By Topic

# IEEE Transactions on Systems, Man, and Cybernetics

## Filter Results

Displaying Results 1 - 22 of 22
• ### IEEE Transactions on Systems, Man, and Cybernetics [Cover]

Publication Year: 1985, Page(s): 1
| PDF (119 KB)
• ### On better mousetraps and basic research: Getting the applied world to the laboratory door

Publication Year: 1985, Page(s):2 - 8
Cited by:  Papers (3)
| | PDF (1648 KB)

Issues surrounding the relationship between the basic research community and the applied world are discussed. Considerations include the contrasting perspectives of the two worlds and the resulting differences in the ways in which design and evaluation are approached. These contrasts are used as a basis for suggesting mechanisms for improving transfer of basic research results to real world applic... View full abstract»

• ### An information theory model for the evaluation of circumstantial evidence

Publication Year: 1985, Page(s):9 - 16
Cited by:  Papers (1)
| | PDF (1657 KB)

The problem of assessing the weight of circumstantial evidence linking a suspect with the perpetrator of a crime is considered. The quantitative measure PG of weight of circumstantial evidence that is used is the probability that culprit and suspect may be identified with certainty as one and the same based solely upon the circumstantial evidence. A unifying model for evaluating ... View full abstract»

• ### The entropy of design: A study on the meaning of creativity

Publication Year: 1985, Page(s):16 - 30
Cited by:  Papers (5)
| | PDF (3064 KB)

A view on the design process based on the information flow that occurs during this process is presented. The detailing step paradigm is used as the modeling primitive, and the formalization is based on simple expressions and rules from information theory. A formal medium is provided for studying the relationship between the complexity of a design and the creativity involved in the design process. ... View full abstract»

• ### The use of analogs in the innovation process: A software engineering protocol analysis

Publication Year: 1985, Page(s):30 - 44
Cited by:  Papers (2)
| | PDF (2936 KB)

A human information processing account of how experienced practitioners utilize analogues in the innovation process is presented. The protocols of several practitioners are collected and analyzed. The problem behavior graphs, knowledge elements utilized, and operator elements applied are described, and a descriptive model of the innovation process is assembled. Implications for a production system... View full abstract»

• ### Fuzzy multiattribute utility analysis for collective choice

Publication Year: 1985, Page(s):45 - 53
Cited by:  Papers (5)
| | PDF (1492 KB)

An extension of multiattribute utility analysis for the multiple-agent decision problem is presented. Although multiattribute utility analysis is concerned with decision-making under uncertainty, assessment of the parameters of the multiattribute utility functions is actually performed deterministically by the single decision-maker. The authors are concerned with fuzzy evaluation of the multiattri... View full abstract»

• ### Computer control via limited natural language

Publication Year: 1985, Page(s):54 - 68
Cited by:  Papers (2)
| | PDF (2741 KB)

A natural language processor is described for control of a machine in task-oriented situations. Particular emphasis is given to issues related to flow-of-control statements in dialogue. These include branching constructs, as in if row 1 contains a positive entry, then . . .' and looping constructs, as in repeat for all other rows'. Special problems are discussed concerning the processing of deep... View full abstract»

• ### A mechanism for touch control of a sagittal five-link finger-hand

Publication Year: 1985, Page(s):69 - 77
Cited by:  Papers (4)
| | PDF (1428 KB)

A five-link planar model of a hand with one finger is developed. The actuators are analogous to muscle force generators. Three control problems, stability, maintaining a constrained motion, and control of the force of constraint, are considered in this model. Two feedback loops-one time-invariant and one time-varying-appear to be adequate for control purposes. Digital computer simulations are pres... View full abstract»

• ### A structured framework for the control of industrial manipulators

Publication Year: 1985, Page(s):78 - 90
Cited by:  Papers (1)
| | PDF (2509 KB)

A framework for the intelligent control of industrial manipulators is described. The control structure that is described is designed to take full advantage of the improved sensing capabilities and more powerful languages that have become, or are now becoming, available. The framework is a hierarchical structure is which the aspects of motion control are isolated in independent layers of the organi... View full abstract»

• ### Reorganization and diversification of signals in vision

Publication Year: 1985, Page(s):91 - 101
Cited by:  Papers (18)
| | PDF (3790 KB)

Extensive processing and reorganization of information are required as retinally generated signals flow centrally. Insight into some principles of the reorganization and transformations that occur in the early stages of the visual pathway, prior to the higher stages of pattern recognition, is provided through an analysis of receptive fields and cell counts. The rate of information flow is reduced ... View full abstract»

• ### Periodic optimization of a class of bilinear systems with application to control of cell proliferation and cancer therapy

Publication Year: 1985, Page(s):102 - 115
Cited by:  Papers (1)
| | PDF (2311 KB)

The authors are concerned with the optimization of a class of bilinear systems under an exponential stability constraint by periodic control functions. Such problems arise in many practical applications, a typical one being the design of optimal strategies for cancer chemotherapy by a suitable control of the proliferation kinetics of cell populations. To provide a focus to the approach used for op... View full abstract»

• ### Fuzzy identification of systems and its applications to modeling and control

Publication Year: 1985, Page(s):116 - 132
Cited by:  Papers (4657)  |  Patents (8)
| | PDF (2069 KB)

A mathematical tool to build a fuzzy model of a system where fuzzy implications and reasoning are used is presented. The premise of an implication is the description of fuzzy subspace of inputs and its consequence is a linear input-output relation. The method of identification of a system using its input-output data is then shown. Two applications of the method to industrial processes are also dis... View full abstract»

• ### Computer understanding of air traffic control displays

Publication Year: 1985, Page(s):133 - 135
| | PDF (2131 KB)

Possible aircraft collisions from a display of many aircraft are perceived by a human air traffic controller. In the work described, the computer understands the displayed aircraft conflict data by processing a global semantic representation of the displayed data. Understanding implies that the computer can represent and interpret the displayed data in a manner suggestive of an experienced human c... View full abstract»

• ### On the performance of edited nearest neighbor rules in high dimensions

Publication Year: 1985, Page(s):136 - 139
Cited by:  Papers (1)
| | PDF (819 KB)

It is shown that, asymptotically, as the dimensionality of the space increases, the usual sample editing becomes independent. This makes an accurate calculation of performance in a high-dimensional space straightforward. Thus, with high dimensionality, the grouping given by J. Koplowitz and T.A. Brown (1981) is not necessary for determining the risk, and, similarly, the results presented by D.L. W... View full abstract»

• ### Information energy of a fuzzy event and a partition of fuzzy events

Publication Year: 1985, Page(s):139 - 144
Cited by:  Papers (1)
| | PDF (992 KB)

In order to define a measure of the information processed by a fuzzy event and by a partition of fuzzy events, the `information energy' provided by a fuzzy event and a partition of fuzzy events is considered. This measure integrates the statistical uncertainty resulting from the occurrence of events and the uncertainty of meaning of events that is expressed by the membership function. The function... View full abstract»

• ### Detecting edge segments

Publication Year: 1985, Page(s):144 - 152
Cited by:  Papers (5)
| | PDF (5097 KB)

The performances of three classes of edge operators are evaluated. The three are conventional 3×3 operators with a connectivity test, sequential edge detectors using both edge strength and direction information, and edge detectors using large masks. Implementations of the sequential edge operators using both the edge strength and direction information to detect edge segments with smoothly v... View full abstract»

• ### A high-accuracy syntactic recognition algorithm for handwritten numerals

Publication Year: 1985, Page(s):152 - 158
Cited by:  Papers (13)
| | PDF (1906 KB)

A new set of topological features (primitives) for use with a syntactic classifier for high-accuracy recognition of handwritten numerals is proposed. The tree grammar used in this study makes it possible to achieve high-recognition speeds with minimal preprocessing of the test pattern. View full abstract»

• ### A representation theorem for linear pattern classifier training

Publication Year: 1985, Page(s):159 - 161
| | PDF (730 KB)

A new representation concept, named the teaching space approach, for the pattern classification training theory is proposed as an alternative to the feature space and the weight space approach used in the contemporary pattern classification theory. The concept is introduced formally by means of a representation theorem. A model of the training process is given by the theorem that makes transparent... View full abstract»

• ### A differentiation / enhancement edge detector and its properties

Publication Year: 1985, Page(s):162 - 168
Cited by:  Papers (2)
| | PDF (2513 KB)

A differentiation/enhancement edge detector for noisy situations is proposed. The definition of the gradient has been initiated from the algorithm for finding a border in a binary picture. The advantages of this operator have been compared with those of other widely used operators. A measurement of error in extracting edges by thresholding the gradient has also been suggested, and for the detectio... View full abstract»

• ### A new approach to the design of reinforcement schemes for learning automata

Publication Year: 1985, Page(s):168 - 175
Cited by:  Papers (49)
| | PDF (1658 KB)

A new class of reinforcement schemes for learning automata that makes use of estimates of the random characteristics of the environment is introduced. Both a single automaton and a hierarchy of learning automata are considered. It is shown that under small values for the parameters, these algorithms converge in probability to the optimal choice of actions. By simulation it is observed that, for bo... View full abstract»

• ### Applications of fuzzy set theory

Publication Year: 1985, Page(s):175 - 189
Cited by:  Papers (61)
| | PDF (3553 KB)

A state-of-the-art review of the literature related to applications of fuzzy set theory, with special emphasis on fuzzy industrial controllers, is presented. It is demonstrated that fuzzy set theory is applicable to a wide range of practical problems and that simple fuzzy control algorithms do give good results. View full abstract»

• ### Contributors

Publication Year: 1985, Page(s):190 - 192
| PDF (2867 KB)