Open Science Research Excellence

ICISI 2021 : International Conference on Intelligence and Security Informatics

London, United Kingdom
April 22 - 23, 2021

Conference Code: 21UK04ICISI

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICISI 2021 has teamed up with the Special Journal Issue on Intelligence and Security Informatics. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   March 16, 2021
Notification of Acceptance/Rejection   April 1, 2021
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   December 24, 2020
Conference Dates   April 22 - 23, 2021

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) Thresholding Approach for Automatic Detection of Pseudomonas aeruginosa Biofilms from Fluorescence in situ Hybridization Images
Zonglin Yang, Tatsuya Akiyama, Kerry S. Williamson, Michael J. Franklin, Thiruvarangan Ramaraj
2) Prioritizing the Most Important Information from Contractors’ BIM Handover for Firefighters’ Responsibilities
Akram Mahdaviparsa, Tamera McCuen, Vahideh Karimimansoob
3) Digital Individual Benefit Statement: The Use of a Triangulation Methodology to Design a Digital Platform for Switzerland
Catherine Equey Balzli
4) Machine Learning Facing Behavioral Noise Problem in an Imbalanced Data Using One Side Behavioral Noise Reduction: Application to a Fraud Detection
Salma El Hajjami, Jamal Malki, Alain Bouju, Mohammed Berrada
5) Photodetector Engineering with Plasmonic Properties
Hasan Furkan Kurt, Tugba Nur Atabey, Onat Cavit Dereli, Ahmad Salmanogli, H. Selcuk Gecim
6) Financial Technology: The Key to Achieving Financial Inclusion in Developing Countries Post COVID-19 from an East African Perspective
Yosia Mulumba, Klaus Schmidt
7) A BIM-Based Approach to Assess COVID-19 Risk Management Regarding Indoor Air Ventilation and Pedestrian Dynamics
T. Delval, C. Sauvage, Q. Jullien, R. Viano, T. Diallo, B. Collignan, G. Picinbono
8) Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia
Daniel Alati
9) Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles
Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis
10) Knowledge Management in Academic: A Perspective of Academic Research Contribution to Economic Development of a Nation
Hilary J. Watsilla, Narasimha R. Vajjhala
11) Modeling Engagement with Multimodal Multisensor Data: The Continuous Performance Test as an Objective Tool to Track Flow
Mohammad H. Taheri, David J. Brown, Nasser Sherkat
12) The Conduct of Laundering Money through Transport of Cash in the Middle East and North Africa Region
Haytham Yassine
13) Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region
Haytham Yassine
14) Public Financial Management in Ghana: A Move beyond Reforms to Consolidation and Sustainability
Mohammed Sani Abdulai
15) Discussing Embedded versus Central Machine Learning in Wireless Sensor Networks
Anne-Lena Kampen, Øivind Kure

Similar conferences about Computer and Information Engineering