Saturday, 5 January 2019

CFP: IEEE CEC 2019 Special Session on When Evolutionary Computation Meets Data Mining

Many of the tasks carried out in data mining and machine learning, such as feature subset selection, associate rule mining, and model building, can be transformed as optimization problems. Thus it is very natural that Evolutionary Computation (EC), has been widely applied to these tasks in the fields of data mining (DM) and machine learning (ML), as an optimization technique.

On the other hand, EC is a class of population-based iterative algorithms, which generate abundant data about the search space, problem feature and population information during the optimization process. Therefore, the data mining and machine learning techniques can also be used to analyze these data for improving the performance of EC. A lot of successful applications have been reported, including the creation of new optimization paradigm such as Estimation of Distribution Algorithm, the adaptation of parameters or operators in an algorithm, mining the external archive for promising search regions, and so on.

However, there remain many open issues and opportunities that are continually emerging as intriguing challenges for bridging the gaps between EC and DM. The aim of this special session is to serve as a forum for scientists in this field to exchange the latest advantages in theories, technologies, and practice.

We invite researchers to submit their original and unpublished work related to, but not limited to, the following topics:

  • EC enhanced by Data Mining and Machine Learning Concepts and/or Framework
  • Data Mining and Machine Learning Based on EC techniques
  • Machine Learning Enhanced and/or Model-based Multi- and/or Many-objective Optimization
  • Data Mining and Machine Learning Enhanced Constrained Optimization:
  • Data Mining and Machine Learning Enhanced Memetic Computation or Local Search
  • Data Mining and Machine Learning Enhanced EC for Combinatorial Optimization
  • Data Mining and Machine Learning Enhanced EC for Large-scale Optimization
  • Data Mining and Machine Learning Enhanced EC for Dynamic Optimization
  • Association Rule Mining Based on Multi-Objective Optimization
  • Knowledge Discovery in Data Mining via Evolutionary Algorithm
  • Genetic Programming in Data Mining
  • Multi-Agent Data Mining using Evolutionary Computation
  • Medical Data Mining with Evolutionary Computation
  • Evolutionary Computation in Intelligent Network Management
  • Evolutionary Clustering in Noisy Data Sets
  • Big Data Projects with Evolutionary Computation
  • Deep Learning with Evolutionary Computation
  • Real World Applications

Paper Submission:

All papers should be submitted electronically through IEEE CEC 2017 website at To submit your papers to the special session, please select the Special Session in the Main Research topic. For more submission information please visit: All accepted papers will be published in the IEEE CEC 2017 electronic proceedings.


Zhun Fan
Shantou University, China

Xinye Cai
Nanjing University of Aeronautics and Astronautics, China

1 comment:

  1. Access to computers and other control systems which might provide you with information about the way the world revolves around technology should be unlimited and total. All information should be free and accessible to all. That is why we at INTEGRATEDHACKS have come come up with a team of highly motivated and dedicated hackers to help you get access to information you are being deprived of. Our services include and are not limited to hacking of social media accounts,email accounts, tracking of phones hacking of bank cards and many more.
    Have you ever been hacked? Need to recover your stolen account, Want to monitor your kids,spouse or partner, Change your school results track messages from an email or mobile number and many more, INTEGRATEDHACKS is the one for you. Hundreds of our clients have their phones, social media accounts, emails, servers, may bots and PCs hacked consistently and efficiently. Our professional hackers for hire team is highly qualified and can hack anything or device you desire without giving the target any form of notification which makes us one of the best.
       Are you having doubts about your partner ? Worry no more. All your doubts would be cleared.

    ★ Contact Us For Your Desired Hacking services via : and experience cyber hacking like never before.