Deep Learning Conf 2016

A conference on deep learning.

Deep Learning is a new area of research that is getting us closer in achieving one of the primary objectives of Machine Learning – Artificial Intelligence.
It is used widely in the fields of Image Recognition, Natural Language Processing (NLP) and Video Classification.


Deep Learning Conf is a single day conference followed by workshops on the second day. The conference will have full, crisp and lightning talks from morning to evening. The workshops on the next day will introduce participants to neural networks followed by two tracks of three-hour workshops on NLP and Computer Vision / AI. Participants can join either one of the two workshop tracks.

We are looking for talks and workshops from academics and practitioners of Deep Learning on the following topics:

  • Applications of Deep Learning in software.
  • Applications of Deep Learning in hardware.
  • Conceptual talks and cutting edge research on Deep Learning.
  • Building businesses with Deep Learning at the core.

We are inviting proposals for:

  • Full-length 40 minute talks.
  • Crisp 15-minute talks.
  • Lightning talks of 5 mins duration.

Selection process

Proposals will be filtered and shortlisted by an Editorial Panel. Along with your proposal, you must share the following details:

  • Links to videos / slide decks when submitting proposals. This will help us understand your past speaking experience.
  • Blog posts you may have written related to your proposal.
  • Outline of your proposed talk – either in the form of a mind map or a text document or draft slides.

If your proposal involves speaking about a library / tool / software that you intend to open source in future, the proposal will be considered only when the library / tool / software in question is made open source.

We will notify you about the status of your proposal within two-three weeks of submission.

Selected speakers have to participate in one-two rounds of rehearsals before the conference. This is mandatory and helps you prepare for speaking at the conference.

There is only one speaker per session. Entry is free for selected speakers. As our budget is limited, we will prefer speakers from locations closer home, but will do our best to cover for anyone exceptional. HasGeek will provide a grant to cover part of your travel and accommodation in Bangalore. Grants are limited and made available to speakers delivering full sessions (40 minutes or longer).

Commitment to open source

HasGeek believes in open source as the binding force of our community. If you are describing a codebase for developers to work with, we’d like it to be available under a permissive open source licence. If your software is commercially licensed or available under a combination of commercial and restrictive open source licences (such as the various forms of the GPL), please consider picking up a sponsorship. We recognise that there are valid reasons for commercial licensing, but ask that you support us in return for giving you an audience. Your session will be marked on the schedule as a sponsored session.

Key dates and deadlines

  • Proposal submission deadline: 31 May 2016
  • Schedule announcement: 15 June 2016
  • Conference dates: 1 July 2016

CMR Institute of Technology, Bangalore

For more information about speaking proposals, tickets and sponsorships, contact or call +91-7676332020.

Hosted by

The Fifth Elephant - known as one of the best data science and Machine Learning conference in Asia - has transitioned into a year-round forum for conversations about data and ML engineering; data science in production; data security and privacy practices. more

Neeraj Kumar


Deep learning for computational pathology

Submitted Jun 6, 2016

We strongly believe that the future of not only medical detection and diagnosis but also prognosis and treatment planning will be strongly influenced by pattern recognition and data analysis. Medical imaging will be no different, especially with the advent of techniques such as unsupervised feature extraction and deep learning aided by high performance computing (HPC) in the form of cloud clusters and GPU-based desktops. Currently, we are actively working on pattern recognition applications to histological images. Specifically, we have developed state-of-the art deep learning algorithms for nuclei and mitosis detection, epithelium vs. stroma classification, nuclear abnormality detection etc. In this talk, we will discuss about some of these algorithms and their role in deriving biological insights that can pave the way for improving our understanding of human carcinogenesis.


~Introduction to deep learning and computational pathology (C-path)
~Improtant problems in C-path such as prostate cancer recurrrence prediction that can be addressed using machine learning
~Our deep learning based C-path pipeline
~Important results and future directions

Speaker bio

Neeraj Kumar is a research scholar with the department of electronics and electrical engineering at IIT Guwahati. He has developed learning based algorithms for inverse problems such as single image super resolution and reducing the solution space of Non-negative matrix factorization during his PhD. Towards the end of his PhD he shifted the focus of his research to computational pathology and developed deep learning based pipelines for automated analysis of histopathological images. For this purpose he has interned for six months at the Beckman Institute and Department of Bioengineering of the University of Illinois at Urban-Champaign. He is the recipient of the prestigious Microsoft research India fellowship and Erasmus Mundus Heritage Fellowship during his PhD.


{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hosted by

The Fifth Elephant - known as one of the best data science and Machine Learning conference in Asia - has transitioned into a year-round forum for conversations about data and ML engineering; data science in production; data security and privacy practices. more