Event detail

04th-Aug-2025 to
05th-Aug-2025
Madrid, Spain
Organizer Details
Sreejesh A K
919789129171
Call For Paper
Machine Learning for Data Mining Data Mining Methods for Security Agent and Multi-Agent Systems Hybrid Systems Unsupervised Learning Classification Methods Novelty Detection Intrusion Detection Systems Log Correlation Methods Adaptive Defense of Network Infrastructure Adaptive Reasoning Information Forensics Document Classification and Processing Ontologies and Conceptual Information Processing Semantic Information Representation Natural Language Acquisition Web Semantics in Intelligence and Law-Enforcement Industrial and Commercial Applications of Intelligent Methods for Security Intelligent Control and Monitoring of Critical Systems Dynamic Adaptive Railway Operation Centralized Control Systems Adaptive Planning for Strategic Reasoning Intelligent Methods in Energy and Transportation Planning and Automated Reasoning in Large System Control Biometric Identification and Recognition Biometric Surveillance Biometric Access Control Extraction of Biometric Features (fingerprint
iris
face
voice
palm
gait) Cryptography Applied Cryptography and provably-secure cryptographic protocols Design and analysis of efficient cryptographic primitives: public-key and symmetric-key cryptosystems
block ciphers
and hash functions Economic fraud on the Internet: phishing
pharming
spam
and click fraud Email and web security Intellectual property protection: metering
watermarking
and digital rights management. Computer Science
namely on HPC and Grid computing issues Computational Sciences
with requirements in HPC and Grid Computational Engineering with a similar focus. Grid Middleware
Grid Computing
Data and Networking Infrastructures Distributed and Large-Scale Data Access and Management Data Repositories
Distributed Resource Management and Scheduling Supercomputer/cluster/grid integration issues Grid Performance Evaluation
QoS and SLA Negotiation Grid and HPC Applications
including e-Science in general and also Science Gateways
Nanomaterials
High Energy Physics
e-Health
e-Business
e-Administration
Life Sciences
Earth Sciences
Civil Protection
Computational Sciences and Engineering
... User Development Environments and Programming Tools for Grid Computing. Infrastructure as a service (IaaS) Virtualization in data centers Virtualization for resource management and QoS assurance Security aspects of using virtualization in a distributed environment Virtual networks Virtual data
storage as a service Fault tolerance in virtualized environments Virtualization in P2P systems Virtualization-based adaptive/autonomic systems The creation and management of environments/appliances Virtualization technologies Performance modeling (applications and systems) Virtualization techniques for energy/thermal management Case studies of applications on IaaS platforms Deployment studies of virtualization technologies Tools relevant to virtualization
About the Conference
About the International Conference on Defence Safety (ICDESA) . is a great way to build networking by engaging in discussion relating to Engineering Topics. This platform wants to bring all the students, researchers, and professionals to one stage to discuss new opportunities, ideas, and developments. Bioinformatics is a great way to build networking
Day 1
Timing | Session |
---|---|
9:00 AM - 9:30 AM | Registration |
9:30 AM - 10:00 AM | Introduction to WCASET |
10:00 AM- 10:15 AM | Tea Break |
10:15 AM - 1:00 PM | Pre-lunch Technical Session |
1:00 PM - 1:30 PM | Lunch |
1:30 PM - 5.00PM | Post- lunch Technical Session |
Day 2
Timing | Session |
---|---|
9:00 AM - 9:30 AM | Registration |
9:30 AM - 10:00 AM | Inaugural Session |
10:00 AM- 10:15 AM | Tea Break |
10:15 AM - 1:00 PM | Pre-lunch Technical Session |
1:00 PM - 1:30 PM | Lunch |
1:30 PM - 4:00PM | Post- lunch Technical Session |
4:00 PM - 5.00PM | Certificate Distribution |
Author/Co-Author Registration Fee Includes:
- Participation in the technical program of upto two author/co-authors
- Welcome reception
- Badge
- Research Foundation Conference Bag
- Conference Accessories/Kits
- Certificates for author and co-authors
- Research Foundation Conference Proceeding
- Research Foundation Conference Proceeding CD
- Coffee breaks
- Lunch
- Awards Ceremony
At least one author of each accepted paper must be registered for the conference for that paper to appear in the proceedings and be scheduled for presentation. Participating members may register as per the following charges.
Your Total Payment:
- For students registering late an extra amount of USD 20 will be charged.
- Registered members are asked to intimate about the registration immediately
- After completion of registration process, participant are required to send the Screen shot of transaction or registration fees payment proof to us (mail to : [email protected]) on or before the last date of registration.
- Any modification in the paper will not be accepted after the final submission date.
- Maximum up to five authors/ co authors per paper is allowed for participate.
- No registration will be entertained after last date of registration.
Mail Bank Statement
Once you have transfered the registration fees mail the screen shot of online transaction to info@[email protected](With your complete registration details)
Camera Ready Paper Submission
Submit Camera ready paper as per the guidelines.