PSG College of Technology, established in the year 1951 by the PSG & Sons' Charities, Coimbatore, is one of the premier institutions of the country and is an excellent centre for advanced studies and research in several areas of Science and Engineering.The college has excellent infrastructure, well-equipped laboratories and highly qualified and experienced faculty. The College has signed MoU with research organizations and industries across the globe to promote technology development, training of students, curriculum updation and development of state of the art centres.
The Department of Applied Mathematics and Computational Sciences has a fundamental objective to develop quality professionals by providing concept-oriented subject knowledge through high quality teaching supplemented with practical training. Our academic process mainly focus on implementation of concepts and their applications in various fields of Science and Engineering.
The Department of Applied Mathematics and Computational Sciences has been conducting the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) since 2013.
ICC3 is a biennial conference which focuses on advancing research areas of Computational Intelligence, Cyber Security and Computational Models. ICC3 brings together researchers working on Artificial Intelligence, Data Science, Cyber Security, and the aligned application domains.
The conference is intended to promote research and development by providing a forum for researchers and practitioners across the globe to discuss modelling, innovations, trends, research findings, novel techniques, challenges etc.
ICC3 -2023, the sixth conference in this series, is scheduled from 14th to 16th December 2023 at PSG College of Technology. The event will be held for three days which includes keynote speeches, state of the art lectures and paper presentations.
The proceedings of the previous three series of the conference were published in the CCIS Series of SPRINGER (Communications in Computer and Information Science - Volume 844, 1213 and 1631 respectively). The proceedings of ICC3 2023 will (possibly, subject to acceptance) be published by CCIS Series Springer
We enthusiastically encourage prospective authors to submit an electronic version of
their original research papers that contain
contributions of theoretical, experimental or application nature using EasyChair.The
conference is organized in three tracks
Computational Models, Computational Intelligence and Cyber Security with the theme
"Emerging Trends in Computational Models, Intelligence
and Security Systems" and will feature distinguished invited speakers in each track.
Computational modelling formulates, models any real-world problem, and develop solutions using computing. The goal of computational modelling is to use mathematical models to simulate and analyse any complex system for better understanding and efficient decision making. Computational models allow scientists to simulate and provide experimental solutions in place of analytical solutions. Computational models help various stakeholders of the system to visualize, predict, optimize, regulate, and control any complex system using high-end computing technologies. Computational models can be developed for wider range of applications from Science, Engineering, Economics, Cognitive science etc. The Computational Models track of the conference is aimed to facilitate interaction and research collaboration among researchers in developing computational models to meet the challenging demands of different application domains.
Computational Intelligence is a branch of AI which deals with the systematic study of adaptive mechanisms to facilitate intelligent behaviour in complex and changing environments. The adaptive mechanisms are the paradigms that exhibit an ability to learn and adapt to new situations. As an evolving field, computational intelligence involves different computing paradigms such as artificial neural networks, ambient intelligence, evolutionary computing, artificial endocrine networks, social reasoning, fuzzy systems, cultural learning, artificial immune system etc. Computational Intelligence paradigms are used for a wide range of applications including speech recognition, image processing, robot control, game strategies, whether predictions, prosthesis, health care etc. The Computational Intelligence track of the conference is intended to support researchers who work on the novel design strategies and application developments involving Intelligent computing.
The increased use of social media imposes challenges against security of systems connected through the Internet. Cyber security is the practice of protecting systems, networks, and programs from digital attacks. The surge of digital attacks in the Internet era creates an increasing demand for sophisticated cyber security solutions to mitigate cyber risk. Cyber threats such as data theft, phishing scams and other cyber vulnerabilities mandate that users should remain vigilant about protecting data. Cyber Security is becoming an increasingly central facet of national security strategy, and both private and public sectors are working on it. The Cyber Security track of the conference provides a platform for researchers, practitioners and software developers who work on security domains such as cyber physical systems, data privacy, adversarial attacks, botnets, malware and intrusion detection, cryptography, trustworthiness, authentication etc, to share their ideas and collaborate.
Developing models of computation with intelligence and security form a basis of the theory of computational methods. Hence, the three areas namely computational intelligence, computational models and cyber security become inter-related under the umbrella of computational methods.
Papers are solicited from industry, government and academia
covering relevant research, technologies, methodologies,
tools and case studies. The aim of this conference series is to bring to the front the
novel ideas in the theory and progress of
cyber security, computational advancement for modelling and intelligence inorder to
achieve a major breakthrough, practical improvements
and new research directions. The topics listed below are meant to indicate the breadth
of the area and are definitely not to be considered
exhaustive.
The submitted paper must be substantially original work, which has neither been
published before nor is under review for any other conference
or journal. The ICC3 strictly prohibits any plagiarism. The ICC3 retains the right to
eliminate any paper in violation of these requirements
and to exclude the author(s) of such papers from future ICC3 conferences. On the basis
of double blind review process, selected papers
recommended by the Review Committee, would be compiled in a proceeding. It is planned to
publish the peer reviewed and selected papers
of conference as proceedings with Springer in their prestigious Communications in
Computer and Information Science series.
Last date for paper submission
Notification of paper acceptance
Camera ready paper submission
Registration begins
Last Date of Registration
# | Purpose of Registration | Amount |
---|---|---|
1. | Conference Only (with paper presentation) | INR 5000 |
2. | Conference (with paper presentation)+workshop | INR 6000 |
3. | Conference Only (without paper presentation) | INR 2500 |
4. | Conference (without paper presentation) + workshop | INR 3500 |
5. | Workshop Only | INR 1500 |
# | Payment Details | |
---|---|---|
1. | Bank Account number | 1481267367 |
2. | Beneficiary Name | PSG Center for Nonformal and Continuing Education |
3. | Address | Peelamedu, Coimbatore - 641004 |
4. | Bank Name | Central Bank of India |
5. | IFSC Code | CBIN0280913 |
6. | SWIFT Code | CBININBBOSB |
Registration amount of conference / workshop is NOT refundable and it
includes
1. Receipt of the conference / workshop link.
2. Permission to attend all the plenary talks of the conference / workshop.
3. Attendance / presentation certificate.
Conference on 14th - 16th December 2023
The accepted papers will be published in "Communications in Computer and Information
Science CCIS" (conditionally approved) of Springer
which is indexed in DBLP, Google Scholar, Scopus (Elsevier) etc.
Papers submitted in English will be reviewed. Only Adobe Portable Document Format
(PDF) will be accepted for submission and review.
Other formats will automatically be rejected by the EasyChair.
Authors are kindly requested to make sure that all equations, tables and figures are
embedded in the PDF file.
Please submit your paper only through online by clicking the link down
The submitted paper must be substantially original work.
The work described has not been published before (except in the form of a conference
abstract or as part of a published lecture or thesis for an academic qualification).
The submitted paper is not under consideration for publication anywhere else.
The publication has been approved by all co-authors, if any, as well as by the
responsible authorities-tacitly or explicitly-at the institute
where the work has been carried out. The publisher will not be held legally responsible
should there be any claims for compensation.
All documents must be written in English, using correct diction, syntax, and grammar.
American English standards for spelling and punctuation are preferred.
Only Adobe Portable Document Format (PDF) will be accepted for submission and review.
Other formats will automatically be rejected by EasyChair.
Authors are kindly requested to make sure that all equations, tables and figures are
embedded in the PDF file.
All pages must be typed and double-spaced using 12-point Times New Roman font. Please
use a 1-inch margin on all sides.
The number of pages should be 12-15 pages (including references). Papers that are
judged to be unnecessarily lengthy, poorly written, and theoretically under-developed
or based on poor science will be rejected by the editors and not sent out for peer review.
Paper should be organized in the following order
Title Page, (Blinded)
Title Page, (Unblinded)
Abstract (between 100-250 words)
Keywords (4-6 keywords which can be used for indexing purposes)
Main Text
Acknowledgements, if applicable
References.
Blinded Title Page:
For all new submissions and revisions, the first page of the manuscript should be a
blinded title page (author(s) names and affiliations should be removed).
Seperate(Un-Blinded)Title Page
The separate un-blinded title page should include
The name(s) of the author(s)
A concise and informative title
The affiliation(s) and address(es) of the author(s)
The e-mail address, phone, and fax numbers of the corresponding author
Main Text
Headings and Subheadings in the text indicate the organisation of content. As a general
principle, please do not use more than three levels of displayed
headings. Since manuscripts are evaluated through an anonymous peer review process,
authors must remove identifying references or material.
Acknowledgments (where applicable)
Acknowledgments of people, grants, funds, etc. should be placed in a separate section
before the reference list. The names of funding organisations
should be written in full, and for the purposes of the blind peer-review process,
acknowledgements should not violate the anonymity of the author
(i.e., avoid acknowledgments in the format of “Thank you to my institution [x] and
colleagues [name], [name]…)
References
References follow the text in a separate section headed “REFERENCES” using APA citation
style. All references cited in the text must be listed in the
reference section, and vice versa. Publication information for each must be complete and
correct. It is the author's responsibility to make sure that all
information provided in the reference section is complete and correct.
Bioinfomatics
Computer Vision
Data Mining
Decision Support Systems
Evolutionary Computation
Formal Language
Fuzzy systems
Human-Computer Interaction
Information Retreival
Machine Learning
Natural Language Processing
Nature and Bio inspired Computing
Neural Networks
Pattern Recognition
Applied Cryptography
Authentication and Data Privacy
Cryptanalysis
Cloud/Web/Wireless Security
Data and Application Security
Digital Rights Management
Digital Forensics
Formal Methods in Security
Intrusion Detection/Prevention
Information Security in IoT
Malware and Botnets
Mobile System Security
Security for Smart Grid Communication
Security of Cyber-Physical Systems
Trustworthy Data Collection in IoT
Agent Based Models
Cloud Computing
Combinatorial Optimization
Computational Geometry
Complex Network Models
Digital Topology
Database Models
Deep Learning Models
Graph Models
Membrane Computing
Predictive Models
Stochastic Models
Theory of Computation
Quantum Computing