2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

2nd International Conference on Machine Learning, Image Processing, Network Security and Data Science

MIND-2020

30 - 31, July 2020 | NIT Silchar, India

Call For Papers

Original contributions are invited from prospective authors with interests in the indicated conference topics and related areas of application. All contributions should be high quality, original and not published elsewhere or submitted for publication during the review period. The papers can be theoretical, practical and application oriented on the conference tracks. Every submission must identify the conference track which best relates to the contents of the paper. Papers will be peer reviewed by the International Program Committee, and may be accepted for long and short presentation.

We solicit original research and technical papers not published elsewhere in the following two categories.

  1. Full papers (12 to 15 pages in the LNCS/CCIS one-column page format); Short papers and poster papers (no less than 6 pages)
    Latex Template
    Word Template
  2. Poster Papers (A poster is a two-page manuscript that describes late-breaking or otherwise novel and interesting results to the overall community at large. )

Accepted papers will be published in Springer CCIS series (Confirmed).



Conference Tracks

Machine Learning and Computational Intelligence
Image Processing and Computer Vision
Network and Cyber Security
Data Sciences and Big Data

 

Theoretical Computer Science
Artificial Intelligence
Pattern recognition
Computer Graphics
Virtual Reality
Distributed & Cloud Computing
Signal Processing
Software Architecture
Soft Computing
Grid and Cluster Computing
Evolutionary Algorithms
Ubiquitous Computing
Parallel and Distributed Networks
Perceptual Computing, and related topics
Learning using Ensemble and boosting strategies
Active Machine Learning
Manifold Learning
Fuzzy Learning
Kernel Based Learning
Genetic Learning
Hybrid models
Bioinformatics and biomedical informatics
Healthcare and clinical decision support
Collaborative filtering
Information retrieval
Natural language processing
Web search
Inference dependencies on multi-layered networks
Recurrent Neural Networks and its applications
Graph wavelets
Spectral graph theory
Self-organizing networks
Multi-scale learning
Unsupervised feature learning
Clustering, Classification and regression methods
Supervised, semi-supervised and unsupervised learning
Reinforcement Learning
Optimization methods
Parallel and distributed learning
Adaptive and dynamic shrinking
Pattern summarization
Graph embeddings
Graph mining methods
Fuzzy approaches to parameter estimation
Genetic optimization
Bayesian estimation approaches
Boosting approaches to Transfer learning
Recurrent Neural Networks

  • Filtering, Transforms, Multi-Resolution Processing
    Restoration, Enhancement, Super-Resolution
    Computer Vision Algorithms and Technologies
    Compression, Transmission, Storage, Retrieval
    Multi-View, Stereoscopic, and 3D Processing
    Multi-Temporal and Spatio-Temporal Processing
    Biometrics, Forensics, and Content Protection
    Biological and Perceptual-based Processing
    Medical Image and Video Analysis
    Document and Synthetic Visual Processing
    Color and Multispectral Processing
    Computational Imaging
    Video Processing and Analytics
    Visual Quality Assessment
    Deep learning for Images and Video
    Human activity recognition
    Software Tools for Imaging
    Image Generation, Acquisition, and Processing
    Image-based Modeling and Algorithms
    Mathematical Morphology
    Image Geometry and Multi-view Geometry
    3D Imaging
    Novel Noise Reduction Algorithms
    Motion and Tracking Algorithms and Applications
    Watermarking Methods and Protection
    Wavelet Methods
    Image Data Structures and Databases
    Image Compression, Coding, and Encryption
    Multi-resolution Imaging Techniques
    Multimedia Systems and Applications
    Novel Image Processing Applications
    Camera Networks and Vision
    Machine Learning Technologies for Vision
    Cognitive and Biologically Inspired Vision
    Active and Robot Vision
    Fuzzy and Neural Techniques in Vision
    Novel Document Image Understanding Techniques
    Novel Vision Application and Case Studies

 

 

 

 

 

 

    Network Performance Analysis,
    Human factors in security and privacy
    Security and privacy in ad hoc networks
    Machine learning for Biometric security and privacy
    Machine learning for Security and privacy of Web service
    Security and privacy in e-services
    Security and privacy in grid computing
    Security and privacy in mobile systems
    Security and privacy in wireless sensor networks
    Cyber risk and vulnerability assessment
    Cyber-crime and warfare
    Cyber threat analysis and modelling
    Machine learning for Bluetooth, WiFi, WiMax security
    Security and privacy in smart grid and distributed generation systems
    Security and privacy in social applications and networks
    Cyber forensic tools, techniques, and analysis
    Visual analytics for cyber security
    Security and privacy of mobile cloud computing
    Cyber security testbeds, tools, and methodologies
    Active and passive cyber defense techniques
    Insider threat detection and prevention
    Critical infrastructure protection
    Security and privacy in industrial systems
    Security and privacy in pervasive/ubiquitous computing
    Intrusion detection and prevention
    Botnet detection and mitigation

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    Big data management,
    Platforms and technologies for big data,
    Data retrieval,
    Big data storage techniques,
    Data mining and warehouse,
    Data visualization,
    Modelling structure and storage of big data,
    Scalability and portability issues of big data,
    Big data recommender systems,
    Digital Forensics,
    Parallel processing of big data,
    Distributed access of big data,
    Applications of big data and related topics,
    Web mining,
    Social Network Analysis,
    Text Mining,
    Sentiment Analysis.
    Algorithms
    Novel Theoretical Models
    Novel Computational Models
    Data and Information Quality
    Data Integration and Fusion
    Cloud/Grid/Stream Computing
    High Performance/Parallel Computing
    Energy-efficient Computing
    Software Systems
    Search and Mining
    Data Acquisition, Integration, Cleaning
    Data Visualizations
    Semantic-based Data Mining
    Data Wrangling, Data Cleaning, Data Curation, Data Munching
    Data Analysis, , Statistical Insights
    Decision making from insights, Hidden patterns
    Data Science technologies, tools, frameworks, platforms and APIs
    Link and Graph Mining
    Efficiency, scalability, security, privacy and complexity issues in Data Science
    Labelling, Collecting, Surveying, Interviewing and other tools for Data Collection
    Applications in Mobility, Multimedia, Science, Technology, Engineering, Medicine, Healthcare, Finance, Business, Law, Transportation, Retailing, Telecommunication

 

©CSE Department, NIT Silchar 2019-2020 All Rights Reserved.