Volume 32 Issue 2 • May 2002
Guest editorial special issue on fusion of soft computing and hard computing in industrial applicationsPublication Year: 2002, Page(s):69 - 71
Cited by: Papers (9)
Correction to "Approach by localization and multiobjective evolutionary optimization for flexible job-shop scheduling problems"Publication Year: 2002, Page(s): 172
Cited by: Papers (4)First Page of the ArticleView full abstract»
Cited by: Papers (34)
Soft computing (SC) is an emerging collection of methodologies which aims to exploit tolerance for imprecision, uncertainty, and partial truth to achieve robustness, tractability, and low total cost. It differs from conventional hard computing (HC) in the sense that, unlike hard computing, it is strongly based on intuition or subjectivity. Therefore, soft computing provides an attractive opportuni... View full abstract»
Performance comparison of fused soft control/hard observer type controller with hard control/hard observer type controller for switched reluctance motorsPublication Year: 2002, Page(s):99 - 112
Cited by: Papers (5)
Both soft computing (SC) and hard computing (HC) techniques are often successful for solving real-world control problems. In cases where problems could be solved by either or both methodologies, an important research problem is to find what are the advantages for fusing SC methods together with HC methods, rather than using the HC method alone. Hence, in this paper, a performance comparison is det... View full abstract»
Cited by: Papers (16)
Global telecommunication systems are at the heart of the Internet revolution. To support Internet traffic they have built-in redundancy to ensure robustness and quality of service. This requires complex fault management. The traditional hard approach is to reduce the number of alarm events (symptoms) presented to the operating engineer through monitoring, filtering and masking. The goal of the sof... View full abstract»
Cited by: Papers (22)
A computational system called fuzzy-genetic decision optimization combines two soft computing methods, genetic optimization and fuzzy ordinal preference, and a traditional hard computing method, stochastic system simulation, to tackle the difficult task of generating battle plans for military tactical forces. Planning for a tactical military battle is a complex, high-dimensional task which often b... View full abstract»
Cited by: Papers (335) | Patents (1)
Unlike the many soft computing applications where it suffices to achieve a "good approximation most of the time," a control system must be stable all of the time. As such, if one desires to learn a control law in real-time, a fusion of soft computing techniques to learn the appropriate control law with hard computing techniques to maintain the stability constraint and guarantee convergence is requ... View full abstract»
Cited by: Papers (11) | Patents (1)
Indirect, online tool wear monitoring is one of the most difficult tasks in the context of process monitoring for metal-cutting machining processes. Based on a continuous acquisition of certain process parameters (signals such as cutting forces or acoustic emission) with multi-sensor systems, it is possible to estimate or to classify certain wear parameters. However, despite of intensive scientifi... View full abstract»
Cited by: Papers (25)
Robust control techniques such as sliding mode control (SMC) require a dynamic model of the plant and bounds on modeling uncertainty to formulate control laws with guaranteed stability. Although techniques for modeling dynamic systems and estimating model parameters are well established, very few procedures exist for estimating uncertainty bounds. In the case of SMC design, a conservative global b... View full abstract»
Cited by: Papers (52)
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be exploited by soft computing. This paper presents a novel intrusion detection system (IDS) that models normal behaviors with hidden Markov models (HMM) and attempts to detect intrusions by noting significant deviations from th... View full abstract»
Cited by: Papers (23) | Patents (1)
A sensor management system based on soft computing techniques has been developed and implemented in the flight control system of a small commercial aircraft. Unlike in the conventional sensor management system, the signals from sensors are assigned weights based on fuzzy membership functions and the consolidated signal is computed as a weighted average. This approach improves the quality of the co... View full abstract»
Aims & Scope
This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)