RTA-CSIT 2025: 6th International Conference on Recent Trends and Applications in Computer Science Faculty of Natural Sciences, University of Tirana Tirana, Albania, May 22-24, 2025 |
Conference website | https://sites.google.com/fshn.edu.al/rta-csit/ |
Submission link | https://easychair.org/conferences/?conf=rtacsit2025 |
Poster | download |
Submission deadline | March 21, 2025 |
The main goal of the event is to provide an opportunity for researchers and IT practitioners from all over the world to present their research results and discuss the practical challenges encountered and the solution adopted. This conference provides opportunities for participants to exchange new ideas and application experiences face to face, to establish research or business relations and to find potentials partners for future collaboration.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
-
Full paper (max 10 pages)
-
Reports on finished works including experiments, evaluation and any other outcomes.
-
-
Short paper (max 5 pages)
- Reports on work in progress, initial ideas, preliminary results.List of TopicsList of Topics
Accepted papers will need to be presented by one of the authors during the conference sessions. Participation is free of charge.
List of Topics
Artificial Intelligence
-
Constraint-based reasoning and constraint programming
-
AI and evolutionary algorithms
-
Distributed AI systems and architectures
-
Distributed AI algorithms and techniques
-
Heuristic searching methods
-
Evaluation of AI tools
-
Intelligent agents
-
Integration of AI with other technologies
-
Intelligent databases
-
Intelligent data mining and farming
-
Intelligent information systems
-
Intelligent information fusion
-
Intelligent System Design
-
Intelligent networks
-
Intelligent user interfaces
-
Intelligent tutoring systems
-
Languages and programming techniques for AI
-
Intelligent web-based business
-
Multisensor data fusion using neural and fuzzy techniques
-
Learning and adaptive sensor fusion Reasoning strategies
-
Neural networks and applications Social impact of AI
-
Search and meta-heuristics
-
Social intelligence (markets and computational societies)
Computer Technologies
-
Design and analysis of algorithms
-
Artificial intelligence
-
Human-Computer Interaction
-
High-Performance Computing
-
Programming Languages
-
Machine Learning
-
Computer Graphics & Virtual Reality
-
Computer Architecture and Embedded Systems
-
Systems Analysis, Design, and Implementation
-
Computer Games
-
Software Engineering
-
Biological computation and computational biology
-
Computer-Aided Design and Manufacturing Intelligence
-
Simulation and Modeling
-
Parallel and Distributed Computing
-
Visual and Multimedia Computing
Cybersecurity
-
Anonymity and Censorship Resistance
-
Artificial Intelligence for Security
-
Audit and Accountability
-
Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
-
Data and Computation Integrity
-
Database Security
-
Digital Content Protection
-
Digital Forensics
-
Formal Methods for Security and Privacy
-
Hardware Security
-
Information Hiding
-
Identity Management
-
Information Flow Control
-
Information Security
-
Intrusion Detection
-
Governance and Management
-
Language-based Security
-
Malware and Unwanted Software
-
Network Security
-
Phishing and Spam Prevention
-
Privacy Technologies and Mechanisms
-
Risk Analysis and Management
-
Secure Electronic Voting
-
Security Economics and Metrics
-
Security and Privacy in Cloud / Fog Systems
-
Security and Privacy of Systems based on Machine Learning and A.I.
-
Security and Privacy in Crowdsourcing
-
Security and Privacy in the IoT and Cyber-Physical Systems
-
Security and Privacy in Location-based Services
-
Security and Privacy for Mobile / Smartphone Platforms
-
Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures
-
Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
-
Security and Privacy in Social Networks Security and Privacy in Wireless and Cellular Communications
-
Software Security
-
Systems Security
-
Trustworthy Computing to Secure Networks and Systems
-
Usable Security and Privacy
-
Web Security
Data Science
-
Data-driven Decision Making and Predictive Analytics
-
Machine Learning (ML) and Deep Learning Algorithms
-
Natural Language Processing (NLP)
-
Computer Vision and Image Processing
-
Graph Analytics and Knowledge Graphs
-
Data Preprocessing, Cleaning, and Imputation
-
Deep Generative Models (GANs, VAEs)
Enabling Technologies and Recent Trends in Advanced Computing
-
Web Technologies
-
Human Computer Interaction
-
Service-Oriented Architectures
-
Mobile Computing
-
Cloud Computing
-
Grid Computing
-
Distributed Computing
-
GIS and Location Based Services
-
Augmented Reality
-
Multi-agent Systems
-
Log Management and Database Security
-
Semantic Web and Web Mining
-
Multimedia Technologies
-
Formal Methods for Software Security and Reliability
-
Digital Signatures
-
Computing Methods in Bioinformatics
-
Software Engineering
-
Expert Systems Trends in AI
-
Image Processing
-
Information Retrieval
-
Information Security
-
Modern DBMS
-
Business Intelligence
-
Data Mining
-
Mathematical Modelling in Computer Science
-
Applied Informatics in Natural Sciences
Challenges in Teaching Methods in Informatics
-
Challenges in Defining an International Curriculum
The Diversity in Informatics Curricula
-
Patterns of Curriculum Design
-
Student Interaction
-
Programming Environments
-
E-Learning
E-Commerce and E-Business
-
Modeling and Evaluation of E-Commerce
-
Categories of E-Commerce
-
E-Marketing
-
Web Based E-Commerce Systems
Publication
RTA-CSIT 2025 proceedings shall be published for publication online in CEUR-WS.org
Contact
All questions about submissions should be emailed to rtacsit@fshn.edu.al