IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)

Issue 4 • Nov. 2004

Filter Results

Displaying Results 1 - 22 of 22
  • Table of contents

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews [publication information]

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Special Issue on Learning: Advances in Multimedia Communications, Information Processing, and Education

    Publication Year: 2004, Page(s):381 - 382
    Request permission for commercial reuse | PDF file iconPDF (221 KB) | HTML iconHTML
    Freely Available from IEEE
  • A fixed-point algorithm to minimax learning with neural networks

    Publication Year: 2004, Page(s):383 - 392
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    In some real applications, such as medical diagnosis or remote sensing, available training data do not often reflect the true a priori probabilities of the underlying data distribution. The classifier designed from these data may be suboptimal. Building classifiers that are robust against changes in prior probabilities is possible by applying a minimax learning strategy. In this paper, we propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using all data to generate decision tree ensembles

    Publication Year: 2004, Page(s):393 - 397
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    This paper develops a new method to generate ensembles of classifiers that uses all available data to construct every individual classifier. The base algorithm builds a decision tree in an iterative manner: The training data are divided into two subsets. In each iteration, one subset is used to grow the decision tree, starting from the decision tree produced by the previous iteration. This fully g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing genetic feature selection through restricted search and Walsh analysis

    Publication Year: 2004, Page(s):398 - 406
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In this paper, a twofold approach to improve the performance of genetic algorithms (GAs) in the feature selection problem (FSP) is presented. First, a novel genetic operator is introduced to solve the FSP. This operator fixes in each iteration the number of features to be selected among the available ones and consequently reduces the size of the search space. This approach yields two main advantag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind source separation in post-nonlinear mixtures using competitive learning, Simulated annealing, and a genetic algorithm

    Publication Year: 2004, Page(s):407 - 416
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    This paper presents a new adaptive procedure for the linear and nonlinear separation of signals with nonuniform, symmetrical probability distributions, based on both simulated annealing and competitive learning methods by means of a neural network, considering the properties of the vectorial spaces of sources and mixtures, and using a multiple linearization in the mixture space. Moreover, the pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid higher-order statistics learning in multiuser detection

    Publication Year: 2004, Page(s):417 - 424
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    In this paper, we explore the significance of second- and higher-order statistics learning in communication systems. The final goal in spread-spectrum communication systems is to receive a signal of interest completely free from interference caused by other concurrent signals. To achieve this end, we exploit the structure of the interference by designing second-order statistics detectors, such as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On understanding understanding. Perception-based processing of NL texts in SCIP systems, or meaning constitution as visualized learning

    Publication Year: 2004, Page(s):425 - 438
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Inspired by information systems theory, semiotic cognitive information processing (SCIP) is grounded in (natural/artificial) system-environment situations. SCIP systems' knowledge-based processing of information makes it cognitive, their sign and symbol generation, manipulation, and understanding capabilities render it semiotic. Based upon structures whose representational status is not a presuppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy user modeling for adaptation in educational hypermedia

    Publication Year: 2004, Page(s):439 - 449
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    Education is a dominating application area for adaptive hypermedia. Web-based adaptive educational systems incorporate complex intelligent tutoring techniques, which enable the system to recognize an individual user and their needs, and consequently adapt the instructional sequence. The personalization is done through the user model, which collects information about the user. Since the description... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stimulating creative design alternatives using customer values

    Publication Year: 2004, Page(s):450 - 459
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    This paper presents and illustrates an approach and procedures to stimulate the creation of design alternatives. The purpose is to generate many very good alternatives for a specific new product. Subsequently, a comparative evaluation of these alternatives and honing the designs of the most promising ones can proceed. To create potential alternatives with high customer appeal, the approach first e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategy-based design of reusable business components

    Publication Year: 2004, Page(s):460 - 474
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    Grounded on principles of manufacturing design, component-based software development (CBSD) has been viewed as the future trend in software development. In this paper, we propose a methodology for component fabrication and argue that, as in classical product development, business strategy of component development companies must guide the design of reusable business components. Accordingly, we link... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An information-theoretical framework for modeling component-based systems

    Publication Year: 2004, Page(s):475 - 484
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Software systems tend to be large scale and complex with the inevitable increase in their functionalities. The increasing costs related to system development and maintenance in correlation to the software size requires new assessment tools for the newly evolving development methodologies. Taking advantage of existing tools and methodologies in a mature field is beneficial to relatively young, rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multisensor fusion in the frame of evidence theory for landmines detection

    Publication Year: 2004, Page(s):485 - 498
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1286 KB) | HTML iconHTML

    In the frame of humanitarian antipersonnel mines detection, a multisensor fusion method using the Dempster-Shafer evidence theory is presented. The multisensor system consists of two sensors-a ground penetrating radar (GPR) and a metal detector (MD). For each sensor, a new features extraction method is presented. The method for the GPR is mainly based on wavelets and contours extraction. First sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based fuzzy color processing

    Publication Year: 2004, Page(s):499 - 505
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    This paper concerns the application of digital image processing in combination with rulebased reasoning as a nondestructive quality testing method for resistance spot welding. The use of fuzzy logic gives the possibility to characterize colors by linguistic terms rather than by names for wavelength or wavelength intervals. The presented method supplements Lotfi Zadeh's idea of soft computing and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy estimation of feed-cutting force from current measurement-a case study on intelligent tool wear condition monitoring

    Publication Year: 2004, Page(s):506 - 512
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    It is very important to use a reliable and inexpensive sensor to obtain useful information about manufacturing processing, such as cutting force for monitoring automated machining. In this paper, the feed-cutting force is estimated using inexpensive current sensors installed on the ac servomotor of a computerized numerical control (CNC) turning center, with the results applied to the intelligent t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering golden nuggets: data mining in financial application

    Publication Year: 2004, Page(s):513 - 522
    Cited by:  Papers (64)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    With the increase of economic globalization and evolution of information technology, financial data are being generated and accumulated at an unprecedented pace. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in strategic planning and investment decision-making. Dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ladder diagram and Petri-net-based discrete-event control design methods

    Publication Year: 2004, Page(s):523 - 531
    Cited by:  Papers (49)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Ladder diagrams (LDs) for a programmable logic controller are a dominant method in discrete event control of industrial automated systems. Yet, the ever-increasing functionality and complexity of these systems have challenged the use of LDs to design their discrete-event controllers. Researchers are constantly pursuing integrated tools that eliminate the limitations of LDs. These tools are aimed n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of motion-parallax-based 3-D reconstruction algorithms

    Publication Year: 2004, Page(s):532 - 548
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    The task of recovering three-dimensional (3-D) geometry from two-dimensional views of a scene is called 3-D reconstruction. It is an extremely active research area in computer vision. There is a large body of 3-D reconstruction algorithms available in the literature. These algorithms are often designed to provide different tradeoffs between speed, accuracy, and practicality. In addition, even the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2004 Index

    Publication Year: 2004, Page(s):549 - 556
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE

Aims & Scope

This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6221037

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.

Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.

Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.

Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)