International Conference on Next Gen Information Systems and Technologies - (ICNGIST-25)


1st - 2nd November, 2025 | Harare, Zimbabwe

Multi-format (In-person/Virtual)

Important Dates

Pre-registration Deadline

2nd October, 2025

Paper Submission Deadline

12th October, 2025

Last Date Of Registration

17th October, 2025

Date Of Conference

1st - 2nd November, 2025

Downloads

Call For Paper

The Research Leagues events aim to release a wide range of articles that provide insight and explore the latest advancements in engineering, medicine, social science, applied science, management etc.

Our conference practices methodological, conceptual, and epistemological diversity. But we prefer articles that effectively engage with current intellectual debates. We expect our participants to contribute innovative ideas, perspectives, and research methods.

Our events can potentially revolutionize the current paradigm and pave the way for growth and development. Those who intend to have their original findings and research published through our events should get an idea from the Author Guidelines, Rules for Presentation, and Instruction sections, before anything else.

Engineering

  • Parallel and Distributed Computing
  • Smart Grid 
  • Cluster and P2P Computing
  • Supercomputing
  • Cloud Computing
  • Fog computing
  • Informatics and Scientific Computing
  • Hadoop and Map Reduce techniques
  • Mobile Computing
  • Internet and Web Applications
  • E-Learning System
  • E-commerce and E-governance
  • Computer Based Education
  • Numerical Methods and Algorithms
  • Performance Evaluation
  • Computer analysis and simulation
  • Optimization techniques
  • Social Network Analysis
  • Ontology
  • Computers in Education and Learning Technologies
  • Internet and information systems development
  • Human-Computer Interaction
  • Scheduling Algorithms
  • Wireless Communications and Networking
  • IoT (Internet of things)
  • Ad Hoc and sensor Networks
  • Mobile communication
  • Delay tolerant networks
  • Steganography and Steganalysis
  • Computer and Network Security
  • Cryptography and cryptanalysis
  • Routing Protocols
  • Vehicular networks
  • Intrusion detection and countermeasures
  • Mobile and Wireless networks security
  • Optical network security
  • E-Government security
  • Watermarking & authentication
  • Software Defined Networks
  • Artificial intelligence
  • Machine learning
  • Theoretical Computer Science
  • Computational intelligence
  • Support vector machines
  • Decision Support Systems
  • Natural Language Processing
  • Neural Networks
  • Soft computing
  • Autonomous Agents
  • Decision trees
  • Expert Systems
  • Nature-inspired computation
  • Bio-inspired algorithms
  • Fuzzy systems and applications
  • Genetic algorithms
  • Semantic web
  • Knowledge representation techniques
  • Rough sets
  • Deep Learning
  • Data preprocessing and data cleaning
  • Feature selection and extraction
  • Clustering and classification
  • Association rule mining
  • Data warehousing and OLAP
  • Text and web mining
  • Information fusion
  • Big Data Analytics
  • Data Integration, Interoperability, and Metadata
  • Ubiquitous Data Management and Mobile Databases 
  • Data Structures and data management algorithms 
  • XML data processing and algorithms 
  • Distributed, parallel, Peer to Peer databases 
  • Databases applications 
  • Knowledge Data Engineering 
  • Temporal and multimedia databases 
  • Data storage
  • Pervasive/ubiquitous computing
  • Web services and Internet computing
  • High Performance Computing 
  • Green and Sustainable Computing

Indexing / Supported By: