By Topic

IEEE Transactions on Systems, Man, and Cybernetics

Issue 5 • Date May 1995

Filter Results

Displaying Results 1 - 18 of 18
  • Teleoperator response in a touch task with different display conditions

    Publication Year: 1995, Page(s):878 - 881
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    This paper deals with the evaluation of human biofeedback response in virtual reality and in direct view. The experiments have been performed with a new paradigm for the evaluation of human biofeedback during the telemanipulation performance of a touch task. The controlled motion of one finger is monitored with the surface EMG, while a mechanical robotized hand finger follows the motion imposed by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive sliding mode coordinated control of multiple robot arms attached to a constrained object

    Publication Year: 1995, Page(s):871 - 878
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    When a common object, attached to multiple robot arms, is cooperatively manipulated to move along a constrained surface, the control task requires the simultaneous control of the motion trajectory of the attached object on the constrained surface; the constrained force due to the contact with the surface; and the internal force exerted by the arms on the object. To accomplish such a control object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CACOP-a random pattern testability analyzer

    Publication Year: 1995, Page(s):865 - 871
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    In this paper a new method called CACOP For the detection probability analyses of random test patterns is proposed. Considering computational complexity, CACOP is a compromise between O(n2) testability analyses like full-range cutting algorithm (FRCA) and linear time testability analyses like the controllability observability program (COP). By propagating bounds of controllabilities and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A branch and bound clustering algorithm

    Publication Year: 1995, Page(s):895 - 898
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    We discuss the clustering problem in a 0-1 matrix in this paper. Although clustering algorithms are available in the literature, many of them cannot produce a solution matrix in a desirable structure. Therefore, additional computation or user intervention is required to obtain submatrices (i.e., clusters) from a solution matrix. To solve the clustering problem effectively, we use a branch and boun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling student knowledge with self-organizing feature maps

    Publication Year: 1995, Page(s):727 - 737
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    The paper describes a novel application of neural networks to model the behavior of students in the context of an intelligent tutoring system. Self-organizing feature maps are used to capture the possible states of student knowledge from an existing test database. The trained network implements a universal student knowledge model that is compatible with knowledge space theory approaches to student... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A vector measure for the intelligence of a question-answering (Q-A) system

    Publication Year: 1995, Page(s):814 - 823
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    The problem of quantification of intelligence of humans, and of intelligent systems, has been a challenging and controversial topic. IQ tests have been traditionally used to quantify human intelligence based on results of test designed by psychologists. It is in general very difficult to quantify intelligence. In this paper the authors consider a simple question-answering (Q-A) system and use this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-dimensional optimal sensor placement

    Publication Year: 1995, Page(s):781 - 792
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    A method for determining the optimal two-dimensional spatial placement of multiple sensors participating in a robot perception task is introduced in this paper. This work is motivated by the fact that sensor data fusion is an effective means of reducing uncertainties in sensor observations, and that the combined uncertainty varies with the relative placement of the sensors with respect to each oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fourier descriptors for computer graphics

    Publication Year: 1995, Page(s):861 - 865
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    The two dimensional coding of contours by Fourier descriptors which have been used extensively in shape discrimination and pattern recognition in the past is extended into three dimensions so as to enhance the ability to geometrically transform surfaces in Euclidean space. A set of Fourier descriptors are used as a specific example of a linear transform for arbitrary closed shape contours in three... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and synthesis of fuzzy closed-loop control systems

    Publication Year: 1995, Page(s):881 - 888
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    In this paper, the sufficient and necessary conditions on stability of fuzzy closed-loop control systems are formulated. Based on the sufficient condition of stability, an algorithm is presented to synthesize stable fuzzy controllers. An example for synthesizing a fuzzy control system is given to show that the method is available View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Financial document processing based on staff line and description language

    Publication Year: 1995, Page(s):738 - 754
    Cited by:  Papers (18)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1348 KB)

    Millions of financial transactions take place every day. Associated with them are documents such as bank cheques, payment slips and bills which have to be processed. A great deal of time, effort and money will be saved if they can be entered into the computer and processed automatically. According to the specific characteristics of financial documents, it can be concluded that it is possible to bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The dynamic flowgraph methodology for assessing the dependability of embedded software systems

    Publication Year: 1995, Page(s):824 - 840
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1424 KB)

    The dynamic flowgraph methodology (DFM) is an integrated methodological approach to modeling and analyzing the behavior of software-driven embedded systems for the purpose of reliability/safety assessment and verification. The methodology has two fundamental goals: (1) to identify how certain postulated events may occur in a system; and (2) to identify an appropriate testing strategy based on an a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document retrieval using knowledge-based fuzzy information retrieval techniques

    Publication Year: 1995, Page(s):793 - 803
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    A knowledge-based approach for fuzzy information retrieval is proposed, where interval queries and weighted-interval queries are allowed for document retrieval. In this paper, knowledge is represented by a concept matrix, where the elements in a concept matrix represent relevant values between concepts. The implicit relevant values between concepts are inferred by the transitive closure of the con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an automatic consensus generator tool: EGAC

    Publication Year: 1995, Page(s):888 - 894
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Automatic knowledge acquisition for expert systems has attracted much attention. Several algorithms that infer concept descriptions from a given set of training examples have been developed to aid in this task, some of them elicit concepts from examples organized in data matrices. These algorithms infer from different training examples (or different matrices defined by a set of experts) slightly d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task sequence planning using fuzzy Petri nets

    Publication Year: 1995, Page(s):755 - 768
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1204 KB)

    This paper discusses the problem of representation and planning of operations sequences in a robotic system using fuzzy Petri nets. In the fuzzy Petri net representation, objects whose internal states are altered during a process are termed soft objects, and the process steps where alterations may occur are labeled key transitions. A correct sequence is defined as a sequence which is feasible, com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy B-spline membership function (BMF) and its applications in fuzzy-neural control

    Publication Year: 1995, Page(s):841 - 851
    Cited by:  Papers (96)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    A general methodology for constructing fuzzy membership functions via B-spline curves is proposed. By using the method of least-squares, the authors translate the empirical data into the form of the control points of B-spline curves to construct fuzzy membership functions. This unified form of fuzzy membership functions is called a B-spline membership function (BMF). By using the local control pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A k-nearest neighbor classification rule based on Dempster-Shafer theory

    Publication Year: 1995, Page(s):804 - 813
    Cited by:  Papers (366)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    In this paper, the problem of classifying an unseen pattern on the basis of its nearest neighbors in a recorded data set is addressed from the point of view of Dempster-Shafer theory. Each neighbor of a sample to be classified is considered as an item of evidence that supports certain hypotheses regarding the class membership of that pattern. The degree of support is defined as a function of the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed fuzzy system modeling

    Publication Year: 1995, Page(s):769 - 780
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    The paper introduces and studies an idea of distributed modeling treating it as a new paradigm of fuzzy system modeling and analysis. This form of modeling is oriented towards developing individual (local) fuzzy models for specific modeling landmarks (expressed as fuzzy sets) and determining the essential logical relationships between these local models. The models themselves are implemented in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The process of research investigations in artificial intelligence-a unified view

    Publication Year: 1995, Page(s):852 - 861
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1096 KB)

    A number of research communities recognize artificial intelligence (AI) as a valid reference discipline. However, several papers have criticized AI's research methodologies. This paper attempts to clarify and improve the methods used in AI. Definitions are proposed for terms such as AI theory, principles, hypotheses, and observations. Next, a unified view of AI research methodology is proposed. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.