By Topic

IEEE Transactions on Systems, Man, and Cybernetics

Issue 3 • Date May/Jun 1993

Filter Results

Displaying Results 1 - 25 of 28
  • Decision making involving imperfect knowledge

    Publication Year: 1993, Page(s):840 - 851
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1212 KB)

    The human capability of making complex decisions is one of the most fascinating facets of human intelligence, especially if vague, judgemental, default, or uncertain knowledge is involved. This paper focuses on the automation of this capability. It advocates treating rule-based decision making as a problem of evidence combination: Rules are considered to provide evidence for or against a certain d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Games of stochastic learning automata and adaptive signal processing

    Publication Year: 1993, Page(s):851 - 856
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The use of stochastic learning automata to perform global search of adaptive IIR filter error surfaces has been recently demonstrated by the authors. In this correspondence the concept of automata games and a novel hybrid search strategy are introduced to improve the convergence speed, and as possible solutions to the high dimensionality problem View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing open requirements with a fragment-based specification

    Publication Year: 1993, Page(s):724 - 736
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1436 KB)

    The paper describes and evaluates an alternative representation scheme for software applications in which the requirements are poorly understood or dynamic (i.e., open). The discussion begins with a classification of requirements specification properties and their relationship to the software process. Emphasis is placed on the representation schemes that are most appropriate for projects with open... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How far to commit to open-loop action: a probabilistic decision approach with analogies to signal-detection theory

    Publication Year: 1993, Page(s):888 - 890
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    A theory for optimizing the extent of a continuous action variable in a situation where either or both a discrete reward and discrete cost occur as probabilistic functions of the extent of the action selected is presented. It is shown how in many respects the approach is similar to signal detection theory, and also that there are the essential differences, especially since the decision is continuo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributive model of playing the game Link-Five and its computer implementation

    Publication Year: 1993, Page(s):897 - 900
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Contrary to conventional belief, this paper shows that even a simple model can make consistent intelligent moves that cannot be differentiated from the moves made by average human players. Our approach is distributive in nature, which does not require tree searching. Some theoretical aspects of connection games played on a Go board are also investigated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation of nonstructured concurrency by Petri net languages

    Publication Year: 1993, Page(s):872 - 875
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The concurrency is classified into two types: structured concurrency and nonstructured concurrency. After showing that the nonstructured concurrency cannot be represented by the conventional notations in the Petri net language, a method to represent such concurrency by the language is proposed. The proposed method allows us to utilize the existing approaches for analyzing properties of a nonstruct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NOVADIB: a novel architecture for asynchronous, distributed, real-time banking modeled on loosely coupled parallel processors

    Publication Year: 1993, Page(s):917 - 927
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1220 KB)

    The payment-processing system in the banking industry consists of deposits, withdrawals, and transfers of monies through the use of cash, checks, magnetic tapes, and electronic transactions. Most transactions are realized by batch-mode processing. Batch-mode processing suffers from many limitations, the principal ones being that 1) users are denied real-time access to their money and that 2) a use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence in problem solving: a prelude to quantitative analysis

    Publication Year: 1993, Page(s):746 - 765
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1888 KB)

    The paper describes a set of procedures that could be successfully used to restructure a mental model of diverse, connected constructs into a compact model suitable for quantitatively examining the key options available to the decision maker. These procedures can be applied in an interactive manner with a single decision maker or group of decision makers. The input to the convergence process is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models of contrast sensitivity in human vision

    Publication Year: 1993, Page(s):857 - 864
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Eight models are examined as input-output representations of steady-state vision in humans at moderate to low level illumination. Three new models for visual contrast sensitivity are introduced and evaluated using contrast sensitivity function (CSF) data with samples on both narrow and wide frequency ranges. Additionally, five variations of previously published models are evaluated using the same ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effects of computer mediated interactivity on idea generation: an experimental investigation

    Publication Year: 1993, Page(s):737 - 745
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    The problems facing business leaders today are becoming more complex and unique. As such, managers can no longer rely on conventional well-established solution methods-the more unique the problem, the greater the need for creative solutions. Research suggests that the idea generation process can be facilitated by information technology. The paper focuses on the question of whether interactivity in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COSMO: a communication scheme for cooperative knowledge-based systems

    Publication Year: 1993, Page(s):809 - 824
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1652 KB)

    The purpose of this paper is to present the design principles and features of a communication scheme that has been used to support cooperative problem solving within a network of knowledge-based systems. In presenting this account, we attempt to answer a set of critical yet unsettled questions of cooperative systems communication, such as when and how a knowledge-based system knows what message to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector quantization for texture classification

    Publication Year: 1993, Page(s):637 - 649
    Cited by:  Papers (12)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1684 KB)

    A method for classifying and coding textures that is based upon transform vector quantization is presented. Techniques for texture classification and vector quantization similarly process small, nonoverlapping blocks of image data. Local spatial frequency features have been identified as being appropriate for texture classification, indicating that a transform vector quantization scheme should be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct control and coordination using neural networks

    Publication Year: 1993, Page(s):686 - 697
    Cited by:  Papers (39)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB)

    The performance of an industrial process control system equipped with a conventional controller may be degraded severely by a long system-time delay, dead zone and/or saturation of actuator mechanisms, model and/or parameter uncertainties, and process noises. The coordinated control of multiple robots is another challenging problem. In a multiple-robot system, each robot is a stand-alone device eq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control of cooperative multiple flexible joint robots

    Publication Year: 1993, Page(s):833 - 839
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The problem of controlling multiple flexible joint robots during cooperative manipulation of a rigidly grasped common load (denoted as the CMFJR problem) is addressed. The dynamic model of the CMFJR shows the interaction between the manipulators in the closed chain is analogous to a single manipulator interacting with frictionless (algebraic constraint) surface, while in motion along the surface. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk associated with software development: a holistic framework for assessment and management

    Publication Year: 1993, Page(s):710 - 723
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1392 KB)

    This paper focuses on the software development process and proposes a framework for the assessment and management of risk associated with this process. The proposed framework is grounded on a holistic concept termed hierarchical holographic modeling, where more than one perspective or vision of the risk associated with software development is analyzed. Three perspectives, or decompositions, are in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robotic collision avoidance in a flexible assembly cell using a dynamic knowledge base

    Publication Year: 1993, Page(s):766 - 782
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1412 KB)

    A knowledge-based approach to handle dynamic changes in assembly cell configuration, to identify potential obstacles, and to determine a collision-free path for the robot is discussed. The knowledge base reduces the computation time during the collision detection and path planning stages thereby allowing for real time applications. The use of vision cameras to obtain the current cell configuration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments in robotic sensorimotor control during grasp

    Publication Year: 1993, Page(s):891 - 896
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    A series of experiments is presented, using a robot manipulator, which attempts to reproduce human sensorimotor control during grasping. The work utilizes a multifingered, dextrous robot hand equipped with a fingertip force sensor to explore dynamic grasp force adjustment during manipulation. The work is primarily concerned with the relationship between the weight of an object and the grasp force ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polyhedral face reconstruction and modeling from a single image with structured light

    Publication Year: 1993, Page(s):864 - 872
    Cited by:  Papers (7)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    The determination of the 3-D geometric model of visible polyhedral faces from a single view is addressed. It applies a grid coding technique to derive the normal vector of each visible polyhedral face and the depth parameter of the face equation based on the given dimensions of the grid on the code plate. It is shown that the method is correspondenceless. Furthermore, it also determines the 3-D fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preferring diagnoses by abduction

    Publication Year: 1993, Page(s):792 - 808
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1608 KB)

    Much research has been devoted to diagnosis, where two main approaches have been pointed out: the empirical association-based diagnostic approach and the model-based diagnostic one. Both approaches can be characterized by the kind of knowledge that has to be specified and the diagnostic method that has to be used. However, it seems particularly difficult in real-world applications to obtain a comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An equivalence between inductive learning and pseudo-Boolean logic simplification: a rule generation and reduction scheme

    Publication Year: 1993, Page(s):907 - 917
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    To provide confidence in a rule generation and reduction scheme, it is necessary to show an equivalence between at least two alternative approaches that provide the same reduced rule sets. For this purpose we present two rule reduction schemes in fuzzy knowledge based systems. These two schemes are based on: (1) a pseudo-Boolean analysis, and (2) the ID3 algorithm. Here, we show an equivalence bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shortest path algorithm for a nonrotating object among obstacles of arbitrary shapes

    Publication Year: 1993, Page(s):825 - 833
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    A shortest path algorithm for motion planning problem via mathematical morphology is proposed. The moving object and obstacles can be of arbitrary shapes of finite size. To speed up the computation of the free positions of a moving object, the idea of shape decomposition is developed. It is proven that the decomposition always reduces the number of iterations. In addition, a simple geometric algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coadaptive behaviour in a simple distributed job scheduling system

    Publication Year: 1993, Page(s):902 - 907
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    A simple system that demonstrates coadaptation in distributed decision-making as applied to the problem of job scheduling is presented. The decision-making process is constructed as a set of autonomous agents based on learning automata that can individually learn from feedback. The set of agents adapt together, or coadapt, to form a good, though not necessarily optimal, global decision process. Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inverse kinematic functions for approach and catching operations

    Publication Year: 1993, Page(s):783 - 791
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    The paper proposes an approach to obtain inverse kinematic functions whose domain is not limited to the manipulator's workspace. As a result, these functions can be used to map points of the Cartesian space that do not belong to the manipulator's workspace. The positioning problem is formulated as a minimization of the distance between the prescribed Cartesian point and the end-effector. Hence, po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer users verification using the perceptron algorithm

    Publication Year: 1993, Page(s):900 - 902
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The perceptron algorithm was used to verify the identity of computer users. By performing the real-time measurement of the time durations between the keystrokes entered in the user's password, data was collected over a period of eight weeks from 10 valid users and 14 invalid users. The password used was the user's name. Decision functions were derived using part of the data (training data) to comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph-theoretic techniques for computer intraconnection minimization

    Publication Year: 1993, Page(s):876 - 888
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1044 KB)

    The design and minimization of computer intraconnections have a great influence on system characteristics such as cost, performance, failure rate, and in the case of VLSI, chip area. The problem addressed was the minimization of computer intraconnections with bandwidth and delay constraints imposed. This research problem has been formally defined as a graph theory problem. An heuristic algorithm, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.