Home             Call for Paper

Call For Paper

Track-1: Generative AI

Generative Adversarial Networks (GANs):
  • GAN architecture and components
  • GAN training process
  • GAN loss functions
  • Variations of GANs (e.g., conditional GANs, InfoGAN)
Sequence Generation:
  • Language modeling with recurrent neural networks (RNNs)
  • Autoregressive models (e.g., GPT)
  • Beam search and sampling techniques
  • Evaluating sequence generation models (e.g., BLEU, perplexity)
Variational Autoencoders (VAEs):
  • VAE architecture and components
  • VAE training process
  • VAE loss functions
  • Latent space representation and generation
Image Generation:
  • Convolutional Neural Networks (CNNs) for image generation
  • PixelCNN and PixelRNN
  • Conditional image generation
  • Image-to-image translation (e.g., pix2pix, CycleGAN)
Text-to-Image Synthesis:
  • Methods for generating images from textual descriptions
  • Attention mechanisms in text-to-image synthesis
  • Image synthesis from semantic layout
Music Generation:
  • Generating music with deep learning models
  • Representations of musical data (e.g., MIDI, spectrograms)
  • Music style transfer and composition
Video Generation:
  • Video prediction and synthesis
  • Temporal Convolutional Networks (TCNs) for video generation
  • Video-to-video translation (e.g., vid2vid)
Style Transfer and Domain Adaptation:
  • Transferring artistic styles to images or videos
  • Domain adaptation for transferring knowledge between domains
  • Cycle-consistent adversarial networks for style transfer
Reinforcement Learning for Generative Models:
  • Reinforcement learning as a framework for training generative models
  • Generative adversarial imitation learning
  • Reward modeling and policy optimization
Ethical and Social Implications:
  • Bias and fairness in generative AI
  • Deepfakes and their implications
  • Privacy concerns in generative models

Track-2: Advances in Machine Learning and Deep Learning

  • General Machine Learning, Active Machine Learning
  • Manifold Learning
  • Fuzzy Learning
  • Kernel Based Learning
  • Genetic Learning
  • Hybrid Models
  • Fuzzy Approaches to Parameter Estimation
  • Bayesian Estimation Approaches
  • Recurrent Neural Networks
  • Large Scale Item Categorization
  • Machine Learning over the Cloud
  • Learning Paradigms
  • Clustering, Classification and Regression Methods
  • Supervised, Semi-Supervised and Unsupervised Learning
  • Algebra, Calculus, Matrix and Tensor Methods in Context of Machine Learning
  • Reinforcement Learning
  • Optimization Methods
  • Video and Audio Generation and Analytics with Deep Learning
  • Parallel and Distributed Learning
  • Recurrent Neural Networks and its Applications
  • Tensor Learning
  • Multi-Scale Learning
  • Unsupervised Feature Learning
  • Recommender Systems
  • Bioinformatics and Biomedical Informatics
  • Healthcare and Clinical Decision Support
  • Collaborative Filtering
  • Computer Vision
  • Human Activity Recognition
  • Information Retrieval
  • Cybersecurity
  • Natural Language Processing
  • Statistical Learning Theory

Track-3: Advances in Applications of Artificial Intelligence in Interdisciplinary areas

  • Applications of AI for dams and hydropower plants.
  • Applications of AI in Manufacturing Industry
  • Applications of AI in preventive maintenance
  • Applications of AI in Insurance and Banking
  • Application of AI in Machine design
  • Applications of  AI  in Fluid dynamics
  • Applications of AI in  CFD/ CAD/CAM/CAE/FEA/FEM
  • Applications of AI in NC/CNC Machines
  • Applications of AI in Language Translation and Transliteration
  • Use of BERT/GPT for NLP and other Applications
  • Evolution and Innovation of Transformers for AI Models
  • Applications of AI in AR/VR Technologies
  • Applications of AI in Cybersecurity
  • Applications of AI in Robotics and Automation
  • Applications of AI in Blockchain
  • Applications of AI in Cloud Computing and Cloud Infrastrcuture
  • Applications of AI in Devops and Agile Computing
  • Applications of AI in Precision Agriculture
  • Applications of AI in Generation of Music and Art
  • Applications of AI in Fashion Design
  • Applications of AI in mobility and Autonomous vehicles
  • Applications of AI in Healthcare, Medical Industry
  • Applications of AI in Smart Cities and Smart Homes
  • Applications of AI in Pharmaceutical and Drug Development
  • Applications of AI in Bioinformatics, Genomic and DNA Sequencing/profiling
  • Applications of AI in High Performance Computing
  • Applications of AI in Telecommunications, Signal processing and Wireless Networks
  • Applications of AI in Space Research, Planet Exploration, Satellite Research
  • Applications of AI in Ocean Research
  • Applications of AI in Renewable energy resources, Clean and Green Energy
  • Big Data and Deep learning Applications
  • Computational intelligence and Optimization

Track-4: Reinforcement Learning

  • Gradient Bandit Algorithms, Multi-armed Bandit
  • Finite Markov Decision Processes
  • Dynamic Programming for Reinforcement Learning
  • Monte Carlo Methods for Reinforcement Learning
  • Temporal Difference Learning
  • n-step Bootstrapping
  • Tabular Methods for Reinforcement Learning
  • On-policy Prediction with Approximation
  • On-Policy Control with Approximation
  • Eligibility Traces in Reinforcement Learning Context
  • Policy Gradient, Actor Critic Methods
  • Psychology, Cognition and Neuroscience based Improvements in Reinforcement Learning
  • Explainability of Artificial Intelligence
  • Interpretability of Artificial Intelligence
  • Trustworthiness of AI
  • Reliable and Secure AI

Track-5: Advances in Data Science

  • Mathematical, Probabilistic and Statistical Models and Theories
  • Data Mining , Exploratory Data Analysis and Predictive Modelling
  • Machine Learning Theories, Models and Systems
  • Knowledge Discovery Theories, Models and Systems
  • Manifold and Metric Learning
  • Deep Learning and Deep Analytics
  • Scalable Analysis and Learning
  • Heterogeneous Data/Information Integration
  • Real Time Data Collection from Remote Sensors
  • Data Ecosystem for sharing of Data
  • Anonymizing Data records
  • Removing unwanted Biases of Data
  • Data Pre-Processing, Sampling and Reduction
  • Time Series Analysis, Spectral Analysis and Bivariate Processes
  • Dimensionality Reduction
  • Feature Selection, Transformation and Construction
  • Large Scale Optimization
  • High Performance Computing for Data Analytics
  • Architecture, Management and Process for Data Science
  • Data Analytics, and Knowledge Discovery
  • Data Visualization and Dashboards
  • Data Science Meets Social Science
  • Security, Trust and Risk in Big Data
  • Data Integrity, Matching and Sharing
  • Privacy and Protection Standards and Policies
  • Privacy Preserving Big Data Access/Analytics
  • Legal, IPR and Standardization issues in Data Engineering
  • Tools and Technology Use cases and innovative case studies
  • Social Impact and Social Good
 

The terms "We" / "Us" / "Our"/”Company” individually and collectively refer to Mindfulness Business Solution and the terms "You" /"Your" / "Yourself" refer to the users.

This Privacy Policy is an electronic record in the form of an electronic contract formed under the information Technology Act, 2000 and the rules made thereunder and the amended provisions pertaining to electronic documents / records in various statutes as amended by the information Technology Act, 2000. This Privacy Policy does not require any physical, electronic or digital signature.

This Privacy Policy is a legally binding document between you and Mindfulness Business Solution(both terms defined below). The terms of this Privacy Policy will be effective upon your acceptance of the same (directly or indirectly in electronic form, by clicking on the I accept tab or by use of the website or by other means) and will govern the relationship between you and Mindfulness Business Solution for your use of the website “Website” (defined below).

This document is published and shall be construed in accordance with the provisions of the Information Technology (reasonable security practices and procedures and sensitive personal data of information) rules, 2011 under Information Technology Act, 2000; that require publishing of the Privacy Policy for collection, use, storage and transfer of sensitive personal data or information.

Please read this Privacy Policy carefully by using the Website, you indicate that you understand, agree and consent to this Privacy Policy. If you do not agree with the terms of this Privacy Policy, please do not use this Website.

By providing us your Information or by making use of the facilities provided by the Website, You hereby consent to the collection, storage, processing and transfer of any or all of Your Personal Information and Non-Personal Information by us as specified under this Privacy Policy. You further agree that such collection, use, storage and transfer of Your Information shall not cause any loss or wrongful gain to you or any other person.

To avail certain services on our Websites, users are required to provide certain information for the registration process namely: - a) your name, b) email address, c) sex, d) age, e) PIN code, f) credit card or debit card details g) medical records and history h) sexual orientation, i) biometric information, j) password etc., and / or your occupation, interests, and the like. The Information as supplied by the users enables us to improve our sites and provide you the most user-friendly experience.

All required information is service dependent and we may use the above said user information to, maintain, protect, and improve its services (including advertising services) and for developing new services.

Such information will not be considered as sensitive if it is freely available and accessible in the public domain or is furnished under the Right to Information Act, 2005 or any other law for the time being in force.

To improve the responsiveness of the sites for our users, we may use "cookies", or similar electronic tools to collect information to assign each visitor a unique, random number as a User Identification (User ID) to understand the user's individual interests using the Identified Computer. Unless you voluntarily identify yourself (through registration, for example), we will have no way of knowing who you are, even if we assign a cookie to your computer. The only personal information a cookie can contain is information you supply (an example of this is when you ask for our Personalised Horoscope). A cookie cannot read data off your hard drive. Our advertisers may also assign their own cookies to your browser (if you click on their ads), a process that we do not control.

Our web servers automatically collect limited information about your computer's connection to the Internet, including your IP address, when you visit our site. (Your IP address is a number that lets computers attached to the Internet know where to send you data -- such as the web pages you view.) Your IP address does not identify you personally. We use this information to deliver our web pages to you upon request, to tailor our site to the interests of our users, to measure traffic within our site and let advertisers know the geographic locations from where our visitors come.

Our policy discloses the privacy practices for our own web site only. Our site provides links to other websites also that are beyond our control. We shall in no way be responsible in way for your use of such sites.

We shares the sensitive personal information to any third party without obtaining the prior consent of the user in the following limited circumstances:
(a) When it is requested or required by law or by any court or governmental agency or authority to disclose, for the purpose of verification of identity, or for the prevention, detection, investigation including cyber incidents, or for prosecution and punishment of offences. These disclosures are made in good faith and belief that such disclosure is reasonably necessary for enforcing these Terms; for complying with the applicable laws and regulations.
(b) We proposes to share such information within its group companies and officers and employees of such group companies for the purpose of processing personal information on its behalf. We also ensure that these recipients of such information agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures.

We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.

All information gathered on our Website is securely stored within our controlled database. The database is stored on servers secured behind a firewall; access to the servers is password-protected and is strictly limited. However, as effective as our security measures are, no security system is impenetrable. We cannot guarantee the security of our database, nor can we guarantee that information you supply will not be intercepted while being transmitted to us over the Internet. And, of course, any information you include in a posting to the discussion areas is available to anyone with Internet access.

However the internet is an ever evolving medium. We may change our Privacy Policy from time to time to incorporate necessary future changes. Of course, our use of any information we gather will always be consistent with the policy under which the information was collected, regardless of what the new policy may be.

Redressal Mechanism: Any complaints, abuse or concerns with regards to content and or comment or breach of these terms shall be immediately informed to the designated Grievance Officer as mentioned below via in writing or through email.