Call for Papers IEEE transactions on SMC: part C Special Issue on "Pattern Recognition Technologies for Anti-Terrorism Applications" The tragic events of September 11 in New York and the subsequent terrorist attacks around the world that aimed to inflict random and heavy casualties among non-combatants and for no reason other than causing death and mayhem. Modern terrorists have access to IT technologies, and to dual use materials that can be turned easily into crude, but nevertheless effective, weapons of mass murder. Traditional law enforcement technologies are becoming less than appropriate to deal with 21st century terrorists. Emerging counter-terrorism technologies are attracting significant attention as well as investment of time and effort among researchers and industrial developers. Pattern recognition plays an increasingly important role in the fight against modern form of global terrorism. Pattern recognition technologies can be used for surveillance, airport and border security, detection of hazardous chemicals in environment, are all but few examples. In recent years, there has been a rapid growth in the volume of publications on cutting edge pattern recognition and system integration technologies for anti-terrorism applications. The main aim of the proposed special issue is to promote further research on pattern recognition technologies to address the increasingly complex challenges that arise within the context of counter-Terrorism applications. It is hoped that the special issue will attract wide interest in the broader research communities spanning pattern recognition, image processing, behavior analysis, and other related areas. The topics to be considered include: * Automatic surveillance and analysis systems of terrorist activities * Explosives Detection * Human abnormal behavior understanding * Hazardous chemicals detection * Landmine Detection * Crime scene analysis * Detection of unattended packages * Biometrics * Weapon Detection * Ad hoc integrated network technologies for emergency responders. * Protection against Cyber-terrorism Manuscripts should conform to the standard guidelines of the IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, Part C. Instructions for formatting papers can be found in the "Guide for authors" at http://www.ieee.org/web/publications/authors/index.html. Prospective authors should submit an electronic copy of their complete manuscript to Dr. Jinshan Tang or one of the other Guest Editors. IMPORTANT DATES Manuscript submissions due: Jan. 1, 2010 First review completed: April 1, 2010 Revised manuscripts due: June 1, 2010 Second review completed: Sept. 1, 2010 Final manuscript due: Nov. 1, 2010 Planned publication: Spring 2011 GUEST EDITORS Dr. Sos Agaian, University of Texas at San Antonio mailto:Sos.Agaian@utsa.edu Dr. Jinshan Tang, Alcorn State University mailto:jtang@alcorn.edu Dr. Sabah Jassim, University of Buckingham mailto:sabah.jassim@buckingham.ac.uk Dr. Philip Chen, University of Texas at San Antonio mailto:Philip.Chen@utsa.edu Dr. Changshui Zhang, Tsinghua University mailto:zcs@mail.tsinghua.edu.cn Yongyan Cao, Wuhan University of Science and Technologies mailto:yongyancao@gmail.com