Tuesday, March 8, 2016

Wessex Institute of Technology (WIT), a bottom-tier publisher, pays a lot of money to Scopus (= Scam-us) each year!

The Fake Index SCOPUS has been indexed the Fake Conferences
SCOPUS is a Bogus Index. We sent them email about the Scam Conferences of Wessex Institute of Technology but they did not reply. It is obvious that Wessex Institute pays a lot of money to the Scopus (or Scam-us)

Read this story
https://users.cg.tuwien.ac.at/wp/videa-reactions.html

and this
https://en.wikipedia.org/wiki/Wessex_Institute_of_Technology

and

https://www.researchgate.net/post/Dubious_conference_invitations_Just_spam_or_do_these_meetings_actually_take_place

There are a lot of voices on the web about how bogus and fake is the Wessex Institute of Technology

Wednesday, February 26, 2014

I recently made an inquiry to Jeffrey Beall (the Denver, USA librarian who runs a webpage where he slanders and insults about 500 publishing houses), whether he, Jeffrey Beall himself, has the ability to solve the simple math equation 5x+3 = 0.

From: http://iaria-highsci.blogspot.com 

I recently made an inquiry to Jeffrey Beall (the Denver, USA librarian who runs a webpage where he slanders and insults about 500 publishing houses), whether he, Jeffrey Beall himself, has the ability to solve the simple math equation 5x+3 = 0. 

Jeffrey Beall replied to my first email, that he has never studied even the simplest form of Math. Meaning that he doesn’t know what “equation” means (he has never even seen equations like 5x+3 = 0, 3x*x + 7x -4 =0 etc), neither does he know what “Derivative” or “Integral” mean. 

Jeffrey Beall told me that he has a Bachelor in Spanish and English language. This of course didn’t stop him blacklisting hundreds of houses that publish Math, Physics, Computer Science, Engineering, Economics, Biology, Chemistry, Earth Sciences, Space Science etc Journals. That from a man who isn’t even able to solve the simple equation 5x+3 = 0, and who doesn’t know what Derivative or Integral mean. 

Recently, Jeffrey Beall included in his “black list” an old, big Academic Publishing House, with several, historic Journals in Math, Physics, Computer Science, Engineering, Economics (some of which have been indexed in ISI and SCOPUS), and that because, according to Jeffrey Beal, they had copied the… Maxwell Equations from a 2007 article. 

Obviously, since Jeffrey Beall doesn’t know how to solve the equation 5x+3 = 0, and since he doesn’t know what Derivative and Integral mean, he has zero knowledge when it comes to Electricity or Physics and has never seen the Maxwell Equations (not even in their most basic form). 

As expected from somebody who is entirely clueless regarding even elementary Math and Physics, he considered the Maxwell Equations found in the Journal to be plagiarized… from a 2007 paper. 

With a Bachelor in Spanish and English in his CV, Jeffrey Beall passes judgment even to Medicine, Biology, Chemistry etc Journals and articles, while he is fully aware that he’s never attended a University course on which nucleotides make up the DNA molecule, he’s never heard what enzyme, catalysis, proteins etc are, and if one asks him what pH is, he’ll be completely ignorant. 

However, in his bizarre blog, this person has declared himself a critic of everyone and everything. He blacklists publishing houses (many of which having journals and conferences indexed in ISI, SCOPUS, Compendex, ACM etc), he includes stand-alone journals in “black lists”, slanders Editors-in-Chief, Authors etc. Of course he does all that selectively, following a certain logic of his, which will be analyzed below. 
In a later email that I sent him, I asked him to comment on why he includes a small publishing house in his black list because “they copied Maxwell’s Equations from a 2007 paper” (poor Jeffrey Beall doesn’t know that Maxwell’s Equations are taught in Universities’ first year elementary physics), while at the same time he excludes IEEE, who have over 85 SCIgen machine-generated fake conference papers published and indexed. 

(See: A 2013 scientometrics paper demonstrated that at least 85 SCIgen machine-generated papers have been published by IEEE. The Paper has been published in Springer Verlag:http://link.springer.com/article/10.1007%2Fs11192-012-0781-y 
Download the full paper from: 
http://hal.archives-ouvertes.fr/docs/00/71/35/55/PDF/0-FakeDetectionSci-Perso.pdf
He also didn’t respond to the question why he didn’t include Elsevier in his black list, who were revealed to have been publishing 6 Medical Journals between 2000 and 2005 with fake articles and studies, that were funded by pharmaceutical companies, in order to scientifically prove that their products were superior to their competitors’. See http://en.wikipedia.org/wiki/Elsevier 
or 
http://legacy.earlham.edu/~peters/fos/2009/05/elsevier-confirms-6-fake-journals-more.html 

In a third email I asked him where his moral and academic responsibility stands, since if due to him including some publishing houses in black lists, those houses reduce or cease their activity (due to his immoral slandering), hundreds of jobs will be lost and families will end up in the street. Naturally, despite my repeated emails, Jeffrey Beall never replied. 

There are also rumors on the internet that some publishing houses, like Hindawi and Elsevier, pay Jeffrey Beall on a yearly basis in order not to be included in his black list. This looks like heavy taxing that the publisher is asked to pay annually to Jeffrey Beall, and, as we’ll see below, part of this tax ends up in the Denver University funds. 

Actually, Hindawi was in Jeffrey Beall’s black list a year ago. Then, after negotiations, Jeffrey Beall placed them in a watching list (i.e. an “under observation” list), and eventually completely removed them. 

Just like Jeffrey Beall himself mentioned in his blog, Hindawi’s people visited him in Denver and offered him “explanations”. After that, Jeffrey Beall gradually removed Hindawi from his black list. 
Why, Mr. Jeffrey Beall, did you agree to meet with Hindawi’s representatives in your office in Denver, when Hindawi was black listed? What did you talk about, Mr. Jeffrey Beall? Hindawi, as mentioned on their website, has an annual turnover of $6 million. 

Couldn’t they use part of that money to pay off Jeffrey Beall? 

Furthermore, in his blog, Jeffrey Beall has posted a photo of Hindawi’s headquarters, which he calls “House of Spam”. So, Mr. Jeffrey Beall, why isn’t Hindawi in your black list, when among your fundamental black listing reasons, like you mention in your blog, is spam? 

Having read all that, you can draw your own conclusions on who Jeffrey Beall is and what his real motives behind his publishing house and scientific organization black listing blog are. Houses and Organizations that Jeffrey Beall calls “Predatory Publishers”. 

Maybe it’s time to talk about Predatory Librarians, Mr. Jeffrey Beall. About librarians who target Open Access Journals, especially because the open, online PDF policy deprives librarians (like Jeffrey Beall) from the possibility of receiving kickbacks from publishing houses. 

To those who are not aware, it is known that several publishing houses paid- and pay-off librarians (like Jeffrey Beall), in order to get their libraries to subscribe to those houses. 

Meaning that, in order for a certain University, Research Center, Company to buy some books or subscribe to some journals, it is common knowledge that librarians receive money under the table from the respective publishing houses. It is therefore natural and understandable for this kind of librarians (Jeffrey Beall, for instance) to fight Open Access Journals and Open Access Publishing Houses, since they 
a) lose their kickbacks, 
b) lose their power and influence in the library, as well as the University. 

I’ve saved all my email exchange with Jeffrey Beall, along with their headers/source code, and I will soon upload them to various websites. I need everyone’s help though, by sending me emails (to the email address found at the bottom) and exchanging information on Jeffrey Beall’s scandalous behavior. 

And one last question to Jeffrey Beall: How can a librarian WITHOUT a Ph.D. be an Assistant Professor at the University of Denver, Mr. Jeffrey Beall? 

Could it be that Jeffrey Beall bribed older professors, using the abundance of money that he is said to possess? 

Could it be that Jeffrey Beall threatened that if they don’t vote for him, he’ll include all journals where they have papers published in his black list, and slander them on the internet? 

Or is it that they were so much impressed by his research? Actually, Mr. Jeffrey Beall, what is your scientific research? Your scientific research as a “real scientist” that is, Mr. Jeffrey Beall. What publications do you have, besides slandering, insulting and discredit hundreds of scientific organizations and publishing houses? What do you teach at the University of Denver Mr. Jeffrey Beall? 

Is there really any course (real scientific course) that you can teach, Mr. Jeffrey Beall, besides calling publishing houses and scientific organizations “predatory”? 

 It doesn’t look like it, Mr. Jeffrey Beall. No matter how hard we looked, we didn’t find any courses taught by you at the University of Denver. 

Neither on your personal webpage, Mr. Jeffrey Beall, nor on your money-making blog, nor even on the University of Denver website is there any mention about courses taught by you. 

So, since you do absolutely no scientific research, and you don’t even teach pre-graduate or post-graduate students, what is your role at the University of Denver, Mr. Jeffrey Beall? 

Does the University of Denver pay you a salary, Mr. Jeffrey Beall, or do you pay the University to let you bear the title of Assistant Professor? 

A title that you really do not deserve, as you have no Ph.D., no actual research work and do no teaching whatsoever. It is a shame for the University of Denver to have professors like you, Jeffrey Beall. 

Or is running a blog that slanders everyone and everything considered scientific research? 

It most certainly is not, Mr. Jeffrey Beall. 

Could it be, however, an applied money-making project for you and your university, Mr. Jeffrey Beall? 

 (By the way, why should a small publishing house from some place in India, which cannot attract papers, nor editorial board members, from western universities, be in your black list Mr. Jeffrey Beall? In this case, you should also black list all non-US and non-European universities. Of course there exist first-rate universities, like Harvard, MIT, Berkeley, Cambridge. Should all other universities be in a black list? Is this your logic “Professor” Beall? Furthermore, you condemn any new publishing house, as it is natural for them to not have papers and not be indexed as soon as they launch, but has to deal with you, who, like a vulture, immediately includes them in your black list for those reasons.) 

I would greatly appreciate your response, Mr. Jeffrey Beal. And I would also appreciate feedback from anyone who agrees with me. My email is: profnico...@gmail.com 

My aim is to create a network of true scientists and expose “Professor”, “Academic Teacher” and, above all, “Researcher” Jeffrey Beall (this science jack-of-all-trades, who doesn’t know a first-degree algebraic equation, derivatives, integrals, elementary Physics and Chemistry laws, etc) 
Thank you 

http://iaria-highsci.blogspot.com 

SOURCE:   https://groups.google.com/forum/#!topic/soc.culture.austria/qQ57idWTPjQ

Tuesday, July 17, 2012

More and More complaints and feedback for the bogus Wessex Institute of Technology

From the site:

http://bogusconferences.blogspot.com/2009/12/spam-from-bogus-wessex-institute-of.html

A comment:
Scentific credibity of WIT conferences is close to zero. They are just for your money (unsually high fee with almost nothing in return, even hotel rates are higher than when you walk-in!!), and will accept and publish any junk. Shame on them

Another one:

I recently attended a Wessex Ins.Technology conference "Sustainable Tourism 2010" . Everything was too expensive. They charge you again and again with several ridiculous taxes. Wessex Institute of Technology is a big Scam and their conferences are absolutely bogus and fake.
I paid Registration Fee: €1380 and I heard
lectures of very bad quality, I think that somebody must inform the Police in UK about the scummy and repugnant Wessex Institute of Technology


Another one:

"I have been to two Wessex Institute conferences. Seeing the quality of the presentations my guess is that any abstract will be accepted. They are fairly lightweight conferences held in interesting places in the world. By attending the conferences I have made some interesting contacts. I have some extra publications that look OK, at least on the surface. The conferences are not academically rigorous, they are expensive, they are very small and they consequently do not have the leading scholars attending them. They do appeal to people who are trying to make their mark, because you do get a seemingly attractive publication (book chapter) out of them. It does seem to me that they are a money making ruse for the owner of the institute (Carlos Brebbia)that is succesful because of the academic imperative to publish. I won't go to another one. There are many more reputable conferences to choose from other than those put on by Wessex Institute."


See more:  

http://bogusconferences.blogspot.com/2009/12/spam-from-bogus-wessex-institute-of.html

Saturday, April 7, 2012

We would like to share with you this information with the "grimy" IEEE

Incredible: New Scandals from IEEE. The Bogus SCIRP company is growing rapidly with the continuous support of IEEE.

SCIRP Company, well-known for its fake journals, fake conferences and its continuous and disturbing SPAM is growing rapidly with the ethical support of IEEE.
Read the breaking news in our site only:

First of all, SCIRP is a commercial fake company and you can find several eponymous denunciations against SCIRP. For instance: http://www.jjj.de/fake-conf.html
Everyday, SCIRP send us emails inviting us to submit our papers to SCIRP journals and conferences. SCIRP is acommercial publishing house and has an absolutely money-oriented policy. Publications without review. Journal publications ("open-access") if and only if you are willing pay very high fees for their disreputable SCIRP journals. This is SCIRP.


On the other hand, IEEE plays a "theater" here. Α theater of the absurd.

According IEEE itself: IEEE removed 1100 Bogus Conference Proceedings from IEEEXpore (i.e. IEEE data base) (apparently they were fake IEEE conferences): http://www.ieee.org/conferences_events/conferences/publishing/author_form.html
This is written, this is declared in the www.ieee.org web server and not in a dubious blog, not in strange email.

So, it is an additional confession of IEEE. This time this confession does not include 1 or 2 bogus papers, but 1100 bogus conferences! Outrageous!

Among these fake conferences of 2009, 2010, 2011 that IEEEXplore erased are all the SCIRP conferences with the seal of IEEE.

On the other hand, IEEE continues selling its name and its logo to conferences of SCIRP of 2012 whereas IEEE removed the Proceedings of IEEE/SCIRP conferences from its data base (2011, 2010, 2009), because they contained fake, bogus, academically toxic papers.

These are the new incredible Scandals of IEEE and its grimy collaboration with SCIRP.

Indeed, the Bogus SCIRP company is growing rapidly with the continuous support of IEEE
What is the game and the role of IEEE for this imoral development.
Can IEEE explain?

Please, forward this information to everybody with reference to our blog
http://iaria-highsci.blogspot.com

We would like to share with you this information with the "grimy" IEEE

Incredible: New Scandals from IEEE. The Bogus SCIRP company is growing rapidly with the continuous support of IEEE.

SCIRP Company, well-known for its fake journals, fake conferences and its continuous and disturbing SPAM is growing rapidly with the ethical support of IEEE.
Read the breaking news in our site only:

First of all, SCIRP is a commercial fake company and you can find several eponymous denunciations against SCIRP. For instance: http://www.jjj.de/fake-conf.html
Everyday, SCIRP send us emails inviting us to submit our papers to SCIRP journals and conferences. SCIRP is acommercial publishing house and has an absolutely money-oriented policy. Publications without review. Journal publications ("open-access") if and only if you are willing pay very high fees for their disreputable SCIRP journals. This is SCIRP.


On the other hand, IEEE plays a "theater" here. Α theater of the absurd.

According IEEE itself: IEEE removed 1100 Bogus Conference Proceedings from IEEEXpore (i.e. IEEE data base) (apparently they were fake IEEE conferences): http://www.ieee.org/conferences_events/conferences/publishing/author_form.html
This is written, this is declared in the www.ieee.org web server and not in a dubious blog, not in strange email.

So, it is an additional confession of IEEE. This time this confession does not include 1 or 2 bogus papers, but 1100 bogus conferences! Outrageous!

Among these fake conferences of 2009, 2010, 2011 that IEEEXplore erased are all the SCIRP conferences with the seal of IEEE.

On the other hand, IEEE continues selling its name and its logo to conferences of SCIRP of 2012 whereas IEEE removed the Proceedings of IEEE/SCIRP conferences from its data base (2011, 2010, 2009), because they contained fake, bogus, academically toxic papers.

These are the new incredible Scandals of IEEE and its grimy collaboration with SCIRP.

Indeed, the Bogus SCIRP company is growing rapidly with the continuous support of IEEE
What is the game and the role of IEEE for this imoral development.
Can IEEE explain?

Please, forward this information to everybody with reference to our blog
http://iaria-highsci.blogspot.com

Thursday, December 22, 2011

We got this comment. What impressions! Please, read it!

"I have been to two Wessex Institute conferences. Seeing the quality of the presentations my guess is that any abstract will be accepted. They are fairly lightweight conferences held in interesting places in the world. By attending the conferences I have made some interesting contacts. I have some extra publications that look OK, at least on the surface. The conferences are not academically rigorous, they are expensive, they are very small and they consequently do not have the leading scholars attending them. They do appeal to people who are trying to make their mark, because you do get a seemingly attractive publication (book chapter) out of them. It does seem to me that they are a money making ruse for the owner of the institute (Carlos Brebbia)that is succesful because of the academic imperative to publish. I won't go to another one. There are many more reputable conferences to choose from other than those put on by Wessex Institute."

Please, check it
http://wessex-institute.blogspot.com/2011/03/spam-spam-spam-again-much-spam-from-wit.html?showComment=1324425153763#c4231486003706030039

Thursday, August 4, 2011

Also the Wessex Institute of Technology launches now fake pseudo-journals publishing garbage papers provided that you will pay their high fees

Also the Wessex Institute of Technology launches now fake pseudo-journals publishing garbage papers provided that you will pay their high fees (illegal money)
So, they spammed everybody with this advertizement about their ridiculous
International Journal of Safety and Security Engineering
which is a junk journal publishing rubbish articles of naive colleagues
that are willing to pay their high fees to have their paper to a fake journal

~ Forthcoming ~
Volume 1, Issue 2 of
The International Journal of Safety and Security Engineering

We found by google this information "The IEEE has in parallel many blogs attacking other publishers and other guys who organize conferences"

We found by google this information "The IEEE has in parallel many blogs attacking other publishers and other guys who organize conferences"
See here:
http://lowqualityconferences.blogspot.com/2011/08/aggressive-spam-from-ieee-in-our.html

Saturday, June 18, 2011

This web site is one more wound of fake conferences

This web site is one more wound of fake conferences

http://world-research-institute.org/conferences.html

They have spammed us repeatedly. I sent them a junk paper and they told that if I pay they would include it in IEEE Xplore Data Base (known for all of you of the fake SCIgen papers that publishes from time to time) . Unfortunately for them the IEEE Xplore is not an index.
They take advantage of the name of IEEE that they use in their conferences

A similar wound of junk conferences is the site of "promote research"

We asked by email the participants and we found the following common features
of both these wounds of junk publishing
1. Both send us so much spam
2. Both use the name of IEEE
3. Both have no real review
4. It seems that their conferences took place only in their 1st day only. The second and third day, they close the conferences rooms (saving money for the conference rooms' rental and for coffee-breaks, gala dinner) and send their people to excursions. From these excursions their conference organizers have an extra remarkable income.
5. They pay their royalties, commission to IEEE normally.
The IEEE headquarters and the Administration of these Bogus Publishers are happy.

Wednesday, March 9, 2011

Spam! Spam! Spam! Again much Spam from WIT and WIT press!! Fake Seminars! Fake Diplomas!

WIT Short Course on Floods and Debris Flow 2011


Organised By: Wessex Institute of Technology, UK

Course Presenters: Prof Daniele De Wrachien, Dr Antonella Frigerio, Dr Reinaldo Garcia, Prof Stefano Mambretti,
Dr Guido Mazza

Please find details of this 3-day short course by visiting our website at: http://www.wessex.ac.uk/floods-debris.html





Floods and debris flows are among the most destructive of all water related processes. They affect both rural and urban areas in a wide range of morphoclimatic environments and in recent years have attracted more and more attention from the scientific and professional communities and concern from the public due to the death toll they claim. The increased frequency of these natural hazards, coupled with climatic change predictions and urban development, suggests that they are set to worsen in the future.

Taking this into consideration, the objectives of the course are:

To provide basic understanding of floods and debris flows using the most advanced and up-to-date methodologies currently available

To improve capabilities for modelling debris and water floods in both rural and urban environments
To develop hazard maps based on model results
To assess risk and design prevention and mitigation measures
To use state-of-the-art mathematical models
Participants will gain a broad overview of global water related disasters, including risk assessment, development of hazard maps and design of prevention and mitigation measures.





Course registration is available via our website at http://www.wessex.ac.uk/floods-debris.html or contact the Course Secretariat directly by sending an email to jchantler@wessex.ac.uk

Please forward this information to anyone you feel may be interested or would benefit from this information. They can subscribe by e-mailing jchantler@wessex.ac.uk and putting 'Subscribe - Floods and Debris Flow' in the subject field.





Jane Chantler, Course Secretariat
Wessex Institute of Technology, Ashurst Lodge, Ashurst
Southampton, SO40 7AA
Telephone: 44 (0) 238 029 3223 Fax: 44 (0) 238 029 2853
Email: jchantler@wessex.ac.uk



Please note: We endeavour to e-mail you information relevant to your field. However, if you are now specialising in another field and wish to receive news relevant to this area, or if you no longer wish to be included in this list please email: database@wessex.ac.uk

FAKE CONFERENCES from Irene Moreno Millan, Conference Secretariat, Design and Nature 2010 Wessex Institute of Technology, Ashurst Lodge, Ashurst

http://fakeconferences.blogspot.com/2010/02/fake-conference-yes-or-no-i-think-yes.html

ACADEMIC SPAM from BOGUS: WESSEX INSTITUTE OF TECHNOLOGY

See also

fake Wessex Institute of Technology

Internet is full of protests against the

fake Wessex Institute of Technology


see for example

Monday, August 16, 2010

65 admin withdrawals

http://arxiv.org/new/withdrawals.aug.07.html


65 admin withdrawals

65 articles by a group of 14 authors have been withdrawn by the arXiv administration due to excessive reuse of text from articles by other authors. The withdrawn articles were submitted from late 2001 through mid 2007, mainly to gr-qc, and the vast majority (59) were submitted in 2005-2006. (See also this article for additional details.)

The 14 authors, and the number of withdrawn articles co-authored by each, are as follows:

40 M. Salti (Grad Student, METU, Ankara)
29 O. Aydogdu (Grad Student, METU, Ankara)
15 S. Aygun (Grad Student, 18 Mart Univ, Canakkale)
14 M. Korunur (Grad Student, Dicle Univ, Diyarbakir)
13 A. Havare (Assoc Prof., Mersin Univ, Icel)
13 I. Tarhan (Assoc. Prof., 18 Mart Univ, Canakkale)
10 M. Aygun (Grad Student, 18 Mart Univ, Canakkale)
7 H. Baysal (Assoc Prof., 18 Mart Univ, Canakkale)
5 I. Acikgoz (Professor, Dicle Univ, Diyarbakir)
4 I. Yilmaz (Professor, Dean, 18 Mart Univ, Canakkale)
3 F. Binbay (Assistant Prof., Dicle Univ, Diyarbakir)
3 N. Pirinccioglu (Grad Student, Dicle Univ, Diyarbakir)
3 T. Yetkin (Instructor with PhD, Mersin Univ, Icel)
1 C. Aktas (Grad Student, Math Dept, 18 Mart Univ, Canakkale)

Note 1: The name K. Sogut (Instructor with PhD, Mersin Univ, Icel), who has co-authored with others on the above list, was erroneously included in an earlier version of this list due to an arXiv administrative error. There are no known problems with arXiv.org articles co-authored by K. Sogut.

Note 2: The name T. Yetkin appears only in conjunction with senior co-authors who have a more systematically problematic record.


The 65 withdrawn articles are listed below (the author submissions remain available as earlier versions):

gr-qc/0110023 gr-qc/0207026 gr-qc/0502031 gr-qc/0502032 gr-qc/0502042
gr-qc/0502043 gr-qc/0502058 gr-qc/0502059 gr-qc/0502060 gr-qc/0502061
gr-qc/0505078 gr-qc/0505079 gr-qc/0506061 gr-qc/0506062 gr-qc/0506135
gr-qc/0508018 gr-qc/0509022 gr-qc/0509023 gr-qc/0509047 gr-qc/0509061
gr-qc/0510037 gr-qc/0510038 gr-qc/0510123 gr-qc/0511030 gr-qc/0511095
gr-qc/0512080 gr-qc/0601070 gr-qc/0601133 gr-qc/0601141 gr-qc/0602012
gr-qc/0602070 gr-qc/0603027 gr-qc/0603044 gr-qc/0603063 gr-qc/0603108
gr-qc/0606022 gr-qc/0606028 gr-qc/0606080 gr-qc/0607011 gr-qc/0607082
gr-qc/0607083 gr-qc/0607089 gr-qc/0607095 gr-qc/0607102 gr-qc/0607103
gr-qc/0607104 gr-qc/0607109 gr-qc/0607110 gr-qc/0607115 gr-qc/0607116
gr-qc/0607117 gr-qc/0607119 gr-qc/0607126 gr-qc/0608014 gr-qc/0608024
gr-qc/0608050 gr-qc/0608111 gr-qc/0609101 gr-qc/0611014 gr-qc/0612016
gr-qc/0702047 astro-ph/0505018 0704.0525 0705.2930 0707.1776

Monday, December 7, 2009

In some case of an election in the Delft University of Technology

NOVEMBER 2009:

In an Assistant Professor's election in the Delft University of Technology (The Netherlands), the main candidate had some publications in the WESSEX INSTITUTE OF TECHNOLOGY.
Then, the electors count these publications NEGATIVELY and punished the candidate by excluding him from the University.
Especially in the Netherlands the conferences and journals of Wessex Institute of Technology are considered as fake bogus conferences and fake bogus journals.

Thursday, December 3, 2009

New Protests against the ridiculus WESSEX INSTITUTE OF TECHNOLOGY

Journals, Conferences, and Referees, or why "modern" "professional"
Science is organized in a completely screwed up Victorian amateur way
----------------------------------------------------------------------------------------------------------

All science is organized around "journals"
and "conferences". In principle, the (laudable) goal
is to generate and disseminate scientific information to us all.
The decision about which articles and/or talks
get into which journals and conferences is made by
unbiased expert "referees". Sounds great, but let's examine how
this actually works in practice.

REFEREES
First of all, 80% of all referees are idiots and 100% are amateurs.
By "idiot" I mean, either way too lazy to do a good job, or incompetent,
or too biased due to some goofy agenda to judge the work unbiasedly
(in roughly descending order of frequency),
and in any of these cases, their effect is essentially that of tossing
a coin. In the remaining 20% of cases, let us say that the referee
is good and makes the right decision. In that case, the effect of any
one referee is a 60-40 biased coin toss. In that case, if you have
3 independent referees (which is common, although in some cases they
use fewer) the probability is .4^3 = .064 > 1/16 that a unanimous wrong
decision is made. Thus, you can publish essentially ANY garbage if you simply
keep re-submitting and have enough patience (and political skills
probably help, e.g. being friendly with editors).
Note that on average 1 out of every 16 garbage submissions
leads to a unanimous acceptance decision, so if you submit and re-submit
a total of up to 8 times, the probability is >50% you'll get it published.
It is considered unethical to keep resubmitting, and especially
unethical to submit simultaneously to more than 1 journal,
since these tactics overload the (already busted) system. This
ethical notion makes sense to me. Unfortunately there is essentially no way to
detect or (especially) enforce these ethics and I believe (and have
heard several scientists simply tell they do it and I should) these
unethical methods are simply standard methodology for many scientists.
Indeed I have encountered several cases where apparently somebody slipped up
in their tricks so that almost-verbatim copies of the SAME article
got published in more than 1 journal roughly at the same publication
time (which definitely is unethical; every published article is supposed to be
NEW original research, aside from articles that clearly are reviews).

On the other hand, if you wrote an excellent paper, then the probability
is still quite considerable that it will be rejected. Each
rejection or acceptance can easily require years due to the
presence of super-slow referees (remember, all referees
are amateurs, i.e. unpaid volunteer do-gooders with
zero accountability, indeed whose identities are kept secret!).
Indeed in maybe 50% of all submissions, the journal simply apparently
loses the paper (or something) and no rejection or acceptance ever comes
back to the author. Ever. You get a slip acknowledging receipt of the
article, but that is all you ever get.
Note the expected number of submissions for an excellent
paper before it gets accepted unanimously is 1/(.6^3) = 4.6. Thus
if you are ethical you could easily wait 10 years even before even being
able to publish an excellent paper. If you do not have the luck, patience,
organization (and political skills?) necessary for this - merely the
ethics - then you aren't going to be very successful at publishing
even if your science is superb.

The entire referee system is a non-working anachronism from the Victorian Age
of Noble Rich Dilettante Do-Gooders. It is sort of like the asinine
notions of "Amateurism" in athletics which are FINALLY being scrapped
(e.g. the Olympics) after over 100 years. As science became bigger and became
an enterprise of numerous professionals rather than few amateurs, this system
became incapable of doing the job, but everybody refused to admit it.
The resulting cost to society has been, and continues to be,
absolutely immense.

MERE ANECDOTES?
All the above numerical figures are based on my experience
as a professional scientist. However, my opponents could
attack them as merely my biased special anecdotal claims.
To respond to that, consider the following study [PLACE CITE HERE LATER]:
The authors of the study took 18 random already-published scientific
papers, changed the authors and titles, and sent them in to the
same journal as submissions, in all cases within a few years of
their publication date (thus the articles were still reasonably up to date).
Result: 16 of the 18 got rejected. (In 0 cases was the plagiarism detected.)
I think this study totally supports my "anecdotal" conclusions from my
personal experience, don't you? Case closed.

JOURNALS
Many are exceedingly overpriced. Often they adopt two-tier pricing systems
where "libraries" have to pay an enormous rate (such as $20000 per year
per journal!?) while certain individuals pay a far smaller rate
(otherwise none would buy it). This combined with the vast proliferation
of journals means few libraries can afford the cost. The result is the
failure of the whole mission of journals in the first place. The outrageous
prices (which also vary by vast amounts from journal to journal; Elsevier
and Kluwer journals have particularly outrageous prices) seem particularly
hard to understand since many scientist-authors now do their own
computer typesetting, and the editing and refereeing costs are usually
free (done by volunteer amateurs).

Many journals have reams of "for show" editors who are selected because
putting their names on the masthead makes the journal "look prestigious" -
but those "editors" actually do no work. Example: Turing Award Winner
and famous scientist Robert Tarjan told me he was a for-show editor
on numerous journals and he'd finally decided to tell them all to remove
his name - although he was primarily concentrating on getting the
journals which actually made him do work, to remove his name first!
If you send your submission to some of those prestigious "editors" you
can be in for an especially high probability your submission ends up in
limbo land - never accepted or rejected! (In my experience, this happened
100% of the time I submitted to a non-chief editor, since at that
young and naive stage in my life I had not realized that only the CHIEF
editor is for real and should actually be submitted to, despite
what the journal submission policy and masthead may say.)

CONFERENCES
Since journals are so screwed up (and they seem especially screwed up in
fast-growing fields such as Computer Science, as opposed to say, physics,
perhaps because everybody has been too rushed to get a semblance
of professionalism going) many subfields of science (especially
computer science) have instead become reliant on conferences. Conferences
usually have far shakier standards of "refereeing" than journals
(which already are pretty shaky!) and often lie by pretending to
have more refereeing than they in fact do have (in an effort to
appear more "prestigious").

Example: A too-typical "scientific" conference was VIDEA'95 organised by the
Wessex Institute of Technology. (VIDEA = "Visualization and
Intelligent Design in Engineering and Architecture", '95 is the
1995 incarnation.) The fact that in this case the emperor had no clothes was
exposed by Werner Purgathofer, Eduard Groeller, and Martin Feda
(Institute of Computer Graphics, Technical University of Vienna).
Previously, one of them had accepted the role of "member of the program
committee" for VIDEA'93 and noted that (a) he received exactly zero
abstracts and zero papers to review, and (b) was never informed about any
program committee meetings nor of any reviewing results.
So for VIDEA'95, these 3 generated and submitted 4 bogus papers with
varying degrees of hilarity (in one case the "call for papers"
was submitted AS a paper, in another they
"took a dictionary of information processing words and selected
randomly some 40 phrases from there and joined them together
to a fantastically technical sounding text."
All four were then "reviewed and provisionally accepted"!
Their conclusion was: "VIDEA accepts EVERYTHING!"
At that point the only remaining requirement for their 4 nonsense
papers to be published in the Elsevier proceedings ("high-quality books") was
that the authors pay a "registration fee" (these fees often are $600
per paper). Oho, now we see the motivation...

Wessex Institute of Technology also does 25 other conferences which
Purgathofer, Groeller, and Feda now suspect are also a joke.
Personally I think this kind of thing is quite typical of many of
the high-volume low-quality conferences out there.

At the other end of the scale, let us consider the
allegedly highest quality conferences out there, which in
Theoretical Computer Science means the SFOCS "Symposium
on Foundations of Computer Science" and STOC "Symposium on
Theory of Computing" annual conferences. I've heard a professional
computer scientist say "Journal publications do not matter.
Only FOCS and STOC papers matter." Careers can rest on publications
in these conferences, which supposedly have a high rejection rate, and
are refereed, thus assuring high quality. Oh? Really? Actually, for many
years, the only "refereeing" you'd get back was a number from 1 to 5,
as opposed to a referee's report. Indeed often this was condensed into 1 bit,
rather than 1 number! Oh yeah. We can be sure a lot of consideration went
into that. And indeed various well known completely wrong FOCS and STOC
papers were published, although it was much rarer for anybody to ADMIT that
(the first ever example I saw where it actually was admitted was again a
paper by the admirable Tarjan, who in the next conference published a
retraction [R.E. Tarjan, C.J. Van Wyk: Correction to ``A Linear-Time
Algorithm for Triangulating Simple Polygons''. SFOCS 1987 page 486]
perhaps in a failed effort to convince the rest of the conference
authors to be equally responsible - since apparently this was the first
such retraction in about 20 years of these conferences).

In fact, once when I was a referee and wrote a long referee report for a paper
I cared about, the editor (Valerie King) REFUSED even to GIVE
my report to the paper authors, saying "I don't want a report. I want a
number from 1 to 5." I then had to bypass her and send it to
them directly. I complained to the conference's editor-in-chief about this but
nothing came of it. Also, once, after my paper was rejected (this was
back when I was a grad student) with of course zero explanation, I
luckily managed to get some verbal explanation of the reason by
talking to a Committee Member. It was:
"Oh, well, somebody said this was all basically done before by Lovasz,
so we rejected it." So then I said "But - Lovasz was the professor who advised
me to submit this paper!" A typical scenario - the judgements
are based largely on vague rumors. Another amusing case demonstrating
the importance of being in the politically "in group" and the shallowness
of the acceptance considerations was by my friend Bruce Maggs.
He was in his advisor's (Leiserson, MIT) office one day.
Advisor: "Well Bruce, I just was at the Program Committee Meeting for SPAA and
there was considerable debate about whether to accept your paper. The going
was tough, but finally, I managed to ram it through. You are In."
Bruce: "That's great doc, and I appreciate it a lot. But... I never submitted
a paper."
Nowadays these 2 conferences actually do send back actual reports (sometimes)
although sometimes you still get nothing back, and more often than not
the reports are just 1 useless hastily written paragraph. Indeed
I recently submitted 3 papers to one of these conferences, result:
2 rejects and 1 accepted. I wrote to the editor saying in
all 3 cases the judgement should have been reversed(!)
documenting my reasons. I concluded the reasons for the errors were
a combination of stupidity, low quality, zero referee accountability, and
political biases both pro and con (e.g. in one case the single referee, whose
identity was obvious, found it very convenient for his career if my paper
criticizing a certain approach, would just vanish. In the case where
my paper which contained numerous errors and unsupportable hype,
was accepted, it was politically inconvenient for it to be rejected
for reasons of a similar but opposite kind.).

JUNKETS
As far as I can see, conferences are not good ways to disseminate
information. Often authors are forced to talk for 20 minutes at most -
and that is in the GOOD conferences like FOCS & STOC; in some
conferences I have seen time limits below 10 minutes. This is a joke.
In some conferences there are hundreds of such micro-talks. What percentage
are you going to get anything from?
One is supposed to fly 1000s of miles, consuming 100s of gallons
of irreplaceable petroleum (more than the annual per capita consumption
of average people in the world - each such flight is thus costing
some average world inhabitant over a year worth of the economic
benefits of gasoline) and the benefit that results is: a 10-minute talk??!
You get far more information by reading the paper in the proceedings
rather than seeing the talk.

This is the communication age: The telephone; internet; Email; computerized
search tools to find just the paper you need to find. In such an age,
it is scientifically and morally unsupportable to have most of
these conferences. The real reasons many of them exist is NOT their
scientific value, but
(a) insane holdovers from past ages,
(b) bean counting based promotion decisions causing pressure to "publish",
(c) opportunity by scientists to abuse their funders or employers to get
free junkets to faraway places in the guise of "working".
(d) The conference organizers pocket hefty fees (over $600 per participant
easily). The airlines and hoteliers are also happy of course...
Only people who should be unhappy are the granting agencies and employers
(and taxpayers), but they are manned by scientists who are in on the junkets
too, so they don't complain and the corrupt system cruises on.
There have been cases [e.g. the "Winter brain conference"]
where conferences held at ski resort areas have been
cancelled due to lack of snow. My colleague Kevin Lang actually witnessed
a medical conference at such a ski resort. Rather than giving their talks,
the MDs had pre-recorded the talks on videotapes (allegedly this allowed
them to present a better quality talk in less time, plus it got
recorded that way - sounds like a good idea I guess), and they then
played the videos at the lecturns. Lang witnessed a case where an
absent lecturer was lecturing via videotape-player to an empty room - while
all the MDs involved presumably cavorted on the ski slopes.

SCIENTIFIC CAREERS
Are often advanced or stalled by boards who mainly utilize
"bean counts" (publication counts) as their decision making tool,
as opposed to actually trying to READ one's papers (that would require
work). Thus the pressure to publish can be immense, leading
to a giant proliferation of garbage publications,
a trend toward more papers with fewer ideas, overloading of the busted system,
and encouraging non-ethics. I believe bean-count is anti-correlated to ethics.

The fact that most of these boards are mainly populated by coprolites
causes any consideration of the idea that maybe, just maybe, something
is screwed up about the current system of Journals, Conferences, Referees,
bean counts, Zero Accountability, and 100% Amateurism, to be dismissed. That
in turn prevents any reform of the system.

HOW TO FIX THE SYSTEM:
1. Referee anonymity and consequent lack of
accountability and responsibility has to be got rid of. Papers should be
placed on a web site like the xxx.lanl.gov site BUT submissions, and
comments, ref reports, and author responses to said reports,
and rejections, should non-eraseably accumulate
as attachments to it on the site. This also will make the tactic of
multiple unethical submissions, visible.
2. I think if anything the anonymity should work in the
other direction: refs should be named, author-identities should be
hidden from them.
3. Boards should actually (gasp!) read the scientist's work,
which I believe they do not do, in general. (There even have been cases
of scientists who enjoyed numerous promotions, including being granted
tenure, who in fact had zero publications, but listed a lot of fake
publications on their resumes. Evidently nobody actually went to the
journal "cites" in the resumes to actually read those "articles.")
If Boards plan to rely on bean counting, they could be replaced by
my (non-scientist) sister, for a lot cheaper! This could be
forced (or at least we could try) by making them make a report
public reviewing that work.
4. Boards generally should be forced to operate in a non-secret mode
(and all votes by them should be revealed vote-by-vote) and
the evaluations and salaries of those they judge have to be made public
so that info exists so that feedback and restoration-to-sanity
forces become a possibility to try to at least have the possibility to
get rid of incompetent board members, etc.

All my attempts to make 1-4 happen have been failures, however.
The whole way refereeing is run (amateur volunteerism with zero
responsibility) is a ludicrous way to run science.

The whole journal system is obsolete and massively overpriced
and fortunately may FINALLY be BEGINNING to collapse under its own weight,
being replaced by web sites. Note that web sites featuring a plethora
of unrefereed scientific papers actually in many ways have papers
of HIGHER quality than do refereed journals:
(a) the papers can be searched by computer to find what you want,
(b) they can include data and programs no journal would publish
(for space reasons)
(c) they could in future include actual software calculators, e.g.
the reader fills in the blank with a number and out pop more numbers...
(d) the cites could be implemented as hyperlinks (including cites
OF this paper by future papers, could be traversed both directions)
(e) accumulating positive and negative Comments and author Responses could
be attached, ultimately having a referee-like effect far more
accurate and severe than most actual refereeing ever is
(f) If the paper is bogus, this could eventually be revealed by an attached
Comment, preventing the paper from sitting around permanently as a trap
waiting to destroy the work of some poor gullible graduate student
or waste the time of some other reader.
Meanwhile conferences show no sign of slackening - to the contrary.

Wednesday, December 2, 2009

SPAM from Wessex Institute of Technology - A professional organization of fake confennces

SPAM from Wessex Institute of Technology
A professional organization of fake confennces
-----------------------------------------------
THIS IS THEIR SPAM


--------------------------------
Organised By: Wessex Institute of Technology, UK & University Politehnica di Bucharest, Romania Sponsored By: European Society of Agricultural Engineers, International Commission of Agricultural Engineering, WIT Transactions on Ecology and the Environment
View the conference website, which has full details about the conference objectives, topics and submission requirements at: http://www.wessex.ac.uk/irrigation2010rem3.html
Registration for Sustainable Irrigation 2010 is now open online via the conference website.
Participants who opt to have their paper permanently and openly accessible on the WIT Press eLibrary will receive a USB Flash Drive containing all the papers presented at previous conferences in the Sustainable Irrigation series.


Papers are published in the Transactions of the Wessex Institute of Technology and distributed throughout the world. In addition, they are archived in the Wessex Institute eLibrary where they are permanently and easily accessible to the international community.
Delegates attending Sustainable Irrigation 2010 will be invited to submit an extended version of their paper for publication in the International Journal of Sustainable Development and Planning, associated with the Wessex Institute of Technology.
Submit an abstract via the conference website: http://www.wessex.ac.uk/irrigation2010rem3.html or contact the Conference Secretariat below.


Irrigation management Irrigation modelling Irrigation systems and planning Re-use of water Economic incentives and instruments Groundwater resources Climate change effects Water trade International issues

Irene Moreno Millan, Conference Secretariat, Sustainable Irrigation 2010Wessex Institute of Technology, Ashurst Lodge, AshurstSouthampton, SO40 7AATelephone: 44 (0) 238 029 3223 Fax: 44 (0) 238 029 2853Email: imoreno@wessex.ac.uk
Please circulate this announcement to colleagues who may be interested in this conference. They can subscribe by e-mailing enquiries@wessex.ac.uk with 'Subscribe - Sustainable Irrigation 2010' as the subject line.

Please note: We endeavour to e-mail you information relevant to your field. However, if you are now specialising in another field and wish to receive news relevant to this area, or if you no longer wish to be included in this list please email: enquiries@wessex.ac.uk

SPAM from IEEE . It is a Shame!!!!

SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!
SPAM from IEEE . It is a Shame!!!!



IEEE Computational Intelligence Society Electronic LetterIssue 62, December 2009
Manager: Haibo He Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ 07030 USA hhe@stevens.edu http://www.ece.stevens-tech.edu/~hhe/ Tel: (201) 216-8057 Fax: (201) 216-8246
Submit your contributions at http://www.ci-eletter.org http://tiger.ece.stevens-tech.edu/EletterSubmission deadline for next issue: December 31, 2009 To become a member of the IEEE Computational Intelligence Society,please visit www.ieee-cis.org/join/
Contents
1. Career Opportunities 1.1 Information Technologist - Decision Algorithms 1.2 Post Doctoral Fellow Position Available in Meiji University, Japan
2. Bookshelf 2.1 Convergence and Knowledge Processing in Multi-Agent Systems 2.2 Applied Computational Intelligence: How to Create Value
3. Most Recent Issues of Journals 3.1 IEEE Transactions on Neural Networks, vol. 20, issue 11, 2009 3.2 IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, 2009 3.3 IEEE Transactions on Autonomous Mental Development, vol. 1, no. 2, 2009 3.4 IEEE Transactions on Information Forensics and Security, 2009 - Part I: Evoting Special Issue 3.5 IEEE Transactions on Information Forensics and Security, 2009 - Part II: Regular Issue
4. Conference Calendar and Call for Papers 4.1 CFP: 2010 IEEE World Congress on Computational Intelligence (IEEE WCCI 2010) 4.2 CFP: Regular and Special Session Contributions at IEEE WCCI 2010 4.3 CFP: Special Sessions at IPMU 2010 4.4 CFP: Special issue on Active learning & intrinsically motivated exploration at IEEE TAMD 4.5 CFP: Special Issue on Representations and Architectures for Cognitive Systems at IEEE TAMD 4.6 CFP: Special Session on Advanced Control of Electrical Machines for Automotive Applications at VPPC 2010 4.7 CFP: The International Symposium on Evolving Intelligent Systems (EIS 2010) 4.8 CFP: Special Issue on Evolutionary Neural Network at J. Intelligent & Fuzzy Systems 4.9 CFP: New Journal on Swarm Intelligence
=========================================================.

*********************************************************1. Career Opportunities *********************************************************.
1.1 Information Technologist - Decision AlgorithmsPosted by: Tammy Bradish (bradish@research.ge.com)Date submitted: Nov. 4th, 2009
Content:GE Global Research
Information Technologist Decision Algorithms
As part of the Computing and Decision Sciences Technology area at GE Global Research, the Industrial Artificial Intelligence Lab conducts research in the areas of Prognostics and Health Management, Optimization and Decision Support, Condition Based Maintenance and the development and application of computational algorithms. The lab has a 25-year heritage of developing AI based solutions for predicting and managing the behavior of GE complex engineering and financial assets. The lab is composed of scientists with backgrounds that span mechanical engineering, electrical engineering, computer science, mathematics and operations research. Members of the iAI lab hold 50+ patents, 450+ publications and are active in IEEE, AAAI, INFORMS, IAAI, SIAM, ACM, BISC, VDI and ASME.
As an Information Technologist Decision Algorithms in the Artificial Intelligence lab, you will develop algorithms and processes for reasoning, learning, modeling and optimizing industrial and financial data. You will assess current and future technology capabilities and needs in the area of Services Information Technology for the GE businesses, develop next-generation algorithms for equipment diagnostics/prognostics and decision aiding systems, prepare proposals for internal and external GE customers and Government Agencies as appropriate, and prepare and deliver technical presentations for GE management.
Qualifications include a Doctorate degree in Computer Science, Decision Sciences or related engineering field and at least 2 years academic and/or industrial experience in the area of applying artificial intelligence technologies to industrial applications.
For more information and to submit your resume for consideration, please visit www.ge.com/careers and enter 1106236 in the Job Number field on the Search Openings page. Equal Opportunity Employer.=========================================================1.2 Post Doctoral Fellow Position Available in Meiji University, JapanPosted by: Yoichi Hayashi (hayashiy@cs.meiji.ac.jp)Date submitted: Nov. 8th, 2009
Content:Professor Yoichi Hayashi of Meiji University, Dept. of Computer Science(Japan) is seeking 1-2 Post Doctoral Fellow in the area of ComputationalIntelligence or Soft Computing and related areas; Especially Neural NetworkRule Extraction researcher will be very welcome. The Main obligation is collaborative research with Professor Yoichi Hayashi. The current research focus is "Intelligent Data Mining by Neural Network Rule Extraction." However, other research theme is acceptable.
The maximum time period for the recruiting researcher(s) is two years, i.e., from April 1, 2010 to March 31, 2012. The salary is 230,000 Japanese Yen( about $2,550) per month. Besides, Meiji University will pay health insurance fee and unemployment insurance, if he or she works more than 26 hours per week. Standard work time will be formally 9:30-18:30 on weekdays. The working environment is excellent: the researcher(s) will be assigned to one area of my air-conditioned laboratory with high speed computers with Windows OS. Of course, the post-doctoral researcher has no obligation for teaching. If the researcher will present a paper in domestic, Meiji University will support two conference presentation travel fee for at most two times. Needless to say, good post doctoral researcher is always productive.
Any assististance for this program by recommending the suitable people through sending his/her CV and the corresponding publication list to Professor Yoichi Hayashi will be highly appreciated! The deadline of application is December 10, 2009. Finally, recommendation letter in English and Applicant's paper-based signature as well as the hard copy of photograph are mandatorily needed. Japanese language skill is not required. However, If he or she speaks Japanese, he or she earn more 96,000 Japanese Yen for 3 units lecture or experiment lecture (270 minutes per a week). Nevertheless, much publication will be expected. For your reference, the URL for applying the Post Doctoral Researcher in Meiji University is shown as follows: http://www.meiji.ac.jp/ken_jimu/postdoctor.html
The above document is almost written in Japanese, but CV has an English version. The Remaining document part will be written by Professor Yoichi Hayashi based on the applicant's CV and publication list.
This is very urgent recruitment by December 12,2009 arrival basis. Those who have interests should immediately contact to Professor Yoichi Hayashi:E-mail: hayashiy@cs.meiji.ac.jp TEL: +81-44-934-7475 FAX: +81-44-931-5161 Mailing address: Prof. Yoichi Hayashi Dept. of ComputerScience, Meiji University, Tama-ku, Kawasaki 214-8571, Japan =========================================================

*********************************************************2. Bookshelf *********************************************************.
2.1 Convergence and Knowledge Processing in Multi-Agent SystemsPosted by: Philippe De Wilde (p.de_wilde@hw.ac.uk)Date submitted: Nov. 4th, 2009
Content:Convergence and Knowledge Processing in Multi-Agent Systems, Maria Chli andPhilippe De Wilde, Springer, London, 2009. ISBN 978-1-84882-062-3.
"Could agent-based computer models prevent another financial crisis?", "Theeconomy needs agent-based modelling." were some of the headlines in Nature on6 August 2009. Multi-agent systems are excellent models for a range ofdistributed real-world problems such as trading in markets, schedulingproblems, or the spread of a virus. All these real-world systems are subjectto noise, and display stochastic behaviour. When they are simulated, oneobserves a lot of noise, and very little signal. This simulation-basedanalysis of complex systems has been severely criticised.
In this book, the authors develop a notion of stability from stochasticsystems and apply it to multi-agent systems. They show how to use this toanalyse the stability of multi-agent systems, and of the systems they model.There are special sections on business ecosystems, computer viruses,transportation of loads, diary planners, and market efficiency. A chapter isdevoted to queries, and how to improve their efficiency through collaboration.
This book is just a step towards understanding convergence and knowledgeprocessing in noisy multi-agent systems. It adds a few ideas that may justhelp minimise the impact of the next financial crisis...=========================================================2.2 Applied Computational Intelligence: How to Create ValuePosted by: Arthur Kordon (akordon@dow.com)Date submitted: Nov. 24th, 2009
Content:Applied Computational Intelligence: How to Create ValueArthur KordonSpringer Verlag, 481 pp., Hardcover, December 2009ISBN: 978-3-540-69910-1http://www.springer.com/978-3-540-69910-1
DESCRIPTIONThe flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods.
In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs.
The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research.
Table of Contents:Part I: Computational Intelligence for the MassesChapter 1: Computational vs. Artificial Intelligence.Chapter 2: A Roadmap Through the Computational Intelligence Maze.Chapter 3: Fuzzy Systems: Lets Get Fuzzy.Chapter 4: Machine Learning: The Ghost in the Learning Machine.Chapter 5. Evolutionary Computation: The Profitable Gene.Chapter 6: Swarm Intelligence: The Benefits of the Swarms.Chapter 7: Intelligent Agents: The Computer Intelligence Agency (CIA). Part II: Computational Intelligence Creates Value Chapter 8: Why We Need Intelligent Solutions?.Chapter 9: Competitive Advantages of Computational Intelligence.Chapter 10: Issues in Applying Computational Intelligence. Part III: Computational Intelligence Application StrategyChapter 11: Integrate & Conquer.Chapter 12: How to Apply Computational Intelligence?.Chapter 13: Computational Intelligence Marketing.Chapter 14: Examples of Computational Intelligence Industrial Applications. Part IV: The Future of Applied Computational IntelligenceChapter 15: Future Directions of Applied Computational IntelligenceGlossaryIndex
Arthur K. Kordon is a Data Mining and Modeling Leader in the Data Mining and Modeling Capability of The Dow Chemical Company. He is an internationally recognized expert in applying emerging technologies in industry, and has given talks and chaired panels on the topic at the major computational intelligence conferences such as WCCI and GECCO. He has successfully introduced several novel technologies for improved manufacturing and new product design in the chemical industry, and his research interests include application issues of computational intelligence, robust empirical modeling, intelligent process monitoring and control, and data mining.=========================================================

*********************************************************3. Most Recent Issues of Journals *********************************************************.
3.1 IEEE Transactions on Neural Networks, vol. 20, issue 11, 2009Posted by: Marios M. Polycarpou (ieeetnn@ucy.ac.cy)Date submitted: Nov. 30th, 2009
Content:The following articles appear in the latest issue of IEEE Transactions on Neural Networks; Volume 20, Issue 11, November 2009.
The articles can be retrieved on IEEE Xplore: http://ieeexplore.ieee.org/xpl/tocresult.jsp?isYear=2009&isnumber=5306478&Submit32=View+Contents or directly by clicking the individual paper URL below.
1. Title: Bounded Influence Support Vector Regression for Robust Single-Model EstimationAuthors: Dufrenois, F.; Colliez, J.; Hamad, D.Page(s): 1689-1706URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256161&isnumber=5306478
2. Title: A New Neuroadaptive Control Architecture for Nonlinear Uncertain Dynamical Systems: Beyond $sigma $- and $e$-ModificationsAuthors: Volyanskyy, K.Y.; Haddad, W.M.; Calise, A.J.Page(s): 1707-1723URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272372&isnumber=5306478
3. Title: Real-Time Robot Path Planning Based on a Modified Pulse-Coupled Neural Network ModelAuthors: Hong Qu; Yang, S.X.; Willms, A.R.; Zhang YiPage(s): 1724-1739URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256181&isnumber=5306478
4. Title: R-POPTVR: A Novel Reinforcement-Based POPTVR Fuzzy Neural Network for Pattern ClassificationAuthors: Wing-Cheong Wong; Siu-Yeung Cho; Chai QuekPage(s): 1740-1755URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5247017&isnumber=5306478
5. Title: Learning Gaussian Mixture Models With Entropy-Based CriteriaAuthors: Penalver Benavent, A.; Escolano Ruiz, F.; Saez, J.M.Page(s): 1756-1771URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5247027&isnumber=5306478
6. Title: Disparity Estimation by Pooling Evidence From Energy NeuronsAuthors: Tsang, E.K.C.; Shi, B.E.Page(s): 1772-1782URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272371&isnumber=5306478
7. Title: Variational Bayesian Mixture Model on a Subspace of Exponential Family DistributionsAuthors: Watanabe, K.; Akaho, S.; Omachi, S.; Okada, M.Page(s): 1783-1796URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5247016&isnumber=5306478
8. Title: Adachi-Like Chaotic Neural Networks Requiring Linear-Time Computations by Enforcing a Tree-Shaped TopologyAuthors: Ke Qin; Oommen, B.J.Page(s): 1797-1809URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272368&isnumber=5306478
9. Title: Nonorthogonal Approximate Joint Diagonalization With Well-Conditioned DiagonalizersAuthors: Guoxu Zhou; Shengli Xie; Zuyuan Yang; Jun ZhangPage(s): 1810-1819URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256202&isnumber=5306478
10. Title: Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace LearningAuthors: Haiping Lu; Plataniotis, K.N.; Venetsanopoulos, A.N.Page(s): 1820-1836URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272374&isnumber=5306478
11. Title: PSO-Based Cloning Template Design for CNN Associative MemoriesAuthors: Giaquinto, A.; Fornarelli, G.Page(s): 1837-1841URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5262979&isnumber=5306478
12. Title: Nontrivial Global Attractors in 2-D Multistable Attractor Neural NetworksAuthors: Lan Zou; Huajin Tang; Tan, K.C.; Weinian ZhangPage(s): 1842-1851URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5276807&isnumber=5306478=========================================================3.2 IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, 2009Posted by: Nikhil R. Pal (nikhil@isical.ac.in)Date submitted: Nov. 30th, 2009
Content:
1. Why Fuzzy Decision Trees are Good RankersAuthors: HAcellermeier, E.; Vanderlooy, S.Page(s): 1233-1244Digital Object Identifier 10.1109/TFUZZ.2009.2026640URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5159375&isnumber=5338640&tag=1
2. Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV SequencesAuthors: Jeon, G.; Anisetti, M.; Lee, J.; Bellandi, V.; Damiani, E.; Jeong, J.Page(s): 1245-1258Digital Object Identifier 10.1109/TFUZZ.2009.2026638URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5159369&isnumber=5338640
3. Fuzzy Regression Models Using the Least-Squares Method Based on the Concept of DistanceAuthors: Chen, L.-H.; Hsueh, C.-C.Page(s): 1259-1272Digital Object Identifier 10.1109/TFUZZ.2009.2026891 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5159470&isnumber=5338640
4. Building Confidence-Interval-Based Fuzzy Random Regression ModelsAuthors: Watada, J.; Wang, S.; Pedrycz, W.Page(s): 1273-1283Digital Object Identifier 10.1109/TFUZZ.2009.2028331 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5173567&isnumber=5338640
5. Polynomial Fuzzy Models for Nonlinear Control: A Taylor Series ApproachAuthors: Sala, A.; Arino, C.Page(s): 1284-1295Digital Object Identifier 10.1109/TFUZZ.2009.2029235URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5191124&isnumber=5338640
6. SOFMLS: Online Self-Organizing Fuzzy Modified Least-Squares NetworkAuthors: Rubio, J. D. J.Page(s): 1296-1309Digital Object Identifier 10.1109/TFUZZ.2009.2029569 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5196829&isnumber=5338640
7. A Design of Genetically Oriented Fuzzy Relation Neural Networks (FrNNs) Based on the Fuzzy Polynomial Inference SchemeAuthors: Park, B.; Pedrycz, W.; Oh, S.Page(s): 1310-1323Digital Object Identifier 10.1109/TFUZZ.2009.2030332 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5208195&isnumber=5338640
8. Robust Controllability of T-S Fuzzy-Model-Based Control Systems With Parametric UncertaintiesAuthors: Chen, S.; Ho, W.; Chou, J.Page(s): 1324-1335Digital Object Identifier 10.1109/TFUZZ.2009.2030670 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5210151&isnumber=5338640
9. Generalized Receding Horizon Control of Fuzzy Systems Based on Numerical Optimization AlgorithmAuthors: Song, C.; Ye, J.; Liu, D.; Kang, Q.Page(s): 1336-1352Digital Object Identifier 10.1109/TFUZZ.2009.2031560 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5232878&isnumber=5338640
10. Latticized Linear Optimization on the Unit IntervalAuthors: Li, P.; Fang, S-.C.Page(s): 1353-1365Digital Object Identifier 10.1109/TFUZZ.2009.2031561 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5232879&isnumber=5338640
11. Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation ModelAuthors: Dong, Y.; Xu, Y.; Yu, S.Page(s): 1366-1378Digital Object Identifier 10.1109/TFUZZ.2009.2032172 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5238626&isnumber=5338640
12. An Evolving Fuzzy Neural Network Based on the Mapping of SimilaritiesAuthors: Hernandez,; Castaneda, F. G.; Cadenas, JPage(s): 1379-1396Digital Object Identifier 10.1109/TFUZZ.2009.2032364 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5238537&isnumber=5338640
13. Perceptual Reasoning for Perceptual Computing: A Similarity-Based ApproachAuthors: Wu , D.; Mendel, J. M.Page(s): 1397-1411Digital Object Identifier 10.1109/TFUZZ.2009.2032652 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256232&isnumber=5338640
14. Weighted Fuzzy Interpolative Reasoning Based on Weighted Increment Transformation and Weighted Ratio Transformation TechniquesAuthors: Chen, S.; Ko, Y.; Chang, Y.; Pan, J.Page(s): 1412-1427Digital Object Identifier 10.1109/TFUZZ.2009.2032651 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256230&isnumber=5338640
15. Decentralized $H_{infty }$ Filter Design for Discrete-Time Interconnected Fuzzy SystemsAuthors: Zhang, H.; Dang, C.; Li, C.Page(s): 1428-1440Digital Object Identifier 10.1109/TFUZZ.2009.2033792 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5280326&isnumber=5338640
16. Relaxed ${cal H}_{infty }$ Stabilization Conditions for Discrete-Time Fuzzy Systems With Interval Time-Varying DelaysAuthors: Kim, S. H.; Park, P.Page(s): 1441-1449Digital Object Identifier 10.1109/TFUZZ.2009.2028016 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5169946&isnumber=5338640
17. On Stability and Stabilization of T-S Fuzzy Time-Delayed SystemsAuthors: Souza, F. O.; Mozelli, L. A.; Palhares, R. M.Page(s): 1450-1455Digital Object Identifier 10.1109/TFUZZ.2009.2032336 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5238534&isnumber=5338640
18. Are More Features Better? A Response to Attributes Reduction Using Fuzzy Rough SetsAuthors: Jensen, R.; Shen, Q.Page(s): 1456-1458Digital Object Identifier 10.1109/TFUZZ.2009.2026639 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5159373&isnumber=5338640=========================================================3.3 IEEE Transactions on Autonomous Mental Development, vol. 1, no. 2, 2009Posted by: Zhengyou Zhang (zhang@microsoft.com)Date submitted: Nov. 22nd, 2009
Content:IEEE Transactions on Autonomous Mental Development
Homepage with submission instructions: http://ieee-cis.org/pubs/tamd/Submission website: http://mc.manuscriptcentral.com/tamd-ieee
Volume: 1 Issue: 2 Date: August 2009Link: http://ieeexplore.ieee.org/xpl/tocresult.jsp?isYear=2009&isnumber=5290358
1. Default Network and Intelligence DifferenceAuthors: Ming Song; Yong Liu; Yuan Zhou; Kun Wang; Chunshui Yu; Tianzi JiangPage(s): 101-109Digital Object Identifier 10.1109/TAMD.2009.2029312
2. Connectionist Models of Reinforcement, Imitation, and Instruction in Learning to Solve Complex ProblemsAuthors: Dandurand, F.; Shultz, T.R. Page(s): 110-121 Digital Object Identifier 10.1109/TAMD.2009.2031234
3. Some Basic Principles of Developmental RoboticsAuthors: Stoytchev, A.Page(s): 122-130Digital Object Identifier 10.1109/TAMD.2009.2029989
4. Acquisition of the Head-Centered Peri-Personal Spatial Representation Found in VIP NeuronAuthors: Fuke, S.; Ogino, M.; Asada, M. Page(s): 131-140Digital Object Identifier 10.1109/TAMD.2009.2031013
5. Active Information Selection: Visual Attention Through the HandsAuthors: Chen Yu; Smith, L.B.; Hongwei Shen; Pereira, A.F.; Smith, T. Page(s): 141-151Digital Object Identifier 10.1109/TAMD.2009.2031513=========================================================3.4 IEEE Transactions on Information Forensics and Security, 2009 - Part I: Evoting Special IssuePosted by: Nasir D. Memon (memon@poly.edu)Date submitted: Nov. 30th, 2009
Content:1. Guest Editorial Special Issue on Electronic VotingAuthors: R. L. Rivest, D. Chaum, B. Preneel, A. D. Rubin, D. G. Saari, and P. L. VoraPage(s): 593 to 596Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5312771&isnumber=5312765
2. State-Wide Elections, Optical Scan Voting Systems, and the Pursuit of IntegrityAuthors: Antonyan, T.; Davtyan, S.; Kentros, S.; Kiayias, A.; Michel, L.; Nicolaou, N.; Russell, A.; Shvartsman, A. A.Page(s): 597-610Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272308&isnumber=5312765
3. Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation CodesAuthors: Chaum, D.; Carback, R. T.; Clark, J.; Essex, A.; Popoveniuc, S.; Rivest, R. L.; Ryan, P. Y. A.; Shen, E.; Sherman, A. T.; Vora, P. L.Page(s): 611-627Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5290135&isnumber=5312765
4. TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform ModulesAuthors: Fink, R. A.; Sherman, A. T.; Carback, R.Page(s): 628-637Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5290129&isnumber=5312765
5. Detecting Code Alteration by Creating a Temporary Memory BottleneckAuthors: Gardner, R. W.; Garera, S.; Rubin, A. D.Page(s): 638-650Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272307&isnumber=5312765
6. Development, Formal Verification, and Evaluation of an E-Voting System With VVPATAuthors: Villafiorita, A.; Weldemariam, K.; Tiella, R.Page(s): 651-661Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5290133&isnumber=5312765
7. Pret a Voter: a Voter-Verifiable Voting SystemAuthors: Ryan, P. Y. A.; Bismark, D.; Heather, J.; Schneider, S.; Xia, Z.Page(s): 662-673Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272310&isnumber=5312765
8. Voting With Unconditional Privacy by Merging Pret a Voter and PunchScanAuthors: van de Graaf, J.Page(s): 674-684Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282618&isnumber=5312765
9. Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV VotingAuthors: Benaloh, J.; Moran, T.; Naish, L.; Ramchen, K.; Teague, V.Page(s): 685-698Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282564&isnumber=5312765
10. The Effectiveness of Receipt-Based Attacks on ThreeBallotAuthors: Henry, K.; Stinson, D. R.; Sui, J.Page(s): 699-707Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5233854&isnumber=5312765
11. CAST: Canvass Audits by Sampling and TestingAuthors: Stark, P. B.Page(s): 708-717Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282621&isnumber=5312765
12. Straight-Party Voting: What Do Voters Think?Authors: Campbell, B. A.; Byrne, M. D.Page(s): 718-728Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256335&isnumber=5312765
13. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and SwitzerlandBy: Schryen, G.; Rich, E.Page(s): 729-744Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272405&isnumber=5312765
14. Enhancing Electronic Voting Machines on the Example of Bingo VotingBy: Bohli, J.-M.; Henrich, C.; Kempka, C.; Muller-Quade, J.; Rohrich, S.Page(s): 745-750Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282555&isnumber=5312765
15. IEEE Transactions on Information Forensics and Security EdicsPage(s): 751-751Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5337760&isnumber=5312765
16. IEEE Signal Processing Society InformationPage(s): C3-C3Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5337759&isnumber=5312765=========================================================3.5 IEEE Transactions on Information Forensics and Security, 2009 - Part II: Regular IssuePosted by: Nasir D. Memon (memon@poly.edu)Date submitted: Nov. 30th, 2009
Content:1. Free Electronic Access to SP PublicationsAuthors: Sayed, A. H.Page(s): 757-757Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5312769&isnumber=5312766
2. Joint Watermarking Scheme for Multiparty Multilevel DRM ArchitectureAuthors: Thomas, T.; Emmanuel, S.; Subramanyam, A. V.; Kankanhalli, M. S.Page(s): 758-767Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272486&isnumber=5312766
3. High-Rate Random-Like Spherical Fingerprinting Codes With Linear Decoding ComplexityAuthors: Jourdas, J.-F.; Moulin, P.Page(s): 768-780Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282599&isnumber=5312766
4. On the Security of the Secure Arithmetic CodeAuthors: Sun, H.-M.; Wang, K.-H.; Ting, W.-C.Page(s): 781-789Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256331&isnumber=5312766
5. Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation TechniquesAuthors: Chang, C.-C.; Lin, C.-C.; Le, T. H. N.; Le, H. B.Page(s): 790-801Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282615&isnumber=5312766
6. Robust Orientation Field Estimation and Extrapolation Using Semilocal Line SensorsAuthors: Gottschlich, C.; Mihailescu, P.; Munk, A.Page(s): 802-811 Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272292&isnumber=5312766
7. Parallelizing Iris RecognitionAuthors: Rakvic, R. N.; Ulis, B. J.; Broussard, R. P.; Ives, R. W.; Steiner, N.Page(s): 812-823Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256283&isnumber=5312766
8. Iris Segmentation Using Geodesic Active ContoursAuthors: Shah, S.; Ross, A.Page(s): 824-836Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272431&isnumber=5312766
9. Iris Recognition Using Signal-Level Fusion of Frames From VideoAuthors: Hollingsworth, K.; Peters, T.; Bowyer, K. W.; Flynn, P. J.Page(s): 837-848Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282565&isnumber=5312766
10. Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion AlgorithmsAuthors: Poh, N.; Bourlai, T.; Kittler, J.; Allano, L.; Alonso-Fernandez, F.; Ambekar, O.; Baker, J.; Dorizzi, B.; Fatukasi, O.; Fierrez, J.; Ganster, H.; Ortega-Garcia, J.; Maurer, D.; Salah, A. A.; Scheidat, T.; Vielhauer, C.Page(s): 849-866Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5290123&isnumber=5312766
11. Multibiometric Cryptosystem: Model Structure and Performance AnalysisAuthors: Fu, B.; Yang, S. X.; Li, J.; Hu, D.Page(s): 867-882Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272398&isnumber=5312766
12. Securing Rating Aggregation Systems Using Statistical Detectors and TrustAuthors: Yang, Y.; Sun, Y.; Kay, S.; Yang, Q.Page(s): 883-898Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282543&isnumber=5312766
13. Accurate Detection of Demosaicing Regularity for Digital Image ForensicsAuthors: Cao, H.; Kot, A. C.Page(s): 899-910Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282545&isnumber=5312766
14. Behavior Forensics With Side Information for Multimedia Fingerprinting Social NetworksAuthors: Lin, W. S.; Zhao, H. V.; Liu, K. J. R.Page(s): 911-927Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272299&isnumber=5312766
15. A Study on the Randomness Measure of Image HashingAuthors: Zhu, G.; Huang, J.; Kwong, S.; Yang, J.Page(s): 928-932Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282541&isnumber=5312766
16. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on BiometricsAuthors: Fan, C.-I.; Lin, Y.-H.Page(s): 933-945Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5238635&isnumber=5312766
17. Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc NetworksAuthors: Saxena, N.; Yi, J. H.Page(s): 946-955Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5256333&isnumber=5312766
18. Biometric Systems: Privacy and Secrecy AspectsAuthors: Ignatenko, T.; Willems, F. M. J.Page(s): 956-973Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272403&isnumber=5312766
19. Election Audits Using a Trinomial BoundAuthors: Miratrix, L. W.; Stark, P. B.Page(s): 974-981Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282601&isnumber=5312766
20. Quantum Hashing for MultimediaAuthors: Jin, M.; Yoo, C. D.Page(s): 982-994Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5272295&isnumber=5312766
21. Pairwise Boosted Audio FingerprintAuthors: Jang, D.; Yoo, C. D.; Lee, S.; Kim, S.; Kalker, T.Page(s): 995-1004Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5312768&isnumber=5312766
22. Risk-Limiting Postelection Audits: Conservative $P$-Values From Common Probability InequalitiesAuthors: Stark, P. B.Page(s): 1005-1014Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5282603&isnumber=5312766
23. List of ReviewersPage(s): 1015-1021 Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5312770&isnumber=5312766
24. IEEE Transactions on Information Forensics and Security EdicsPage(s): 1022-1022Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5337761&isnumber=5312766
25. 2009 Index IEEE Transactions on Information Forensics and Security Vol. 4Page(s): 1025-1032Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5337762&isnumber=5312766
26. IEEE Signal Processing Society InformationPage(s): C3-C3Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5337812&isnumber=5312766=========================================================

*********************************************************4. Conference Calendar and Call for Papers *********************************************************.
4.1 CFP: 2010 IEEE World Congress on Computational Intelligence (IEEE WCCI 2010)Posted by: Luis Magdalena (luis.magdalena@softcomputing.es)Date submitted: Nov. 30th, 2009
Content:2010 IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE JULY 18-23, 2010, BARCELONA, SPAIN Barcelona International Convention Centre (CCIB) http://www.wcci2010.org
* CALL FOR TUTORIALS, WORKSHOPS AND SPECIAL SESSIONS
ANNOUNCEMENT OF PLENARY AND INVITED SPEAKERS The 2010 IEEE World Congress on Computational Intelligence (IEEE WCCI 2010) is the largest technical event in the field of computational intelligence. It will host three conferences: the 2010 International Joint Conference on Neural Networks (IJCNN 2010), the 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2010), and the 2010 IEEE Congress on Evolutionary Computation (IEEE CEC 2010). IEEE WCCI 2010 will be held in Barcelona, a Mediterranean city located in a privileged position on the northeastern coast of Spain. Barcelona combines history, art, architecture, and charm within a pleasant, and efficient urban environment where meet old friends, and make new ones. The congress will provide a stimulating forum for scientists, engineers, educators, and students from all over the world to discuss and present their research findings on computational intelligence.
To get a complete list of topics or the call for contributions visit http://www.wcci2010.org/call-for-contributions.
* CALL FOR TUTORIALS AND WORKSHOPS:
IEEE WCCI 2010 will feature pre-congress tutorials and workshops, covering fundamental and advanced computational intelligence topics. Papers submitted for workshops are to be peer-reviewed with the same criteria used for the contributed papers. Researchers interested in organizing a tutorial or a workshop are invited to submit formal proposal through http://www.wcci2010.org/tutorials-and-workshops.
Inquires regarding the tutorials and workshops should be addressed to Tutorials and Workshops Chairs (all contact data are available at the previously mentioned webpage).
A tutorial or workshop proposal should include title, outline, expected enrolment, and presenter/organizer biography.
Deadline for Tutorials and Workshops proposal is February 14, 2010.
* Call for Special SessionsIEEE WCCI 2010 Program Committees solicit proposals for special sessions within the technical scopes of the three conferences.
Special sessions, to be organized by international recognized experts, aim to bring together researchers in special focused topics. Cross-fertilization of the three technical disciplines and newly emerging research areas is strongly encouraged.
Papers submitted for special sessions are to be peer-reviewed with the same criteria used for the contributed papers.
Researchers interested in organizing special sessions are invited to submit formal proposal filling in the form available on the web site http://www.wcci2010.org/special-sessions.
A list of provisionally accepted special sessions is available on http://www.wcci2010.org/special-sessions/accepted-list.
Deadline for Special Sessions proposal is December 13, 2010.
* IEEE WCCI 2010 PLENARY SPEAKERS Dr. Rudolf Kruse "Temporal Aspects in Data Mining"
Dr. Pedro Larranga "Synergies between probabilistic graphical models and evolutionary computation"
Dr. Sushmita Mitra "Hybridizing rough sets: Some applications to bioinformatics and biomedical imagery"
Dr. Enrique H. Ruspini "Clusters, Models, and Concepts"
Dr. Shiro Usui "Neuroinformatics in Vision Science"
* INVITED SPEAKERS Dr. Hussein Abbass "Evolutionary Computation for Risk Assessment and Management"
Dr. James C. Bezdek "Some new indices for relational cluster validity"
Dr. Nozha Boujemaa "Semi-supervised clustering for multimedia mining"
Dr. Simon Lucas "Learning to Play Games?
Dr. Erkki Oja "Linear expansions, nonlinear cost functions: data compression, representation, and partitioning"
Dr. Jose C. Principe "Self-Organization with Information Theoretic Learning"
Dr. Dipti Srinivasan "Modeling and optimization for large engineering Systems: Hybrid Computational Intelligence and multi-agent system approach"
Dr. Marley Vellasco "Quantum-Inspired Neuro-Evolutionary Models"
Dr. Ronald R. Yager"Intelligent Learning Methods for Soft Computing Systems"=========================================================4.2 CFP: Regular and Special Session Contributions at IEEE WCCI 2010Posted by: Thomas Runkler (thomas.runkler@siemens.com)Date submitted: Nov. 30th, 2009
Content:CALL FOR PAPERSREGULAR AND SPECIAL SESSION CONTRIBUTIONS2010 IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCEJULY 18-23, 2010, BARCELONA, SPAINBarcelona International Convention Centre (CCIB)
The 2010 IEEE World Congress on Computational Intelligence (IEEE WCCI2010) is the largest technical event in the field of computationalintelligence. It will host three conferences: the 2010 International Joint Conference on Neural Networks (IJCNN 2010), the 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2010), and the 2010 IEEE Congress onEvolutionary Computation (IEEE CEC 2010). IEEE WCCI 2010 will be held in Barcelona, a Mediterranean city located in a privileged position on the northeastern coast of Spain. Barcelona combines history, art, architecture, and charm within a pleasant, and efficient urban environment where meet oldfriends, and make new ones. The congress will provide a stimulating forum for scientists, engineers, educators, and students from all over the worldto discuss and present their research findings on computational intelligence.
Call for Contributed Papers:
Prospective authors are invited to contribute high-quality papers toIEEE WCCI 2010, either as regular conference contributions, or ascontributions to special sessions.
A) Regular conference contributions:If you are interested in contributing to the regular WCCI 2010conference sessions, please submit your paper electronically through the Congress website http://www.wcci2010.org.
B) Special session contributions:32 special sessions have already been provisionally accepted and are currently being organized:
* Large Scale Global Optimization (ketang@ustc.edu.cn )* Evolutionary Computation in Expensive Optimization Problems(joel.tenne@aeromech.usyd.edu.au)* Advances in Computational Intelligence for Brain-Computer Interfaces(dh.coyle@ulster.ac.uk)* Evolving Fuzzy Systems (p.angelov@lancaster.ac.uk)* Evolutionary Computer Vision (mengjie.zhang@ecs.vuw.ac.nz)* Computational Intelligence for Privacy and Security(agusti.solanas@urv.cat)* Parameter Setting in Evolutionary Algorithms (e.haasdijk@few.vu.nl)* Fuzzy Systems: Control and Hardware (ocastillo@hafsamx.org)* Hybrid Neural Intelligent Systems (epmelin@hafsamx.org)* Aggregation operators in image processing (gleb@deakin.edu.au)* Nature-Inspired Constrained Optimization (emezura@lania.mx)* Niching Methods for Multimodal Optimization (xiaodong.li@rmit.edu.au)* Parallel Biologically-Inspired Optimisation (a.lewis@griffith.edu.au)* From Hybrid Evolutionary Computation and Hyper-Heuristics to MemeticComputation (ferrante.neri@jyu.fi,asysong@ntu.edu.sg)* Computational Intelligence Methods in Bioinformatics, ComputationalBiology, and Bioengineering (angom@cs.uwindsor.ca)* Interactive Evolutionary Computation (takagi@design.kyushu-u.ac.jp)* Bio-Inspired Self-Organizing Multi-Agent Systems(yan.meng@stevens.edu)* Applications and Practical Aspects of Type-2 Fuzzy Systems(hani@essex.ac.uk)* Emerging Neuromorphic Hardware Architectures and Applications(robinson.pino@rl.af.mil)* Aggregation operators: theory and practice (gleb@deakin.edu.au)* Type-2 Fuzzy Logic Theory (chwagn@essex.ac.uk)* Interpretable Fuzzy Systems: Theory and Applications(jose.alonso@softcomputing.es)* Theoretical Foundations of Evolutionary Computation (eberbe@rpi.edu)* Computing with Words (sergio.guadarrama@softcomputing.es)* Brain and Learning (ihaya@cbii.kutc.kansai-u.ac.jp)* Evolutionary Multiobjective Optimization (ccoello@cs.cinvestav.mx)* Ant Colony Optimization (stuetzle@ulb.ac.be)* Fuzzy Interpolation (qqs@aber.ac.uk)* Medical and Educational Applications of Computer Intelligence toBenefit Society (K.Crockett@mmu.ac.uk)* Biologically Inspired Computational Vision (iftekhar@memphis.edu)* Advances in Kernel Methods: Theory and Applications (irojas@ugr.es)* Intelligent Agents (hani@essex.ac.uk)
If you are interested in contributing to a special session, please senda tentative title to the respective special session organizer by e-mail,at your earliest convenience!
All contributed papers, both for regular and for special sessions,will be refereed by experts in the fields based on the criteria of originality, significance, quality and clarity.
Important DatesFinal Notification of Special Session acceptance December 22, 2009Paper submission January 31, 2010Notification of paper acceptance March 15, 2010Final paper submission May 2, 2010Early registration May 23, 2010
Please refer to the Congress Website at http://www.wcci2010.org for moredetails.=========================================================4.3 CFP: Special Sessions at IPMU 2010Posted by: Edwin Lughofer (edwin.lughofer@jku.at); Plamen Angelov (p.angelov@lancaster.ac.uk)Date submitted: Nov. 20th, 2009
Content:Special Session on Fuzzy Machine Learning and Data Mining to be organized at the International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems IPMU 2010 Dortmund, 28.06.2010 - 02.07.2010
Organizers: Daniel Sanchez (University of Granada - daniel@decsai.ugr.es)Edwin Lughofer (University of Linz - edwin.lughofer@jku.at), Abdelhamid Bouchachia (University of Klagenfurt - hamid@isys.uni-klu.ac.at)
Website: http://www.flll.jku.at/div/research/ipmu2010/special_session_IPMU2010.htm
Aim of the Session:The EUSFLAT working group on Machine Learning and Data Mining (DAMI) isorganizing a special session as part of IPMU 2010 conference in Dortmund. The objective of the special session is to provide a forum for the discussionof recent advances in the application of fuzzy set methodology and technologyto data mining and machine learning problems, both in batch off-line andincremental on-line mode, and to offer an opportunity for researchers andpractitioners to identify and discuss recent advances and new promisingresearch directions.
Scope:Topics of interest include but are not limited to the application of fuzzysets, fuzzy systems and related methods in
- Data pre-processing and summarization- Handling of incomplete and heterogeneous data,- Data, text, and web mining methods- Pattern recognition- Dimensionality reduction and feature selection- Interactive and on-line data mining, fuzzy mining of data streams- Incremental/adaptive fuzzy clustering, fuzzy classification and fuzzyregression approaches - Evolving fuzzy systems/classifiers - Interpretability and process safety aspects - Active and semi-supervised learning- Human-machine interaction and the incorporation of background knowledge- Mining at multiple levels of abstraction,- Database querying and ad-hoc data mining,- Visualization and presentation of data mining results.- Postprocessing and summarization of knowledge- Parallel and distributed mining algorithms- Application cases of fuzzy data mining and machine learning
Important Dates:- Deadline for Papers Submission (regularly through the conference website): January 17, 2010.- Notification of Acceptance/Rejection: March 7, 2010.- Deadline for Camera-ready papers: Open.
*******************************************
Special Session on Managing Uncertainties in Data Streams in the framework of the International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems Dortmund, GERMANY28th June - 2nd July, 2010
Organizers: Plamen Angelov (Lancaster University - p.angelov@lancaster.ac.uk)
Scope:Data streams pose different challenges as compare to the batch sets of data. Yet, most of the existing approaches of data mining, machine learning (including clustering, classification, pattern recognition), process control (including system identification, modelling and control), signal processing (including image/video processing, speech/audio processing), evolutionary robotics etc. are still addressed in off-line mode and the data are assumed to be available in batch form.
At the same time, on-line and incremental approaches existed for quite some time in all of these areas, but they all usually assumed the model/cluster structure/classifier/controller to be with a pre-fixed structure, usually selected subjectively by experience.
Many modern day advanced industrial applications, such as robotics, autonomous systems, various defence and security applications, advanced chemical and petro-chemical processes, Internet applications etc. generate with a high rate data streams that require on-line, real-time processing with models and systems with structure that can not necessarily be pre-fixed. This new challenge was addressed by the new paradigm of the evolving intelligent systems (eIS) coined less than a decade ago. The newly established concept of evolving intelligent systems (eIS) is a result of the synergy between conventional systems, neural networks and fuzzy systems as structures for information representation and real time methods for machine learning. This emerging area targets non-stationary processes by developing novel on-line learning methods and computationally efficient algorithms for real-time applications. To address the problems of modelling, control, prediction, classification and data processing in a dynamically changing and evolving environment, a system must be able to fully adapt its structure and adjust its parameters, rather than use a pre-trained and a fixed structure. That is, the system must be able to evolve, to self-develop, to self-organize, to self-evaluate and to self-improve. Wireless sensor networks, assisted ambient intelligence, embedded soft computing diagnostics and prognostics algorithms, intelligent agents, smart evolving sensors; autonomous robotic systems etc. are some of the natural implementation areas of eIS as a realistic and practical tool for design of real time intelligent systems.
While achieving certain results in addressing the problem of managing uncertainties in data streams with the use of eIS a range of problems are still open and require concerted efforts of the research community to be addressed. An unexhaustive list follows in a form of the topics of interest for the papers that will form the special session:
Topics of interest:Methodology Knowledge Extraction from Data Streams Interpretability issues in Data Streams New Adaptive and Evolving Learning Methods for Data Streams Model/System Structure Flexibility vs Robustness in Data Streams Forgetting and Unlearning in Data Streams Model/System Structure Adaptation/Evolving in Non-Stationary Data Streams Data Stream Drift - Detection and Reaction Methods Self-monitoring Data Streams - Quality indicators Evolving Decision Systems based on Data Streams Evolving Perceptions in Data Streams Self-organising Systems for Data Streams On-Line Identification of Fuzzy Systems Self-growing Neural Networks Learned by Data Streams Evolving Neuro-fuzzy Systems from Data Streams Evolving Fuzzy Clustering Methods for Data Streams Evolving Fuzzy Rule-based Classifiers for Data Streams Evolving Regression-based Classifiers for Data Streams Evolving Intelligent Systems for Time Series Prediction in Data Streams Evolving State Monitoring and Prognostics Methods from Data Streams Evolving Intelligent Controllers Real-world application to: Robotics Control Systems Industrial Applications Data Mining and Knowledge Discovery Intelligent Transport Bio-Informatics Defence Evolving Consumer Behaviour Models Submission requirements:
Please, see the requirements of the IPMU Comference at http://www.mathematik.uni-marburg.de/~ipmu2010/
All accepted papers will be published in the Proceedings of the Conference published by Springer's Lecture Notes in Computer Scienceand some invited papers will be proposed for a special issue of the Springer journal on Evolving Systems (http://www.springer.com/engineering/journal/12530)
Important Dates:Abstract with the name of authors (1 page) 1 December 2009 Paper submission Deadline 17 January 2010 Notifications send to the authors 7 March 2010 Camera-ready copies due May 2010 Symposium 28 June - 2 July 2010 =========================================================4.4 CFP: Special issue on Active learning & intrinsically motivated exploration at IEEE TAMDPosted by: Zhengyou Zhang (zhang@microsoft.com)Date submitted: Nov. 22nd, 2009
Content:IEEE Transactions on Autonomous Mental Development, special issue on Active learning and intrinsically motivated exploration in robots
http://www.ieee-cis.org/pubs/tamd/http://flowers.inria.fr/tamd-activeLearningIntrinsicMotivation.htm
This special issue is jointly supported by the IEEE CIS Technical committee on Autonomous Mental Development, http://research.microsoft.com/en-us/um/people/zhang/amdtc/and the IEEE RAS Technical committee on Robot Learning, http://www.learning-robots.de/
Learning techniques are increasingly being used in todays?complex robotic system. Robots are expected to deal with a large variety of tasks, using their high-dimensional and complex bodies, to interact with objects and humans in an intuitive and friendly way. In this new setting, not all relevant information is available at design time, thus self-experimentation and learning by interacting with the physical and social world is very important to acquire knowledge.
A major obstacle, in high and complex sensorimotor space, is that learning can become extremely slow or even impossible without adequate exploration strategies. To solve this problem, two main approaches are now converging. Active learning, from statistical learning theory, where the learner actively chooses experiments in order to collect highly informative examples, and where expected information gain can be evaluated with either theoretically optimal criteria or various computationally efficient heuristics. The second approach, intrinsically motivated exploration, from developmental psychology and recently operationalized in the developmental robotics community, aims at building robots capable of open-ended cumulative learning through task-independent efficient exploration of their sensorimotor space and to refine our understanding of how children learn and develop.
Although similar in some aspects, these two approaches differ in some of the underlying assumptions. Active learning implicitly assumes that samples with high uncertainty are the most informative and focuses on single tasks. On the contrary, Intrinsic motivation has been identified by psychologists as an innate incentive that pushes organisms to spontaneously explore activities or situations for the sole reason that they have a certain degree of novelty, challenge or surprise, hence the term curiosity-driven learning sometimes used.
Several open problems exist still and the goal of this special issue is to show state-of-the-art approaches to these problems and open new directions. Papers should address the following, non-exhaustive, topics applied to robotics or animal cognitive model:
How can traditional active learning heuristics be applied to robotics problems such as motor learning, affordance learning or interaction learning? How to select an active strategy ? Are there general purpose methods or are they task dependent? How can active and intrinsic motivated exploration enable long-life, task-independent learning and development? Is there a unified formalism to both approaches? How precisely do they model human active learning and exploration and its role in development? Can these approaches be used for social tasks, e.g. joint-work and human-robot interaction?
Editors:Manuel Lopes, University of Plymouth, http://www.plymouth.ac.uk/staff/mlopesPierre-Yves Oudeyer, INRIA, http://www.pyoudeyer.com
Two kinds of submissions are possible:Regular papers, up to 15 double column pages ; Correspondence papers either presenting a "perspective" that includes insights into issues of wider scope than a regular paper but without being highly computational in style or presenting concise description of recent technical results, up to 8 double column pages.
Instructions for authors:http://ieee-cis.org/pubs/tamd/authors/
We are accepting submissions through Manuscript Central at :http://mc.manuscriptcentral.com/tamd-ieee (please select ?Active Learning and Intrinsic Motivation as the submission type)
When submitting your manuscript, please also cc it to manuelcabidolopes@gmail.com and pierre-yves.oudeyer@inria.fr
Timeline :31 Jan 2010 - Deadline for paper submission 15 March - Notification15 April - Final version20 April - Electronic publication15 June - Printed publication=========================================================4.5 CFP: Special Issue on Representations and Architectures for Cognitive Systems at IEEE TAMDPosted by: Zhengyou Zhang (zhang@microsoft.com)Date submitted: Nov. 22nd, 2009
Content:IEEE Transactions on Autonomous Mental DevelopmentSpecial Issue on Representations and Architectures for Cognitive Systems
Guest editors:
Giorgio Metta, Italian Institute of Technology & University of Genoa, ITALYGordon Cheng, Technical University Munich, GERMANYTamim Asfour, University of Karlsruhe, GERMANYBarbara Caputo, Idiap Research Institute, Martigny, SWITZERLANDJohn K. Tsotsos, York University, CANADA
ForewordsThe expected progress in machine learning and robotics shall enable tasks where robots have to have sophisticated cognitive skills. Unlike well-accepted computational models, advances in neuroscience suggest that the underlying architecture that yields such cognitive skills may not necessarily be the result of a single monolithic algorithm. Tantalizing results of neuroscience are elucidating the roles of different brain areas and their specific learning, sensorial and/or motor modality.
We can envisage architectures where multiple modes, actions, and learning components interact to achieve a given task. Examples exist in the domain of humanoid robotics, where one might like to learn about attention, reaching, grasping but also to select appropriate actions depending on the environmental and object affordances. Moreover, the discovery of suitable representations is fundamental to the success of these architectures.
In this enlarged view of cognitive systems, the almost forgotten concepts of active vision are revisited together with simultaneous sensory and motor, as well as multimodal learning. For example, in object categorization new methods are being developed that enable abstractions and effective representations, keeping into account the structure of object categories, their associated affordances and how embodiment, context and task affects modeling and learning for an autonomous agent.
This special issue of the Transactions of Autonomous Mental Development calls for papers in order to provide a snapshot of the state of the art in the development of artificial cognitive systems. One or more of the following topics (but not necessarily limited to) are welcome:
* Architectures integrating communication, control and cognitive abilities* Combination of different learning modes (e.g. reinforcement learning, unsupervised learning)* Representations suitable for scalable cognitive architectures* Developmental components in system-level architectures* Attention and action selection* Cortical-like representations and computation* Tool use in task solving, understanding of affordances* Essential Computational building blocks supporting cognitive architectures
Important dates* Deadline for submissions: Feb 1st, 2010* Decision of the first round of review: March 15th, 2010* Final decision: April 15th, 2010* Camera ready: May 1st, 2010* Electronic publication: May 10th, 2010* Printed version: July 10th, 2010
Submission procedureTwo kinds of submissions are possible:
Regular papers, up to 15 double column pages;Correspondence papers either presenting a "perspective" that includes insights into issues of wider scope than a regular paper but without being highly computational in style or presenting concise description of recent technical results, up to 8 double column pages.
Instructions for authors:http://ieee-cis.org/pubs/tamd/authors/
We are accepting submissions through Manuscript Central at:http://mc.manuscriptcentral.com/tamd-ieee (please select "Cognitive Systems" as the submission type)
When submitting your manuscript, please also cc to giorgio.metta (at) iit.it
More information:For more information, please contact Giorgio Metta at giorgio.metta (at) iit.it=========================================================4.6 CFP: Special Session on Advanced Control of Electrical Machines for Automotive Applications at VPPC 2010Posted by: Xiang Chen (xchen@uwindsor.ca)Date submitted: Nov. 26th, 2009
Content:This special session is dedicated to advanced control of electrical machines for automotive applications. Papers are solicited in the most recent development of advanced control of electric drives with automotive related applications.
Deadlines:Submission of abstracts: March 1, 2010Notice of acceptance: April 15, 2010Submission of full papers: June 15, 2010Deadline for registration: July 30, 2010
Website: http://vppc2010.org/=========================================================4.7 CFP: The International Symposium on Evolving Intelligent Systems (EIS 2010)Posted by: Plamen Angelov (p.angelov@lancaster.ac.uk)Date submitted: Nov. 27th, 2009
Content:International Symposium on Evolving Intelligent Systems (EIS 2010) Paper submission Deadline: 5 January 2010 Website: http://www.lancs.ac.uk/staff/angelov/EIS10_AISB10.htm=========================================================4.8 CFP: Special Issue on Evolutionary Neural Network at J. Intellligent & Fuzzy SystemsPosted by: Kyung-Joong Kim (kimkj@sejong.ac.kr)Date submitted: Nov. 27th, 2009
Content:Special Issue of Journal of Intelligent & Fuzzy Systems on Evolutionary Neural Networks: Theory and Practice.Submission Deadline: Feb 28, 2010=========================================================4.9 CFP: New Journal on Swarm IntelligencePosted by: Yuhui Shi (yuhui.shi@xjtlu.edu.cn)Date submitted: Nov. 3rd, 2009
Content:CFP for the International Journal of Swarm Intelligence Research (ISSN: 1947-9263). More information can be found at http://www.igi-global.com/IJSIR=========================================================

#########################################################End of Electronic Letter#########################################################

UNSUBSCRIBE: After 24 hours from now, you can click the following link if you want to unsubscribe from the E-letter mailing list.http://tiger.ece.stevens-tech.edu/cgi-bin/unsubscribe.cgi?email=xyz!@mit.edu