## Call for Paper

ICAMCT 2018 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve Applied Mathematics and Communication Technology to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Prospective authors are invited to submit original technical papers by the deadline for publication in the ICAMCT 2018 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

## Tracks of the Conference

- Applied Electromagnetic Theory
- Applied Functional Analysis
- Applied Statistics
- Approximation Theory
- Chaos Theory
- Combinatorics
- Complexity Theory
- Computability Theory
- Computational Methods in Mechanics and Physics
- Continuous Modelling
- Continuum Mechanics
- Control Theory
- Cryptography
- Differential Equations
- Discrete Mathematics
- Discrete Geometry
- Dynamical Systems
- Elastodynamics
- Evolutionary Computation
- Financial Mathematics
- Fuzzy Sets and Logic
- Game Theory
- Graph Theory
- Information Theory
- Inverse Problems
- Linear and Nonlinear Programming
- Mathematical Biology
- Mathematical Chemistry
- Mathematical Economics
- Mathematical Methods of Engineering
- Mathematical Physics
- Mathematical Psychology
- Mathematical Sociology
- Matrix Theory
- Neural Networks
- Nonlinear Processes in Physics
- Non-Standard Analysis
- Numerical Analysis
- Operations Research
- Optimal Control
- Optimization
- Probability
- Representation Theory
- Scientific Computing
- Statistical Finance
- Stochastic Processes
- Theoretical Statistics
- Tropical Mathematics
- Wave Motion
- 3G Communication Networks
- 4G Communication Networks
- Adaptive Modeling
- Algorithmic information theory
- Analysis of algorithms and problem complexity
- Antenna Applications
- Approximation Algorithms
- Broad Band Communication
- Cloud Computing
- Clustering Models
- Coding Theory And Techniques
- Communication Security
- Communications Protocols
- Computability theory
- Computational Game Theory
- Computer and Intelligent Communication
- Computer Architecture
- Computer Networks Architecture
- Computer Security
- Computer System Implementation
- Computer-aided engineering
- Computers in Medicines
- Computing in Chemistry
- Computing in Life Sciences
- Computing in Physics
- Computing Medical Sciences
- Cryptography
- Database Management Systems
- Demodulation
- Distance Learning
- Distributed Computing
- Distributed Computing Architecture
- Embedded Wireless Systems
- Energy Efficient Routing & Traffic Engineering
- Ethics in Computing
- Fading Channels
- Fault Tolerance
- Filtering Techniques
- Formal languages
- Formal semantics
- Green Computing
- Grid Computing
- Hacking
- Human Computer Interaction
- Information Theory
- Intelligent Computing
- Internet architecture design
- Internet Architecture Design
- Internet of Things
- Logics and meanings of programs
- Machine Learning
- Management Information Systems
- Mathematical logic
- Mathematical Software
- Microwave Communication
- Mobile and Optical Networks
- Mobile Communication
- Modeling & Simulation of Communication Systems
- Modulation
- Multiplexing
- Network Architecture & Protocol
- Network Management
- Network Security
- Noise Reduction
- Numerical Analysis Applications
- Operation Research Applications
- Optical Communication
- Optimization methods
- Optimization methods
- Pervasive Computing
- Query Optimization
- Queuing Theory
- Rendering Algorithms
- Satellite Communication
- Security and protection
- Security and protection
- Social Computing
- Social Networking
- Software Agents
- Software Engineering
- Storage Area Networks
- Synchronization
- System Software
- Systems Performance Analysis
- Theory Behind Databases
- Theory of computation
- Transactional Coherence and Consistency
- Transmission Diversity
- Type theory
- Ubiquitous Computing
- Virtual Human Simulation
- Wired Communication
- Wireless Communication
- Wireless Networks
- Wireless Sensor Networks

**Journals Publications**

Selected papers of the Conference publication may be recommended for publication in Reputed Journals (Print Edition) after acquiring the written consent from the authors of the paper(s) subject to any other fees related to the publication. Publication into the Journals is at the discretion of the Publisher(s) and not with the Organizer. Further, the waiting period of the Journal Publication will be mentioned in the Acceptance Letter and shall not be forced to modify at any sequence.

Click here to View the Journals