Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Systems, Man, and Cybernetics, 2001 IEEE International Conference on

Date 7-10 Oct. 2001

Go

Filter Results

Displaying Results 1 - 25 of 127
  • 2001 IEEE International Conference on Systems, Man and Cybernetics [front matter]

    Publication Year: 2001 , Page(s): 0_1 - 0_56
    Save to Project icon | Request Permissions | PDF file iconPDF (5664 KB)  
    Freely Available from IEEE
  • Real-time 3D model sharing conference system based on agent and VRML

    Publication Year: 2001 , Page(s): 3355 - 3360 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (553 KB) |  | HTML iconHTML  

    The contemporary design and assessment of products press more and more emphasis on the cooperation of teams. The environment for distributed cooperation becomes especially important. Meanwhile using three-dimensional models to express the information of the product is the most intuitionistic. This paper deals with several key technologies and uses them to develop an agent-based real-time 3D model sharing conference system. It uses VRML to visualize artificial joints models, takes advantage of Microsoft NetMeeting SDK and integrates the multi-media conference function of the NetMeeting. To achieve the best real-time performance, we used distributed file system architecture and only transferred controlling commands among distributed participants. This system has been successfully used in "artificial joint fast implanting" project of National High Technology Plan 863/CIMS View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable, distributed algorithm for allocating workers in embedded systems

    Publication Year: 2001 , Page(s): 3367 - 3373 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (699 KB) |  | HTML iconHTML  

    This paper presents a scalable threshold-based algorithm for allocating workers to a given task whose demand evolves dynamically over time. The algorithm is fully distributed and solely based on the local perceptions of the individuals. Each agent decides autonomously and deterministically to work only when it "feels" that some work needs to be done based on its sensory inputs. In this paper, we applied the worker allocation algorithm to a collective manipulation case study concerned with the gathering and clustering of initially scattered small objects. The aggregation experiment has been studied at three different experimental levels by using macroscopic and microscopic probabilistic models, and embodied simulations. Results show that teams using a number of active workers dynamically controlled by the allocation algorithm achieve similar or better performances in aggregation than those characterized by a constant team size, while using a considerably reduced number of agents over the whole aggregation process. Since this algorithm does not imply any form of explicit communication among agents, it represents a cost-effective solution for controlling the number of active workers in embedded systems consisting of a few to thousands of units View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commitment in bidding agents

    Publication Year: 2001 , Page(s): 3107 - 3112 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    Agent oriented systems, based on different views of computational entities, offer powerful tools for implementation of various complex systems. A framework for designing electric power market agents, which are buyers, sellers and a coordinator is presented. The main emphasis is how to consider bidding time and commitment period in the decision process. Finally a worked example shows the applicability of the proposed algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy MCDM in election prediction

    Publication Year: 2001 , Page(s): 3258 - 3263 vol.5
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (465 KB) |  | HTML iconHTML  

    The application of fuzzy logic (FL) in traditional fields like engineering, medicine or finance has become a common practice, however in social sciences, mainly in politics, the utilization of FL can be intensely explored. Joining fuzzy logic with multiple criteria decision making (MCDM), the natural, complex and uncertain criteria of political problems can be adequately treated. The practical result of the research is a computational system for election forecasting View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based model as a marketing consultant of companies

    Publication Year: 2001 , Page(s): 3113 - 3117 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    A key requirement for a dynamic organization is the need for precise and formal knowledge management of the available information. The main objective of our work is to provide an agent based model of an agile integrated business system, more specifically, of the marketing sector of the company, where the knowledge has to be acquired, shared both internally and externally, updated, processed, applied, used and reused in order to find correlations among knowledge from different company sectors. Agents are able to suggest certain operations to the users in response to the change in the data structures they are responsible for maintaining. They can adopt using prior knowledge about company objectives and available customer data. An important role of the agent is to learn and change its practice according to previous approved behavior. The use of fuzzy set theory, in order to maintain and analyze the knowledge kept in the company profiles, as well, as to calculate the reliability of the suggested actions, showed the first positive experimental results. We applied this model for the operation of the Center for Distance Learning, for analysis of the different marketing campaigns and as a consultant for future campaigns View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving query-answers from domain knowledge

    Publication Year: 2001 , Page(s): 3269 - 3274 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    The paper introduces an approach to open knowledge-based query evaluation and describes a preliminary prototype taking this approach. A knowledge-base (KB), complementing the primary information base, that defines and relates words and concepts and exploits similarities between concepts, is used to improve answers. The knowledge base may introduce common and/or domain specific knowledge. The overall approach is to apply the KB in combination with a highly parameterised matching and aggregation, such that queries are transformed and expanded through the KB and parameters are resolved from the KB View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cortical network controller for control of voluntary movements in robotics systems

    Publication Year: 2001 , Page(s): 3002A - 33007 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (482 KB) |  | HTML iconHTML  

    A cortical network for voluntary movement control within constraints from neurophysiology and motor psychophysics is developed. A neural controller is proposed to track the desired joint trajectories of a single link controlled by an agonist-antagonist pair of actuators with muscle-like properties. The system is capable of executing voluntary reaching movements, with a typical bell-shaped velocity profile, under unexpected load conditions. The goals of this research work are: (1) to apply the knowledge of human neuro-musculo-skeletal motion control to a biomechanically designed, neural controlled, robotic system, and (2) to demonstrate that such system is able to respond voluntarily similar to human movements on an experimental platform. Through experimental performance results, we shown that neural controller exhibits key kinematic properties of human movements, dynamics compensation, and asymmetric bell-shaped velocity profiles View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redundancy classification for fault tolerant computer design

    Publication Year: 2001 , Page(s): 3193 - 3198 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    The paper discusses the principles of redundancy classification for the design of fault tolerant computer systems. The basic functions of classification: definitive, characteristic and predictive are presented. It is shown that the proposed classification of redundancy possesses substantial predictive power. The proposed classification is suitable for the analysis of roles of hardware and software to achieve system fault tolerance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interval-based neural networks for soft decisions

    Publication Year: 2001 , Page(s): 3264 - 3268 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    The performance of neural networks, when the training data is limited, can be improved by incorporation of interval techniques. These techniques improve performance by introducing the ability to classify imprecise data. Performance can be further improved by incorporating the ability to make soft decisions. Soft decisions differ from hard decisions by allowing the decision-making system the option of deferring to a human. This decision-rejection option has the effect of reducing the error rate of the decision-making system. The paper discusses three distinct techniques for making soft decisions and the performance of the interval-based neural network that utilizes these techniques View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Disciple to decision making in complex and constrained environments

    Publication Year: 2001 , Page(s): 2932 - 2940 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (767 KB) |  | HTML iconHTML  

    This paper describes Disciple, an Artificial Intelligence based decision aid which subject-matter experts can train and use when making decisions under stressful, complex, and constrained conditions. The tool was developed and used under the Defense Advanced Research Projects Agency's High Performance Knowledge Base and Rapid Knowledge Formation programs. Some domains in which the tool would be applicable are described, with particular emphasis on military battle planning. The paper concludes with a discussion of future trends in decision-support application tools View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental parsing for interactive natural language interface

    Publication Year: 2001 , Page(s): 2880 - 2885 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (426 KB) |  | HTML iconHTML  

    The paper proposes an effective incremental parsing method for such interactive natural language processing systems as real-time dialogue systems, simultaneous machine interpreting systems, etc. This method produces the analysis of the input while it is being received. It can efficiently deal with not only the normal input, which is piecemeal addition to the input from left to right, but also such changes of the input as insertion and deletion. For such changes of the input, this method exploits parts of the previous analyses. We implemented this method on a workstation and conducted an experiment. We confirm that the method can be expected to be useful for an online language processing system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web caching: architectures and performance evaluation survey

    Publication Year: 2001 , Page(s): 3039 - 3044 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (491 KB) |  | HTML iconHTML  

    In this paper, we study the architectures and routing techniques used in cooperative web caching and the techniques to evaluate the performances of caching systems. In the first part, the paper studies those advantages and disadvantages of different architectures of caching systems. In the second part, we describe routing techniques combined with these architectures of caching systems. And in the rest of this paper, we discuss the performance parameters and tools with which people can evaluate the performance of different web caching mechanisms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DEVS-on-a-chip: implementing DEVS in real-time Java on a tiny Internet interface for scalable factory automation

    Publication Year: 2001 , Page(s): 3051 - 3056 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (405 KB) |  | HTML iconHTML  

    This paper describes our effort to implement DEVS on a TINI Chip which has limited memory and processing ability. A set of well-defined DEVS interfaces make it possible to define a just-as-needed DEVS real time environment and run on the chip efficiently. As a case study for real time data gathering, processing and management, a DEVS coupled model has been composed from a set of primitive DEVS atomic models in this application area. This coupled model gets real time temperature from a sensor and runs data processing such as quantizer, moving averager, maximum and minimum extractor, etc. before it transfers the data to database View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of static and dynamic equilibrium before and after immersion in a virtual environment

    Publication Year: 2001 , Page(s): 3205 - 3210 vol.5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    The effectiveness of VR (virtual reality) systems is well documented, but there are no guidelines for determining the influence that such systems have on humans, particularly with regard to adaptation to the VR environment. The results of an experiment are summarized as follows: 1) A VR experience using an HMD made the integration of sensory information in the equilibrium nucleus confusing. 2) Sensory conflict caused motion-sickness-like symptoms in the subjects. 3) As a result of equilibrium deterioration, movement velocity, movement distance, and sway area of the center of pressure were increased. These results suggest that the VR experience causes motion-sickness-like symptoms and worsens equilibrium View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An inter-enterprise workflow management system for B2B e-commerce and supply chain: a case study

    Publication Year: 2001 , Page(s): 2921 - 2926 vol.5
    Cited by:  Papers (1)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    Using e-commerce over the Internet is very cheap and convenient, which enlarges the view of enterprises and lets the enterprises have more chances to select their partners. To achieve these goals, we need the support of information systems, in which workflow management system is of significance. The inherent characteristics of a workflow system make it suitable to implement the cross organization management. Nowadays, however, systems which support cross organization management are not common. When developing a supply chain management system for a big motorcycle corporation in China, we have to construct an inter-enterprises workflow Architecture over Internet for the system by ourselves. The main part of the Architecture is a workflow supported inner supply chain and an integrated interface, through which the whole supply chain system cross several independent enterprises is constructed and the information exchange is fulfilled. This paper introduces how the system is designed and implemented in detail View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing fuel consumption on gas transmission networks: evaluation of a heuristic for cyclic systems

    Publication Year: 2001 , Page(s): 3118 - 3122 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    In this paper we present our computational experience with a heuristic for the problem of minimizing fuel cost on steady-state gas transmission problems on cyclic networks. The procedure is based on a two-stage iterative procedure, where, in a given iteration, gas flow variables are fixed and optimal pressure variables are found via dynamic programming in the first stage. In the second stage, the pressure variables are fixed and an attempt is made to find a set of flow variables that improve the objective function by exploiting the underlying network structure. This work focuses on cyclic network topologies, that is, networks with at least one cycle containing two or more compressor stations. This kind of topologies posses the highest degree of difficulty in real-world problems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the effectiveness of the WWW as an information resource

    Publication Year: 2001 , Page(s): 3330 - 3335 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (413 KB) |  | HTML iconHTML  

    As the already vast number of home Web users continues to grow the Web is emerging as an alternative medium for satisfying information needs that arise outside the organisational/work domain. As the number of organisations using the Web as a medium for disseminating information increases there has been little, if any, evaluation of the effectiveness of the Web as an information resource for satisfying information need. This paper reports on research that builds on recent work developing conceptually-based scales for evaluating the extent to which Web services satisfy information needs that arise outside the traditional organisational/work domain. The results of a Web-based survey which generated 720 responses are reported View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of DEVS/GDDM environment: realization of space-based data management

    Publication Year: 2001 , Page(s): 3063 - 3068 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    This paper describes the design and development of DEVS/GDDM, an environmental platform for data distribution management, that allows us to study the interestbased quantization scheme in order to achieve effective reduction of data communication in distributed simulation. After a brief review of interest-based quantization scheme, we discuss the implementation of this scheme as a layer above the DEVS/HLA modeling and simulation environment. This paper presents theoretical analysis for bandwidth utilization of the interest-based quantization scheme, especially with predictive and multiplexing extensions, and empirical results in ballistic missiles simulation executing on the DEVS/GDDM environment in NT networking platforms. The results indicate that the DEVS/GDDM environment is very effective and scalable due to reduced local computation demands and extremely favorable communication data reduction with a reasonably small potential for error View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology for modeling and analyzing of enterprise competence

    Publication Year: 2001 , Page(s): 2941 - 2946 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB) |  | HTML iconHTML  

    An enterprise should know its own competence sufficiently, use and improve it reasonably and continually. In this paper, we present competence ontology of manufacturing enterprise, which provides meta-model and self-contained computing micro-theory for modeling and analysis of competence of manufacturing enterprise. The paper focuses on the competence problems, concept, properties and constraints of competence ontology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multi-lateral security framework for the ubiquitous audiovisual services

    Publication Year: 2001 , Page(s): 3336 - 3342 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (514 KB) |  | HTML iconHTML  

    In this paper, we will present the multi-lateral security framework for the ubiquitous audiovisual services. Next generation audiovisual services are expected to be very flexible digital system build on the global broadband network and they allow us to access any audiovisual contents at anywhere in the world. We call it ubiquitous audio-visual services. In such new services, several new security criteria, may become more important. Maintaining competitive market, privacy protection and suppression of organized crimes are drawing broader interest than before. Since past discussion on the contents security was often narrowly focused on the closed system, technological framework and architecturectural design which covers new requirement issues was not analyzed enough in technical context. In this paper, firstly we will discuss on the concept of multi-lateral security, which can be bases of technical security requirements. Then secondly, we will describe a technology to improve system in terms of multilateral security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The optimization for sequences relational analysis

    Publication Year: 2001 , Page(s): 3146 - 3150 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    A type of relational measure called the optimal relational grade is introduced. This grade is used to measure or analyze the nonlinear relation between sequences. In effect, this optimal relational grade consists of two aspect measures: an approximation measure and a similarity measure for sequences, and hence can be viewed as a synthesis measure for distinguishing what is the strength of the nonlinear relation between sequences. The maximum entropy method is applied to the linear combination of approximation and similarity results in this optimal relational grade. Finally, the verification of this measurement is asserted through means of examining two examples View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining dependency and constituent-based resources for structure disambiguation

    Publication Year: 2001 , Page(s): 2873 - 2879 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    Unrestricted text analysis requires an accurate syntactic analysis but structural ambiguity is one of the most difficult problems to resolve. Researchers have tried different approaches to obtain the correct syntactic structure from analyzed sentences but no successful results have been obtained. Two different approaches have traditionally applied to syntactic analysis: constituent grammars and dependency grammars. We propose a model for syntactic analysis and disambiguation combining lexical dependencies and semantic proximity. Lexical dependencies are applied by means of a government pattern dictionary following the dependency approach. The semantic proximity is introduced by means of semantic closeness among constituents. Examples are given to illustrate the method's contributions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of World Wide Web caching

    Publication Year: 2001 , Page(s): 3045 - 3050 vol.5
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (515 KB) |  | HTML iconHTML  

    This paper studied the state-of-art in web caching schemes and techniques. An introduction on web caching was presented at the first part. The second part focused on the web caching schemes and architectures. Some fundamental issues on web caching systems were given in the third part. Finally, we discussed some research and industrial frontier in web caching system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete event model verification using system morphism

    Publication Year: 2001 , Page(s): 3057 - 3062 vol.5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    Model verification is to check the correctness of an implemented simulation program against a model specification. The paper proposed an automatic model verification methodology based on the I/O function level system morphism. The verification methodology establishes a mapping between all possible I/O event sequences of specification and those of implementation. The DEVS formalism is used as a specification language; implementation is assumed to be done by any simulation language or general purpose languages. Realization of the proposed methodology is presented with an example of verification for an assembly process model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.