Computational Intelligence - February 2015 - 9

IEEE Computational Intelligence
Magazine Outstanding Paper Award

"A Unified Framework for Symbiosis of
Evolutionary Mechanisms with Application to Water Clusters Potential Model
Design" by Minh Nghia Le, Yew Soon
Ong, Yaochu Jin and Bernhard Sendhoff,Vol. 7, No. 1, pp. 20-35, 2012.
Outstanding Chapter Award

IEEE CIS Hefei Chapter, CHINA
For promoting and supporting computational
intelligence research and applications through
a number of technical activities, including free
workshops and seminars.
Outstanding Organization Award

Lar us Technolog ies Cor poration,
CANADA
For advancing the field of computational
intelligence as applied to defense and security
applications.

Larus Technologies Corporation, located in Ottawa, Canada is a wholly
owned Canadian research and engineering company. Larus is comprised of
three core business areas, Data Fusion
and Analytics Solutions, including the
patented Total::Insightâ„¢ Decision
Support System (DSS), Software
Engineering Consulting, primarily in
the area of Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance
(C4ISR) for public secur ity and
defense, and Research and Engineering,
focusing on innovations in Computational Intelligence. Larus Technologies
has become known for its expertise in
developing solutions and advanced
decision support systems requiring
multi-sensor data collection, aggregation, exploitation and fusion.
Larus specializes in the areas of network-enabled real-time systems, simulation environments, embedded computer
and control systems. An extensive back-

ground in public and private security
projects has made Larus a specialist in
high reliability, real-time systems with
adherence to standards and quality.
Larus is an innovator of next-generation embedded technology for developers of mission-critical C4ISR and
Security systems with a solid foundation pioneering high level information
fusion for the ever-changing defense
and security industries.
Total::Insight uses Computational
Intelligence, advanced learning techniques, prediction and assessment capabilities to combine and analyze the
information from a variety of sources
including passive and active sensors,
existing trackers and correlators, as well
as from a multitude of other data sources (e.g. weather reports, operator
repor ts, web pages). This allows
Total::Insight to sift through vast
amounts of data, capture complex relations which result in the learning and
the real-time recognition of patterns,
events and anomalies in order to always
produce accurate information and to
continually optimize situational awareness for decision makers.
Total::Insight includes the Risk
Management Framework (RMF) designed
to extract risk features in real-time
from a variety of assets in order to
detect, well ahead of time, which assets
are more likely headed for distress in
order to rapidly plan the optimal
response (out of many possibilities), and
the ISR Multi-Asset Optimizer allowing
mission planners to rapidly generate a
wide variety of optimized mission/collection plans for air, land and sea based
search-and-rescue (SAR) assets. The
optimizer was developed to ensure
optimal use of response assets in order
to meet critical mission objectives
while at the same time fulfilling multiple and often challenging, mission constraints. Larus continues to innovate in
the field of Computational Intelligence
extending Total::Insight to address
additional decision support requirements and support a wider variety of
hard and soft data sources. For additional information, see http://www.
larus.com.

Outstanding PhD Dissertation Award

Yong Wang for his
thesis entitled
" E vo l u t i o n a r y
Al g or it hm s f o r
Complex Continuous Optimization
Problems" presented for the degree
of Doctor of Philosophy in the Central
South University, China, May 2011.
Supervisor: Zixing Cai, Central
South University, China.
Abstract-This thesis aims at
solving four kinds of complex continuous optimization problems by evolutionary algor ithms: unconstrained
single-objective optimization problems (USOPs), constrained singleobjective optimization problems
(CSOPs), unconstrained multi-objective optimization problems (UMOPs),
and constrained multi-objective optimization problems (CMOPs). Firstly, a
composite differential evolution (DE)
and a generic DE framework have
been proposed to enhance the convergence speed and robustness of DE for
complex continuous USOPs. Secondly, this thesis carries out an in-depth
analysis on the constraint-handling
techniques based on multi-objective
optimization. Moreover, a series of
methods has been designed for complex continuous CSOPs. Thirdly, a
reducing redundant cluster operator
has been proposed to address an open
issue in the regularity model-based
multi-objective estimation of distribution algorithm, i.e., how to determine
the number of clusters in the modelling. Finally, a generalized adaptive
tradeoff model has been proposed for
complex continuous CMOPs. The
methods presented in this thesis have
been successfully applied to solve
optimization problems in more than
20 fields by other research groups. The
CoDE algorithm is the core technology of a commercial software bSLOPE
developed by O.C. Rickard and N.
Sitar in the University of California,
Berkeley. The source codes of all the
proposed methods have been made
available on the internet.

february 2015 | Ieee ComputatIonal IntellIgenCe magazIne

9


http://www http://www.larus.com

Table of Contents for the Digital Edition of Computational Intelligence - February 2015

Computational Intelligence - February 2015 - Cover1
Computational Intelligence - February 2015 - Cover2
Computational Intelligence - February 2015 - 1
Computational Intelligence - February 2015 - 2
Computational Intelligence - February 2015 - 3
Computational Intelligence - February 2015 - 4
Computational Intelligence - February 2015 - 5
Computational Intelligence - February 2015 - 6
Computational Intelligence - February 2015 - 7
Computational Intelligence - February 2015 - 8
Computational Intelligence - February 2015 - 9
Computational Intelligence - February 2015 - 10
Computational Intelligence - February 2015 - 11
Computational Intelligence - February 2015 - 12
Computational Intelligence - February 2015 - 13
Computational Intelligence - February 2015 - 14
Computational Intelligence - February 2015 - 15
Computational Intelligence - February 2015 - 16
Computational Intelligence - February 2015 - 17
Computational Intelligence - February 2015 - 18
Computational Intelligence - February 2015 - 19
Computational Intelligence - February 2015 - 20
Computational Intelligence - February 2015 - 21
Computational Intelligence - February 2015 - 22
Computational Intelligence - February 2015 - 23
Computational Intelligence - February 2015 - 24
Computational Intelligence - February 2015 - 25
Computational Intelligence - February 2015 - 26
Computational Intelligence - February 2015 - 27
Computational Intelligence - February 2015 - 28
Computational Intelligence - February 2015 - 29
Computational Intelligence - February 2015 - 30
Computational Intelligence - February 2015 - 31
Computational Intelligence - February 2015 - 32
Computational Intelligence - February 2015 - 33
Computational Intelligence - February 2015 - 34
Computational Intelligence - February 2015 - 35
Computational Intelligence - February 2015 - 36
Computational Intelligence - February 2015 - 37
Computational Intelligence - February 2015 - 38
Computational Intelligence - February 2015 - 39
Computational Intelligence - February 2015 - 40
Computational Intelligence - February 2015 - 41
Computational Intelligence - February 2015 - 42
Computational Intelligence - February 2015 - 43
Computational Intelligence - February 2015 - 44
Computational Intelligence - February 2015 - 45
Computational Intelligence - February 2015 - 46
Computational Intelligence - February 2015 - 47
Computational Intelligence - February 2015 - 48
Computational Intelligence - February 2015 - 49
Computational Intelligence - February 2015 - 50
Computational Intelligence - February 2015 - 51
Computational Intelligence - February 2015 - 52
Computational Intelligence - February 2015 - 53
Computational Intelligence - February 2015 - 54
Computational Intelligence - February 2015 - 55
Computational Intelligence - February 2015 - 56
Computational Intelligence - February 2015 - 57
Computational Intelligence - February 2015 - 58
Computational Intelligence - February 2015 - 59
Computational Intelligence - February 2015 - 60
Computational Intelligence - February 2015 - 61
Computational Intelligence - February 2015 - 62
Computational Intelligence - February 2015 - 63
Computational Intelligence - February 2015 - 64
Computational Intelligence - February 2015 - Cover3
Computational Intelligence - February 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com