Issue 5 • Date Sept. 2010
Table of contentsPublication Year: 2010, Page(s): C1| PDF (35 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication informationPublication Year: 2010, Page(s): C2| PDF (37 KB)
Cited by: Papers (66)
Surveillance systems provide the capability of collecting authentic and purposeful information and forming appropriate decisions to enhance safety. This paper reviews concisely the historical development and current state of the three different generations of contemporary surveillance systems. Recently, in addition to the employment of the incessantly enlarging variety of sensors, the inclination ... View full abstract»
Cited by: Papers (36)
Since the first introduction of anomaly-based intrusion detection to the research community in 1987, the field has grown tremendously. A variety of methods and techniques introducing new capabilities in detecting novel attacks were developed. Most of these techniques report a high detection rate of 98% at the low false alarm rate of 1%. In spite of the anomaly-based approach's appeal, the industry... View full abstract»
Cited by: Papers (12)
This paper presents an artificial ant colony approach to distributed sensor wakeup control (SWC) in wireless sensor networks (WSN) to accomplish the joint task of surveillance and target tracking. Each sensor node is modeled as an ant, and the problem of target detection is modeled as the food locating by ants. Once the food is found, the ant will release pheromone. The communication, invalidation... View full abstract»
Cited by: Papers (5)
The Tor network is a widely deployed anonymity system on the Internet used by thousands of users every day. A basic monitoring system has been designed and implemented to allow long-term statistics, provide feedback to the interested user, and detect certain attacks on the network. The implementation has been added to TorStatus, a project to display the current state of the Tor network. During a p... View full abstract»
An AdaptivePublication Year: 2010, Page(s):547 - 556
Cited by: Papers (15)
Balancing between exploration and exploitation with adaptation of the Q-learning (QL) parameters to the condition of dynamic uncertain environment has always been a significant subject of interest in the context of reinforcement learning. The peculiarities of the electricity market have provided such complex dynamic economic environment, and consequently have increased the requirement for a... View full abstract»
Cited by: Papers (14)
Most recommendation algorithms attempt to alleviate information overload by identifying which items a user will find worthwhile. Content-based (CB) filtering uses the features of items, whereas collaborative filtering (CF) relies on the opinions of similar customers to recommend items. In addition to these techniques, hybrid methods have also been suggested to improve the performance of recommenda... View full abstract»
Cited by: Papers (10)
Due to the ubiquity of the Internet and wireless networks, the development of electronic commerce is growing up rapidly. Many payment mechanisms, such as electronic cash (e-cash), credit cards, and electronic wallets, for electronic transactions have been proposed. Especially, e-cash has become popular since it can fully protect the privacy of customers in various electronic transactions. In gener... View full abstract»
Incremental Embedding and Learning in the Local Discriminant Subspace With Application to Face RecognitionPublication Year: 2010, Page(s):580 - 591
Cited by: Papers (15)
Dimensionality reduction and incremental learning have recently received broad attention in many applications of data mining, pattern recognition, and information retrieval. Inspired by the concept of manifold learning, many discriminant embedding techniques have been introduced to seek low-dimensional discriminative manifold structure in the high-dimensional space for feature reduction and classi... View full abstract»
Age-Related Physical and Emotional Characteristics to Safety Warning Sounds: Design Guidelines for Intelligent VehiclesPublication Year: 2010, Page(s):592 - 598
Cited by: Papers (7)
Recent technological advances have made motor vehicles more intelligent to increase safety and comfort. An intelligent vehicle provides drivers with safety warning information through audible sounds, visual displays, and tactile feedback. However, elderly drivers often have decreased cognitive and psychomotor abilities in the areas such as hearing, eyesight, short-term memory, and spatial percepti... View full abstract»
Special issue on engineering applications of memetic computingPublication Year: 2010, Page(s): 599| PDF (177 KB)
Proven powerful [advertisement]Publication Year: 2010, Page(s): 600| PDF (188 KB)
IEEE Systems, Man, and Cybernetics Society InformationPublication Year: 2010, Page(s): C3| PDF (29 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authorsPublication Year: 2010, Page(s): C4| PDF (36 KB)
Aims & Scope
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)