posted by user: gonzo1453 || 1633 views || tracked by 4 users: [display]

IEEE ICICT 2022 : 3rd IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques

FacebookTwitterLinkedInGoogle

Link: https://www.kiet.edu/icict2022/
 
When Nov 11, 2022 - Nov 12, 2022
Where Delhi, India
Submission Deadline Jul 22, 2022
Notification Due Oct 3, 2022
Final Version Due Oct 15, 2022
Categories    artificial intelligence   machine learning   cyber security   data management
 

Call For Papers

The scope of this conference is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in various topics of Engineering and Technology. The conference is being organized specifically to help the computer industry derive benefits from the advances of next generation computer and Intelligent Computing Technologies.


ICICT-2022 is soliciting original, previously unpublished and high quality research papers addressing research challenges and advances in the tracks mentioned below. Articles will be Blind Peer-Reviewed by at-least three experts to decide its suitability for publication in the conference. Authors are requested to send their papers strictly in IEEE format. After acceptance of the paper, intimation to authors will be sent and thereafter authors are required to register for the conference. For considering paper in the conference, at least one author has to register. We follow the STRICT PLAGIRISM policy according to the IEEE.


Papers for presentations should conform to the IEEE conference format and specifications. All submissions must be in English only.

The following paper categories are welcome-

1. Advances in High-Performance Computing, Artificial Intelligence:

AI Algorithms
Artificial Intelligence tools & Applications
Automatic Control
Natural Language Processing
Computer Vision and Speech Understanding
Data Mining and Machine Learning Tools
Fuzzy Logic
Heuristic and AI Planning Strategies and Tools
Computational Theories of Learning
Hybrid Intelligent Systems
Information Retrieval
Intelligent System Architectures
Knowledge Representation
Knowledge-based Systems
Mechatronics
Multimedia & Cognitive Informatics
Neural Networks
Parallel Processing
Pattern Recognition
Robotics
Semantic Web Techniques and Technologies
Soft computing theory and applications
Software & Hardware Architectures
Quantum Computing
Social Computing
Cloud Computing
Grid Computing
Embedded Computing
Large-scale applications
Human-centered Computing
Large Scale Graph Analytics
Probabilistic Reasoning
Evolutionary Computing
Hybrid intelligent systems,
Morphic Computing
Image processing,
Signal or Image Processing
Vision Recognition
Data Visualization
Big Data Analytics Systems and Software Architectures
Pervasive computing and ambient intelligence
Recent Trends and Developments
Web Intelligence Applications & Search


2. Advances in Machine Learning, Deep Learning, Data Science:

Mathematical, Probabilistic and Statistical Models and Theories
Machine Learning Theories, Models and Systems
Knowledge Discovery Theories, Models and Systems
Manifold and Metric Learning
Deep Learning and Deep Analytics
Scalable Analysis and Learning
Heterogeneous Data/Information Integration
Data Pre-Processing, Sampling, and Reduction
Dimensionality Reduction
Feature Selection, Transformation, and Construction
Large Scale Optimization Learning using Ensemble and Boosting Strategies
Active Machine Learning
Manifold Learning
Fuzzy Learning
Evolutionary-based Learning
Expert Systems
Agents and Multi-agent Systems
Support Vector Machines
Ambient Intelligence
Sentiment Analysis
Human-Computer Interaction
Computer Vision
Geographic Information Systems
Video Analysis
Medical Diagnosis
Segmentation Techniques
Augmented Reality
Virtual Reality


3. Information and Cyber Security:

Blockchain and distributed ledger technology
Socio-technical aspects of cryptocurrencies
Privacy-preserving computing
Privacy-aware computing
Homomorphic encryption
Cryptographic obfuscation
Post-quantum cryptography
Other new cryptographic primitives
AI security such as adversarial machine learning
Security and privacy in online social networks
Security and privacy in fog/edge computing
New human-centric (e.g. human-in-the-loop) cyber security solutions
New applications of the above technologies
Interdisciplinary research topics especially those with psychology, law, business, criminology, and wider sociology subjects
Cryptographic applications in cloud computing and the Internet of things
Evaluation of Learning Systems
Computational Learning Theory
Experimental Evaluation
Knowledge Refinement and Feedback Control
Scalability Analysis
Statistical Learning Theory Computational Metrics


4. Network and Data Management:

Network computing and cloud computing
Simulation of computing systems
Network storage
Network data security and service
Parallel the I/O
EIS network technology and software technology comprehensive application
The embedded system and application
Computer storage technology
Sensors/actuators network
Mobile Ad-hoc Networks
Signal Processing
Satellite Communication Systems
Optical Communication
MIMO, OFDM and Smart Antennas
3G/4G/5G Network Evolutions
Mobile Adhoc Networks
Open Spectrum Solutions
Communication Protocols
Cognitive Radio
Green Computing
Smart Grids
Sensing and Sensor Networks
Computer-Aided Network Design
The parallel distributed computing
Intelligent control
Network storage system
Mass network storage system, parallel storage system
Multimedia data processing and communication
Multimedia system technology, computer interface technology
Computer equipment evaluation techniques and instruments
Computer simulation technology
Web Algorithms
Exact and Parameterized Computation
Algorithmic Game Theory
Computational Biology


5. Image Processing and Multimedia:

Image & Signal Processing Applications
Image Acquisition and Display
Image and Video Processing & Analysis
Image Formation
Image Scanning, Display, and Printing
Machine learning, Computer Graphics, Biological Vision
Storage and Retrieval
Multimedia
Digital Multimedia Broadcasting
Education and Training
Multimedia analysis and Internet
Multimedia and Artificial Intelligence
Multimedia Applications
Multimedia Communication and Networking
Multimedia Content Understanding
Multimedia Databases and File Systems
Multimedia Human-Machine Interface and Interaction
Multimedia Interface and Interaction
Multimedia Security and Content Protection
Multimedia Signal Processing
Multimedia Standards and Related Issues
Multimedia Systems and Devices
Operating System Mechanisms for Multimedia
Virtual Reality and 3-D Imaging
Wireless, Mobile Computing, and Multimedia


6: Interdisciplinary Research Domain:

Nano-engineering
Nuclear engineering
Embedded Systems
Social Media and Networking




GUIDLINES FOR AUTHOR
Authors are requested to submit their manuscript in the format specified in the IEEE Paper Template. Prospective authors are invited to submit original technical papers for inclusion in the ICICT 2022.

Important IEEE Policy Announcement: The IEEE reserves the right to exclude a paper from distribution after the conference (including its removal from IEEE Xplore) if the paper is not presented at the conference.

Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are taken very seriously and the IEEE will take action against any author who has engaged in either practice.


Follow these links to learn more:
IEEE Web Page on Plagiarism
IEEE Web Page on Double Submission

To be published in the IEEE ICICT 2022 Conference Proceedings and IEEE Xplore, the author of an accepted paper is required to register for the conference at the FULL or LIMITED (member or non-member) rate. Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. Accepted papers will be submitted for inclusion in the proceedings and IEEE Xplore.For authors with multiple accepted papers, one registration for each paper is required.

Paper Submission: Prospective authors are invited to submit papers of six (6) to eight (8) A4 pages (including tables, figures and references) in standard IEEE double-column format (it is absolutely necessary to respect the Styleguide for Papers). A blind peer-review process will be used to evaluate all submitted papers. Each full registration for the conference will cover a maximum of one paper; each student registration will cover a single paper only. Extra paper, 2nd paper and onwards, must be registered separately.

The format instructions in the template must be followed, it is notably important to use the right paper format: A4 to have the right margins not to use page numbering (page footer must be empty)

The IEEE Citation Reference may help you with the references in your paper. Get the list of IEEE recommended keywords from https://www.ieee.org/documents/taxonomy_v101.pdf or send an empty e-mail to keywords@ieee.org with "IEEE Keywords" in the subject line.

All submissions should be written in English with a maximum paper length of eight (8) printed pages strictly in IEEE double column format including figures, without incurring additional page charges. Two extra pages can be added with additional extra page charges.




PLAGIARISM POLICY
The paper prior to submission should be checked for plagiarism from licensed plagiarism softwares like Turnitin/iAuthenticate etc. The similarity content should not exceed 20% and not more than 4% from any single source (in any case either self contents or others). Further, you have to strictly implement the following ethical guidelines for publication:
Any form of self-plagiarism or plagiarism from others' work(s) should not be there in an article. If any model / concept / figure / table / data / conclusive comment by any previously published work is used in your article, you should properly cite a reference to the original work.
Also language of explaining it should not be same as language of the work from which you have adopted it. If you are using any copyrighted material, you should acquire prior permission from the copyright holder.


REVIEW PROCESS
All submitted papers will be judged based on their quality and relevance through blind review process, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform to our blind submission policy will be rejected without review.

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
IEEE ACIRS 2025   IEEE--2025 10th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2025)
LSIJ 2024   Life Sciences: an International Journal
IEEE IRCE 2025   IEEE--2025 The 8th International Conference on Intelligent Robotics and Control Engineering (IRCE 2025)
ACIRS 2025   IEEE--2025 10th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2025)
21st AIAI 2025   21st (AIAI) Artificial Intelligence Applications and Innovations