Mathematical Problems in Engineering

Selected Papers from the 8th International Conference on Computational Intelligence and Security (CIS2012)


Publishing date
10 May 2013
Status
Published
Submission deadline
21 Dec 2012

Lead Editor

1School of Computer Science and Technology, Xidian University, Xi'an 710071, China

2Department of Computer Science, Hong Kong Baptist University, Hong Kong

3School of Computer Science and Information Technology, Royal Melbourne Institute of Technology (RMIT University), Melbourne, VIC 3000, Australia

4School of Applied Mathematics, Guangdong University of Technology, Guangzhou, China


Selected Papers from the 8th International Conference on Computational Intelligence and Security (CIS2012)

Description

With the fast development of computer science and technology, more and more web-based applications of computational intelligence are faced with security and trusted problems, and more and more security and trusted problems need computational intelligent techniques to solve them. It has been a necessary and urgent task to cross-fertilize ideas and integrate the techniques of these two important fields: computational intelligence (CI) and information security (IS).

International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers, and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms, and technologies to IS. The 8th International Conference on Computational Intelligence and Security (CIS2012) will be held in Guangzhou, China, on November 17-18, 2012 http://www.cis-lab.org/cis2012/. This special issue will select a part of extended and revised full-length high-quality papers from CIS2012. We invite potential authors to contribute original research as well as review articles to our conference. Potential topics include, but are not limited to:

  • Neural networks and genetic algorithms and applications
  • Particle swarm optimization and applications
  • Optimization methods with applications in engineering
  • Mathematical modeling and algorithms in machine learning
  • Mathematical modeling and algorithms in fuzzy systems
  • Mathematical modeling and algorithms in neural networks
  • Mathematical methods in data mining
  • Mathematical methods in information security
  • Artificial intelligence and pattern recognition

Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://www.hindawi.com/journals/mpe/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/mpe/ciaa/ according to the following timetable:


Articles

  • Special Issue
  • - Volume 2013
  • - Article ID 136450
  • - Editorial

Selected Papers from the 8th International Conference on Computational Intelligence and Security (CIS2012)

Yuping Wang | Yiu-ming Cheung | ... | Hailin Liu
  • Special Issue
  • - Volume 2013
  • - Article ID 321387
  • - Research Article

Estimation of Open Boundary Conditions Based on an Isopycnic-Coordinate Internal Tidal Model with Adjoint Assimilation Method

Yanqiu Gao | Guangzhen Jin | ... | Xianqing Lv
  • Special Issue
  • - Volume 2013
  • - Article ID 605409
  • - Research Article

Nonlocal Adaptive Image Denoising Model

Xiaoli Sun | Chen Xu | Min Li
  • Special Issue
  • - Volume 2013
  • - Article ID 179489
  • - Research Article

Estimation of Large Scalings in Images Based on Multilayer Pseudopolar Fractional Fourier Transform

Zhenhong Li | Jianwei Yang | ... | Rushi Lan
  • Special Issue
  • - Volume 2013
  • - Article ID 432686
  • - Research Article

Minimum Cost Multicast Routing Using Ant Colony Optimization Algorithm

Xiao-Min Hu | Jun Zhang
  • Special Issue
  • - Volume 2013
  • - Article ID 584909
  • - Research Article

Using Objective Clustering for Solving Many-Objective Optimization Problems

Xiaofang Guo | Yuping Wang | Xiaoli Wang
  • Special Issue
  • - Volume 2013
  • - Article ID 406143
  • - Research Article

A Resource Allocation Evolutionary Algorithm for OFDM Based on Karush-Kuhn-Tucker Conditions

Hai-Lin Liu | Qiang Wang
  • Special Issue
  • - Volume 2013
  • - Article ID 402438
  • - Research Article

Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer

Ying Cao | Qiguang Miao | ... | Weisheng Li
  • Special Issue
  • - Volume 2013
  • - Article ID 810969
  • - Research Article

An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

Changji Wang | Jianfa Luo
Mathematical Problems in Engineering
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision118 days
Acceptance to publication28 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.