Issue 1 • Date Feb 2001
A novel iron loss reduction technique for distribution transformers based on a combined genetic algorithm - neural network approachPublication Year: 2001, Page(s):16 - 34
Cited by: Papers (23)
The paper presents an effective method to reduce the iron losses of wound core distribution transformers based on a combined neural network/genetic algorithm approach. The originality of the work presented is that it tackles the iron loss reduction problem during the transformer production phase, while previous works concentrated on the design phase. More specifically, neural networks effectively ... View full abstract»
Cited by: Papers (42)
A deadzone compensator is designed for a DC motor system using a fuzzy logic controller. The classification property of fuzzy logic systems makes them a natural candidate for the rejection of errors induced by the deadzone, which has regions in which it behaves differently. A tuning algorithm is given for the fuzzy logic parameters, so that the deadzone compensation scheme becomes adaptive, guaran... View full abstract»
Cited by: Papers (14)
The paper presents a structure which deals with process operating mode monitoring and allows control law reconfiguration by switching online the right controller. After a short review of the advances in switching based control systems during the last decade (1991-2001), we introduce our approach based on the definition of the operating modes of a plant. The control reconfiguration strategy is achi... View full abstract»
Cited by: Papers (9)
Despite the fact that Chinese characters are composed of radicals and Chinese people usually formulate their knowledge of Chinese characters as a combination of radicals, very few studies have focused on a character decomposition approach to recognition, i.e. recognizing a character by first extracting and recognizing its radicals. In this paper, such an approach is adopted, and the problem of how... View full abstract»
Cited by: Papers (6)
The paper describes a methodology to use human error probabilities (HEPs) as a basis for selecting functional process units in the design phase. The method helps us to understand the influence of human error (HE) on functional robustness of the units in earlier design phases, e.g., at the functional analysis level. This methodology can be used to detect the need for human operator support. The met... View full abstract»
Cited by: Papers (12)
A herding dog and sheep problem is studied where the agent “dog” is considered the control action for moving the agent “sheep” to a fixed location using the dynamics of their interaction. The problem is solved for the deterministic case using dynamic programming. Proofs are provided for the correctness of the algorithms. The algorithm is analyzed for its complexity. A softw... View full abstract»
Cited by: Papers (22)
Robot safety is a critical and largely unsolved problem involving the interaction of man and machine. The paper presents a new approach to robot safety which uses an integrated sensing architecture for monitoring the robot workspace, and a new detection and decision logic for regulating the safe operation of the robot. Sensory information is fused through a trained neural network to produce a map ... View full abstract»
Hybrid applications of constraint satisfaction and meta-heuristics to railway timetabling: a comparative studyPublication Year: 2001, Page(s):87 - 95
Cited by: Papers (6)
The paper provides a discussion on the train scheduling algorithms developed to create predictive schedules for a fleet of passenger trains which travel along a primarily single-track railway with some double-track stretches. The algorithms are an object oriented constraint based heuristic and two hybrid methods, which represent combinations of the heuristic with tabu search and simulated annealin... View full abstract»
Speaker identification for security systems using reinforcement-trained pRAM neural network architecturesPublication Year: 2001, Page(s):65 - 76
Cited by: Papers (14) | Patents (2)
Speaker identification may be employed as part of a security system requiring user authentication. In this case, the claimed identity of the user is known from a magnetic card and PIN number, for example, and an utterance is requested to confirm the identity of the user. A fast response is necessary in the confirmation phase and a fast registration process for new users is desirable. The time enco... View full abstract»
Intelligent decision support for the pricing of products and services in competitive consumer marketsPublication Year: 2001, Page(s):96 - 106
Cited by: Papers (13)
We describe a novel class of systems called intelligent tactical decision support systems which enable firms to make superior pricing decisions within a dynamic competitive environment. The paper outlines the unique aspects of such systems in relation to commercially available systems. These aspects are seen to be their ability to process and use knowledge on the one hand and information external ... View full abstract»
Cited by: Papers (13)
The paper presents numerical methodology for the stability analysis of a fuzzy control system. The fuzzy control system analyzed is a closed-loop system controlled by a fuzzy logic controller (FLC) with singleton consequents. Compared with previous works based on numerical approaches (E. Kim et al., 1999), the method proposed in the paper employs two new strategies to release the conservatism of t... View full abstract»
Cited by: Papers (42)
The accurate classification of hand gestures is crucial in the development of novel hand gesture-based systems designed for human-computer interaction (HCI) and for human alternative and augmentative communication (HAAC). A complete vision-based system, consisting of hand gesture acquisition, segmentation, filtering, representation and classification, is developed to robustly classify hand gesture... View full abstract»
Cited by: Papers (107)
A variable-string-length genetic algorithm (GA) is used for developing a novel nonparametric clustering technique when the number of clusters is not fixed a-priori. Chromosomes in the same population may now have different lengths since they encode different number of clusters. The crossover operator is redefined to tackle the concept of variable string length. A cluster validity index is used as ... View full abstract»
Aims & Scope
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)