18th International Conference on Open Source Systems and Technologies (ICOSST)

 

ICOSST is a renowned international conference focusing on Open Source Systems and Technologies. It serves as a cross-disciplinary platform for distributed enterprise computing and e-Governance. This conference enables both public and private organizations to maintain control over development and deployment costs, transforming the way software applications are designed, implemented, and utilized. Open-source software (OSS) not only offers innovative architectural approaches but also provides robust cross-platforms and frameworks for large-scale distributed systems.

This year, ICOSST 2024 will be conducted in a hybrid mode, allowing presenters to choose between virtual or in-person presentations. We are proud to announce that this conference is organized by the Al-Khawarizmi Institute of Computer Science, UET Lahore, and in Technical Co-sponsorship and in Collaboration with IEEE Computer & Communication Societies, IEEE CIS Lahore Chapter, IEEE Lahore Section Pakistan and department of Computer Science, UET Lahore. This two-day event aims to gather researchers and practitioners from around the globe, offering them an opportunity to exchange ideas and share their experiences concerning the state-of-the-art and future advancements in Open Source systems and technologies.

We welcome contributions in various areas related to Open Source systems, including but not limited to:

  • Generative AI and LLMs
    1. Architectures, Designing, Training , Evaluation, Benchmarking of Large Language Models
    2. Optimization and Scalability of LLMs
    3. Explainability and Interpretability of Open Large Language Models
    4. Applications of LLMs i.e., Transfer learning, Translations, etc.
    5. Applications of Generative AI like Chatbots
    6. Legal and Ethical Considerations of Generative AI/LLMs
    7. Testing Biases of Open LLMs and Generative AI
    8. Generative AI and LLM driven Decision Support Systems
    9. Synthesis and Detection of Deep Fakes
  • Software and Systems Engineering
    1. Open Softwares for Emerging Systems
    2. Open Software for Education, Healthcare, Finance, etc.
    3. Blockchain based Software/System Applications
    4. Business Intelligence Applications, Tools, Data warehousing, and Platforms.
    5. Human-Computer interaction
    6. Open Software Development, Debugging, Testing, Verification, and Benchmarking
    7. Open Source Data, Tools, Software, Applications, and Analytics
  • Smart Cities & E-Governance
    1. Smart Decision Support Systems for Different Domains like Healthcare, Education, Transportation
    2. Disaster Surveillance and Management for Smart Cities
    3. Framework, Models, Tools, Platforms, Strategies, and Data for E-Governance:
    4. Capacity Building and Skills Development for E-Governance: Strategies, Tools, Data, Software
    5. OpenData, Transparency, and Collaboration in E-Governance
    6. Smart City Infrastructure: Protocols (LoraWAN) and Technologies (FiWARE)
    7. IoT and Sensor Networks for Smart Cities
    8. Energy Management, Smart Grids, and Sustainability in Smart Cities
  • Open Metaverse and Virtual Reality
    1. Virtual Humans and Digital Twins
    2. Augmented Reality (AR)/Virtual Reality (VR)/Mixed Reality (MR) / Extended Reality (XR) Tools, Architectures, Applications, Modeling, Simulation, and Visualization
    3. AI for AR/VR/MR/XR
    4. User Behavior, User Interaction/Connectivity with Virtual Environment, 3D Object Rendering
    5. Gamification, Game Design, Development, Game-Based Learning/Training
    6. Application of virtual Reality and Virtual Humans in Various Domains like Military, Healthcare, Education, Cyber Frauds, Entertainment, etc.
  • Data Science and Artificial Intelligence
    1. Data Science Algorithms, Application, Models, Analytics
    2. Use Cases for Socio-Economic Development
    3. Machine/Deep/Reinforcement Learning
    4. Distributed, Centralized, Federated Learning
    5. Natural Language Processing (NLP)/Understanding (NLU), Reasoning, Inference.
    6. Speech Recognition and Processing
    7. Computer Vision, Pattern Recognition and Applications
    8. Ethics in Data Science/AI
    9. Explainable AI (XAI)
  • Cloud Computing and Big data
    1. Big data Models, Theories, Algorithms, Approaches, Solutions, Applications, Analytics
    2. Cloud Computing Maintenance, Security, Management, Optimization, Automation, and Operations
    3. Big data Processing for Fog/Edge Computing
    4. Big Data Storage, Management, Retrieval etc.
    5. Cloud Computing Architecture, Optimization, Protocols, Performance Modeling, Services, and Use Cases
  • Network, Communications, and Cyber Security
    1. Wireless Communication Systems and Technologies
    2. Drone Networking
    3. Advances, Application, Architecture, Evaluation of P2P Communication
    4. Vehicular Networking (IoV/V2V/V2I/V2X)
    5. Traffic Measurement, Analysis, Modeling, Visualization, and Engineering
    6. Data privacy, Cryptography, and Anonymity on the Network
    7. Network Forensics and Security
    8. Malware, Intrusion, Ransomware, and Virus Detection and Prevention
    9. Green Communications Systems and Networks
    10. Ad-hoc and Sensor Networks
    11. 5G Networks: Resource Allocation, Service Monitoring, Security, Debugging, and Management
  • Internet of Things (IoT)
    1. Fog/Edge Computing : Applications, Models, Mobility Management, Security, Privacy, Storage, Trust
    2. Big Data/AI/Blockchain/ Cloud computing (AWS/Azure/GCP) for IOT Devices
    3. Next Generation Infrastructure and Communication Protocols for IoT
    4. Case Studies and Real Worlds Applications of IoT in Healthcare, Energy, Agriculture
  • Autonomous Systems and Robotics
    1. AI for Robotics and Automation: Real World Applications
    2. Intelligent and Autonomous Systems
    3. Ethics and social implications of autonomous systems
    4. Autonomous mobile robots and drones

“IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference.”