
2nd International Conference on
Intelligent Computing Systems and Applications
ICICSA-2023
22-23 September, 2023
National Institute of Technology Silchar

Technical Tracks
Track I: Artificial Intelligence & Robotics
AI based Decision Support System
Artificial Intelligence & Robotics
Computational Neural Models & Neuroscience
Supervised and unsupervised Learning Methods
Applications of machine learning in medicine, health, security, smart cities, game playing and problem solving
Natural language Processing
Cognitive and Biologically Inspired Vision
Big data management
Platforms and technologies for big data
Data mining and warehouse
Distributed access of big data
Web mining, Text Mining
Social Network Analysis
Sentiment Analysis
Track II: Computer Vision and Image Processing
Novel Image Processing Applications and Case Studies
Restoration, Enhancement, Super-Resolution
Fuzzy and Neural Techniques in Image Processing
Document and Synthetic Visual Processing
Computational Imaging and Video Processing
Deep learning for Images and Video
Image and Video Analysis for the Web
Image Processing for Autonomous Vehicles
Multimedia Systems and Applications
Multi-resolution Imaging Techniques
Soft Computing Methods in Image Processing and Vision
Object Detection and Tracking
Audio and Speech Processing
Information retrieval
Track III: Internet of Things and Embedded Systems
Machine Learning for IoT
Intelligent Embedded Systems
Wearable Technology
UAVs
Intelligent Transportation
Affective computing
Sensing and Sensor Networks
Smart Homes/Cities/Healthcare/Grid
Track IV: Computer Networking and Communications
Network Performance Analysis
Computer Networking and Communication
Optical Communication
Routing Protocol and Architecture
Satellite Communication
Grid and Cluster Computing
Wireless Sensor Networks
Ubiquitous Computing
Network Optimization
Network Performance Analysis, and related topics.
Wireless and Network Security
Data Privacy, Cryptanalysis
Applied Cryptography
Cyber Forensic
Track V: Security and Cryptography
Hash Algorithms
Public Key Cryptosystem and Key-exchange algorithms
Homomorphic Encryption
Network security
Blockchain
Privacy-preserving computation
Lattice-based encryption
Intrusion detection system
Machine Learning approach to security
Biometrics
Authentication, authorization and access control
Cryptanalysis
Applied Cryptography
Cyber Forensic