Volume 30 Issue 1 • Feb 2000
Cited by: Papers (24)
The problem of initial probability assignment which is consistent with the available information about a probabilistic system is called a direct problem. E.T. Jaynes' (1957) maximum entropy principle (MaxEnt) provides a method for solving direct problems when the available information is in the form of moment constraints. On the other hand, given a probability distribution, the problem of finding ... View full abstract»
Cited by: Papers (22)
Presents a scheme for object recognition by classificatory problem solving in the framework of fuzzy sets and possibility theory. The scheme has a particular focus on handling the imperfection problems that are common in application domains where the objects to be recognized (detected and identified) represent undesirable situations, referred to as crises. Crises develop over time, and observation... View full abstract»
The need to manage business operations effectively on an international scale is becoming critically important. Around the world firms are mobilizing to meet increasing global competition rapidly by redirecting, reorganizing, expanding, and relocating operations, or through joint ventures with other companies. One area that faces these challenges is the cables industry, wherein the need for integra... View full abstract»
Cited by: Papers (33)
This paper describes a signal detection algorithm based on Dempster-Shafer theory. The detector combines evidence provided by multiple waveform features and explicitly considers uncertainty in the detection decision. The detector classifies waveforms as including a signal, not including a signal, or being uncertain, in which case no conclusion regarding presence or absence of a signal is drawn. Th... View full abstract»
Cited by: Papers (15)
Operational risk management is the process of monitoring, evaluating, and changing courses of actions with potential detrimental consequences in real time. In this paper, we extend the decision models proposed in the literature for individual risk managers to account for situations where multiple risk managers are involved. For this purpose, two dynamic and adaptive preference aggregation models f... View full abstract»
Cited by: Papers (7)
A new chaos control method is proposed which is useful for taking advantage of chaos and avoiding it. The proposed method is based on the following facts: (1) chaotic phenomena can be generated and eliminated by controlling the maximum Lyapunov exponent of the systems, and (2) the maximum Lyapunov exponent can be formulated and calculated by using higher-order derivatives of universal learning net... View full abstract»
Cited by: Papers (10)
Dynamic behavior is enacted from static observations, but as experience is reconstructed with concepts, mutual exclusivity replaces correspondence between the factors of action and observation. This bistable reality generates incommensurable world views between groups, which constrain measurement and give rise to a tension that enables change but also results in misleading accounts, as if behavior... View full abstract»
Cited by: Papers (28)
A method for object recognition that is invariant under translation, rotation and scaling is addressed. The first step of the method (pre-processing) takes into account the invariant properties of the normalized moment of inertia and a novel coding that extracts topological object characteristics. The second step (recognition) is achieved by using a holographic nearest-neighbor (HHN) algorithm, in... View full abstract»
Cited by: Papers (16)
Receiver operating characteristic (ROC) curves have been used to examine a novel target recognition system using a number of knowledge-based techniques to automatically detect surface land mines that are present in 30 sets of thermal and multispectral images. A summary of the results, graphed at a probability of detection greater than or equal to 96%, shows the false-alarm rates (FARs) obtained us... View full abstract»
Character recognition systems can contribute tremendously to the advancement of the automation process and can improve the interaction between man and machine in many applications, including office automation, check verification and a large variety of banking, business and data entry applications. The main theme of the paper is the automatic recognition of hand-printed Arabic characters using mach... View full abstract»
Cited by: Papers (136)
This paper is concerned with the application of quadratic optimization for motion control to feedback control of robotic systems using cerebellar model arithmetic computer (CMAC) neural networks. Explicit solutions to the Hamilton-Jacobi-Bellman (H-J-B) equation for optimal control of robotic systems are found by solving an algebraic Riccati equation. It is shown how the CMAC can cope with nonline... View full abstract»
Cited by: Papers (58) | Patents (1)
A method defining a reject option that is applicable to a given 0-reject classifier is proposed. The reject option is based on an estimate of the classification reliability, measured by a reliability evaluator Ψ. Trivially, once a reject threshold σ has been fixed, a sample is rejected if the corresponding value of Ψ is below σ. Obviously, as σ represents the least tolera... View full abstract»
Cited by: Papers (20)
Describes an adaptive fuzzy-synchronous machine power system stabilizer (PSS) that behaves like a proportional integral derivative (PID) controller. The implemented adaptive technique predicts tracking-error divergence and makes online adjustments to the controller gain parameters in order to obtain a faster regulation of the error signal. The proposed PSS is less sensitive to the quality of exper... View full abstract»
Cited by: Papers (12)
Both in designing teleoperators or haptic interfaces and in fundamental biological motor control studies, it is important to characterize the motor commands and mechanical impedance responses of the operator (or subject). Although such a characterization is fundamentally impossible for isolated movements when these two aspects of motor behavior have similar time scales (as is the case with humans)... View full abstract»
Cited by: Papers (10)
A comparison of some fuzzy model-based adaptive-predictive control strategies is provided. The considered strategies are based on the minimization of a predefined long-range cost functional reflecting the tracking error between the reference to be followed and the plant's output. They begin at the current time instant and continue up to a given time horizon in the future. A fuzzy model of the plan... View full abstract»
Cited by: Papers (31)
Human motor control has always presented a great challenge to both scientists and engineers. It has presented most of the problems they have found difficult to handle and manipulate, which is a consequence of it being a distributed, nonlinear, time-varying system with multiple degrees of freedom that include redundancy on many levels. In recent years, the fast development of computers and the emer... View full abstract»
Cited by: Papers (15)
A constraint-based heuristic technique for predictive scheduling of passenger trains is presented in this paper. The algorithm, which is lookahead, has been designed using an object-oriented methodology and is suitable for a single-track railway with some double-track sections. It is shown that the heuristic tends to minimize total waiting time of the trains concerned. Simulation experiments with ... View full abstract»
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)