Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819272
R. Dinita, A. Winckles, G. Wilson
This work presents positive experiment results on the efficiency and security potential of an optimized and novel approach to an Autonomous Management Distributed System (AMDS) running in a Cloud Computing environment. The results validate the AMDS software design and demonstrate its potential as an industrial application to be used in modern datacenters. On one hand, from an operational performance point of view, they show the AMDS' ability of reconfiguring itself on the fly, thus resulting in 14 percent increased efficiency over the lifetime of the first experiment. On the other hand, they show an overall malicious (Botnet) data packet detection rate of over 52 percent, a significant percentage for only 5000 network data samples analyzed by the Botnet software module plugged into the AMDS. Both experiments have been performed in a VMWare run cloud environment, however due to the AMDS' abstract architecture, it has the potential to interface with any existing cloud management system that exposes an API.
{"title":"A software approach to improving cloud computing datacenter energy efficiency and enhancing security through Botnet detection","authors":"R. Dinita, A. Winckles, G. Wilson","doi":"10.1109/INDIN.2016.7819272","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819272","url":null,"abstract":"This work presents positive experiment results on the efficiency and security potential of an optimized and novel approach to an Autonomous Management Distributed System (AMDS) running in a Cloud Computing environment. The results validate the AMDS software design and demonstrate its potential as an industrial application to be used in modern datacenters. On one hand, from an operational performance point of view, they show the AMDS' ability of reconfiguring itself on the fly, thus resulting in 14 percent increased efficiency over the lifetime of the first experiment. On the other hand, they show an overall malicious (Botnet) data packet detection rate of over 52 percent, a significant percentage for only 5000 network data samples analyzed by the Botnet software module plugged into the AMDS. Both experiments have been performed in a VMWare run cloud environment, however due to the AMDS' abstract architecture, it has the potential to interface with any existing cloud management system that exposes an API.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819151
Sven Kerschbaum, K. Hielscher, R. German
Nowadays factory automation customers require that industrial automation networks are capable of transmitting real-time I/O data and non-time-critical data. PROFINET, one of the most used industrial Ethernet standards available today [1], promises that “everything [can be transmitted] on one cable” [2]. Nevertheless, the standard also recommends that the non-time-critical data sent by a device is limited to 3 kilobytes per millisecond to avoid network overload [3]. In this paper we discuss the need for controlling the non-time-critical data sent to PROFINET networks. Since Microsoft Windows is an often used operating system in industrial automation today [4] we show that its built-in traffic shaping capabilities are not appropriate for industrial automation networks since it is not possible to limit the bursts sent by applications. Thus, we developed our own industrial traffic shaper that is able to limit the burst and the rate per non-time-critical flow. This enables us to apply Network Calculus to obtain guaranteed performance bounds for PROFINET networks that both transmit real-time I/O and non-time-critical data [5]. Both the analysis and the Windows traffic shaper are now provided by the Siemens AG as Siemens Network Planner (SINETPLAN) [6]. Our work is not limited to PROFINET but also applicable to Industrial Ethernet technologies based on IEEE 802.3 such as EtherNet/IP.
{"title":"The need for shaping non-time-critical data in PROFINET networks","authors":"Sven Kerschbaum, K. Hielscher, R. German","doi":"10.1109/INDIN.2016.7819151","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819151","url":null,"abstract":"Nowadays factory automation customers require that industrial automation networks are capable of transmitting real-time I/O data and non-time-critical data. PROFINET, one of the most used industrial Ethernet standards available today [1], promises that “everything [can be transmitted] on one cable” [2]. Nevertheless, the standard also recommends that the non-time-critical data sent by a device is limited to 3 kilobytes per millisecond to avoid network overload [3]. In this paper we discuss the need for controlling the non-time-critical data sent to PROFINET networks. Since Microsoft Windows is an often used operating system in industrial automation today [4] we show that its built-in traffic shaping capabilities are not appropriate for industrial automation networks since it is not possible to limit the bursts sent by applications. Thus, we developed our own industrial traffic shaper that is able to limit the burst and the rate per non-time-critical flow. This enables us to apply Network Calculus to obtain guaranteed performance bounds for PROFINET networks that both transmit real-time I/O and non-time-critical data [5]. Both the analysis and the Windows traffic shaper are now provided by the Siemens AG as Siemens Network Planner (SINETPLAN) [6]. Our work is not limited to PROFINET but also applicable to Industrial Ethernet technologies based on IEEE 802.3 such as EtherNet/IP.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819133
Matthias Breier, Constantin Haas, Wei Li, D. Merhof
Modern industrial cameras mainly use the Bayer pattern as color filter array (CFA). However, this filtering limits the resolution of the color space. As interpolation methods cannot reconstruct the original image perfectly, they have to be optimized for a specific application. Therefore, the interpolation should match the purpose of the image processing system. Many standard algorithms are optimized for the subjective impression of a human observer which is not necessarily ideal for industrial applications. This paper introduces a new methodology for evaluating interpolation algorithms in industrial applications. For this purpose, a new dataset based on printed circuit boards as representatives for objects in industrial application is introduced. It shows many distinct features which are typical for industrial scenarios such as high contrast object edges, highly reflective materials and low variety of surface colors. Furthermore, two new error measures based on edge accuracy are presented which are tailored to many measurement tasks which employ edges. It can be shown in an evaluation of common CFA interpolation algorithms that these new error measures are better suited to identify the best interpolation algorithm for retaining edge accuracy than conventional error measures.
{"title":"Color filter arrays revisited — Evaluation of Bayer pattern interpolation for industrial applications","authors":"Matthias Breier, Constantin Haas, Wei Li, D. Merhof","doi":"10.1109/INDIN.2016.7819133","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819133","url":null,"abstract":"Modern industrial cameras mainly use the Bayer pattern as color filter array (CFA). However, this filtering limits the resolution of the color space. As interpolation methods cannot reconstruct the original image perfectly, they have to be optimized for a specific application. Therefore, the interpolation should match the purpose of the image processing system. Many standard algorithms are optimized for the subjective impression of a human observer which is not necessarily ideal for industrial applications. This paper introduces a new methodology for evaluating interpolation algorithms in industrial applications. For this purpose, a new dataset based on printed circuit boards as representatives for objects in industrial application is introduced. It shows many distinct features which are typical for industrial scenarios such as high contrast object edges, highly reflective materials and low variety of surface colors. Furthermore, two new error measures based on edge accuracy are presented which are tailored to many measurement tasks which employ edges. It can be shown in an evaluation of common CFA interpolation algorithms that these new error measures are better suited to identify the best interpolation algorithm for retaining edge accuracy than conventional error measures.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819349
G. Cena, I. Bertolotti, T. Hu, A. Valenzano
Controller Area Network (CAN) has been the de facto standard in the automotive industry for the past two decades, and recently CAN with flexible data-rate has been standardized, which achieves higher speed. Further improvements are possible by exploiting the peculiar physical layer of CAN to perform distributed operations among network nodes. In this paper a proposal is made for an extension to the CAN protocol, denoted CAN with eXtensible in-frame Reply (CAN XR), which enables upper protocol layers to define new custom services devoted to, e.g., network management, application-specific functions, and high-efficiency data transfer. Since CAN XR retains full backward compatibility with CAN FD, there is no need to change the protocol specification.
{"title":"CAN XR: CAN with extensible in-frame Reply","authors":"G. Cena, I. Bertolotti, T. Hu, A. Valenzano","doi":"10.1109/INDIN.2016.7819349","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819349","url":null,"abstract":"Controller Area Network (CAN) has been the de facto standard in the automotive industry for the past two decades, and recently CAN with flexible data-rate has been standardized, which achieves higher speed. Further improvements are possible by exploiting the peculiar physical layer of CAN to perform distributed operations among network nodes. In this paper a proposal is made for an extension to the CAN protocol, denoted CAN with eXtensible in-frame Reply (CAN XR), which enables upper protocol layers to define new custom services devoted to, e.g., network management, application-specific functions, and high-efficiency data transfer. Since CAN XR retains full backward compatibility with CAN FD, there is no need to change the protocol specification.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125843852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819137
L. Cavanini, Gionata Cimini, G. Ippoliti
The control of DC-DC converters for high performance applications usually relies on Current Mode Control (CMC). Compared to voltage mode control, it guarantees automatic over-current protection, and a better closed loop stability, together with improved transient response. This paper presents a Model Predictive Control (MPC) algorithm for the regulation of the voltage reference signal in CMC. The control of pre-compensated systems via MPC is common in several fields, such as automotive and aerospace, and power electronics is a perfect candidate to exploit this hierarchical structure as well. Indeed, controllers for power converters are often coded in the integrated circuits, and cannot be changed. Furthermore the possible multirate structure allows to exploit the performance of MPC less affecting the computational cost. The paper describes the design of an MPC regulator for a synchronous buck converter, when a primal CMC is already coded. Performance improvements of the proposed controller are reported.
{"title":"Model predictive control for the reference regulation of current mode controlled DC-DC converters","authors":"L. Cavanini, Gionata Cimini, G. Ippoliti","doi":"10.1109/INDIN.2016.7819137","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819137","url":null,"abstract":"The control of DC-DC converters for high performance applications usually relies on Current Mode Control (CMC). Compared to voltage mode control, it guarantees automatic over-current protection, and a better closed loop stability, together with improved transient response. This paper presents a Model Predictive Control (MPC) algorithm for the regulation of the voltage reference signal in CMC. The control of pre-compensated systems via MPC is common in several fields, such as automotive and aerospace, and power electronics is a perfect candidate to exploit this hierarchical structure as well. Indeed, controllers for power converters are often coded in the integrated circuits, and cannot be changed. Furthermore the possible multirate structure allows to exploit the performance of MPC less affecting the computational cost. The paper describes the design of an MPC regulator for a synchronous buck converter, when a primal CMC is already coded. Performance improvements of the proposed controller are reported.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130510270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819304
J. Marais, D. V. Bhatt, G. Hancke, T. D. Ramotsoela
Maintenance of the water quality in swimming pools is a challenge for home owners with limited budgets. Existing pool automation systems are expensive and entry-level models can only control pH and chlorine levels. This paper presents a web-based swimming pool information system that is capable of taking various sensor measurements and interface with actuators to automate numerous elements of pool maintenance. Apart from measuring pH and chlorine levels, the system is also able to maintain a set water level and can activate/deactivate the pool pump remotely according to a user-defined schedule. The system can be remotely monitored and configured via WiFi.
{"title":"A web-based swimming pool information and management system","authors":"J. Marais, D. V. Bhatt, G. Hancke, T. D. Ramotsoela","doi":"10.1109/INDIN.2016.7819304","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819304","url":null,"abstract":"Maintenance of the water quality in swimming pools is a challenge for home owners with limited budgets. Existing pool automation systems are expensive and entry-level models can only control pH and chlorine levels. This paper presents a web-based swimming pool information system that is capable of taking various sensor measurements and interface with actuators to automate numerous elements of pool maintenance. Apart from measuring pH and chlorine levels, the system is also able to maintain a set water level and can activate/deactivate the pool pump remotely according to a user-defined schedule. The system can be remotely monitored and configured via WiFi.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126513382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819367
N. Gronau, Marcus Grum, Benedict Bender
Traditional production systems are enhanced by cyber-physical systems (CPSs) and Internet of Things. As kind of next generation systems, those cyber-physical production systems (CPPSs) are able to raise the level of autonomy of its production components. To find the optimal degree of autonomy in a given context, a research approach is formulated using a simulation concept. Based on requirements and assumptions, a cyber-physical market is modeled and qualitative hypotheses are formulated, which will be verified with the help of the CPPS of a hybrid simulation environment. Big Data Analytics can be used to extract influence factors which explain the optimal degree of autonomy.
{"title":"Determining the optimal level of autonomy in cyber-physical production systems","authors":"N. Gronau, Marcus Grum, Benedict Bender","doi":"10.1109/INDIN.2016.7819367","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819367","url":null,"abstract":"Traditional production systems are enhanced by cyber-physical systems (CPSs) and Internet of Things. As kind of next generation systems, those cyber-physical production systems (CPPSs) are able to raise the level of autonomy of its production components. To find the optimal degree of autonomy in a given context, a research approach is formulated using a simulation concept. Based on requirements and assumptions, a cyber-physical market is modeled and qualitative hypotheses are formulated, which will be verified with the help of the CPPS of a hybrid simulation environment. Big Data Analytics can be used to extract influence factors which explain the optimal degree of autonomy.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819280
Dominik Meyer, Jan Haase, Marcel Eckert, B. Klauer
Security and privacy are very important assets within building and home automation because the System Control Unit (SCU) stores and processes a huge amount of data about the inhabitants or employees of the building. This data is necessary for managing the building and increasing the convenience of persons within. But this data can also be used to create a movement profile, monitor working times, and draw conclusions about people's health situation. Modern smart home implementations also control many actuators within the building including doors, windows, locks, and fire extinguisher. These increase security and safety, but unauthorized control can reduce the security and can even be harmful to persons. Therefore, identifying the different security and privacy threats is very important and helps system engineers and system managers to develop and deploy secure systems. This work presents an abstract model of a building automation system and some attack trees which simplify threat identification. Attack trees are common in secure software development and secure system deployment. An example smart home deployment is evaluated using the proposed model and attack trees to show the feasibility.
{"title":"A threat-model for building and home automation","authors":"Dominik Meyer, Jan Haase, Marcel Eckert, B. Klauer","doi":"10.1109/INDIN.2016.7819280","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819280","url":null,"abstract":"Security and privacy are very important assets within building and home automation because the System Control Unit (SCU) stores and processes a huge amount of data about the inhabitants or employees of the building. This data is necessary for managing the building and increasing the convenience of persons within. But this data can also be used to create a movement profile, monitor working times, and draw conclusions about people's health situation. Modern smart home implementations also control many actuators within the building including doors, windows, locks, and fire extinguisher. These increase security and safety, but unauthorized control can reduce the security and can even be harmful to persons. Therefore, identifying the different security and privacy threats is very important and helps system engineers and system managers to develop and deploy secure systems. This work presents an abstract model of a building automation system and some attack trees which simplify threat identification. Attack trees are common in secure software development and secure system deployment. An example smart home deployment is evaluated using the proposed model and attack trees to show the feasibility.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819286
K. Hung, Nathan Wan, Sheung-On Choy, Carlin Chu, D. Chow
Numerous parties have used traditional exercises as interventions to improve individuals' physical activity levels. These were found to be effective in reducing the risk of chronic diseases such as hypertension, heart diseases, and diabetes. Recent studies have shown that exergames are alternative approaches of physical activity intervention. This paper presents the preliminary design of an exergaming system with force haptic feedback. The system will be used to investigate the relationship between body movements, energy expenditure, and muscle activities during upper-extremity-focused and lower-extremity-focused exergames. The results generated from experiments performed with the system will serve as useful references for developing standards and guidelines for selecting the appropriate types of exergames for specific intended outcomes.
{"title":"Design of an exergaming system with haptic feedback for the investigation of energy expenditure and muscle activities","authors":"K. Hung, Nathan Wan, Sheung-On Choy, Carlin Chu, D. Chow","doi":"10.1109/INDIN.2016.7819286","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819286","url":null,"abstract":"Numerous parties have used traditional exercises as interventions to improve individuals' physical activity levels. These were found to be effective in reducing the risk of chronic diseases such as hypertension, heart diseases, and diabetes. Recent studies have shown that exergames are alternative approaches of physical activity intervention. This paper presents the preliminary design of an exergaming system with force haptic feedback. The system will be used to investigate the relationship between body movements, energy expenditure, and muscle activities during upper-extremity-focused and lower-extremity-focused exergames. The results generated from experiments performed with the system will serve as useful references for developing standards and guidelines for selecting the appropriate types of exergames for specific intended outcomes.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121946141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-19DOI: 10.1109/INDIN.2016.7819146
S. Cavalieri, Marco Stefano Scroppo, L. Galvagno
The need to deploy IEC 61131-3 — based application on multiple target platforms is becoming more and more urgent at this moment. The increased need of flexibility of automation systems and the increased capabilities of sensors and actuators paired with more capable bus systems, pave the way for the reallocation of applications, such as control loops, away from the field level into so-called compute pools. Such compute pools are decentralised with enough compute power for a large number of applications, while providing the required flexibility to quickly adapt to changes of the applications requirements. The aim of the paper is propose a framework able to deploy IEC 61131-3-based application to multiple computing platforms. It is based on CLR VM and does not require any modifications on the IEC 61131-3 applications; all additional overhead is handled by the framework here defined. As applications in the automation domain often come with real-time requirements, the paper presents also an analysis about the capability of the proposed solution to respect typical real-time constraints in factory automation.
{"title":"A framework based on CLR virtual machine to deploy IEC 61131-3 programs","authors":"S. Cavalieri, Marco Stefano Scroppo, L. Galvagno","doi":"10.1109/INDIN.2016.7819146","DOIUrl":"https://doi.org/10.1109/INDIN.2016.7819146","url":null,"abstract":"The need to deploy IEC 61131-3 — based application on multiple target platforms is becoming more and more urgent at this moment. The increased need of flexibility of automation systems and the increased capabilities of sensors and actuators paired with more capable bus systems, pave the way for the reallocation of applications, such as control loops, away from the field level into so-called compute pools. Such compute pools are decentralised with enough compute power for a large number of applications, while providing the required flexibility to quickly adapt to changes of the applications requirements. The aim of the paper is propose a framework able to deploy IEC 61131-3-based application to multiple computing platforms. It is based on CLR VM and does not require any modifications on the IEC 61131-3 applications; all additional overhead is handled by the framework here defined. As applications in the automation domain often come with real-time requirements, the paper presents also an analysis about the capability of the proposed solution to respect typical real-time constraints in factory automation.","PeriodicalId":421680,"journal":{"name":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)","volume":"130 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124244025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}