{"id":188,"date":"2023-06-30T13:05:48","date_gmt":"2023-06-30T13:05:48","guid":{"rendered":"https:\/\/ieee-cyber.org\/2023\/?page_id=188"},"modified":"2023-07-01T08:22:14","modified_gmt":"2023-07-01T08:22:14","slug":"presentation-guidelines","status":"publish","type":"page","link":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/","title":{"rendered":"Presentation Guidelines"},"content":{"rendered":"\n<p>Accepted papers presented at the conference will be submitted for inclusion into IEEE Xplore and EI subject to meeting IEEE Xplore\u2019s scope and quality requirements.<\/p>\n\n\n\n<p><strong>Official Language<\/strong><\/p>\n\n\n\n<p>The official language of the conference is English.<\/p>\n\n\n\n<p>All presentations, including discussions and paper submissions, shall be made in English.<\/p>\n\n\n\n<p><strong>Conference Attire<\/strong><\/p>\n\n\n\n<p>Casual attire is generally recommended for the Welcome and Farewell Receptions while a business suit or a white shirt with a neck-tie at all technical sessions and at the Conference Banquet.<\/p>\n\n\n\n<p><strong>Oral Presentation Specifications<\/strong><\/p>\n\n\n\n<p>In each oral presentation room, one LCD projector and laptop will be available. The presenters should prepare Power Point Slides to facilitate their presentations. The slides and the presentations must be in English. Please test the slides at least 15min before session start to avoid potential format problems caused by different software versions.<\/p>\n\n\n\n<p>Duration for each category of oral presentation is listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Plenary Lectures are scheduled for 45 minutes (including Q&amp;A) each.<\/li>\n\n\n\n<li>Regular Sessions are schedule for 15 minutes with 3 min Q&amp;A each.<\/li>\n<\/ul>\n\n\n\n<p><strong>Poster Specifications<\/strong><\/p>\n\n\n\n<p>Poster session represents an effective and valuable means for authors to present their research results. It offers an opportunity of meeting with interested attendees for in-depth scientific and technical discussions, and establishing new collaborations. Therefore, it is important that you display your results clearly to attract people who have an interest in your team\u2019s research work.<\/p>\n\n\n\n<p>Your poster should cover the KEY POINTS of your paper, which include but not limited to background, methods, results and conclusion. Make your poster as self-explanatory as possible. This will save your time for discussions and questions with fellow researchers.<\/p>\n\n\n\n<p>Author should print and post up the poster on the poster panel provided at the assigned area. <strong>The poster can be displayed after 13:30, and the author needs to be present at the poster session to the participants between 16:20-17:35.<\/strong><\/p>\n\n\n\n<p><strong>POSTER DIMENSIONS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your poster SHOULD have the following dimensions:<\/li>\n\n\n\n<li><strong>Poster Size: 90cm wide x 120cm high.<\/strong><\/li>\n\n\n\n<li>Please note that printing out your submitted full paper in A4 size format is NOT acceptable as a poster.<\/li>\n<\/ul>\n\n\n\n<p><strong>POSTER CONTENT<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Title:<\/strong> The title of your poster should appear at the top with lettering of at least <strong>42 pt<\/strong> font size). Below the title, place the names of authors and their affiliations.<\/li>\n\n\n\n<li><strong>Text: <\/strong>Text should be readable from five feet away. Use a minimum font size of <strong>17 pt<\/strong>. Keep the text brief. Try to use text to introduce the study, explain visuals and direct viewers\u2019 attention to significant data trends and relationships portrayed in the visuals, state and explain the interpretations that follow from the data. It is also a good idea to put future research plans or questions for discussion with viewers in your text.<\/li>\n\n\n\n<li><strong>Figures: <\/strong>Each figure should have a brief title. Figures should be numbered consecutively according to the order in which they are first mentioned in the text. Try to use color figures rather than only black and white text to make your poster attractive and highlight the important technical content of your paper. Make sure that the text and the visuals are integrated.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Accepted papers presented at the conference will be sub [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":11,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-188","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Presentation Guidelines - IEEE-CYBER 2023<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Presentation Guidelines - IEEE-CYBER 2023\" \/>\n<meta property=\"og:description\" content=\"Accepted papers presented at the conference will be sub [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/\" \/>\n<meta property=\"og:site_name\" content=\"IEEE-CYBER 2023\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-01T08:22:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/presentation-guidelines\\\/\",\"url\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/presentation-guidelines\\\/\",\"name\":\"Presentation Guidelines - IEEE-CYBER 2023\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#website\"},\"datePublished\":\"2023-06-30T13:05:48+00:00\",\"dateModified\":\"2023-07-01T08:22:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/presentation-guidelines\\\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/presentation-guidelines\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/presentation-guidelines\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Presentation Guidelines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#website\",\"url\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/\",\"name\":\"IEEE-CYBER 2023\",\"description\":\"The 13th IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems\",\"publisher\":{\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#organization\",\"name\":\"IEEE-CYBER 2023\",\"url\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ieee-cyber.org\\\/2023\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/%E7%A7%A6%E7%9A%87%E5%B2%9B%E9%AB%98%E6%B8%852-1-scaled.jpg?fit=2560%2C1306&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ieee-cyber.org\\\/2023\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/%E7%A7%A6%E7%9A%87%E5%B2%9B%E9%AB%98%E6%B8%852-1-scaled.jpg?fit=2560%2C1306&ssl=1\",\"width\":2560,\"height\":1306,\"caption\":\"IEEE-CYBER 2023\"},\"image\":{\"@id\":\"https:\\\/\\\/ieee-cyber.org\\\/2023\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Presentation Guidelines - IEEE-CYBER 2023","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/","og_locale":"zh_CN","og_type":"article","og_title":"Presentation Guidelines - IEEE-CYBER 2023","og_description":"Accepted papers presented at the conference will be sub [&hellip;]","og_url":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/","og_site_name":"IEEE-CYBER 2023","article_modified_time":"2023-07-01T08:22:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"3 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/","url":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/","name":"Presentation Guidelines - IEEE-CYBER 2023","isPartOf":{"@id":"https:\/\/ieee-cyber.org\/2023\/#website"},"datePublished":"2023-06-30T13:05:48+00:00","dateModified":"2023-07-01T08:22:14+00:00","breadcrumb":{"@id":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ieee-cyber.org\/2023\/presentation-guidelines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ieee-cyber.org\/2023\/"},{"@type":"ListItem","position":2,"name":"Presentation Guidelines"}]},{"@type":"WebSite","@id":"https:\/\/ieee-cyber.org\/2023\/#website","url":"https:\/\/ieee-cyber.org\/2023\/","name":"IEEE-CYBER 2023","description":"The 13th IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems","publisher":{"@id":"https:\/\/ieee-cyber.org\/2023\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ieee-cyber.org\/2023\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/ieee-cyber.org\/2023\/#organization","name":"IEEE-CYBER 2023","url":"https:\/\/ieee-cyber.org\/2023\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/ieee-cyber.org\/2023\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/ieee-cyber.org\/2023\/wp-content\/uploads\/2023\/01\/%E7%A7%A6%E7%9A%87%E5%B2%9B%E9%AB%98%E6%B8%852-1-scaled.jpg?fit=2560%2C1306&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ieee-cyber.org\/2023\/wp-content\/uploads\/2023\/01\/%E7%A7%A6%E7%9A%87%E5%B2%9B%E9%AB%98%E6%B8%852-1-scaled.jpg?fit=2560%2C1306&ssl=1","width":2560,"height":1306,"caption":"IEEE-CYBER 2023"},"image":{"@id":"https:\/\/ieee-cyber.org\/2023\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/pages\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":2,"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/pages\/188\/revisions"}],"predecessor-version":[{"id":194,"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/pages\/188\/revisions\/194"}],"wp:attachment":[{"href":"https:\/\/ieee-cyber.org\/2023\/wp-json\/wp\/v2\/media?parent=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}