首页 > 最新文献

At-Automatisierungstechnik最新文献

英文 中文
Cybersecurity for industrial automation and control systems 工业自动化和控制系统的网络安全
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0141
Christian Haas, Georg Bretthauer, Jürgen Beyerer
{"title":"Cybersecurity for industrial automation and control systems","authors":"Christian Haas, Georg Bretthauer, Jürgen Beyerer","doi":"10.1515/auto-2023-0141","DOIUrl":"https://doi.org/10.1515/auto-2023-0141","url":null,"abstract":"","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"723 - 725"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43443317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure bootstrapping for next-gen industrial automation systems 下一代工业自动化系统的安全引导
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0074
Sören Finster, Abdallah Dawoud, Florian Kohnhäuser, Abdulkadir Karaagac
Abstract The digitalization of industry and the convergence of IT and OT bring about the next generation of industrial automation systems which are expected to work with an orchestration of physical and virtualized components using a single converged network. The increase of complexity in such systems must be managed by an increase in automation for orchestration and management. However, bootstrapping such a complex system from out-of-the-box components is still a manual and error-prone process. We present a bootstrapping concept that brings up a system from out-of-the-box components to an operational solution with physical and virtualized components. The concept combines incremental network discovery with secure incremental bootstrapping of discovered physical components. The gained trust in the physical components of the network is then used to translate this trust into virtualized components. By attesting the trustworthiness of hosting infrastructure, the concept allows for virtualized components to be securely assigned a cryptographically secure identity that can be used in further application onboarding. Such securely bootstrapped systems are then capable to deliver the required adaptable, modular, and secure automation solutions of the future.
工业的数字化和IT与OT的融合带来了下一代工业自动化系统,这些系统有望使用单一融合网络与物理和虚拟化组件协同工作。这种系统中复杂性的增加必须通过编排和管理自动化的增加来管理。然而,从开箱即用的组件中引导如此复杂的系统仍然是一个手动且容易出错的过程。我们提出了一个引导概念,将系统从开箱即用组件提升到具有物理和虚拟组件的可操作解决方案。这个概念结合了增量网络发现和安全增量引导发现的物理组件。然后使用在网络的物理组件中获得的信任将这种信任转换为虚拟组件。通过验证托管基础设施的可信性,该概念允许为虚拟化组件安全地分配一个加密安全标识,该标识可用于进一步的应用程序登录。这样的安全引导系统能够提供未来所需的适应性强、模块化和安全的自动化解决方案。
{"title":"Secure bootstrapping for next-gen industrial automation systems","authors":"Sören Finster, Abdallah Dawoud, Florian Kohnhäuser, Abdulkadir Karaagac","doi":"10.1515/auto-2023-0074","DOIUrl":"https://doi.org/10.1515/auto-2023-0074","url":null,"abstract":"Abstract The digitalization of industry and the convergence of IT and OT bring about the next generation of industrial automation systems which are expected to work with an orchestration of physical and virtualized components using a single converged network. The increase of complexity in such systems must be managed by an increase in automation for orchestration and management. However, bootstrapping such a complex system from out-of-the-box components is still a manual and error-prone process. We present a bootstrapping concept that brings up a system from out-of-the-box components to an operational solution with physical and virtualized components. The concept combines incremental network discovery with secure incremental bootstrapping of discovered physical components. The gained trust in the physical components of the network is then used to translate this trust into virtualized components. By attesting the trustworthiness of hosting infrastructure, the concept allows for virtualized components to be securely assigned a cryptographically secure identity that can be used in further application onboarding. Such securely bootstrapped systems are then capable to deliver the required adaptable, modular, and secure automation solutions of the future.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"748 - 758"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44090674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformation in substation automation: Cyber-Resilient Digital Substations (CyReDS) in power grids 变电站自动化的转型:电网中的网络弹性数字变电站(cyred)
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0075
Dennis Rösch, Thomas Bauer, André Kummerow, Marcel Kühne, S. Nicolai, P. Bretschneider
Abstract The digitalization of substations leads to a high degree of automation, which is referred to as Digital Substations with the use of the IEC 61850. An increase in cybersecurity is necessary, and technically enabled by detection and incident response systems – security-by-design is currently often secondary. The next transformation step of substations is introduced and outlined in this paper as a cyber-resilient digital substation. Based on a state-of-the-art description, this paper presents a definition of cyber resilience for digital substations as a basis for the introduced cyber resilience monitor. The monitor acts as a central instance for recording, assessing and responding to security threats and incidents. Furthermore, the requirements for the system structure of the cyber-resilient digital substation are shown and underpinned with current research approaches.
变电站的数字化导致了高度的自动化,采用IEC 61850标准,称为数字化变电站。增加网络安全是必要的,并且在技术上可以通过检测和事件响应系统来实现——目前设计安全通常是次要的。本文介绍并概述了变电站的下一步改造,即网络弹性数字化变电站。基于现有的描述,本文提出了数字变电站网络弹性的定义,作为引入网络弹性监测的基础。监视器充当记录、评估和响应安全威胁和事件的中心实例。此外,还展示了网络弹性数字变电站系统结构的要求,并以当前的研究方法为基础。
{"title":"Transformation in substation automation: Cyber-Resilient Digital Substations (CyReDS) in power grids","authors":"Dennis Rösch, Thomas Bauer, André Kummerow, Marcel Kühne, S. Nicolai, P. Bretschneider","doi":"10.1515/auto-2023-0075","DOIUrl":"https://doi.org/10.1515/auto-2023-0075","url":null,"abstract":"Abstract The digitalization of substations leads to a high degree of automation, which is referred to as Digital Substations with the use of the IEC 61850. An increase in cybersecurity is necessary, and technically enabled by detection and incident response systems – security-by-design is currently often secondary. The next transformation step of substations is introduced and outlined in this paper as a cyber-resilient digital substation. Based on a state-of-the-art description, this paper presents a definition of cyber resilience for digital substations as a basis for the introduced cyber resilience monitor. The monitor acts as a central instance for recording, assessing and responding to security threats and incidents. Furthermore, the requirements for the system structure of the cyber-resilient digital substation are shown and underpinned with current research approaches.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"789 - 801"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67478338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards privacy-preserving cooperative control via encrypted distributed optimization 基于加密分布式优化的隐私保护协同控制
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0082
P. Binfet, Janis Adamek, Nils Schlüter, M. S. Darup
Abstract Cooperative control is crucial for the effective operation of dynamical multi-agent systems. Especially for distributed control schemes, it is essential to exchange data between the agents. This becomes a privacy threat if the data are sensitive. Encrypted control has shown the potential to address this risk and ensure confidentiality. However, existing approaches mainly focus on cloud-based control and distributed schemes are restrictive. In this paper, we present a novel privacy-preserving cooperative control scheme based on encrypted distributed optimization. More precisely, we focus on a secure distributed solution of a general consensus problem, which has manifold applications in cooperative control, by means of the alternating direction method of multipliers (ADMM). As a unique feature of our approach, we explicitly take into account the common situation that local decision variables contain copies of quantities associated with neighboring agents and ensure the neighbor’s privacy. We show the effectiveness of our method based on a numerical case study dealing with the formation of mobile robots.
摘要协作控制是动态多智能体系统有效运行的关键。特别是对于分布式控制方案,代理之间的数据交换是必不可少的。如果数据是敏感的,这就会对隐私构成威胁。加密控制已显示出解决此风险并确保机密性的潜力。然而,现有的方法主要集中在基于云的控制和分布式方案的限制。本文提出了一种新的基于加密分布式优化的隐私保护协同控制方案。更准确地说,我们重点研究了一个在协同控制中有多种应用的一般共识问题的安全分布式解,即乘法器的交替方向方法(ADMM)。作为我们方法的一个独特之处,我们明确地考虑了局部决策变量包含与相邻代理相关的数量副本的常见情况,并确保了邻居的隐私。通过一个移动机器人编队的数值研究,证明了该方法的有效性。
{"title":"Towards privacy-preserving cooperative control via encrypted distributed optimization","authors":"P. Binfet, Janis Adamek, Nils Schlüter, M. S. Darup","doi":"10.1515/auto-2023-0082","DOIUrl":"https://doi.org/10.1515/auto-2023-0082","url":null,"abstract":"Abstract Cooperative control is crucial for the effective operation of dynamical multi-agent systems. Especially for distributed control schemes, it is essential to exchange data between the agents. This becomes a privacy threat if the data are sensitive. Encrypted control has shown the potential to address this risk and ensure confidentiality. However, existing approaches mainly focus on cloud-based control and distributed schemes are restrictive. In this paper, we present a novel privacy-preserving cooperative control scheme based on encrypted distributed optimization. More precisely, we focus on a secure distributed solution of a general consensus problem, which has manifold applications in cooperative control, by means of the alternating direction method of multipliers (ADMM). As a unique feature of our approach, we explicitly take into account the common situation that local decision variables contain copies of quantities associated with neighboring agents and ensure the neighbor’s privacy. We show the effectiveness of our method based on a numerical case study dealing with the formation of mobile robots.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"736 - 747"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43659046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks 网络威胁情报集成到安全洋葱和马尔科姆的工业网络用例
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0057
Tim Ackermann, Markus Karch, Jörg Kippe
Abstract With the increasing frequency of cyberattacks on Industrial Control Systems (ICS), the subject of cybersecurity is becoming increasingly important. Cyber Threat Intelligence (CTI) provides information about cyber adversaries, including their intentions and attack techniques. This paper analyzes the availability of open-source CTI for ICS, with a particular focus on technical indicators that can aid in detecting cyberattacks. Furthermore, this paper examines the automated integration of CTI data into SIEM systems and introduces CTIExchange as a tool that facilitates this integration by connecting Threat Intelligence Platforms with detection tools.
摘要随着工业控制系统(ICS)受到网络攻击的频率越来越高,网络安全问题变得越来越重要。网络威胁情报(CTI)提供有关网络对手的信息,包括他们的意图和攻击技术。本文分析了ICS开源CTI的可用性,特别关注有助于检测网络攻击的技术指标。此外,本文研究了CTI数据到SIEM系统中的自动集成,并介绍了CTIExchange作为一种工具,通过将威胁情报平台与检测工具连接起来来促进这种集成。
{"title":"Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks","authors":"Tim Ackermann, Markus Karch, Jörg Kippe","doi":"10.1515/auto-2023-0057","DOIUrl":"https://doi.org/10.1515/auto-2023-0057","url":null,"abstract":"Abstract With the increasing frequency of cyberattacks on Industrial Control Systems (ICS), the subject of cybersecurity is becoming increasingly important. Cyber Threat Intelligence (CTI) provides information about cyber adversaries, including their intentions and attack techniques. This paper analyzes the availability of open-source CTI for ICS, with a particular focus on technical indicators that can aid in detecting cyberattacks. Furthermore, this paper examines the automated integration of CTI data into SIEM systems and introduces CTIExchange as a tool that facilitates this integration by connecting Threat Intelligence Platforms with detection tools.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"802 - 815"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44462407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Device discovery and identification in industrial networks 工业网络中的设备发现和识别
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0135
Klaus Biß, Jörg Kippe, Markus Karch
Abstract The Act on Federal Office for Information Security (BSI Act) explicitly mandates the use of attack detection systems. The BSI works together with operators of process plants as well as discrete manufacturing facilities in order to test sensors, which may be part of such systems, in their networks. This gives the BSI the opportunity to record a collection of network traffic from those plants. One goal is to improve the detection and characterization of devices in industrial networks by implementing new or enhanced features for the open source network monitoring tool suite Malcolm. In this context, the recording of the network traffic represents the starting point for further investigations. This paper highlights what needs to be considered in these recordings to serve as a basis for device identification and characterization.
摘要《联邦信息安全办公室法案》(BSI法案)明确要求使用攻击检测系统。BSI与工艺工厂和离散制造设施的运营商合作,在其网络中测试传感器,传感器可能是此类系统的一部分。这使BSI有机会记录这些工厂的网络流量集合。一个目标是通过实现开源网络监控工具套件Malcolm的新功能或增强功能,改进工业网络中设备的检测和表征。在这种情况下,网络流量的记录代表了进一步调查的起点。本文强调了在这些记录中需要考虑的内容,以作为设备识别和表征的基础。
{"title":"Device discovery and identification in industrial networks","authors":"Klaus Biß, Jörg Kippe, Markus Karch","doi":"10.1515/auto-2023-0135","DOIUrl":"https://doi.org/10.1515/auto-2023-0135","url":null,"abstract":"Abstract The Act on Federal Office for Information Security (BSI Act) explicitly mandates the use of attack detection systems. The BSI works together with operators of process plants as well as discrete manufacturing facilities in order to test sensors, which may be part of such systems, in their networks. This gives the BSI the opportunity to record a collection of network traffic from those plants. One goal is to improve the detection and characterization of devices in industrial networks by implementing new or enhanced features for the open source network monitoring tool suite Malcolm. In this context, the recording of the network traffic represents the starting point for further investigations. This paper highlights what needs to be considered in these recordings to serve as a basis for device identification and characterization.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"726 - 735"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49442257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes 基于模糊层次分析法的智能电网网络安全设计混合风险评估新方法
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-09-01 DOI: 10.1515/auto-2023-0089
Sine Canbolat, Ghada Elbez, V. Hagenmeyer
Abstract IT vulnerabilities, cyber threats, and resulting risks significantly impact the stability of current and future power grids. The results of a Risk Assessment process contribute to a better understanding of the causes and nature of the associated risks. The risks assessed by experts are available in both numerical and linguistic representations – this makes it beneficial to include a combination of linguistic and numerical analyses. In this paper, we propose a new Hybrid Risk Assessment method based on fuzzy logic, leading to more precise results. The presented approach specifies the variables and membership functions of fuzzy logic with reference to Smart Grids. For this propose, a case study with five risk events in a small-scale Smart Grid is carried out as an example. The results can then support decision-makers in ensuring grid stability.
摘要IT漏洞、网络威胁以及由此产生的风险严重影响当前和未来电网的稳定性。风险评估过程的结果有助于更好地了解相关风险的原因和性质。专家评估的风险有数字和语言表示两种形式——这使得将语言和数字分析相结合是有益的。在本文中,我们提出了一种新的基于模糊逻辑的混合风险评估方法,从而获得更精确的结果。该方法以智能网格为参考,规定了模糊逻辑的变量和隶属函数。针对这一建议,以一个小型智能电网中的五个风险事件为例进行了案例研究。结果可以支持决策者确保电网的稳定性。
{"title":"A new hybrid risk assessment process for cyber security design of smart grids using fuzzy analytic hierarchy processes","authors":"Sine Canbolat, Ghada Elbez, V. Hagenmeyer","doi":"10.1515/auto-2023-0089","DOIUrl":"https://doi.org/10.1515/auto-2023-0089","url":null,"abstract":"Abstract IT vulnerabilities, cyber threats, and resulting risks significantly impact the stability of current and future power grids. The results of a Risk Assessment process contribute to a better understanding of the causes and nature of the associated risks. The risks assessed by experts are available in both numerical and linguistic representations – this makes it beneficial to include a combination of linguistic and numerical analyses. In this paper, we propose a new Hybrid Risk Assessment method based on fuzzy logic, leading to more precise results. The presented approach specifies the variables and membership functions of fuzzy logic with reference to Smart Grids. For this propose, a case study with five risk events in a small-scale Smart Grid is carried out as an example. The results can then support decision-makers in ensuring grid stability.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"779 - 788"},"PeriodicalIF":1.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49051770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indirekte Schätzung der Magnettemperatur einer Permanentmagnet-Synchronmaschine 用非永恒磁化机器的磁场温度间接估计
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-08-01 DOI: 10.1515/auto-2023-0037
M. Baumann, Andreas Steinboeck, Wolfgang Kemmetmüller, A. Kugi
Zusammenfassung Zur Vermeidung von Schäden in Permanentmagnet-Synchronmaschinen, die an ihren (thermischen) Leistungsgrenzen betrieben werden, wird eine Online-Überwachung der Temperatur der Permanentmagnete benötigt. Da eine direkte Messung dieser Temperatur in der Regel nicht möglich ist, wird in diesem Beitrag eine indirekte Schätzmethode vorgestellt. Aufbauend auf einem elektrischen Modell der Maschine wird ein Erweitertes Kalman-Filter für den verketteten Fluss und damit die Temperatur der Permanentmagnete entwickelt. Zur Reduktion der Sensitivität gegenüber Abweichungen vom Nominalwert des verketteten Permanentmagnetflusses wird eine Online-Kalibriermethode vorgeschlagen. Die Eignung der vorgeschlagenen Methode und die Verbesserung im Vergleich zum Stand der Technik werden anhand von Simulationsstudien und Messungen gezeigt.
用一套在(热)导体上的永久磁共振机器来避免损伤需要网上测量恒温电磁棒的温度。由于一般来说无法直接测量温度,本文提出了非间接的方法。在这个机器的电模型基础上,扩展的卡尔曼过滤器被开发为叠加了的电流,从而产生了永久性磁铁的温度。建议了一种在线校准方法,以降低对加密了的永久性电流的名义值的敏感性。模拟模拟研究及测量可以说明,方法的适应力和改进情况。
{"title":"Indirekte Schätzung der Magnettemperatur einer Permanentmagnet-Synchronmaschine","authors":"M. Baumann, Andreas Steinboeck, Wolfgang Kemmetmüller, A. Kugi","doi":"10.1515/auto-2023-0037","DOIUrl":"https://doi.org/10.1515/auto-2023-0037","url":null,"abstract":"Zusammenfassung Zur Vermeidung von Schäden in Permanentmagnet-Synchronmaschinen, die an ihren (thermischen) Leistungsgrenzen betrieben werden, wird eine Online-Überwachung der Temperatur der Permanentmagnete benötigt. Da eine direkte Messung dieser Temperatur in der Regel nicht möglich ist, wird in diesem Beitrag eine indirekte Schätzmethode vorgestellt. Aufbauend auf einem elektrischen Modell der Maschine wird ein Erweitertes Kalman-Filter für den verketteten Fluss und damit die Temperatur der Permanentmagnete entwickelt. Zur Reduktion der Sensitivität gegenüber Abweichungen vom Nominalwert des verketteten Permanentmagnetflusses wird eine Online-Kalibriermethode vorgeschlagen. Die Eignung der vorgeschlagenen Methode und die Verbesserung im Vergleich zum Stand der Technik werden anhand von Simulationsstudien und Messungen gezeigt.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"599 - 611"},"PeriodicalIF":1.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46564811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AlgDiff: an open source toolbox for the design, analysis and discretisation of algebraic differentiators AlgDiff:一个用于设计、分析和离散化代数微分器的开源工具箱
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-08-01 DOI: 10.1515/auto-2023-0035
A. Othmane, J. Rudolph
Abstract Algebraic differentiators have attracted much interest in recent years. Their simple implementation as classical finite impulse response digital filters and systematic tuning guidelines may help to solve challenging problems, including, but not limited to, nonlinear feedback control, model-free control, and fault diagnosis. This contribution introduces the open source toolbox AlgDiff for the design, analysis and discretisation of algebraic differentiators.
代数微分器近年来引起了广泛的关注。它们作为经典有限脉冲响应数字滤波器和系统调谐指南的简单实现可能有助于解决具有挑战性的问题,包括但不限于非线性反馈控制、无模型控制和故障诊断。本文介绍了用于设计、分析和离散化代数微分器的开源工具箱AlgDiff。
{"title":"AlgDiff: an open source toolbox for the design, analysis and discretisation of algebraic differentiators","authors":"A. Othmane, J. Rudolph","doi":"10.1515/auto-2023-0035","DOIUrl":"https://doi.org/10.1515/auto-2023-0035","url":null,"abstract":"Abstract Algebraic differentiators have attracted much interest in recent years. Their simple implementation as classical finite impulse response digital filters and systematic tuning guidelines may help to solve challenging problems, including, but not limited to, nonlinear feedback control, model-free control, and fault diagnosis. This contribution introduces the open source toolbox AlgDiff for the design, analysis and discretisation of algebraic differentiators.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"612 - 623"},"PeriodicalIF":1.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44975339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A workflow towards a strongly typed AutomationML API 一个面向强类型AutomationML API的工作流
IF 1 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2023-08-01 DOI: 10.1515/auto-2023-0038
Tina Mersch, M. Schleipen
Abstract Over the lifecycle of a production plant digitalization leads to a large data footprint along different software (SW) components. A digital data exchange is the fundament to support data integrity, prevent data loss and avoid duplicate work. AutomationML (AML) is a commonly accepted tool-independent format to exchange data of different domains along the lifecycle of a production plant. This contribution provides an easy-to-use workflow that empowers SW components to transform AML into a strongly typed class hierarchy which is the basis for an efficient and maintainable SW solution.
摘要在生产工厂的整个生命周期中,数字化会导致不同软件(SW)组件的大量数据占用。数字数据交换是支持数据完整性、防止数据丢失和避免重复工作的基础。AutomationML(AML)是一种普遍接受的与工具无关的格式,用于在生产工厂的生命周期中交换不同领域的数据。这一贡献提供了一个易于使用的工作流,使软件组件能够将AML转换为强类型的类层次结构,这是高效和可维护的软件解决方案的基础。
{"title":"A workflow towards a strongly typed AutomationML API","authors":"Tina Mersch, M. Schleipen","doi":"10.1515/auto-2023-0038","DOIUrl":"https://doi.org/10.1515/auto-2023-0038","url":null,"abstract":"Abstract Over the lifecycle of a production plant digitalization leads to a large data footprint along different software (SW) components. A digital data exchange is the fundament to support data integrity, prevent data loss and avoid duplicate work. AutomationML (AML) is a commonly accepted tool-independent format to exchange data of different domains along the lifecycle of a production plant. This contribution provides an easy-to-use workflow that empowers SW components to transform AML into a strongly typed class hierarchy which is the basis for an efficient and maintainable SW solution.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"709 - 719"},"PeriodicalIF":1.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41786067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
At-Automatisierungstechnik
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1