Pub Date : 2014-09-19DOI: 10.1109/ETFA.2014.7005126
R. Sinha, Kenneth Johnson, R. Calinescu
We present a scalable approach to automatically re-configure evolving IEC 61499 systems for deployment onto an available set of resources. We capture system architecture and high-level configuration requirements formally, and use an efficient SMT-based constraint resolution to generate a valid system configuration. Any changes in the system architecture, configuration requirements, or resources are automatically translated into a minimal set of updated constraints, allowing a faster reconfiguration as compared to a monolithic approach where the whole system is re-configured. We show the feasibility of our approach by studying an airport baggage handling system developed using the IEC 61499 standard.
{"title":"A scalable approach for re-configuring evolving industrial control systems","authors":"R. Sinha, Kenneth Johnson, R. Calinescu","doi":"10.1109/ETFA.2014.7005126","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005126","url":null,"abstract":"We present a scalable approach to automatically re-configure evolving IEC 61499 systems for deployment onto an available set of resources. We capture system architecture and high-level configuration requirements formally, and use an efficient SMT-based constraint resolution to generate a valid system configuration. Any changes in the system architecture, configuration requirements, or resources are automatically translated into a minimal set of updated constraints, allowing a faster reconfiguration as compared to a monolithic approach where the whole system is re-configured. We show the feasibility of our approach by studying an airport baggage handling system developed using the IEC 61499 standard.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78289111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-19DOI: 10.1109/ETFA.2014.7005073
R. Sinha, V. Vyatkin, Z. Salcic, Heejong Park
We face a glut of languages for programming distributed software today. However, only a few languages have proven their potential with wider practical use in different domains of computing. We picked two such languages, meant for different domains, to see if they could cross-pollinate and enrich one another. Specifically, we chose SystemJ, a language to program distributed embedded systems, and IEC61499, the next generation standard for distributed industrial automation control software. Unsurprisingly, we found similar structures and artifacts between the two. We also found significant differences mainly due to differing domain-specific requirements. This comparison leads to observations and guidelines for improving both languages, and we discuss directions towards an “ideal” distributed software programming language.
{"title":"Competitors or Cousins? Studying the parallels between distributed programming languages SystemJ and IEC61499","authors":"R. Sinha, V. Vyatkin, Z. Salcic, Heejong Park","doi":"10.1109/ETFA.2014.7005073","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005073","url":null,"abstract":"We face a glut of languages for programming distributed software today. However, only a few languages have proven their potential with wider practical use in different domains of computing. We picked two such languages, meant for different domains, to see if they could cross-pollinate and enrich one another. Specifically, we chose SystemJ, a language to program distributed embedded systems, and IEC61499, the next generation standard for distributed industrial automation control software. Unsurprisingly, we found similar structures and artifacts between the two. We also found significant differences mainly due to differing domain-specific requirements. This comparison leads to observations and guidelines for improving both languages, and we discuss directions towards an “ideal” distributed software programming language.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75110764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-19DOI: 10.1109/ETFA.2014.7005193
L. Ferreira, Laurynas Siksnys, P. Pedersen, Petr Stluka, C. Chrysoulas, Thibaut Le Guilly, M. Albano, A. Skou, César Teixeira, T. Pedersen
Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemented, it is possible to reduce the energy costs by focusing on “when” it is performed. Although, some manufacturing plants (e.g. refining or petrochemical plants) can be inflexible with respect to time due to interdependencies in processes that must be respected for performance and safety reasons, there are other industrial segments, such as alumina plants or discrete manufacturing, with more degrees of flexibility. These manufacturing plants can consider a more flexible scheduling of the most energy-intensive processes in response to dynamic prices and overall condition of the electricity market. In this scenario, requests for energy can be encoded by means of a formal structure called flex-offers, then aggregated (joining several flex-offers into a bigger one) and sent to the market, scheduled, disaggregated and transformed into consumption plans, and eventually, into production schedules for given industrial plant. In this paper, we describe the flex-offer concept and how it can be applied to industrial and home automation scenarios. The architecture proposed in this paper aims to be adaptable to multiples scenarios (industrial, home and building automation, etc.), thus providing the foundations for different concept implementations using multiple technologies or supporting various kinds of devices.
{"title":"Arrowhead compliant virtual market of energy","authors":"L. Ferreira, Laurynas Siksnys, P. Pedersen, Petr Stluka, C. Chrysoulas, Thibaut Le Guilly, M. Albano, A. Skou, César Teixeira, T. Pedersen","doi":"10.1109/ETFA.2014.7005193","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005193","url":null,"abstract":"Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemented, it is possible to reduce the energy costs by focusing on “when” it is performed. Although, some manufacturing plants (e.g. refining or petrochemical plants) can be inflexible with respect to time due to interdependencies in processes that must be respected for performance and safety reasons, there are other industrial segments, such as alumina plants or discrete manufacturing, with more degrees of flexibility. These manufacturing plants can consider a more flexible scheduling of the most energy-intensive processes in response to dynamic prices and overall condition of the electricity market. In this scenario, requests for energy can be encoded by means of a formal structure called flex-offers, then aggregated (joining several flex-offers into a bigger one) and sent to the market, scheduled, disaggregated and transformed into consumption plans, and eventually, into production schedules for given industrial plant. In this paper, we describe the flex-offer concept and how it can be applied to industrial and home automation scenarios. The architecture proposed in this paper aims to be adaptable to multiples scenarios (industrial, home and building automation, etc.), thus providing the foundations for different concept implementations using multiple technologies or supporting various kinds of devices.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79497269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-16DOI: 10.1109/ETFA.2014.7005129
Sándor Plósz, Arsham Farshad, Markus Tauber, Christian M. Lesjak, Thomas Ruprechter, N. Pereira
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
{"title":"Security vulnerabilities and risks in industrial usage of wireless communication","authors":"Sándor Plósz, Arsham Farshad, Markus Tauber, Christian M. Lesjak, Thomas Ruprechter, N. Pereira","doi":"10.1109/ETFA.2014.7005129","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005129","url":null,"abstract":"Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74057720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-16DOI: 10.1109/ETFA.2014.7005067
S. Durand, Bruno Boisseau, J. M. Molina, N. Marchand, T. Raharijaona
In this paper, a state-feedback linear-quadratic regulator (LQR) is proposed for event-based control of a linear system. An interesting property of LQRs is that an optimal response of the system can be obtained in accordance to some specifications, like the actuator limits. An integral action is also added in order to not only restrict the study to null stabilization but also to tracking. The idea is to consider an external control loop and stabilize the integral of the error between the measurement and a desired setpoint to track. However, an event-triggered integral can lead to important overshoots when the interval between two successive events becomes large. Therefore, an exponential forgetting factor of the sampling interval is proposed as a solution to avoid such problems. The whole proposal is tested on a real-time system (a gyroscope) in order to highlight its ability, the reduction of control updates and the respect to the actuator limits.
{"title":"Event-based LQR with integral action","authors":"S. Durand, Bruno Boisseau, J. M. Molina, N. Marchand, T. Raharijaona","doi":"10.1109/ETFA.2014.7005067","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005067","url":null,"abstract":"In this paper, a state-feedback linear-quadratic regulator (LQR) is proposed for event-based control of a linear system. An interesting property of LQRs is that an optimal response of the system can be obtained in accordance to some specifications, like the actuator limits. An integral action is also added in order to not only restrict the study to null stabilization but also to tracking. The idea is to consider an external control loop and stabilize the integral of the error between the measurement and a desired setpoint to track. However, an event-triggered integral can lead to important overshoots when the interval between two successive events becomes large. Therefore, an exponential forgetting factor of the sampling interval is proposed as a solution to avoid such problems. The whole proposal is tested on a real-time system (a gyroscope) in order to highlight its ability, the reduction of control updates and the respect to the actuator limits.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81312675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-16DOI: 10.1109/ETFA.2014.7005198
J. Marinho, Vincent Nélis, Stefan M. Petters
Reservation systems are generally employed to enforce temporal isolation between applications. In the real-time context the corresponding temporal isolation requires not only the consideration of the direct interference due to execution of higher priority tasks, but also the indirect cost of e.g. cache-related preemption delay. The accounting of this in a server-based implementation of temporal isolation poses special challenges, in particular when misbehaving in the form of overruns and violation of the minimum inter-arrival time of an application are to be covered. We present a novel approach to extend the fault coverage and reduce the pessimism when compared to the state of the art. Furthermore we demonstrate that the extra implementation of the introduced mechanisms over the state of the art can be very low on complexity.
{"title":"Temporal isolation with preemption delay accounting","authors":"J. Marinho, Vincent Nélis, Stefan M. Petters","doi":"10.1109/ETFA.2014.7005198","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005198","url":null,"abstract":"Reservation systems are generally employed to enforce temporal isolation between applications. In the real-time context the corresponding temporal isolation requires not only the consideration of the direct interference due to execution of higher priority tasks, but also the indirect cost of e.g. cache-related preemption delay. The accounting of this in a server-based implementation of temporal isolation poses special challenges, in particular when misbehaving in the form of overruns and violation of the minimum inter-arrival time of an application are to be covered. We present a novel approach to extend the fault coverage and reduce the pessimism when compared to the state of the art. Furthermore we demonstrate that the extra implementation of the introduced mechanisms over the state of the art can be very low on complexity.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86520865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-16DOI: 10.1109/ETFA.2014.7005225
Nesrine Badache, K. Jaffrès-Runser, Jean-Luc Scharbarg, C. Fraboul
Recent civil airborne platforms are produced using Integrated Modular Avionics (IMA). IMA promotes both sharing of execution and communication resources by the avionics applications. Designs following IMA decrease the weight of avionics equipment and improve the whole system scalability. However, the price to pay for these benefits is an increase of the system's complexity, triggering a challenging system integration process. Central to this integration step are the timing requirements of avionics applications: the system integrator has to find a mapping of applications and communications on the available target architecture (processing modules, networks, etc.) such as end-to-end delay constraints are met. These challenges stress the need for a tool capable of evaluating different integration choices in the early design stages of IMA. In this paper, we present and formalize the problem of spatial and temporal integration of an IMA system. Then, we focus on the temporal allocation problem which is critical to ensure a proper timely behavior of the system. Two main properties are presented to ensure perfect data transmission for hard real-time flows. To quantify the quality of a set of valid temporal allocations, CPM utilization and communication robustness performance criteria are defined. We show on an example that both criteria are antagonist and that they can be leveraged to choose an allocation that either improves the system computing performance or the robustness of the network.
{"title":"Managing temporal allocation in Integrated Modular Avionics","authors":"Nesrine Badache, K. Jaffrès-Runser, Jean-Luc Scharbarg, C. Fraboul","doi":"10.1109/ETFA.2014.7005225","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005225","url":null,"abstract":"Recent civil airborne platforms are produced using Integrated Modular Avionics (IMA). IMA promotes both sharing of execution and communication resources by the avionics applications. Designs following IMA decrease the weight of avionics equipment and improve the whole system scalability. However, the price to pay for these benefits is an increase of the system's complexity, triggering a challenging system integration process. Central to this integration step are the timing requirements of avionics applications: the system integrator has to find a mapping of applications and communications on the available target architecture (processing modules, networks, etc.) such as end-to-end delay constraints are met. These challenges stress the need for a tool capable of evaluating different integration choices in the early design stages of IMA. In this paper, we present and formalize the problem of spatial and temporal integration of an IMA system. Then, we focus on the temporal allocation problem which is critical to ensure a proper timely behavior of the system. Two main properties are presented to ensure perfect data transmission for hard real-time flows. To quantify the quality of a set of valid temporal allocations, CPM utilization and communication robustness performance criteria are defined. We show on an example that both criteria are antagonist and that they can be leveraged to choose an allocation that either improves the system computing performance or the robustness of the network.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77086998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ETFA.2014.7005363
M. Collotta, G. Scatà, S. Tirrito, R. Ferrero, M. Rebaudengo
Wireless Sensor Networks (WSNs) are increasingly used in different application fields thanks to several advantages such as cost-effectiveness, scalability, flexibility and self-organization. A hot research topic concerns the study of algorithms and mechanisms for reducing the power consumption of the nodes in order to maximize their lifetime. To this end, this paper proposes an approach based on two fuzzy controllers that determine the sleeping time and the transmission power. Simulation results reveal that the device lifetime is increased by 30% with respect to the use of fixed sleeping time and transmission power and by 25% with respect to a state-of-the-art work that adjusts only the sleeping time.
{"title":"A parallel fuzzy scheme to improve power consumption management in Wireless Sensor Networks","authors":"M. Collotta, G. Scatà, S. Tirrito, R. Ferrero, M. Rebaudengo","doi":"10.1109/ETFA.2014.7005363","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005363","url":null,"abstract":"Wireless Sensor Networks (WSNs) are increasingly used in different application fields thanks to several advantages such as cost-effectiveness, scalability, flexibility and self-organization. A hot research topic concerns the study of algorithms and mechanisms for reducing the power consumption of the nodes in order to maximize their lifetime. To this end, this paper proposes an approach based on two fuzzy controllers that determine the sleeping time and the transmission power. Simulation results reveal that the device lifetime is increased by 30% with respect to the use of fixed sleeping time and transmission power and by 25% with respect to a state-of-the-art work that adjusts only the sleeping time.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73657692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ETFA.2014.7005092
A. Burguera, G. Oliver
This paper presents a new method to remove the effects of uneven ensonification in Side-Scan Sonar (SSS) acoustic images, facilitating their use in underwater robotics. A Lambertian model is used for the sonar scattering process, relating the received echo with the ensonification intensity, the sea bed reflectivity and the incidence angle. As for the ensonification intensity, a sensitivity pattern model is adapted to SSS sensors. By means of these models, SSS imagery is significantly improved.
{"title":"Intensity correction of Side-Scan Sonar images","authors":"A. Burguera, G. Oliver","doi":"10.1109/ETFA.2014.7005092","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005092","url":null,"abstract":"This paper presents a new method to remove the effects of uneven ensonification in Side-Scan Sonar (SSS) acoustic images, facilitating their use in underwater robotics. A Lambertian model is used for the sonar scattering process, relating the received echo with the ensonification intensity, the sea bed reflectivity and the incidence angle. As for the ensonification intensity, a sensitivity pattern model is adapted to SSS sensors. By means of these models, SSS imagery is significantly improved.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74026498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ETFA.2014.7005091
S. Gilani, T. Tack, Holger Flatt, J. Jasperneite
Today, automation suppliers need to provide a large variety of field devices because one device is especially designed to provide a limited and static range of functionalities, which are fixed at the delivery time of the device. This is expensive for both customers and device suppliers. To overcome this situation, device functionalities needs to be adapted or extended on demand according to the changing market requirements, even if the devices have already been delivered to customers. In this work, an app-based approach is proposed and evaluated to serve that purpose. This approach is adapted from the smart device industry and it is used to provide software-based functionalities for field devices as an enabling technology in the context of reconfigurable manufacturing systems. This paper describes the essential elements of such an approach with a practical perspective.
{"title":"An app-based approach for reconfigurable field devices","authors":"S. Gilani, T. Tack, Holger Flatt, J. Jasperneite","doi":"10.1109/ETFA.2014.7005091","DOIUrl":"https://doi.org/10.1109/ETFA.2014.7005091","url":null,"abstract":"Today, automation suppliers need to provide a large variety of field devices because one device is especially designed to provide a limited and static range of functionalities, which are fixed at the delivery time of the device. This is expensive for both customers and device suppliers. To overcome this situation, device functionalities needs to be adapted or extended on demand according to the changing market requirements, even if the devices have already been delivered to customers. In this work, an app-based approach is proposed and evaluated to serve that purpose. This approach is adapted from the smart device industry and it is used to provide software-based functionalities for field devices as an enabling technology in the context of reconfigurable manufacturing systems. This paper describes the essential elements of such an approach with a practical perspective.","PeriodicalId":20477,"journal":{"name":"Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74087972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}