Scheduled System Maintenance
On Thursday, July 20, IEEE Xplore will undergo scheduled maintenance from 1:00-3:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

IEEE Computational Intelligence Magazine

Issue 3 • Aug. 2012

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2160 KB)
    Freely Available from IEEE
  • 2013 IEEE International Conference on Fuzzy Systems

    Publication Year: 2012, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (4108 KB)
    Freely Available from IEEE
  • [Table of Contents]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (761 KB)
    Freely Available from IEEE
  • CIM Editorial Board

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (858 KB)
    Freely Available from IEEE
  • Type-2 Fuzzy Logic - Plodding on Steadily and Staying Relevant [Editor's Remarks]

    Publication Year: 2012, Page(s):2 - 8
    Request permission for commercial reuse | PDF file iconPDF (383 KB) | HTML iconHTML
    Freely Available from IEEE
  • Publish or Perish, but Where? [President's Message]

    Publication Year: 2012, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • CIS Society Officers

    Publication Year: 2012, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Student Member Activities: Learning, Networking, Volunteering [Society Briefs]

    Publication Year: 2012, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (662 KB)
    Freely Available from IEEE
  • A New Web Home for the IEEE CIS [Society Briefs]

    Publication Year: 2012, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (461 KB)
    Freely Available from IEEE
  • IEEE CIS Philippines Chapter Report [Family Corner]

    Publication Year: 2012, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (1032 KB)
    Freely Available from IEEE
  • CIS Publication Spotlight [Publication Spotlight]

    Publication Year: 2012, Page(s):11 - 12
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Congress on Evolutionary Computation

    Publication Year: 2012, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (1068 KB)
    Freely Available from IEEE
  • Towards the Wide Spread Use of Type-2 Fuzzy Logic Systems in Real World Applications

    Publication Year: 2012, Page(s):14 - 24
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6897 KB) | HTML iconHTML

    Real world applications are characterized by high levels of linguistic and numerical uncertainties. Since the inception of Fuzzy Logic Systems (FLSs), they have been applied with great success to numerous real world applications. The vast majority of FLSs so far have been traditional type-1 FLSs. However, type-1 FLSs cannot fully handle the high levels of uncertainties available in the vast majori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Type-2 Fuzzy Logic Filtering to Reduce Noise in Color Images

    Publication Year: 2012, Page(s):25 - 35
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5177 KB) | HTML iconHTML

    In this paper, we present a novel application of type-2 fuzzy logic to the design of an image processing operator called an impulse detector. The type-2 fuzzy logic based impulse detector can be used to guide impulse noise removal filters to significantly improve their filtering performance and enhance their output images. The design of the proposed impulse detector is based on two 3-input 1-outpu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges for Perceptual Computer Applications and How They Were Overcome

    Publication Year: 2012, Page(s):36 - 47
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2217 KB) | HTML iconHTML

    Perceptual Computing is a methodology of Computing with Words (CWW) to assist humans in making subjective judgments. This article introduces the Perceptual Computer (Per-C), our instantiation of Perceptual Computing. Per-C consists of three components: encoder, CWW engine and decoder. Perceptionswordsactivate the Per-C and are the Per-C output (along with data); so, it is possible for a human to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Type-2 Fuzzy Logic: Challenges and Misconceptions [Discussion Forum]

    Publication Year: 2012, Page(s):48 - 52
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    This material is based on contributions by a number of people including Janet Aisbett, Humberto Bustince, Oscar Castillo, Jonathan M. Garibaldi, Hani Hagras, Vladik Kreinovich, Jerry M. Mendel, Frank Rhee, Terry Rickard, Woei Wan Tan and Christian Wagner including notably discussions at a Panel Session at the 2011 IEEE Symposium on Advances in Type-2 Fuzzy Logic Systems organized by Garibaldi, Hag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Military Fleet Mix Computation and Analysis [Application Notes]

    Publication Year: 2012, Page(s):53 - 61
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB) | HTML iconHTML

    A major financial expense for any military is the acquisition, operation, and maintenance of vehicles such as ships [1] and aircraft [2]. For example, the U.S. Air Force estimates that the acquisition of the F-35 fighter aircraft will cost $156 million each [3], hence even slight improvements in fleet efficiency and/or effectiveness can save governments large amounts of money or, using the same bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolved to Win (Sipper, M.; 2011) [Book Review]

    Publication Year: 2012, Page(s):62 - 64
    Request permission for commercial reuse | PDF file iconPDF (191 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Conference Calendar]

    Publication Year: 2012, Page(s):63 - 64
    Request permission for commercial reuse | PDF file iconPDF (828 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications, in keeping with the Field of Interest of the IEEE Computational Intelligence Society (IEEE/CIS). 

Full Aims & Scope