Have you heard about The International Journal of Computer Science and Information Security (IJCSIS)? Well, if you haven’t, then we’ve got you covered. Let’s talk about what it is and a few topics to ease up your mind.
We’ll talk about the consisting topics below. But first, let’s talk about the International Journal of Computer Science and Information Security and its overview.
What It’s All About
IJCSIS is part of the best open-access publisher out there. So, as one of the leading publishers, it publishes hundreds of papers each year.
This includes computer science, mobile & wireless computing, networking, and information security. But, it is not limited to that.
“To promote knowledge and technology advancement for the benefit of academia, professional research communities, and industry practitioners.”
Yes, you are part of the focus, and that’s a good thing.
Researchers, Ph.D. scholars, and professionals present their completed research and developments.
Besides, it has a wide research community. As a result, IJCSIS publications worldwide are open online and free for all.
Moreover, all issued papers undergo high-quality peer review and absolute editorial processes.
List Of Topics
It welcomes all papers in any area of computer science. But, they prefer those papers that present soundness through simulation, analysis, or experimentation.
It also welcomes those papers that involve the following:
- Practical experiences and experimental work from both industry and academia
- Documenting the research from test-beds, field-trial, or real deployments.
IJCSIS asks for papers describing significant research contributions to the field of ICT.
Mobile Wireless Sensor Networks
Its purpose is to use in many challenging applications. Examples are military surveillance and scientific search. Also, the same goes for structural monitoring.
Moreover, sustainable deployment of these systems orders for an effective opinion and design.
Parallel and Distributed Systems
Parallel, Distributed, and Network-Based Processing has felt dramatic change over recent years.
For example, new architectures and applications become the central focus of the discipline.
Moreover, these are often results of cross-fertilization of parallel and distributed technologies. And along with other fast-evolving technologies.
Thus, it is important to review and test these new developments.
All research contributions are requested in all areas. Also, note that these areas all relate to pervasive computing and communications.
It accepts submissions from all aspects of data mining, machine learning, and big data. But, don’t forget to highlight real-world applications of business intelligence.
Biometrics and Pattern Recognition
The scope of Pattern Recognition (PR) includes, but not limited to:
- pattern classification
- feature extraction and selection
- data pre-processing
- visual object recognition
- video analysis
- applications in document analysis
- medical imaging
- remote sensing image analysis
- video surveillance, as well as
- intelligent transportation
IJCSIS asks for papers. Especially those that describe vital research contributions to the field of computer. As well as data communication networks.
There are more areas or topics in it, like a lot. So, check it out with the links below!
You can click here for more computer science topics. Also, you can click here for the information security topics.