SCI 2025 : 7th International Conference on Smart Computing and Informatics
SCI 2025 will provide a platform for researchers and practitioners to interact with one another and discuss the state-of-the-art developments in the field. The topics of the conference will cover all aspects of research and applications in Smart Computing including but not limited to:
Artificial Intelligence and Machine Learning
Machine Learning and Deep Learning for Information Systems
Intelligent Data Integration and Fusion
AI-driven Decision Support Systems
AI in Autonomous Systems and Robotics
Ethical AI and Responsible AI Practices
IoT and Smart Devices
IoT-enabled Information Systems and Applications
Smart Cities and Urban Informatics
Wearable Computing and Health Informatics
IoT Data Analytics and Real-time Processing
Smart Agriculture and Environmental Monitoring
Big Data Models, Algorithms & Applications
Algorithms and Programming Techniques for Big Data Processing
Big Data in Mobile and Pervasive Computing
Visualization Analytics for Big Data
Big Data Management and Processing
Data Mining, Pattern Recognition and Predictive Analytics Data Driven Modelling
Big Data Protection, Integrity and Privacy
Models and Languages for Big Data
Protection Privacy Preserving Big Data Analytics
Big Data Encryption
Ethical and Privacy Aspects of Big Data Analytics
Social Media Analytics
Natural Language Processing and Text Analytics
Knowledge Representation and Reasoning
Sentiment Analysis and Opinion Mining
Blockchain
Blockchain Technology for Information Security and healthcare
Blockchain for Metaverse & Digital Twins
Blockchain-based Applications and Services
Blockchain in social networking
Blockchain and trust management
Sustainable Computing and HCI
Green IT and Sustainable Information System
Intelligent User Interfaces and Human-Computer Interaction
User-Centered Design and User Experience (UX)
Self-sustaining sensing and edge computing
Computer Vision and virtual environment
CyberSecurity
Cybersecurity and Threat Detection
Network Security and Intrusion Detection
Digital Forensics and Incident Response
Risk Assessment and Management in Information Systems
Submitted papers should neither be previously published nor under consideration for publication elsewhere. All papers will be refereed through a peer review process.
Artificial Intelligence and Machine Learning
Machine Learning and Deep Learning for Information Systems
Intelligent Data Integration and Fusion
AI-driven Decision Support Systems
AI in Autonomous Systems and Robotics
Ethical AI and Responsible AI Practices
IoT and Smart Devices
IoT-enabled Information Systems and Applications
Smart Cities and Urban Informatics
Wearable Computing and Health Informatics
IoT Data Analytics and Real-time Processing
Smart Agriculture and Environmental Monitoring
Big Data Models, Algorithms & Applications
Algorithms and Programming Techniques for Big Data Processing
Big Data in Mobile and Pervasive Computing
Visualization Analytics for Big Data
Big Data Management and Processing
Data Mining, Pattern Recognition and Predictive Analytics Data Driven Modelling
Big Data Protection, Integrity and Privacy
Models and Languages for Big Data
Protection Privacy Preserving Big Data Analytics
Big Data Encryption
Ethical and Privacy Aspects of Big Data Analytics
Social Media Analytics
Natural Language Processing and Text Analytics
Knowledge Representation and Reasoning
Sentiment Analysis and Opinion Mining
Blockchain
Blockchain Technology for Information Security and healthcare
Blockchain for Metaverse & Digital Twins
Blockchain-based Applications and Services
Blockchain in social networking
Blockchain and trust management
Sustainable Computing and HCI
Green IT and Sustainable Information System
Intelligent User Interfaces and Human-Computer Interaction
User-Centered Design and User Experience (UX)
Self-sustaining sensing and edge computing
Computer Vision and virtual environment
CyberSecurity
Cybersecurity and Threat Detection
Network Security and Intrusion Detection
Digital Forensics and Incident Response
Risk Assessment and Management in Information Systems
Submitted papers should neither be previously published nor under consideration for publication elsewhere. All papers will be refereed through a peer review process.