| |||||||||||||||
CISSD 2014 : WCCI 2014 Special Session on Computational Intelligence for Security, Surveillance and Defence (CISSD) | |||||||||||||||
Link: http://www.ieeeottawa.ca/ci/cissd2014/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
-------------------------------------------------------------------------------
Special Session on Computational Intelligence for Security, Surveillance and Defence (CISSD) as part of the 2014 IEEE World Congress on Computational Intelligence, Beijing, People's Republic of China -------------------------------------------------------------------------------- Website: http://www.ieeeottawa.ca/ci/cissd2014/ Paper submission deadline: January 20, 2014 (extended and firm) ------------ Organizers: ------------ Rami Abielmona, Larus Technologies Corporation, Canada Slawo Wesolkowski, DRDC CORA, Canada Rafael Falcon, Larus Technologies Corporation, Canada ------------ Motivation: ------------ Given the rapidly changing and increasingly complex nature of global security, we continue to witness a remarkable interest within the security and defense communities in novel, adaptive and resilient techniques that can cope with the challenging problems arising in this domain. These challenges are brought forth not only by the overwhelming amount of data reported by a plethora of sensing and tracking modalities, but by the emergence of innovative classes of decentralized, mass-scale communication protocols and connectivity frameworks such as cloud computing, vehicular networks and the Internet of Things. Realizing that traditional techniques have left many important problems unsolved, and in some cases, not addressed, further efforts have to be undertaken in the quest for algorithms and methodologies that can detect and easily adapt to emerging threats. ------- Scope: ------- The purpose of this Special Session is to provide a forum for the exchange and discussion of current solutions in Computational Intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security, surveillance and defense problems. High-quality technical papers addressing research challenges in these areas are solicited. Papers should present original work validated via analysis, simulation or experimentation, including but not limited to the following topics: Advanced Architectures for Defense Operations - Multi-Sensor Data Fusion - Employment of Autonomous Vehicles - Intelligence Gathering and Exploitation - Mine Detection - Situation Assessment - Automatic Target Recognition - Mission Weapon Pairing and Assignment - Sensor Cueing and Tasking Modeling and Simulation of Defense Operations - Logistics Support - Mission Planning and Execution - Resource Management - Course of Action Generation - Models for War Games - Multi-Agent Based Simulation - Strategic Planning Security Applications - Surveillance - Human Modeling: Behavior, Emotion, Motion - Suspect Behavior Profiling - Automated Handling of Dangerous Situations or People - Stationary or Mobile Object Detection, Recognition and Classification - Intrusion Detection Systems - Cyber-Security - Air, Maritime & Land Security - Network Security, Biometrics Security and Authentication Technologies Keywords: security and defense; surveillance; computational intelligence; target tracking; mission planning; multi-sensor data fusion; intrusion detector; maritime domain awareness; multi-agent systems; unmanned aerial vehicles; ----------------------------- Technical Program Committee ----------------------------- Andrzej Najgebauer, Military University of Technology, Poland David Van Veldhuizen, Air Force Research Laboratory, USA Krzysztof Slot, Technical University of Lodz, Poland Moufid Harb, Larus Technologies Corporation, Canada Nur Zincir-Heywood, Dalhousie University, Canada Sansanee Auephanwiriyakul, Chiang Mai University, Thailand Suresh Sundaram, Nanyang Technological University, Singapore Timothy Havens, Michigan State University, USA Branko Ristic, DSTO, Australia Dmitry Gorodnichy, Canadian Border Services Agency, Canada Fred Petty, US Naval Research Laboratory, USA Vincenzo Piuri, University of Milan, Italy Nathalie Japkowicz, University of Ottawa, Canada James Dankert, BAE Systems, USA Srinivas Mukkamala, ICASA, USA Misty Blowers, Air Force Research Lab, USA Alain Auger, DRDC Valcartier, Canada ---------------------- Submission Guidelines ---------------------- As with previous years, this is a hybrid special session, meaning that it welcomes papers from all three WCCI conferences (IJCNN, FUZZ-IEEE and CEC). However, when submitting your paper, you must choose the CEC 2014 track (http://ieee-cis.org/conferences/cec2014/upload.php) and in the "Main Topic" you must specify "SS39. EC39: Computational Intelligence for Security, Surveillance and Defence (CISSD)". Each accepted paper will be included in the main WCCI 2014 conference proceedings. Please follow the manuscript style information and templates of regular IEEE WCCI 2014 papers, as described in http://www.ieee-wcci2014.org/Paper%20Submission.htm When submitting your manuscript, please ensure to follow these steps: 1. Go to the CEC 2014 conference submission website (http://ieee-cis.org/conferences/cec2014/upload.php) 3. Select the Special Session name in the Main Research topic dropdown list; 4. Fill out the input fields, upload the PDF file and finalize the submission by January 20, 2014. ----------------- Important Dates: ----------------- * Paper submission deadline: January 20, 2014 (extended and firm) * Acceptance notification deadline: March 15, 2014 * Camera-ready submission deadline: April 15, 2014 |
|