| |||||||||||||||
IEEE ICICT 2022 : 3rd IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques | |||||||||||||||
Link: https://www.kiet.edu/icict2022/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The scope of this conference is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in various topics of Engineering and Technology. The conference is being organized specifically to help the computer industry derive benefits from the advances of next generation computer and Intelligent Computing Technologies.
ICICT-2022 is soliciting original, previously unpublished and high quality research papers addressing research challenges and advances in the tracks mentioned below. Articles will be Blind Peer-Reviewed by at-least three experts to decide its suitability for publication in the conference. Authors are requested to send their papers strictly in IEEE format. After acceptance of the paper, intimation to authors will be sent and thereafter authors are required to register for the conference. For considering paper in the conference, at least one author has to register. We follow the STRICT PLAGIRISM policy according to the IEEE. Papers for presentations should conform to the IEEE conference format and specifications. All submissions must be in English only. The following paper categories are welcome- 1. Advances in High-Performance Computing, Artificial Intelligence: AI Algorithms Artificial Intelligence tools & Applications Automatic Control Natural Language Processing Computer Vision and Speech Understanding Data Mining and Machine Learning Tools Fuzzy Logic Heuristic and AI Planning Strategies and Tools Computational Theories of Learning Hybrid Intelligent Systems Information Retrieval Intelligent System Architectures Knowledge Representation Knowledge-based Systems Mechatronics Multimedia & Cognitive Informatics Neural Networks Parallel Processing Pattern Recognition Robotics Semantic Web Techniques and Technologies Soft computing theory and applications Software & Hardware Architectures Quantum Computing Social Computing Cloud Computing Grid Computing Embedded Computing Large-scale applications Human-centered Computing Large Scale Graph Analytics Probabilistic Reasoning Evolutionary Computing Hybrid intelligent systems, Morphic Computing Image processing, Signal or Image Processing Vision Recognition Data Visualization Big Data Analytics Systems and Software Architectures Pervasive computing and ambient intelligence Recent Trends and Developments Web Intelligence Applications & Search 2. Advances in Machine Learning, Deep Learning, Data Science: Mathematical, Probabilistic and Statistical Models and Theories Machine Learning Theories, Models and Systems Knowledge Discovery Theories, Models and Systems Manifold and Metric Learning Deep Learning and Deep Analytics Scalable Analysis and Learning Heterogeneous Data/Information Integration Data Pre-Processing, Sampling, and Reduction Dimensionality Reduction Feature Selection, Transformation, and Construction Large Scale Optimization Learning using Ensemble and Boosting Strategies Active Machine Learning Manifold Learning Fuzzy Learning Evolutionary-based Learning Expert Systems Agents and Multi-agent Systems Support Vector Machines Ambient Intelligence Sentiment Analysis Human-Computer Interaction Computer Vision Geographic Information Systems Video Analysis Medical Diagnosis Segmentation Techniques Augmented Reality Virtual Reality 3. Information and Cyber Security: Blockchain and distributed ledger technology Socio-technical aspects of cryptocurrencies Privacy-preserving computing Privacy-aware computing Homomorphic encryption Cryptographic obfuscation Post-quantum cryptography Other new cryptographic primitives AI security such as adversarial machine learning Security and privacy in online social networks Security and privacy in fog/edge computing New human-centric (e.g. human-in-the-loop) cyber security solutions New applications of the above technologies Interdisciplinary research topics especially those with psychology, law, business, criminology, and wider sociology subjects Cryptographic applications in cloud computing and the Internet of things Evaluation of Learning Systems Computational Learning Theory Experimental Evaluation Knowledge Refinement and Feedback Control Scalability Analysis Statistical Learning Theory Computational Metrics 4. Network and Data Management: Network computing and cloud computing Simulation of computing systems Network storage Network data security and service Parallel the I/O EIS network technology and software technology comprehensive application The embedded system and application Computer storage technology Sensors/actuators network Mobile Ad-hoc Networks Signal Processing Satellite Communication Systems Optical Communication MIMO, OFDM and Smart Antennas 3G/4G/5G Network Evolutions Mobile Adhoc Networks Open Spectrum Solutions Communication Protocols Cognitive Radio Green Computing Smart Grids Sensing and Sensor Networks Computer-Aided Network Design The parallel distributed computing Intelligent control Network storage system Mass network storage system, parallel storage system Multimedia data processing and communication Multimedia system technology, computer interface technology Computer equipment evaluation techniques and instruments Computer simulation technology Web Algorithms Exact and Parameterized Computation Algorithmic Game Theory Computational Biology 5. Image Processing and Multimedia: Image & Signal Processing Applications Image Acquisition and Display Image and Video Processing & Analysis Image Formation Image Scanning, Display, and Printing Machine learning, Computer Graphics, Biological Vision Storage and Retrieval Multimedia Digital Multimedia Broadcasting Education and Training Multimedia analysis and Internet Multimedia and Artificial Intelligence Multimedia Applications Multimedia Communication and Networking Multimedia Content Understanding Multimedia Databases and File Systems Multimedia Human-Machine Interface and Interaction Multimedia Interface and Interaction Multimedia Security and Content Protection Multimedia Signal Processing Multimedia Standards and Related Issues Multimedia Systems and Devices Operating System Mechanisms for Multimedia Virtual Reality and 3-D Imaging Wireless, Mobile Computing, and Multimedia 6: Interdisciplinary Research Domain: Nano-engineering Nuclear engineering Embedded Systems Social Media and Networking GUIDLINES FOR AUTHOR Authors are requested to submit their manuscript in the format specified in the IEEE Paper Template. Prospective authors are invited to submit original technical papers for inclusion in the ICICT 2022. Important IEEE Policy Announcement: The IEEE reserves the right to exclude a paper from distribution after the conference (including its removal from IEEE Xplore) if the paper is not presented at the conference. Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are taken very seriously and the IEEE will take action against any author who has engaged in either practice. Follow these links to learn more: IEEE Web Page on Plagiarism IEEE Web Page on Double Submission To be published in the IEEE ICICT 2022 Conference Proceedings and IEEE Xplore, the author of an accepted paper is required to register for the conference at the FULL or LIMITED (member or non-member) rate. Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. Accepted papers will be submitted for inclusion in the proceedings and IEEE Xplore.For authors with multiple accepted papers, one registration for each paper is required. Paper Submission: Prospective authors are invited to submit papers of six (6) to eight (8) A4 pages (including tables, figures and references) in standard IEEE double-column format (it is absolutely necessary to respect the Styleguide for Papers). A blind peer-review process will be used to evaluate all submitted papers. Each full registration for the conference will cover a maximum of one paper; each student registration will cover a single paper only. Extra paper, 2nd paper and onwards, must be registered separately. The format instructions in the template must be followed, it is notably important to use the right paper format: A4 to have the right margins not to use page numbering (page footer must be empty) The IEEE Citation Reference may help you with the references in your paper. Get the list of IEEE recommended keywords from https://www.ieee.org/documents/taxonomy_v101.pdf or send an empty e-mail to keywords@ieee.org with "IEEE Keywords" in the subject line. All submissions should be written in English with a maximum paper length of eight (8) printed pages strictly in IEEE double column format including figures, without incurring additional page charges. Two extra pages can be added with additional extra page charges. PLAGIARISM POLICY The paper prior to submission should be checked for plagiarism from licensed plagiarism softwares like Turnitin/iAuthenticate etc. The similarity content should not exceed 20% and not more than 4% from any single source (in any case either self contents or others). Further, you have to strictly implement the following ethical guidelines for publication: Any form of self-plagiarism or plagiarism from others' work(s) should not be there in an article. If any model / concept / figure / table / data / conclusive comment by any previously published work is used in your article, you should properly cite a reference to the original work. Also language of explaining it should not be same as language of the work from which you have adopted it. If you are using any copyrighted material, you should acquire prior permission from the copyright holder. REVIEW PROCESS All submitted papers will be judged based on their quality and relevance through blind review process, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform to our blind submission policy will be rejected without review. |
|