By Topic

IEEE Transactions on Systems, Man, and Cybernetics

Issue 5 • Date Sept. 1986

Filter Results

Displaying Results 1 - 19 of 19
  • [Table of contents]

    Publication Year: 1986, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society

    Publication Year: 1986, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Expertise in Debugging Computer Programs: An Analysis of the Content of Verbal Protocols

    Publication Year: 1986, Page(s):621 - 637
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4858 KB)

    The results of an exploratory study that investigated expert and novice debugging processes with the aim of contributing to a general theory of programming expertise are reported. The research had two major objectives. First, it sought to control for the variability in individual problem solving by incorporating certain aspects of subjects' debugging processes into the debugging model. The criteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multivariable Structure of Fuzzy Control Systems

    Publication Year: 1986, Page(s):638 - 656
    Cited by:  Papers (109)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3810 KB)

    In the analysis and design of expert control systems, when linguistic types of control algorithms are used, it is important to model a physical system using fuzzy theoretic approach. The modeling, analysis, and synthesis of multivariable structures of fuzzy control systems is discussed. First, a multivariable open-loop fuzzy system is described by a set of fuzzy equations. Then a block diagram of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Grammars in Syntactic Recognition of Skeletal Maturity from X-Rays

    Publication Year: 1986, Page(s):657 - 667
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2806 KB)

    A hierarchical three-stage syntactic recognition algorithm using six-tuple fuzzy and seven-tuple fractionally fuzzy grammars is described for identifying different stages of maturity of bones from X-rays of hand and wrist. The primitives considered are "dot," "straight line," and "arc" as obtained elsewhere. For each arc, its memberships in the sets of "sharp," "fair," and "gentle" arcs have been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy approximation scheme for sequential learning in pattern recognition

    Publication Year: 1986, Page(s):668 - 679
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3033 KB)

    An adaptive learning scheme, based on a fuzzy approximation to the gradient descent method for training a pattern classifier using unlabeled samples, is described. The objective function defined for the fuzzy ISODATA clustering procedure is used as the loss function for computing the gradient. Learning is based on simultaneous fuzzy decisionmaking and estimation. It uses conditional fuzzy measures... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network Model with Rhythm-Assimilation Capacity

    Publication Year: 1986, Page(s):680 - 693
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3384 KB)

    Assimilation of a stimulus rhythm by certain nervous structures of vertebrate animals in a conditioning situation has been reported. A lateral-inhibition-type network of plastic pacemaker neurons is proposed to model such behavior. Through simulation, the network exhibits capacity to assimilate and encode in separate groups of neurons two successively presented frequencies. Learning of the second ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Decentralized Water-Quality Control Scheme

    Publication Year: 1986, Page(s):694 - 702
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2056 KB)

    The dynamics of water quality constituents in the River Nile is expressed by a linear continuous-time model. Two control actions are employed: the first is through the stream velocity, which is implemented by regulating the water discharge into the basin and the second is through the adjustment of the concentration of water quality constituents discharged from polluter stations. A decentralized co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Reliable Control System Designs

    Publication Year: 1986, Page(s):703 - 711
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2179 KB)

    A research effort is summarized which addresses some of the current problems in interfacing systems theory and reliability. Reliability is roughly the probability that a system will perform according to specifications for a given amount of time. The reliability of a system depends on the structure of its components. Systems theory and control theory deal with the response characteristics of a syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The System Engineering Process: A Technical Bibliography

    Publication Year: 1986, Page(s):712 - 722
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2999 KB)

    A comprehensive review of the trade and technical literature was conducted to identify those writings that could best assist system engineers in their technical development efforts. Various writings were selected that best fit within the framework of the system engineering model defined by the Department of Defense. One hundred thirty-two annotated items are listed in 20 categories. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Relationship between Forrester's Schematics and Compartmental Graphs

    Publication Year: 1986, Page(s):723 - 726
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1271 KB)

    Graphic representations may be considered as a tool for deriving a mathematical model from a qualitative description. Forrester's schematics and compartmental graphs are examined from this point of view. Their similarities and differences are then discussed. Two examples taken from the system dynamics literature help clarify the characteristics of both representations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Simulation Studies Investigating Means of Human-Computer Communication for Dynamic Task Allocation

    Publication Year: 1986, Page(s):726 - 730
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1416 KB)

    When tasks are allocated dynamically within a human-computer system, system performance depends upon effective communication between the human and the computer. The results are presented of simulation studies which investigate two means of human-to-computer communication: implicit communication, in which the human's planned actions are conveyed to the computer through a model of the human's action... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Navigation of Automated Vehicles by Image Analysis Techniques

    Publication Year: 1986, Page(s):730 - 740
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3435 KB)

    Image analysis techniques are applied to adaptive automatic vehicle navigation. The proposed image-based navigation system is made adaptive to follow any selected path embedded in a curve-type path network. This is achieved with three major capabilities of the proposed system: path network learning, reference path setup, and guided path navigation. The first capability enables the system to extrac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for Graph Monomorphism Based on the Projections of the Product Graph

    Publication Year: 1986, Page(s):740 - 751
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2785 KB)

    A new algorithm is presented for detecting graph monomorphisms for a pair of graphs. This algorithm entails a tree search based on the projections of the product graph called the net of the two graphs. It uses the minimum number of neighbors of the projected graphs to detect infeasible subtrees. The algorithm, in comparison with that of Deo and coworkers, is more efficient in its storage space uti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Learning Scheme for Priority Assignment at a Single-Server Queue

    Publication Year: 1986, Page(s):751 - 754
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB)

    A simple fixed structure learning scheme is proposed for priority assignment at a single-server queue. The server processes two streams of jobs, with random service times (exponentially distributed) in which the parameters are unknown at the start. The optimal priority assignment is asymptotically learned with arbitrary accuracy by properly choosing the algorithm parameters. The scheme has finite ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Set Theoretic Measure for Automatic Feature Evaluation

    Publication Year: 1986, Page(s):754 - 760
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1549 KB)

    The terms index of fuzziness, entropy, and ¿-ness, which give measures of fuzziness in a set, are used to define an index of feature evaluation in pattern recognition problems in terms of their intraclass and interclass measures. The index value decreases as the reliability of a feature in characterizing and discriminating different classes increases. The algorithm developed has been implemented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Systems, Man, and Cybernetics Society

    Publication Year: 1986, Page(s): 760-a
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Membership Grade Requirements

    Publication Year: 1986, Page(s): 760-a
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 1986, Page(s): 760b
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE