Instructions for Authors

2015-09-29 11:01:59Hits: 7519

Papers will be reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are viewed very seriously and the IEEE will take action against any author who has engaged in either practice.

IEEE Web Page on Plagiarism
IEEE Web Page on Double Submission

IMPORTANT NOTE: To be published in the IEEE WiSPNET 2016 Conference Proceedings and IEEE Xplore®, an author of an accepted paper is required to register for the conference at the FULL (IEEE member or non-member) author rate and must present the paper at the conference. Some papers might be presented as posters. Non-refundable registration fees must be paid prior to uploading the final IEEE-formatted publication-ready version of the paper along with any overlength charges for each camera-ready manuscript in excess of five (5) pages up to a maximum of seven (7). Accepted and presented papers will be published in the IEEE WiSPNET 2016 Conference Proceedings and submitted for inclusion in IEEE Xplore®.


All submissions should be written in English with a minimum and maximum paper length of four (4) and seven (7) printed pages (10-point font), respectively, including figures. Camera-ready versions of accepted papers exceeding five (5) pages will be allowed pending payment of overlength charges.

Standard IEEE conference templates for LaTeX formats are found here.
You can also use the sample template for Microsoft Word: US letter
Only PDF files will be accepted both for the review process and camera-ready submissions.
Manuscripts should not contain page numbers, embedded links or notes, scanned images, headers, or footers.

Topics of Interest

Prospective authors are invited to submit technical papers of their previously unpublished work. Manuscripts shall not exceed five double‐column pages. Detailed information about the electronic paper submission process can be found in the Call for papers section. All presented papers will be published by the IEEE and included in IEEE Xplore®. Selected Papers that receive high review scores will be recommended for possible publication in SCI indexed international journals. Topics of interest include, but are not limited to: 

Track 1: Antennas and propagation, Communication theory and information theory 
• MIMO and multi-antenna communications
• Underlay/overlay systems
• Error control coding including turbo codes, LDPC and iterative decoding
• Multiuser, network, massive and distributed MIMO systems
• Cooperative communications and relaying
• Fundamental limits, information theory for wireless
• Multiple access schemes, multiuser detection
• Interference mitigation and management 
• Communication with limited feedback, Precoding and scheduling
• Space-time coding and processing, Interference alignment techniques
• Wireless Communications Powered by Energy Harvesting and Wireless Power Transfer
• Spread spectrum systems: UWB, CDMA,MC CDMA, MC DS CDMA
• Information theory
• Adaptive modulation and coding
• Network coding
• Spectrum sensing & dynamic spectrum access
• Detection, equalization, synchronization, estimation
• Performance analysis, field tests and measurements
• Resource allocation and interference management
• Satellite and high altitude platforms
• Antennas and propagation
• Localization techniques
• Physical layer security
• Advanced Multicarrier waveforms: beyond OFDM and filterbank-based schemes
• Radio over fiber techniques
• Wireless channel modelling
• Gigabit wireless communications for 5G
• Millimeter wave and visible light communications
• Cognitive wireless networks
• PHY layer design for cellular, wireless LAN, ad hoc, and sensor networks 
• Energy efficient PHY layer design, energy harvesting 
• Over-the-air testing
• Cross-layer air interface design
• Ultra wideband, mmWave, and sub-THz communications
• Information-theoretic aspects of wireless communications
• Concepts for 5G and future PMR/PPDR broadband systems
• Signal processing for wireless communications
• Next generation M2M communications for internet of things 

Track 2: Networking, protocols, cognitive radio, wireless sensor networks, services and applications
• Ad-hoc and mesh networks
• Cognitive radio networking 
• Software defined networking
• Radio resource management and interference control
• ICT applications in smart cities and smart grid
• Homeland security and military communications
• Mobile Internet
• Wireless sensor networks
• Self-organisation
• Cross layer design
• Wireless routing techniques
• Mobility management
• Green networking and Energy harvesting
• Innovative services and applications
• Implementation concepts and test beds
• Device-to-Device (D2D) Communication
• Delay tolerant networks
• Heterogeneous and small cell networks
• Traffic control and engineering
• Optical wireless and visible light communications
• End-to-End QoS and QoS provisioning
• Cloud-based networking techniques (mobile cloud computing, Cloud-RAN)
• Network virtualization
• Networking techniques for mmWave
• Vehicular Networks (VANETs)
• Machine-to-machine communications and applications
• Wireless MAC protocols for 5G: design, analysis, and optimization 
• Cognitive and cooperative MAC 
• MAC for mesh, ad hoc, relay, and sensor networks , Scheduling and radio resource management 
• Cross-layer MAC design , Software defined radio, RFID MAC , QoS support and energy efficient MAC
• MAC protocol for energy harvesting wireless networks 
• MAC protocols for molecular and bacterial nano networks
• MAC design for multi-tier cellular/small cell networks
• Multiple access in machine-to-machine communications
• MAC for cloud radio access networks (Cloud-RANs)
• Wireless personal/body area networks (WPAN/WBAN) and Context awareness 

Track 3: Security and Privacy
• Authentication
• Cryptanalysis
• Digital Forensics
• Cloud computing security
• Threat Modelling
• Cyber – physical security
• Applied Cryptography
• Data and application security
• Embedded Systems Security
• Intrusion Detection
• Key Management
• Wireless or mobile security and privacy in health, automotive, avionics, or smart grid applications
• Access Control
• Wireless and mobile privacy and anonymity
• Mobile computing security
• Secure localization and location privacy
• Security Architectures
• Security & Privacy for Smart Devices (e.g., Smartphones)
• Security and privacy for mobile sensing systems
• Trusted computing
• Security solutions in VLSI 

Track 4: Signal and Image Processing
• Audio and acoustic signal processing
• Multimedia signal processing
• Bio-inspired image and signal processing
• Nonlinear signal processing
• Design and implementation of signal processing systems
• Image Fusion
• Speech processing
• Image and video processing
• Signal processing theory and methods
• Sensor array, multichannel and communications signal processing
• Machine learning
• Signal processing for education
• Medical image and signal processing
• Signal processing applications
• Compressive Sensing
• VLSI signal processing

Log in

Important Dates



Submissions: 2015-12-30 2016-02-10


Notification: 2016-02-16


Camera ready submissions: 2016-02-20


Author Registration: 2016-02-20


Conference Day: 2016-03-23~25






Registration & Submission


Chris Chen


  • Tel: +86 027 88875258
  • Email:


Publishing & Organizing Coordinator




Tel: +91 9840026202