30-31 May 2022
Paper Submission: CLOSED
U.S.A. ISBN: 978-0-9998551-9-5
U.S.A. Library of Congress:
ISSN: 2767-9640
- Welcome
- Call for Papers
- Conference Committee
- Conference Themes
- Accepted Papers
- Special Topics Sessions
- Investigación en Español
- Important Dates
- Registration
- Conference Program
- Conference Venue
- Sponsorship
This major international conference will address a range of important themes with respect to all major business fields.
The conference will include numerous papers presentations by academics and researchers from around the globe. Conference participants are welcome to submit full papers, short papers, extended abstracts, or invited session proposals. Please refer to Call for Papers.
All participants will have the opportunity to present their papers live to other participants, receive a full copy of the conference proceedings and registration fee payment receipts (Invoices) via download.
Interested academics and practitioners are invited to submit:
Research papers: complete papers (5000 words max.) with complete references section.
Short papers / Abstracts: this could be research in progress, abstracts, ideas you would like to explore with audience at the conference, or draft of papers for possible co-authorship: (max. 5 pages or 2000 words)
IBIMA focuses on real-world business research. All papers will be directed to the appropriate theme and/or track. All accepted papers that are registered by author(s) will be published in the conference proceedings.
Review process and evaluation
Papers will be evaluated for originality, significance, clarity, and contribution. It is IBIMA strict policy to make efforts to send complete papers to two reviewers in the same area of research of the submitted paper for full blind peer review process and to send a summary of review back to the author(s). Short papers/abstracts will be reviewed by a reviewer and/or the conference chair and can issue a decision. All review comments and suggestions should be fully addressed in the final submission. Submitted Papers must not have been previously published or currently submitted for publication elsewhere.
Conference proceedings will be published as an e-book on a USB (ISBN: 978-0-9998551-8-8, ISSN: 2767-9640) and will be sent after the conference to indexers.
*IBIMA reserves the right to accept or reject any research/short paper proposal/submission. Reasons for rejection include, but are not limited to: topics not fitting the conference program main theme or panel subjects, insufficient space on the conference program, failure to meet professional obligations in prior IBIMA conferences (e.g., not completing a paper, not delivering a paper on time, failure to appear for a scheduled slot), failure to register for the conference, unprofessional conduct, or any other reason.
Conference Committees
Conference Chair
Khalid S. Soliman, International Business Information Management Association, USA
Advisory Committee
Najib Saylani, Florida State College at Jacksonville, USA
Omar Al-Azzam, University of Minnesota Crookston, USA
Xiuzhen Feng, Beijing University of Technology, China
Hesham H. Ali, University of Nebraska at Omaha, USA
Magdy Serour, InContext Solutions, Australia
Ahmed Azam, DeVry University, USA
Program Committee
(program committee member's name appears on this list only after reviewing at least one paper)
Ghazi Ben Ayed, Higher College of Technology, UAE
Ioana Andreea Bogoslov, Lucian Blaga University of Sibiu, Romania
Aleksandra Kuzior, Silesian University of Technology, Poland
Rehana Parveen, Prince Sultan University, KSA
D. F. Rateb, The American University in Cairo, Egypt
Tomas Broum, The University of West Bohemia, Czech Republic
Teuku Aulia Geumpana, University of Newcastle, Australia
Kalaiselvee Rethinam, AIMST University, Malaysia
Vladimír Bolek, University of Economics in Bratislava, Slovakia
Waldemar Woźniak, University of Zielona Góra, Poland
Arkadiusz Banasik, Silesian University of Technology, Poland
Lorena Batagan, Bucharest University of Economics, Romania
Houssemeddine Derbel, University of Manouba, Tunisia
Alexandru Tudor George, Politehnica University of Bucharest, Romania
Maciej Czaplewski, University of Szczecin, Poland
Marcin Butlewski, Poznan University of Technology, Poland
Artur Arciuch, Military University of Technology, Poland
Samira Ellouze, University of Sfax, Tunisia
Mohamed Yassin Chkouri, Abdelmalek Essaâdi University, Morocco
Athanasios Podaras, Technical University of Liberec, Czech Republic
Oluwafemi Samson Balogun, University of Eastern Finland, Finland
Cezar Toader, Technical Univ. of Cluj-Napoca, Romania
Paweł Kobis, Czestochowa University of Technology, Poland
The 39th IBIMA Computer Science Conference revolves around important themes.
Computer Science and Technology topics of interest:
- Artificial Intelligence applications
- Big Data research Forensic data analysis
- Data Mining & Information Retrieval
- Computer Games, Computer Graphics & Virtual Reality
- Computer Networks
- Data security and Cryptography
- Database & Information Systems
- Digital Signal & Image Processing
- Digital System, Logic Design & Embedded Systems
- Distributed & Parallel Processing
- Human Computer Interaction
- Internet, & Web Applications
- Multimedia Tools & Applications
- Natural Language Processing
- Numerical & Symbolic Computation
- Pattern Recognition
- Robotics and Automation
- Social Networking
- Software Engineering
- Theoretical Computer Science
- Mobile Applications
- Wireless Communication and cloud Computing
- Fuzzy Logic and Neural Network applications
- Knowledge-based Systems Engineering
- Object-Oriented Database Systems
- Data Warehouses and Data Mining
- Software engineering of e-business systems
- Data Mining techniques
- Knowledge extraction and search
The following papers have been accepted for inclusion in the 39th IBIMA Computer Science Conference proceedings. The list has two categories: "Research Papers" and "Short Papers".
Research Papers
- Using Recommendation Systems on a Website Presenting Movies
- Computer Aided Numerical Control of 3-Axis Cartesian Robot
- BGDCaLP – Blood Glucose Data Collector and Level Predictor
- New Provable Multisignature Scheme Based on Pairings of Type 1
- Implementation and performance evaluation of the Xoodyak lightweight encryption algorithm
- Ensuring Data Security in Cloud Computing
- Medical Diagnostic Support Algorithms Based on Fuzzy Set Methodology
- Authentication Methods in Modern Web Services
- Integrating Fuzzy TF-IDF Weighting with PCA Guided Clustering for Structuring CIO Knowledge on Advantages in Cloud Solutions Absorption in Manufacturing
- Remote Learning In Programming, Robotics, And Computer Forensics. Tools And Methods For Conducting Laboratories
- Security Mechanisms for Applications Developed in Java
- IoT-based Healthcare Monitoring Systems for Assisting Neurodegenerative Patients: A Sustainable Healthcare Model for Wellbeing during Lifespan
- Immunity Test to Electric Field according to MIL STD 461G in Reference to Tests of Small and Large Objects
- Application of QBoolSol Algorithm to the Fundamental Problems of Asymmetric Cryptography
- Querying UML Based Ontology of Historical Geographic Information
- Masking The Acoustic Signals Generated By 3D Printers Using Variety Of Noise Types
- Lightning Protection for Public Buildings
- E-Voting using Blockchain Technology
- Optimizing Statistical Databases Based on Transactional Database Systems
- Industry 4.0 - Safety Guidelines in the Construction of Technical Devices
- Simulation Studies of The Impact of Traffic Prioritization Mechanisms on The Traffic Efficiency of Multi-Service Network Nodes
- A Study on The Properties of Complex non-full-availability Systems
- Impact of Satellite Remote Sensing versus Multispectral Aerial Photography Remote Sensing with Agricultural Drones
- Algorithmic Processing of Natural Language
- The Use of Reverse Engineering in a Plastics Processing Company
- Computer Accessories as Hardware Heritage
- Performing Text Analytics –Human vs. Computer
- Analysis of Adaptive Video Streaming Degradation Based on Clustering Approach
- Data Analytics and Decision Making in Big Data: A Study on Criminality Case
- Connection and Communication between Computer and Hardware Simulation Model for Industrial Engineers
- Location Accuracy of a Radio Ground Station in the Rice Channel by the Multilateration Method with the Use of Non-linear Regression Function
- Database Security: Challenges and Protections
- Extended Process of Industry 4.0 Knowledge Transfer Using Automation Elements and Hardware Simulation
- The Performance-Enhancing Capabilities in SAPUI5
Short Papers
- Packet Anonymization as a Part of Network Scattering in HDL
- Implementation of the Android source code for ‘Holmes and Rahe Stress Scale Questionnaire – to identify the stress factors’
- Analysis of Aluminum Base Metal Composites Production on an Industrial Scale
- Integrated System for the Streamline of Costs for the Heat Treatment Process
- NFT-BASED User Authentication Scheme For Mobile APPS
- Load Balancing and Prioritization as a Part of Network Scattering in HDL
- FFT and Chirp-Z Transforms as Methods of Determining Image Raster Parameters
- Use of Software Testing Tools in Polish Enterprises
- Implementation and Comparison of Three Network Steganography Methods based on Transmission Control Protocol
- Digital Audio Watermarking Technique with the Use of Multiple DWT and DCT Transform
- Audio Steganography using Discrete Cosine Transform (DCT) with Memorizing the Features of the Chroma
- Lossless Audio Compression using Variational Autoencoder on Mel-scaled Spectrogram
- Steganography of Binary Information in Image Using Deep Learning Method
- A Deep Selection of FIR Filter Coefficients
- Deep Hiding of the Audio Signal in Audio Signals
- Ensuring Integrity in The SDN Networks
- Neural Networks Used in Video Signal Watermarking
- Existing Methods of Security Anomaly Detection in Software Defined Networks (SDN)
- Existing Authentication and Challenge-response Techniques in SDN Networking
- What is the Deepfake Technique?
- Eliminating Electromagnetic Disturbances Generated by Radio Equipment Conducted in Onboard Power Supply Network
- Synthetic Spectral Image Database Generator for Deep Learning in a Radio Environment
- Twitter Arabic Dialect Identification using AraBERT
- Demodulation of Faded QAM Signal based on Neural Network
- Practical Implementation of the FSK Demodulator based on Neural Network
- Convolutions and Transposed Convolutions in Digital Image Processing
- HEVC Codec Description and Comparison
- Video Steganography by Machine Learning Method
- Robust Data Hiding in Image by DenseNet Architecture
- Overview of Deep Learning Voice Conversion Methods using Disentangling Speaker from Linguistic Content
- Document Management Application
- Harvest Control and Monitoring for Smart Devices
- A Mobile App to Suggest Baby Names
- Mobile Optical Character Recognition
- A Mobile App Oriented for the Need of Virtual Storage - Using Ionic
We invite interested scholars, researchers, and managers to organize your own session(s) within the conference. The special topic session is a unique opportunity that brings together researchers and audience from around the world to discuss a specific research question of interest and/or share research efforts with others who have worked in the same area. These sessions could result in future joint research efforts, co-authorship of journal articles, and/or book publications. Special topics sessions are highly beneficial if they are well organized.
The efforts of the Special Topics Sessions' Organizers will be recognized as follows:
- The registration fee of the session organizer will be waived if at least 4 authors of invited papers register at the conference.
- Session organizers names will appear on the conference proceedings as Associate Editors
You can submit a proposal to organize a special topics session, workshop, and/or tutorial. Proposals to organize a special topic session should include the following information: name and address, e-mail of proposer, title of session, a 100-word description of the topic of the session, and a short description on how the session will be advertised. Usually, session proposers solicit papers from colleagues and researchers whose work is known to the session proposer. E-mail proposal to the conference chair.
Each special topic session will have at least 4 papers. The session chairs will be responsible for all aspects of their sessions; including, soliciting papers, reviewing, selecting, etc. The review process for invited sessions will strictly follow the review process for regular submission. Papers will be evaluated for originality, significance, clarity, and contribution. Each paper will be exposed to a full blind peer review by two reviewers in the topical area. Final camera-ready papers will be reviewed by one reviewer. Papers must not have been previously published or currently submitted for publication elsewhere.
Please e-mail conference Chair with your proposal.
Investigación en Español
Se invita a Académicos y a Practicantes interesados a enviar sus ponencias en las siguientes categorías:
- Artículos de Investigación: artículos completos (5000 palabras máximo) con sección de referencias completa.
- Resúmenes de Investigaciones en progreso: reportes sobre el progreso de una investigación (extensión máxima: 5 páginas o 1000 palabras)
Todos los artículos deberán ser dirigidos al tema o área apropiados. Los artículos aceptados se publicarán en las actas o memorias de la conferencia.
Los artículos serán evaluados en base a su originalidad, importancia, claridad, y en general, su contribución a la ciencia. Cada artículo será sometido a revisión doble-ciega por dos árbitros. El resumen de la retroalimentación será enviado al autor (autores) en la mayoría de los casos. Todos los comentarios y sugerencias de la revisión deberán ser considerados para la versión final. Los artículos enviados no se deben haber publicado o sometido actual o previamente para su publicación en algún otro foro.
Las memorias de la conferencia se publicarán como un libro electrónico en un USB (ISBN: 978-0-9998551-9-5, ISSN: 2767-9640)
Envío de trabajos: CERRADO
Temas de la conferencia
39th IBIMA Computer Science Conference 30-31 May 2022
Conference Closed
Conference Presentation Guidelines:
Authors and presenters must check their inbox for details instructions and guidelines for presentations.
Conference Proceedings
IBIMA Conference proceedings are ISBN: 978-0-9998551-8-8
Conference Program
Closed
There are three levels of Sponsorship opportunities at a single IBIMA Conference:
Platinum level (3000 USD):
- Logo on conference website, brochure, soft proceedings, at the venue within the conference area
- Morning Coffee Break Sponsorship
- Announcement of the Sponsorship In Social Media
- Full page ad about sponsor in program booklet
- Waiver of three registration fees for sponsors representatives to attend the conference
- 20 % discount for additional passes
Gold Level (2500 USD):
- Logo on conference website, brochure, soft proceedings, at the venue within the conference area
- Afternoon Coffee Break Sponsorship
- Announcement of the Sponsorship In Social Media
- Half page ad about sponsor in program booklet
- Waiver of two registration fees for sponsors representatives to attend the conference
- 15 % discount for additional passes
Silver Level (2000 USD):
- Logo on conference website, brochure, soft proceedings, at the venue within the conference area
- Announcement of the Sponsorship In Social Media
- Waiver of one registration fee for sponsors’ representative to attend the conference
- 10 % discount for additional passes
To express your university/organization interest in sponsoring an IBIMA event please contact us