2nd International Conference on

Intelligent Computing Systems and Applications


22-23 September, 2023

National Institute of Technology Silchar

Technical Tracks

Submit your paper.

Track I: Artificial Intelligence & Robotics

  • AI based Decision Support System

  • Artificial Intelligence & Robotics

  • Computational Neural Models & Neuroscience

  • Supervised and unsupervised Learning Methods

  • Applications of machine learning in medicine, health, security, smart cities, game playing and problem solving

  • Natural language Processing

  • Cognitive and Biologically Inspired Vision

  • Big data management

  • Platforms and technologies for big data

  • Data mining and warehouse

  • Distributed access of big data

  • Web mining, Text Mining

  • Social Network Analysis

  • Sentiment Analysis

Track II: Computer Vision and Image Processing

  • Novel Image Processing Applications and Case Studies

  • Restoration, Enhancement, Super-Resolution

  • Fuzzy and Neural Techniques in Image Processing

  • Document and Synthetic Visual Processing

  • Computational Imaging and Video Processing

  • Deep learning for Images and Video

  • Image and Video Analysis for the Web

  • Image Processing for Autonomous Vehicles

  • Multimedia Systems and Applications

  • Multi-resolution Imaging Techniques

  • Soft Computing Methods in Image Processing and Vision

  • Object Detection and Tracking

  • Audio and Speech Processing

  • Information retrieval

Track III: Internet of Things and Embedded Systems

  • Machine Learning for IoT

  • Intelligent Embedded Systems

  • Wearable Technology

  • UAVs

  • Intelligent Transportation

  • Affective computing

  • Sensing and Sensor Networks

  • Smart Homes/Cities/Healthcare/Grid

Track IV: Computer Networking and Communications

  • Network Performance Analysis

  • Computer Networking and Communication

  • Optical Communication

  • Routing Protocol and Architecture

  • Satellite Communication

  • Grid and Cluster Computing

  • Wireless Sensor Networks

  • Ubiquitous Computing

  • Network Optimization

  • Network Performance Analysis, and related topics.

  • Wireless and Network Security

  • Data Privacy, Cryptanalysis

  • Applied Cryptography

  • Cyber Forensic

Track V: Security and Cryptography

  • Hash Algorithms

  • Public Key Cryptosystem and Key-exchange algorithms

  • Homomorphic Encryption

  • Network security

  • Blockchain

  • Privacy-preserving computation

  • Lattice-based encryption

  • Intrusion detection system

  • Machine Learning approach to security

  • Biometrics

  • Authentication, authorization and access control

  • Cryptanalysis

  • Applied Cryptography

  • Cyber Forensic