SlideShare a Scribd company logo
1 of 2
Download to read offline
11th
International Conference on Applications of Graph Theory in Wireless Ad
hoc Networks and Sensor Networks (GRAPH-HOC - 2019)
November 23~24, 2019, Zurich, Switzerland
https://cseit2019.org/graphhoc/index.html
Call for papers
11th
International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and
Sensor Networks (GRAPH-HOC - 2019) focuses on the applications of graph theory in different
areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc
Networks (VANETs) and sensor networks. Graph theoretic concepts are applied in several
fundamental issues such as connectivity, data gathering, routing, mobility, energy efficiency and
topology control. Papers submitted for the conference should focus on a problem that is of both
theoretical as well as practical interest in the area of ad hoc networks and sensor networks. This
conference will thus provide a platform for researchers from both theoretical and practical domains
of ad hoc networks to meet and exchange their ideas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in
the following areas, but are not limited to.
Topics
 Distributed extensions of centralized graph theoretic routing algorithms
 Connectivity Analysis under Different Mobility Models
 Data Gathering Algorithms and Protocols for Sensor Networks
 Applications of Random Graph Theory in Ad Hoc Networks and Sensor Networks
 Algorithms for Scheduling and Resource Allocation Problems
 Algorithms for Topology Control and Power Assignment
 Evacuation Routing Algorithms and Protocols for Vehicular Ad Hoc Networks
 Secure Routing Algorithms and Protocols Based on Graph Theory
 Approximation Heuristics for NP-complete problems related to Ad Hoc Networks
Paper Submission
Authors are invited to submit papers through conference Submission system by September 14,
2019. Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this conference. The proceedings of the
conference will be published by Computer Science Conference Proceedings in Computer
Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from GRAPH-HOC 2019, after further revisions, will be published in the special
issue of the following journal.
 International Journal on Applications of Graph Theory in Wireless Ad hoc Networks
and Sensor Networks (GRAPH-HOC)
 International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)- UGC
Listed
 International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 International Journal on AdHoc Networking Systems (IJANS)
 Information Technology in Industry (ITII)New
- ESCI-Thomson Reuters Indexed
Important Dates
 Submission Deadline : September 14, 2019
 Notification : October 10, 2019
 Final Manuscript Due : October 15, 2019
 Publication Date : Determined by the Editor-in-Chief
Here’s where you can reach us: graphhoc@cseit2019.org or graphhocconf@yahoo.com
Paper Submission Link: https://cseit2019.org/submission/index.php

More Related Content

What's hot

13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...ijasuc
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...ijasuc
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...ijasuc
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)ijfcst journal
 

What's hot (14)

13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 
International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)International Journal in Foundations of Computer Science & Technology(IJFCST)
International Journal in Foundations of Computer Science & Technology(IJFCST)
 

Similar to 11th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2019)

Call for papers - 12th International Conference on Applications of Graph Theo...
Call for papers - 12th International Conference on Applications of Graph Theo...Call for papers - 12th International Conference on Applications of Graph Theo...
Call for papers - 12th International Conference on Applications of Graph Theo...ijassn
 
12th International Conference on Applications of Graph Theory in Wireless Ad ...
12th International Conference on Applications of Graph Theory in Wireless Ad ...12th International Conference on Applications of Graph Theory in Wireless Ad ...
12th International Conference on Applications of Graph Theory in Wireless Ad ...pijans
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...ijasuc
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)IJNSA Journal
 
12th International conference on Parallel, Distributed Computing and Applicat...
12th International conference on Parallel, Distributed Computing and Applicat...12th International conference on Parallel, Distributed Computing and Applicat...
12th International conference on Parallel, Distributed Computing and Applicat...ijccmsjournal
 
9th International Conference on Networks & Communications (NCOM 2023)
9th International Conference on Networks & Communications (NCOM 2023)9th International Conference on Networks & Communications (NCOM 2023)
9th International Conference on Networks & Communications (NCOM 2023)ijwmn
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)ijwmn
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)IJNSA Journal
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)ijasuc
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)ijwmn
 
6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...pijans
 
6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...ijassn
 
11 th International Conference on Parallel, Distributed Computing Technologi...
11 th International Conference on Parallel, Distributed Computing  Technologi...11 th International Conference on Parallel, Distributed Computing  Technologi...
11 th International Conference on Parallel, Distributed Computing Technologi...IJCSEA Journal
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...pijans
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...ijassn
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...pijans
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...ijujournal
 
9 th International Conference on Parallel, Distributed Computing and Applicat...
9 th International Conference on Parallel, Distributed Computing and Applicat...9 th International Conference on Parallel, Distributed Computing and Applicat...
9 th International Conference on Parallel, Distributed Computing and Applicat...ijwmn
 
Call for Papers - 9th International Conference on Parallel, Distributed Compu...
Call for Papers - 9th International Conference on Parallel, Distributed Compu...Call for Papers - 9th International Conference on Parallel, Distributed Compu...
Call for Papers - 9th International Conference on Parallel, Distributed Compu...IJNSA Journal
 
Call for papers - 9th International conference on Parallel, Distributed Compu...
Call for papers - 9th International conference on Parallel, Distributed Compu...Call for papers - 9th International conference on Parallel, Distributed Compu...
Call for papers - 9th International conference on Parallel, Distributed Compu...ijassn
 

Similar to 11th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2019) (20)

Call for papers - 12th International Conference on Applications of Graph Theo...
Call for papers - 12th International Conference on Applications of Graph Theo...Call for papers - 12th International Conference on Applications of Graph Theo...
Call for papers - 12th International Conference on Applications of Graph Theo...
 
12th International Conference on Applications of Graph Theory in Wireless Ad ...
12th International Conference on Applications of Graph Theory in Wireless Ad ...12th International Conference on Applications of Graph Theory in Wireless Ad ...
12th International Conference on Applications of Graph Theory in Wireless Ad ...
 
13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...13th International Conference on Applications of Graph Theory in Wireless Ad ...
13th International Conference on Applications of Graph Theory in Wireless Ad ...
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
 
12th International conference on Parallel, Distributed Computing and Applicat...
12th International conference on Parallel, Distributed Computing and Applicat...12th International conference on Parallel, Distributed Computing and Applicat...
12th International conference on Parallel, Distributed Computing and Applicat...
 
9th International Conference on Networks & Communications (NCOM 2023)
9th International Conference on Networks & Communications (NCOM 2023)9th International Conference on Networks & Communications (NCOM 2023)
9th International Conference on Networks & Communications (NCOM 2023)
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
 
11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
 
6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...
 
6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...6th International Conference on Computer Networks & Data Communications (CNDC...
6th International Conference on Computer Networks & Data Communications (CNDC...
 
11 th International Conference on Parallel, Distributed Computing Technologi...
11 th International Conference on Parallel, Distributed Computing  Technologi...11 th International Conference on Parallel, Distributed Computing  Technologi...
11 th International Conference on Parallel, Distributed Computing Technologi...
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...
 
9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...9th International Conference on Parallel, Distributed Computing and Applicati...
9th International Conference on Parallel, Distributed Computing and Applicati...
 
9 th International Conference on Parallel, Distributed Computing and Applicat...
9 th International Conference on Parallel, Distributed Computing and Applicat...9 th International Conference on Parallel, Distributed Computing and Applicat...
9 th International Conference on Parallel, Distributed Computing and Applicat...
 
Call for Papers - 9th International Conference on Parallel, Distributed Compu...
Call for Papers - 9th International Conference on Parallel, Distributed Compu...Call for Papers - 9th International Conference on Parallel, Distributed Compu...
Call for Papers - 9th International Conference on Parallel, Distributed Compu...
 
Call for papers - 9th International conference on Parallel, Distributed Compu...
Call for papers - 9th International conference on Parallel, Distributed Compu...Call for papers - 9th International conference on Parallel, Distributed Compu...
Call for papers - 9th International conference on Parallel, Distributed Compu...
 

More from pijans

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 

More from pijans (20)

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

11th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2019)

  • 1. 11th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2019) November 23~24, 2019, Zurich, Switzerland https://cseit2019.org/graphhoc/index.html Call for papers 11th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2019) focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor networks. Graph theoretic concepts are applied in several fundamental issues such as connectivity, data gathering, routing, mobility, energy efficiency and topology control. Papers submitted for the conference should focus on a problem that is of both theoretical as well as practical interest in the area of ad hoc networks and sensor networks. This conference will thus provide a platform for researchers from both theoretical and practical domains of ad hoc networks to meet and exchange their ideas. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Topics  Distributed extensions of centralized graph theoretic routing algorithms  Connectivity Analysis under Different Mobility Models  Data Gathering Algorithms and Protocols for Sensor Networks  Applications of Random Graph Theory in Ad Hoc Networks and Sensor Networks  Algorithms for Scheduling and Resource Allocation Problems  Algorithms for Topology Control and Power Assignment  Evacuation Routing Algorithms and Protocols for Vehicular Ad Hoc Networks  Secure Routing Algorithms and Protocols Based on Graph Theory  Approximation Heuristics for NP-complete problems related to Ad Hoc Networks Paper Submission Authors are invited to submit papers through conference Submission system by September 14, 2019. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from GRAPH-HOC 2019, after further revisions, will be published in the special issue of the following journal.  International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC)  International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)- UGC Listed  International Journal of Advanced Smart Sensor Network Systems (IJASSN)  International Journal on AdHoc Networking Systems (IJANS)  Information Technology in Industry (ITII)New - ESCI-Thomson Reuters Indexed
  • 2. Important Dates  Submission Deadline : September 14, 2019  Notification : October 10, 2019  Final Manuscript Due : October 15, 2019  Publication Date : Determined by the Editor-in-Chief Here’s where you can reach us: graphhoc@cseit2019.org or graphhocconf@yahoo.com Paper Submission Link: https://cseit2019.org/submission/index.php