ICIT 2018 - 17th International Conference on Information Technology (ICIT)
Date2018-12-20 - 2018-12-22
Deadline2018-06-15
VenueBhubaneswar, India
Keywords
Websitehttps://www.oits-icit.org
Topics/Call fo Papers
International Conference on Information Technology (ICIT) is a premier international forum for high quality research in the areas of Information Technology. ICIT 2018, the 17th edition of ICIT, is being jointly organized by the Orissa Information Technology Society (OITS) (http://www.oits.org) and College of Engineering and Technology (CET), Bhubaneswar, India (https://www.cet.edu.in/). Researchers, developers, regulators and practitioners from academia, government and industry are invited to present their research findings on assorted topics of IT and its applications. The following six tracks will be the primary focus of ICIT 2018 but submissions in any area of information technologies are encouraged.
Data Science
Methods: Data Analytics, Machine Learning, Soft Computing, Pattern Recognition, Artificial Intelligence, Information Science including Multi-Agent Systems and Intelligent Systems, High Performance Computing
Applications: Mining Spatial and Temporal Data, Metadata, Social Networks, Social Media including blogs and Online Collaborative Environments, Visual Data, Privacy Sensitive Data, and Graph Data; Text Mining, Information Retrieval, Sentiment Analysis, Collaborative Filtering and Ontology, Finance Data and Biomedical Data
Networking and Information Security
Multimedia Communications Networks, Wireless Ad hoc/ Sensor/IoT Networks, Mobile and Personal Area Networks, Information Technology Networks, Body Area Networks, Optical Fiber Network, SDN, Peer-to-peer, Content Distribution Networks, Cognitive Radio Networks, 5G Networks, Emergency Communication Networks and DNA Inter Networks.
Smart City, Smart Education, Smart Village, Smart Healthcare, Smart Agriculture, Digital India.
Information Security and privacy, Content Protection, and Digital Rights Management, Watermarking, Steganography, Cryptography, Biometrics, Digital Libraries, Network Security, Computer Security, Cyber Security, Privacy and anonymity, Trusted computing platform, Trusted network computing. Trust in mobile and wireless communications, Risk and reputation management, Block Chain
Biomedical Informatics
Bioinformatics, Clinical Informatics, Clinical Decision Support, Security and Privacy of Electronic Health Records (EHR), EHR Interoperability, Tools for Visualization, Tools for Genomics and Proteomic Data Analysis
Sequential, Parallel, Distributed and Cloud Computing
Design and Analysis of Algorithms, Parallel and Distributed Computing, Load balancing and Partitioning. Multi-cores, Memory Hierarchy, Multiprocessor Synchronization and Debugging, Concurrent Programming, OS Virtualization, Modeling and Simulation, Load Balancing and Partitioning, Compiler Techniques, Cloud Computing, NaaS, PaaS, SaaS, AaaS, IaaS, EaaS Modeling, Performance Analysis and Security Provisioning in Cloud Computing, Fog Computing, Edge Computing, resource aware modeling of Fog and Edge datacenter.
Multimedia, Signal Processing, Embedded Systems
Ontology and Reasoning, Applications of Semantic - Web and Linked Data, Web Architecture, Social Semantic Web.
IP Core Design, Multi Media Audio and Video Streaming, Algorithms for IP Core Protection, Algorithms for Security Aware Behavioral Synthesis, Fault Aware Computing, CAD Algorithms for Smart Devices, Algorithms for Biometric Security.
Power, Smart Grid and Internet of Thing
Power systems, Smart grid, Smart Grid Applications, Grid Computing, Internet of Things, low power/energy-aware computing, IT Intervention in Power Distribution System Management, Power System Security Management through Advanced Information Technology Application, Computer-Aided Design (CAD) for Behavioral/High-Level Synthesis and Optimization, High-level synthesis algorithms and methodology.
Paper Submission: Manuscripts offering high quality original and unpublished research, case studies and implementations are solicited. The manuscripts need to be formatted as IEEE double column conference format. The maximum length of the manuscript should not exceed 6-pages. All submitted papers will undergo blind-review. Authors need to prevent identity disclosure by: (1) not listing names and affiliations of the authors on the manuscript, (2) not saying “my work” or “our work” in the text while citing self-references, and (3) not writing acknowledgments in such a way that identity of authors are implied. Author information should only be included in the submission form. Manuscripts not following the above requirements will be rejected without review. Authors need to submit a single pdf file of their manuscripts at https://easychair.org/conferences/?conf=icit2018. ICIT 2018 will follow strict no-show policy, i.e., accepted papers are to be registered and presented; otherwise the paper will be removed from the proceedings. After review, all accepted and presented papers, will appear in IEEE Xplore.
Best Paper Awards: Three awards will be conferred with due recommendations from the program committee from the papers presented in the conference. Each award will carry cash prize and citations. One student best paper award will be awarded from the papers with students as the leading authors.
Data Science
Methods: Data Analytics, Machine Learning, Soft Computing, Pattern Recognition, Artificial Intelligence, Information Science including Multi-Agent Systems and Intelligent Systems, High Performance Computing
Applications: Mining Spatial and Temporal Data, Metadata, Social Networks, Social Media including blogs and Online Collaborative Environments, Visual Data, Privacy Sensitive Data, and Graph Data; Text Mining, Information Retrieval, Sentiment Analysis, Collaborative Filtering and Ontology, Finance Data and Biomedical Data
Networking and Information Security
Multimedia Communications Networks, Wireless Ad hoc/ Sensor/IoT Networks, Mobile and Personal Area Networks, Information Technology Networks, Body Area Networks, Optical Fiber Network, SDN, Peer-to-peer, Content Distribution Networks, Cognitive Radio Networks, 5G Networks, Emergency Communication Networks and DNA Inter Networks.
Smart City, Smart Education, Smart Village, Smart Healthcare, Smart Agriculture, Digital India.
Information Security and privacy, Content Protection, and Digital Rights Management, Watermarking, Steganography, Cryptography, Biometrics, Digital Libraries, Network Security, Computer Security, Cyber Security, Privacy and anonymity, Trusted computing platform, Trusted network computing. Trust in mobile and wireless communications, Risk and reputation management, Block Chain
Biomedical Informatics
Bioinformatics, Clinical Informatics, Clinical Decision Support, Security and Privacy of Electronic Health Records (EHR), EHR Interoperability, Tools for Visualization, Tools for Genomics and Proteomic Data Analysis
Sequential, Parallel, Distributed and Cloud Computing
Design and Analysis of Algorithms, Parallel and Distributed Computing, Load balancing and Partitioning. Multi-cores, Memory Hierarchy, Multiprocessor Synchronization and Debugging, Concurrent Programming, OS Virtualization, Modeling and Simulation, Load Balancing and Partitioning, Compiler Techniques, Cloud Computing, NaaS, PaaS, SaaS, AaaS, IaaS, EaaS Modeling, Performance Analysis and Security Provisioning in Cloud Computing, Fog Computing, Edge Computing, resource aware modeling of Fog and Edge datacenter.
Multimedia, Signal Processing, Embedded Systems
Ontology and Reasoning, Applications of Semantic - Web and Linked Data, Web Architecture, Social Semantic Web.
IP Core Design, Multi Media Audio and Video Streaming, Algorithms for IP Core Protection, Algorithms for Security Aware Behavioral Synthesis, Fault Aware Computing, CAD Algorithms for Smart Devices, Algorithms for Biometric Security.
Power, Smart Grid and Internet of Thing
Power systems, Smart grid, Smart Grid Applications, Grid Computing, Internet of Things, low power/energy-aware computing, IT Intervention in Power Distribution System Management, Power System Security Management through Advanced Information Technology Application, Computer-Aided Design (CAD) for Behavioral/High-Level Synthesis and Optimization, High-level synthesis algorithms and methodology.
Paper Submission: Manuscripts offering high quality original and unpublished research, case studies and implementations are solicited. The manuscripts need to be formatted as IEEE double column conference format. The maximum length of the manuscript should not exceed 6-pages. All submitted papers will undergo blind-review. Authors need to prevent identity disclosure by: (1) not listing names and affiliations of the authors on the manuscript, (2) not saying “my work” or “our work” in the text while citing self-references, and (3) not writing acknowledgments in such a way that identity of authors are implied. Author information should only be included in the submission form. Manuscripts not following the above requirements will be rejected without review. Authors need to submit a single pdf file of their manuscripts at https://easychair.org/conferences/?conf=icit2018. ICIT 2018 will follow strict no-show policy, i.e., accepted papers are to be registered and presented; otherwise the paper will be removed from the proceedings. After review, all accepted and presented papers, will appear in IEEE Xplore.
Best Paper Awards: Three awards will be conferred with due recommendations from the program committee from the papers presented in the conference. Each award will carry cash prize and citations. One student best paper award will be awarded from the papers with students as the leading authors.
Other CFPs
Last modified: 2018-04-26 15:41:34