Issue 2 • May 1999
Cited by: Papers (4)
This paper addresses the information flow between devices and programs in computer integrated manufacturing systems. Specifically, it presents modeling techniques and methods for detecting the existence of message paths among hardware and software components and the upper bound on time delays along that message path. The modeling technique can be used to analyze interoperability between hardware a... View full abstract»
Cited by: Papers (31)
Fukushima's (1988; 1989; 1992; 1993) neocognitron model is well-known for its performance in visual pattern recognition. Through a training process, the visual pattern information is stored in a form of numerical weights in memory. When the model is actually implemented in hardware, weight errors and input noises caused by hardware imprecision and imperfect input devices respectively cannot be avo... View full abstract»
Cited by: Papers (4)
This paper develops dynamic models that advance the state-of-the-art in software estimation to meet the analytic requirements of the most current spiral and prototyping software development process paradigms. These models account for the dynamics of changing requirements, system design, and other policy factors. The dynamic formulation permits analysis of the effect of current-stage decisions on f... View full abstract»
Analytical analysis and feedback linearization tracking control of the general Takagi-Sugeno fuzzy dynamic systemsPublication Year: 1999, Page(s):290 - 298
Cited by: Papers (42)
The Takagi-Sugeno (TS) fuzzy modeling technique, a black-box discrete-time approach for system identification, has widely been used to model behaviors of complex dynamic systems. The analytical structure of TS fuzzy models, however, is unknown, causing at two major problems. First, the fuzzy models cannot be utilized to design controllers of the physical systems modeled. Second, there is no system... View full abstract»
Cited by: Papers (11)
Large excavation reclaimers are used to dig ore and transfer it to the blast furnaces that refine the ore into pure metal form. The reclaiming job consists of two operations: (1) landing a reclaimer bucket on the surface of a pile and (2) slewing its boom with rotating buckets to scoop the ore. An automatic landing method for choosing where to dig in a pile of raw ore is proposed to achieve autono... View full abstract»
Cited by: Papers (8)
This study investigates the impact of the electronic communication and anonymity capabilities of a group support system (GSS) on group polarization. Three support levels were studied: verbal support, identified GSS support, and anonymous GSS support. Information exposure was varied at two levels: exposure to positions without arguments and exposure to positions with arguments. The dependent variab... View full abstract»
Cited by: Papers (9)
We present a map interpretation system for automatic extraction of high level information from the scanned images of Chinese land register maps. Our map interpretation system consists of three main components: text/graphics separation, parcel extraction, and rotated character recognition. Our approach to text/graphics separation is based on a simple yet effective rule: the feature points of charac... View full abstract»
Cited by: Papers (61)
This paper presents a fuzzy traffic controller for a set of intersections and its simulation results. The controller of an intersection controls its own traffic and cooperates with its neighbors. It gets information from its traffic detectors and its neighbors. Using this information, the fuzzy rule base system gives optimal signals. It manages phase sequences and phase lengths adaptively to its n... View full abstract»
A multisession comparative study of group size and group performance in an electronic meeting system environmentPublication Year: 1999, Page(s):169 - 185
Cited by: Papers (7)
Meetings are crucial elements in the functioning of organizations. Actors commonly noted as causing a meeting to lose its effectiveness (achieve the desired outcomes) are too many or too few individuals, wrong individuals, lack of goals, and hidden agenda/motives. Several researchers have focused on determining the optimal group size for a meeting. Much of this work was based on the concept that a... View full abstract»
Cited by: Papers (24)
Proposes an integrated image segmentation and recognition method using a new type of cascade neural network that has been is developed to train the spatial dependencies in connected handwritten numerals. This network was originally extended from a multilayer feedforward neural network in order to improve its discrimination and generalization power. To verify the performance of the proposed method,... View full abstract»
Cited by: Papers (17)
Describes a visual monitoring system that performs scene segmentation based on color and texture information. Color information is combined with texture, and corresponding segmentation algorithms are developed to detect and measure changes (loss/gain) in a given scene or environment over a period of time. The xyY color space is used to represent the color information. The two chromaticity coordina... View full abstract»
First Page of the ArticleView full abstract»
Cited by: Papers (4)
Reactive robot behavior has been claimed as a model of memoryless intelligence. Using results highlighting the cyclic conflicts in such systems, we throw light on similar phenomena in biology such as human amnesic behavior. We present a formal characterization of cycles in the temporal sequence of memoryless behaviors and show that attempts to eliminate cycles result in less powerful behavior syst... View full abstract»
Cited by: Papers (31) | Patents (4)
This paper introduces a new text input device called the chording glove. The keys of a chord keyboard are mounted on the fingers of a glove. A chord can be made by pressing the fingers against any surface. Shift buttons placed on the index finger enable the glove to enter the full ASCII character set. The chording glove is designed as a text input device for wearable computers and virtual environm... View full abstract»
Cited by: Papers (1)First Page of the ArticleView full abstract»
Necessary and sufficient conditions for deadlock-free operation in flexible manufacturing systems using a colored Petri net modelPublication Year: 1999, Page(s):192 - 204
Cited by: Papers (144)
Concurrent competition for finite resources by multiple parts in flexible manufacturing systems (FMS) results in deadlock. This is an important issue to be addressed in the operation of the system. A Petri net model, called colored resource-oriented Petri net (CROPN), is developed in this paper. The concurrent resource contention and the important characteristics of the production processes necess... View full abstract»
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)