Advances in Computing, Communication and Control (ICAC3’15) (ICAC3)

Organization: Fr. Conceicao Rodrigues College of Engineering

Venue: Sanvad

Location: Mumbai, Maharashtra, India

Event Date/Time: Apr 03, 2015 / 9:00 am - (GMT +5:30 hours) End Date/Time: Apr 04, 2015 / 5:00 pm - (GMT +5:30 hours)
Registration Date: Jan 20, 2015 Time: 17:00:00(GMT +5:30 hours)
Early Registration Date: Jan 15, 2015 Time: 17:00:00(GMT +5:30 hours)
Report as Spam

Description

Previous three conferences in the series were organized in Jan 2009, Jan 2011 and Jan 2013. The proceedings of previous conferences are available at - ACM Digital Library  & - Spriger Digital Library.

ICAC3’15 conference proceedings will be published by Elsevier and all selected papers will be made available through Science Direct Digital Library

Venue

Sanvad
Fr. Agnel Technical Compex, Bandra
Mumbai
Maharashtra
India
MORE INFO ON THIS VENUE

Organizations

Fr. Conceicao Rodrigues College of Engineering
Fr. Agnel Technical Complex, Bandra
Mumbai
Maharashtra
400050
India

Additional Information

Scope

Network Security:• Mobile Network Security • Security in CDN (Contents Distribution Networks) • Virtual Private Network (VPN) • Security in Grid • Transport-Level Security • Wireless Network Security • IP Security • Electronic Mail security • Security Protocols • Cryptographic Technologies • Block and Stream Ciphers • Public Key Cryptology • Message Authentication and Hash Functions • Digital Signature Schemes • Secret Sharing • Cryptanalysis • Novel Biometric Methods • Bio inspired Security methods • Digital Forensic • Biometrics for Security • Feature Extraction and pattern Matching Algorithms • Embedded Systems Security • Side Channel Attacks • Fault Attacks • Hardware Tamper Resistance • Secure Storage Devices • Firewall Systems • Hacking Techniques and Related Issues • Intrusion Detection System (IDS) • Honey-pot • Self replicating algorithms • Malware Analysis • Intrusion Detection • Denial of service issues • Trust networks on semantic web • Self recovery algorithms

Data Warehousing & Mining Algorithms: • Data and Information Fusion • Scalable Algorithms • Simulation and Modeling • Data-Intensive Computing • Parallel Algorithms (including the map-reduce paradigm) • Dimensionality Reduction Techniques • Multidimensional Big Data • Multilinear Subspace Learning • Sampling Methodologies • Streaming • Threat Detection Using Big Data Analytics • Privacy Threats of Big Data • Privacy Preserving Big Data Collection • Intrusion Detection • Multimedia and Big Data • Data Mining • Social Networks • Web Search and Information Mining • Scalable Search Architectures • Cleaning Big Data (noise reduction), Acquisition & Integration • Graph Mining and Other Similar Technologies • Algorithms for enhancing data quality • Evolutionary computation/meta heuristics • Statistical methods • Collaborative filtering • Ensembles/committee approaches • Semantic web mining • Semantic web mining • Semantic web trust, privacy, and security • Others

Machine Learning: • AI and evolutionary algorithms • Natural Language Processing • Artificial neural networks • Fuzzy logic and rough sets • Decision trees/rule learners • Decision support systems • Support vector machines • Optimization methodologies • Swarm intelligence and optimization • Biologically inspired algorithms • Parallel/distributed evolutionary algorithms • Hybrid genetic / memetic algorithms • Autonomous Robotics • Agent-based algorithms and systems • Machine learning approaches for semantic web  

Signal Processing: • Image-based modeling and algorithms • Medical image processing and analysis • Image compression, coding, and encryption • Image feature extraction • Novel noise reduction algorithms • Watermarking methods and protection • Machine learning technologies for vision • Compression & Decompression Algorithms • Virtual reality