By Topic

Intelligent Systems, IEEE

Issue 5 • Date Sept.-Oct. 2014

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2404 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): c2 - 1
    Save to Project icon | Request Permissions | PDF file iconPDF (481 KB)  
    Freely Available from IEEE
  • From Artificial Intelligence to Cyborg Intelligence

    Page(s): 2 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (1176 KB)  
    Freely Available from IEEE
  • A Network Evolution Model for Chinese Traditional Acquaintance Networks

    Page(s): 5 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2111 KB)  

    The evolution model of Chinese traditional acquaintance relationship networks described in this article emphasizes individual heterogeneity and social culture. The model incorporates three distinct mechanisms that affect acquaintance network evolution and formation: heredity linking, variation linking, and similarity-based disconnection. The authors found that the degree distribution of Chinese traditional acquaintance networks is manifested in a piecewise approximation that combines a power-law form with an exponential cutoff and exponential distribution. Numerical results indicate that individuals maintaining a medium amount of connections far outweigh others, reflecting the characteristics of Guanxi-centered society. The formation of acquaintance relationship networks is greatly affected by the special Chinese kinship culture. The authors' findings are supported by sociological statistical conclusions and offer a rational explanation for the nature of Chinese kinship networks. Their work provides an adequate framework for further research on dynamic human complex behaviors such as epidemic spreading and rumor propagation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?

    Page(s): 14 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (848 KB)  

    Attack-defense models play an important role in the design of cybersecurity systems. Here, the authors review some traditional and prevailing attack-defense models along with their weaknesses. Then, they survey some recently proposed paradigm shifts to these models based on which more effective security strategies can be designed. Further, they provide some suggestions on how to adopt the new models, and present challenges that need to be addressed in this field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Intelligent Decision-Making Command and Control Agents: An Application to Air Defense

    Page(s): 22 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4218 KB)  

    The article is halfway between agent technology and the mathematical reasoning needed to model tactical decision-making tasks. These models are applied to the air defense domain for command and control (C2). The article also addresses the issues related to evaluating agents, which are designed and implemented using the agent-programming paradigm. The agents are deployed in a simulated environment for performing C2 tasks, such as electronic counter-countermeasures, threat assessment, and weapon allocation. The simulated defense system runs without any human intervention and represents a state-of-the-art model for C2 autonomy. The use of agents as autonomous decision-making entities is particularly useful in view of futuristic network-centric warfare. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IEEE 1857 Standard: Empowering Smart Video Surveillance Systems

    Page(s): 30 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3455 KB)  

    The IEEE 1857 Standard for Advanced Audio and Video Coding was released as IEEE 1857-2013 in June 2013. Despite consisting of several different groups, the most significant feature of IEEE 1857-2013 is its Surveillance Groups, which can not only achieve at least twice the coding efficiency on surveillance videos as H.264/AVC High Profile, but it's the most analysis-friendly video coding standard. This article presents an overview of IEEE 1857 Surveillance Groups, highlighting background model-based coding technology and analysis-friendly functionalities. IEEE 1857-2013 will present new opportunities and drive research in smart video surveillance communities and industries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Word Association to Detect Multitopic Structures in Text Documents

    Page(s): 40 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1249 KB)  

    A new method for detecting multitopic structures in text documents, called Associative Gravity, is based on a text-mining method entitled CIMAWA, which imitates the human ability of word association. Specifically, Associative Gravity utilizes word association to detect different topics in a text. The authors named it Associative Gravity because of its resemblance to the physical law of gravitation, that is, mass and attraction. The mass corresponds to the importance of words in a text and the attraction to the asymmetrical associative word space. The innovative characteristic of the described topic detection method is supplied with asymmetrical associative word space provided by CIMAWA. A comparative case study proves the capability of Associative Gravity to separate different topics at very high accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society [Advertisement]

    Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Characterizing the Evolution of Social Computing Research

    Page(s): 48 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3828 KB)  

    With Web 2.0 advances, social computing has become an emerging research field in the past decade. This article analyzes the characteristics of social computing research from both static and dynamic perspectives. First, the authors present the overlapping relationships of content represented by keywords as of 2011. Next, they show the dynamics of social computing research through analyzing keyword trends and topological evolution of co-word networks. The article characterizes the key features and the evolution of social computing from a quantitative perspective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Negotiation Game

    Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1106 KB)  

    In this paper, the authors consider some of the main ideas underpinning attempts to build automated negotiators--computer programs that can effectively negotiate on our behalf. If we want to build programs that will negotiate on our behalf in some domain, then we must first define the negotiation domain and the negotiation protocol. Defining the negotiation domain simply means identifying the space of possible agreements that could be acceptable in practice. The negotiation protocol then defines the rules under which negotiation will proceed, including a rule that determines when agreement has been reached, and what will happen if the participants fail to reach agreement. One important insight is that we can view negotiation as a game, in the sense of game theory: for any given negotiation domain and protocol, negotiating agents have available to them a range of different negotiation strategies, which will result in different outcomes, and hence different benefits to them. An agent will desire to choose a negotiation strategy that will yield the best outcome for itself, but must take into account that other agents will be trying to do the same. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Man versus Machine or Man + Machine?

    Page(s): 62 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3915 KB)  

    Allocating roles and functions between the human and computer is critical in defining efficient and effective system architectures. However, past methodologies for balancing the roles and functionalities between humans and computers in complex systems have little connection to different types of required cognition, behaviors, or tasks, or don't address the role of uncertainty in the environment. To augment these previous role allocation approaches, this article presents a modification to the skill, rule, and knowledge-based behavior taxonomy that includes expertise and uncertainty. Skill-based behaviors are the best candidates for automation, assuming significant sensor performance assumptions can be met, but rule and knowledge-based reasoning are better suited for human-computer collaboration. Such systems should be designed so that humans harness the raw computational and search power of computers for state-space reduction, but also allow them the latitude to apply their expertise in uncertain situations through inductive reasoning for potentially creative, out-of-the-box thinking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding AI and Crowdsourcing in the Big Data Lake

    Page(s): 70 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (484 KB)  

    Daniel E. O'Leary examines the notion of the Big Data Lake and contrasts it with decision support-based data warehouses. In addition, some of the risks of the emerging Lake concept that ultimately require data governance are analyzed. O'Leary investigates using different AI and crowdsourcing (human intelligence) applications in that lake in order to integrate disparate data sources, facilitate master data management and analyze data quality. Although data governance often is not seen as a technology issue, it is seen as a critical component of making the Big Data Lake "work". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient and Swarm Intelligence-Based Routing Protocol for Next-Generation Sensor Networks

    Page(s): 74 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (879 KB)  

    After providing a brief overview of routing protocols for next-generation sensor networks (NGSNs), the authors propose Bee-Sensor-C, an energy-efficient, swarm intelligence-based, and scalable multipath routing protocol that integrates dynamic clustering, multipath routing, and bee-inspired routing to meet the performance requirements of NGSNs. A performance evaluation is also provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordination Infrastructures for Future Smart Social Mobility Services

    Page(s): 78 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1925 KB)  

    In this article, the authors introduce the vision of smart social mobility services, noting that widespread deployment will require the identification and implementation of a general-purpose coordination infrastructure to support the effective realization of such services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rock Stars of 3D Printing [Advertisement]

    Page(s): 83
    Save to Project icon | Request Permissions | PDF file iconPDF (1626 KB)  
    Freely Available from IEEE
  • Computational Social Science for the World Wide Web

    Page(s): 84 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (950 KB)  

    In introducing the field of computational social science to the intelligent systems community, the authors discuss how this field can help advance the current state of understanding and engineering social-computational systems on the World Wide Web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2015 Richard E. Merwin Distinguished Service Award [call for award nominations]

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (6473 KB)  
    Freely Available from IEEE
  • Intelect [Advertisement]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (1354 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona