Volume 41 Issue 5 • Sept. 2011
Filter Results
-
Table of contents
Publication Year: 2011, Page(s): C1
|
PDF (83 KB)
-
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information
Publication Year: 2011, Page(s): C2
|
PDF (37 KB)
-
Guest Editorial Introduction to the Special Issue on Pattern Recognition Technologies for Anti-Terrorism Applications
Publication Year: 2011, Page(s):561 - 564The five papers in this special issue focus on pattern recognition technologies for anti-terrorism applications. View full abstract»
-
Robust Detection of Abandoned and Removed Objects in Complex Surveillance Videos
Publication Year: 2011, Page(s):565 - 576
Cited by: Papers (92) | Patents (3)Tracking-based approaches for abandoned object detection often become unreliable in complex surveillance videos due to occlusions, lighting changes, and other factors. We present a new framework to robustly and efficiently detect abandoned and removed objects based on background subtraction (BGS) and foreground analysis with complement of tracking to reduce false positives. In our system, the back... View full abstract»
-
Combining Perceptual Features With Diffusion Distance for Face Recognition
Publication Year: 2011, Page(s):577 - 588
Cited by: Papers (18)Face recognition and identification is a very active research area nowadays due to its importance in both human computer and social interaction. Psychological studies suggest that face recognition by human beings can be featural, configurational, and holistic. In this paper, by incorporating spatially structured features into a histogram-based face-recognition framework, we intend to pursue consis... View full abstract»
-
Scene Analysis for Object Detection in Advanced Surveillance Systems Using Laplacian Distribution Model
Publication Year: 2011, Page(s):589 - 598
Cited by: Papers (32)In this paper, we propose a novel background subtraction approach in order to accurately detect moving objects. Our method involves three important proposed modules: a block alarm module, a background modeling module, and an object extraction module. The block alarm module efficiently checks each block for the presence of either a moving object or background information. This is accomplished by us... View full abstract»
-
Enhancing Identity Prediction Using a Novel Approach to Combining Hard- and Soft-Biometric Information
Publication Year: 2011, Page(s):599 - 607
Cited by: Papers (12)The effectiveness with which individual identity can be predicted in, for example, an antiterrorist scenario can benefit from seeking a broad base of identity evidence. The issue of improving performance can be addressed in a number of ways, but system configurations based on integrating different information sources (often involving more than one biometric modality) are a widely adopted means of ... View full abstract»
-
Reasoning About Threats: From Observables to Situation Assessment
Publication Year: 2011, Page(s):608 - 616
Cited by: Papers (8)We propose a mechanism to assess threats that are based on observables. Observables are properties of persons, i.e., their behavior and interaction with other persons and objects. We consider observables that can be extracted from sensor signals and intelligence. In this paper, we discuss situation assessment that is based on observables for threat assessment. In the experiments, the assessment is... View full abstract»
-
Computational Analysis of Sparse Datasets for Fault Diagnosis in Large Tribological Mechanisms
Publication Year: 2011, Page(s):617 - 629
Cited by: Papers (1)This paper presents the most up-to-date methods for the task of designing a system to accurately classify abnormal events, or faults, in a complex tribological mechanism, using elemental analysis of lubrication oil as an indicator of engine condition. The discussion combines perspectives from numerous fault diagnosis applications, both online and offline, to focus upon the task of offline event de... View full abstract»
-
Biologically Inspired Network Systems: A Review and Future Prospects
Publication Year: 2011, Page(s):630 - 643
Cited by: Papers (30)The emerging interdisciplinary area of biologically inspired network systems research is reviewed. Examples of such systems found in the literature are grouped into two classes: in silico and in vitro/vivo network systems. For each class, background knowledge is provided concerning the biological systems, mechanisms, or materials used, and the manner in which they are applied to the design of the ... View full abstract»
-
Two-Way Multidimensional Scaling: A Review
Publication Year: 2011, Page(s):644 - 661
Cited by: Papers (30)Multidimensional scaling (MDS) is a technique used to extract a set of independent variables from a proximity matrix or matrices. Applications of MDS are found in a wide range of areas, including visualization, pattern analysis, data preprocessing, scale development, cybernetics, and localization. The overall rationale behind the paper is to help share innovations across disciplines. We survey and... View full abstract»
-
Word-Map Systems for Content-Based Document Classification
Publication Year: 2011, Page(s):662 - 673
Cited by: Papers (3)The main purpose of this paper is the classification of documents in terms of their content. Two systems are presented here that share a two-level architecture that include 1) a word map created via unsupervised learning that functions as a document-representation module and 2) a supervised multilayer-perceptron-based classifier. Two approaches to create word maps are presented and compared; these... View full abstract»
-
Applying Wave Probabilistic Functions for Dynamic System Modeling
Publication Year: 2011, Page(s):674 - 681
Cited by: Papers (13)The goal of this paper is to provide an introduction to the application of wave probabilistic functions in the area of dynamic system models. This paper presents dynamic features of wave probabilistic models that are basic principles of quantum cybernetics. These features are mathematically described, and the illustrative examples demonstrate possible applications of the theory. View full abstract»
-
Multiobjective Simulated Annealing for Fuzzy Clustering With Stability and Validity
Publication Year: 2011, Page(s):682 - 691
Cited by: Papers (14)The present article deals with an application of multiobjective optimization (MOO) technique for fuzzy clustering. The problem of automatic clustering can be posed as one of the searching for a suitable set of cluster centers such that some measure of cluster validity is optimized. However, no single validity measure works equally well for different kinds of data sets. Moreover, it is extremely di... View full abstract»
-
Models, Methodologies, and Tools Supporting Establishment and Management of Second-Generation VBEs
Publication Year: 2011, Page(s):692 - 710
Cited by: Papers (13)Both research and practice have shown that preexistence of long-term associations/clusters of active and competitive organizations, the so-called virtual organizations breeding environments (VBEs), can greatly enhance dynamic creation of virtual organizations (VOs). During the past decade, a number of VBEs are formed worldwide, mostly among organizations located in a common region that, in princip... View full abstract»
-
Feature Relevance Network-Based Transfer Learning for Indoor Location Estimation
Publication Year: 2011, Page(s):711 - 719
Cited by: Papers (7)We present a new machine learning framework for indoor location estimation. In many cases, locations could be easily estimated using various traditional positioning methods and conventional machine learning approaches based on signalling devices, e.g., access points (APs). When there exist environmental changes, however, such traditional methods cannot be employed due to data distribution change. ... View full abstract»
-
Video Motion Interpolation for Special Effect Applications
Publication Year: 2011, Page(s):720 - 732
Cited by: Papers (3)Video forgery, also referred as video falsifying, is a technique for generating fake videos by altering, combining, or creating new video contents. For instance, the outcome of a 100 m race in the olympic game is forged as an example in this paper. We track objects and segment motions using a modified mean shift mechanism. The resulting video layers can be played in different speeds and from diffe... View full abstract»
-
Bayesian Supply Chain Tracking Using Serial-Level Information
Publication Year: 2011, Page(s):733 - 742
Cited by: Papers (10)Supply chain visibility is one of the main levers for achieving operational efficiency. Modern supply chain tracking systems can deliver serial-level information about the location of items progressing through the chain. However, these systems still fail to meet the managers' visibility requirements in full, since they provide discrete information about product location at specific time instances ... View full abstract»
-
Personal Identification Using Multibiometrics Rank-Level Fusion
Publication Year: 2011, Page(s):743 - 752
Cited by: Papers (61)This paper investigates a new approach for the personal recognition using rank-level combination of multiple biometrics representations. There has been very little effort to study rank-level fusion approaches for multibiometrics combination and none using multiple palmprint representations. In this paper, we propose a new nonlinear rank-level fusion approach and present a comparative study of rank... View full abstract»
-
Classification and Assessment of Power System Security Using Multiclass SVM
Publication Year: 2011, Page(s):753 - 758
Cited by: Papers (34)Security assessment and classification are the major concerns in real-time operation of electric power systems. This paper proposes a multiclass support vector machine (SVM) classifier for static and transient security assessment and classification. A straightforward and quick procedure called the sequential forward selection method is used for a feature selection process. The security status of a... View full abstract»
-
Identifying the Productive and Influential Bloggers in a Community
Publication Year: 2011, Page(s):759 - 764
Cited by: Papers (24)Social networking has become one of the most important trends on the Web, leading to the development of several social applications such as blogs. Blogs are locations on the Web where individuals are provided with the ability to express their opinion, experience, and knowledge about a product, an event, or any other subject. The tremendous popularity of these services has rendered the problem of i... View full abstract»
-
IEEE Systems, Man, and Cybernetics Society Information
Publication Year: 2011, Page(s): C3
|
PDF (28 KB)
-
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors
Publication Year: 2011, Page(s): C4
|
PDF (36 KB)
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221037
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)

Abstract