Call for Papers
The ICDIM intends to bridge the gap between different areas of
digital information management, science and technology. This forum
will address a large number of themes and issues. The conference
will feature original research and industrial papers on the theory,
design and implementation of digital information systems, as well as
demonstrations, tutorials, workshops and industrial presentations.
The topics in ICDIM 2019 include but are not confined to the
following areas.
|
 |
Information Management |
|
 |
Information Technology Management |
|
 |
Web Mining including Web Intelligence and Web 3.0 |
|
 |
E-Learning, eCommerce, e-Business and e-Government |
|
 |
Edge and Fog Computing |
|
 |
Data Analytics |
|
 |
Software Engineering |
|
 |
Deep Learning |
|
 |
Natural Lanaguage Processing |
|
 |
Smart Learning and Smart Cities |
|
 |
Signal Processing |
|
 |
Network Services |
|
 |
Data Mining and Text Mining |
|
 |
Knowledge Graphs, Recommender System, Ontology |
|
 |
Computational Linguistics |
|
 |
Security and Access Control |
|
 |
Mobile, Ad Hoc and Sensor Network Security |
|
 |
Distributed information systems |
|
 |
Information visualization |
|
 |
Multimedia and Interactive Multimedia |
|
 |
Image Analysis and Image Processing |
|
 |
Cloud Computing |
|
 |
Computational Intelligence |
|
 |
Privacy, Security and Trusted Computing |
|
 |
Machine Learning |
|
 |
Human-Computer Interaction |
|
 |
Internet of Things |
All the accepted papers of ICDIM 2019 will appear in the proceedings published by
IEEE.
All paper of ICDIM 2019 will be fully indexed by IEEE Xplore. 
All the ICDIM 2019 papers will be indexed by DBLP. 
Modified version of the selected papers will appear in the special issues of the following peer reviewed journals.
1. Journal on Data Semantics
2. Technologies
3. Data Technologies and Applications
4. Webology
5. Journal of Digital Information Management
6. International Journal of Computational Linguistics
7. Journal of Optimization
SUBMISSIONS AT http://www.icdim.org/submission.html
● Call for Workshops/Tutorials/Demos
In addition to the main technical program, the conference will
include workshops/tutorials/demos.
Submit proposals for workshops/tutorials/demos : 
|