Springer series on Studies in Computational Intelligence

Call for Book Chapters

 

Springer series on Studies in Computational Intelligence

Overview

Given the rapidly changing and increasingly complex nature of global security, we continue to witness a remarkable interest within the defense and security communities in novel, adaptive and resilient techniques that can cope with the challenging problems arising in this domain. These challenges are brought forth not only by the overwhelming amount of data reported by a plethora of sensing and tracking modalities, but also by the emergence of innovative classes of decentralized, mass-scale communication protocols and connectivity frameworks such as cloud computing, sensor networks, intelligent transportation systems and the Internet of Things. Realizing that traditional techniques have left many important problems unsolved, and in some cases, not addressed, further efforts have to be undertaken in the quest for algorithms and methodologies that can accurately detect and easily adapt to emerging threats.

The aim of the book

We sense there is a need for gathering a representative set of the most recent undertakings having to do with novel applications of Computational Intelligence (CI) techniques to the defense and security sectors.

This volume aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networksfuzzy systemsevolutionary computationswarm intelligencerough setsgranular computing, and other emerging learning or optimization techniques) are solicited.

Intended audience

This book will serve as an excellent guide for surveying the state of the art in Computational Intelligence applied to challenging real-world problems in the defense and security realms. Defense scientistsindustry experts,academicians and practitioners alike (mostly in computer science, computer engineering, applied mathematics or management information systems) will all benefit from the wide spectrum of successful application domains compiled in this volume. Senior undergraduate or graduate students may also discover in this volume uncharted territory for their own research endeavors.

Interested in submitting?

Then check the list of submission topicsauthor guidelines, important dates (top left of the page) and thevolume editors.

Both comments and pings are currently closed.

Comments are closed.

Design by 2b Consult