Author Guidelines

NCBM-2017 invites research scholars, students, academicians, practicing engineers and scientists to submit original contributions based on the results of research and developments. Submissions must be original and should not been published previously or be under consideration for publication while being evaluated for this conference.

Prospective authors are invited to submit papers of four (4) to six (6) A4 pages (including tables, figures and references) in standard IEEE double-column format (Following Styleguide for Papers is essential). A blind peer-review process will be used to evaluate all submitted papers. Each full registration for the conference will cover a maximum of one paper; each student registration will cover a single paper only. From 2nd paper onwards,registration must be done separately. it is notably important to follow the instructions given in the template including the margins and paper format. All submissions should be written in English with a maximum paper length of six (6) pages including figures, tables.

Authors are invited to submit the paper through easychair (https://easychair.org/conferences/?conf=ncbm2017).

Call for Paper

Original high quality unpublished work / ideas in the following topics of interest (but not limited to):


  • Big Data Visualization
  • DB scalability
  • NoSQL Data Stores
  • Data Mining and Web Mining
  • Data Analytics and Web Analytics
  • Educational data mining
  • Learning Analytics
  • Privacy Information Retrieval
  • Machine Learning Algorithms
  • Mobile Computing
  • Mobile Standards
  • Mobile Learning Issues
  • Mobile Learning Environments
  • Innovative Mobile Learning Systems
  • Mobile Games for Education
  • Wearable Components for Learning
  • IoT Architecture, Models
  • IoT Applications, Services, Tools
  • IoT Enabling Technologies
  • IoT Security
  • Mobile Cloud for Education
  • Trust model for Cloud Services
  • Energy/Cost/Efficiency of Security in Cloud
  • Big data and IoT - Security and Privacy
  • Identity management for Cloud Services
  • Information Sharing, Data Protection in Cloud
  • Access Control Mechanisms for Cloud
  • Security Architecture and Protocol for Cloud
  • Privacy Preserving Data mining for Cloud