[ Download Portable Version ]


Princess Sumaya University for Technology, Amman, Jordan, October 11 - 13, 2017

The International Conference on new Trends in Computing Sciences is organized by the King Hussein School for Computing Science in Princess Sumaya University for Technology with the support of the Scientific Research Support Fund (Ministry of Higher Education and Scientific Research-Jordan). The goal of the conference is to provide an international biannual forum where international scientists meet with Jordanian scientists from the different fields of computer science to exchange ideas and information on current studies, challenges, research results, system developments, and practical experiences. Aside from the regular presentations, the conference will include keynote addresses with speakers from both industry and academia. Papers reporting original and unpublished research results and experience are solicited. All submitted papers will be judged base on their quality and relevance through double-blind reviewing. Best paper awards will be given based on scientific novelty and for best podium presentations. Extended versions of selected papers will be published in special issues of the International Journal of Information Technology and Web Engineering (IJITWE) and the Jordanian Journal of Computers and Information Technology (JJCIT).

The conference will be published by the Conference Publishing Services (CPS).

The proceedings of the conference will be submitted to IEEEXplore and Computer Science Digital Library (CSDL) for indexing.


Important Dates:

Paper submission deadline:  May 30, 2017 extended to June 20, 2017
Author notification:  June 30, 2017 extended to July 10, 2017
Camera-ready version due:  July 15, 2017  extended to July 30, 2017
Authors Notified of Final Acceptance: July 30, 2017
Early Registration Deadline:  August 31, 2017
Author Registration Deadline  September  10 , 2017
Conference:  October 11-13, 2017


Prospective authors are invited to submit papers in any of the following areas (not limited to):


Data Science and Big Data

  • Evolutionary Computation
  • Big Data Analytics
  • Information Retrieval for Big Data
  • Social Network Analysis and Mining.
  • Data and Text Mining
  • Data Analysis and Visualization
  • Computational Statistics and Modeling
  • Data Engineering
  • Mining Massive Data
  • Data Visualization

Computer and Network Security

  • Botnet Detection and Prevention
  • Forensic Investigation of the IoT
  • Big Data Forensics
  • Cloud Computing Security
  • Network Flow Analysis
  • Intrusion Detection and Prevention
  • Mobile Security
  • Digital Forensics and Anti-Forensics
  • Malware Analysis and Memory Forensics
  • Wireless Network 

Natural Language Processing

  • Semantic Processing
  • Lexical Semantics
  • Ontology
  • Latent Semantic Analysis
  • Linguistic Resources
  • Paraphrasing
  • Language Generation
  • Text Entailment
  • Machine Translation
  • Information Retrieval
  • Text Mining
  • Question Answering
  • Speech Analysis and Recognition
  • Arabic Natural Language Processing

Artificial Intelligence

  • Knowledge Representation
  • Multi-Agent Systems
  • Machine Learning
  • Fuzzy Systems
  • Expert Systems
  • Computer Vision
  • Neural Networks and Applications
  • Pattern Recognition
  • Automated Problem Solving

Software Engineering

  • Software Engineering for Mobile Apps
  • Software Engineering for Cloud
  • Software Engineering for IoT
  • DevOps
  • Secure Software Development
  • Software Quality Management
  • Architectural risk analysis
  • Search based software engineering
  • Code review using static analysis tools

Internet of Things (IoT)

  • Architectures and protocols for the IoT
  • IoT new designs and architectures
  • IoT/M2M Management.
  • Interoperability of IoT systems
  • IoT applications
  • Security ,Identity and privacy of IoT
  • Reliability of IoT 
  • Scalability issues for IoT networks.
  • Disaster recovery in IoT 


Keynote Speakers:

We are pleased to have the following keynote speakers, who will cover different aspects of the conference topic:

  • Big Data and Data Science presented by Prof. Yi Murphey, University of Michigan-Dearborn, USA
  • Edge Clouds: Architectures and Deployment Models presented by Omer Rana, Cardiff University, UK
  • The Future of Security and Forensic Computing in the new Education 2.0 era and Emphasis in Globalisation presented by Giorgio Giacinto, University of Cagliari, Italy 
    and Prof. George Dafoulas, Middlesex University, UK
  • Fuzzy Cognitive Maps presented by Vanhoof Koen, Universiteit Hasselt, Belgium
  • Building Trust in Cloud Computing presented by Adnan Shaout, University of Michigan – Dearborn, USA
  • Towards Multi-Core Processing in Automotive Power Train Control presented by Osamah Rawashdeh, Oakland University, USA
  • The Theory and Applications of the Stochastic Point Location Problem presented by John Oommen, Carleton University, Canada
  • Towards a computer-automated translation (CAT) system capable of ensuring high-quality communication between the hundreds of “languages of the Web” presented by Prof. Christian Boitet, Université Grenoble Alpes, France


Papers Submission Guidelines:

  • Only original unpublished contributions are solicited for presentation.
  • Plagiarism in any form will lead to the rejection of the paper.
  • Simultaneous submissions (papers already submitted to other conferences/ journals) are not allowed.
  • All papers must follow strict IEEE formatting instructions.
  • Violation of which will lead to rejection of the paper.
  • Submitted papers should be written in English with a maximum length of 6 pages.
  • No-show papers are defined as papers submitted by authors who subsequently did not present the paper in-person (no videos, no remote cast) at the conference.
  • Noshow papers will be identified as “No-Show” and will not be published.
  • No refund of the paid fees can be claimed by the no-show author.


Submit your paper here before June 20, 2017.


Review Process:

  • Double-blind reviewing
  • Minimum of 2 reviewers per paper; all reviewers are subject matter experts
  • Each reviewer will be given maximum 3 papers to review in a one-month period.

Paper Format:

  • It is required that the manuscript follows the standard IEEE camera-ready format.

    • IEEE templates in MS Word, here
    • LaTex Formatting Macros, here


The conference will host the following workshops:

  • Natural Language Processing (NLP)
  • Secure Software Development
  • Data Science
  • Lowering the Barriers to Big Data Solutions
  • Digital Forensics and Incident Response
  • FORC: Pathway in Forensic Computing
  • Integrating and Assessing Professional and Leadership Elements in the Engineering and Computing Curriculum





Author Registration Deadline

Full Author Rate

USD 200

September 10 , 2017

Students Rate

USD 100

September 10 , 2017

One additional paper is allowed

for the same attendee  of first paper


September 10 , 2017

Full Attendee (None Student)

USD 100


September 10 , 2017

Local Students Attendee Rate

USD 75


September 10 , 2017

Gala Dinner at Dead Sea


USD 50


Optional for other guests (Gala Dinner is free for registered authors)

Trip to Petra


USD 100‚Äč


 Optional (This include transportation and entrance fees)