Fourteenth International Conference on Information Processing - 2018


Theme: Internet of Things


Call for Papers

Paper Submission

Authors should submit an original and unpublished paper in English, carefully check for correct grammar and spelling, using the easychair submission link that will be made available on www.icipbangalore.org . The guidelines for paper formatting and paper page limits must be strictly used for all submitted papers. The submission format is the same as the camera-ready format. Please check and carefully follow the instructions and templates provided. Each paper should clearly indicate the nature of its technical/scientific contribution and the problems, domains or environments to which it is applicable. Authors should submit paper and plagiarism report of the paper. The plagiarism report should show Similarity index less than 30% including bibliograpghy. Authors are solely responsible for any plagiarism issues. Papers that are out of the conference scope or contain any form of plagiarism will be rejected without reviews.


Types of Papers

A regular paper presents a research work that is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a Full Paper, Short Paper or Poster.


Acknowledgement

The web submission procedure automatically sends an acknowledgement, by e-mail, to the contact author.


Review

All submitted papers will undergo a rigorous review process managed by the technical program committee. A double-blind paper evaluation method will be followed.


Camera-ready

The contact author of each paper will be intimated of the result by e-mail after the completion of reviewing process. The authors are required to follow the reviews meticulously before the camera-ready submission.


Best Paper Awards

Few best paper awards will be given based on the technical contents at the Conference


Tutorials and Workshops

The conference program committee solicits proposals for workshop and tutorials. Proposals should be sent to sujatha_bms@yahoo.co.in. Proposals should contain maximum of six pages including the title, workshops / tutorials structure, targeted audience and author biography.


Topics

Topics of interest include (but are not limited to) the following, in the context of Information Processing.

Track 1: INTERNET OF THINGS
  • IoT Architecture,
  • Cyber Physical Social Systems,
  • Green IoT,
  • Networking,
  • Smart Cities,
  • Connected Living,
  • Developing IoT Technologies,
  • Connected Services,
  • Wearables,
  • Energy, Environment & Agriculture,
  • Smart Home,
  • Startups,
  • Connected Industry,
  • Automotive,
  • Healthcare, Asset and Fleet Management,
  • Manufacturing,
  • Retail Point Of Sales,
  • Smart Grid,
  • Smart Metering,
  • Consumer Electronics Industry,
  • IoT Solutions for Industries and Use Cases in Dedicated Areas: Manufacturing, Transportation & Logistics, Healthcare, Retail, Smart Cities, Agriculture & Security, and Operability & Standards,
  • Industrial IoT Segments,
  • IoT Standards,
  • Accelerating Development/Deployment,
  • Change Management,
  • Designing Applications,
  • Enablers,
  • Industrial IoT,
  • Enterprise Adoption of Internet of Things (IoT),
  • Machine-To-Machine (M2M) Technology,
  • Monetizing the Industrial Internet,
  • Changing Business Models,
  • Developing Secure Ecosystems,
  • IoT Enterprise Operations,
  • IoT Pricing Models,
  • Edge Routing,
  • Field Operations,
  • Gateway Architectures for IoT Applications,
  • IoT Solutions For the Enterprise; Remote Monitoring, Supply Chain and Logistics,
  • Integrating the IoT into Enterprise IT Architecture,
  • Inventory Management,
  • IoT and New Product/Service Development,
  • Connected Life and Work,
  • Smart Energy, HVAC Monitoring and Management,
  • Agriculture and Farming Applications,
  • Building Apps and Solutions,
  • Autonomous Autos and New Transportation Models,
  • Location Maps and New Marketing Models,
  • Open Source Development for IoT,
  • Rapid Prototyping with Open Devices,
  • Java Embedded,
  • Mobile Devices: Transmitting With and Without Interruption,
  • Web Services and IoT Integration,
  • Open Hardware and Open Source Development: Gigabones, Raspberry Pi,
  • Augmented and Virtual Reality,
  • Developing for Verticals; Smart Home, Wellness, Connected Care Applications,
  • Distributed Networks,
  • Dynamic Spectrum,
  • Spatial Analysis,
  • Hybrid Cloud Processing,
  • Identity Management,
  • Low Power Wide Area Networks,
  • LTE For IoT,
  • Building IoT Platforms for Third Party Use,
  • Routing Protocols for low power and lossy networks (RPL) in IoT,

Track 2: DATA SCIENCE
  • Data Governance,
  • Data Analytics,
  • Business Intelligence and Machine Learning,
  • Process Driven Decision Making,
  • Predictive Analytics,
  • Prescriptive Analytics,
  • Business Intelligence and Compliance,
  • Machine Learning,
  • Getting IoT Data to Smart Phones and Tablets,
  • Defining Data Strategies,
  • Big Data,
  • Distributed Databases,
  • Real Time Business Intelligence,
  • Cognitive IoT,
  • Human Device Interaction for IoT,
  • Data Mining,
  • Data Visualization,
  • Data Compression,
  • Social Network Data Analytics,
  • Social Computing,
  • Web Analytics and Intelligence,
  • Predictive Analysis for Business and Healthcare,
  • Deployment of Data Science Solutions in Industry,
  • Swarm Intelligence,
  • Business Transformation.

Track 3: INTERNET COMPUTING
  • Edge Computing,
  • Cloud Computing,
  • Mobile Computing,
  • Service Oriented Architecture( SoA ),
  • Service Oriented Computing,
  • Web Services,
  • Mobile Cloud Computing,
  • Fog Computing.

Track 4: SECURITY
  • IoT Security,
  • IoT Gateway Solutions,
  • Connected, Smart and Secure Systems,
  • Remote Systems and Security,
  • Privacy and Security,
  • Understanding Data Privacy and Security Issues,
  • Authentication and Security,
  • Platforms and Portability,
  • Cryptographic Techniques,
  • Cyber Security and Malware Protection,
  • Data and Application Security,
  • Data Privacy and Security,
  • Network Security,
  • Biometric Security,
  • Security Management,
  • Security Tools and Development,
  • Detection, prevention, response and mitigation of cyber threats to IoT,
  • Security protocols in IoT,
  • Risk analysis and management for IoT infrastructures,
  • Threat modeling in IoT,
  • Firewall, access control, identity management,
  • Experiments of using security solutions and proof-of-concepts,
  • Large-scale simulations in the Internet of Things,
  • Intrusion detection and prevention techniques,
  • Social engineering and ethical hacking: techniques and case studies,
  • Software engineering for security modeling, business process modeling and analytics,
  • Data security, data recovery, disaster recovery,
  • Adoption challenges and recommendation,
  • Cryptography,
  • Ensuring the resilience and security of IoT dependent infrastructures,
  • Vulnerabilities and counter measures.