RTA-CSIT 2025 : Recent Trends and Applications in Computer Science and Information Technology
We cordially invite you to the 6th International Conference on Recent Trends and Applications in Computer Science and Information Technology held in Tirana, Albania.
PUBLICATION
All papers that will be presented at the conference sessions will be published in the conference proceedings.
Proceedings shall be submitted for publication online in http://ceur-ws.org/ (open access, online ISSN, previous editions have been indexed by DBLP / Scopus).
TOPICS OF INTEREST
ARTIFICIAL INTELLIGENCE
Constraint-based reasoning and constraint programming
AI and evolutionary algorithms
Distributed AI systems and architectures
Distributed AI algorithms and techniques
Heuristic searching methods
Evaluation of AI tools
Intelligent agents
Integration of AI with other technologies
Intelligent databases
Intelligent data mining and farming
Intelligent information systems
Intelligent information fusion
Intelligent System Design
Intelligent networks
Intelligent user interfaces
Intelligent tutoring systems
Languages and programming techniques for AI
Intelligent web-based business
Multisensor data fusion using neural and fuzzy techniques
Learning and adaptive sensor fusion Reasoning strategies
Neural networks and applications Social impact of AI
Search and meta-heuristics
Social intelligence (markets and computational societies)
Computer Technologies
Design and analysis of algorithms
Artificial intelligence
Human-Computer Interaction
High-Performance Computing
Programming Languages
Machine Learning
Computer Graphics & Virtual Reality
Computer Architecture and Embedded Systems
Systems Analysis, Design, and Implementation
Computer Games
Software Engineering
Biological computation and computational biology
Computer-Aided Design and Manufacturing Intelligence
Simulation and Modeling
Parallel and Distributed Computing
Visual and Multimedia Computing
CYBERSECURITY
Anonymity and Censorship Resistance
Artificial Intelligence for Security
Audit and Accountability
Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
Data and Computation Integrity
Database Security
Digital Content Protection
Digital Forensics
Formal Methods for Security and Privacy
Hardware Security
Information Hiding
Identity Management
Information Flow Control
Information Security
Intrusion Detection
Governance and Management
Language-based Security
Malware and Unwanted Software
Network Security
Phishing and Spam Prevention
Privacy Technologies and Mechanisms
Risk Analysis and Management
Secure Electronic Voting
Security Economics and Metrics
Security and Privacy in Cloud / Fog Systems
Security and Privacy of Systems based on Machine Learning and A.I.
Security and Privacy in Crowdsourcing
Security and Privacy in the IoT and Cyber-Physical Systems
Security and Privacy in Location-based Services
Security and Privacy for Mobile / Smartphone Platforms
Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures
Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
Security and Privacy in Social Networks Security and Privacy in Wireless and Cellular Communications
Software Security
Systems Security
Trustworthy Computing to Secure Networks and Systems
Usable Security and Privacy
Web Security
DATA SCIENCE
Data-driven Decision Making and Predictive Analytics
Machine Learning (ML) and Deep Learning Algorithms
Natural Language Processing (NLP)
Computer Vision and Image Processing
Graph Analytics and Knowledge Graphs
Data Preprocessing, Cleaning, and Imputation
Deep Generative Models (GANs, VAEs)
ENABLING TECHNOLOGIES AND RECENT TRENDS IN ADVANCED COMPUTING
Web Technologies
Human Computer Interaction
Service-Oriented Architectures
Mobile Computing
Cloud Computing
Grid Computing
Distributed Computing
GIS and Location Based Services
Augmented Reality
Multi-agent Systems
Log Management and Database Security
Semantic Web and Web Mining
Multimedia Technologies
Formal Methods for Software Security and Reliability
Digital Signatures
Computing Methods in Bioinformatics
Software Engineering
Expert Systems Trends in AI
Image Processing
Information Retrieval
Information Security
Modern DBMS
Business Intelligence
Data Mining
Mathematical Modelling in Computer Science
Applied Informatics in Natural Sciences
CHALLENGES IN TEACHING METHODS IN INFORMATICS
Challenges in Defining an International Curriculum
The Diversity in Informatics Curricula
Patterns of Curriculum Design
Student Interaction
Programming Environments
E-Learning
E-COMMERCE and E-BUSINESS
Modeling and Evaluation of E-Commerce
Categories of E-Commerce
E-Marketing
Web Based E-Commerce Systems
CONTACT
rtacsit@fshn.edu.al
PUBLICATION
All papers that will be presented at the conference sessions will be published in the conference proceedings.
Proceedings shall be submitted for publication online in http://ceur-ws.org/ (open access, online ISSN, previous editions have been indexed by DBLP / Scopus).
TOPICS OF INTEREST
ARTIFICIAL INTELLIGENCE
Constraint-based reasoning and constraint programming
AI and evolutionary algorithms
Distributed AI systems and architectures
Distributed AI algorithms and techniques
Heuristic searching methods
Evaluation of AI tools
Intelligent agents
Integration of AI with other technologies
Intelligent databases
Intelligent data mining and farming
Intelligent information systems
Intelligent information fusion
Intelligent System Design
Intelligent networks
Intelligent user interfaces
Intelligent tutoring systems
Languages and programming techniques for AI
Intelligent web-based business
Multisensor data fusion using neural and fuzzy techniques
Learning and adaptive sensor fusion Reasoning strategies
Neural networks and applications Social impact of AI
Search and meta-heuristics
Social intelligence (markets and computational societies)
Computer Technologies
Design and analysis of algorithms
Artificial intelligence
Human-Computer Interaction
High-Performance Computing
Programming Languages
Machine Learning
Computer Graphics & Virtual Reality
Computer Architecture and Embedded Systems
Systems Analysis, Design, and Implementation
Computer Games
Software Engineering
Biological computation and computational biology
Computer-Aided Design and Manufacturing Intelligence
Simulation and Modeling
Parallel and Distributed Computing
Visual and Multimedia Computing
CYBERSECURITY
Anonymity and Censorship Resistance
Artificial Intelligence for Security
Audit and Accountability
Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
Data and Computation Integrity
Database Security
Digital Content Protection
Digital Forensics
Formal Methods for Security and Privacy
Hardware Security
Information Hiding
Identity Management
Information Flow Control
Information Security
Intrusion Detection
Governance and Management
Language-based Security
Malware and Unwanted Software
Network Security
Phishing and Spam Prevention
Privacy Technologies and Mechanisms
Risk Analysis and Management
Secure Electronic Voting
Security Economics and Metrics
Security and Privacy in Cloud / Fog Systems
Security and Privacy of Systems based on Machine Learning and A.I.
Security and Privacy in Crowdsourcing
Security and Privacy in the IoT and Cyber-Physical Systems
Security and Privacy in Location-based Services
Security and Privacy for Mobile / Smartphone Platforms
Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures
Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
Security and Privacy in Social Networks Security and Privacy in Wireless and Cellular Communications
Software Security
Systems Security
Trustworthy Computing to Secure Networks and Systems
Usable Security and Privacy
Web Security
DATA SCIENCE
Data-driven Decision Making and Predictive Analytics
Machine Learning (ML) and Deep Learning Algorithms
Natural Language Processing (NLP)
Computer Vision and Image Processing
Graph Analytics and Knowledge Graphs
Data Preprocessing, Cleaning, and Imputation
Deep Generative Models (GANs, VAEs)
ENABLING TECHNOLOGIES AND RECENT TRENDS IN ADVANCED COMPUTING
Web Technologies
Human Computer Interaction
Service-Oriented Architectures
Mobile Computing
Cloud Computing
Grid Computing
Distributed Computing
GIS and Location Based Services
Augmented Reality
Multi-agent Systems
Log Management and Database Security
Semantic Web and Web Mining
Multimedia Technologies
Formal Methods for Software Security and Reliability
Digital Signatures
Computing Methods in Bioinformatics
Software Engineering
Expert Systems Trends in AI
Image Processing
Information Retrieval
Information Security
Modern DBMS
Business Intelligence
Data Mining
Mathematical Modelling in Computer Science
Applied Informatics in Natural Sciences
CHALLENGES IN TEACHING METHODS IN INFORMATICS
Challenges in Defining an International Curriculum
The Diversity in Informatics Curricula
Patterns of Curriculum Design
Student Interaction
Programming Environments
E-Learning
E-COMMERCE and E-BUSINESS
Modeling and Evaluation of E-Commerce
Categories of E-Commerce
E-Marketing
Web Based E-Commerce Systems
CONTACT
rtacsit@fshn.edu.al