924 resultados para Factory automation
Resumo:
13 p.
Resumo:
This work presents challenges and solutions for the teaching and learning of automation applied to integrated manufacturing by means of a methodological approach based on techniques, tools and industrial equipment directly applicable in the industry. The approach was implemented in a control and automation engineering course divided into expositive and laboratory classes. Since the success of the approach is mainly from the practical activities, the article focus more on activities developed in laboratory than theorical classes. Copyright © 2007 IFAC.
Resumo:
Current solutions to the interoperability problem in Home Automation systems are based on a priori agreements where protocols are standardized and later integrated through specific gateways. In this regards, spontaneous interoperability, or the ability to integrate new devices into the system with minimum planning in advance, is still considered a major challenge that requires new models of connectivity. In this paper we present an ontology-driven communication architecture whose main contribution is that it facilitates spontaneous interoperability at system model level by means of semantic integration. The architecture has been validated through a prototype and the main challenges for achieving complete spontaneous interoperability are also evaluated.
Resumo:
EFTA 2009
Resumo:
EFTA 2009
Resumo:
RFID, in its different forms, but especially following EPCglobal standards, has become a key enabling technology for many applications. An essential component to develop track and trace applications in a complex multi-vendor scenario are the Discovery Services. Although they are already envisaged as part of the EPCglobal network architecture, the functional definition and standardization of the Discovery Service is still at a very early stage. Within the scope of the BRIDGE project, a specification for the interfaces of Discovery Services has been developed, together with a prototype to validate the design and different models to enhance supply-chain control through track and trace applications. © 2008 IEEE.
Resumo:
THERE ARE MANY different kinds of robots: factory automation systems that weld and assemble car engines; machines that place chocolates into boxes; medical devices that support surgeons in operations requiring high-precision manipulation; cars that drive automatically over long distances; vehicles for planetary exploration; mechanisms for powerline or oil platform inspection; toys and educational toolkits for schools and universities; service robots that deliver meals, clean floors, or mow lawns; and "companion robots" that are real partners for humans and share our daily lives. In a sense, all these robots are inspired by biological systems; it's just a matter of degree. A driverless vehicle imitates animals moving autonomously in the world.© 2012 ACM.
Resumo:
随着工业无线技术研究的发展,其应用领域已经开始由过程自动化转向离散工厂自动化。与过程自动化相比,工厂自动化对无线通信技术提出了新的需求与挑战。本文阐述了目前无线通信技术在工厂自动化应用中要解决的问题,给出了当前国内外的研究进展。
Resumo:
Liu, Yonghuai, Liu, Honghai, Li, Longzhuang, Wei, Baogang. Accurate Range Image Registration: Eliminating or Modelling Outliers. Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation, 2007, pp. 1316-1323. Sponsorship: IEEE
Resumo:
Smart management of maintenances has become fundamental in manufacturing environments in order to decrease downtime and costs associated with failures. Predictive Maintenance (PdM) systems based on Machine Learning (ML) techniques have the possibility with low added costs of drastically decrease failures-related expenses; given the increase of availability of data and capabilities of ML tools, PdM systems are becoming really popular, especially in semiconductor manufacturing. A PdM module based on Classification methods is presented here for the prediction of integral type faults that are related to machine usage and stress of equipment parts. The module has been applied to an important class of semiconductor processes, ion-implantation, for the prediction of ion-source tungsten filament breaks. The PdM has been tested on a real production dataset. © 2013 IEEE.
Resumo:
The papers in this special issue focus on the topic of location awareness for radio and networks. Localization-awareness using radio signals stands to revolutionize the fields of navigation and communication engineering. It can be utilized to great effect in the next generation of cellular networks, mining applications, health-care monitoring, transportation and intelligent highways, multi-robot applications, first responders operations, military applications, factory automation, building and environmental controls, cognitive wireless networks, commercial and social network applications, and smart spaces. A multitude of technologies can be used in location-aware radios and networks, including GNSS, RFID, cellular, UWB, WLAN, Bluetooth, cooperative localization, indoor GPS, device-free localization, IR, Radar, and UHF. The performances of these technologies are measured by their accuracy, precision, complexity, robustness, scalability, and cost. Given the many application scenarios across different disciplines, there is a clear need for a broad, up-to-date and cogent treatment of radio-based location awareness. This special issue aims to provide a comprehensive overview of the state-of-the-art in technology, regulation, and theory. It also presents a holistic view of research challenges and opportunities in the emerging areas of localization.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
Smartphones and other internet enabled devices are now common on our everyday life, thus unsurprisingly a current trend is to adapt desktop PC applications to execute on them. However, since most of these applications have quality of service (QoS) requirements, their execution on resource-constrained mobile devices presents several challenges. One solution to support more stringent applications is to offload some of the applications’ services to surrogate devices nearby. Therefore, in this paper, we propose an adaptable offloading mechanism which takes into account the QoS requirements of the application being executed (particularly its real-time requirements), whilst allowing offloading services to several surrogate nodes. We also present how the proposed computing model can be implemented in an Android environment