Fifteenth International Conference on Information Processing - 2019

Theme: Internet of Things

Call for Papers

Paper Submission and templates

Authors should submit an original and unpublished paper in English, carefully check for correct grammar and spelling, using the easychair submission link that will be made available on . The materials presented in the papers should not be published or under submission elsewhere. All papers must conform, at time of submission, to the IEEE Formatting Guidelines. Please use either this Word Template or this Latex package. The paper should be produced in A4 page size with 1.7cm margins on all the sides. The guidelines for paper formatting and paper page limits must be strictly used for all submitted papers. The submission format is the same as the camera-ready format. Please check and carefully follow the instructions and templates provided.

Each paper should clearly indicate the nature of its technical/scientific contribution and the problems, domains or environments to which it is applicable. The plagiarism report should show Similarity index of less than 30% including bibliograpghy. Authors are solely responsible for any plagiarism issues. Papers that are out of the conference scope or contain any form of plagiarism will be rejected without reviews.

Types of Papers

A regular paper presents a research work that is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a Full Paper (maximum upto 8 pages), Short Paper (maximum upto 6 pages) or Poster (maximum upto 3 pages).


The web submission procedure automatically sends an acknowledgement, by e-mail, to the contact author.


All submitted papers will undergo a rigorous review process managed by the technical program committee. A double-blind paper evaluation method will be followed.


The contact author of each paper will be intimated of the result by e-mail after the completion of reviewing process. The authors are required to follow the reviews meticulously before the camera-ready submission.

Best Paper Awards

Few best paper awards will be given based on the technical contents at the Conference

Tutorials and Workshops

The conference program committee solicits proposals for workshop and tutorials. Proposals should be sent to Proposals should contain maximum of six pages including the title, workshops / tutorials structure, targeted audience and author biography.

Copyright Transfer

IEEE policy requires that prior to publication all authors or their employers must transfer to the IEEE in writing any copyright they hold for their individual papers. Please visit the following URL to learn more about securing copyright transfer
Authors must sign their copyright form via IEEE eCopyright service. You will notified about this form once the paper has been accepted for publication.


Topics of interest include (but are not limited to) the following, in the context of Information Processing.

  • IoT Architecture,
  • Cyber Physical Social Systems,
  • Green IoT,
  • Networking,
  • Smart Cities,
  • Connected Living,
  • Developing IoT Technologies,
  • Connected Services,
  • Wearables,
  • Energy, Environment & Agriculture,
  • Smart Home,
  • Startups,
  • Connected Industry,
  • Automotive,
  • Healthcare, Asset and Fleet Management,
  • Manufacturing,
  • Retail Point Of Sales,
  • Smart Grid,
  • Smart Metering,
  • Consumer Electronics Industry,
  • IoT Solutions for Industries and Use Cases in Dedicated Areas: Manufacturing, Transportation & Logistics, Healthcare, Retail, Smart Cities, Agriculture & Security, and Operability & Standards,
  • Industrial IoT Segments,
  • IoT Standards,
  • Accelerating Development/Deployment,
  • Change Management,
  • Designing Applications,
  • Enablers,
  • Industrial IoT,
  • Enterprise Adoption of Internet of Things (IoT),
  • Machine-To-Machine (M2M) Technology,
  • Monetizing the Industrial Internet,
  • Changing Business Models,
  • Developing Secure Ecosystems,
  • IoT Enterprise Operations,
  • IoT Pricing Models,
  • Edge Routing,
  • Field Operations,
  • Gateway Architectures for IoT Applications,
  • IoT Solutions For the Enterprise; Remote Monitoring, Supply Chain and Logistics,
  • Integrating the IoT into Enterprise IT Architecture,
  • Inventory Management,
  • IoT and New Product/Service Development,
  • Connected Life and Work,
  • Smart Energy, HVAC Monitoring and Management,
  • Agriculture and Farming Applications,
  • Building Apps and Solutions,
  • Autonomous Autos and New Transportation Models,
  • Location Maps and New Marketing Models,
  • Open Source Development for IoT,
  • Rapid Prototyping with Open Devices,
  • Java Embedded,
  • Mobile Devices: Transmitting With and Without Interruption,
  • Web Services and IoT Integration,
  • Open Hardware and Open Source Development: Gigabones, Raspberry Pi,
  • Augmented and Virtual Reality,
  • Developing for Verticals; Smart Home, Wellness, Connected Care Applications,
  • Distributed Networks,
  • Dynamic Spectrum,
  • Spatial Analysis,
  • Hybrid Cloud Processing,
  • Identity Management,
  • Low Power Wide Area Networks,
  • LTE For IoT,
  • Building IoT Platforms for Third Party Use,
  • Routing Protocols for low power and lossy networks (RPL) in IoT,

  • Data Governance,
  • Data Analytics,
  • Business Intelligence and Machine Learning,
  • Process Driven Decision Making,
  • Predictive Analytics,
  • Prescriptive Analytics,
  • Business Intelligence and Compliance,
  • Machine Learning,
  • Getting IoT Data to Smart Phones and Tablets,
  • Defining Data Strategies,
  • Big Data,
  • Distributed Databases,
  • Real Time Business Intelligence,
  • Cognitive IoT,
  • Human Device Interaction for IoT,
  • Data Mining,
  • Data Visualization,
  • Data Compression,
  • Social Network Data Analytics,
  • Social Computing,
  • Web Analytics and Intelligence,
  • Predictive Analysis for Business and Healthcare,
  • Deployment of Data Science Solutions in Industry,
  • Swarm Intelligence,
  • Business Transformation.

  • Edge Computing,
  • Cloud Computing,
  • Mobile Computing,
  • Service Oriented Architecture( SoA ),
  • Service Oriented Computing,
  • Web Services,
  • Mobile Cloud Computing,
  • Fog Computing.

  • IoT Security,
  • IoT Gateway Solutions,
  • Connected, Smart and Secure Systems,
  • Remote Systems and Security,
  • Privacy and Security,
  • Understanding Data Privacy and Security Issues,
  • Authentication and Security,
  • Platforms and Portability,
  • Cryptographic Techniques,
  • Cyber Security and Malware Protection,
  • Data and Application Security,
  • Data Privacy and Security,
  • Network Security,
  • Biometric Security,
  • Security Management,
  • Security Tools and Development,
  • Detection, prevention, response and mitigation of cyber threats to IoT,
  • Security protocols in IoT,
  • Risk analysis and management for IoT infrastructures,
  • Threat modeling in IoT,
  • Firewall, access control, identity management,
  • Experiments of using security solutions and proof-of-concepts,
  • Large-scale simulations in the Internet of Things,
  • Intrusion detection and prevention techniques,
  • Social engineering and ethical hacking: techniques and case studies,
  • Software engineering for security modeling, business process modeling and analytics,
  • Data security, data recovery, disaster recovery,
  • Adoption challenges and recommendation,
  • Cryptography,
  • Ensuring the resilience and security of IoT dependent infrastructures,
  • Vulnerabilities and counter measures.

We wish you success with your publication. Should you experience any difficulties during the preparation of your paper, please contact the Publication Chair for further information.