SlideShare a Scribd company logo
1 of 3
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
ISSN : 0976-1764 (online) ; 0976 - 2205 (Print)
http://airccse.org/journal/ijasuc/ijasuc.html
Call for Papers
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-
reviewed journal provides excellent international forum for sharing knowledge and results in theory,
methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a
dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a
rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor &
Ubiquitous computing has received a significant and sustained research interest in terms of designing and
deploying large scale and high performance computational applications in real life.
Topics of interest include, but are not limited to, the following.
Ad Hoc Computing
• Ad Hoc Networks of Autonomous Intelligent Systems
• Addressing and Location Management
• Architectures, Protocols and Algorithms
• Data Management Issues
• Distributed Technology
• Mobile Ad Hoc Learning
• Mobile and Wireless Ad Hoc Networks
• Mobile Agents for Ad Hoc Networking
• Network Design and Planning
• Novel Architectures for Ad Hoc and SensorNetworks
• Performance Analysis and Simulation of Protocols
• Power-Aware and Energy-Efficient Designs
• Quality of Service
• Resource Allocation
• Security and Privacy
• Self-Configuring and Self-Healing Schemes
• Services and Applications
• Wireless & Mobile Network Security
• Wireless Sensor Networks
Sensor Networks
• Architectures, Protocols and Algorithms
• Data allocation and Information
• Deployments and Implementations
• Embedded, Network-Oriented Operating Systems
• Energy Optimization
• Hardware Aspects ofSensor Design
• Location Management and Placement
• MAC Protocols for Wireless Sensor Networks
• Middleware and Software Tools
• Modeling and Performance Evaluation
• Radio Issues with Other Wireless/Mobile Systems
• Resource Allocation, Services, QoS and Fault Tolerance
• Scalability of Wireless SensorNetworks
• Security and Dependability Issues
• Sensor Circuits and Devices
• Software, Applications and Programming
• Under Water Sensors and Systems
• Visualization of Sensor Data
Ubiquitous Computing
• Architectural Structure, Design Decisions and Philosophies
• Autonomic Management of Ubiquitous Systems
• Context and Location Awareness,Context Based and Implicit Computing
• Distributed Computing
• Ubicomp Human-Computer Interaction for Devices
• Intelligent Devices and Environments
• Internet Computing and Applications
• Interoperability and Large Scale Deployment
• Middleware Services and Agent Technologies
• Personalized & Special Field Applications
• Security Issues and Applications
• Service Discovery Mechanisms and Protocols
• Software Infrastructures
• System Support Infrastructures and Services
• Ubiquitous Systems and Trust
• User Interfaces and Interaction Models
• Virtualization Over Networks of Devices
• Wearable Computers and Technologies
• Wireless Networking and Mobile, Pervasive and Ubiquitous Computing
• Wireless/Mobile Service Management and Delivery
• Mobile Computing
• Network Protocols & Wireless Communication
• Work Models
Paper Submission
Authors are invited to submit papers for this journal through E-mail : ijasucjournal@airccse.org. Submissions
must be original and should not have been published previously or be under consideration for publication while
being evaluated for this Journal.
Important Dates
 Submission Deadline : October 16, 2021
 Notification : November 16, 2021
 Final Manuscript Due : November 24, 2021
 Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us : ijasucjournal@yahoo.com or ijasuc@aircconline.com or
ijasucjournal@airccse.org
For Other Details please visit: http://airccse.org/journal/ijasuc/ijasuc.html

More Related Content

What's hot

Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsReal-Time Innovations (RTI)
 
Hardware Lab. Andrew Kokhanovskyi. Kaa introduction
Hardware Lab. Andrew Kokhanovskyi. Kaa introductionHardware Lab. Andrew Kokhanovskyi. Kaa introduction
Hardware Lab. Andrew Kokhanovskyi. Kaa introductionGeeksLab Odessa
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Richard Hudson
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
WSO2Con EU 2016: Enterprise Platform for Digital Transformation
WSO2Con EU 2016: Enterprise Platform for Digital TransformationWSO2Con EU 2016: Enterprise Platform for Digital Transformation
WSO2Con EU 2016: Enterprise Platform for Digital TransformationWSO2
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityDan Fitzgerald, CISSP, CIPM
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security BrokersRobin Vermeirsch
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 

What's hot (20)

Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Hardware Lab. Andrew Kokhanovskyi. Kaa introduction
Hardware Lab. Andrew Kokhanovskyi. Kaa introductionHardware Lab. Andrew Kokhanovskyi. Kaa introduction
Hardware Lab. Andrew Kokhanovskyi. Kaa introduction
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
WSO2Con EU 2016: Enterprise Platform for Digital Transformation
WSO2Con EU 2016: Enterprise Platform for Digital TransformationWSO2Con EU 2016: Enterprise Platform for Digital Transformation
WSO2Con EU 2016: Enterprise Platform for Digital Transformation
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Thin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud SecurityThin Air or Solid Ground? Practical Cloud Security
Thin Air or Solid Ground? Practical Cloud Security
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 

Similar to International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdf
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdfInternational Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdf
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdfijasuc
 
Call for Papers - IJASUC (3).pdf
Call for Papers - IJASUC (3).pdfCall for Papers - IJASUC (3).pdf
Call for Papers - IJASUC (3).pdfijasuc
 

Similar to International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) (14)

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
 
Ijasus pdf 11 (1)
Ijasus pdf 11 (1)Ijasus pdf 11 (1)
Ijasus pdf 11 (1)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)
 
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdf
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdfInternational Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdf
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) (2).pdf
 
Call for Papers - IJASUC (3).pdf
Call for Papers - IJASUC (3).pdfCall for Papers - IJASUC (3).pdf
Call for Papers - IJASUC (3).pdf
 

Recently uploaded

Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 

Recently uploaded (20)

Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 

International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ISSN : 0976-1764 (online) ; 0976 - 2205 (Print) http://airccse.org/journal/ijasuc/ijasuc.html Call for Papers International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer- reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. Topics of interest include, but are not limited to, the following. Ad Hoc Computing • Ad Hoc Networks of Autonomous Intelligent Systems • Addressing and Location Management • Architectures, Protocols and Algorithms • Data Management Issues • Distributed Technology • Mobile Ad Hoc Learning • Mobile and Wireless Ad Hoc Networks • Mobile Agents for Ad Hoc Networking • Network Design and Planning • Novel Architectures for Ad Hoc and SensorNetworks • Performance Analysis and Simulation of Protocols • Power-Aware and Energy-Efficient Designs • Quality of Service • Resource Allocation • Security and Privacy • Self-Configuring and Self-Healing Schemes • Services and Applications • Wireless & Mobile Network Security • Wireless Sensor Networks Sensor Networks • Architectures, Protocols and Algorithms • Data allocation and Information • Deployments and Implementations • Embedded, Network-Oriented Operating Systems • Energy Optimization • Hardware Aspects ofSensor Design • Location Management and Placement • MAC Protocols for Wireless Sensor Networks
  • 2. • Middleware and Software Tools • Modeling and Performance Evaluation • Radio Issues with Other Wireless/Mobile Systems • Resource Allocation, Services, QoS and Fault Tolerance • Scalability of Wireless SensorNetworks • Security and Dependability Issues • Sensor Circuits and Devices • Software, Applications and Programming • Under Water Sensors and Systems • Visualization of Sensor Data Ubiquitous Computing • Architectural Structure, Design Decisions and Philosophies • Autonomic Management of Ubiquitous Systems • Context and Location Awareness,Context Based and Implicit Computing • Distributed Computing • Ubicomp Human-Computer Interaction for Devices • Intelligent Devices and Environments • Internet Computing and Applications • Interoperability and Large Scale Deployment • Middleware Services and Agent Technologies • Personalized & Special Field Applications • Security Issues and Applications • Service Discovery Mechanisms and Protocols • Software Infrastructures • System Support Infrastructures and Services • Ubiquitous Systems and Trust • User Interfaces and Interaction Models • Virtualization Over Networks of Devices • Wearable Computers and Technologies • Wireless Networking and Mobile, Pervasive and Ubiquitous Computing • Wireless/Mobile Service Management and Delivery • Mobile Computing • Network Protocols & Wireless Communication • Work Models Paper Submission Authors are invited to submit papers for this journal through E-mail : ijasucjournal@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline : October 16, 2021  Notification : November 16, 2021  Final Manuscript Due : November 24, 2021  Publication Date : Determined by the Editor-in-Chief Contact Us
  • 3. Here's where you can reach us : ijasucjournal@yahoo.com or ijasuc@aircconline.com or ijasucjournal@airccse.org For Other Details please visit: http://airccse.org/journal/ijasuc/ijasuc.html