2nd International Conference
Paper template:
Microsft Word,
Latex.,
Overleaf Template
The ICICSA-2023 solicits outstanding original research papers to be submitted in the following tracks but not limited to:
Track 1:Artificial Intelligence & Robotics
- AI based Decision Support System
- Artificial Intelligence & Robotics
- Computational Neural Models & Neuroscience
- Supervised and unsupervised Learning Methods
- Applications of machine learning in medicine, health, security, smart cities, game playing and problem solving
- Natural language Processing
- Cognitive and Biologically Inspired Vision
- Big data management
- Platforms and technologies for big data
- Data mining and warehouse
- Distributed access of big data
- Web mining, Text Mining
- Social Network Analysis
- Sentiment Analysis
Track 2:Computer Vision and Image Processing
- Novel Image Processing Applications and Case Studies
- Restoration, Enhancement, Super-Resolution
- Fuzzy and Neural Techniques in Image Processing
- Document and Synthetic Visual Processing
- Computational Imaging and Video Processing
- Deep learning for Images and Video
- Image and Video Analysis for the Web
- Image Processing for Autonomous Vehicles
- Multimedia Systems and Applications
- Multi-resolution Imaging Techniques
- Soft Computing Methods in Image Processing and Vision
- Object Detection and Tracking
- Audio and Speech Processing
- Information retrieval
Track 3:Internet of Things and Embedded Systems
- Machine Learning for IoT
- Intelligent Embedded Systems
- Wearable Technology
- UAVs
- Intelligent Transportation
- Affective computing
- Sensing and Sensor Networks
- Smart Homes/Cities/Healthcare/Grid
Track 4:Computer Networking and Communications
- Network Performance Analysis
- Computer Networking and Communication
- Optical Communication
- Routing Protocol and Architecture
- Satellite Communication
- Grid and Cluster Computing
- Wireless Sensor Networks
- Ubiquitous Computing
- Network Optimization
- Network Performance Analysis, and related topics.
Track 5:Security and Cryptography
- Hash Algorithms
- Public Key Cryptosystem and Key-exchange algorithms
- Homomorphic Encryption
- Network security
- Blockchain
- Privacy-preserving computation
- Lattice-based encryption
- Intrusion detection system
- Machine Learning approach to security
- Biometrics
- Wireless and Network Security
- Data Privacy, Cryptanalysis
- Applied Cryptography
- Cyber Forensic
And other related domains of the conference theme
Please visit author's guideline before submission.