By Topic

IEEE Transactions on Systems, Man, and Cybernetics

Issue 1 • Date Jan.-Feb. 1985

Filter Results

Displaying Results 1 - 22 of 22
  • IEEE Transactions on Systems, Man, and Cybernetics [Cover]

    Publication Year: 1985, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • On better mousetraps and basic research: Getting the applied world to the laboratory door

    Publication Year: 1985, Page(s):2 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1648 KB)

    Issues surrounding the relationship between the basic research community and the applied world are discussed. Considerations include the contrasting perspectives of the two worlds and the resulting differences in the ways in which design and evaluation are approached. These contrasts are used as a basis for suggesting mechanisms for improving transfer of basic research results to real world applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An information theory model for the evaluation of circumstantial evidence

    Publication Year: 1985, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1657 KB)

    The problem of assessing the weight of circumstantial evidence linking a suspect with the perpetrator of a crime is considered. The quantitative measure PG of weight of circumstantial evidence that is used is the probability that culprit and suspect may be identified with certainty as one and the same based solely upon the circumstantial evidence. A unifying model for evaluating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The entropy of design: A study on the meaning of creativity

    Publication Year: 1985, Page(s):16 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3064 KB)

    A view on the design process based on the information flow that occurs during this process is presented. The detailing step paradigm is used as the modeling primitive, and the formalization is based on simple expressions and rules from information theory. A formal medium is provided for studying the relationship between the complexity of a design and the creativity involved in the design process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of analogs in the innovation process: A software engineering protocol analysis

    Publication Year: 1985, Page(s):30 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2936 KB)

    A human information processing account of how experienced practitioners utilize analogues in the innovation process is presented. The protocols of several practitioners are collected and analyzed. The problem behavior graphs, knowledge elements utilized, and operator elements applied are described, and a descriptive model of the innovation process is assembled. Implications for a production system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy multiattribute utility analysis for collective choice

    Publication Year: 1985, Page(s):45 - 53
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1492 KB)

    An extension of multiattribute utility analysis for the multiple-agent decision problem is presented. Although multiattribute utility analysis is concerned with decision-making under uncertainty, assessment of the parameters of the multiattribute utility functions is actually performed deterministically by the single decision-maker. The authors are concerned with fuzzy evaluation of the multiattri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer control via limited natural language

    Publication Year: 1985, Page(s):54 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2741 KB)

    A natural language processor is described for control of a machine in task-oriented situations. Particular emphasis is given to issues related to flow-of-control statements in dialogue. These include branching constructs, as in `if row 1 contains a positive entry, then . . .' and looping constructs, as in `repeat for all other rows'. Special problems are discussed concerning the processing of deep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mechanism for touch control of a sagittal five-link finger-hand

    Publication Year: 1985, Page(s):69 - 77
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB)

    A five-link planar model of a hand with one finger is developed. The actuators are analogous to muscle force generators. Three control problems, stability, maintaining a constrained motion, and control of the force of constraint, are considered in this model. Two feedback loops-one time-invariant and one time-varying-appear to be adequate for control purposes. Digital computer simulations are pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structured framework for the control of industrial manipulators

    Publication Year: 1985, Page(s):78 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2509 KB)

    A framework for the intelligent control of industrial manipulators is described. The control structure that is described is designed to take full advantage of the improved sensing capabilities and more powerful languages that have become, or are now becoming, available. The framework is a hierarchical structure is which the aspects of motion control are isolated in independent layers of the organi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reorganization and diversification of signals in vision

    Publication Year: 1985, Page(s):91 - 101
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3790 KB)

    Extensive processing and reorganization of information are required as retinally generated signals flow centrally. Insight into some principles of the reorganization and transformations that occur in the early stages of the visual pathway, prior to the higher stages of pattern recognition, is provided through an analysis of receptive fields and cell counts. The rate of information flow is reduced ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Periodic optimization of a class of bilinear systems with application to control of cell proliferation and cancer therapy

    Publication Year: 1985, Page(s):102 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2311 KB)

    The authors are concerned with the optimization of a class of bilinear systems under an exponential stability constraint by periodic control functions. Such problems arise in many practical applications, a typical one being the design of optimal strategies for cancer chemotherapy by a suitable control of the proliferation kinetics of cell populations. To provide a focus to the approach used for op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy identification of systems and its applications to modeling and control

    Publication Year: 1985, Page(s):116 - 132
    Cited by:  Papers (4488)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2069 KB)

    A mathematical tool to build a fuzzy model of a system where fuzzy implications and reasoning are used is presented. The premise of an implication is the description of fuzzy subspace of inputs and its consequence is a linear input-output relation. The method of identification of a system using its input-output data is then shown. Two applications of the method to industrial processes are also dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer understanding of air traffic control displays

    Publication Year: 1985, Page(s):133 - 135
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2131 KB)

    Possible aircraft collisions from a display of many aircraft are perceived by a human air traffic controller. In the work described, the computer understands the displayed aircraft conflict data by processing a global semantic representation of the displayed data. Understanding implies that the computer can represent and interpret the displayed data in a manner suggestive of an experienced human c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance of edited nearest neighbor rules in high dimensions

    Publication Year: 1985, Page(s):136 - 139
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (819 KB)

    It is shown that, asymptotically, as the dimensionality of the space increases, the usual sample editing becomes independent. This makes an accurate calculation of performance in a high-dimensional space straightforward. Thus, with high dimensionality, the grouping given by J. Koplowitz and T.A. Brown (1981) is not necessary for determining the risk, and, similarly, the results presented by D.L. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information energy of a fuzzy event and a partition of fuzzy events

    Publication Year: 1985, Page(s):139 - 144
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    In order to define a measure of the information processed by a fuzzy event and by a partition of fuzzy events, the `information energy' provided by a fuzzy event and a partition of fuzzy events is considered. This measure integrates the statistical uncertainty resulting from the occurrence of events and the uncertainty of meaning of events that is expressed by the membership function. The function... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting edge segments

    Publication Year: 1985, Page(s):144 - 152
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5097 KB)

    The performances of three classes of edge operators are evaluated. The three are conventional 3×3 operators with a connectivity test, sequential edge detectors using both edge strength and direction information, and edge detectors using large masks. Implementations of the sequential edge operators using both the edge strength and direction information to detect edge segments with smoothly v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-accuracy syntactic recognition algorithm for handwritten numerals

    Publication Year: 1985, Page(s):152 - 158
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1906 KB)

    A new set of topological features (primitives) for use with a syntactic classifier for high-accuracy recognition of handwritten numerals is proposed. The tree grammar used in this study makes it possible to achieve high-recognition speeds with minimal preprocessing of the test pattern. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A representation theorem for linear pattern classifier training

    Publication Year: 1985, Page(s):159 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (730 KB)

    A new representation concept, named the teaching space approach, for the pattern classification training theory is proposed as an alternative to the feature space and the weight space approach used in the contemporary pattern classification theory. The concept is introduced formally by means of a representation theorem. A model of the training process is given by the theorem that makes transparent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A differentiation / enhancement edge detector and its properties

    Publication Year: 1985, Page(s):162 - 168
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2513 KB)

    A differentiation/enhancement edge detector for noisy situations is proposed. The definition of the gradient has been initiated from the algorithm for finding a border in a binary picture. The advantages of this operator have been compared with those of other widely used operators. A measurement of error in extracting edges by thresholding the gradient has also been suggested, and for the detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to the design of reinforcement schemes for learning automata

    Publication Year: 1985, Page(s):168 - 175
    Cited by:  Papers (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1658 KB)

    A new class of reinforcement schemes for learning automata that makes use of estimates of the random characteristics of the environment is introduced. Both a single automaton and a hierarchy of learning automata are considered. It is shown that under small values for the parameters, these algorithms converge in probability to the optimal choice of actions. By simulation it is observed that, for bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of fuzzy set theory

    Publication Year: 1985, Page(s):175 - 189
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3553 KB)

    A state-of-the-art review of the literature related to applications of fuzzy set theory, with special emphasis on fuzzy industrial controllers, is presented. It is demonstrated that fuzzy set theory is applicable to a wide range of practical problems and that simple fuzzy control algorithms do give good results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contributors

    Publication Year: 1985, Page(s):190 - 192
    Request permission for commercial reuse | PDF file iconPDF (2867 KB)
    Freely Available from IEEE