By Topic

Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on

Issue 1 • Date Jan. 2011

Filter Results

Displaying Results 1 - 18 of 18
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication information

    Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Forward-Special Issue on Industrial Applications of Holonic Manufacturing Systems

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (81 KB)  

    The two reviews and five papers in this special issue focus on industrial applications of holonic manufacturing systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing the Control Structures of ISA S88- and Holonic Component-Based Architecture

    Page(s): 4 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1046 KB) |  | HTML iconHTML  

    It is generally believed that a distributed intelligent system, such as a holonic manufacturing system (HMS), should be more reconfigurable than a conventional hierarchical manufacturing system (HiMS). However, a recent case study suggested that the control structure of a modern HiMS, such as ISA S88-based manufacturing system, can-under certain condition-be as reconfigurable as that of a HMS, such as holonic component-based architecture (HCBA)-based manufacturing system . This result is particularly interesting and this paper focuses on clarifying this issue. This is done by analyzing the control structure and the ease of reconfiguration of both HCBA and ISA S88-based manufacturing systems. It is found that both architectures possess similar level of ease of reconfiguration because both architectures are product-driven manufacturing control and their control functions are independent to product and production system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rockwell Automation's Holonic and Multiagent Control Systems Compendium

    Page(s): 14 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1099 KB) |  | HTML iconHTML  

    This paper provides a comprehensive overview of long-term R&D activities of the Rockwell Automation (RA) company in the field of holonic and agent-based manufacturing control systems. It presents a coherent framework of methodologies for designing agent-based control systems, tools that support implementation and validation of them, and agent applications that were developed for various industrial systems. The common attribute is the integration of novel techniques, such as multiagent systems or semantics with the current “old-fashioned” automation architectures represented mainly by programmable logic controllers. Retaining the ability of the control system to meet the strict real-time constraints and concurrently raise its intelligence has always been of highest importance. The paper does not focus merely on RA's work, but discusses all its aspects in a context of other existing works in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstract Architecture for Task-oriented Multi-agent Problem Solving

    Page(s): 31 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (721 KB) |  | HTML iconHTML  

    Problem solving and planning in decentralized environments is a key technical challenge in numerous industrial applications, ranging from manufacturing, logistics, virtual enterprizes to multirobotics systems. We present an abstract architecture of a multiagent solver and respective algorithm providing decomposition, task allocation, and task delegation. Various features of the abstract architecture, such as computational complexity or admissibility of the underlying optimization heuristics, are analyzed in the paper. Four instances of the abstract architecture implementations are given to demonstrate the applicability of the abstract solver in a wide variety of real-problem domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Execution Issues in IEC 61499 Distributed Automation and Control Systems

    Page(s): 41 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB) |  | HTML iconHTML  

    The standard IEC 61499 claims to be a standard for a distributed control environment consisting of a set of heterogeneous control devices from different vendors. Previous work on the implementation of IEC 61499 pointed out ambiguities in the standard, resulting in different execution behavior of IEC 61499 elements on different control devices. One of the key deficiencies is the lack of a definition for execution models of the device, the resource, and the function blocks. This paper discusses different design and execution issues related to the aforementioned problems for IEC 61499 distributed automation and control systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Self-Reconfiguration of Manufacturing Systems Using Automation Agents

    Page(s): 52 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1086 KB) |  | HTML iconHTML  

    The reconfiguration of control software is regarded as an important ability to enhance the effectiveness and efficiency in future manufacturing systems. Agent technology is considered as a promising approach to provide reconfiguration abilities, but existing work has been focused mainly on the reconfiguration of higher layers concerned with production scheduling and planning. In this paper, we present an automation agent architecture for controlling physical components that integrates “on the fly” reconfiguration abilities on the low-level layer. Our approach is combined with an ontological representation of the low-level functionality at the high-level control layer, which is able to reason and initiate reconfiguration processes to modify the low-level control (LLC). As current control systems are mostly based on standards and principles that do not support reconfiguration, leading to rigid control software architectures, we base our approach on the promising Standard IEC 61499 for the LLC, extended by an innovative reconfiguration infrastructure. We demonstrate this approach with a case study of a reconfiguration process that modifies the LLC functionality provided by the automation agent of a physical component. Thereby, we obtain the ability to support numerous different LLC configurations without increasing the LLC's complexity. By applying our automation agent architecture, we enhance not only the flexibility of each component's control software, but also achieve the precondition for reconfiguring the entire manufacturing system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfiguration Protocol for Multi-Agent Control Software Architectures

    Page(s): 70 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (972 KB) |  | HTML iconHTML  

    This paper deals with distributed multi-agent reconfigurable embedded control systems following the International Industrial Standard IEC 61499 in which a Function Block (FB) is an event-triggered software component owning data and a control application is a network of distributed blocks that should satisfy functional and temporal properties according to user requirements. We define an architecture of reconfigurable multi-agent systems in which a Reconfiguration Agent is affected to each device of the execution environment to apply local reconfigurations, and a Coordination Agent is proposed for coordinations between devices in order to guarantee safe and adequate distributed reconfigurations. A communication protocol is proposed to handle coordinations between agents by using well-defined Coordination Matrices. We specify both reconfiguration agents to be modeled by nested state machines, and the Coordination Agent according to the formalism Net Condition-Event Systems (NCES) which is an extension of Petri nets. To validate the whole architecture, we check by applying the model checker SESA in each device functional and temporal properties to be described according to the temporal logic “Computation Tree Logic.” We have also to check all possible coordinations between devices by verifying that whenever a reconfiguration is applied in a device, the Coordination Agent and other concerned devices react as described in user requirements. The paper's contributions are applied to two Benchmark Production Systems available in our research laboratory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Power System Automation With IEC 61850, IEC 61499, and Intelligent Control

    Page(s): 81 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (990 KB) |  | HTML iconHTML  

    This paper presents a new approach to power system automation, based on distributed intelligence rather than traditional centralized control. The paper investigates the interplay between two international standards, IEC 61850 and IEC 61499, and proposes a way of combining of the application functions of IEC 61850-compliant devices with IEC 61499-compliant “glue logic,” using the communication services of IEC 61850-7-2. The resulting ability to customize control and automation logic will greatly enhance the flexibility and adaptability of automation systems, speeding progress toward the realization of the smart grid concept. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Algorithms With Guided and Local Search Strategies for University Course Timetabling

    Page(s): 93 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (609 KB) |  | HTML iconHTML  

    The university course timetabling problem (UCTP) is a combinatorial optimization problem, in which a set of events has to be scheduled into time slots and located into suitable rooms. The design of course timetables for academic institutions is a very difficult task because it is an NP-hard problem. This paper investigates genetic algorithms (GAs) with a guided search strategy and local search (LS) techniques for the UCTP. The guided search strategy is used to create offspring into the population based on a data structure that stores information extracted from good individuals of previous generations. The LS techniques use their exploitive search ability to improve the search efficiency of the proposed GAs and the quality of individuals. The proposed GAs are tested on two sets of benchmark problems in comparison with a set of state-of-the-art methods from the literature. The experimental results show that the proposed GAs are able to produce promising results for the UCTP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks

    Page(s): 107 - 119
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Major goals of system security comprise confidentiality, integrity, availability, authenticity, and reliability. All of these have seen comprehensive treatment, yielding a vast collection of solutions. Information-theoretic security regarding confidentiality has seen considerable progress recently with the development of commercial quantum cryptographic devices. Solutions for perfectly secure authentication have been around much longer. Achieving perfect security, high availability and reliability, calls for combinations of various approaches. In this study, we propose a simple and uniform framework for the assessment of security, availability, and reliability that arbitrary compositions of security measures can provide. Our methodology facilitates system modeling in a decision-theoretic manner, which makes the models easily understandable even for specialists from fields other than security. At the same time, the models allow for strong assertions and for simple characterizations of the achievable security and safety in a system. We demonstrate the applicability of our results using quantum networks as an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reciprocal and Extensible Architecture for Multiple-Target Tracking in a Smart Home

    Page(s): 120 - 129
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1192 KB) |  | HTML iconHTML  

    Every home has its own unique considerations for location-aware applications. This makes a flexible architecture very crucial for efficiently integrating various tracking devices/models for adapting to real human needs. Here, we propose a reciprocal and extensible architecture to flexibly add/remove tracking sensors/models for tracking multiple targets in a smart home. Regarding tracking devices, we employ sensors from two different categories, those with seamless sensors and those with seamful ones. This allows us to take human-centric needs into consideration and to facilitate reciprocal and cooperative interaction among sensors from the two categories. Such reciprocal cooperation aims to increase the accuracy of location estimates and to compensate for the limitations of each sensor or a tracking algorithm, which allows us to track multiple targets simultaneously in a more reliable way. Moreover, the approach demonstrated in this paper can serve as a guideline to help users customize sensor arrangements to fulfill their requirements. Our experimental results, which comprise three tracking scenarios using a load sensory floor as the seamless sensor and RF identifications (RFIDs) as seamful sensors, demonstrate the effectiveness of the proposed architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming

    Page(s): 130 - 139
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    As the Internet services spread all over the world, many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for detecting network intrusions. GNP is an evolutionary optimization technique, which uses directed graph structures instead of strings in genetic algorithm or trees in genetic programming, which leads to enhancing the representation ability with compact programs derived from the reusability of nodes in a graph structure. By combining fuzzy set theory with GNP, the proposed method can deal with the mixed database that contains both discrete and continuous attributes and also extract many important class-association rules that contribute to enhancing detection ability. Therefore, the proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems. Experimental results with KDD99Cup and DARPA98 databases from MIT Lincoln Laboratory show that the proposed method provides competitively high detection rates compared with other machine-learning techniques and GNP with crisp data mining. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviewers 2010

    Page(s): 140 - 143
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (44 KB)  

    Lists the reviewers who contributed to the IEEE Transactions on Systems, Man, and Cybernetics - Part C for 2010. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on multimodal human-robot interfaces

    Page(s): 144
    Save to Project icon | Request Permissions | PDF file iconPDF (570 KB)  
    Freely Available from IEEE
  • IEEE Systems, Man, and Cybernetics Society Information

    Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authors

    Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE

Aims & Scope

Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence. 

This Transactions ceased production in 2012. The current retitled publication is IEEE Transactions on Human-Machine Systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Vladimir Marik
(until 31 December 2012)