Call for Papers

Call for Papers

Original contributions are invited from prospective authors with interests in the indicated conference topics and related areas of application. All contributions should be high quality, original and not published elsewhere or submitted for publication during the review period. The papers can be theoretical, practical and application oriented on the conference tracks. Every submission must identify the conference track which best relates to the contents of the paper. Papers will be peer reviewed by the International Program Committee, and may be accepted for long and short presentation.

We solicit original research and technical papers not published elsewhere in the following three categories.

  1. Full Papers (up to 15 pages)
  2. Short Papers (up to 7 pages)
  3. Poster Papers (A poster is a two-page manuscript that describes late-breaking or otherwise novel and interesting results to the overall community at large. )

Full and Short papers will be published in Springer proceedings, however, poster papers will be included in the book of abstract only.

Best Paper Awards

The Best Paper Awards will be given to the authors which will be selected by the committee among the papers presented in MIND-2019. The Best Paper Awards Committee will be recommended by the advisory committee and the nominees will be evaluated based on scientific contribution, writing/presentation style, reviewers comments etc. The “Best Paper Awards” will be given for each track/discipline in the following three categories.

  1. Outstanding paper
  2. Excellent paper
  3. Best paper

Proceeding Publication

All the accepted and presented papers will be published by Springer Nature (confirmed). Extended versions of the best papers selected from this conference will be invited to be published in the special issues from some of the high repute SCI/Scopus/Web of Science indexed journals. The details in this regard will be announced later.

Publication Partner

Important Dates

Call for Papers : 15th August, 2018

Paper Submission Deadline (firm) : 30th December 2018 (IST) Closed

Acceptance Notification : 10th January, 2019

Camera-Ready Submission : 15th January, 2019

Early Bird Registration : 15th January, 2019

Pre-conference Workshops : 2nd March, 2019

Conference Date : 3rd - 4th March, 2019

Conference Tracks

Machine Learning and Computational Intelligence

Track Chair Dr. Sriparna Saha, IIT Patna

  • Theoretical Computer Science
  • Artificial Intelligence
  • Pattern recognition
  • Computer Graphics
  • Virtual Reality
  • Distributed & Cloud Computing
  • Signal Processing
  • Software Architecture
  • Soft Computing
  • Grid and Cluster Computing
  • Evolutionary Algorithms
  • Ubiquitous Computing
  • Parallel and Distributed Networks
  • Perceptual Computing, and related topics
  • Learning using Ensemble and boosting strategies
  • Active Machine Learning
  • Manifold Learning
  • Fuzzy Learning
  • Kernel Based Learning
  • Genetic Learning
  • Hybrid models
  • Bioinformatics and biomedical informatics
  • Healthcare and clinical decision support
  • Collaborative filtering
  • Information retrieval
  • Natural language processing
  • Web search
  • Inference dependencies on multi-layered networks
  • Recurrent Neural Networks and its applications
  • Graph wavelets
  • Spectral graph theory
  • Self-organizing networks
  • Multi-scale learning
  • Unsupervised feature learning
  • Clustering, Classification and regression methods
  • Supervised, semi-supervised and unsupervised learning
  • Reinforcement Learning
  • Optimization methods
  • Parallel and distributed learning
  • Adaptive and dynamic shrinking
  • Pattern summarization
  • Graph embeddings
  • Graph mining methods
  • Fuzzy approaches to parameter estimation
  • Genetic optimization
  • Bayesian estimation approaches
  • Boosting approaches to Transfer learning
  • Recurrent Neural Networks

Image Processing and Computer Vision

Track Chair Dr. Satish Kumar Singh, IIIT Allahabad

  • Filtering, Transforms, Multi-Resolution Processing
  • Restoration, Enhancement, Super-Resolution
  • Computer Vision Algorithms and Technologies
  • Compression, Transmission, Storage, Retrieval
  • Multi-View, Stereoscopic, and 3D Processing
  • Multi-Temporal and Spatio-Temporal Processing
  • Biometrics, Forensics, and Content Protection
  • Biological and Perceptual-based Processing
  • Medical Image and Video Analysis
  • Document and Synthetic Visual Processing
  • Color and Multispectral Processing
  • Computational Imaging
  • Video Processing and Analytics
  • Visual Quality Assessment
  • Deep learning for Images and Video
  • Human activity recognition
  • Software Tools for Imaging
  • Image Generation, Acquisition, and Processing
  • Image-based Modeling and Algorithms
  • Mathematical Morphology
  • Image Geometry and Multi-view Geometry
  • 3D Imaging
  • Novel Noise Reduction Algorithms
  • Motion and Tracking Algorithms and Applications
  • Watermarking Methods and Protection + Wavelet Methods
  • Image Data Structures and Databases
  • Image Compression, Coding, and Encryption
  • Multi-resolution Imaging Techniques
  • Multimedia Systems and Applications
  • Novel Image Processing Applications
  • Camera Networks and Vision
  • Machine Learning Technologies for Vision
  • Cognitive and Biologically Inspired Vision
  • Active and Robot Vision
  • Fuzzy and Neural Techniques in Vision
  • Novel Document Image Understanding Techniques
  • Novel Vision Application and Case Studies

Network Security

Track Chair

  • Network Performance Analysis,
  • Human factors in security and privacy
  • Security and privacy in ad hoc networks
  • Machine learning for Biometric security and privacy
  • Machine learning for Security and privacy of Web service
  • Security and privacy in e-services
  • Security and privacy in grid computing
  • Security and privacy in mobile systems
  • Security and privacy in wireless sensor networks
  • Cyber risk and vulnerability assessment
  • Cyber-crime and warfare
  • Cyber threat analysis and modelling
  • Machine learning for Bluetooth, WiFi, WiMax security
  • Security and privacy in smart grid and distributed generation systems
  • Security and privacy in social applications and networks
  • Cyber forensic tools, techniques, and analysis
  • Visual analytics for cyber security
  • Security and privacy of mobile cloud computing
  • Cyber security testbeds, tools, and methodologies
  • Active and passive cyber defense techniques
  • Insider threat detection and prevention
  • Critical infrastructure protection
  • Security and privacy in industrial systems
  • Security and privacy in pervasive/ubiquitous computing
  • Intrusion detection and prevention
  • Botnet detection and mitigation

Data Sciences

Track Chair Dr. Keshavmurthy B. N, NIT Goa

  • Big data management,
  • Platforms and technologies for big data,
  • Data retrieval,
  • Big data storage techniques,
  • Data mining and warehouse,
  • Data visualization,
  • Modelling structure and storage of big data,
  • Scalability and portability issues of big data,
  • Big data recommender systems,
  • Digital Forensics,
  • Parallel processing of big data,
  • Distributed access of big data,
  • Applications of big data and related topics,
  • Web mining,
  • Social Network Analysis,
  • Text Mining,
  • Sentiment Analysis.
  • Algorithms
  • Novel Theoretical Models
  • Novel Computational Models
  • Data and Information Quality
  • Data Integration and Fusion
  • Cloud/Grid/Stream Computing
  • High Performance/Parallel Computing
  • Energy-efficient Computing
  • Software Systems
  • Search and Mining
  • Data Acquisition, Integration, Cleaning
  • Data Visualizations
  • Semantic-based Data Mining
  • Data Wrangling, Data Cleaning, Data Curation, Data Munching
  • Data Analysis, , Statistical Insights
  • Decision making from insights, Hidden patterns
  • Data Science technologies, tools, frameworks, platforms and APIs
  • Link and Graph Mining
  • Efficiency, scalability, security, privacy and complexity issues in Data Science
  • Labelling, Collecting, Surveying, Interviewing and other tools for Data Collection
  • Applications in Mobility, Multimedia, Science, Technology, Engineering, Medicine, Healthcare, Finance, Business, Law, Transportation, Retailing, Telecommunication

Paper review, Presentation and Publication

  • The conference review process takes place after the submission of full papers. Each paper is reviewed through employing a double-blind peer review process. The double-blind review process ensures that both authors and reviewers remain anonymous during the peer review process.
  • Full papers are submitted for peer review have to adhere to the conference format and address the conference themes, sub-themes and conference focus areas. Expert are selected to perform the reviews from reputed national and international institutions. A list of the peer reviewers will be included in the conference proceedings.
  • All full papers submitted to the conference are subjected to a rigorous double-blind peer review process. This process takes place prior to both the verbal presentation at the conference and the publication of the Conference Proceedings. Authors receive feedback in the form of a peer review report. The full paper peer review process and the outcomes presented in the review reports are monitored and verified by a review committee.
  • At least one author must be registered for the Conference in order for the paper to be included in the conference programme and considered for publication in the Conference Proceedings. A 15 minute slot will be allocated to each paper in the conference programme. A verbal presentation is delivered during the conference and provides the opportunity to conference delegates to engage with research topic.