2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)最新文献

筛选
英文 中文
Open Source OPC UA PubSub Over TSN for Realtime Industrial Communication 开源OPC UA公共sub在TSN上的实时工业通信
Julius Pfrommer, A. Ebner, S. Ravikumar, B. Karunakaran
{"title":"Open Source OPC UA PubSub Over TSN for Realtime Industrial Communication","authors":"Julius Pfrommer, A. Ebner, S. Ravikumar, B. Karunakaran","doi":"10.1109/ETFA.2018.8502479","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502479","url":null,"abstract":"OPC UA is a client-server communication protocol for industrial use cases without hard realtime requirements. The new PubSub extension of OPC UA adds the possibility of many-to-many communication based on the Publish / Subscribe paradigm. In conjunction with the upcoming Time-Sensitive Networking (TSN) extensions of Ethernet, OPC UA Pub Sub aims to also cover time-deterministic connectivity. This poses requirements to OPC UA implementations that have traditionally not been regarded. We propose an approach to combine non-realtime OPCUA servers with realtime OPC UA Pub Sub where both can access a shared information model without the loss of realtime guarantees for the publisher. As a result, the publisher can be run inside a (hardware-triggered) interrupt to ensure short delays and small jitter. An open source implementation of OPC UA Pub Sub is provided based on the open62541 SDK. This is also the basis for measurements used to evaluate the potential of the technology.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"10 1","pages":"1087-1090"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87322293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Industrial Control 工业控制
Behzad Samadi
{"title":"Industrial Control","authors":"Behzad Samadi","doi":"10.1109/etfa.2018.8502613","DOIUrl":"https://doi.org/10.1109/etfa.2018.8502613","url":null,"abstract":"","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87564220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrating Offset in Worst Case Delay Analysis of Switched Ethernet Network With Deficit Round Robbin 基于亏缺轮询的交换以太网最坏时延分析中的积分偏移
Aakash Soni, Xiaoting Li, Jean-Luc Scharbarg, C. Fraboul
{"title":"Integrating Offset in Worst Case Delay Analysis of Switched Ethernet Network With Deficit Round Robbin","authors":"Aakash Soni, Xiaoting Li, Jean-Luc Scharbarg, C. Fraboul","doi":"10.1109/ETFA.2018.8502523","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502523","url":null,"abstract":"In order to handle mixed criticality flows in a realtime embedded network, switched Ethernet with Quality of Service (QoS) facilities has become a popular solution. Deficit Round Robin (DRR) is such a QoS facility. Worst-Case Traversal Time (WCTT) analysis is mandatory for such systems, in order to ensure that end-to-end delay constraints are met. Network Calculus is a classical approach to achieve this WCTT analysis. A solution has been proposed for switched Ethernet with DRR. It computes pessimistic upper bounds on end-to-end latencies. This pessimism is partly due to the fact that the scheduling of flows by end systems is not considered in the analysis. This scheduling can be modeled by offsets between flows. This modeling has been integrated in WCTT analysis of switched Ethernet with First In First Out (FIFO) scheduling. It leads to a significant reduction of delay upper bounds. The contribution of this paper is to integrate the offsets in the WCTT analysis for switched Ethernet with DRR and to evaluate the reduction on delay upper bounds, considering a realistic case study.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"24 1","pages":"353-359"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85678051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved Domain Modeling for Realistic Automated Planning and Scheduling in Discrete Manufacturing 离散制造中面向现实自动化计划调度的改进领域建模
Antje Rogalla, A. Fay, O. Niggemann
{"title":"Improved Domain Modeling for Realistic Automated Planning and Scheduling in Discrete Manufacturing","authors":"Antje Rogalla, A. Fay, O. Niggemann","doi":"10.1109/ETFA.2018.8502631","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502631","url":null,"abstract":"Current production planning and scheduling systems in automation do not meet the requirements of modern individualized production. Today's, static production processes impede customized manufacturing and small-scale production. A new way of thinking towards a dynamic control is required. This paper focuses on automated integrated process planning and scheduling on control level in discrete manufacturing. Existing algorithms in artificial intelligence planning are applied to solve process planning and scheduling problems. The challenge is to model the manufacturing system and products in a way that automated planners can generate efficiently process plans and schedules. Hence, based on a general classification of operations, different modeling options with regard to a successful automated process planning and scheduling are discussed. As a result, a domain modeling approach for discrete manufacturing is presented.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"6 1","pages":"464-471"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88702938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Ensemble of fuzzy Class-Biased Networks for Product Quality Estimation 一种用于产品质量估计的模糊类偏网络集成
Shanmugasivam Pillai, Naveen John Punnoose, P. Vadakkepat, A. Loh, Kee Jin Lee
{"title":"An Ensemble of fuzzy Class-Biased Networks for Product Quality Estimation","authors":"Shanmugasivam Pillai, Naveen John Punnoose, P. Vadakkepat, A. Loh, Kee Jin Lee","doi":"10.1109/ETFA.2018.8502492","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502492","url":null,"abstract":"Factories are increasingly pushing towards automation and data-centric approaches under the current Industry 4.0 standards. Early-stage product quality estimation is identified as one of the solutions that can significantly reduce manufacturing cost and wastage. However, quality estimation is a classification problem that is inherently challenging for traditional data-driven algorithms due to its imbalanced nature. In this paper, a framework is proposed, that combines the feature extraction capabilities of convolutional neural networks and the domain knowledge characteristics of fuzzy systems. The proposed method addresses data imbalance using an ensemble of class-biased individuals, that learn features using a class-weighted loss function. Experiments were conducted using a benchmark dataset and production data acquired from the semiconductor industry. Improvements were noted for G-Mean and ROC-AVC values when compared to existing algorithms.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"7 1","pages":"615-622"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88713259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent Sensors, Sensor Networks, and Information Processing 智能传感器,传感器网络和信息处理
{"title":"Intelligent Sensors, Sensor Networks, and Information Processing","authors":"","doi":"10.1109/etfa.2018.8502521","DOIUrl":"https://doi.org/10.1109/etfa.2018.8502521","url":null,"abstract":"","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86148419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Control design for timed Petri nets based on LMIs and structure expansion 基于lmi和结构展开的定时Petri网控制设计
Alioune Mbaye, D. Lefebvre, F. Basile
{"title":"Control design for timed Petri nets based on LMIs and structure expansion","authors":"Alioune Mbaye, D. Lefebvre, F. Basile","doi":"10.1109/ETFA.2018.8502471","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502471","url":null,"abstract":"This paper concerns the design of optimal control sequences for timed Petri nets under earliest firing policy. Optimality is defined with respect to the sequences duration. The proposed method computes the control firing sequence and its duration by solving integer linear problems constrained by a set of matrix inequalities that must be fulfilled by a sequence of elementary firing count vectors. To reduce the error that may affect the estimation of the sequence duration, an expansion of the net structure is proposed with respect to the time parameters. The estimation error is proved to be bounded depending on a granularity parameter used for expansion.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"21 1","pages":"426-432"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81597129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Holo Pick'n'Place
Martin Rudorfer, Jan Guhl, Paul Hoffmann, J. Krüger
{"title":"Holo Pick'n'Place","authors":"Martin Rudorfer, Jan Guhl, Paul Hoffmann, J. Krüger","doi":"10.1109/ETFA.2018.8502527","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502527","url":null,"abstract":"In this paper we contribute to the research on facilitating industrial robot programming by presenting a concept for intuitive drag and drop like programming of pick and place tasks with Augmented Reality (AR). We propose a service-oriented architecture to achieve easy exchangeability of components and scalability with respect to AR devices and robot workplaces. Our implementation uses a HoloLens and a UR5 robot, which are integrated into a framework of RESTful web services. The user can drag recognized objects and drop them at a desired position to initiate a pick and place task. Although the positioning accuracy is unsatisfactory yet, our implemented prototype achieves most of the desired advantages to proof the concept.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"2 1","pages":"1219-1222"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89712992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems 工业物联网(IIoT)系统的运行时漏洞发现服务
J. L. Flores, Imanol Mugarza
{"title":"Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems","authors":"J. L. Flores, Imanol Mugarza","doi":"10.1109/ETFA.2018.8502660","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502660","url":null,"abstract":"The IoT and IIoT paradigms are creating new business opportunities. However, high-interconnectivity among all objects introduce new security concerns and challenges. Security is not a product, but a process. Security tests and audits have to constantly be accomplished. Once a security flaw is detected, a software patch fixing the security weakness could be then produced. This continuous security evaluation, which is iterative, might be expensive. In this paper, a novel vulnerability discovery approach is presented: Hadros. The particularity of the proposed design is that security tests are distributively executed among all the deployed IoT/IIoT nodes and performed at the idle time of the system, while runtime. Hadros is suitable and advantageous for the IoT and IIoT era, due to the fact that testing coverage is broadly increased as more devices are incorporated. Meanwhile, resources employed by the security researchers are also significantly reduced.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"14 1","pages":"948-955"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88093991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective 利用系统模型保护CPS:基于异常的IDS视角
Riccardo Colelli, S. Panzieri, F. Pascucci
{"title":"Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective","authors":"Riccardo Colelli, S. Panzieri, F. Pascucci","doi":"10.1109/ETFA.2018.8502495","DOIUrl":"https://doi.org/10.1109/ETFA.2018.8502495","url":null,"abstract":"Industrial Control systems traditionally achieved security by using isolation from the outside and proprietary protocols to communicate inside. This paradigm is changed with the advent of the Industrial Internet of Things that foresees flexible and interconnected systems. In this contribution, the threats coming from this new approach are analyzed and a framework for identify them is proposed. It is based on the common signature based intrusion detection system developed in the information technology domain, however, to cope with the constraints of the operation technology domain, it exploits anomaly based features. Specifically, it is able to analyze the traffic on the network at application layer by mean of deep packet inspection, parsing the information carried by the proprietary protocols. Two different topologies are adopted to cope also with legacy systems. A simple set up is considered to prove the effectiveness of the approach.","PeriodicalId":6566,"journal":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"68 1","pages":"1171-1174"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88200334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信