Mathematical Problems in Engineering

Selected Papers from the 7th International Conference on Computational Intelligence and Security (CIS'2011)


Publishing date
12 Oct 2012
Status
Published
Submission deadline
13 Apr 2012

Lead Editor

1School of Computer Science and Technology, Xidian University, Xi'an 710071, China

2Department of Computer Science, Hong Kong Baptist University, Hong Kong

3Department of Mathematics, Southern Illinois University, 1245 Lincoln Drive, Carbondale, IL, USA


Selected Papers from the 7th International Conference on Computational Intelligence and Security (CIS'2011)

Description

With the fast development of computer science and technology, more and more web-based applications of computational intelligence are faced with security and trusted problems, and more and more security and trusted problems need computational intelligent techniques to solve. It has been a necessary and urgent task to cross-fertilize ideas and integrate the techniques of these two important fields: computational intelligence (CI) and information security (IS).

International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers, and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms, and technologies to IS. The 7th International Conference on Computational Intelligence and Security (CIS'2011) (http://www.cis-lab.org/) will be held in Sanya, Hainan, China, on December 3-4, 2011. This special issue will select a part of extended and revised full-length high-quality papers from CIS2011. We invite potential authors to contribute original research as well as review articles to our conference. Potential topics include, but are not limited to:

  • Genetic algorithms and applications
  • Particle swarm optimization and applications
  • Optimization methods with applications in engineering
  • Mathematical modeling and algorithms in machine learning
  • Mathematical modeling and algorithms in fuzzy systems
  • Mathematical modeling and algorithms in neural networks
  • Mathematical methods in data mining
  • Mathematical methods in data mining

Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://www.hindawi.com/journals/mpe/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/ according to the following timetable:


Articles

  • Special Issue
  • - Volume 2012
  • - Article ID 839154
  • - Editorial

Selected Papers from the 7th International Conference on Computational Intelligence and Security (CIS'2011)

Yuping Wang | Yiu-ming Cheung | ... | Mingqing Xiao
  • Special Issue
  • - Volume 2012
  • - Article ID 641361
  • - Research Article

Service Selection of Ensuring Transactional Reliability and QoS for Web Service Composition

Guojun Zhang | Liping Chen | Weitao Ha
  • Special Issue
  • - Volume 2012
  • - Article ID 310328
  • - Research Article

FACC: A Novel Finite Automaton Based on Cloud Computing for the Multiple Longest Common Subsequences Search

Yanni Li | Yuping Wang | Liang Bao
  • Special Issue
  • - Volume 2012
  • - Article ID 471952
  • - Research Article

An Evolutionary Algorithm for Solving Bilevel Programming Problems Using Duality Conditions

Hecheng Li | Lei Fang
  • Special Issue
  • - Volume 2012
  • - Article ID 524809
  • - Research Article

Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality

Gengui Zhou | Yuxiang Yang | Jian Cao
  • Special Issue
  • - Volume 2012
  • - Article ID 852161
  • - Research Article

Adaptive Neural Control for a Class of Outputs Time-Delay Nonlinear Systems

Ruliang Wang | Jie Li
  • Special Issue
  • - Volume 2012
  • - Article ID 807656
  • - Research Article

A Recurrent Neural Network for Nonlinear Fractional Programming

Quan-Ju Zhang | Xiao Qing Lu
  • Special Issue
  • - Volume 2012
  • - Article ID 601295
  • - Research Article

An Emotional Agent Model Based on Granular Computing

Jun Hu | Chun Guan
  • Special Issue
  • - Volume 2012
  • - Article ID 542501
  • - Research Article

DynaView: General Dynamic Visualization Model for SHM

Peng Sun | Ziyan Wu | ... | Muning Kang
  • Special Issue
  • - Volume 2012
  • - Article ID 534743
  • - Research Article

Cluster Synchronization for Linearly Coupled Complex Networks with Identical and Nonidentical Nodes

Yi Zhao | Jianwen Feng | Jingyi Wang
Mathematical Problems in Engineering
 Journal metrics
Acceptance rate28%
Submission to final decision78 days
Acceptance to publication40 days
CiteScore1.130
Impact Factor1.179
 Submit

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19.