Now 67 visitors
Today:440 Yesterday:516
Total: 4025842 S 0P 0R
2019-06-20, Week 25

5809 : 5809
Special Slogan: Digital Security Global Agenda for Safe Society!!
Congratulations! Click here to get ICACT2019 conference papers & journal papers have been posted on IEEE Xplore DL, ID: 45930x effective on 2019-05-02. Please be advised that the index sheet and header & Footer information are totally different from conference paper and journal paper
Within a month followed by other Abstracting and Indexing (A&I) databases, such as SCOPUS, EI Compendex, INSPEC, Conference Proceedings Citation Index (CPCI), etc. " (click SCOPUS) (click EI Compendex Source List: ISSN 1738-9445)
Recent 3 years Impact factor H index is 21 score by the SCImago Lab, Copyright 2007-2017, Data Source: Scopus®, which means the rank of this ICACT is the 63rd among 754 international conferences. (click!)
ICACT2020 Call for Papers !! IEEE Conference ID: 48636
Authors invited to submit a 400-word (1 page) abstract summarizing an original work finalized or in progress, and then a full paper (Min. 3 pages) describing the original work to this ICACT conference. All the manuscripts must be written in English and should be prepared in given style of IEEE/ICACT Paper Templates on this ICACT Website. All the submitted papers will be reviewed by 3 peer reviewers in PDF file format submitted on this ICACT Website. "Conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases."

IEEE Conference Search of All ICACT Conferences since 2004
Important Due Dates of ICACT conference
Abstract Submission : Oct. 10, 2019 **Optional
Full Paper Submission : Oct. 10, 2019
Acceptance Notification : Oct. 31, 2019
Pre-Registration : Nov. 10, 2019
Final CRF Submission : Nov. 25, 2019

Topics ( as follows, but not limited to )
1. Wireless Communication
2. Mobile Communication
3. Optical Network
4. Internet, Router
5. Ubiquitous & Sensor Network
6. Information & Network Security
7. Web, Smartphone Hacking & Defense Security
8. Block chain, Cryptocurrency, Cloud and Distributed Application Security
9. Authentication, Bio-metric, Private Security
10. Smartphone, Web Server, Network Forensics
11. Software Platform, Smart Service & App, AR, VR , UI, Browser
12. Web Service, SNS, Creative Design, Computational Thinking
13. WWW, SDN, NFV, CDN, OpenFlow, Future Web
14. Industry 4.0, AI, Deep Learning, Big Data, 3D Printer, Game, Search Engine
15. Smart City, M2M, IoT, IoE, ASP, ERP, CRM, SCM
16. Process mining, ICN, EA, GPM, BPM, Work Flow, e-Government, e-Commerce, e-Learning, e-Health
17. System, Software, Language, Engineering, Work Method, DataBase
18. Network Management, Operation and Maintenance
19. Distributed & Cloud Computing, Remote Computing Architecture
20. NGN, BCN, NGI, Future Network, CCN, Information Centric Network
21. Drone, ITS, LBS, Telematics, Network Robotics
22. IPTV, Internet Telephony, VoIP, MoIP
Plenary Session - Keynote Speech
Title : Cyber Security of Pyeongchang Winter Olympic Games File
Time : 15:00 Feb.18 (Mon) 2019
Speaker : Director General, Oh Sang-jin, Ministry of Science and ICT (MSIT), Korea
Oh Sang-jin works as Director General of Technology Bureau, PyeongChang Organizing Committee for the 2018 Olympics & Paralympic Winter Games(POCOG). Recently he joined POCOG to prepare ICT S/W, H/W and infrastructure for 2018 winter Olympic Games in Pyeong-Chang in Korea. He has usually worked as a public employee in Korean government for ICT promotion role since 1993. He has built his career and experience in Ministry of Science, ICT and Future Planning, the President’s Office, Korea Communications Commission and Ministry of Information and Communications. He studied electrical engineering in Hanyang University in Seoul (89 ~ ’93), and received MBA from University of Oregon, USA (’03 ~’05).

Abstract : Olympic Games are one of the most grand sport events in the world. In case of Pyeongchang Winter Olympic Games, more than 1.3 million spectators visited Olympic sites and more than 3.5 billion people were estimated to watch the event through media. For the various services, more than 90 thousand people were involved for the Olympic operation. To operate the big event smoothly, the organizing committee mainly depended on the high end technologies, especially on information communications technology. The committee built up huge ICT infrastructure, including wired and wireless network facilities and data centers with a lot of SW packages and numerous connected devices. ... More

Title : Driving behavior analysis by using smartphone File
Time : 16:00 Feb.18 (Mon) 2019
Speaker : Ha-Nam Nguyen has been a Vice president of Information Technology Institute (ITI), Vietnam national University in Hanoi (VNU)
Ha-Nam Nguyen has been a Vice president of Information Technology Institute (ITI), Vietnam national University in Hanoi (VNU) since 2017, an associate professor at Department of Information Systems in University of Engineering and Technology (VNU-UET) since 2011, a Senior Lecturer in Data Mining, Statistical Machine Learning, and Database at VNU-UET since 2007. He received his BSc in Information Technology from VNU-Hanoi University of Science and Technology (HUST) in 1998, MSc in Computer Science from Chungwoon University (CWU), Korea in 2003, and PhD in Software Applications from Korea Aerospace University (KAU), Korea in 2007. He interested in financial risk analysis, behavior analysis, developing information systems and maritime logistics/transport using techniques from data analysis, modelling, and software engineering. He has involve in several industrial projects collaborated with Hitachi, Panasonic and Samsung as well as international grants like Newton fund, Horizon 2020 – Research and Innovation Framework Programme.

Abstract : Nowadays, driving assistance and road safety are critical issues in all countries around the world. According to the global status report on road safety 2015 by World health organization (WHO), road accidents are worldwide top ten causes of death, killing more than 1.2 million of people per year. The road traffic fatality rates are especially high in the low-income and middle-income countries. In fact, there are numerous factors possibly causing road accidents. Nonetheless, assisting and providing safety awareness for drivers during their trips is an effective approach to preventing such accidents. Furthermore, the document also shows that approximately a quarter of al ... More

Tutorial Session
Title : Workflow and Business Process Mining File
Time : 16:00 ~ 18:00 Feb. 17 (Sun) 2019
Speaker : Prof. Kwanghoon Pio Kim, Ph.D. CTRL, Collaboration Technology Research Lab. Division of Computer Science and Engineering, KYONGGI UNIVERSITY, South Korea
Kwanghoon Pio Kim is a full professor of computer science and engineering division at Kyonggi University, South Korea. At Kyonggi, he is now in charge of dean of the computer and information center and the director of the contents convergence software research institute. He received B.S. degree in computer science from Kyonggi University in 1984. And he received M.S. degree in computer science from Chungang University in 1986. He also received his M.S. and Ph.D. degrees from the computer science department at the University of Colorado Boulder, in 1994 and 1998, respectively. He had worked as researcher and developer at Aztek Engineering, American Educational Products Inc., and IBM in USA, as well as at Electronics and Telecommunications Research Institute (ETRI) in South Korea. In present, he is a vice-chair of the BPM Korea Forum. He has been in charge of a country-chair (Korea) and ERC vice-chair of the Workflow Management Coalition. His research interests include groupware, workflow management systems, BPM (business process management), ACM (adaptive case management), CSCW (computer-supported cooperative work), advanced information control net theories, collaboration theories, Grid/P2P distributed systems, workflow and business process intelligence, workflow process mining, workflow-supported social networks and knowledge analysis, data intensive workflow, process-aware Internet of Things, and process-aware information systems.

Abstract : The workflow (and business process) literature has been mainly looking for efficient redesigning and reengineering approaches because of not only that workflow procedures are becoming massively large-scaled and complicated, but also, nevertheless, that their life-cycle and recycling (reengineering) periods are becoming swiftly shorter. In other words, BPRs (or WPRs), like business process redesign, reengineering, and restructuring, need to be done frequently and even dynamically as well. In order to perform the BPRs efficiently and effectively, we ought to consider the workflow and business process enactment audit and event history traces logged and collected from the ... More

ⓒ Copyright 1999. ICACT (ISSN 1738-9445) & Global IT Research Institute(GiRI) All rights Reserved. Contact: office (at) icact . org Tel:+82-70-4146-4991
1713 Obelisk, 216 Seohyunno, Bundang-gu, Sungnam Kyunggi-do, Republic of Korea 13591
Business License Number : 220-82-07506, President: Thomas ByeongNam Yoon Ph.D.   
(13591)경기도 성남시 분당구 서현로 216 오벨리스크 1713호 (사)글로벌IT연구회 사업자등록번호 : 220-82-07506 대표자 : 윤병남