Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976164
Jaime Marco-Rider, T. Tran, E. B. Njaastad, O. Egeland, A. Lobov
Automation and the use of robots for welding operations is an important research topic. Being able to automate and, thus, save time for setting up and using robotic welding for complex, large-scale structures made of reflective materials, such as aluminium, will provide clear economic and competitive advantages. However, challenges coming from the ability to accurately detect and calibrate the robot for a given physical workpiece in addition to noises, such as the reflections, make it hard to develop and demonstrate a feasible automation solution. This paper proposes combining laser line scanning technology with CAD-based analysis of a workpiece geometry to support the identification of relevant elements of the workpiece in the physical world and thus support welding operations. An extendable trigger definition method is proposed to identify features of interest in a workpiece. The method can potentially support the execution of welding sequences, which in our case can be represented as a sequence of triggers that have to be observed and followed at the robot runtime to weld the workpiece together.
{"title":"Supporting robotic welding of aluminium with a laser line scanner-based trigger definition method","authors":"Jaime Marco-Rider, T. Tran, E. B. Njaastad, O. Egeland, A. Lobov","doi":"10.1109/INDIN51773.2022.9976164","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976164","url":null,"abstract":"Automation and the use of robots for welding operations is an important research topic. Being able to automate and, thus, save time for setting up and using robotic welding for complex, large-scale structures made of reflective materials, such as aluminium, will provide clear economic and competitive advantages. However, challenges coming from the ability to accurately detect and calibrate the robot for a given physical workpiece in addition to noises, such as the reflections, make it hard to develop and demonstrate a feasible automation solution. This paper proposes combining laser line scanning technology with CAD-based analysis of a workpiece geometry to support the identification of relevant elements of the workpiece in the physical world and thus support welding operations. An extendable trigger definition method is proposed to identify features of interest in a workpiece. The method can potentially support the execution of welding sequences, which in our case can be represented as a sequence of triggers that have to be observed and followed at the robot runtime to weld the workpiece together.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976135
K. Hashimoto, Daichi Yanagihara, Hiroshi Kuniyuki, K. Doki, Yuki Funabora, S. Doki
In Japan, where the population is aging, traffic accidents caused by elderly drivers have become a social problem. The main cause of the accident is a decline in cognitive ability, and there is an urgent need to develop technology for early detection of decline in the ability. The authors have been developing a technology to evaluate the cognitive ability of a driver from the driving behavior data. In the driving behavior data, there are some scenes where the cognitive ability can be evaluated and some scenes where the cognitive ability cannot be evaluated. Therefore, in this paper, we propose a clustering method for driving behavior data. Here, it is considered that the cognitive ability is the accuracy of the operation for the surrounding situation, and it is useful to cluster the relationship pattern between the situation and the operation for the driving behavior data as a group. In this method, Coupled-GP-HSMM and Convolutional Variational Auto Encoder are applied as a time series clustering method. This method realizes clustering of the relationship pattern between the time-series data representing the situation and the time-series data representing the operation.
{"title":"Study on Clustering Method of Driving Behavior Data Based on Variational Auto Encoder and Coupled-GP-HSMM","authors":"K. Hashimoto, Daichi Yanagihara, Hiroshi Kuniyuki, K. Doki, Yuki Funabora, S. Doki","doi":"10.1109/INDIN51773.2022.9976135","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976135","url":null,"abstract":"In Japan, where the population is aging, traffic accidents caused by elderly drivers have become a social problem. The main cause of the accident is a decline in cognitive ability, and there is an urgent need to develop technology for early detection of decline in the ability. The authors have been developing a technology to evaluate the cognitive ability of a driver from the driving behavior data. In the driving behavior data, there are some scenes where the cognitive ability can be evaluated and some scenes where the cognitive ability cannot be evaluated. Therefore, in this paper, we propose a clustering method for driving behavior data. Here, it is considered that the cognitive ability is the accuracy of the operation for the surrounding situation, and it is useful to cluster the relationship pattern between the situation and the operation for the driving behavior data as a group. In this method, Coupled-GP-HSMM and Convolutional Variational Auto Encoder are applied as a time series clustering method. This method realizes clustering of the relationship pattern between the time-series data representing the situation and the time-series data representing the operation.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976128
Zhaofan Su, Jianwu Lin, Zhang Chengshan
Genetic Algorithm(GA) jumps out of the traditional quantitative factor construction methods. It is a "formula first and logic later" method and makes drastic improvement for existing factors with the help of biological evolution. In this research, a large number of commonly used quantitative factors are introduced as the GA operators, and we use the factors’ Sharpe Ratio and correlation with existing factors to modify the fitness function, so as to construct the GA more suitable for financial investment system. This research has carried out a large number of variations on 206 transaction-data factors that have been used for investment. Multiple rounds of evolutionary iterations show that our research can make existing quantitative factors jump out of local optimal, find more excellent and different factors, reduce the correlation among factors, approach the truth of market data distribution constantly.
{"title":"Genetic Algorithm Based Quantitative Factors Construction","authors":"Zhaofan Su, Jianwu Lin, Zhang Chengshan","doi":"10.1109/INDIN51773.2022.9976128","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976128","url":null,"abstract":"Genetic Algorithm(GA) jumps out of the traditional quantitative factor construction methods. It is a \"formula first and logic later\" method and makes drastic improvement for existing factors with the help of biological evolution. In this research, a large number of commonly used quantitative factors are introduced as the GA operators, and we use the factors’ Sharpe Ratio and correlation with existing factors to modify the fitness function, so as to construct the GA more suitable for financial investment system. This research has carried out a large number of variations on 206 transaction-data factors that have been used for investment. Multiple rounds of evolutionary iterations show that our research can make existing quantitative factors jump out of local optimal, find more excellent and different factors, reduce the correlation among factors, approach the truth of market data distribution constantly.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976141
Alaettin Dogan, Aron Schnakenbeck, A. Fay
In the connected world of Industrie 4.0, not only the access to information becomes more and more important, but also secure, standardized, and machine-interpretable communication between assets. The identification of assets forms the basis for all emerging processes, which leads to new requirements. The authors developed a concept to establish the identity of Industrie 4.0 components in decentralized systems by providing a decentralized identity and access management based on distributed ledger technology and integrated this into the concept of the Industrie 4.0 language. The use of decentralized identifiers guarantees more security and reliability for the involved actors in the value chain. Thus, authentication and authorization can be carried out solely between the involved actors without the use of centralized identity providers or certification authorities.
{"title":"Distributed ledger-based authentication and authorization for Industrie 4.0 components","authors":"Alaettin Dogan, Aron Schnakenbeck, A. Fay","doi":"10.1109/INDIN51773.2022.9976141","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976141","url":null,"abstract":"In the connected world of Industrie 4.0, not only the access to information becomes more and more important, but also secure, standardized, and machine-interpretable communication between assets. The identification of assets forms the basis for all emerging processes, which leads to new requirements. The authors developed a concept to establish the identity of Industrie 4.0 components in decentralized systems by providing a decentralized identity and access management based on distributed ledger technology and integrated this into the concept of the Industrie 4.0 language. The use of decentralized identifiers guarantees more security and reliability for the involved actors in the value chain. Thus, authentication and authorization can be carried out solely between the involved actors without the use of centralized identity providers or certification authorities.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976150
Michael Oberlehner, Virendra Ashiwal, Alois Zoitl, J. Christensen
This work analyzes the problems that arise in IEC 61499 development due to the fact that there are no ways of structuring type libraries. As a result of this analysis we derived requirements for integrating modules into the IEC 61499 specification. The modules that are portable among several runtime providers and vendors can be imported into IEC 61499 systems. Every module contains a set of function blocks that can be used inside the application. The proposed IEC 61499 module has its own version and namespace. It is also capable of defining dependencies on each other. Reusability from types can be increased by dividing the type library into several parts with the help of the proposed modules.
{"title":"Using Modules to Manage the Content of IEC 61499 Type Libraries","authors":"Michael Oberlehner, Virendra Ashiwal, Alois Zoitl, J. Christensen","doi":"10.1109/INDIN51773.2022.9976150","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976150","url":null,"abstract":"This work analyzes the problems that arise in IEC 61499 development due to the fact that there are no ways of structuring type libraries. As a result of this analysis we derived requirements for integrating modules into the IEC 61499 specification. The modules that are portable among several runtime providers and vendors can be imported into IEC 61499 systems. Every module contains a set of function blocks that can be used inside the application. The proposed IEC 61499 module has its own version and namespace. It is also capable of defining dependencies on each other. Reusability from types can be increased by dividing the type library into several parts with the help of the proposed modules.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123008680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976181
Sige Liu, Peng Cheng, Zhuo Chen, Wei Xiang, B. Vucetic, Yonghui Li
The industrial Internet of Things (IIoT) interconnects an exponential number of industrial devices, and more flexible and low-cost communications are widely in demand. The fifth-generation (5G) communication provides two industrial-target technologies, massive machine-type communications (mMTC) and ultra-reliable low-latency communications (URLLC), to meet the demand. We design a 5G-aided quality test system, where various sensors are connected to the base station (BS) and send contextual information via mMTC. The BS and quality test machine transmit short-length commands and small-size feedback to each other via URLLC. The problem is formulated as a long-term optimization one with the purpose of improving the product qualification rate. We develop a novel contextual combinatorial quality test (CC-QT) algorithm to solve the problem. We further derive a performance upper bound of the proposed CC-QT and analyze its computational complexity. Experimental results illustrate the performance of CC-QT and substantiate its superiority over the existing algorithms.
{"title":"A Contextual Bandit Learning Based Quality Test System in 5G-Enabled IIoT","authors":"Sige Liu, Peng Cheng, Zhuo Chen, Wei Xiang, B. Vucetic, Yonghui Li","doi":"10.1109/INDIN51773.2022.9976181","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976181","url":null,"abstract":"The industrial Internet of Things (IIoT) interconnects an exponential number of industrial devices, and more flexible and low-cost communications are widely in demand. The fifth-generation (5G) communication provides two industrial-target technologies, massive machine-type communications (mMTC) and ultra-reliable low-latency communications (URLLC), to meet the demand. We design a 5G-aided quality test system, where various sensors are connected to the base station (BS) and send contextual information via mMTC. The BS and quality test machine transmit short-length commands and small-size feedback to each other via URLLC. The problem is formulated as a long-term optimization one with the purpose of improving the product qualification rate. We develop a novel contextual combinatorial quality test (CC-QT) algorithm to solve the problem. We further derive a performance upper bound of the proposed CC-QT and analyze its computational complexity. Experimental results illustrate the performance of CC-QT and substantiate its superiority over the existing algorithms.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976088
M. Lino, C. Montez, E. Leão, Ricardo Lira
Leveraged by IoT and Industry 4.0 solutions, Wireless Sensor Networks (WSNs) have been proposed as an important alternative for large-scale monitoring applications. Such technology provides sensor nodes with the intelligent and autonomous ability to monitor large areas, create self-organizing structures, detect events and process massive data. In this context, data-driven schemes are increasingly needed. For this, some data clustering techniques (DCTs) are used to tackle common problems in WSNs; however, the vast majority of techniques do not consider the data monitored by the sensors to perform topological changes and provide better network structures. This work addresses an architecture for this type of application and evaluates the impact of different DCTs on network performance and the creation of priority node groups.
{"title":"Impact Analysis of Data Clustering Techniques for Data-Based Topological Formation in WSNs","authors":"M. Lino, C. Montez, E. Leão, Ricardo Lira","doi":"10.1109/INDIN51773.2022.9976088","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976088","url":null,"abstract":"Leveraged by IoT and Industry 4.0 solutions, Wireless Sensor Networks (WSNs) have been proposed as an important alternative for large-scale monitoring applications. Such technology provides sensor nodes with the intelligent and autonomous ability to monitor large areas, create self-organizing structures, detect events and process massive data. In this context, data-driven schemes are increasingly needed. For this, some data clustering techniques (DCTs) are used to tackle common problems in WSNs; however, the vast majority of techniques do not consider the data monitored by the sensors to perform topological changes and provide better network structures. This work addresses an architecture for this type of application and evaluates the impact of different DCTs on network performance and the creation of priority node groups.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976105
Lanxin Li, Chengqi Xue, Wenzhe Tang
This paper proposes a B2C Web site emotion feedback system based on emotion recognition, which helps users to regulate their emotions by providing relevant suggestions, thereby improving user Emotional Experience (EE) in the process of Human-Computer Interaction (HCI). Adjust the aesthetics and usability of the B2C Web site to change the emotions of 16 users, combining subjective evaluation and Baidu’s facial expression recognition service to measure the user’s EE. After that, the emotion feedback system is generated in combination with the service, and the user’s emotions are displayed in real time through color symbol expressions. When negative emotions are recognized, a dialog box will pop up to remind users to relax. The results show that this emotion feedback system aimed at regulating users' emotions can be applied to B2C Web sites. This study provides more directions for the design research of user EE in the future.
{"title":"Emotional Experience Design of B2C Web site Based on Emotion Recognition","authors":"Lanxin Li, Chengqi Xue, Wenzhe Tang","doi":"10.1109/INDIN51773.2022.9976105","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976105","url":null,"abstract":"This paper proposes a B2C Web site emotion feedback system based on emotion recognition, which helps users to regulate their emotions by providing relevant suggestions, thereby improving user Emotional Experience (EE) in the process of Human-Computer Interaction (HCI). Adjust the aesthetics and usability of the B2C Web site to change the emotions of 16 users, combining subjective evaluation and Baidu’s facial expression recognition service to measure the user’s EE. After that, the emotion feedback system is generated in combination with the service, and the user’s emotions are displayed in real time through color symbol expressions. When negative emotions are recognized, a dialog box will pop up to remind users to relax. The results show that this emotion feedback system aimed at regulating users' emotions can be applied to B2C Web sites. This study provides more directions for the design research of user EE in the future.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976095
David Allison, Philip Smith, K. Mclaughlin
Digital twins can address the problem of data scarcity during the training machine learning models, as they can be used to simulate and explore a range of process conditions and system states that are too difficult or dangerous to explore in real-world Cyber-Physical Systems (CPSs). Meanwhile, advances in industrial control systems technology have enabled increasingly complex functionality to be deployed on or near so-called edge devices, such as Programmable Logic Controllers (PLCs).In this paper, we propose a methodology for training a machine learning model offline using data extracted from a digital twin, before converting the model for deployment on an edge device to perform anomaly detection. To examine the model’s suitability for anomaly detection, we execute several simulations of fault conditions. Results show that the model can successfully predict normal operations as well as identify faults and cyber-attacks. There is a negligible drop in performance on the edge device, when compared to executing the model on a personal computer, but it remains suitable for the application.
{"title":"Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications","authors":"David Allison, Philip Smith, K. Mclaughlin","doi":"10.1109/INDIN51773.2022.9976095","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976095","url":null,"abstract":"Digital twins can address the problem of data scarcity during the training machine learning models, as they can be used to simulate and explore a range of process conditions and system states that are too difficult or dangerous to explore in real-world Cyber-Physical Systems (CPSs). Meanwhile, advances in industrial control systems technology have enabled increasingly complex functionality to be deployed on or near so-called edge devices, such as Programmable Logic Controllers (PLCs).In this paper, we propose a methodology for training a machine learning model offline using data extracted from a digital twin, before converting the model for deployment on an edge device to perform anomaly detection. To examine the model’s suitability for anomaly detection, we execute several simulations of fault conditions. Results show that the model can successfully predict normal operations as well as identify faults and cyber-attacks. There is a negligible drop in performance on the edge device, when compared to executing the model on a personal computer, but it remains suitable for the application.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116976290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-25DOI: 10.1109/INDIN51773.2022.9976115
Kam Wing Huang, B. Silva, G. Hancke
Alertness detection is an important component of systems used to detect driver fatigue in order to prevent road accidents. Various approaches have been proposed in literature, including the use of sensors that track physiological markers and camera based systems that rely on computer vision techniques to track facial markers. In this paper, we adopt liveness detection to determine alertness. Liveness detection is a method used in biometrics to determine if a face, or fingerprint, is from a live person. The results show that the approach is robust to different lighting conditions.
{"title":"A Head Motion Recognition Approach for Alertness Detection","authors":"Kam Wing Huang, B. Silva, G. Hancke","doi":"10.1109/INDIN51773.2022.9976115","DOIUrl":"https://doi.org/10.1109/INDIN51773.2022.9976115","url":null,"abstract":"Alertness detection is an important component of systems used to detect driver fatigue in order to prevent road accidents. Various approaches have been proposed in literature, including the use of sensors that track physiological markers and camera based systems that rely on computer vision techniques to track facial markers. In this paper, we adopt liveness detection to determine alertness. Liveness detection is a method used in biometrics to determine if a face, or fingerprint, is from a live person. The results show that the approach is robust to different lighting conditions.","PeriodicalId":359190,"journal":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}