By Topic

CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005.

March 31 2005-April 1 2005

Filter Results

Displaying Results 1 - 25 of 41
  • Proceedings of the 2005 IEEE International Conference in Computational Intelligence for Homeland Security and Personal Safety

    Publication Year: 2005, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Message from the Chairmen

    Publication Year: 2005, Page(s):iii - iv
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • CIHSPS 2005 Conference Committee

    Publication Year: 2005, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):vii - ix
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Modeling intelligence information: multi-source fusion

    Publication Year: 2005, Page(s):2 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1390 KB) | HTML iconHTML

    We discuss the inherent imprecision and uncertainty associated with much of the information available to intelligence analyst. We indicate how fuzzy sets can provide an appropriate method for representing this type of information. We briefly describe some concepts from the fuzzy sets based theory of approximate reasoning. We then suggest a method for fusing multi-source information based on a conj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Using fuzzy cognitive maps as an intelligent analyst

    Publication Year: 2005, Page(s):9 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    With the increasing sources and volume of data available to an analyst, the development of decision aids is increasingly necessary to filter and format it for use by intelligence analysts. In this paper the use of fuzzy cognitive maps as such a filter will be described. The technique will be incorporated as a decision aid in Neocities; a dynamic simulation used to investigate the technology is use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Email communications analysis: how to use computational intelligence methods and tools?

    Publication Year: 2005, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The paper aims at investigating computational intelligence methodologies for detecting a change in communication behavioral patterns between e-mail subscribers. This change may indicate a change of social status and behavior, which could be used for early discovery of some preparation to antisocial activity, including but not limiting to terrorist attacks. The patterns in the social interactions o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Development of an artificial intelligence system for detection and visualization of auto theft recovery patterns

    Publication Year: 2005, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Auto theft is the most expensive property crime that is on the rise across the nation. The prediction of auto drop-off locations can increase the probability of offender apprehension. For successful prediction, first the patterns of thefts are identified. Then, a prototype expert system successfully identified embedded drop-off location clusters that were previously unknown to investigators. The s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft computing techniques for analysis of kidnapping crimes in Colombia

    Publication Year: 2005, Page(s):30 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1602 KB) | HTML iconHTML

    Techniques associated with soft computing have been proven to be useful for solving problems where lack of information and uncertainties are present. The flaws of traditional methodologies stem from the fuzziness, partial true, lack of information, and event imprecision of problems related to crime analysis such as kidnapping. Case based reasoning and expert's knowledge are the main inputs of some... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 36
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Fuzzy logic-optimized secure media access control (FSMAC) protocol wireless sensor networks

    Publication Year: 2005, Page(s):37 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1888 KB) | HTML iconHTML

    Security for wireless sensor networks (WSNs) is becoming an increasingly important issue in recent years. However, current works on media access control (MAC) protocols in WSNs mainly concentrate on balancing the efficiency and fairness of common channel access. Without proper security mechanisms, WSNs will be confined to limited and controlled environments, as well as negate numerous promises the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal change detection in sensor networks with artificial neural network structure

    Publication Year: 2005, Page(s):44 - 51
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    The paper describes a design and implementation of a novel intelligent sensor network protocol enhancing reliability and security by detecting a change in sensor signals. The change could be caused by the sensor or communication unit malfunctioning or by malicious altering of a measurement result. The protocol utilizes a neural network function prediction methodology to predict sensor outputs in o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event detection in wireless sensor networks using fuzzy logic system

    Publication Year: 2005, Page(s):52 - 55
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    Wireless sensor networks (WSN) are designed to monitor physical phenomena. The main task of WSN is to perform event detection, tracking, and classification. So, compared with traditional ad-hoc networks, WSN is event-centric. Therefore, an important question in WSN is to detect events. In this paper, we present two methods to do event detection, one is double sliding window detection, and the othe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Predicting biometric system failure

    Publication Year: 2005, Page(s):57 - 64
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2655 KB) | HTML iconHTML

    Object recognition (or classification) systems largely emphasize improving system performance and focus on their "positive" recognition (or classification). Few papers have addressed the prediction of recognition algorithm failures, even though it directly addresses a very relevant issue and can be very important in overall system design. This is the first paper to focus on predicting the failure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-modal multi-paradigm agent-based approach to design scalable distributed biometric systems

    Publication Year: 2005, Page(s):65 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1778 KB) | HTML iconHTML

    This paper presents an innovative approach to design advanced biometric systems for person identification, recognition and monitoring, with high level of privacy. The original aspect consists of a modular, structured design approach at system level, based on the use of distributed systems, multi-agent architectures, multiple computing paradigms, and adaptable/evolvable techniques, which allow for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-based knowledge integration for operational decision support in network-centric environment

    Publication Year: 2005, Page(s):71 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1971 KB) | HTML iconHTML

    The paper discusses a methodology for integration of heterogeneous knowledge to support an operational decision making during coalition operations in a network-centric environment. The methodology is based on managing context of two types: abstract and operational. The former is structured knowledge relevant to a task (problem) or a situation, the latter is an instantiation of the abstract context... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy deployment for wireless sensor networks

    Publication Year: 2005, Page(s):79 - 83
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1114 KB) | HTML iconHTML

    In this paper, we are concerned with developing a fuzzy deployment for wireless sensor networks. Traditional deployments often assume a homogeneous environment, which ignores the effect of terrain profile and obstacles such as buildings, trees and so on. Nevertheless, in many applications, some areas need to be more critically monitored. All these factors are combined together through fuzzy logic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.