By Topic

IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)

Issue 5 • Date Sept. 2010

Filter Results

Displaying Results 1 - 15 of 15
  • Table of contents

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information

    Publication Year: 2010, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Survey on Contemporary Remote Surveillance Systems for Public Safety

    Publication Year: 2010, Page(s):493 - 515
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    Surveillance systems provide the capability of collecting authentic and purposeful information and forming appropriate decisions to enhance safety. This paper reviews concisely the historical development and current state of the three different generations of contemporary surveillance systems. Recently, in addition to the employment of the incessantly enlarging variety of sensors, the inclination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

    Publication Year: 2010, Page(s):516 - 524
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Since the first introduction of anomaly-based intrusion detection to the research community in 1987, the field has grown tremendously. A variety of methods and techniques introducing new capabilities in detecting novel attacks were developed. Most of these techniques report a high detection rate of 98% at the low false alarm rate of 1%. In spite of the anomaly-based approach's appeal, the industry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks

    Publication Year: 2010, Page(s):525 - 538
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    This paper presents an artificial ant colony approach to distributed sensor wakeup control (SWC) in wireless sensor networks (WSN) to accomplish the joint task of surveillance and target tracking. Each sensor node is modeled as an ant, and the problem of target detection is modeled as the food locating by ants. Once the food is found, the ant will release pheromone. The communication, invalidation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System

    Publication Year: 2010, Page(s):539 - 546
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    The Tor network is a widely deployed anonymity system on the Internet used by thousands of users every day. A basic monitoring system has been designed and implemented to allow long-term statistics, provide feedback to the interested user, and detect certain attacks on the network. The implementation has been added to TorStatus, a project to display the current state of the Tor network. During a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Q -Learning Algorithm Developed for Agent-Based Computational Modeling of Electricity Market

    Publication Year: 2010, Page(s):547 - 556
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Balancing between exploration and exploitation with adaptation of the Q-learning (QL) parameters to the condition of dynamic uncertain environment has always been a significant subject of interest in the context of reinforcement learning. The peculiarities of the electricity market have provided such complex dynamic economic environment, and consequently have increased the requirement for a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Recommendation Method with Reduced Data for Large-Scale Application

    Publication Year: 2010, Page(s):557 - 566
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Most recommendation algorithms attempt to alleviate information overload by identifying which items a user will find worthwhile. Content-based (CB) filtering uses the features of items, whereas collaborative filtering (CF) relies on the opinions of similar customers to recommend items. In addition to these techniques, hybrid methods have also been suggested to improve the performance of recommenda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment

    Publication Year: 2010, Page(s):567 - 579
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB) | HTML iconHTML

    Due to the ubiquity of the Internet and wireless networks, the development of electronic commerce is growing up rapidly. Many payment mechanisms, such as electronic cash (e-cash), credit cards, and electronic wallets, for electronic transactions have been proposed. Especially, e-cash has become popular since it can fully protect the privacy of customers in various electronic transactions. In gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental Embedding and Learning in the Local Discriminant Subspace With Application to Face Recognition

    Publication Year: 2010, Page(s):580 - 591
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Dimensionality reduction and incremental learning have recently received broad attention in many applications of data mining, pattern recognition, and information retrieval. Inspired by the concept of manifold learning, many discriminant embedding techniques have been introduced to seek low-dimensional discriminative manifold structure in the high-dimensional space for feature reduction and classi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Age-Related Physical and Emotional Characteristics to Safety Warning Sounds: Design Guidelines for Intelligent Vehicles

    Publication Year: 2010, Page(s):592 - 598
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB) | HTML iconHTML

    Recent technological advances have made motor vehicles more intelligent to increase safety and comfort. An intelligent vehicle provides drivers with safety warning information through audible sounds, visual displays, and tactile feedback. However, elderly drivers often have decreased cognitive and psychomotor abilities in the areas such as hearing, eyesight, short-term memory, and spatial percepti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on engineering applications of memetic computing

    Publication Year: 2010, Page(s): 599
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Proven powerful [advertisement]

    Publication Year: 2010, Page(s): 600
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2010, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors

    Publication Year: 2010, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE

Aims & Scope

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.

Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.

Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.

Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)