{"id":14298,"date":"2015-07-26T21:15:54","date_gmt":"2015-07-26T18:15:54","guid":{"rendered":"http:\/\/hgpu.org\/?p=14298"},"modified":"2015-07-26T21:15:54","modified_gmt":"2015-07-26T18:15:54","slug":"the-5th-international-conference-on-information-computer-application-icica-2016","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=14298","title":{"rendered":"The 5th International Conference on Information Computer Application (ICICA), 2016"},"content":{"rendered":"<p>Publication:<br \/>\nSubmissions will be peer reviewed and evaluated based on originality, relevance to conference, contributions, and presentation. Selected papers of ICICA 2016 will be published in one of the below Journals:<br \/>\n* Journal of Computers (ISSN: 1796-203X)<br \/>\nIndexing\/Abstracting: DBLP, EBSCO, DOAJ, ProQuest, INSPEC, ULRICH&#8217;s Periodicals Directory, WorldCat, CNKI,etc.<br \/>\n* Journal of Advances in Information Technology (ISSN: 1798-2340)<br \/>\nAbstracting\/Indexing: INSPEC; EBSCO; ULRICH&#8217;s Periodicals Directory; WorldCat; CrossRef; Genamics JournalSeek; Google Scholar; Ovid LinkSolver; etc.<\/p>\n<p>Call for Papers:<br \/>\nAlgorithms<br \/>\nAutomated Software Engineering<br \/>\nBioinformatics and Scientific Computing<br \/>\nComputer Games<br \/>\nComputer Graphics and Multimedia<br \/>\nComputer Networks<br \/>\nComputer Security<br \/>\nComputer Vision<br \/>\nControl Systems<br \/>\nData Compression<br \/>\nData Mining<br \/>\nDigital System and Logic Design<br \/>\nDistributed Systems<br \/>\nHigh Performance Computing<br \/>\nImage Processing<br \/>\nInformation Systems<br \/>\nKnowledge Data Engineering<br \/>\nMultimedia Applications<br \/>\nNeural Networks<br \/>\nPattern Recognition<br \/>\nProgramming Languages<br \/>\nRobotics and Automation<br \/>\nSoftware Engineering &amp; CASE<br \/>\nTechnology in Education<br \/>\nTheoretical Computer Science<br \/>\nWireless Sensor Networks<br \/>\nArtificial Intelligence<br \/>\nBio-informatics<br \/>\nBiomedical Engineering<br \/>\nComputer Modeling<br \/>\nComputer Networks and Data Communication<br \/>\nComputer Simulation<br \/>\nData Communications<br \/>\nData Encryption<br \/>\nDatabase Systems<br \/>\nExpert Systems<br \/>\nHuman Computer Interaction<br \/>\nInformation Retrieval<br \/>\nInternet and Web Applications<br \/>\nPerformance Evaluation<br \/>\nReconfigurable Computing Systems<br \/>\nSecurity &amp; Cryptography<br \/>\nSystem Security<br \/>\nTechnology Management<br \/>\nWireless Communication and Mobile Computing<br \/>\nFor more: <a href=\"http:\/\/www.icica.org\/cfp.html\" rel=\"nofollow\">http:\/\/www.icica.org\/cfp.html<\/a><\/p>\n<p>Submission Method:<br \/>\nPlease log in the Electronic Submission System; and upload your paper.<br \/>\n(<a href=\"http:\/\/www.easychair.org\/conferences\/?conf=icica2016\" rel=\"nofollow\">http:\/\/www.easychair.org\/conferences\/?conf=icica2016<\/a>)<\/p>\n<p>Should you have any questions about the submission, please<br \/>\nContact us\uff1a<br \/>\nMs. Yoyo Yang<br \/>\nE-mail: icica@iacsit.org<br \/>\nTel (AM 9:30&#8211;PM 12:00, PM 13:30&#8211;PM 18:00, Monday to Friday):<br \/>\n+1-518-478-2659 (USA)<br \/>\n+86-28-86528758 (China)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Publication: Submissions will be peer reviewed and evaluated based on originality, relevance to conference, contributions, and presentation. Selected papers of ICICA 2016 will be published in one of the below Journals: * Journal of Computers (ISSN: 1796-203X) Indexing\/Abstracting: DBLP, EBSCO, DOAJ, ProQuest, INSPEC, ULRICH&#8217;s Periodicals Directory, WorldCat, CNKI,etc. * Journal of Advances in Information Technology [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[86],"tags":[],"class_list":["post-14298","post","type-post","status-publish","format-standard","hentry","category-events"],"views":1719,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14298"}],"version-history":[{"count":2,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14298\/revisions"}],"predecessor-version":[{"id":14318,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14298\/revisions\/14318"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}