By Topic

Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on

Issue 6 • Date Nov. 2009

Filter Results

Displaying Results 1 - 25 of 26
  • Table of contents

    Publication Year: 2009 , Page(s): C1 - 1141
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans publication information

    Publication Year: 2009 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Passive Haptic Data-Compression Methods With Perceptual Coding for Bilateral Presence Systems

    Publication Year: 2009 , Page(s): 1142 - 1151
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (399 KB) |  | HTML iconHTML  

    In this paper, lossy compression methods for haptic (velocity and force) data as exchanged in telepresence or virtual reality systems are introduced. Based on the proposed interpolative and extrapolative compression strategies, arbitrary passive compression algorithms can be implemented. The derived algorithms do not affect the stability of the presence system. Two algorithms were implemented and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aligning Collaborative Business Processes—An Organization-Oriented Perspective

    Publication Year: 2009 , Page(s): 1152 - 1164
    Cited by:  Papers (14)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1169 KB) |  | HTML iconHTML  

    Business collaboration encompasses the coordination of information flows among organizations as well as the composition of their business processes toward mutual benefits. While integrating business processes of different organizations seamlessly, it brings great challenges to keep participating organizations as autonomous entities. To address this issue, we propose a new perspective on modeling c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preference Learning for Cognitive Modeling: A Case Study on Entertainment Preferences

    Publication Year: 2009 , Page(s): 1165 - 1175
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (880 KB) |  | HTML iconHTML  

    Learning from preferences, which provide means for expressing a subject's desires, constitutes an important topic in machine learning research. This paper presents a comparative study of four alternative instance preference learning algorithms (both linear and nonlinear). The case study investigated is to learn to predict the expressed entertainment preferences of children when playing physical ga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Coherent Measurement of Web-Search Relevance

    Publication Year: 2009 , Page(s): 1176 - 1187
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1142 KB) |  | HTML iconHTML  

    We present a metric for quantitatively assessing the quality of Web searches. The relevance-of-searching-on-target index measures how relevant a search result is with respect to the searcher's interest and intention. The measurement is established on the basis of the cognitive characteristics of common user's online Web-browsing behavior and processes. We evaluated the accuracy of the index functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Automation in a Naval Combat Management System

    Publication Year: 2009 , Page(s): 1188 - 1199
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (782 KB) |  | HTML iconHTML  

    There is a continuing trend of letting fewer people deal with larger amounts of information in more complex situations using highly automated systems. In such circumstances, there is a risk that people are overwhelmed by information during intense periods or, on the other hand, do not build sufficient situational awareness during periods of slack to deal with situations where human intervention be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost–Performance Optimization of Application- and Context-Aware Distributed Infrastructures

    Publication Year: 2009 , Page(s): 1200 - 1213
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (388 KB) |  | HTML iconHTML  

    Application- and context-aware infrastructures involve the network in the execution of distributed applications through special devices, namely, the application cards, placed in network nodes. The sharp separation of applications and network is smoothed, and by performing part of the distributed application inside the network, it is possible to reduce costs and improve performance with a be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M-GRASP: A GRASP With Memory for Latency-Aware Partitioning Methods in DVE Systems

    Publication Year: 2009 , Page(s): 1214 - 1223
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (309 KB) |  | HTML iconHTML  

    A necessary condition for providing quality of service to distributed virtual environments (DVEs) is to provide a system response below a maximum threshold to the client computers. In this sense, latency-aware partitioning methods try to provide response times below the threshold to the maximum number of client computers as possible. These partitioning methods should find an assignment of clients ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Multiple-Fault Diagnosis With Imperfect Tests

    Publication Year: 2009 , Page(s): 1224 - 1236
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (740 KB) |  | HTML iconHTML  

    In this paper, we consider a model for the dynamic multiple-fault diagnosis (DMFD) problem arising in online monitoring of complex systems and present a solution. This problem involves real-time inference of the most likely set of faults and their time-evolution based on blocks of unreliable test outcomes over time. In the DMFD problem, there is a finite set of mutually independent fault states, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supervisor Synthesis for Enforcing a Class of Generalized Mutual Exclusion Constraints on Petri Nets

    Publication Year: 2009 , Page(s): 1237 - 1246
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    The considered class of generalized mutual exclusion constraints (GMECs) on a controlled Petri net are such that the influence-uncontrollable subnets are forward-concurrent-free nets. Some structural properties of forward-concurrent-free nets are firstly proposed. Utilizing these properties, a method is then proposed to transform a given conjunction of GMECs into a conjunction of admissible GMECs.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Universal Generating Function Method to Search for All Minimal Paths in Networks

    Publication Year: 2009 , Page(s): 1247 - 1254
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    Evaluating network reliability is an important topic in planning, designing, and control of systems, and the minimal-path (MP) set is one of the fundamental tools for evaluating network reliability. A straightforward and simple algorithm is presented here for finding all MPs before calculating the binary-state network reliability between the source node and the sink node (i.e., one-to-one reliabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System-of-Systems Modeling and Simulation of a Ship Environment With Wireless and Intelligent Maintenance Technologies

    Publication Year: 2009 , Page(s): 1255 - 1270
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2553 KB) |  | HTML iconHTML  

    Modeling and simulation environments are needed to support decision making in Navy Warfighters, which are emergent systems that pose a challenge to operations management. Ships consist of complex interconnected systems such as the infrastructure, crew, and workflow. A system-of-systems approach using agent-based modeling is applied here to develop workflow simulations involving a ship's crew condu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Matrix-Based Approach to Recovering Design Patterns

    Publication Year: 2009 , Page(s): 1271 - 1282
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (831 KB) |  | HTML iconHTML  

    Design patterns describe good solutions to common and recurring problems in software design. They have been widely applied in many software systems in industry. However, pattern-related information is typically not available in large system implementations. Recovering these design pattern instances in software systems can help not only to understand the original design decisions and tradeoffs but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Software-Quality Predictions With Data Sampling and Boosting

    Publication Year: 2009 , Page(s): 1283 - 1294
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    Software-quality data sets tend to fall victim to the class-imbalance problem that plagues so many other application domains. The majority of faults in a software system, particularly high-assurance systems, usually lie in a very small percentage of the software modules. This imbalance between the number of fault-prone (fp) and non-fp (nfp) modules can have a severely negative impact on a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Clustering of Interval-Valued Data Based on Adaptive Quadratic Distances

    Publication Year: 2009 , Page(s): 1295 - 1306
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (434 KB) |  | HTML iconHTML  

    This paper presents partitioning dynamic clustering methods for interval-valued data based on suitable adaptive quadratic distances. These methods furnish a partition and a prototype for each cluster by optimizing an adequacy criterion that measures the fitting between the clusters and their representatives. These adaptive quadratic distances change at each algorithm iteration and can either be th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Statistical Threat Assessment

    Publication Year: 2009 , Page(s): 1307 - 1315
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (808 KB) |  | HTML iconHTML  

    Criminal gangs, insurgent groups, and terror networks demonstrate observable preferences in selecting the sites where they commit their crimes. Accordingly, police departments, military organizations, and intelligence agencies seek to learn these preferences and identify locations with a high probability of experiencing the particular event of interest in the near future. Often, such agencies are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Force Field for Haptic Feedback in UAV Teleoperation

    Publication Year: 2009 , Page(s): 1316 - 1330
    Cited by:  Papers (20)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1677 KB) |  | HTML iconHTML  

    The feedback upon which operators in teleoperation tasks base their control actions differs substantially from the feedback to the driver of a vehicle. On the one hand, there is often a lack of sensory information; on the other hand, there is additional status information presented via the visual channel. Haptic feedback could be used to unload the visual channel and to compensate for the lack of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Optimization for Model Predictive Control of Linear-Dynamic Networks

    Publication Year: 2009 , Page(s): 1331 - 1338
    Cited by:  Papers (16)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    A linear-dynamic network consists of a directed graph in which the nodes represent subsystems and the arcs model dynamic couplings. The local state of each subsystem evolves according to discrete linear dynamics that depend on the local state, local control signals, and control signals of upstream subsystems. Such networks appear in the model predictive control (MPC) of geographically distributed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data-Driven Approach to Manage the Length of Stay for Appendectomy Patients

    Publication Year: 2009 , Page(s): 1339 - 1347
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (410 KB) |  | HTML iconHTML  

    Skyrocketing patient-care costs demand that health-care institutions improve their resource-utilization effectiveness and efficiency. The length of an inpatient's stay has direct significant impacts on patient-care costs, service quality, and outcomes. Despite attempts to manage the length of stay (LOS) for frequently performed surgical procedures (e.g., appendectomies), many service providers can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on "On Siphon Computation for Deadlock Control in a Class of Petri Nets

    Publication Year: 2009 , Page(s): 1348 - 1350
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (121 KB) |  | HTML iconHTML  

    It was claimed recently in the paper by Li and Zhou that ldquoa polynomial time algorithm for finding the set of elementary siphons in S3PRs is proposed, which avoids complete siphon enumerationrdquo. However, this is incorrect because Proposition 1 and Corollary 6 of the aforementioned paper, which lead to the claim, are both incorrect. In this correspondence paper, Proposition 1 and C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on pattern recognition technologies for anti-terrorism applications

    Publication Year: 2009 , Page(s): 1351
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE
  • Special issue on semantics-enabled software engineering

    Publication Year: 2009 , Page(s): 1352
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • 2009 Index IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans Vol. 39

    Publication Year: 2009 , Page(s): 1353 - 1368
    Save to Project icon | Request Permissions | PDF file iconPDF (158 KB)  
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Publication Year: 2009 , Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE

Aims & Scope

The fields of systems engineering and human machine systems: systems engineering includes efforts that involve issue formulation, issue analysis and modeling, and decision making and issue interpretation at any of the lifecycle phases associated with the definition, development, and implementation of large systems.

 

This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Systems, Man, and Cybernetics: Systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Witold Pedrycz
University of Alberta