A. Abdalla, W. H. Hassan, A. Mohammed, A. Ahmed, A.H. Mohd
{"title":"An approach to enhance mobile multicast using context transfer","authors":"A. Abdalla, W. H. Hassan, A. Mohammed, A. Ahmed, A.H. Mohd","doi":"10.1109/INDIN.2008.4618194","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618194","url":null,"abstract":"With the advent of the handheld devices and multimedia applications, there has been an increasing interest for mobile multicast. IETF proposes two approaches. The first approach is bi-directional tunneling (BT), where the mobile node subscribes to a multicast group through its home network. The second approach is in remote subscription (RS), where the mobile node joins the multicast group via a local multicast router on the foreign link being visited. However, in BT approach the home agent is typical far and this will lead to high signaling cost at the same time the home agent represents a single point of failure and introduces scalability issues. RS approach suffers mainly from frequent tree reconstruction. The main aim for this paper is to propose a new mobile multicast approach to reduce the signaling cost and reduce the packet loss especially in case of macromibiliy. The proposed solution integrates hierarchical mobile IPv6 with mobile context transfer. This paper presents and evaluates the proposed solution. Our results shows that compared to BT approach, the proposed solution gives lower signaling cost.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"60 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the effort of a reconfiguration processes","authors":"A. Farid, W. Covanich","doi":"10.1109/INDIN.2008.4618152","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618152","url":null,"abstract":"In recent years, the fields of reconfigurable manufacturing systems, holonic manufacturing systems, multi-agent systems have made technological advances to support the ready reconfiguration of automated manufacturing systems. To help assess these advancements, a reconfigurability measurement process has been developed based upon the complementary ideas of reconfiguration potential, and ease. This work measured the reconfigurability of an automated manufacturing system as an intrinsic property of the systempsilas structure. However, it did not explicitly measure the effort required to realize a reconfiguration process. This paper recombines the concepts of reconfiguration potential and reconfiguration ease to measure the effort required to realize a specific class of reconfiguration processes. The theoretical developments are then demonstrated in an illustrative example. The paper concludes with a discussion of potential implications on adjacent research.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"77 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer-oriented group maintenance model for unreliable service system","authors":"Gia-Shie Liu","doi":"10.1109/INDIN.2008.4618097","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618097","url":null,"abstract":"This study considers a service system with multiple independent servers operating in parallel and a single Markovian queue. The servers are unreliable with identically exponentially distributed failure times but no server failures allowed during maintenance. The repair time is also assumed to follow exponential distribution. Accordingly, we formulate this model as a continuous time Markov decision process. Group maintenance policies are developed based on the number of customers dynamically in the queue, and are mathematically proved to have the property of threshold structure.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating network misuse and anomaly prevention","authors":"Y.K. Penva, P. G. Bringas","doi":"10.1109/INDIN.2008.4618168","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618168","url":null,"abstract":"Network intrusion detection systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour to find those that do not fit into that model). Still, since their problem knowledge is restricted to possible attacks, misuse detection fails to notice anomalies and vice versa. Against this background, this paper proposes a third alternative that hybrids misuse and anomaly prevention. In this way, ESIDE-Depian uses a Bayesian network to learn from both anomaly and misuse knowledge in order to be able to detect either kind of attacks, known and unknown. Finally, we evaluate ESIDE-Depian against all kind of menaces to prove in which degree it has been achieved to integrate both approaches.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engineering materials test process monitor system based on CSDA architecture","authors":"Gao Hongli, Luan Xu, Zhang Ni","doi":"10.1109/INDIN.2008.4618361","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618361","url":null,"abstract":"Based on the analysis to the features of engineering materials test monitoring system, a new CSDA (Client Server Database Application for control) architecture is proposed. Apart from the conventional 3-tier C/S architecturepsilas components, the new CSDA architecture includes a new control application part. Applying this architecture, an industrial network is constructed, which closely combines the control network with the information network. Taking the high-frequency fatigue test system as an example, the application of the CSDA architecture is studied in details. The high-performance of the system demonstrates the feasibility and potential of the proposed architecture.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OCARI: Optimization of communication for Ad hoc reliable industrial networks","authors":"Tuan Dang, C. Devic","doi":"10.1109/INDIN.2008.4618189","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618189","url":null,"abstract":"In this paper we present an industrial development of a wireless sensors network technology called OCARItrade. It targets applications in harsh environments in power plants and in warships. OCARI is a radio communication technology that supports mesh topology and power-aware ad hoc routing protocol aiming at maximizing the network lifetime. It is based on IEEE 802.15.4 PITY layer with full deterministic MAC layer for time-constrained communication. During the non time constrained communication period, its ad hoc routing strategy uses an energy-aware OLSR proactive protocol. OCARI application layer is based on ZigBee APS and APL primitives and profiles to provide a maximum compatibility with ZigBee applications. To fully assess this technology, extensive tests will be done in industrial facility at EDIT R&D as well as at DCNS. Our objective is then to promote this specification as an open standard of industrial wireless technology.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Tang, Qun Wu, Guohui Yang, Xun-jun He, J. Fu, Lewei Li
{"title":"Design of RF MEMS phase shifter based on saw-shaped CPW","authors":"K. Tang, Qun Wu, Guohui Yang, Xun-jun He, J. Fu, Lewei Li","doi":"10.1109/INDIN.2008.4618087","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618087","url":null,"abstract":"The operating principle of the RF MEMS phase shifter is described. Then the equivalent circuit of the MEMS phase shifter has been established and the capacitances of the MEMS bridges in both ldquouprdquo and ldquodownrdquo state are analyzed. Then the approach of using the saw-shaped CPW to decrease the return loss introduced by the insulation layer is proposed. By using network theory, the circuit simulation tool and CST microwave studio simulation tool, the proposed RF MEMS phase shifter is modeled. Simulation results show that the proposed model has the return loss less than -10 dB and the insertion loss more than -2 dB in 2 GRz bandwidth range. At the same time, for one RF MEMS switch-type bridge, as high as 22.5 degrees phase shift is realized.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"580 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Health Monitoring system considering fault-tolerance","authors":"Y. Matsushiba, H. Nishi","doi":"10.1109/INDIN.2008.4618118","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618118","url":null,"abstract":"Structural health monitoring (SHM) system uses a number of sensors for a precise prediction. This prediction enables to provide early indication of vulnerability of a structure and the timing of reinforcement in order to prevent future collapse. SHM systems are now widely spreading in infrastructures. However, conventional SHM systems did not take account of accidental collapse. There is a possibility that sensor node goes down or network goes offline. If sensor nodes are broken by damage, important data, stored in the nodes will have lost. To prevent the data loss, this paper proposes data-distributed fault-tolerant sensor network system for a SHM system. Proposed system consists of three functions, PING (Packet InterNet Groper) based network monitoring function (PNM), backup node selecting function (BNS) and socket communication function. Proposed system is implemented on PCs and practically evaluated in a laboratory environment on terminals of KNIVES, which is a test bed of sensor network system. As a result, Data sharing process on PC and KNIVES was confirmed and proposed method can provide a light-weight fault-tolerant system taking account of accidental collapse.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingmeng Liu, Whei-Jen Chen, Tianmiao Wang, Y. Ling
{"title":"Hardware circuit design of NC system based on ARM and FPGA","authors":"Jingmeng Liu, Whei-Jen Chen, Tianmiao Wang, Y. Ling","doi":"10.1109/INDIN.2008.4618083","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618083","url":null,"abstract":"This paper presents the hardware design of three-axis NC system based on embedded system, designs the ARM (advanced RISC machine) + FPGA (field programmable gate array) hardware architecture, builds the software development environment, and accomplishes the communication program between ARM and FPGA. All of these provide excellent development platform for the application program developers. According to the requirement of three-axis NC system fine interpolation and complex I/O control, this paper accomplishes internal logic design of FPGA, realizes the fine interpolation pulse transmitting of NC system, receives the feedback pulse signal of encoder and extends many I/O ports to fulfills complex I/O control of three-axis NC system.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125597028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Sunder, A. Zoitll, J. Christensen, H. Steininger, J. Rritsche
{"title":"Considering IEC 61131-3 and IEC 61499 in the context of component frameworks","authors":"C. Sunder, A. Zoitll, J. Christensen, H. Steininger, J. Rritsche","doi":"10.1109/INDIN.2008.4618109","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618109","url":null,"abstract":"Automation and control systems provide their own programming and modeling paradigms in parallel to theory well known from computer science. Especially the concepts of component-based software engineering highly influence the design of embedded systems, which include automation and control systems. This work analyses what is and is not a ldquosoftware componentrdquo in the context of the two standards IEC 61131-3 and IEC 61499. Utilizing the definition of component frameworks and component system architectures, the potentials and problems of an integrative approach in order to utilize both standards within the same platform was discussed.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}