A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society

  • Dalei Guo
  • Shuming Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)


Analysis, evaluation and forecast for the collection, memory and management of information play an important role in the research and engineering application of intelligence and security informatics. Theoretically speaking, the developed science and technology have already well-founded for decision and strategy of ISI. For example, all the production, consumption, distributing and reserves of the energy of the country or worldwide could be searched, tracked and resisted dynamic in virtue of the information analysis, such as petroleum, forest and coal and so on. Whereas, greats of impacts still remain extremely difficult among key issues in ISI research. Such as the incapability of repeated or re-constructed of the situation, or the impossibility of reducing and simplifying the experiments to acquire the necessary data and so on, all these factors awfully obstacle the new advanced process of ISI research. Specially, the project attempts to build a parallel system support for ISI decision analysis and support based on a newly developed computational theory with the artificial societies and computational experiments.


Computational Experiment Security Information Artificial System Parallel System Information Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Chen, H., Wang, F.Y., Zeng, D.: Intelligence and security informatics for homeland security: information, communication and transportation. IEEE Transaction on Intelligent Transportation Systems 5(4), 329–341 (2004)CrossRefGoogle Scholar
  2. 2.
    Chen, H., Wang, F.-Y.: Artificial Intelligence for Homeland Security. IEEE Intelligent Systems 20(5), 12–16 (2005)CrossRefGoogle Scholar
  3. 3.
    Yao, Y.Y., Wang, F.-Y., Wang, J., Zeng, D.: Rule + Exception Strategies for Security Information Analysis. IEEE Intelligent Systems 20(5), 52–57 (2005)CrossRefGoogle Scholar
  4. 4.
    Chen, H., Wang, F.-Y., Zeng, D.: Intelligence and Security informatics for Homeland Security: Information, Communication and Transportation. IEEE Trans. Intelligent Transportation Systems 5(4), 329–341 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dalei Guo
    • 1
  • Shuming Tang
    • 2
  1. 1.Institute of AutomationThe Chinese Academy of SciencesBeijingP.R. China
  2. 2.The Automation Institute of Shandong Academy of SciencesJinanP.R. China

Personalised recommendations