By Topic

IEEE Computational Intelligence Magazine

Issue 1 • Date Feb. 2014

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (886 KB)
    Freely Available from IEEE
  • WCCI 2014

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (2349 KB)
    Freely Available from IEEE
  • [Table of contents]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (381 KB)
    Freely Available from IEEE
  • CIM Editorial Board

    Publication Year: 2014, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (222 KB)
    Freely Available from IEEE
  • Message from the New Editor-in-Chief [Editor's Remarks]

    Publication Year: 2014, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (222 KB) | HTML iconHTML
    Freely Available from IEEE
  • [President's Message]

    Publication Year: 2014, Page(s):3 - 18
    Request permission for commercial reuse | PDF file iconPDF (223 KB) | HTML iconHTML
    Freely Available from IEEE
  • CIS Society Officers

    Publication Year: 2014, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • 2014 IEEE CIS Awards [Society Briefs]

    Publication Year: 2014, Page(s):4 - 9
    Request permission for commercial reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • IEEE CIS VP-Technical Activities Vision Statement [Society Briefs]

    Publication Year: 2014, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • VP-Conference Activities Vision Statement [Society Briefs]

    Publication Year: 2014, Page(s):10 - 18
    Request permission for commercial reuse | PDF file iconPDF (251 KB)
    Freely Available from IEEE
  • A tete-a-tete with Professor Xin Yao, President of the IEEE Computational Intelligence Society (CIS), 2014-2015 [Career Profile]

    Publication Year: 2014, Page(s):13 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Prof. Yao, a Professor of Computer Science at the University of Birmingham, UK, whose works have won numerous awards, has served in various executive positions in IEEE CIS and other organizations for many years. Growing up in Fuzhou, Fujian Province in Southeast China, Prof. Yao moved to Hefei in 1978 to attend university then to Beijing in 1982 for his Masters before returning to Hefei in 1985 to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIS Publication Spotlight [Publication Spotlight]

    Publication Year: 2014, Page(s):15 - 18
    Request permission for commercial reuse | PDF file iconPDF (290 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Report on Fuzz-IEEE 2013 [Conference Report]

    Publication Year: 2014, Page(s):17 - 18
    Request permission for commercial reuse | PDF file iconPDF (461 KB)
    Freely Available from IEEE
  • Computational Intelligence for Natural Language Processing [Guest Editorial]

    Publication Year: 2014, Page(s):19 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (167 KB) | HTML iconHTML
    Freely Available from IEEE
  • Frame-Based Detection of Opinion Holders and Topics: A Model and a Tool

    Publication Year: 2014, Page(s):20 - 30
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (859 KB) | HTML iconHTML

    Sentilo is a model and a tool to detect holders and topics of opinion sentences. Sentilo implements an approach based on the neo-Davidsonian assumption that events and situations are the primary entities for contextualizing opinions, which makes it able to distinguish holders, main topics, and sub-topics of an opinion. It uses a heuristic graph mining approach that relies on FRED, a machine reader... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media

    Publication Year: 2014, Page(s):31 - 43
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3066 KB) | HTML iconHTML

    There has been a rapid growth in the number of cybercrimes that cause tremendous financial loss to organizations. Recent studies reveal that cybercriminals tend to collaborate or even transact cyber-attack tools via the "dark markets" established in online social media. Accordingly, it presents unprecedented opportunities for researchers to tap into these underground cybercriminal communities to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Solving WCDMA Network Planning Using Iterative Power Control Scheme and Evolutionary Multiobjective Algorithm [Application Notes]

    Publication Year: 2014, Page(s):44 - 52
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    Due to the increasing demand for mobile radio services, 3G wireless network planning has been becoming one of the most important research f ields. 3G system, e.g. WCDMA, is based on Code Division Multiple Access [1], which is quite different from Time Division Multiple Access (TDMA) as used in 2G system.In the 3G network planning, not only are coverage, capacity and quality of the signal interrela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chaotic Theoretical Approach to ECG-Based Identity Recognition [Application Notes]

    Publication Year: 2014, Page(s):53 - 63
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2023 KB) | HTML iconHTML

    Sophisticated technologies realized from applying the idea of biometric identification are increasingly applied in the entrance security management system, private document protection, and security access control. Common biometric identification involves voice, attitude, keystroke, signature, iris, face, palm or finger prints, etc. Still, there are novel identification technologies based on the in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Conference Calendar]

    Publication Year: 2014, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (381 KB)
    Freely Available from IEEE
  • SSCI 2014

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1764 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications, in keeping with the Field of Interest of the IEEE Computational Intelligence Society (IEEE/CIS). 

Full Aims & Scope