By Topic

Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on

Issue 6 • Date Nov. 2008

Filter Results

Displaying Results 1 - 24 of 24
  • Table of contents

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information

    Publication Year: 2008 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Beyond Traditional Kernels: Classification in Two Dissimilarity-Based Representation Spaces

    Publication Year: 2008 , Page(s): 729 - 744
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (629 KB) |  | HTML iconHTML  

    Proximity captures the degree of similarity between examples and is thereby fundamental in learning. Learning from pairwise proximity data usually relies on either kernel methods for specifically designed kernels or the nearest neighbor (NN) rule. Kernel methods are powerful, but often cannot handle arbitrary proximities without necessary corrections. The NN rule can work well in such cases, but s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Business Process Intelligence System for Enterprise Process Performance Management

    Publication Year: 2008 , Page(s): 745 - 756
    Cited by:  Papers (25)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (457 KB) |  | HTML iconHTML  

    Business process management systems traditionally focused on supporting the modeling and automation of business processes, with the objective of enabling fast and cost-effective process execution. As more and more processes become automated, customers become increasingly interested in managing process execution. This paper presents a set of concepts and a methodology toward business process intell... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability-Constrained Optimum Placement of Reclosers and Distributed Generators in Distribution Networks Using an Ant Colony System Algorithm

    Publication Year: 2008 , Page(s): 757 - 764
    Cited by:  Papers (26)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (293 KB) |  | HTML iconHTML  

    Optimal placement of protection devices and distributed generators (DGs) in radial feeders is important to ensure power system reliability. Distributed generation is being adopted in distribution networks with one of the objectives being enhancement of system reliability. In this paper, an ant colony system algorithm is used to derive the optimal recloser and DG placement scheme for radial distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Short-Term Schedulability Analysis of Crude Oil Operations in Refinery With Oil Residency Time Constraint Using Petri Nets

    Publication Year: 2008 , Page(s): 765 - 778
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    A short-term schedule for oil refinery should arrange all the activities in every detail for the whole scheduling horizon, leading to a complex problem. There lacks efficient techniques and software tools for its solution applicable to industrial oil refinery. Considering that the feasibility of a schedule is essential, this paper studies the feasibility problem from a control perspective. A short... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Did the California Electricity Crisis Occur?: A Numerical Analysis Using a Multiagent Intelligent Simulator

    Publication Year: 2008 , Page(s): 779 - 790
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (704 KB) |  | HTML iconHTML  

    During the summer of 2000, wholesale electricity prices in California were approximately 500% higher than those during the same months in 1998-1999. The price hike was unexpected by many policy makers and individuals who were involved in the electric utility industry. They have been long wondering whether the electricity deregulation policy (1996) produced benefits of competition promised to consu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine Vision/GPS Integration Using EKF for the UAV Aerial Refueling Problem

    Publication Year: 2008 , Page(s): 791 - 801
    Cited by:  Papers (8)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (749 KB) |  | HTML iconHTML  

    The purpose of this paper is to propose the application of an extended Kalman filter (EKF) for the sensors fusion task within the problem of aerial refueling for unmanned aerial vehicles (UAVs). Specifically, the EKF is used to combine the position data from a global positioning system (GPS) and a machine vision (MV)-based system for providing a reliable estimation of the tanker-UAV relative posit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid System Integrating a Wavelet and TSK Fuzzy Rules for Stock Price Forecasting

    Publication Year: 2008 , Page(s): 802 - 815
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1546 KB) |  | HTML iconHTML  

    The prediction of future time series values based on past and present information is very useful and necessary for various industrial and financial applications. In this study, a novel approach that integrates the wavelet and Takagi-Sugeno-Kang (TSK)-fuzzy-rule-based systems for stock price prediction is developed. A wavelet transform using the Haar wavelet will be applied to decompose the time se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications

    Publication Year: 2008 , Page(s): 816 - 826
    Cited by:  Papers (15)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    The keystroke patterns produced during typing have been shown to be unique biometric signatures. Therefore, these patterns can be used as digital signatures to verify the identity of computer users remotely over the Internet or locally at a specific workstation. In particular, keystroke recognition can enhance the username and password security model by monitoring the way that these ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the Parts Weight in Plastic Injection Molding Using Least Squares Support Vector Regression

    Publication Year: 2008 , Page(s): 827 - 833
    Cited by:  Papers (9)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (556 KB) |  | HTML iconHTML  

    To achieve the desired quality in plastic injection molding, advanced monitoring techniques are often recommended in the workshop. Unfortunately, the signal in plastic injection modeling process such as nozzle pressure that is relevant to part quality is not easy to obtain because of the cost of sensors. The sensor-based modeling idea is therefore adopted. In this paper, a new method for predictin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Layered Confabulation Architecture for an Artificial Creature's Behavior Selection

    Publication Year: 2008 , Page(s): 834 - 840
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (588 KB) |  | HTML iconHTML  

    This paper proposes a novel two-layered confabulation architecture for an artificial creature to select a proper behavior considering the internally generated will and the context of the external environment consecutively. The architecture is composed of seven main modules for processing perception, internal state, context, memory, learning, behavior selection, and actuation. The two-layered confa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "An Adaptive Multimodal Biometric Management Algorithm

    Publication Year: 2008 , Page(s): 841 - 843
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    We note that there are some discrepancies in the results reported in the previous titled paper. Our experiments indicate that the authors have considered only a subset of all possible fusion rules, contradicting the statement that all possible rules have been considered. Moreover, the authors state that only monotonic rules can be optimal, and therefore, all other rules can be ignored. However, ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision-Based Grasp Tracking for Planar Objects

    Publication Year: 2008 , Page(s): 844 - 849
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (565 KB) |  | HTML iconHTML  

    In robotics, the manipulation of a priori unknown objects involves several steps and problems that must be carefully considered and solved by proper planning and control algorithms. For example, once suitable contact points have been computed, the control system should be able to track them in the approach phase, i.e., while the relative position/orientation of the object and the gripper of the ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews information for authors

    Publication Year: 2008 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • A Tool for the Accumulation and Evaluation of Multimodal Research

    Publication Year: 2008 , Page(s): 850 - 855
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (481 KB) |  | HTML iconHTML  

    A surge of interest exists in multimodal research and interfaces. This is due, at least in part, to an exponential increase in the amount and type of information that can be presented to a user. When a great deal of information is presented via a single sensory modality, it can exceed the operator's capacity to manage the information efficiently, generating cognitive overload. As a consequence, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Effective Alarms for Radiation Detection in Homeland Security Screening

    Publication Year: 2008 , Page(s): 856 - 860
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    In this correspondence, the human factors involved in the design of effective homeland security threat detection systems are described and illustrated for radiation portal monitor (RPM) systems deployed at U.S. ports of entry. Due to the occurrence of nuisance alarms based on naturally occurring radioactive material and the low base rate of nuclear smuggling incidents, it is shown that the probabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the Uncertainty on Location Estimation of Mobile Users to Support Hospital Work

    Publication Year: 2008 , Page(s): 861 - 866
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    The nature of a context-aware application in hospital work demands a reliable and accurate location system. The activity for which this location information is needed determines to a great extent the relevancy of this contextual variable, since a minor error in delivering patient-based information can be critical. In this correspondence, we present an enhanced technique to infer the location of us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Pattern Discovery in Graphs

    Publication Year: 2008 , Page(s): 867 - 872
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    In this correspondence, an efficient technique for detecting repeating patterns in a graph is described. For this purpose, the searching capability of evolutionary programming is utilized for discovering patterns that are often repeating in such structural data. The approach adopted in this correspondence is hierarchical in nature. Once a pattern is discovered in a particular level of the hierarch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviewers 2008

    Publication Year: 2008 , Page(s): 873 - 876
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • 2008 Index IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) Vol. 38

    Publication Year: 2008 , Page(s): 877 - 887
    Save to Project icon | Request Permissions | PDF file iconPDF ( KB)  
    Freely Available from IEEE
  • 2009 ICMLC ICWAPR

    Publication Year: 2008 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (633 KB)  
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2008 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors

    Publication Year: 2008 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE

Aims & Scope

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.

Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.

Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.

Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)