Issue 3 • Aug. 2003
In recent years, we have witnessed a rapidly growing role of the Internet that has already formed a conceptual backbone of the society in the information era. What becomes apparent and highly visible is a broad range of services and their enormous diversity being seamlessly available to those surfing cyberspace. The ongoing developments not only have enabled a different way of doing business but a... View full abstract»
Cited by: Papers (60)
In this paper, the use of a computational intelligence approach -a reinforcement learning algorithm (RLA)-for optimizing the routing in asynchronous transfer mode (ATM) networks based on the private network-to-network interface (PNNI) standard is proposed. This algorithm which is specially designed for the quality of service (QoS) routing problem, aims at maximizing the network revenue (allocating... View full abstract»
Cited by: Papers (21)
Active queue management (AQM) policies are those policies of router queue management that allow for the detection of network congestion, the notification of such occurrences to the hosts on the network borders, and the adoption of a suitable control policy. This paper proposes the adoption of a fuzzy proportional integral (FPI) controller as an active queue manager for Internet routers. The analyt... View full abstract»
Cited by: Papers (12)
Although evolutionary algorithm is a powerful optimization tool, its computation cost involved in terms of time and hardware resources increases as the size or complexity of the problem increases. One promising approach to overcome this limitation is to exploit the inherent parallelism of evolutionary algorithms by creating an infrastructure necessary to support distributed evolutionary computing ... View full abstract»
Cited by: Papers (10)
This paper analyzes and categorizes limitations and weaknesses of current Web-based educational technology, suggests the steps to overcome them, and presents a framework for developing next-generation Web-based educational systems. It suggests developing Web-based educational applications with more theory- and content-oriented intelligence, more semantic interoperation between two or more educatio... View full abstract»
Cited by: Papers (25)
Mobile agents can migrate among nodes to perform a set of management tasks at each of the visited nodes. Existing mobile agent-based network management systems often assume that their mobile agents are designed to work in particular networks to raise the efficiency of agent migration among multiple nodes. Unfortunately, such mobile agents cannot be reused in different networks. This paper proposes... View full abstract»
Cited by: Papers (6)
Developments toward ubiquitous and pervasive computing have lead to application scenarios where a large number of sensors and computing devices are connected to the network. These devices might constantly send status information via multicast to a number of applications or users. One big challenge in this environment is the amount of data traffic generated by such sensors, which depends on the siz... View full abstract»
Cited by: Papers (1)
Active networks present significant safety, security, and efficiency challenges. Domain-specific languages, i.e., languages providing only constructs relevant to a particular domain, provide a solution that balances these constraints. Safety and security can be ensured using verification techniques that exploit the restricted nature of such languages. Strategies have been developed for the compila... View full abstract»
Cited by: Papers (3)
Intellectual property protection of multimedia content is essential to the successful deployment of Internet content delivery platforms. There are two general approaches to multimedia copy protection: copy prevention and copy detection. Past experience shows that only copy detection based on mark embedding techniques looks promising. Multimedia fingerprinting means embedding a different buyer-iden... View full abstract»
Designing power aware self-reconfiguring topology for mobile wireless personal area networks using fuzzy logicPublication Year: 2003, Page(s):390 - 394
Cited by: Papers (8)
In mobile wireless personal area networks (WPAN), the position of each node changes over time. A network protocol that is able to dynamically update its links in order to maintain strong connectivity is said to be "self-reconfiguring." We propose a mobile wireless personal area networks (WPAN) design method with self-reconfiguring protocol for power efficiency. The WPAN is self-organized to cluste... View full abstract»
Cited by: Papers (3)
Over the last years, a number of mechanisms have been proposed for scheduling different types of traffic over base stations-oriented wireless and mobile systems. The majority of these mechanisms focus on access control in the base station-to-mobile units segment of the wireless and mobile system. Recent proposals for the unlicensed spectrum in the 5 GHz band have redefined the problem, since base ... View full abstract»
Cited by: Papers (11) | Patents (1)
In an integrated automation system a well-designed data model and computation model are required. For the engineering of such a system one often faces a challenge of finding the suitable computation elements defined in the computation model for the data defined in the data model, especially when the data model and the computation model are complex. In this paper we will use the ontology technology... View full abstract»
Cited by: Papers (5) | Patents (1)
Active networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This correspondence describes the design and implementation of a security architecture for the active network PLANet. Security is obtained with a two-level architecture that combines a functionally restricted packet language, PLAN, with an envir... View full abstract»
Aims & Scope
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)