Pub Date : 2023-10-01DOI: 10.1109/msmc.2022.3227383
Bin Hu, XiaoDong Zhang, XinJie Liu, TianJu Ding, XiSong Dong
This article proposes a parallel flexible manufacturing system (FMS), which is divided into three subparallel systems, including a parallel manufacturing system, a parallel inspection system, and a parallel loading–unloading system. By building a chess parallel manufacturing production line, the lightweight practice of a parallel FMS is completed. Based on the parallel system ACP idea, the parallel FMS can realize the agility advantage of flexible manufacturing to quickly respond to diverse needs; realize the ability to quickly correct defective products; and predict and optimize the production process through the analysis and modeling of production data, reducing the product quality defect rate. This article also proposes the concept of parallel flexible manufacturing triplets, adding a microphysical world to the artificial world and the physical world, highlighting the rapid iteration characteristics of flexible manufacturing.
{"title":"A Parallel Flexible Manufacturing System: Smart Manufacturing in the Age of Smart Industry","authors":"Bin Hu, XiaoDong Zhang, XinJie Liu, TianJu Ding, XiSong Dong","doi":"10.1109/msmc.2022.3227383","DOIUrl":"https://doi.org/10.1109/msmc.2022.3227383","url":null,"abstract":"This article proposes a parallel flexible manufacturing system (FMS), which is divided into three subparallel systems, including a parallel manufacturing system, a parallel inspection system, and a parallel loading–unloading system. By building a chess parallel manufacturing production line, the lightweight practice of a parallel FMS is completed. Based on the parallel system ACP idea, the parallel FMS can realize the agility advantage of flexible manufacturing to quickly respond to diverse needs; realize the ability to quickly correct defective products; and predict and optimize the production process through the analysis and modeling of production data, reducing the product quality defect rate. This article also proposes the concept of parallel flexible manufacturing triplets, adding a microphysical world to the artificial world and the physical world, highlighting the rapid iteration characteristics of flexible manufacturing.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3319810
{"title":"IEEE Connect","authors":"","doi":"10.1109/msmc.2023.3319810","DOIUrl":"https://doi.org/10.1109/msmc.2023.3319810","url":null,"abstract":"","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3308468
Gaurav Dhiman, Atulya Nagar, Seifedine Kadry
In the boundless expanse of today’s technological landscape, the union of the Internet of Things (IoT) and artificial intelligence (AI) has bestowed upon us the transformative phenomenon known as the Social Internet of Things ( SIoT ). This intricate web of interconnected devices, pulsating with data and intelligence, has redefined the way we perceive and interact with our environment. However, as this digital tapestry weaves itself into the fabric of our lives, the need for understanding, transparency, and accountability has emerged as a clarion call.
{"title":"Artificial Intelligence for the Social Internet of Things: Analysis and Modeling Using Collaborative Technologies [Special Section Editorial]","authors":"Gaurav Dhiman, Atulya Nagar, Seifedine Kadry","doi":"10.1109/msmc.2023.3308468","DOIUrl":"https://doi.org/10.1109/msmc.2023.3308468","url":null,"abstract":"In the boundless expanse of today’s technological landscape, the union of the Internet of Things (IoT) and artificial intelligence (AI) has bestowed upon us the transformative phenomenon known as the <italic xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">Social Internet of Things</i> ( <italic xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">SIoT</i> ). This intricate web of interconnected devices, pulsating with data and intelligence, has redefined the way we perceive and interact with our environment. However, as this digital tapestry weaves itself into the fabric of our lives, the need for understanding, transparency, and accountability has emerged as a clarion call.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3277697
Jian Pan, Qing Xu, Keqiang Li, Jianqiang Wang
This article addresses the problem of controlling connected vehicles under delayed sensing information with the prediction-based control method. First, the connected vehicle cloud control system under delayed sensing is modeled as a discrete linear output feedback system with output delay. Second, synchronized and asynchronized predictor–observer structured controllers are adopted as the delay compensation strategy for known and unknown delay cases. The stability analysis of both prediction strategies under specific delay boundary and bounded model uncertainty is conducted with the help of the scaled bounded real lemma (SBRL) and Lyapunov–Krasovskii functional (LKF) methods, respectively. By utilizing the cone complementary linearization (CCL) technique, an algorithm is developed to seek the stabilized controller and observer parameters iteratively. Finally, the proposed methods are verified through connected vehicle lateral and longitudinal control scenarios built by Simulink–CarSim, where the capability and performance of the proposed delay compensation control strategy are assessed under a relatively actual dynamic.
{"title":"Cloud Control of Connected Vehicle Under Delayed Sensing Information: A Realization of Predictor–Observer Structured Controller","authors":"Jian Pan, Qing Xu, Keqiang Li, Jianqiang Wang","doi":"10.1109/msmc.2023.3277697","DOIUrl":"https://doi.org/10.1109/msmc.2023.3277697","url":null,"abstract":"This article addresses the problem of controlling connected vehicles under delayed sensing information with the prediction-based control method. First, the connected vehicle cloud control system under delayed sensing is modeled as a discrete linear output feedback system with output delay. Second, synchronized and asynchronized predictor–observer structured controllers are adopted as the delay compensation strategy for known and unknown delay cases. The stability analysis of both prediction strategies under specific delay boundary and bounded model uncertainty is conducted with the help of the scaled bounded real lemma (SBRL) and Lyapunov–Krasovskii functional (LKF) methods, respectively. By utilizing the cone complementary linearization (CCL) technique, an algorithm is developed to seek the stabilized controller and observer parameters iteratively. Finally, the proposed methods are verified through connected vehicle lateral and longitudinal control scenarios built by Simulink–CarSim, where the capability and performance of the proposed delay compensation control strategy are assessed under a relatively actual dynamic.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3276575
Nabamita Deb, Archana Kollu, Ali Alferaidi, Lulwah M. Alkwai, Pankaj Kumar
With the continuous rise of various social media, the security problems caused by disseminating news in social networks have become increasingly prominent. Among them, the dissemination of false news has brought a significant threat to the security of cyberspace. A method based on influence maximization is proposed to change the premise of the false news in network space. This article employed the Louvain clustered local degree centrality (LCLD) and random maximum degree (RMD) algorithm to extract the most influential node set via influence maximization. Subsequently, TextCNN (convolutional neural network) was used to classify and identify false news and filter out several critical points in the node set. Then, the modified propagation network was repredicted by the prediction model. As a result, the spread of false news was significantly suppressed compared with the network before modification. Finally, the verification was carried out on Buzz Feed News’s real dataset. First, the information-based cascaded prediction model can more accurately fit the actual spread. Then the modified network was input into the prediction model for prediction, and the results show that the spread of false news can be suppressed. Finally, the influence maximization algorithm deletes several nodes containing incorrect information. It can effectively suppress the spread of false news, thus verifying the effectiveness of the proposed method.
{"title":"Suppressing the Spread of Fake News Over the Social Web of Things: An Influence Maximization-Based Supervised Approach","authors":"Nabamita Deb, Archana Kollu, Ali Alferaidi, Lulwah M. Alkwai, Pankaj Kumar","doi":"10.1109/msmc.2023.3276575","DOIUrl":"https://doi.org/10.1109/msmc.2023.3276575","url":null,"abstract":"With the continuous rise of various social media, the security problems caused by disseminating news in social networks have become increasingly prominent. Among them, the dissemination of false news has brought a significant threat to the security of cyberspace. A method based on influence maximization is proposed to change the premise of the false news in network space. This article employed the Louvain clustered local degree centrality (LCLD) and random maximum degree (RMD) algorithm to extract the most influential node set via influence maximization. Subsequently, TextCNN (convolutional neural network) was used to classify and identify false news and filter out several critical points in the node set. Then, the modified propagation network was repredicted by the prediction model. As a result, the spread of false news was significantly suppressed compared with the network before modification. Finally, the verification was carried out on Buzz Feed News’s real dataset. First, the information-based cascaded prediction model can more accurately fit the actual spread. Then the modified network was input into the prediction model for prediction, and the results show that the spread of false news can be suppressed. Finally, the influence maximization algorithm deletes several nodes containing incorrect information. It can effectively suppress the spread of false news, thus verifying the effectiveness of the proposed method.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"48 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3319808
{"title":"IEEE Feedback","authors":"","doi":"10.1109/msmc.2023.3319808","DOIUrl":"https://doi.org/10.1109/msmc.2023.3319808","url":null,"abstract":"","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3319809
{"title":"IEEE Foundation","authors":"","doi":"10.1109/msmc.2023.3319809","DOIUrl":"https://doi.org/10.1109/msmc.2023.3319809","url":null,"abstract":"","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2022.3230215
Priyanka D. More, Sachin R. Sakhare, Parikshit Mahalle
The Internet of Things (IoT) facilitates connections between people and things at any time, anywhere, with anything, and with anybody through the use of any network, service, or application. The IoT is a system of actual physical objects commonly referred to as things . Things contain sensors, software, and other technologies that connect to other systems and devices over the Internet and allow data exchange. Identity management (IDM) involves managing identifiers and attributes linked to identity, and access management involves evaluating these attributes and making decisions based on policies to manage access to other objects or services. Authentication, authorization, and access control collectively represent identity access management.
{"title":"Identity Management in the Internet of Things: A Survey of the State of the Art","authors":"Priyanka D. More, Sachin R. Sakhare, Parikshit Mahalle","doi":"10.1109/msmc.2022.3230215","DOIUrl":"https://doi.org/10.1109/msmc.2022.3230215","url":null,"abstract":"The Internet of Things (IoT) facilitates connections between people and things at any time, anywhere, with anything, and with anybody through the use of any network, service, or application. The IoT is a system of actual physical objects commonly referred to as <italic xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">things</i> . Things contain sensors, software, and other technologies that connect to other systems and devices over the Internet and allow data exchange. Identity management (IDM) involves managing identifiers and attributes linked to identity, and access management involves evaluating these attributes and making decisions based on policies to manage access to other objects or services. Authentication, authorization, and access control collectively represent identity access management.","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3325184
{"title":"2023 Index IEEE Systems, Man, and Cybernetics Magazine Vol. 9","authors":"","doi":"10.1109/msmc.2023.3325184","DOIUrl":"https://doi.org/10.1109/msmc.2023.3325184","url":null,"abstract":"","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135809440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.1109/msmc.2023.3319788
{"title":"IEEE App","authors":"","doi":"10.1109/msmc.2023.3319788","DOIUrl":"https://doi.org/10.1109/msmc.2023.3319788","url":null,"abstract":"","PeriodicalId":43649,"journal":{"name":"IEEE Systems Man and Cybernetics Magazine","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135707155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}