{"id":14190,"date":"2015-07-01T20:14:53","date_gmt":"2015-07-01T17:14:53","guid":{"rendered":"http:\/\/hgpu.org\/?p=14190"},"modified":"2015-07-01T20:14:53","modified_gmt":"2015-07-01T17:14:53","slug":"international-conference-on-information-and-computer-technology-icict-2015","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=14190","title":{"rendered":"International Conference on Information and Computer Technology (ICICT), 2015"},"content":{"rendered":"<p>Topics:<br \/>\nAlgorithms<br \/>\nArtificial Intelligence<br \/>\nAutomated Software Engineering<br \/>\nBio-informatics<br \/>\nBioinformatics and Scientific Computing<br \/>\nBiomedical Engineering<br \/>\nCompilers and Interpreters<br \/>\nComputational Intelligence<br \/>\nComputer Animation<br \/>\nComputer Architecture &amp; VLSI<br \/>\nComputer Architecture and Embedded Systems<br \/>\nComputer Based Education<br \/>\nComputer Games<br \/>\nComputer Graphics &amp; Virtual Reality<br \/>\nComputer Graphics and Multimedia<br \/>\nComputer Modeling<br \/>\nComputer Networks<br \/>\nComputer Networks and Data Communication<br \/>\nComputer Security<br \/>\nComputer Simulation<br \/>\nComputer Vision<br \/>\nComputer-aided Design\/Manufacturing<br \/>\nComputing Ethics<br \/>\nComputing Practices &amp; Applications<br \/>\nControl Systems<br \/>\nData Communications<br \/>\nData Compression<br \/>\nData Encryption<br \/>\nData Mining<br \/>\nDatabase Systems<br \/>\nDigital Library<br \/>\nDigital Signal and Image Processing<br \/>\nDigital System and Logic Design<br \/>\nDistributed and Parallel Processing<br \/>\nDistributed Systems<br \/>\nE-commerce and E-governance<br \/>\nEvent Driven Programming<br \/>\nExpert Systems<br \/>\nHigh Performance Computing<br \/>\nHuman Computer Interaction<br \/>\nImage Processing<br \/>\nInformation Retrieval<br \/>\nInformation Systems<br \/>\nInternet and Web Applications<br \/>\nKnowledge Data Engineering<br \/>\nMobile Computing<br \/>\nMultimedia Applications<br \/>\nNatural Language Processing<br \/>\nNeural Networks<br \/>\nParallel and Distributed Computing<br \/>\nPattern Recognition<br \/>\nPerformance Evaluation<br \/>\nProgramming Languages<br \/>\nReconfigurable Computing Systems<br \/>\nRobotics and Automation<br \/>\nSecurity &amp; Cryptography<br \/>\nSoftware Engineering &amp; CASE<br \/>\nSystem Security<br \/>\nTechnology in Education<br \/>\nTechnology Management<br \/>\nTheoretical Computer Science<br \/>\nUbiquitous Computing<br \/>\nWireless Sensor Networks<br \/>\nWireless Communication and Mobile Computing<br \/>\nFor more topics: <a href=\"http:\/\/www.icict.org\/cfp.html\" rel=\"nofollow\">http:\/\/www.icict.org\/cfp.html<\/a><\/p>\n<p>Publication:<br \/>\nSubmitted papers can be selected and published into one of the following Journals.<br \/>\n* Journal of Software (JSW, ISSN 1796-217X)<br \/>\nAbstracting\/ Indexing: DBLP, EBSCO, DOAJ, ProQuest, INSPEC, ULRICH&#8217;s Periodicals Directory, WorldCat, CNKI,etc.<br \/>\n* Journal of Advances in Information Technology (JAIT, 1798-2340)<br \/>\nAbstracting\/Indexing: INSPEC; EBSCO; ULRICH&#8217;s Periodicals Directory; WorldCat; CrossRef; Genamics Journal Seek; Google Scholar; Ovid LinkSolver; etc.<\/p>\n<p>Submission Method:<br \/>\nElectronic Submission System\uff1a<a href=\"https:\/\/easychair.org\/conferences\/?conf=icict20150\" rel=\"nofollow\">https:\/\/easychair.org\/conferences\/?conf=icict20150<\/a><br \/>\n    E-mail: icict@iacsit.org<\/p>\n<p>Contact Us:<br \/>\nMs. Yoyo Yang<br \/>\nE-mail: icict@iacsit.org<br \/>\nTel: +1-518-478-2659(USA)<br \/>\n+8628-8652-8758 (China)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Topics: Algorithms Artificial Intelligence Automated Software Engineering Bio-informatics Bioinformatics and Scientific Computing Biomedical Engineering Compilers and Interpreters Computational Intelligence Computer Animation Computer Architecture &amp; VLSI Computer Architecture and Embedded Systems Computer Based Education Computer Games Computer Graphics &amp; Virtual Reality Computer Graphics and Multimedia Computer Modeling Computer Networks Computer Networks and Data Communication Computer Security [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[86],"tags":[],"class_list":["post-14190","post","type-post","status-publish","format-standard","hentry","category-events"],"views":1620,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14190"}],"version-history":[{"count":2,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14190\/revisions"}],"predecessor-version":[{"id":14199,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14190\/revisions\/14199"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}