Issue 4 • July 2010
Table of contentsPublication Year: 2010, Page(s): C1| |PDF (40 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication informationPublication Year: 2010, Page(s): C2| |PDF (37 KB)
The six papers in this special issue focus on availability, reliability, and security. Some of the topics covered include prevention of identity theft, biometric technology and authentication, and security considerations for RF identification. View full abstract»
Cited by: Papers (7) | Patents (1)
The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor v... View full abstract»
A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification SystemsPublication Year: 2010, Page(s):384 - 395
Cited by: Papers (35) | Patents (1)
The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependabi... View full abstract»
Cited by: Papers (3)
Model-driven approach has recently received much attention in developing secure software and systems. In addition, software developers have attempted to employ such an emerging approach in the early stage of software development life cycle. However, security concerns are rarely considered and practiced due to the lack of appropriate systematic mechanisms and tools. In this paper, we introduce a mu... View full abstract»
Cited by: Papers (33)
Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted ... View full abstract»
Cited by: Papers (50)
Nowadays, critical control systems are a fundamental component contributing to the overall performance of critical infrastructures in our society, most of which belong to the industrial sector. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This ... View full abstract»
Cited by: Papers (12)
We present a generalized cost model subject to random field environments with considerations of cost to remove failures during testing and warranty periods, and penalty cost due to the system failures. We also determine the optimal release time policies that minimize the expected system cost. Many scientific contributions have been developed in software reliability modeling, while none has studied... View full abstract»
Cited by: Papers (91)
The forecasting of electricity demand has become one of the major research fields in electrical engineering. Accurately estimated forecasts are essential part of an efficient power system planning and operation. In this paper, a modified version of the support vector regression (SVR) is presented to solve the load forecasting problem. The proposed model is derived by modifying the risk function of... View full abstract»
Cited by: Papers (4)
With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input-multi-output service. This paper describes two novel wireless/wired multipoint-to-multipoint multicast flow control schemes, which are based on the distributed self-tuning proportional integrative plus derivative (SPID... View full abstract»
Cited by: Papers (23)
This paper develops bidding strategy for operating multiunit pumped-storage power plant in a day-ahead electricity market. Based on forecasted hourly market clearing price, the objective is to self-schedule and maximize the expected profit of the pumped-storage plant, considering both spinning and nonspinning reserve bids and meeting the technical operating constraints. Evolutionary tristate parti... View full abstract»
Cited by: Papers (35)
Collaborative recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of collaborative recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy disclosure hazards during the merging process. This... View full abstract»
An Application of Reinforcement Learning for Efficient Spectrum Usage in Next-Generation Mobile Cellular NetworksPublication Year: 2010, Page(s):477 - 484
Cited by: Papers (17)
This paper proposes reinforcement learning as a foundational stone of a framework for efficient spectrum usage in the context of next-generation mobile cellular networks. The objective of the framework is to efficiently use the spectrum in a cellular orthogonal frequency-division multiple access network while unnecessary spectrum is released for secondary spectrum usage within a private commons sp... View full abstract»
A Service-Oriented Framework for Running Quantum Mechanical Simulations of Material Properties in a Grid EnvironmentPublication Year: 2010, Page(s):485 - 490
Cited by: Papers (1)
In this paper, a service-oriented framework for running quantum mechanical simulation of material properties over Grids is proposed, and a prototype framework has been developed. The framework consists of portal and workflow systems, a set of class libraries and application programming interfaces, defined service specifications, schemas, and configuration files. The framework can be instantiated t... View full abstract»
Special issue on engineering applications of memetic computingPublication Year: 2010, Page(s): 491| |PDF (177 KB)
Quality without compromise [advertisement]Publication Year: 2010, Page(s): 492| |PDF (324 KB)
IEEE Systems, Man, and Cybernetics Society InformationPublication Year: 2010, Page(s): C3| |PDF (29 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authorsPublication Year: 2010, Page(s): C4| |PDF (36 KB)
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)