The International Conference on Bio-inspired Computing: Theories and Applications (BICTA) is the annual event in the high-reputation BICTA series. BICTA aims to provide a high-level international forum for researchers working in the field of bio-inspired computing to present their recent results and to exchange ideas. The conference invites researchers to contribute high-quality original research papers in any aspect of bio-inspired computing.
1. Theories
Swarm robotics
Artificial life
Bioinformatics
Cognitive science
Computationla neuroscience
Social evolution
Optimization theory and methods
Immune system theory
Evolutionary computation
Grammatical Evolution
Natural computing
Simulation and emulation of nature
Multi-agent based complex systems
Collective intelligence
Social intelligence
Social computing
Swarm-based techniques
Swarm computing models
Particle swarm optimization
Ant colony optimization
Fish school search
2. Algorithms:
Molecular computing
DNA computing
Quantum computing
Granularity computing
Optical computing
Chaos computing
Self-assembling and self-organizing systems
Super-Turing computation
Cellular automata
Neural computing
Membrane computing
PSO algorithms
ACO algorithms
FSS algorithms
Bees algorithm
Artificial Bee Colony Algorithms
Fireworks algorithms
Brain Strom Optimization algorithm
Cultural algorithms
Genetic algorithms
Co-evolution algorithms
Memetic algorithms
Evolutionary programming
3. Models:
Computational swarm models
Multi-objective optimization
Evolutionary intelligent agents
Constrained environment
Information System
Analytic models of emergent behaviors
Classifier system
Evolving fuzzy system
Evolving neural networks
Models for social insets
Artificial immune system
Socio-inspired computing models
Hybridizations of algorithms
Parallelization of swarm-based algorithms
Parallelization of evolutionary computing
Computing systems biology
4. Applications
Pattern recognition
Deep learning and machine learning
Intelligent control
Intelligent Energy Systems and Networks
Financial prediction
Information security
Web intelligence
Data mining
Knowledge discovery
Neural system
2D or 3D virtual swarms
Virtual reality
Audio or Image processing
Telecommunications systems
Evolutionary robotics
Automatic control
Routing
Scheduling
Cybernetics and self-organization
Intelligent traffics
Simulations
Electronics systems
Defense security
12月01日
2017
12月03日
2017
摘要截稿日期
初稿截稿日期
注册截止日期
留言