The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of annotations is to describe the content of "something" and they may be considered as metadata. They are used for a while for text books, articles, hypertext documents and so on. We explore their usage in semantic-based and model-based interoperability, with the aim to make explicit the meaning and the structure of given models (artefacts) to enable not only their understanding,...
This paper introduces an adaptive growing and pruning radial basis function (GAP-RBF) neural network for on-line identification of hybrid systems. The main idea is to identify a global nonlinear model that can predict the continuous outputs of hybrid systems. In the proposed approach, GAP-RBF neural network uses a modified unscented kalman filter (UKF) with forgetting factor scheme as the required...
This paper is intended to provide a start point towards developing accurate mathematical means of achieving inter-vendor interoperability in factory automation domain. The proposed approach assumes a description of the physical laws of the basic operations performed by the devices is incorporated into the OWL-S classes at Operation Ontology level. This way a part of the translation process may be...
In this article we treat the problem of the delay of subcontracting and its impact on a system controlled by a policy joining the production and maintenance management. We will study a system made up of a machine M which can break down in a random way, and on which we carry out actions of corrective maintenance of random durations. Indeed, each interval T the machine is subject of actions of preventive...
Ad hoc wireless networks are power constrained since nodes operate with limited battery energy. Thus, energy consumption is crucial in the design of new ad hoc routing protocols. To design such protocols, we have to look away from the traditional minimum hop routing schemes. This paper presents an energy-aware routing mechanism to balance the energy consumption among the nodes of the network. The...
In this paper a Fuzzy motion control for cooperative passenger automated vehicles where there are not collisions between the closest ones is proposed. Based on the position of the target and on the initial position of each cooperative vehicle, a supervisory plans nonholonomic circular trajectories which are without intersections, while a fuzzy control strategy assures the asymptotical stability of...
Availability of Automation Networks can be increased by providing redundant links and nodes. Although many specifications of Industrial Ethernet have been submitted to the International Electrotechnical Committee (IEC), they do not disclose methods to implement network redundancy. The IEC SC65C worked out a standard for implementing redundancy in switched Ethernet networks applicable to a variety...
This paper deals with tradeoffs between the security capability of wireless sensor networks and the lifetime performance. The REWARD algorithm for secure routing is used as a main example. Nodes listen to neighbors transmissions to detect black hole attacks. As a result, symmetrical forwarding of packets is required. The paper analyzes the opportunities for power efficient partitioning of the wireless...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block cipher AES. The architecture of HSSec renders it suitable for widely spread applications with security demands. The presented coprocessor can be used inevery system integrating standards such as IPSec or the upcoming JPSec and P1619. The main...
Maliciously planted code in third-party components, as well as coding errors, design flaws and functional failures that could be subverted by malicious attackers, expose component-based systems (CBS) to potentially serious security threats. Approaches to securing CBSs fall basically into two categories: execution of untrusted components in a secure environment and secure composition of components...
There is currently high activity in the area of redundancy for Ethernet networks. A large number of solutions have emerged among the switch manufacturers during the last few years. This has been accompanied by standardization activities in the IEC. This paper looks briefly into industrial requirements on network redundancy and existing solutions with special focus on ring redundancy solutions. The...
Holonic manufacturing execution systems (HMES) are structures organized as a loosely coupled network of communicating agents to answer in a flexible way to necessities of reactivity and profitability. In this paper, we propose a PROSA-based HMES and we illustrate our approach on a real industrial application. The working of this HMES relies on a predictive and reactive behavior to perform the control...
Large diffusion of wireless communications is a trend that will soon involve industrial environments, too, and in particular those applications where granting limited response times is of utmost importance. This paper analyzes the impact of a number of causes, besides the medium access technique, on the performance of real 802.11g networks. In particular, the extent to which beacon frames and traffic...
Semantic interoperability is one of the key challenges in integrating disparate design software systems. Ontology provides formal and explicit specifications to describe semantics of design information for interoperability. This paper examines how semantic metadata from proprietary design information models can be captured in semantic enhancements, while data meanings formalized in ontologies to support...
The IEC 61499 standard has been recently adopted to promote a more flexible development process in the control and automation domain. The standard mainly deals with modeling issues leaving a lot of model execution details open. Different research groups are already working for the development of execution environments for the defined component model, proposing implementations with different execution...
Safe object-oriented programming languages like Java provide a much more programmer-friendly environment than the low-level languages in which real-time and embedded software have traditionally been implemented. Therefore, with the recent popularity of real-time Java, it is interesting to examine its feasibility for robot motion control. We have implemented a motion control system, and an application,...
HAZOP (hazard and operability) studies are carried out to analyse complex automated systems, especially large and distributed automated systems. The aim is to systematically assess the automated system regarding possibly negative effects of deviations from standard operation on safety and performance. Today, HAZOP studies require significant manual effort and tedious work of several costly experts...
Scapy is a free and open source packet manipulation environment written in Python language. In this paper we present a Modbus extension to Scapy, and show how this environment can be used to build tools for security analysis of industrial network protocols. Our implementation can be extended to other industrial network protocols and can help security analysts to understand how these protocols work...
We present a constraint logic programming (CLP) approach for synthesis of fault-tolerant hard real-time applications on distributed heterogeneous architectures. We address time-triggered systems, where processes and messages are statically scheduled based on schedule tables. We use process re-execution for recovering from multiple transient faults. We propose three scheduling approaches, which each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.