International Conference on Information and Communication Technologies - (ICICT-25)


16th - 17th August, 2025 | Wuhan, China

Multi-format (In-person/Virtual)

Important Dates

Pre-registration Deadline

17th July, 2025

Paper Submission Deadline

27th July, 2025

Last Date Of Registration

1st August, 2025

Date Of Conference

16th - 17th August, 2025

Downloads

Call For Paper

The Research Leagues events aim to release a wide range of articles that provide insight and explore the latest advancements in engineering, medicine, social science, applied science, management etc.

Our conference practices methodological, conceptual, and epistemological diversity. But we prefer articles that effectively engage with current intellectual debates. We expect our participants to contribute innovative ideas, perspectives, and research methods.

Our events can potentially revolutionize the current paradigm and pave the way for growth and development. Those who intend to have their original findings and research published through our events should get an idea from the Author Guidelines, Rules for Presentation, and Instruction sections, before anything else.

Engineering

  • System Engineering
  • Service Oriented Architecture
  • Semantic Web
  • Software Engineering
  • Modeling and Simulation
  • Automated Software Engineering
  • Bioinformatics
  • Cloud & Grid Computing
  • Engineering Computing
  • Information Systems and Applications
  • Data and Knowledge Management
  • E-Government
  • E-Health
  • E-Learning
  • E-Science
  • E-Transactions Systems
  • Data Warehousing and Data Mining
  • Database Management
  • Databases
  • Information Management
  • Smart Knowledge Managemen
  • Business Informatics
  • Smart Grid
  • Smart Systems & Devices
  • Agent Based Computing
  • Neural Networks
  • Ambient Computing
  • Sensor Technology
  • Artificial Intelligence
  • Natural Language Processing
  • Cognitive Science
  • Real time Analysis
  • Image Processing
  • Virtual and Augmented Reality
  • Internet and Mobile Computing
  • Wireless Networks
  • Social Computing and Social Media
  • Parallel and Distributed Computing
  • Internet of Things
  • Internet Applications
  • Mobile Computing
  • Pervasive/Ubiquitous Computing
  • Availability, Reliability and Security
  • Authorization and Authentication
  • Business Continuity & Resilience
  • Cryptography
  • Digital Forensics
  • Identity Management
  • Intrusion Detection and Fraud Detection
  • Mobile & Network Security
  • Privacy-Enhancing Technologies
  • Security and Usability
  • Software Security
  • Authorization and Authentication

Indexing / Supported By: