The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of milit...
ISBN:
(纸本)9781467359115
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of military combat units through weight-based terrain analysis using NASA world wind;testing a distributed denial of service defense mechanism using red teaming;multiple UAV area decomposition and coverage;cooperative path planning for UAVs with UAV loss considerations;neural adaptive flight controller for ducted-fan UAV performing nonlinear maneuver;a novel obstacle avoidance control algorithm in a dynamic environment;design of a nonlinear dynamic inversion controller for trajectory following and maneuvering for fixed wing aircraft;and investigating application behavior in network traffic traces.
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in...
详细信息
ISBN:
(纸本)1424407001
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in military missions;solving multicommodity capacitated network design problems using a multiodjective evolutionary algorithm;computational verification of system architectures;next generation end-to-end logistics decision support tools. Evolutionary logistics planning;face recognition system using ant colony optimization-based selected features;improved missile route planning and targeting using game-based computationalintelligence;a review of intelligent systems software for autonomous vehicles;computationalintelligence support for smart queries and adaptive data;and a template-based method for force group classification in situation assessment.
The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix pr...
ISBN:
(纸本)9781424437641
The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm;dynamical networks as a tool for system analysis and exploration;a detailed analysis of the KDD cup 99 data set;BlastSim - multi agent simulation of suicide bombing;evolution and evaluation of biometric systems;information assurances and threat identification in networked organizations;neural-based iterative approach for iris detection in iris recognition systems;machine learning based encrypted traffic classification: identifying SSH and Skype;multiple UAV teams for multiple tasks;passive multitarget tracking using transmitters of opportunity;application of voiced-speech variability descriptors to emotion recognition;and integrating reasoning with personality effects in simulated operators.
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dyn...
ISBN:
(纸本)9781467375573
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environment;design and analysis of neuromemristive echo state networks with limited-precision synapses;memristive computational architecture of an echo state network for real-time speech-emotion recognition;spiking-based matrix computation by leveraging memristor crossbar array;design of experiments based empirical models to support cognitive radio decision making;detecting push to talk radios using two tone intermodulation distortion;and evolving spiking neural networks: a novel growth algorithm corrects the teacher.
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion de...
ISBN:
(纸本)9781479954315
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion detection system using discrete Fourier transform;a simple braking model for detecting incidents locations by smartphones;a hybrid framework for enhancing correlation to solve cold-start problem in recommender systems;an improved memetic algorithm to enhance the sustainability and reliability of transport in container terminals;automated generation of ham rules for Vietnamese spam filtering;design of takagi-sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jet;and behavior-driven video analytics system for critical infrastructure protection.
The following topics are dealt with: computationalintelligence; security of data; defense application; military computing; image processing and evolutionary computation
The following topics are dealt with: computationalintelligence; security of data; defense application; military computing; image processing and evolutionary computation
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using hig...
ISBN:
(纸本)9781424499410
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using high level GPU programming for maritime operations support;clustering of tracklets for on-line multi-target tracking in networked camera systems;modelling search and rescue systems with dynamical networks;sensor network management using multiobjective evolutionary optimization;object set matching with an evolutionary algorithm;computation of most threatening radar trajectories areas and corridors based on fast-marching & level sets;accelerating common operational pictures through network consensus;complex decision making experimental platform (CODEM): a counter-insurgency scenario;high-dimensional objective-based data farming;and multi-objective evolutionary optimization of a military air transportation fleet mix with the flexibility objective.
The 2011 ieeesymposium on computationalintelligence for security and defenseapplications will present a wide range of applications to very challenging problems in the security and defense domains. ieee cisda 2011, ...
The 2011 ieeesymposium on computationalintelligence for security and defenseapplications will present a wide range of applications to very challenging problems in the security and defense domains. ieee cisda 2011, the fourth such forum (the first was held in 2007), aims to present the most recent results on computationalintelligence technologies and their applications to security, defense and military problems. The following topics will be discussed at the symposium: mine detection, complex adaptive systems, radar systems, modeling and simulation of military operations, network security, and maritime applications.
The 2012 ieeesymposium on computationalintelligence for security and Defence applications (ieee cisda 2012) was held from 11 to 13 July 2012 in the Delta Ottawa City Centre Hotel in Ottawa, Canada. This article over...
The 2012 ieeesymposium on computationalintelligence for security and Defence applications (ieee cisda 2012) was held from 11 to 13 July 2012 in the Delta Ottawa City Centre Hotel in Ottawa, Canada. This article overviews the happenings at the conference. ieee cisda 2012 was the fifth forum (the first was held in 2007) on CI for security and defence applications. Since that inaugural year, new problems have emerged within the broad areas of security and defence that are increasingly more difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats. The purpose of the symposium is to present current efforts in CI (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security, defence and military problems. The following topics are typically discussed at the symposium: complex adaptive systems, intelligence gathering and exploitation, modeling and simulation of military operations, network security, automatic target recognition and tracking, biometrics, as well as employment and control of autonomous vehicles.
The 2012 ieeesymposium on computationalintelligence (CI) for security and defenseapplications (ieee cisda 2012) was held in the Delta Ottawa City Center Hotel in Ottawa, Canada, from July 11-13, 2012. The 2012 even...
详细信息
The 2012 ieeesymposium on computationalintelligence (CI) for security and defenseapplications (ieee cisda 2012) was held in the Delta Ottawa City Center Hotel in Ottawa, Canada, from July 11-13, 2012. The 2012 event's motto was Creating Intelligent Surveillance where one selectively applied CI techniques to create intelligent surveillance solutions. This was demonstrated by papers on anomaly detection for explosive hazards, along with radioactive material concealment that utilized support vector machines (SVMs) and autoassociators. Other papers discussed topics such as the creation and simulation of courses of action using cloud-based planning, the detection of buried objects using features such as histogram of gradients (HOG) and an SVM classifier and the analysis of simulation and real-world complex systems data with heterogeneous structures to improve the surveillance of communication networks. ieee cisda 2012 also offered four special sessions, including one that provided an interdisciplinary forum.
暂无评论