engineering
- Software Quality
- Formal Methods
- Security Aspects in Software Engineering
- Agile Software Engineering
- Software Evolution & Reuse
- Reverse Engineering
- Software dependability
- Service-centric software engineering
- Engineering Web Applications
- Intelligent Systems
- Big Data Analysis
- Image Processing
- Software Engineering Case Studies and Industrial experiences
Information Security Track
- Authentication and Access Control
- Botnets
- Cryptography and Cryptanalysis
- Cyber Laws in Pakistan
- Data and Applications Security
- Digital Forensics
- Distributed Systems Security
- Ethical Hacking
- Human Aspects of Information Security and Assurance
- Information Hiding
- Information Security Auditing and Management
- Malware Detection, Analysis and Prevention
- Network Security
- Operating Systems Security
- Penetration Testing, Vulnerability Assessment and Defense
- Physical Security
- Social Networks and Web Security