International Conference On Intelligent Computing
Liverpool,UK August 7-10, 2017

ICIC 2017 Special Session

2017 International Conference on Intelligent Computing
August 7-10,2017
Liverpool,UK
(http://ic-ic.tongji.edu.cn/2017/index.htm)

The ICIC 2017 Program Committee is inviting proposals for special sessions to be held during the conference (http://ic-ic.tongji.edu.cn/2017/index.htm), taking place on August 7-10 2017, in Liverpool,UK.

Each special session proposal should be well motivated and should consist of 8 to 12 papers. Each paper must have the title, authors with e-mails/web sites, and as detailed an abstract as possible. The special session organizer(s) contact information should also be included. All special session organizers must obtain firm commitments from their special session presenters and authors to submit papers in a timely fashion (if the special session is accepted) and, particularly, present them at the ICIC 2017. Each special session organizer will be session chair for their own special sessions at ICIC 2017 accordingly. All planned papers for special sessions will undergo the same review process as the ones in regular sessions. All accepted papers for special sessions will also be published by Springer's Lecture Notes in Computer Sciences (LNCS)/ Lecture Notes in Artificial Intelligence (LNAI)/ Lecture Notes in Bioinformatics (LNBI)/ Communications in Computer and Information Science (CCIS).

All the authors for each special session must follow the guidelines in CALL FOR PAPERS to prepare your submitted papers.

Proposals for special sessions should be submitted in ELECTRONIC FORMAT to Workshop/Special Session Chair:

Wenzhen Bao
Tongji University, China
baowz55555@126.com


1. Special Session on Advances of Soft Computing: Algorithms and Its Applications (Rozaida Ghazali, et. al, Malaysia)

Dr. Rozaida Ghazali
Universiti Tun Hussein Onn Malaysia (UTHM)
Malaysia
Email: rozaida@uthm.edu.my

Scope:
Soft computing is essentially used for information processing by employing methods, which are capable to deal with imprecision and uncertainty especially needed in ill-defined problem areas. It is a fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled, or too difficult to model, mathematically. It has three main branches: Fuzzy Logic, Evolutionary Computation, and Neural Networks. Each of these technique provides complementary reasoning and searching methods to solve complex, real-world problems. Practically, there is no area of human activity is left untouched by these Soft Computing techniques. All current Soft Computing technologies will most likely be vastly improved upon in the future. Everything from handwriting and speech recognition to stock market prediction will become more sophisticated as researchers develop better algorithms. It is widely recognized that Soft Computing have been a challenging future research direction. It can be expected that Soft Computing will find broader application in almost every angle of research domain.
Topics for this session include, but are not limited to:

  • Ambient intelligence
  • Artificial immune systems
  • Evolutionary computing
  • Fuzzy set theory
  • Genetic algorithms
  • Grey set theory
  • Hybrid intelligent systems
  • Nature inspired computing
  • Neural networks
  • Support vector machines
  • Swarm intelligence

2. Special Session on Advances of Soft Computing: Algorithms and Its Applications (Yongquan Zhou, et. al, China)

Yongquan Zhou, Professor, Ph.D
College of Information Science and Engineering, Guangxi University for Nationalities, Nanning 530006,China
Key Laboratory of Guangxi High Schools Complex System and Computational Intelligence, Nanning 530006, China
Email: yongquanzhou@126.com

Mohamed Abdel-Basset, Professor, Ph.D Faculty of computers and informatics, Zagazig university, head of department of operations research, Egypt
Email: analyst_mohamed@yahoo.com

Scope:
Swarm intelligence (SI) is the collective behavior of decentralized, self-organized systems, natural or artificial. Swarm Intelligence-based techniques can be used in a number of applications. This special session will highlight the latest development in this rapidly growing research area of new swarm intelligence algorithm, such as, Glowworm Swarm Optimization (GSO), Bat Algorithm (BA), Cuckoo Algorithm (CA), Grey Wolf Optimization Algorithm (GWOA), Krill Herd Algorithm (KHA), Moth Swarm Algorithm (MSA), Dragonfly Algorithm et. al and its applications. Authors are invited to submit heir original work in the areas including (but not limited to) the following:

  • New swarm intelligent algorithms convergence analysis and parameter choice method
  • Multi-stage swarm intelligence algorithms with applications
  • Hybrid swarm intelligence algorithms with applications
  • Hyper-swarm intelligence algorithms with applications
  • Various improved version swarm intelligence algorithms with applications

3. Special Session on Computational Intelligence and Security for Image Applications in Social Network (Zhongqiu Zhao, et al., China)

Dr. Zhong-Qiu Zhao & Dr. Donghui Hu
Hefei University of Technology, China
Email: zhongqiuzhao@gmail.com hudh@hfut.edu.cn

Scope:
Image processing and its applications involve many computational intelligence and security problems, especially in social network applications. Users tend to share all kinds of images in the Online Social Networks (OSNs), aiming to satisfy their own psychological needs of “self-disclosure”, enhance the friendship and trust with other users, etc. On the other hand, the users also confront the threat of disclosing their personal information when sharing the images in the open OSNs. There exist two kinds of contradictions problems in social network digital images sharing. One is the contradiction between the utility and privacy when sharing digital images among social network, the other is the contradiction between the complexity as well as the magnanimity of the digital images and it’s sharing environments and the real-time as well as reliable requirements for the privacy decision. It's an important branch of machine learning and artificial intelligence, covering sparse coding, deep learning and other state of the art methods. This special session will provide researchers and engineers in the field of image processing and its applications a chance to exchange their new ideas, which may contribute much to boosting related theoretical researches and industrial applications. Topics for this session include, but are not limited to:

  • Image representation and feature extraction
  • Information security in image processing and applications
  • Image classification and annotation
  • Deep learning with image privacy and security
  • Sparse coding with image privacy and security
  • Trust, privacy and security of digital image in social network
  • Other related topics in image processing and applications

4. Special Session on Biomedical Image Analysis (Jun Feng, et al., China)

Prof. Jun Feng
School of Information and Technology,Northwest University, Xi’an Shannxi,710127, China.
Email: fengjun@nwu.edu.cn

Prof. Dinggang Shen
Department of Radiology and BRIC,University of North Carolina at Chapel Hill, United States
Email: dgshen@med.unc.edu

Scope:
Biomedical?image analysis is playing?an important role in various clinical applications.?The further improvement of respective computational algorithms highly depend on?the progress of related areas such as mathematics, biomedical engineering, information science, cognitive science, and computer science. The purpose of this special session is to bring together?researchers and practitioners?who are interested in biological statistical modeling, quantitative measurement, visualization and objective decision?for improving automatic analysis of biomedical images. The resulted discoveries would have potentials to improve or change the current clinical diagnosis workflow.?Authors are encouraged?to submit full papers that describe the original research work in the following areas:

  • Biomedical Image Segmentation
  • Biomedical Image Analysis
  • Biomedical Image Reconstruction and Visualization
  • Computer-aided Diagnosis
  • Discovery of imaging biomarkers?
  • Human Computer Interaction?for Biomedical?Image Processing
  • Biomedical?Interpretation
  • Image-Guided Intervention
  • Biomedical?Image Perception
  • Biomedical?Image Registration
  • Intelligent Biomedical?Systems
  • Machine Learning in Imaging
  • Multimodality Image Analysis
  • Quantitative Image Analysis
  • Organ Shape Analysis
  • Super-resolution in Biomedical?Imaging
  • Statistical Methods in Biomedical?Imaging
  • Texture Analysis?in Biomedical?Imaging
  • Time Series Analyses?in Biomedical?Imaging

5. Special Session on Human-Machine Interaction: Shaping Tools Which Will Shape Us (Vitoantonio Bevilacqua et al., Italy)

Dr. Vitoantonio Bevilacqua
Human Computer Interaction Tenured Professor
Electrical and Informatics Department of Polytechnic of Bari – Italy
Email: vitoantonio.bevilacqua@poliba.it

Scope:
Regardless of the constantly changing scenario of novel systems, devices, and interfaces, Human-machine interaction plays a crucial role in determining how individuals adopt and use technology, both hardware and software. In addition to performance, factors such as, ergonomics, usability, and aesthetics are increasingly important in the era of just in time, on demand interaction: nowadays, devices are able to detect human actions, augment senses and cognition, and provide individuals with assistance in specific tasks or everyday work. Human-Machine systems create a seamless technology environment in which individuals learn, interact, and thus, change the way they realize their activities. The Special Session on Human-Machine Interaction is an opportunity for scientists to share their work and to provide and gain insights on how to design innovative and intelligent tools which will enhance and shape our lives. Topics for this session include, but are not limited to:

  • Machine learning techniques in HMI
  • Cognitive aspects of HMI, usability, and design principles
  • Usability, Accessibility & User experience
  • Robotics and Human-machine coupling?
  • Wearable computing and interaction
  • Multimodal interaction and interfaces
  • Context-aware, ubiquitous, pervasive, and mobile interaction
  • Mathematical and computational aspects of HMI
  • Mobile, Ambient, Virtual, Augmented or Tangible HMI
  • Recognition of and interaction with human activity and emotion
  • HMI and Biometrics in healthcare
  • HMI as enabling technology
  • HMI in Human-robot cooperation
  • Biosignal-based HMI
  • Novel devices, sensors, and interfaces

6. Special Session on Information Security (Yunxia Liu et al., China)

Yunxia Liu, Professor, Ph.D
College of information science and technology
Zhengzhou normal university, Zhengzhou, China
Email: liuyunxia0110@hust.edu.cn

Scope:
Information security has become a crucial need for almost all information transaction applications due to the large diversity of the hackers and attacks, Traditional techniques such as cryptography, watermarking, and data hiding are basic notions and play an important role in developing information security algorithms and solutions. In spite of the large development in the information security techniques, there are still several challenges that need to be addressed in terms of time, accuracy and reliability. The special session targets the information security research area with respect to trends, advanced techniques and applications, which attracts researchers and practitioners from academia and industry, and provides a discussion environment in order to share their experiences in information security.Authors are encouraged to submit both theoretical and applied papers on their research in information security. Topics of interest include, but are not limited to:

  • Machine learning techniques in HMI
  • Data hiding
  • applied cryptography
  • data protection
  • formal methods in security
  • information dissemination control
  • network security
  • privacy
  • secure group communications
  • security in social networks
  • embedded security