Recent Advances in
Computational Intelligence
in Defense and Security
Important Dates
October 30, 2014:Abstract submission due
November 30, 2014:Abstract notification due
January 31, 2015:Full chapter submission due
March 31, 2015:Full chapter notification dueMay 31, 2015:Camera-ready submission dueLate August, 2015Volume publication expected
Call for Book Chapters
Springer series on Studies in Computational Intelligence
Overview
Given the rapidly changing and increasingly complex nature of global security, we continue to witness a remarkable interest within the defense and security communities in novel, adaptive and resilient techniques that can cope with the challenging problems arising in this domain. These challenges are brought forth not only by the overwhelming amount of data reported by a plethora of sensing and tracking modalities, but also by the emergence of innovative classes of decentralized, mass-scale communication protocols and connectivity frameworks such as cloud computing, sensor networks, intelligent transportation systems and the Internet of Things. Realizing that traditional techniques have left many important problems unsolved, and in some cases, not addressed, further efforts have to be undertaken in the quest for algorithms and methodologies that can accurately detect and easily adapt to emerging threats.
The aim of the book
We sense there is a need for gathering a representative set of the most recent undertakings having to do with novel applications of Computational Intelligence (CI) techniques to the defense and security sectors.
This volume aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence,rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.
Intended audience
This book will serve as an excellent guide for surveying the state of the art in Computational Intelligence applied to challenging real-world problems in the defense and security realms. Defense scientists, industry experts,academicians and practitioners alike (mostly in computer science, computer engineering, applied mathematics or management information systems) will all benefit from the wide spectrum of successful application domains compiled in this volume. Senior undergraduate or graduate students may also discover in this volume uncharted territory for their own research endeavors.
Interested in submitting?
Then check the list of submission topics, author guidelines, important dates (top left of the page) and thevolume editors.