Volume 40 Issue 4 • July 2010
Filter Results
-
Table of contents
Publication Year: 2010, Page(s): C1|
PDF (40 KB)
-
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information
Publication Year: 2010, Page(s): C2|
PDF (37 KB)
-
Guest Editorial Foreword to the Special Issue on Availability, Reliability, and Security
Publication Year: 2010, Page(s):369 - 371The six papers in this special issue focus on availability, reliability, and security. Some of the topics covered include prevention of identity theft, biometric technology and authentication, and security considerations for RF identification. View full abstract»
-
Multifactor Identity Verification Using Aggregated Proof of Knowledge
Publication Year: 2010, Page(s):372 - 383
Cited by: Papers (7) | Patents (1)The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor v... View full abstract»
-
A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems
Publication Year: 2010, Page(s):384 - 395
Cited by: Papers (35) | Patents (1)The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependabi... View full abstract»
-
Constructing Authorization Systems Using Assurance Management Framework
Publication Year: 2010, Page(s):396 - 405
Cited by: Papers (3)Model-driven approach has recently received much attention in developing secure software and systems. In addition, software developers have attempted to employ such an emerging approach in the early stage of software development life cycle. However, security concerns are rarely considered and practiced due to the lack of appropriate systematic mechanisms and tools. In this paper, we introduce a mu... View full abstract»
-
Survivable RFID Systems: Issues, Challenges, and Techniques
Publication Year: 2010, Page(s):406 - 418
Cited by: Papers (33)Radio frequency identification (RFID) technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID tag is attached to a mobile object, which can be scanned and recognized by a reader. RFID offers opportunities for real-time item identification and inventory tracking. For applications using resource-restricted ... View full abstract»
-
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
Publication Year: 2010, Page(s):419 - 428
Cited by: Papers (50)Nowadays, critical control systems are a fundamental component contributing to the overall performance of critical infrastructures in our society, most of which belong to the industrial sector. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This ... View full abstract»
-
A Cost Analysis of Systems Subject to Random Field Environments and Reliability
Publication Year: 2010, Page(s):429 - 437
Cited by: Papers (12)We present a generalized cost model subject to random field environments with considerations of cost to remove failures during testing and warranty periods, and penalty cost due to the system failures. We also determine the optimal release time policies that minimize the expected system cost. Many scientific contributions have been developed in software reliability modeling, while none has studied... View full abstract»
-
Electric Load Forecasting Based on Locally Weighted Support Vector Regression
Publication Year: 2010, Page(s):438 - 447
Cited by: Papers (91)The forecasting of electricity demand has become one of the major research fields in electrical engineering. Accurately estimated forecasts are essential part of an efficient power system planning and operation. In this paper, a modified version of the support vector regression (SVR) is presented to solve the load forecasting problem. The proposed model is derived by modifying the risk function of... View full abstract»
-
Distributed Explicit Rate Schemes in Multi-Input–Multi-Output Network Systems
Publication Year: 2010, Page(s):448 - 459
Cited by: Papers (4)With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input-multi-output service. This paper describes two novel wireless/wired multipoint-to-multipoint multicast flow control schemes, which are based on the distributed self-tuning proportional integrative plus derivative (SPID... View full abstract»
-
Evolutionary Tristate PSO for Strategic Bidding of Pumped-Storage Hydroelectric Plant
Publication Year: 2010, Page(s):460 - 471
Cited by: Papers (23)This paper develops bidding strategy for operating multiunit pumped-storage power plant in a day-ahead electricity market. Based on forecasted hourly market clearing price, the objective is to self-schedule and maximize the expected profit of the pumped-storage plant, considering both spinning and nonspinning reserve bids and meeting the technical operating constraints. Evolutionary tristate parti... View full abstract»
-
Privacy-Preserving Collaborative Recommender Systems
Publication Year: 2010, Page(s):472 - 476
Cited by: Papers (35)Collaborative recommender systems use various types of information to help customers find products of personalized interest. To increase the usefulness of collaborative recommender systems in certain circumstances, it could be desirable to merge recommender system databases between companies, thus expanding the data pool. This can lead to privacy disclosure hazards during the merging process. This... View full abstract»
-
An Application of Reinforcement Learning for Efficient Spectrum Usage in Next-Generation Mobile Cellular Networks
Publication Year: 2010, Page(s):477 - 484
Cited by: Papers (17)This paper proposes reinforcement learning as a foundational stone of a framework for efficient spectrum usage in the context of next-generation mobile cellular networks. The objective of the framework is to efficiently use the spectrum in a cellular orthogonal frequency-division multiple access network while unnecessary spectrum is released for secondary spectrum usage within a private commons sp... View full abstract»
-
A Service-Oriented Framework for Running Quantum Mechanical Simulations of Material Properties in a Grid Environment
Publication Year: 2010, Page(s):485 - 490
Cited by: Papers (1)In this paper, a service-oriented framework for running quantum mechanical simulation of material properties over Grids is proposed, and a prototype framework has been developed. The framework consists of portal and workflow systems, a set of class libraries and application programming interfaces, defined service specifications, schemas, and configuration files. The framework can be instantiated t... View full abstract»
-
Special issue on engineering applications of memetic computing
Publication Year: 2010, Page(s): 491|
PDF (177 KB)
-
Quality without compromise [advertisement]
Publication Year: 2010, Page(s): 492|
PDF (324 KB)
-
IEEE Systems, Man, and Cybernetics Society Information
Publication Year: 2010, Page(s): C3|
PDF (29 KB)
-
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors
Publication Year: 2010, Page(s): C4|
PDF (36 KB)
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221037
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)