December 23, 2009

I sent an ABSTRACT (imagine ABSTRACT) and the IEEE World Congress on Computational Intelligence (WCCI 2010) accepted it

We found this comment to our older post
http://anti-plagiarism-org.blogspot.com/2009/12/impressive-declaration-from-prof-dario.html
from FENG ZHENG

We republish it here

FENG ZHENG (IEEE MEMBER) said...

I sent an ABSTRACT (imagine ABSTRACT) to the IEEE World Congress on Computational Intelligence (WCCI 2010), July 18-23, 2010
Barcelona, Spain
and they ACCEPTED my paper
just 2 hours after my submission without any kind of review.
I think that you must write something about the
Abstract-Reviewed IEEE Conferences.

December 02, 2009

An impressive declaration from Prof. DARIO PETRI petri@ieee.org

Dear Mario,

I believe that many IEEE (sponsored or co-sponsored) conferences are quite bogus
because they have published a lot of fake papers from SCIgen automatic machine
or papers of low quality...
We must be careful, otherwise our massive policy for giving the name of IEEE to strange
organizers will harm the reputation of IEEE conference, if we have kept any rank of such an old reputation.

Prof. DARIO PETRI
IEEE Italy Section
petri@ieee.org

********************************************************
Posted at
http://anti-plagiarism-org.blogspot.com/2009/12/impressive-declaration-from-prof-dario.html

June 04, 2009

The IEEE has completely dissolved

The IEEE has completely dissolved. It is possible any idiot who wants to make money
to apply IEEE sponsorship and organize a quite crappy congress. The IEEE has understood, but does not take measures. Check out the papers
http://facweb.cs.depaul.edu/jrogers/complexity/accepted.html
and take careful note of the information about this IEEE bogus Computational Complexity conference

It is another FAKE IEEE conference (fake IEEE spamference) this time on Computational Complexity.


The organizers are academic criminals.

Do NOT send these criminals any money.

Please send this warning on to your networks.

Many young people have been defrauded lately - and we must work together to defeat such efforts.

Use extreme caution when applying for conferences advertised by organizations unknown to you.

What a Shame for the IEEE Computational Complexity Conference!

* two new bogus papers have been accepted in the IEEE Computational Complexity Conference!


Extractors for varieties ??????????by Zeev Dvir !!!

and

Extractors for Low-Weight Affine Sources ??????? byAnup Rao!!!


The papers are absolutely fake papers.
What a Shame for the IEEE Computational Complexity Spamference!


Conclusion: The IEEE has completely dissolved

May 21, 2009

fraudulent papers in a fraudulent conference (sponsored by IEEE)

Our organization www.anti-plagiarism.org has just found a new post

http://iaria-highsci.blogspot.com/2009/05/dear-president-of-ieee.html

seems to be correct.

Please take careful note of the information below
about this IEEE Computational Complexity conference that was a fraudulent conference

It is one more IEEE conference that accepted 2 bogus papers

The organizers are academic criminals. Do NOT send these criminals any money.Please send this warning on to your networks.

Many young people have been defrauded lately - and we must work together to defeat such efforts.

Use extreme caution when applying for conferences advertised by organizations unknown to you.What a Shame for the IEEE Computational Complexity Conference! two new bogus papers have been accepted in the http://facweb.cs.depaul.edu/jrogers/complexity/accepted.html
BOGUS PAPER 1: Extractors for varieties ??????????by Zeev Dvir !!!and
BOGUS PAPER 2: Extractors for Low-Weight Affine Sources ??????? byAnup Rao

The papers are absolutely fake papers and the organizers built a fraudulent conference!
What a Shame for the fraudulent IEEE Computational Complexity Conference!

May 12, 2009

Conclusion: the IEEE Conferences are Fraudulent. Fraudulent conference announcements / Annonces de conférences frauduleuses




See my photo.
I protested in my University!

I did not know that IEEE Conferences were fraudulent conferences.
I put today in the Google: IEEE fake and IEEE bogus
and I found very interesting results

It seems to me that the majority of the IEEE fraudulent Conferences
are organized by individuals in a franchise system

This IEEE fraudulent franchising business system destroyes the Science
So, I am not an IEEE member though that I am Professor in an electrical and computer
engineering department in France.

We know that IEEE gives its name and logo to many conference organizers that wants
to make money from innocent or not so innocent colleagues.
So, we have ranked the IEEE fraudulent conferences with blatant spam (see below) as
totally bogus conferences.

In France, IEEE is considered as premium fraudulent business.
The problem with the IEEE fraudulent conferences is that the IEEE does not have the control in the paper review. So, IEEE fraudulent has received a very bad name in France, in Germany and in Austria, but also in many other European Countries.

We prefer to publish in Elsevier and Springer Verlag, because they have good control in the Review of the papers.

So, if you search the internet via Google or via Wikipedia you will find many fake papers, many junk works, many machine generated texts that have been accepted in IEEE conferences without any review.

The most fantastic paper was the paper "A Statistical Method For Women That Can Help Our Sexual Education" in the IEEE fraudulent Conference organized by IARIA

It seems that the IARIA - IEEE did not open the pdf file at all and granted
the letter of acceptance to the authors that were authors from Germany

So, the letter of acceptance of this crappy IEEE conference
has been published in
http://iaria-highsci.blogspot.com/2008/12/we-have-letter-of-acceptance-fantastic.html
The letter is genuine.
The title of the paper was "A Statistical Method For Women That Can Help Our
Sexual Education"
This is not only one case of hundreds of IEEE bogus conferences that are organized
every year.
See also:
http://diehimmelistschoen.blogspot.com/
and this
http://en.wikipedia.org/wiki/SCIgen

After this SHAME of IEEE, I wonder why IEEE uses to send us this Spam.
With this bad IEEE, i recommend my friends to resign from any IEEE activity





SPAM from fraudulent IEEE, SPAM from bad IEEE, SPAM from bad IEEE, SPAM from bad IEEE


----------------------------------------------------------------------
SPAM from IEEE, SPAM from IEEE, SPAM from IEEE, SPAM from IEEE
--------------------------------------------------------
IEEE Computational Intelligence Society Electronic Letter
Issue 55, May 2009
Manager: Haibo He
Department of Electrical and Computer Engineering
Stevens Institute of Technology
Hoboken, NJ 07030
USA
hhe@stevens.edu
http://www.ece.stevens-tech.edu/~hhe/
Tel: (201) 216-8057
Fax: (201) 216-8246
Submit your contributions at http://www.ci-eletter.org
http://tiger.ece.stevens-tech.edu/Eletter
Submission deadline for next issue: May 31, 2009
To become a member of the IEEE Computational Intelligence Society,
please visit www.ieee-cis.org/join/
----------------------------------------------------------------------
SPAM from IEEE, SPAM from the fraudulent IEEE, SPAM from IEEE, SPAM from IEEE
--------------------------------------------------------
Contents
1. IEEE CIS News and Announcements
1.1 Master in Soft Computing and Intelligent Data Analysis
2. Awards
3. Computational Intelligence Forum
3.1 Call for Course Unit Materials in Computational Intelligence
4. Doctoral Dissertations
5. Career Opportunities
5.1 Post-doc position
5.2 Particle Swarm Optimization for Fast Watermarking of Digital Images
5.3 Faculty: Harbin Institute of Technology Shenzhen Graduate School
6. Bookshelf
6.1 Artificial Intelligence for Privacy Protection and Security
7. Most Recent Issues of Journals
7.1 IEEE Computational Intelligence Magazine, vol. 4, no. 2, May 2009
7.2 IEEE Transactions on Neural Networks, vol. 20, no. 4, April 2009
7.3 IEEE Transactions on Computational Intelligence and AI in Games, vol. 1, no. 1, March 2009
8. Conference Calendar and Call for Papers
8.1 4th International Symposium Advances in Artificial Intelligence and Application
8.2 16th International Conference on Neural Information Processing (ICONIP'09)
----------------------------------------------------------------------
SPAM from IEEE, SPAM from IEEE, SPAM from IEEE, SPAM from IEEE
--------------------------------------------------------
*********************************************************
1. IEEE CIS News and Announcements
*********************************************************.

1.1 Master in Soft Computing and Intelligent Data Analysis
Posted by: Carmen Zarco (carmen.zarco@softcomputing.es)
Date submitted: Apr. 24th, 2009
Content:
MASTER IN SOFT COMPUTING AND INTELLIGENT DATA ANALYSIS
------------------------------------------------------
Soft Computing (SC) and Intelligent Data Analysis (IDA) provide powerful
tools for problem solving in a variety of domains. A non-exhaustive list of
typical applications includes client segmentation, fraud detection, credit
scoring, process control, logistics and information retrieval.
Applications can be found in all sectors: engineering, finance, marketing,
operations research, bioinformatics, medicine, .
The tremendous potential of SC and IDA has created a demand for well-trained
professionals in this field. For this reason, the University of Oviedo and
the European Centre for Soft Computing have joined efforts to offer an
Official Master Course in Soft Computing and Intelligent Data Analysis. This
is a one-year full-time program that combines rigorous training in advanced
techniques with a close contact with real applications.
OBJECTIVE
---------
The objective of the Master is to provide students with the foundations
required to pursue a PhD degree, as well as with applied skills to prepare
for a research career in academy or industry.
PROGRAM STRUCTURE
-----------------
The program is designed to provide a balanced mix of academic and
professional training. The course is divided into four Modules plus a
Master's project:
Module I: Fundamentals of Soft Computing
Module II: Hybrid Intelligent Systems
Module III: Intelligent Data Analysis
Module IV: Application Domains

----------------------------------------------------------------------
SPAM from IEEE, SPAM from IEEE, SPAM from IEEE, SPAM from IEEE
--------------------------------------------------------



LECTURERS
---------
The teaching staff has been selected among the top academics in this
field. All lecturers have considerable teaching experience (on average,
15 years) and a world-class reputation in research. The list of
lecturers includes, among others:
Piero Bonissone,
Christian Borgelt,
Oscar Cordn,
Sven Crone,
Didier Dubois,
M. ngeles Gil,
Francisco Herrera,
Janusz Kacprzyk,
Rudolf Kruse,
Manuel Laguna,
Pedro Larraaga,
Ramn Lpez de Mntaras,
Luis Magdalena,
Gabriella Pasi and
Enric Trillas.


----------------------------------------------------------------------
SPAM from IEEE, SPAM from IEEE, SPAM from IEEE, SPAM from IEEE
--------------------------------------------------------



MAIN FEATURES
-------------
Academic Period: October 2009 to July 2010.
Language: English.
Class Schedule: From 15:30 until 20:00, Monday through Friday.
Location: Scientific Building in the Mieres Campus of the University of
Oviedo (SPAIN).
Application Period: June 1 to July 15. Late applications will be
processed only if there are places available.
Course Fee: approximately 1800? (official prices for next year not yet
published).
Financial Aid: The Master offers scholarships that will cover
registration fee, round trip and living expenses. Scholarships are open
to all applicants and will be awarded on the basis of academic excellence.
INFORMATION
-----------
http://www.softcomputing.es/master
For any specific information write or call:
EUROPEAN CENTRE FOR SOFT COMPUTING
Telephone: +34 985 456545
e-mail: master@softcomputing.es
=========================================================


----------------------------------------------------------------------
SPAM from fake IEEE, SPAM from fake IEEE, SPAM from fake IEEE, SPAM from fake IEEE
--------------------------------------------------------



*********************************************************
2. Awards
*********************************************************.

No submissions.
=========================================================.

*********************************************************
3. Computational Intelligence Forum
*********************************************************.

3.1 Call for Course Unit Materials in Computational Intelligence
Posted by: Ke Chen (kchen@ieee.org)
Date submitted: Apr. 15th, 2009
Content:
Dear Colleagues,
Our society has just established an education activity committee of eight
sub-committees. For the University Curricula Sub-Committee, one of our tasks
is to create a repository for course units related to computational
intelligence, e.g., neural computation, evolutinary computation, fuzzy
systems, non-standard computing and so on. Now we wish to collect some sample
course unit packages (syllabus, handout, lecture note, coursework, exam.
paper and other relevent teaching materials) for this repository. As a result, we
would like our colleagues to offer your materials if you are teaching or
taught a relevant course units (in English).
If you would make a contribution to this repository, please contact me or
one of our members in this sub-committee (Our contact methods can be found from
http://ieee-cis.org/edu/university/).
Thanks in advance for your contributions.
Best wishes,
Ke Chen
Chair of University Curricula Sub-Committee
=========================================================
SPAM from fake IEEE, SPAM from fake IEEE, SPAM from fake IEEE, SPAM from fake IEEE



*********************************************************
4. Doctoral Dissertations
*********************************************************.
SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE
No submissions.
=========================================================.

*********************************************************
5. Career Opportunities
*********************************************************.

5.1 Post-doc position
Posted by: Dr Karim Seghouane (abd-krim.seghouane@nicta.com.au)
Date submitted: Apr. 15th, 2009
Content:
2 YEAR POSTDOC POSITION - NICTA Canberra Research Laboratory
NICTA Canberra Research Laboratory, Australia is seeking a Postdoctoral
Research Fellow to support a research project in signal and image processing
for brain connectivity estimation. The project involves international
collaboration with Montreal Neurological Institute, McGill University.
Applicants must have a Ph.D. (or be close to completion) in electrical
engineering or a related field (such as mathematics or statistics), with a
proven capacity for high-quality research and an international publication
record.
Previous research experience in signal and image processing is desirable.
Remuneration will be competitive, and commensurate with the applicant's
qualifications and experience. The positions are available immediately for a
term of up to two years. Review of applications will begin immediately and
continue until suitable candidates are found. To apply, please email a CV,
including list of publications, and the names and contact details for two
referees, to [Abd-krim.seghouance@nicta.com.au].
Further information regarding the position can be found on the NICTA website.
Should you have any further queries please contact Dr Seghouane by email or by
phone +61 2 62676229.

SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE



=========================================================
5.2 Particle Swarm Optimization for Fast Watermarking of Digital Images
Posted by: Eric Granger (eric.granger@etsmtl.ca)
Date submitted: Apr. 20th, 2009
Content:
Program: Ph.D.
Funding:
A grant of CDN$19,500/year, renewable for a maximum duration of 3 years
Start date:
May 2009
Project description:
The production of digitized document images via high speed scanning allows
for the dissemination of information over a wide range of distributed
systems. Assuring the confidentiality, integrity, and authenticity for a
massive amount of document images remains a considerable challenge for many
industrial applications. Overall, this project seeks to investigate, design
and validate intelligent and cost-effective systems for securing massive
quantities of digitized document images. New approaches for bio-watermarking
have been proposed that integrate new techniques for watermarking and bio-
cryptography.
The PhD candidate will focus on one of the fundamental problems of bio-
watermarking -- the optimization of watermarking parameters according to one
or more criteria. The advent of a new class of evolutionary algorithms based
on Dynamic Particle Swarm Optimisation (PSO) allows adapting watermarking
parameters rapidly, on the fly, according to a document's inherent
properties. The candidate will study, propose and design specialized
algorithms based on PSO for the dynamic optimization of digital watermarking
parameters. These algorithms will be validated using a Linux-based
experimental platform and industrial data bases. In this study, the
solutions under investigation will be validated on document images that
correspond to bank cheques that have been digitized into bitonal and grey
scale formats.
This project will be performed at TS, in the Laboratoire d'imagerie, de
vision et d'intelligence artificielle (LIVIA), under the supervision of
Profs. Robert Sabourin et ric Granger. Research will evolve in partnership
with BancTec Inc. (http://www.banctec.com/), a leading provider of payment
processing, document and content processing and IT services. They will
provide expertise in the area of high throughput document scanning, as well
as massive industrial data bases. Financing for this project has been
provided through a Strategic Projects Grant from the Natural Sciences and
Engineering Research Council of Canada (NSERC) for the project entitled A
Fast Evolutionary Approach for Fast Bio-Watermarking of Document Images.
Expertise:
PhD candidates for this project should have a background in one or more of
the following disciplines: evolutionary algorithms, mono and multi-objective
optimization, parallel processing, pattern recognition, and computer vision.
=========================================================

SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE, SPAM from fraud IEEE



5.3 Faculty: Harbin Institute of Technology Shenzhen Graduate School
Posted by: Ying Zhang (zhangyinghit@126.com)
Date submitted: Apr. 27th, 2009
Content:
The Information and Control Research Center at Harbin Institute of
Technology Shenzhen Graduate School invites applications for a full-time
faculty position at the Assistant or Associate Professor level. The center
teaches a major that emphasizes automatic control and information theory. We
seek candidates who can contribute to a broad field of study, which
currently includes dynamics, control and signal processing. In addition to
teaching, the successful candidate is expected to play a significant role in
advising Master student design projects. An earned doctorate in engineering
or a related field is required.
=========================================================

*********************************************************
SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE
*********************************************************.

6.1 Artificial Intelligence for Privacy Protection and Security
Posted by: Agusti Solanas (agusti.solanas@urv.cat)
Date submitted: Apr. 28th, 2009
Content:
ADVANCES IN ARTIFICIAL INTELLIGENCE FOR PRIVACY PROTECTION AND SECURITY
edited by Agusti Solanas & Antoni Martnez-Ballest (Rovira i Virgili University, Spain)
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e.
neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering,
etc), which are applied to the protection of privacy and security. The symbiosis between these fields
leads to a pool of invigorating ideas, which are explored in this book.
On the one hand, individual privacy protection is a hot topic and must be addressed in order to
guarantee the proper evolution of a modern society. On the other, security can invade individual
privacy, especially after the appearance of new forms of terrorism. In this book, we analyze these
problems from a new point of view.
Contents:
Statistical Disclosure Control
Location-based Services
Statistical Databases
Homeland Security
Robotics
Cryptography and Security Protocols
Intrusion Detection Systems
Denial of Service Attacks
Image Analysis
Evolutionary Computation
Pattern Recognition
Neural Networks
Multi-agent Systems
Clustering
Case-based Reasoning
Fuzzy Logic
Readership: Researchers, academics and graduate students in artificial intelligence, security and
privacy.
http://www.worldscibooks.com/compsci/6707.html
=========================================================
SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE
*********************************************************
7. Most Recent Issues of Journals
*********************************************************.

7.1 IEEE Computational Intelligence Magazine, vol. 4, no. 2, May 2009
Posted by: Gary G. Yen (gyen@okstate.edu)
Date submitted: Apr. 27th, 2009
Content:
IEEE Computational Intelligence Magazine, vol.4, no.2, May 2009
Posted by: Gary G. Yen (gyen@okstate.edu)
Date submitted: APRIL 26th, 2009
Table of Content:
IEEE Computational Intelligence Magazine, vol.4, no.2, MAY 2009
1. Time Series Prediction Using Support Vector Machines: A Survey
Authors: Sapankevych, N.I.; Sankar, R.
Page(s): 24-38
Digital Object Identifier 10.1109/MCI.2009.932254
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4840324&isnumber=4840310
2. Adaptive Dynamic Programming: An Introduction
Authors: Fei-Yue Wang; Huaguang Zhang; Derong Liu
Page(s): 39-47
Digital Object Identifier 10.1109/MCI.2009.932261
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4840325&isnumber=4840310
3. Comments on the Paper by Perlovsky, Entitled "Integrating Language and
Cognition
Authors: Anusuya, M.A.; Katti, S.K.; Jayachamarajendra, S.
Page(s): 48-49
Digital Object Identifier 10.1109/MCI.2009.932255
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4840326&isnumber=4840310
4. A perspective on computational intelligence education
Authors: Rothermich, J.
Page(s): 50-51
Digital Object Identifier 10.1109/MCI.2009.932256
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4840327&isnumber=4840310
5. Applications of Fuzzy Logic in Bioinformatics (Dong Xu et al.; 2008)
[Book review]
Authors: Cross, V.
Page(s): 52-54
Digital Object Identifier 10.1109/MCI.2009.932257
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4840328&isnumber=4840310
=========================================================
SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE, SPAM from scam IEEE


SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE
7.2 IEEE Transactions on Neural Networks, vol. 20, no. 4, April 2009
Posted by: Marios M. Polycarpou (ieeetnn@ucy.ac.cy)
Date submitted: Apr. 28th, 2009
Content:
The following articles appear in the latest issue of IEEE Transactions on
Neural Networks; Volume 20, Issue 4, April 2009.
The articles can be retrieved on IEEE Xplore:
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isYear=2009&isnumber=4808432&Submit32=Go+To+Issues
or directly by clicking the individual paper URL below.
1.Title: Exploiting Data Topology in Visualization and Clustering of Self-
Organizing Maps
Authors: K. Tasdemir, E. Merenyi.
Page(s): 549-562
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4785115&isnumber=4808432
2.Title: Driving Profile Modeling and Recognition Based on Soft Computing
Approach
Authors: A. Wahab, Chai Quek, Chin Keong Tan, K. Takeda.
Page(s): 563-582
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4796254&isnumber=4808432
3.Title: Maximum Margin Clustering Made Practical
Authors: Kai Zhang, I.W. Tsang, J.T. Kwok.
Page(s): 583-596
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798198&isnumber=4808432
4. Title: Self-Organization in a Parametrically Coupled Logistic Map
Network: A Model for Information Processing in the Visual Cortex
Authors: R. Pashaie, N.H. Farhat.
Page(s): 597-608
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798210&isnumber=4808432
5. Title: A New Neuro-FDS Definition for Indirect Adaptive Control of
Unknown Nonlinear Systems Using a Method of Parameter Hopping
Authors: Y. Boutalis, D.C. Theodoridis, M.A. Christodoulou.
Page(s): 609-625
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798197&isnumber=4808432
6. Title: Option Pricing With Modular Neural Networks
Authors: N. Gradojevic, R. Gencay, D. Kukolj.
Page(s): 626-637
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798200&isnumber=4808432
7. Title: Neural Network Output Optimization Using Interval Analysis
Authors: E. de Weerdt, Q.P. Chu, J.A. Mulder.
Page(s): 638-653
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4787090&isnumber=4808432
8. Title: A New Recurrent Neural Network for Solving Convex Quadratic
Programming Problems With an Application to the $k$-Winners-Take-All Problem
Authors: Hu. Xiaolin, Bo Zhang
Page(s): 654-664
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4785114&isnumber=4808432
9. Title: Adaptively Combined FIR and Functional Link Artificial Neural
Network Equalizer for Nonlinear Communication Channel
Authors: H. Zhao, J. Zhang.
Page(s): 665-674
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4787092&isnumber=4808432
10. Title: Intelligent Visual Recognition and Classification of Cork Tiles
With Neural Networks
Authors: A. Georgieva, I. Jordanov.
Page(s): 675-685
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798199&isnumber=4808432
11. Title: Spurious Valleys in the Error Surface of Recurrent Networks-
Analysis and Avoidance
Authors: J. Horn, O. De Jesus, M.T. Hagan.
Page(s): 686-700
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798196&isnumber=4808432
12. Title: A New Method for Design and Reduction of Neuro-Fuzzy
Classification Systems
Authors: K. Cpalka.
Page(s): 701-714
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4798201&isnumber=4808432
13. Title: Two-Phase Construction of Multilayer Perceptrons Using
Information Theory
Authors: H-J. Xing, B-G. Hu.
Page(s): 715-721
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4796255&isnumber=4808432
14. Title: Constructing Sparse Kernel Machines Using Attractors
Authors: D. Lee, K-H. Jung, J. Lee.
Page(s): 721-729
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4796253&isnumber=4808432
15. Title: Trace Ratio Problem Revisited
Authors: Y. Jia, F. Nie, C. Zhang.
Page(s): 729-735
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4801520&isnumber=4808432
16. Title: A Novel Chaotic Neural Network With the Ability to Characterize
Local Features and Its Application
Authors: Lin Zhao, Ming Sun, JianHua Cheng, YaoQun Xu.
Page(s): 735-742
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4801514&isnumber=4808432
=========================================================

SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE



7.3 IEEE Transactions on Computational Intelligence and AI in Games, vol. 1, no. 1, March 2009
Posted by: Lucas, Simon M (sml@essex.ac.uk)
Date submitted: Apr. 28th, 2009
Content:
IEEE Transactions on Computational Intelligence and AI in Games, vol. 1, no. 1,
March 2009.
EDITORIAL
Computational Intelligence and AI in Games: A New IEEE Transactions
S. M. Lucas
PAPERS

SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE



CADIAPLAYER: A Simulation-Based General Game Player
Authors: Y. Bjrnsson and H. Finnsson
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4804731
Effective and Diverse Adaptive Game AI
Authors: I. Szita, M. Ponsen, P. Spronck
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4804734
Extending the Applicability of Pattern and Endgame Databases
Authors: M. Samadi, F. T. Asr, J. Schaeffer, Z. Azimifar
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4811953
Lightweight Procedural Animation with Believable Physical Interactions
Authors: I. Horswill
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4812073
Effects of Shared Perception on the Evolution of Squad Behaviours
Authors: D. Doherty and C. O'Riordan
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4804730
Learning Finite State Machine Controllers From Motion Capture Data
Authors: M. Gillies
URL: http://ieeexplore.ieee.org/xpls/pre_abs_all.jsp?isnumber=4804729&arnumber=4812072
The Computational Intelligence of MoGo Revealed in Taiwan's Computer Go
Tournaments
Authors: C.-S. Lee, M.-H. Wang, G. Chaslot, J.-B.Hoock, A. Rimmel, O. Teytaud,
S.-R. Tsai, S.-C. Hsu, T.-P. Hong
URL: http://ieeexplore.ieee.org/xpl/freepre_abs_all.jsp?isnumber=4804729&arnumber=4804732
=========================================================
SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE
*********************************************************
8. Conference Calendar and Call for Papers
*********************************************************.

8.1 4th International Symposium Advances in Artificial Intelligence and Application
Posted by: Urszula Markowska-Kaczmar (urszula.markowska-kaczmar@pwr.wroc.pl)
Date submitted: Apr. 15th, 2009
Content:
4th International Symposium
Advances in Artificial Intelligence and Applications (AAIA'09)
http://www.aaia.imcsit.org/
Mragowo, Poland, October 12-14, 2009
Celebrating 50 years of scientific research of
Professor Juliusz Lech Kulikowski
organized in cooperation with:
* the Poland Chapter of the IEEE Computer Society,
* Poland Chapter of the IEEE Computer Society, (Gdansk Branch and Silesia
Branch)
* Poland Chapter of the IEEE Computational Intelligence Society (CIS)
* Systems Research Institute of the Polish Academy of Sciences (IBS PAN)
* Institute of Computer Science of the Polish Academy of Sciences (IPI PAN)
* Asociacin de Tcnicos de Informtica
* World Federation of Soft Computing
* Polish Neural Networks Society
* European Society for Fuzzy Logic And Technology
* European Neural Network Society
International Symposium on Advances in Artificial Intelligence and
Application
(AAIA) will be held within the framework of the 2009 International
Multiconference on Computer Science and Information Systems
(http://www.imcsit.org/), and will be co-located with the XXV Fall Meeting of
Polish Information Processing Society.
The AAIA'09 will bring researchers, developers, practitioners, and users to
present their latest research, results, and ideas in all areas of artificial
intelligence. We hope that theory and successful applications presented at
the AAIA'09 will be of interest to researchers and practitioners who want to
know about both theoretical advances and latest applied developments in
Artificial Intelligence. As such AAIA'09 will provide a forum for the
exchange of ideas between theoreticians and practitioners to address the
important issues.
Papers related to theories, methodologies, and applications in science and
technology in this theme are especially solicited. Topics covering industrial
issues/applications and academic research are included, but not limited to:
* Knowledge management
* Decision Support Systems
* Approximate Reasoning
* Fuzzy modeling and control
* Data mining
* Web Mining
* Machine learning
* Combining multiple knowledge sources in an integrated intelligent system
* Neural Networks
* Evolutionary Computation
* Artificial Immune Systems
* Ant Systems in Applications
* Natural Language processing
* Image processing and understanding (interpretation)
* Applications in Bioinformatics
* Hybrid Intelligent Systems
* Granular computing
* Architectures of intelligent systems
* Robotics
* Real-world applications of Intelligent Systems Special Tracks
Besides regular sessions this year we plan to organize Special Tracks. For
proposals we are waiting until January 30, 2009. All special track organizers
must obtain firm commitments from their Special Track presenters and authors
to submit papers in a timely fashion (if the special track is accepted) and,
particularly, present them at the AAIA'09. Each special track organizer will
be session chair for their own special tracks at AAIA'09 accordingly. If the
number of submitted papers to a Special Track will be too small, papers
submitted to this track will be presented during regular AAIA'09 sessions.
All papers submitted to Special Tracks will undergo the same review process
as regular submissions.
Best Paper Awards
We are proud to announce that we will continue the tradition started during
the AAIA'06 Symposium and award two "Professor Zdzislaw Pawlak Best Paper
Awards" for contributions which are outstanding in their scientific quality.
The two award categories are:
Best Student Paper - for graduate or PhD students. Papers qualifying for this
award must be marked as "Student full paper" to be eligible for
consideration.
Best Paper Award - for the authors of the best paper appearing at the
Symposium.
In addition to a certificate, each award carries a prize of 300 EUR provided
by the Mazowsze Chapter of the Polish Information Processing Society.
Paper Submission and Publication
* Authors should submit draft papers (as Postscript, PDF of MSWord file).
* The total length of a paper should not exceed 8 pages (IEEE style). IEEE
style templates.
* Papers will be refereed and accepted on the basis of their scientific merit
and relevance to the symposium.
* Accepted and Presented paper will be published in the Conference
Proceedings
and included in the IEEE Xplore(r) database.
* Extended versions of selected papers will be published as Special Issues of
journals that will be announced later.
* Extended versions of selected papers will be published as Special Issues
of:

- Applied Soft Computing Journal (ISI indexed),
http://www.elsevier.com/wps/find/journaldescription.cws_home/621920/description#description

- International Journal on Information Intelligent and Database
Systems, http://www.inderscience.com/ijiids
- and possibly other journals that will be announced later.
Important dates
Event proposal submission due: January 30, 2009
Full paper submission: May 10, 2009
Notification of acceptance: July 1, 2009
Camera-ready version of the accepted papers: August 15, 2009
Conference: October 12-14, 2009
Halina Kwasnicka, Urszula Markowska-Kaczmar
Institute of Informatics, Wroclaw University of Technology, Wroclaw, POLAND
In case of questions please contact Urszula Markowska-Kaczmar or Halina
Kwasnicka at Urszula.Markowska-Kaczmar@pwr.wroc.pl or
halina.kwasnicka@pwr.wroc.pl
=========================================================
8.2 16th International Conference on Neural Information Processing (ICONIP'09)
Posted by: Jonathan Chan (jonathan@sit.kmutt.ac.th)
Date submitted: Apr. 30th, 2009
Content:
2nd CALL FOR PAPERS
16th International Conference on Neural Information Processing (ICONIP'09)
Challenges and Trends of Neural Information Processing
Bangkok, Thailand, December 1-5, 2009
http://www.iconip09.org/
Full manuscript submission deadline: June 1, 2009
Notification of acceptance: August 1, 2009
Camera-ready manuscripts and early bird registration: September 1, 2009

TECHNICAL CO-SPONSORS
IEEE Computational Intelligence Society (IEEE-CIS)
International Neural Network Society (INNS)
Japanese Neural Network Society (JNNS)
European Neural Network Society (ENNS)

ICONIP'09 aims to bring together scientists, practitioners, and students
worldwide to discuss the past, present, and future challenges and trends in
the field of neural information processing. This prestigious event is
sponsored by the Asia Pacific Neural Network Assembly (APNNA), and it has
provided an annual forum for international researchers to exchange latest
ideas and advances on neural networks and related discipline. ICONIP'09
solicits contributions from the following non-exclusive list of topics in
neural information processing and related areas:
- Cognitive science
- Computational neuroscience
- Mathematical Modeling and Analysis
- Learning Algorithms
- Support Vector Machines
- Self-Organizing Map
- Independent Component Analysis
- Pattern Classification
- Face Analysis and Processing
- Image Processing
- Signal Processing
- Computer Vision
- Hybrid Systems
- Forecasting and Prediction
- Evolutionary Computation
- Hardware
- Fuzzy Systems
- Information Security
- Data and Text Processing
- Financial Applications
- Manufacturing Systems


SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE, SPAM from bogus IEEE



- Control and Robotics
- Other Emerging Computational Methods
- Bioinformatics and Biomedical Applications

PAPER SUBMISSION
Prospective authors are invited to submit original, high quality manuscripts
of up to eight A4-pages electronically. The submission must conform to the
Springer LNCS format. All accepted papers will be published in proceedings of
ICONIP'09 as a Springer LNCS volume. Extended version of selected papers will
be invited for publication in special issues of international journals after
the conference.

SPECIAL ISSUES
The following special issues have been confirmed thus far:
Int. Journal of Computational and Theoretical Nanoscience, American Scientific
Publisher
Topic: Molecular and quantum processes in the brain and their inspiration for
novel neural network models and applications
Neural Computing and Applications
Topic: To be announced
More special issues in high quality journals will be announced shortly at the
conference website.

CALL FOR SPECIAL SESSIONS
Proposals are solicited for ICONIP'09 special sessions. The special sessions
will consist of both invited and contributed papers. In addition to the core
fields of neural information processing, specific areas such as cognitive
modeling, computational neuroscience, bioinformatics, computer vision,
financial applications, and so on, are strongly encouraged. All accepted
papers will appear in the ICONIP'09 conference proceedings. Each proposal for
special sessions should include the following information:
* Title of the special session
* Special session organizer and affiliation
* Subject areas to be covered by the special session
* Potential authors
Important Dates:
Deadline for special session submission: June 1, 2009
Notification of acceptance: June 15, 2009
Deadline for special session papers: July 1, 2009
Notification of acceptance: August 1, 2009
Camera-ready manuscript and pre-registration: September 1, 2009
The proposal should be submitted to one of the following Special Sessions Chairs:
Masumi Ishikawa (ishikawa [at] brain.kyutech.ac.jp)
Tom Gedeon (tom [at] cs.anu.edu.au)
Shaoning Pang (spang [at] aut.ac.nz)
SPAM from bad IEEE, SPAM from bad IEEE, SPAM from bad IEEE, SPAM from bad IEEE


CALL FOR TUTORIAL PROPOSALS
The ICONIP'09 Organizing Committee invites proposals for tutorials to be
heldimmediately preceding the main program of the conference. The tutorials
should provide in-depth coverage to topics of current interest in neural
information processing, including computational intelligence and the
computational modeling of neural and cognitive function.
Proposals for tutorials should be submitted in electronic form (Word or pdf)
by May 15, 2009 to the Tutorials Chair, Kevin Wong (k.wong [at] murdoch.edu.au).

CALL FOR COMPETITIONS
ICONIP'09 will feature several competitions where neural information
processing will be compared with traditional or other alternative methods for
solving computationally-intensive practical problems. Proposals should be
submitted to John Sum, Competitions Chair (pfsum [at] nchu.edu.tw) by May 31,
2009.
Decision on the competition proposals will be made by June 30, 2009.
Best competition results will be considered for inclusion in an ICONIP'09
Special Issue. Details will be provided later on at the ICONIP'09 competition
site.
Stay tuned for more details to come.

POST-CONFERENCE WORKSHOPS
There is currently one confirmed post ICONIP'09 conference workshop at Kuala
Lumpur, Malaysia, to be held on December 7, 2009:
Workshop on Advances in Intelligent Computing (http://waic09.utar.edu.my/)
Please direct your inquiries to the Workshops Chairs, Lai Weng Kin (lai [at]
mimos.my) or C. P. Lim (cplim [at] eng.usm.my).

=========================================================

#########################################################
End of Electronic Letter
#########################################################

UNSUBSCRIBE: After 24 hours from now, you can click the following link if you want to unsubscribe from the E-letter mailing list.
http://tiger.ece.stevens-tech.edu/cgi-bin/unsubscribe.cgi?email=XXXXXXXXX

May 07, 2009

"Schlangemann" attacked again the IEEE Conferences in May 2009 and published 3 fake papers in an IEEE pseudo-paper accepted at IEEE again (May 2009)

Fake paper accepted at IEEE

I couldn't lay my hands on the complete text
but here is an excerpt :

We proved in this paper that the acclaimed real-time algorithm for the evaluation of the Internet by Williams and Kobayashi is Turing complete, and Toe is no exception to that rule. We constructed a game-theoretic tool for synthesizing Scheme (Toe), which we used to verify that the location-identity split and superblocks can synchronize to achieve this ambition.

And, here is the summary:
Recent advances in cooperative technology and classical communication are based entirely on the assumption that the Internet and active networks are not in conflict with object-oriented languages. In fact, few information theorists would disagree with the visualization of DHTs that made refining and possibly simulating 8 bitarchitectures a reality, which embodies the compelling principles of electrical engineering. In this work we better understand how digital-to-analog converters can be applied to the development of e-commerce.
Read more here.

Also:

A prankster who submitted a computer-generated research paper to the International Conference on Computer Science and Software Engineering discovered that not only was his fake paper accepted - its "author" is to chair a panel.

The prankster, known only by his pseudonym Schlangemann (which he used to submit the paper), created the paper using SCIGen - the automatic CS paper generator. His pseudonym is taken from a German movie called Der Schlangemann.

"Schlangemann" attacked again the IEEE Conferences in May 2009
and published 3 fake papers in an IEEE pseudo-Conference in Australia

Recent advances in cooperative technology and classical communication are based entirely on the assumption that the Internet and active networks are not in conflict with object-oriented languages. In fact, few information theorists would disagree with the visualization of DHTs that made refining and possibly simulating 8 bitarchitectures a reality, which embodies the compelling principles of electrical engineering. In this work we better understand how digital-to-analog converters can be applied to the development of e-commerce.

March 30, 2009

One more conference of IEEE that has accepted bogus papers

One more conference of IEEE that has accepted several bogus papers without review.
Why doesn't the IEEE stop the Fraud and the scam
We contacted the IEEE CS and they told us that they will receive about 19000 USD
for the Conference Proceedings. It is a good business!

So, they continue giving the name of IEEE to dubious conferences....



ICHIT 2009

International Conference on Convergence and Hybrid Information Technology
(ICHIT 2009)
http://www.ichit2009.org

August 27th ~ 29th, 2009, Daejeon, Korea


Download Call for Workshop : [PDF] [DOC]

ICHIT is the most comprehensive conference focused on the various aspects of advances in Convergence and Hybrid Information Technology. All research results about the current and emerging areas of technology and other states trends to ensure efficient and cost effective deployment of governmental or commercial services, reduce the risks of innovation through IT analysis may be presented in this conference.

�� Conference Topics

The conference invites new and original submissions addressing theoretical and practical topics in information technology and intelligent computing fields including (but not limited to these topics):

1. Bioinformatics and Computational Biology
2. Communications and Networking
3. Data Mining and Pattern Recognition
4. Grid and Distributed Computing
5. Intelligent Robotics and Autonomous Agents
6. Hardware and Software Design
7. Health and Medical Informatics
8. Learning Systems and Smart Card Technology
9. Human-Computer Interaction and Multimedia
10. Image and Signal Processing
11. Convergence in technology and evaluations
12. Convergence in Network and Intelligent systems
13. Convergence in Service and Management
14. Industrial and Environmental Engineering
15. Security and Safety Systems
16. KDD and Data Warehousing
17. Multi-Scale Modeling and Simulation
18. Ubiquitous Computing and Embedded Systems

Please Note: We welcome hybrid solutions, convergence solutions and combining some of the above topics in applications.

�� Call for Workshop and Special Session Proposals

ICHIT 2009 workshop and special sessions will provide the participants with opportunities to discuss and explore interesting areas of Information Technologies and Services with researchers, and practitioners.
http://www.ichit2009.org/callforsession.asp

�� Paper Type

Paper Types: Full paper(8 pages)/ Short paper(4 pages)
Presentation Types: Oral/ Post (Choice)
Track Types: Research Track/ Technical Experience Track

�� Important Dates

Submission of papers : April 20, 2009
Notification of acceptance : May 10, 2009
Camera ready submission: May 31, 2009
Registration due : June,20, 2008

�� Paper Submission and Publication

- All accepted papers will be included in the conference proceedings with IEEE CS (indexed by EI).
- Please use IEEE CS paper format (8.5�� x 11��, two-column, see IEEE CS Author Resources page).
- Click Here to download the format : MS-WORD, PDF or LaTeX)
-Distinguished papers accepted and presented in ICHIT2008, after further revisions, will be published in special issues of some prestigious international journals and journals indexed by SCI(E).
- Paper Submission : You can submit your paper using E-mail or web submission system.
1) E-mail submission : ichit@ichit2009.org
2) Web Submission :

�� Contact Information

If you have any question about the CfP and papers submission, please email to Secretariat of ICHIT2009

January 21, 2009

I recommend my students no to go to IEEE Conferences

I recommend my students no to go to IEEE Conferences

Many Thanks

Gerald Schmieder

schmieder@gauss.mathematik.uni-oldenburg.de




I recommend my students no to go to IEEE Conferences

Many Thanks

Gerald Schmieder

schmieder@gauss.mathematik.uni-oldenburg.de




See please: http://en.wikipedia.org/wiki/SCIgen

Except WMSCI many fake papers appeared recently in several IEEE conferences, because the IEEE grants its name and its logo to many local organizers that without any review process http://iaria-highsci.blogspot.com/, without reading any of the submitted papers http://anti-ieee.blogspot.com/. It is being argued that such conferences only exist to make money out of researchers that are looking for a simple way to publish their work http://bogus-conferences.blogspot.com Suddenly new publishers appeared like IARIA, http://www.iaria.org and HIGHSCI http://www.highsci.org. As seen from their web sites, IARIA and HIGHSCI use the name of IEEE and the IEEE publishing services, thus attracting numerous papers. Some people to test some conference go further and sent the paper "A Statistical Method For Women That Can Help Our Sexual Education" in the IEEE Conference organized by IARIA. This paper receive automatical acceptance within a few hours with simultaneus "command" of direct payment. Unfortunately this paper was not published because the authors did not pay the registration fee. However the letter of acceptance is published on the web and anybody can check it: http://iaria-highsci.blogspot.com/

BLACK LIST of Conferences and Journals

BLACK LIST of Conferences and Journals

1. Any International Conference organized and any Journal issued IASTED. Many papers in the IASTED conferences were ridiculous caricatures, years ago before the MIT papers’ engine appeared. In 1987, as you remember two Professors from a small university in Japan, riduculed Dr. M. Hamza and IASTED. The anti-plagiarism.org tested the IASTED by sending to them 3 randomly generated talks and — unfortunately they have been accepted in IASTED Conferences. It is also well known that IASTED, Dr. Hamza, is a profit making company.

IASTED people (Dr. Hamza –the Chief, Dr. Uskov, Dr. Bourkas, Dr. Angel De Pobil) bomb us with thousand of emails (SPAM) each week.

See the links

a. IASTED for Profit Making -1

b. IASTED for Profit Making -2

c. IASTED for Profit Making -3 (Black List of Professors- IASTED Staff) d. IASTED for Profit Making -4

e. http://pdos.csail.mit.edu/scigen

f. http://anthony.liekens.net/index.php/Misc/FakeConferences

g. http://itre.cis.upenn.edu/~myl/languagelog/archives/002067.html

j. http://3dpancakes.typepad.com/ernie/2005/04/sci_followup.html

k. http://www.scs.cs.nyu.edu/~dm/remove.pdf

l. http://www.physics.nyu.edu/faculty/sokal/


2. Any International Conference organized by WESSEX INSTITUTE of TECHNOLOGY that means any International Conference organized by “Prof. Carlos Brebbia”. The papers of Professor Carlos Brebbia have been checked from the Technical University of Vienna, Austria and they are fraud- papers. See the links below. For the terrific academic frauds and lies of “Prof. Carlos Brebbia”, see:

a. http://www.cg.tuwien.ac.at/~wp/videa.html

b. http://www.cg.tuwien.ac.at/~wp/videa-paper-2.html

c. http://pdos.csail.mit.edu/scigen


3. Any International Conference organized and any Journal issued by GESTS that means any International Conference organized by “Myungjin BAE”.

People from MIT have tested them also. Also Martin Ziegler have tested them. See this link. The anti-plagiarism.org tested also the GESTS Conferences by sending to Myungjin Bae two pseudo-papers from the MIT pseudo-papers’ generator http://pdos.csail.mit.edu/scigen and Myungjin Bae has accepted each of them immediately with “warm congratulations”.

Totally: 6 different cases of false papers and they published all !!!

Myungjin BAE uses also some names like K.Y. Lee, H.S. Hong, J.A. Choi and J.H. Lee. We do not think that these names exist really. The only real name is Myungjin BAE. The names K.Y. Lee, H.S. Hong, J.A. Choi and J.H. Lee are simply nick-names of Myungjin BAE and of his GESTS. For the terrific academic frauds and lies of Myungjin BAE, i.e. “Prof. Bae”, see:

a. gests.htm

b. http://anthony.liekens.net/index.php/Misc/FakeConferences

c. http://pdos.csail.mit.edu/scigen

d. http://www.inesc-id.pt/~aml/trash.html

e. www.ece.ubc.ca/~phillipj/blog/archives/2005/05/paper_accepted.html


4. Any International Conference organized and any Journal issued by IPSI. That means any International Conference organized by “Prof. Veljko Milutinovic”. Veljiko Milutinovic has accepted 5 stupid papers from the MIT papers’ generator machine. 2 of them was sent by www.anti- plagiarism.org and other 3 by: Mathias Uslar, Vincenzo Della Mea, Teemu Hukkanen. See this link. The anti-plagiarism.org tested also the IPSI Conferences by sending to Veljko Milutinovic 2 pseudo-papers from the MIT generator for pseudo-papers http://pdos.csail.mit.edu/scigen and Veljko Milutinovic accepted each of them (2 different cases of false papers). Totally for these fakes conferences we known that they have accepted 5 randomly generated papers from the MIT machine. For the terrific academic frauds and lies of “Prof. Veljko Milutinovic”, see:

a. http://anthony.liekens.net/index.php/Misc/FakeConferences

b. http://www.inesc-id.pt/~aml/trash.html

c. http://pdos.csail.mit.edu/scigen


5. Any International Conference organized and any Journal issued by the so-called “International Society of Computer Science” We have tested these sin guys by sending 3 pseudo-papers also to them.

They accepted after 1 (one) day and sent us immediately instructions of how to send them our money (registration) to Turkey. Another person that tested them was: Raul Soff .See this link. This company is located in Turkey, but they have made terrific frauds also and several universities in Europe, Asia and USA added them in a black list. Now, they changed the name of their scam to “International Society of Computer Science” and “International Journal of Computer Science” because as “Enformatika” they could not sell any longer. Be aware of the pseudo-conferences of the turkish company: Enformatika.

See:

a. http://anthony.liekens.net/index.php/Misc/FakeConferences

b. http://pdos.csail.mit.edu/scigen

c. http://www.inesc-id.pt/~aml/trash.html


6. Any International Conference organized by the so called Academy of Science of Hamid R. Arabnia. That means any International Conference organized by “Hamid R. Arabnia”.

Hamid Arabnia organizes 28 conferences simultaneously without reviewers and send thousand of emails (spam) to people that start:

“Congratulations! Your papers have been accepted” without having sent any paper to him. Who check the quality of these conferences?

Hamid Arabnia was one of the first that checked for his fake papers from MIT papers’ engine. Of course, the test from the anti- plagiarism.org in the case of Hamid Arabnia was … positive. He accepted 2 stupid papers with big honors!

For the terrific academic frauds and lies of “Prof. Hamid R. Arabnia”, see:

a. http://www.csam.ucl.ac.be/~gevers/

b. http://pdos.csail.mit.edu/scigen

c. http://www.inesc-id.pt/~aml/trash.html