1,916 research outputs found

    Energy-efficient through-life smart design, manufacturing and operation of ships in an industry 4.0 environment

    Get PDF
    Energy efficiency is an important factor in the marine industry to help reduce manufacturing and operational costs as well as the impact on the environment. In the face of global competition and cost-effectiveness, ship builders and operators today require a major overhaul in the entire ship design, manufacturing and operation process to achieve these goals. This paper highlights smart design, manufacturing and operation as the way forward in an industry 4.0 (i4) era from designing for better energy efficiency to more intelligent ships and smart operation through-life. The paper (i) draws parallels between ship design, manufacturing and operation processes, (ii) identifies key challenges facing such a temporal (lifecycle) as opposed to spatial (mass) products, (iii) proposes a closed-loop ship lifecycle framework and (iv) outlines potential future directions in smart design, manufacturing and operation of ships in an industry 4.0 value chain so as to achieve more energy-efficient vessels. Through computational intelligence and cyber-physical integration, we envision that industry 4.0 can revolutionise ship design, manufacturing and operations in a smart product through-life process in the near future

    Teknoekonominen toteutettavuusanalyysi etäylläpidon liitettävyydestä tehtaissa

    Get PDF
    Maintenance activities play a major role in factory operations, as they prevent breakdowns and extend machine life. With the advances in sensor, computing and communications technology, sensor data can be increasingly exploited for real-time supervision of machine condition. However, the acquisition of the data is challenging due to proprietary technologies and interfaces applied in Industrial Networks. Therefore, sensor data is rarely utilized in other processes than automation. As the industry is heading towards a new industrial era, also referred to as Industrial Internet or Industrie 4.0, there is growing need to improve data availability for applications that can realize its potential value. In this research, the focus is on the feasibility of remote maintenance deployment in factories. The topic is approached from the connectivity viewpoint. The research is conducted by reviewing the literature, and by interviewing numerous industry experts regarding the connectivity and data exploitation in factories. These form the basis for the value network analysis, in which Value Network Configuration (VNC) method is applied, to analyze the value distribution among different actors in alternative remote connection cases. As a result of the VNC analysis, three alternative value network configurations are formed. They provide a high-level technical architecture of the remote connection implementation and discuss the accumulated value of each actor concerning remote maintenance service. The insights gained from the VNCs and literature are then employed to propose a future technical architecture for remote maintenance connectivity in factories.Huoltotoimet ovat suuressa roolissa tehtaan toiminnassa, sillä ne ehkäisevät konerikkoja ja pidentävät koneen käyttöikää. Sensori-, laskenta- ja tietoliikenneteknologian kehittymisen johdosta sensoridataa voidaan hyödyntää yhä enemmän koneen kunnon reaaliaikaiseen valvontaan. Datan saanti on kuitenkin haastavaa teollisissa verkoissa käytettyjen sovelluskohtaisten teknologioiden ja liitäntöjen takia. Sen vuoksi sensoridataa hyödynnetään harvoin muissa prosesseissa kuin automaatiossa. Teollisuuden suunnatessa kohti uutta teollista aikakautta, joka tunnetaan myös nimillä Teollinen Internet ja Teollisuus 4.0, on datan saatavuutta parannettava sovelluskohteille, jotka voivat realisoida sen potentiaalisen arvon. Tämä tutkimus tarkastelee etäylläpidon käyttöönoton toteutettavuutta tehtaissa. Aihetta lähestytään liitettävyyden näkökulmasta. Tutkimus suoritetaan tarkastelemalla kirjallisuutta sekä haastattelemalla lukuisia teollisuuden asiantuntijoita koskien liitettävyyttä ja datan hyödyntämistä tehtaissa. Nämä muodostavat perustan arvoverkkoanalyysille, jossa sovelletaan arvoverkkokonfiguraatio-menetelmää, jolla analysoidaan arvon jakautumista eri toimijoiden kesken vaihtoehtoisissa etäyhteystapauksissa. Arvoverkkokonfiguraatioanalyysin tuloksena muodostetaan kolme vaihtoehtoista arvoverkkokonfiguraatiota. Ne tarjoavat korkean tason teknisen arkkitehtuurin etäyhteyden implementaatiosta ja tarkastelevat toimijoiden kerryttämää arvoa etäylläpitopalvelun osalta. Arvoverkkokonfiguraatioista ja kirjallisuudesta saatujen näkemysten pohjalta esitellään lisäksi tulevaisuuden tekninen arkkitehtuuri etäylläpidon liitettävyydelle tehtaissa

    Regulating Data as Property: A New Construct for Moving Forward

    Get PDF
    The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership of digital information be achieved? How can those rights be transferred and enforced? Those calls for data ownership emphasize the impact of ownership on the automotive industry and the vast quantities of operational data which smart automobiles and self-driving vehicles will produce. We looked at how, if at all, the issue was being considered in consumer-facing statements addressing the data being collected by their vehicles. To formulate our proposal, we also considered continued advances in scientific research, quantum mechanics, and quantum computing which confirm that information in any digital or electronic medium is, and always has been, physical, tangible matter. Yet, to date, data regulation has sought to adapt legal constructs for “intangible” intellectual property or to express a series of permissions and constraints tied to specific classifications of data (such as personally identifiable information). We examined legal reforms that were recently approved by the United Nations Commission on International Trade Law to enable transactions involving electronic transferable records, as well as prior reforms adopted in the United States Uniform Commercial Code and Federal law to enable similar transactions involving digital records that were, historically, physical assets (such as promissory notes or chattel paper). Finally, we surveyed prior academic scholarship in the U.S. and Europe to determine if the physical attributes of digital data had been previously considered in the vigorous debates on how to regulate personal information or the extent, if at all, that the solutions developed for transferable records had been considered for larger classes of digital assets. Based on the preceding, we propose that regulation of digital information assets, and clear concepts of ownership, can be built on existing legal constructs that have enabled electronic commercial practices. We propose a property rules construct that clearly defines a right to own digital information arises upon creation (whether by keystroke or machine), and suggest when and how that right attaches to specific data though the exercise of technological controls. This construct will enable faster, better adaptations of new rules for the ever-evolving portfolio of data assets being created around the world. This approach will also create more predictable, scalable, and extensible mechanisms for regulating data and is consistent with, and may improve the exercise and enforcement of, rights regarding personal information. We conclude by highlighting existing technologies and their potential to support this construct and begin an inventory of the steps necessary to further proceed with this process

    Simple Design Approach for Shared Digital Twins

    Get PDF
    The collaborative utilization of data becomes increasingly important in industry and requires increased consideration of interoperability and data sovereignty aspects. Distributed systems play a decisive role in this context, which allow for a closer communication between the stakeholders involved and are characterized by the shared use of data and devices. At the same time new concepts emerge that enable a structured mapping of data. These include Digital Twins, which primarily allow a holistic digital representation of an entire asset lifecycle. Digital Twins offer significant potential for distributed systems and form a suitable basis for the collaborative utilization of an asset's lifecycle data. Although studies assume an increased use of Digital Twins in cross-company networks, they are still predominantly used as a purely company-internal concept. In the context of this publication, we demonstrate how to get started easily with the design of Digital Twins intended for use in collaborative distributed systems

    Data Spaces

    Get PDF
    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical

    IIoT Based Efficiency Optimization in Logistics Applications

    Get PDF
    The Industrial Internet of Thing (IIoT) approach to an Industry plant design, devises a comprehensive interconnection of the system components, from sections up to single devices, in order to get a general and punctual understanding of the process. Such an intelligent network, mostly based on Ethernet basic layers, when properly conceived, should be able to add relevant value to the plant operation. This paper shows how, within the IIoT frame topics, the plant efficiency can be addressed and bring relevant improvement. The reason is that variables directly related to the energy consumption, such as current, electric power, actuator and motor torque, speed, etc., can be timely and easily monitored in the entire plant, since they are already conveyed on the network, due to real time control and diagnostics purpose. A power consumption diagram can be derived, and give hints on how to optimize operations, based on some efficiency index. The paper, after a general discussion, proves it with practical examples based on a Gantry robot, driven in an EtherCAT based automation network, and on the stacker cranes of an automated warehouse

    Automating Security Risk and Requirements Management for Cyber-Physical Systems

    Get PDF
    Cyber-physische Systeme ermöglichen zahlreiche moderne Anwendungsfälle und Geschäftsmodelle wie vernetzte Fahrzeuge, das intelligente Stromnetz (Smart Grid) oder das industrielle Internet der Dinge. Ihre Schlüsselmerkmale Komplexität, Heterogenität und Langlebigkeit machen den langfristigen Schutz dieser Systeme zu einer anspruchsvollen, aber unverzichtbaren Aufgabe. In der physischen Welt stellen die Gesetze der Physik einen festen Rahmen für Risiken und deren Behandlung dar. Im Cyberspace gibt es dagegen keine vergleichbare Konstante, die der Erosion von Sicherheitsmerkmalen entgegenwirkt. Hierdurch können sich bestehende Sicherheitsrisiken laufend ändern und neue entstehen. Um Schäden durch böswillige Handlungen zu verhindern, ist es notwendig, hohe und unbekannte Risiken frühzeitig zu erkennen und ihnen angemessen zu begegnen. Die Berücksichtigung der zahlreichen dynamischen sicherheitsrelevanten Faktoren erfordert einen neuen Automatisierungsgrad im Management von Sicherheitsrisiken und -anforderungen, der über den aktuellen Stand der Wissenschaft und Technik hinausgeht. Nur so kann langfristig ein angemessenes, umfassendes und konsistentes Sicherheitsniveau erreicht werden. Diese Arbeit adressiert den dringenden Bedarf an einer Automatisierungsmethodik bei der Analyse von Sicherheitsrisiken sowie der Erzeugung und dem Management von Sicherheitsanforderungen für Cyber-physische Systeme. Das dazu vorgestellte Rahmenwerk umfasst drei Komponenten: (1) eine modelbasierte Methodik zur Ermittlung und Bewertung von Sicherheitsrisiken; (2) Methoden zur Vereinheitlichung, Ableitung und Verwaltung von Sicherheitsanforderungen sowie (3) eine Reihe von Werkzeugen und Verfahren zur Erkennung und Reaktion auf sicherheitsrelevante Situationen. Der Schutzbedarf und die angemessene Stringenz werden durch die Sicherheitsrisikobewertung mit Hilfe von Graphen und einer sicherheitsspezifischen Modellierung ermittelt und bewertet. Basierend auf dem Modell und den bewerteten Risiken werden anschließend fundierte Sicherheitsanforderungen zum Schutz des Gesamtsystems und seiner Funktionalität systematisch abgeleitet und in einer einheitlichen, maschinenlesbaren Struktur formuliert. Diese maschinenlesbare Struktur ermöglicht es, Sicherheitsanforderungen automatisiert entlang der Lieferkette zu propagieren. Ebenso ermöglicht sie den effizienten Abgleich der vorhandenen Fähigkeiten mit externen Sicherheitsanforderungen aus Vorschriften, Prozessen und von Geschäftspartnern. Trotz aller getroffenen Maßnahmen verbleibt immer ein gewisses Restrisiko einer Kompromittierung, worauf angemessen reagiert werden muss. Dieses Restrisiko wird durch Werkzeuge und Prozesse adressiert, die sowohl die lokale und als auch die großräumige Erkennung, Klassifizierung und Korrelation von Vorfällen verbessern. Die Integration der Erkenntnisse aus solchen Vorfällen in das Modell führt häufig zu aktualisierten Bewertungen, neuen Anforderungen und verbessert weitere Analysen. Abschließend wird das vorgestellte Rahmenwerk anhand eines aktuellen Anwendungsfalls aus dem Automobilbereich demonstriert.Cyber-Physical Systems enable various modern use cases and business models such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their key characteristics, complexity, heterogeneity, and longevity make the long-term protection of these systems a demanding but indispensable task. In the physical world, the laws of physics provide a constant scope for risks and their treatment. In cyberspace, on the other hand, there is no such constant to counteract the erosion of security features. As a result, existing security risks can constantly change and new ones can arise. To prevent damage caused by malicious acts, it is necessary to identify high and unknown risks early and counter them appropriately. Considering the numerous dynamic security-relevant factors requires a new level of automation in the management of security risks and requirements, which goes beyond the current state of the art. Only in this way can an appropriate, comprehensive, and consistent level of security be achieved in the long term. This work addresses the pressing lack of an automation methodology for the security-risk assessment as well as the generation and management of security requirements for Cyber-Physical Systems. The presented framework accordingly comprises three components: (1) a model-based security risk assessment methodology, (2) methods to unify, deduce and manage security requirements, and (3) a set of tools and procedures to detect and respond to security-relevant situations. The need for protection and the appropriate rigor are determined and evaluated by the security risk assessment using graphs and a security-specific modeling. Based on the model and the assessed risks, well-founded security requirements for protecting the overall system and its functionality are systematically derived and formulated in a uniform, machine-readable structure. This machine-readable structure makes it possible to propagate security requirements automatically along the supply chain. Furthermore, they enable the efficient reconciliation of present capabilities with external security requirements from regulations, processes, and business partners. Despite all measures taken, there is always a slight risk of compromise, which requires an appropriate response. This residual risk is addressed by tools and processes that improve the local and large-scale detection, classification, and correlation of incidents. Integrating the findings from such incidents into the model often leads to updated assessments, new requirements, and improves further analyses. Finally, the presented framework is demonstrated by a recent application example from the automotive domain

    Design, Application and Evaluation of a Multi Agent System in the Logistics Domain

    Full text link
    The increasing demand for flexibility of automated production systems also affects the automated material flow systems (aMFS) they contain and demands reconfigurable systems. However, the centralized control concept usually applied in aMFS hinders an easy adaptation, as the entire control software has to be re-tested, when manually changing sub-parts of the control. As adaption and subsequent testing are a time-consuming task, concepts for splitting the control from one centralized to multiple, decentralized control nodes are required. Therefore, this paper presents a holistic agent-based control concept for aMFS, whereby the system is divided into so-called automated material flow modules (aMFM), each being controlled by a dedicated module agent. The concept allows the reconfiguration of aMFS, consisting of heterogeneous, stationary aMFM, during runtime. Furthermore, it includes aspects such as uniform agent knowledge bases through metamodel-based development, a communication ontology considering different information types and properties, strategic route optimization in decentralized control architecture and a visualization concept to make decisions of the module agents comprehensible to operators and maintenance staff. The evaluation of the concept is performed by means of material flow simulations as well as a prototypical implementation on a lab-sized demonstrator.Comment: 13 pages, https://ieeexplore.ieee.org/abstract/document/9042827
    corecore