By Topic

Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on

Issue 3 • Date May 2010

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information

    Publication Year: 2010 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Grid Resource Negotiation: Survey and New Directions

    Publication Year: 2010 , Page(s): 245 - 257
    Cited by:  Papers (20)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    Since Grid computing systems involve large-scale resource sharing, resource management is central to their operations. Whereas there are more Grid resource management systems adopting auction, commodity market, and contract-net (tendering) models, this survey supplements and complements existing surveys by reviewing, comparing, and highlighting existing research initiatives on applying bargaining ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst Detection From Multiple Data Streams: A Network-Based Approach

    Publication Year: 2010 , Page(s): 258 - 267
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    Modeling and detecting bursts in data streams is an important area of research with a wide range of applications. In this paper, we present a novel method to analyze and identify correlated burst patterns by considering multiple data streams that coevolve over time. The main technical contribution of our research is the use of a dynamic probabilistic network to model the dependency structures obse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mathematical Programming Solution to the Mars Express Memory Dumping Problem

    Publication Year: 2010 , Page(s): 268 - 277
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (584 KB) |  | HTML iconHTML  

    The problem of computing a schedule of maximum robustness for the Mars Express mission is formulated and solved via linear programming (LP). We also provide a characterization of ??easy?? and ??difficult?? instances such that the former ones can be solved to optimality directly, without having recourse to any optimization algorithm. In both cases, provably optimal solutions are obtained in shorter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions

    Publication Year: 2010 , Page(s): 278 - 286
    Cited by:  Papers (32)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (811 KB) |  | HTML iconHTML  

    Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness against rotation, scaling, and translation, but few are resistant to cropping, nonisotropic scaling, random bending attacks (RBAs), and affine transformations. Seo and Yoo present a geometrically invariant image waterma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Text Classification With an Ensemble Kernel-Based Learning Approach

    Publication Year: 2010 , Page(s): 287 - 297
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (487 KB) |  | HTML iconHTML  

    Constructing a single text classifier that excels in any given application is a rather inviable goal. As a result, ensemble systems are becoming an important resource, since they permit the use of simpler classifiers and the integration of different knowledge in the learning process. However, many text-classification ensemble approaches have an extremely high computational burden, which poses limi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection

    Publication Year: 2010 , Page(s): 298 - 307
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (748 KB) |  | HTML iconHTML  

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number of file samples that need to be analyzed, named "gra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Networked Control Systems With Explicit Compensation for Time-Delay Variations

    Publication Year: 2010 , Page(s): 308 - 318
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    In this paper, the effects of network delay among interconnecting elements of a distributed computer network control system are analyzed. Experimental tests have been accomplished to show the influence of the combined effects of the network delay (between sensor/controller and controller/actuator) on the overall performance of a feedback control system. For this purpose, a proportional-plus-integr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Master Defect Record Retrieval Using Network-Based Feature Association

    Publication Year: 2010 , Page(s): 319 - 329
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (495 KB) |  | HTML iconHTML  

    As electronic records (e.g., medical records and technical defect records) accumulate, the retrieval of a record from a past instance with the same or similar circumstances, has become extremely valuable. This is because a past record may contain the correct diagnosis or correct solution to the current circumstance. We refer to the two records of the same or similar circumstances as master ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesis of Structurally Simple Supervisors Enforcing Generalized Mutual Exclusion Constraints in Petri Nets

    Publication Year: 2010 , Page(s): 330 - 340
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    Generalized mutual exclusion constraints (GMECs) are a typical class of specifications for the supervisory control of discrete event systems in a Petri net formalism. This paper classifies the given constraints into elementary and dependent ones according to the linear dependency of their characteristic transition vectors that indicate the token count change of the concerned places. The dependent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Control for Route Choice in Automated Baggage Handling Systems

    Publication Year: 2010 , Page(s): 341 - 351
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    State-of-the-art baggage handling systems transport luggage in an automated way using destination coded vehicles (DCVs). These vehicles transport the bags at high speeds on a network of tracks. Currently, the DCVs are routed through the system using routing schemes based on preferred routes. These routing schemes respond to the occurrence of predefined events. We do not consider such predefined pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel Equalization Using Neural Networks: A Review

    Publication Year: 2010 , Page(s): 352 - 357
    Cited by:  Papers (22)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (139 KB) |  | HTML iconHTML  

    Equalization refers to any signal processing technique used at the receiver to combat intersymbol interference in dispersive channels. This paper reviews the applications of artificial neural networks (ANNs) in modeling nonlinear phenomenon of channel equalization. The literature associated with different feedforward neural network (NN) based equalizers like multilayer perceptron, functional-link ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an Automatic Wood Types Classification System by Using Fluorescence Spectra

    Publication Year: 2010 , Page(s): 358 - 366
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (867 KB) |  | HTML iconHTML  

    The classification of wood types is needed in many industrial sectors, since it can provide relevant information concerning the features and characteristics of the final product (appearance, cost, mechanical properties, etc.). This analysis is typical in the furniture industries and the wood panel production. Usually, the analysis is performed by human experts, is not rapid, and has a nonuniform a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on semantics-enabled software engineering

    Publication Year: 2010 , Page(s): 367
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Special issue on engineering applications of memetic computing

    Publication Year: 2010 , Page(s): 368
    Save to Project icon | Request Permissions | PDF file iconPDF (177 KB)  
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2010 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors

    Publication Year: 2010 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE

Aims & Scope

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.

Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.

Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.

Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)