ICIST 2022: International Conference on Information and Software Technologies https://icist.ktu.edu/#venue Kaunas, Lithuania, October 13-15, 2022 |
Conference website | https://icist.ktu.edu/ |
Submission link | https://easychair.org/conferences/?conf=icist20221 |
Submission deadline | March 7, 2022 |
The ICIST Conference is hosted by the biggest technical university in the Baltic States – Kaunas University of Technology (Lithuania). 28th international conference ICIST 2022 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary areas of Information Systems, Business Intelligence, Software Engineering and Information Technology Applications. In 2022 the Conference will be held in Kaunas, on 13-15 October, 2022 in blended way.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference.
- To submit a paper, please log in to EasyChair ICIST 2022 event. After logging, you can submit your manuscript under the preferred special session.
-
The paper’s size should not exceed 5000 words and 12 pages (fee for extra pages is 10 EUR per page).
-
The accepted papers will be published as a volume of Springer-Verlag CCIS (Communications in Computer and Information Science) series. CCIS is indexed in ISI Proceedings and Scopus. Conference proceedings are rated as Level 1 periodical publication in Norwegian system.
-
One of the authors of each paper accepted for publishing in CCIS will have to register and present the paper at the conference. Note that no more than two papers by the same author (written individually or with the coauthors) can be included in this particular volume. Authors should submit a paper which is prepared for the conference and has not been published in any journal or conference proceedings.
-
Accepted for publication manuscript should be revised considering remarks of the reviewers. A revised version of an article should be submitted as a review version. Corrections done must be marked in other text colour.
-
All accepted papers will have to be formatted in accordance to the Springer requirements. Please see the templates and other important downloads for authors. Papers submitted will be reviewed by two reviewers and in case of disagreement of them, a third independent reviewer will be involved.
-
Paper reviewing process is double-blind, therefore before submitting the paper, please remove the names of authors from the title page (as well as obvious references to the authors in the text, if there are any). Also please edit the reference list in a way that it has got no works by the authors of the paper (such items in the list should be left blank, with only an original number and no text). The aforementioned information has to be restored when submitting the camera ready version.
-
Authors are advised not to shorten the references and to put DOIs wherever possible, as this would allow for correct citation attribution.
-
Please do not use password protection in a submitted manuscript or include headers and footers in the manuscript.
List of Topics
- - Application of Intelligent Methods to Investigation of Financial Markets
- - Financial Risk Management and Research
- - Enterprise Modelling and Knowledge Based Information Systems Engineering - Advances in CASE Tools
- - Knowledge Discovery in Social or Complex Networks - Big Data Analytics, Quality and Management
- - Data, Text, Web or Process Mining Methods
- - Visualization of Business or Big Data Analytics
- - Economic Issues of Business or Big Data Analytics
- - Impact, Adoption and Diusion of Business or Big Data Analytics
- - Business Analysis for Mobile, Cloud or Multimedia Applications
- - Computational Intelligence Methods and Applications
- - Modeling and Applied Mathematics in Various Aspects of Computational Intelligence
- - Computational Intelligence in Graphics, Multimedia and Vision Systems
- - Computational Intelligence in General Positioning, Civil Engineering, Bathymetric, Routing, Trafficc, etc.
- - Computational Intelligence for Robotics and Automatics
- - Computational Intelligence for Augmented Reality and Virtual Reality Models and Applications
- - Code Quality, Data Management, Testing and Separation of Concerns (SoC)
- - Intelligent Software, Algorithms and Methods for Large Scale Systems
- - Smart E-Learning: Concepts, Strategies, and Approaches
- - Educational Applications of Smart technology and Smart Systems
- - Smart Technology-based Educational Software and Hardware Systems
- - Intelligent Tutoring Systems Internet-of-Things (IoT) in E-Learning
- - Web 3.0-based Learning - Massive Open Online Courses (MOOCs)
- - Benefits, Quality and Effectiveness of E-Learning - Best Practices and Case Studies on E-Learning
- - Natural Language Processing (tagging systems, stemming, parsing and syntactical analysis, corpus-based language engineering)
- - Natural Language Understanding (text analysis, ontology, formal semantics) -Language-based Knowledge Engineering (text and data mining, knowledge acquisition, knowledge representation and reasoning)
- -Cognitive models and AI techniques (graph based models, semantic nets, neural networks, and cognitive maps)
- -Language Generation (dialogue-based systems, creative and writing systems, language synthesis, translation)
- -Multi-modal Computational Linguistics (speech recognition, speech-text conversions, speech analysis and textual tagging)
- - Applications and Systems (search and information retrieval, web applications, forensics, cognitive systems, que
- - Electronic health record (EHR) systems
- - Healthcare Management Systems
- - eHealth knowledge management
- - Patient data security, privacy and reliability
- - Performance evaluation of eHealth systems
- - Quality of eHealth Information Management Systems
- - eHealth and telemedicine systems in clinical practice
- - eHealth and telemedicine practice in health research
- - Health care management issues using eHealth
- - Application Security
- - Information Security
- - Network Security
- - Disaster Recovery Planning
- - Operational Security
- - End User Education
- - Security Compliance
- - Wireless and Mobile Security
- - Identity Management
- - Cloud Security
- - Blockchain Technologies
- - Cryptocurrencies
- - Smart Contracts
- - Performance
- - Security and Privacy Concerns
- - Legal and Organizational Issues
- - Industry Applications
- - Key and Innovative Theories, Methodologies, Schemes and Technologies of Blockchain and AI
- - Architectures and Platforms for Blockchain and AI
- - Sensors and Devices for Blockchain
In 2022 the Conference will be held in Kaunas (Lithuania), on 13-15 October, 2022 in blended way.
Contact
All questions about submissions should be emailed to icist@ktu.lt