{"id":29,"date":"2019-10-23T12:45:11","date_gmt":"2019-10-23T12:45:11","guid":{"rendered":"http:\/\/easyconferences.eu\/iisa2020\/?page_id=29"},"modified":"2020-08-05T16:07:16","modified_gmt":"2020-08-05T16:07:16","slug":"topics","status":"publish","type":"page","link":"https:\/\/easyconferences.eu\/iisa2020\/topics\/","title":{"rendered":"Topics"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.2&#8243; custom_margin=&#8221;-6px|||||&#8221;][et_pb_row _builder_version=&#8221;4.0.2&#8243; border_width_all=&#8221;6px&#8221; border_color_all=&#8221;#8b68ee&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;initial&#8221; custom_padding=&#8221;||0px|||&#8221; custom_css_before=&#8221;hr.new1 {||  border-top: 1px solid red;||}&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #8b68ee;\"><strong>TOPICS<\/strong><\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.0.2&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong><em>Information<\/em><\/strong> is widely available and accessible, but frequently leads to information overload and overexposure, while the effort for coding, storing, hiding, securing, transmitting and retrieving it may be excessive. <strong><em>Intelligence<\/em><\/strong> is required to manage information and extract knowledge from it, inspired by biological and other paradigms. <strong><em>Multimedia Systems<\/em><\/strong> <strong><em>and Networks, <\/em><\/strong>with an increasing level of Intelligence, are being developed that incorporate these advances. As a result, new <strong><em>Technologies, Protocols and Applications<\/em><\/strong> are emerging.<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0 The International Conference on Information, Intelligence, Systems and Applications (IISA) series offers a forum for the constructive interaction and prolific exchange of ideas among scientists and practitioners from different research fields \u2013 such as computers, mathematics, physics, biology, medicine, chemistry, experimental psychology, social sciences, linguistics, and engineering \u2013 having the goal of developing methodologies and tools for the solution of complex problems in artificial intelligence, biology, neuroscience, security, monitoring, surveillance, healthcare, sustainability in energy sources, governance, education, commerce, automation, robotics, optimization, image, speech and natural languages, and their integration.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<h4><a href=\"http:\/\/easyconferences.eu\/iisa2020\/wp-content\/uploads\/2019\/11\/1st_CFP_IISA2020-Piraeus.pdf\"><span style=\"text-decoration: underline; color: #993300;\">The call for papers can be found here.<\/span><\/a><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.0.2&#8243; animation_style=&#8221;slide&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong>Track I: <u>Information Processing and Intelligence<\/u><\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Advances in databases<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Information systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Information and data management<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Data mining and knowledge extraction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Recommender systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Digital rights management<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Processing of Social and Emotional Interactions<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Biological and artificial neural networks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Biological and artificial immune systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Cognitive science<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Neuroscience<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Computational biology<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 DNA computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Evolutionary computing and genetic algorithms<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Bayesian networks<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Expert systems &amp; intelligent agents<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Swarm intelligence<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Fuzzy logic systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Kernel methods &#8211; support vector machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Ensemble classifiers<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Emerging machine learning paradigms<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Decision making techniques<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Knowledge-based systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Ambient-ubiquitous intelligence<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Robotics and automation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Affective computing<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243; hover_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track II: <u>Multimedia Systems and Networks<\/u><\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Advances in multimedia processing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Signal mining<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Signal visualization<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Human-machine interaction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Multimodal systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Multimedia systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Autonomous Computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Distributed computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Quantum computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Mobile computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Green computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Trusted computing<\/p>\n<p>\u00b7 \u00a0\u00a0 Proactive computing<\/p>\n<p>\u00b7 \u00a0\u00a0 Cloud computing<\/p>\n<p>\u00b7 \u00a0\u00a0 Ubiquitous computing<\/p>\n<p>\u00b7 \u00a0\u00a0 Networking<\/p>\n<p>\u00b7 \u00a0\u00a0 Sensing, sensory systems and sensor networks<\/p>\n<p>\u00b7 \u00a0\u00a0 Design and implementation<\/p>\n<p>\u00b7 \u00a0\u00a0 Real time systems<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.0.2&#8243;][\/et_pb_text][et_pb_text _builder_version=&#8221;4.0.2&#8243;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track III: <u>Educational Informatics<br \/> <\/u><\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Adaptive and personalied learning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Student modeling<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Intelligent tutoring systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 E-learning and mobile learning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Social media and learning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Educational games<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Computer-supported collaborative learning<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Big data in education and learning analytics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Smart learning enviroments<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Virtual and augmented reality in education<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Risk management in education<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Learning management systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Content management systems<\/p>\n<p>\u00b7 \u00a0\u00a0 Learning technologies for students with special needs<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.0.2&#8243; animation_style=&#8221;slide&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track IV: <u>Cyber Security<br \/> <\/u><\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Watermarking, cryptography\/analysis, steganography\/analysis<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Privacy and authentication<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Malicious software analysis<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Information, computer and network security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Infrastructure security<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Forensics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Biometrics<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.0.2&#8243;][\/et_pb_text][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track VII: <u>Applications<br \/> <\/u><\/strong><\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 E-government and m-government <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 E-commerce and m-commerce<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 E-entertainment and m-entertainment<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 E-legal and m-legal services<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Personalized systems and services<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Enabling technologies, frameworks and standards<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Empirical evaluations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Simulation and evaluation via simulation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Case studies <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Applications in culture and heritage<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Applications in tourism<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Applications in natural resource management <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Applications in disabilities and to people at need<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243; hover_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track V : <u>Smart Energy and Smart Cities<br \/> <\/u><\/strong><\/p>\n<p>\u00b7\u00a0 \u00a0 Assessment of the energy status in smart cities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Intelligent sensors and data analytics for energy optimization<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Monitoring and control of energy resources<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Smart grid<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Fault detection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Decision support systems in energy planning and scheduling<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Middleware for urban computing<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Intelligent transportation systems<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Public displays for modern cities<\/p>\n<p>\u00b7 \u00a0\u00a0 Impact of urban computing in modern cities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Case studies and best practices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Big city data<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Culture for smart cities<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.0.2&#8243;][et_pb_text _builder_version=&#8221;4.0.2&#8243;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Track VI : <u>Healthcare<br \/> <\/u><\/strong><\/p>\n<p>\u00b7\u00a0 \u00a0 E-health, mobile health and smart health<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Infrastructure for smart health<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Advanced devices and robotics for smart health<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Ambient intelligence in assisted living <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Health information systems <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Healthcare management <\/p>\n<p>\u00b7\u00a0\u00a0\u00a0 Case studies<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TOPICSInformation is widely available and accessible, but frequently leads to information overload and overexposure, while the effort for coding, storing, hiding, securing, transmitting and retrieving it may be excessive. Intelligence is required to manage information and extract knowledge from it, inspired by biological and other paradigms. Multimedia Systems and Networks, with an increasing level of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/pages\/29"}],"collection":[{"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":15,"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":502,"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/pages\/29\/revisions\/502"}],"wp:attachment":[{"href":"https:\/\/easyconferences.eu\/iisa2020\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}