By Topic

Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on

Issue 2 • Date March 2012

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Publication Year: 2012 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information

    Publication Year: 2012 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Understanding Plagiarism Linguistic Patterns, Textual Features, and Detection Methods

    Publication Year: 2012 , Page(s): 133 - 149
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2785 KB) |  | HTML iconHTML  

    Plagiarism can be of many different natures, ranging from copying texts to adopting ideas, without giving credit to its originator. This paper presents a new taxonomy of plagiarism that highlights differences between literal plagiarism and intelligent plagiarism, from the plagiarist's behavioral point of view. The taxonomy supports deep understanding of different linguistic patterns in committing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning Algorithms for Fuzzy Cognitive Maps—A Review Study

    Publication Year: 2012 , Page(s): 150 - 163
    Cited by:  Papers (16)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (582 KB) |  | HTML iconHTML  

    This study presents a survey on the most recent learning approaches and algorithms that are related to fuzzy cognitive maps (FCMs). FCMs are cognition fuzzy influence graphs, which are based on fuzzy logic and neural network aspects that inherit their main advantages. They gained momentum due to their dynamic characteristics and learning capabilities. These capabilities make them essential for mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single RFID Tag Ownership Transfer Protocols

    Publication Year: 2012 , Page(s): 164 - 173
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1032 KB) |  | HTML iconHTML  

    Security/privacy issues are of paramount importance for widespread acceptance and use of radio-frequency identification (RFID) tags. Over the last few years, researchers have addressed this issue through lightweight cryptographic means. While a majority of existing RFID security/privacy protocols address authentication issues, the ability to change as well as share ownership of these tagged object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiobjective Optimization Approach for Sensor Arrangement in A Complex Indoor Environment

    Publication Year: 2012 , Page(s): 174 - 186
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1652 KB) |  | HTML iconHTML  

    Various meta-heuristic search methods have been employed to resolve the sensor arrangement problem, which is a type of NP-hard, combinational problem. However, the difficulty of weight tuning, when formulating a single objective function, is the chief obstacle to the use of the single-objective optimization methods. Although multiobjective optimization methods have been applied recently to avoid t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems

    Publication Year: 2012 , Page(s): 187 - 200
    Cited by:  Papers (4)
    Multimedia
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1128 KB)  

    The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of software. Among the different challenges in software security, the problem of remote-code integrity verification is still waiting for efficient so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience Replay for Real-Time Reinforcement Learning Control

    Publication Year: 2012 , Page(s): 201 - 212
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1358 KB) |  | HTML iconHTML  

    Reinforcement-learning (RL) algorithms can automatically learn optimal control strategies for nonlinear, possibly stochastic systems. A promising approach for RL control is experience replay (ER), which learns quickly from a limited amount of data, by repeatedly presenting these data to an underlying RL algorithm. Despite its benefits, ER RL has been studied only sporadically in the literature, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services

    Publication Year: 2012 , Page(s): 213 - 222
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (583 KB) |  | HTML iconHTML  

    In this study, an application that allows a mobile phone to be used as a biometric-capture device is shown. The main contribution of our proposal is that this capture, and later recognition, can be performed during a standard web session, using the same architecture that is used in a personal computer (PC), thus allowing a multiplatform (PC, personal digital assistant (PDA), mobile phone, etc.) bi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Automated Definition Acquisition From Operations Law

    Publication Year: 2012 , Page(s): 223 - 232
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (906 KB) |  | HTML iconHTML  

    Definition acquisition is a necessary step in building an artificial cognitive assistant that helps military personnel to gain fast and precise understanding of the various terms and procedures defined in applicable legal documents. We approach the task of identifying definitional sentences from operations law documents by formalizing this task as a sentence-classification task and solving it by u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wave Probabilistic Functions for Quantum Cybernetics

    Publication Year: 2012 , Page(s): 233 - 240
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    This paper presents the theory of wave probabilistic models, which in turn represents the basic principles of quantum cybernetics. The features of the theory presented here are mathematically formulated, and selected illustrative examples demonstrate possible applications of the theory. The proposed methodology represents an original approach that emerges from defined assumptions like single-value... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Simulations of a Humanoid Robot Capable of Walking Like Fashion Models

    Publication Year: 2012 , Page(s): 241 - 248
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (541 KB) |  | HTML iconHTML  

    Conventional humanoid robots are unable to exhibit the kind of rolling movements at the waist and the body trunk stereotypically associated with the walking style of adult females. For example, a conventional robot cannot perform the walk known as “the catwalk” commonly seen in fashion shows. We developed a control method that allows a realistically simulated adult-size humanoid robo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intruder Detection: An Optimal Decision Analysis Strategy

    Publication Year: 2012 , Page(s): 249 - 253
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    This study considers a situation in which a sensor network aims to protect a stationary target (e.g., a large battleship at anchor) and detects signals from approaching objects (e.g., small boats traveling in a harbor). Once the network detects a sufficient number of signals from the object (for example, through video surveillance), it may classify the object's intention as hostile and act accordi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing the Vehicle Routing Problem With Time Windows: A Discrete Particle Swarm Optimization Approach

    Publication Year: 2012 , Page(s): 254 - 267
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1288 KB) |  | HTML iconHTML  

    Vehicle routing problem with time windows (VRPTW) is a well-known NP-hard combinatorial optimization problem that is crucial for transportation and logistics systems. Even though the particle swarm optimization (PSO) algorithm is originally designed to solve continuous optimization problems, in this paper, we propose a set-based PSO to solve the discrete combinatorial optimization problem VRPTW (S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive UHF RFID-Based Localization Using Detection of Tag Interference on Smart Shelf

    Publication Year: 2012 , Page(s): 268 - 275
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1358 KB) |  | HTML iconHTML  

    In this paper, we present a novel radio-frequency identification (RFID) smart shelf that accurately locates tagged objects using standard passive UHF RFID tags. This standard-based commercial off-the-shelf approach provides significant advantages over custom HF RFID and other near-field RFID approaches, including reduced tag costs, minimal infrastructure costs, and simple operation. In order to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Foundation [advertisement]

    Publication Year: 2012 , Page(s): 276
    Save to Project icon | Request Permissions | PDF file iconPDF (320 KB)  
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2012 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews information for authors

    Publication Year: 2012 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE

Aims & Scope

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.

Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.

Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.

Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)