Presentation schedule available at "Detailed Program Schedule" under the "PROGRAM" tab. Also fill up the form available there without fail
Prospective authors are invited to submit their papers on the following Tracks. The scope of the conference includes but is not limited to the following broad areas.
Track 1: Communication, Networking, IOT, Sensors and Materials
Green Communications, Wireless Communications and Networks, Optical Communications and Networks, Modulation and Coding Techniques, Ad-hoc, Mesh, and Sensor Networks, Vehicular Networks, Cellular Networks, IOT, ensors and Materials
Track 2: Signal and Image Processing
Image / Video / Multimedia Signal Processing, Audio / Speech / Spoken Language Processing, Digital & Multirate Signal Processing, Signal Processing Algorithms, and Architectures, Pattern Recognition and Object Tracking, Compressive Sensing and High-Dimensional Statistics.
Track 3: Computational Intelligence
Data Mining, Neural Networks and Deep Learning, Metaheuristic algorithms, Machine Learning
Business Intelligence, Human-Computer Interface, Crowd Sourcing & Social Intelligence. AI enabled Health Care Technologies, Wearable Sensors for Health care monitoring, Biomedical Imaging, Modeling, and Simulation in Medicine, Biomedical and Health Informatics
Track 4: Integrated Technologies for Future Mobility
Electric vehicles, Charging systems and Energy Storage, Electric Machines and Industrial Drives, Power Converters, Devices, EMI/EMC, Packaging, Networked control systems, Instrumentation systems, Industrial automation, Application of AI and ML Techniques to Power Electronics.
Track 5: Smart Energy Technologies
Smart grids transmission and distribution, Smart grid management, Smart monitoring and metering systems, Wide area monitoring and protection, Distributed energy recourses & Network integration, Green hydrogen energy, Energy efficiency in industrial process, Smart communities, Block chain and transactive energy systems, Home automation.
Track 6: Security and Privacy
Security and Privacy challenges in big data, Cryptography, Secure systems, Data privacy, eCrime and malware, Information Security, Communication Security, Biometric--based Security, Cryptography systems, Embedded Security, Data Analytics for Security and Privacy, Integrated Security Design Schemes, Surveillance.
The “Best Paper Awards” will be given to the studies which will be selected by the committee among the presented papers in ACCESS '25. The selection is performed by an award committee, based on the results of the reviewing process, the quality of the final paper, and the quality of the presentation. The “Best Paper Awards” will be given for each conference track.