By Topic

Proceedings of the IEEE

Issue 10 • Oct. 1986

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover and table of contents]

    Publication Year: 1986, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Scanning the issue

    Publication Year: 1986, Page(s):1299 - 1303
    Request permission for commercial reuse | PDF file iconPDF (485 KB)
    Freely Available from IEEE
  • Representation and use of metaknowledge

    Publication Year: 1986, Page(s):1304 - 1321
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1878 KB)

    The need for expressing and using metalevel knowledge is emerging in the design of several kinds of AI systems. The careful distinction between object-level and metalevel notions and the formalization of the latter has first been carried out by logicians for foundational reasons; subsequently, the distinction has been exploited in Artificial Intelligence and Computation Theory, revealing itself to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Important issues in knowledge representation

    Publication Year: 1986, Page(s):1322 - 1334
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1349 KB)

    This paper discusses a number of important issues that drive knowledge representation research. It begins by considering the relationship between knowledge and the world and the use of knowledge by reasoning agents (both biological and mechanical) and concludes that a knowledge representation system must support activities of perception, learning, and planning to act. An argument is made that the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A description-oriented logic for building knowledge bases

    Publication Year: 1986, Page(s):1335 - 1344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB)

    We discuss the advantages of using a logic system for knowledge representation which is based on descriptions, rather than predicates, and which embodies two fundamental ideas for structuring knowledge that are distilled from semantic networks and frame-based languages: inheritance and attributions. Taxonomic reasoning on a lattice of descriptions combined with deduction strategies defined at the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonmonotonic inference rules for multiple inheritance with exceptions

    Publication Year: 1986, Page(s):1345 - 1353
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB)

    The semantics of inheritance "hierarchies" with multiple inheritance and exceptions is discussed, and a partial semantics in terms of a number of structure types is defined. Previously proposed inference systems for inheritance with exceptions are discussed. A new and improved inference system is proposed, using a fixed number of nonmonotonic inference rules. The hierarchy is viewed as a set of at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symmetric relations, intensional individuals, and variable binding

    Publication Year: 1986, Page(s):1354 - 1363
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB)

    A symmetric relation such as "... are adjacent" or "... are related" is characterized by not distinguishing among two or more of its arguments. Such a relation may efficiently be represented as a relation that takes a set as its argument, or as one of its arguments. The semantics of such a representation is, in part, determined by the instantiation (matching or unification) rule used by the reason... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal logic of plans in temporally rich domains

    Publication Year: 1986, Page(s):1364 - 1382
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1993 KB)

    This paper outlines a temporal logic extended with two modalities that can be used to support planning in temporally rich domains. In particular, the logic can represent planning environments that have assertions about future possibilities in addition to the present state, and plans that contain concurrent actions. The logic is particularly expressive in the ways that concurrent actions can intera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Procedural knowledge

    Publication Year: 1986, Page(s):1383 - 1398
    Cited by:  Papers (40)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1409 KB)

    Much of commonsense knowledge about the real world is in the form of procedures or sequences of actions for achieving particular goals. In this paper, a formalism is presented for representing such knowledge using the notion of process. A declarative semantics for the representation is given, which allows a user to state facts about the effects of doing things in the problem domain of interest. An... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Default reasoning and self-knowledge

    Publication Year: 1986, Page(s):1399 - 1404
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The paper describes a system of belief representation in which inner, nested, beliefs (what an individual A believes an individual B believes about C are not normally shared permanently with the component belief sets (e.g., the system's view of A, etc.). It is argued that this process is consistent with a general Least Effort Theory of Understanding, and that any assumption that such nested belief... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing de re and de dicto belief reports in discourse and narrative

    Publication Year: 1986, Page(s):1405 - 1413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (941 KB)

    Belief reports can be interpreted de re or de dicto, and we investigate the disambiguation of belief reports as they appear in discourse and narrative. In earlier work, representations for de re and de dicto belief reports were presented, and the distinction between de re and de dicto belief reports was made solely on the basis of their representations. This analysis is sufficient only when belief... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive classification: A technique for acquiring and maintaining knowledge bases

    Publication Year: 1986, Page(s):1414 - 1421
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (821 KB)

    The practical application of knowledge-based systems, such as in expert systems, often requires the maintenance of large amounts of declarative knowledge. As a knowledge base (KB) grows in size and complexity, it becomes more difficult to maintain and extend. Even someone who is familiar with the knowledge domain, how it is represented in the KB, and the actual contents of the current KB may have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal methodology for acquiring and representing expert knowledge

    Publication Year: 1986, Page(s):1422 - 1430
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (973 KB)

    The process of eliciting knowledge from human experts and representing that knowledge in an expert or knowledge-based system suffers from numerous problems. Not only is this process time-consuming and tedious, but the weak knowledge acquisition methods typically used (i.e., interviews and protocol analysis) are inadequate for eliciting tacit knowledge and may, in fact, lead to inaccuracies in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge representation language for requirements engineering

    Publication Year: 1986, Page(s):1431 - 1444
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1401 KB)

    Requirements engineering, the phase of software development where the users' needs are investigated, is more and more shifting its concern from the target system towards its environment. A new generation of languages is needed to support the definition of application domain knowledge and the behavior of the universe around the computer. This paper assesses the applicability of classical knowledge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal knowledge

    Publication Year: 1986, Page(s):1445 - 1450
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (669 KB)

    The development of intelligent legal information processing systems depends critically on availability of representations of legal knowledge. Some of the application areas envisioned for intelligent legal systems include retrieval systems, argument and reasoning systems, legal decision-making systems, and drafting systems. Successful implementation of systems of these types has been hampered by a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Ludwig integration algorithm for triangular subregions

    Publication Year: 1986, Page(s):1455 - 1456
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB)

    By using area coordinates one obtains algebraic expressions for the computation of two-dimensional integrals with oscillatory integrands over triangular subregions that are simpler than those published recently [1]. All the advantages of previous methods [1], [2] are retained. Moreover, the new equation is evaluated only once for each triangular subregion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Propagation characteristics of eccentric core fibers using point-matching method

    Publication Year: 1986, Page(s):1456 - 1458
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB)

    The propagation characteristics of homogeneous single-mode optical fibers with eccentric core are analyzed by a numerical method based on the Improved Point-Matching Method (IPMM). The variation of fundamental mode propagation constant has been computed for various eccentricities with different fiber parameters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple digital CPMFSK generator

    Publication Year: 1986, Page(s):1458 - 1460
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB)

    A digital method of generating a serial M-ary continuous-phase frequency shift keying (CPMFSK) signal has been described. Based on the time-domain frequency modulation (TDFM) concept, the method offers a very simple and elegant implementation using ROM and can accomodate any arbitrary modulation index. The proposed CPMFSK generator has been physically implemented and tested for satisfactory operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Further results on Nyquist's third criterion

    Publication Year: 1986, Page(s):1460 - 1462
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB)

    It is shown that a band-limited Nyquist 3 pulse is expressible as a weighted infinite sum of delayed versions of a corresponding Nyquist 1 pulse. Weightings are derived explicitly for the minimum-bandwidth case. Also, a baseband system using Nyquist 3 shaping and integration at the receiver (over one symbol interval) is studied. An optimal band-limited Nyquist 3 system using integration at the rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Obtaining bandpass filter coefficients from low-pass prototypes

    Publication Year: 1986, Page(s):1462 - 1463
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    In this letter a method is given for calculating the transfer function coefficients of an analog bandpass filter stemming from a known, all-pole low-pass prototype, which is independent of the filter order. By posing the problem as an interpolation problem and choosing uniformly spaced interpolating points On the unit circle, the coefficients are computed efficiently and accurately via the discret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel implementation of pipelined Toeplitz system solver

    Publication Year: 1986, Page(s):1463 - 1464
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bit-sequential array for pattern matching

    Publication Year: 1986, Page(s):1465 - 1466
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    This letter presents the design and analysis of a bit-sequential array for pattern matching applications. The architecture makes multiple use of each data sample, has built-in concurrency and pipelining, and is based on a highly modular design with only nearest neighbor connections between array modules. The array computes all occurrences of a pattern of length m, in the string of length n, in O(m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Near-optimal controllers for synchronous machines with prescribed degree of stability via iterative separation of time scales

    Publication Year: 1986, Page(s):1466 - 1468
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Near-optimal controller for synchronous machines with prescribed degree of stability using the slow subsystem derived through iterative approach is proposed. The closed-loop system poles are constrained to the left of Re (s) < - α where α > 0 and α ∈ (0, α0). The results are compared with those obtained via the classical quasisteady-state (qss) technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method for measuring RMS values

    Publication Year: 1986, Page(s):1468 - 1469
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB)

    A new method for measuring rms values is presented which uses neither a thermoelement nor logarithmic circuits. It can be completely implemented by low-cost conventional electronic circuits and can also be applied to the working out of an algorithm for computing machines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Underwater acoustic system analysis

    Publication Year: 1986, Page(s): 1470
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University