By Topic

IEEE Transactions on Systems, Man, and Cybernetics

Issue 3 • Date May-June 1984

Filter Results

Displaying Results 1 - 25 of 33
  • A quasihierarchical location-allocation model for primary health care planning

    Publication Year: 1984, Page(s):373 - 380
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1965 KB)

    In studying primary health care (PHC) systems in developing countries, a quasihierarchical relationship between health centers and village clinics is identified; it is based not only on an organizational attachment of one or more village clinics to every health center, but also on the daily presence of a health-center-based physician at each clinic. A unique zero-one integer programming model is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical trend modeling of preferences on welfare needs

    Publication Year: 1984, Page(s):381 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2299 KB)

    Novel quantitative methods are proposed for analyzing trends in preferences in the area of welfare needs. The methods of structural analysis are used to analyze the trends revealed by the third poll on preferences in national life in Japan, which is a nationwide survey on welfare needs conducted in 1978. Two kinds of structural models are constructed: one is a hierarchical model that ranks welfare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to early warning of slowly evolving crises with reference to food shortage forecasting

    Publication Year: 1984, Page(s):391 - 397
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1507 KB)

    An approach is described for forecasting slowly evolving food crises for which an early warning index is assumed to change linearly with time. The difficulties faced in decision making are outlined. It is seen that the `α-β tracker' can provide optimal estimates of the early warning index and its rate of change. Equations are developed for obtaining the optimal estimates, the corresp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A graph distance measure for image analysis

    Publication Year: 1984, Page(s):398 - 408
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2425 KB)

    Attributed relational graphs (ARGs) have shown superior qualities when used for image representation and analysis in computer vision systems. A new, efficient approach for calculating a global distance measure between attributed relational graphs is proposed, and its applications in computer vision are discussed. The distance measure is calculated by a global optimization algorithm that is shown t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPTA: A proposed algorithm for thinning binary patterns

    Publication Year: 1984, Page(s):409 - 418
    Cited by:  Papers (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2124 KB)

    A new skeletonization algorithm called the safe-point thinning algorithm (SPTA) is proposed that is suitable for binary patterns. The SPTA is informally explained and is also defined in a formal algorithmic manner. The experimental performance of the SPTA is compared with 14 other skeletonization algorithms that have been proposed by other researchers. Results show that SPTA is the fastest and tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A capacity expansion model with applications to multiplexing in communication networks

    Publication Year: 1984, Page(s):419 - 423
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1134 KB)

    A capacity expansion model in which three types of demand are served by three facility types is described. The model can be applied to multiplexing problems for communication networks as well as to capacity expansion problems with deluxe and standard facility types. The capacity of any facility type can be expanded by adding units of equal size. An efficient single-state dynamic programming algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of node linking in overlapped pyramids

    Publication Year: 1984, Page(s):424 - 436
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4074 KB)

    An image segmentation algorithm is described that uses an overlapped pyramid to represent an image at multiple levels of resolution. The procedure `lifts' objects to levels of lower and lower resolution until they become `spot' or `streaklike' and are identifiable by local processing (using 3 by 3 operators). They are then `rooted.' The result is a forest embedded within the pyramid, with the sing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact effects of biped contact with the environment

    Publication Year: 1984, Page(s):437 - 443
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1410 KB)

    A biped system is subjected to an instant velocity change at the moment of impact with the environment. This instant velocity change is derived as a function of the biped state and the contact speed. The effects of the impact on the state, as well as on the constraints, are studied in biped landing on heels and toes simultaneously or on toes first. The control strategy that is called for in this c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate joint trajectories for control of industrial robots along Cartesian paths

    Publication Year: 1984, Page(s):444 - 450
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1559 KB)

    To approximate a preplanned robot path in Cartesian coordinates, such as the seam in arc welding, by functions of joint displacements, enough points on the path must be selected and transformed into joint coordinates. Instead of joining the adjacent, transformed joint points by a straight line, lower degree polynomials are first determined and then splined together. The approximation functions are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hopping in legged systems — Modeling and simulation for the two-dimensional one-legged case

    Publication Year: 1984, Page(s):451 - 463
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3062 KB)

    A two-dimensional one-legged hopping machine is modeled and simulated in order to better understand legged systems that hop and run. The analysis is focused on balance, dynamic stability, and resonant oscillation for the planar case. A springy leg with nonzero mass, a simple body, and an actuated hinge-type hip are incorporated in the model. Control of the model is decomposed into a vertical hoppi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neuronal response to stochastic stimulation

    Publication Year: 1984, Page(s):464 - 469
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB)

    A complete binary dendritic tree is considered in which each branch (cylinder) receives random input. The depolarization on each cylinder satisfies a stochastic cable equation. The Laplace transform of the solution can be found by solving a linear system of 2[2n+1-1] equations when there are n orders of branching. The Laplace transform method is shown to yield the exact solution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of research institutional roles in developing countries

    Publication Year: 1984, Page(s):470 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1177 KB)

    Five distinct roles have been identified for research institutions in a representative developing country. The analysis is based on a framework which combines a social research and development model with a social systems engineering model. The result suggests a complementarity of roles to be played by universities, research centers, and government authorities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System response time and user performance

    Publication Year: 1984, Page(s):473 - 478
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1628 KB)

    Investigates the effect of system response time (SRT) delays on the performance and satisfaction of the computer user in two different user tasks which are designed to maximize any adverse effects of delays or variability in SRT. The results of the study are presented and commented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts and software for dimensional analysis in modeling

    Publication Year: 1984, Page(s):478 - 482
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1279 KB)

    The underlying theory of dimensional analysis is reviewed, and some classical scientific uses of the principle are recalled. This is followed by discussions of a computer software package that has been developed to facilitate dimensional analysis. Several examples of the types of modeling errors that have been detected by the use of the package are discussed. Finally, attention is drawn to some th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exact kinematic model of PUMA 600 manipulator

    Publication Year: 1984, Page(s):483 - 487
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1075 KB)

    An exact kinematic model of the Unimation PUMA 600 robotic manipulator is presented. Discrepancies found between the actual manipulator in laboratory tests and the first model presented are discussed. The link coordinate frames are redefined in order to introduce a new transformation for a tool frame. Modifications are made to previously published solutions of the inverse kinematics and differenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneous experimentation of self-learning classification, connectivity analysis and visualisation for data interpretation

    Publication Year: 1984, Page(s):487 - 497
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2342 KB)

    Self-learning classification of data and connectivity analysis using probabilistic and fuzzy concepts are compared with subjective and visual rearrangement of data. Both methodologies are fully described and results are compared on two examples: crisp binary data and normalized real data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating the wrist of an elbow-type manipulator

    Publication Year: 1984, Page(s):497 - 499
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB)

    An elbow-type manipulator with a shoulder offset may assume a given wrist position in as many as four different configurations (shoulder right/left, elbow up/down). The inverse kinematic solution that defines each of these configurations for a PUMA 560 robot arm is derived trigonometrically. This solution is also compared with a previously reported solution (see ibid., vol.11, no.6, p.449-55, June... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on “automatic planning of manipulator transfer movements”

    Publication Year: 1984, Page(s):499 - 500
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    It is pointed out that because errors in a manipulator environment come from a variety of sources, a worst-case correction as described by Lozano-Perez (ibid., vol.SMC-11, no.10, p.681-9, 1981) is unduly restrictive, and could lead to the fallacious conclusion that certain movements are not possible, or to the overspecification of tolerances on system components. It is shown how a simple probabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative coordinate transformation procedure for one class of robots

    Publication Year: 1984, Page(s):500 - 505
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1304 KB)

    A necessary feature of robot systems is a capability to process robot paths in terms of Cartesian coordinates. However, the so-called articulated robot arms which represent the more advanced systems operate in terms of their revolute and sliding joint coordinates, and these do not lend themselves easily to translation into Cartesian equivalents. As a rule, the direct (joint-to-Cartesian space) coo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CMT and hybrid coding of the component color TV signal

    Publication Year: 1984, Page(s):506 - 510
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2508 KB)

    An investigation of coding the NTSC color TV signal in the component form is carried out. C-matrix transform (CMT) and the hybrid (CMT/DPCM) coding are simulated on an intrafield basis. The techniques are found to be closely comparable to the discrete cosine transform (DCT) and the corresponding hybrid coding techniques. CMT, which is an integer approximation to the DCT, is expected to yiel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constant expected time, linear storage data structure for representing three-dimensional objects

    Publication Year: 1984, Page(s):510 - 515
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1578 KB)

    The interrogation of spatial relations and properties of three-dimensional objects are often involved in applications programs for CAD/CADM and robotics. These interrogations can be expressed in terms of low-level data retrieval queries called access primitives (APs). A data structure is presented for storing spatial relations of three-dimensional objects such that the amount of storage is linearl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of least square estimation technique for image restoration using signal-noise correlation constraint

    Publication Year: 1984, Page(s):515 - 519
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3276 KB)

    A linear degradation model for digital image restoration is considered. It is assumed that the noise is additive, uncorrelated and independent of the degradation process and also of original image. A new objective criterion is used for the least square restoration method proposed here. The criterion is to minimize the correlation between image and noise gray levels. The method can be implemented i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data compression for progressive transmission of screened pictures

    Publication Year: 1984, Page(s):519 - 524
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB)

    Some predictive encoding schemes are applied to the progressive reconstruction of news photos stored in screened form. Experimental results obtained on pictures received on the analog telephoto channel by means of a suitable electronic system are discussed. A switched predictor, which takes into account the RMS prediction error resulting from previous predictions to carry out the choice, is shown ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ridge-seeking method for obtaining the skeleton of digital images

    Publication Year: 1984, Page(s):524 - 528
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1128 KB)

    A method for obtaining the skeleton of a segmented gray-scale image is introduced. The gray-scale information is used to produce a connected and one-point wide skeleton positioned in the ridge areas. The input image is considered to be a set of connected nonzero elements as object areas and zero elements as background areas. The obtained skeleton does not depend on the boundary of the image. The g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A learning algorithm for the finite-time two-armed bandit problem

    Publication Year: 1984, Page(s):528 - 534
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1746 KB)

    A simple algorithm for the finite-time two-armed bandit problem is proposed. In this algorithm, the whole process is divided into the first estimating process and the next controlling process. Efficient methods involving the use of approximation for computing the optimal length of the estimating process are provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.