By Topic

Computational Intelligence Magazine, IEEE

Issue 1 • Date Feb. 2011

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (763 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (243 KB)  
    Freely Available from IEEE
  • Welcoming the Year of the Rabbit! [Editor's Remarks]

    Publication Year: 2011 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (2664 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IEEE CIS VP-Members Activities Vision Statement [Society Briefs]

    Publication Year: 2011 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • 2011 IEEE CIS Awards [Society Briefs]

    Publication Year: 2011 , Page(s): 5 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (304 KB)  
    Freely Available from IEEE
  • [CIS Publication Spotlight]

    Publication Year: 2011 , Page(s): 11 - 16
    Save to Project icon | Request Permissions | PDF file iconPDF (152 KB)  
    Freely Available from IEEE
  • Interview with Editor-in-Chief of IEEE Transactions on Fuzzy Systems [Career Profile]

    Publication Year: 2011 , Page(s): 12 - 16
    Save to Project icon | Request Permissions | PDF file iconPDF (818 KB)  
    Freely Available from IEEE
  • 2010 IEEE World Congress on Computational Intelligence (2010 IEEE WCCI) [Conference Report]

    Publication Year: 2011 , Page(s): 17 - 19
    Save to Project icon | Request Permissions | PDF file iconPDF (1138 KB)  
    Freely Available from IEEE
  • Computational Intelligence Applications for Defense [Research Frontier]

    Publication Year: 2011 , Page(s): 20 - 29
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3057 KB) |  | HTML iconHTML  

    Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats. The purpose of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational Red Teaming: Past, Present and Future

    Publication Year: 2011 , Page(s): 30 - 42
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2588 KB) |  | HTML iconHTML  

    The combination of Computational Intelligence (CI) techniques "with Multi-Agent Systems (MAS) offers a great deal of opportunities for practitioners and Artificial Intelligence (AI) researchers alike. CI techniques provide the means to search massive spaces quickly; find possible, better or optimum solutions in these spaces; construct algorithms, functions and strategies to control an autonomous e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous Self-Reconfiguration of Modular Robots by Evolving a Hierarchical Mechanochemical Model

    Publication Year: 2011 , Page(s): 43 - 54
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5371 KB) |  | HTML iconHTML  

    In this paper, we present a two-layer hierarchical mechanochemical model for self-reconfiguration of modular robots in changing environments. The model, which is inspired by the embryonic development of multi-cellular organisms and chemical morphogenesis, can autonomously generate and form different patterns for modular robots to adapt to environmental changes. Layer 1 of the model utilizes a virt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mission-Driven Robotic Intelligent Sensor Agents for Territorial Security

    Publication Year: 2011 , Page(s): 55 - 67
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2176 KB) |  | HTML iconHTML  

    Territorial security deals with the prevention, detection and response to unauthorized persons and/or goods from crossing a perimeter. It deals with large territories of strategic importance, such as international borders, transportation and critical infrastructure. Multi-agent systems provide flexibility, fault-tolerance, high sensing fidelity, low-cost and rapid deployment. In this paper, we con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling Chaos: Suppression, Synchronization and Chaotification (Zhang, H., et al; 2009) [Book Review]

    Publication Year: 2011 , Page(s): 68 - 69
    Save to Project icon | Request Permissions | PDF file iconPDF (514 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • [Conference Calendar]

    Publication Year: 2011 , Page(s): 70
    Save to Project icon | Request Permissions | PDF file iconPDF (302 KB)  
    Freely Available from IEEE
  • 2012 IEEE WCCI

    Publication Year: 2011 , Page(s): 71
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications, in keeping with the Field of Interest of the IEEE Computational Intelligence Society (IEEE/CIS). 

Full Aims & Scope