Lisa Sonnleithner, A. Gutierrez, Rick Rabiser, Alois Zoitl
Zusammenfassung Bad Smells sind suboptimale Strukturen oder Muster in Software, die zu einer Verschlechterung der Softwarequalität führen können, da sie unter anderem Wartungsprobleme verursachen und die Verständlichkeit erschweren können. Um das Auftreten dieser Probleme zu vermeiden, ist es deshalb wichtig, Bad Smells in Software erkennen und beheben zu können. Im Software Engineering ist das Thema Bad Smells bereits gut erforscht. Für IEC 61499-basierte Steuerungsoftware, die in automatisierten Produktionssystemen verwendet wird, gibt es jedoch erst wenige Arbeiten zu diesem wichtigen Thema.
{"title":"Bad Smells in Steuerungssoftware für automatisierte Produktionssysteme","authors":"Lisa Sonnleithner, A. Gutierrez, Rick Rabiser, Alois Zoitl","doi":"10.1515/auto-2022-0147","DOIUrl":"https://doi.org/10.1515/auto-2022-0147","url":null,"abstract":"Zusammenfassung Bad Smells sind suboptimale Strukturen oder Muster in Software, die zu einer Verschlechterung der Softwarequalität führen können, da sie unter anderem Wartungsprobleme verursachen und die Verständlichkeit erschweren können. Um das Auftreten dieser Probleme zu vermeiden, ist es deshalb wichtig, Bad Smells in Software erkennen und beheben zu können. Im Software Engineering ist das Thema Bad Smells bereits gut erforscht. Für IEC 61499-basierte Steuerungsoftware, die in automatisierten Produktionssystemen verwendet wird, gibt es jedoch erst wenige Arbeiten zu diesem wichtigen Thema.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"413 - 423"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45409590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maximilian Walter, Sebastian Hahner, T. Bures, P. Hnetynka, R. Heinrich, R. Reussner
Abstract Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.
{"title":"Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0","authors":"Maximilian Walter, Sebastian Hahner, T. Bures, P. Hnetynka, R. Heinrich, R. Reussner","doi":"10.1515/auto-2022-0135","DOIUrl":"https://doi.org/10.1515/auto-2022-0135","url":null,"abstract":"Abstract Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"443 - 452"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42152925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniela Lehner, S. Sint, Martin Eisenberg, M. Wimmer
Abstract Digital Twins are emerging as a solution to build and extend existing software systems to make better use of data produced by physical systems. For supporting the development of Digital Twins, several software vendors are offering dedicated tool support, often referred to as Digital Twin platforms. The modeling capabilities of these platforms are mostly concerned with structural viewpoints, i.e., providing an overview of available components including their current and historical sensor values. However, behavioral viewpoints did not yet receive much attention on these platforms. As behavioral models are often used during the design processes, e.g., for simulation and synthesis, it would be beneficial for having them included in Digital Twin platforms, e.g., for reasoning on the set of possible next actions or for checking the execution history to perform runtime validation. In this paper, we present a catalog of modeling patterns for augmenting Digital Twin models with behavioral models and their corresponding runtime information without requiring any extension of the code bases of Digital Twin platforms. We demonstrate the presented modeling patterns by applying them to the Digital Twin platform offered by Microsoft, in an additive manufacturing use case of a 3D printer in a production line.
{"title":"A pattern catalog for augmenting Digital Twin models with behavior","authors":"Daniela Lehner, S. Sint, Martin Eisenberg, M. Wimmer","doi":"10.1515/auto-2022-0144","DOIUrl":"https://doi.org/10.1515/auto-2022-0144","url":null,"abstract":"Abstract Digital Twins are emerging as a solution to build and extend existing software systems to make better use of data produced by physical systems. For supporting the development of Digital Twins, several software vendors are offering dedicated tool support, often referred to as Digital Twin platforms. The modeling capabilities of these platforms are mostly concerned with structural viewpoints, i.e., providing an overview of available components including their current and historical sensor values. However, behavioral viewpoints did not yet receive much attention on these platforms. As behavioral models are often used during the design processes, e.g., for simulation and synthesis, it would be beneficial for having them included in Digital Twin platforms, e.g., for reasoning on the set of possible next actions or for checking the execution history to perform runtime validation. In this paper, we present a catalog of modeling patterns for augmenting Digital Twin models with behavioral models and their corresponding runtime information without requiring any extension of the code bases of Digital Twin platforms. We demonstrate the presented modeling patterns by applying them to the Digital Twin platform offered by Microsoft, in an additive manufacturing use case of a 3D printer in a production line.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"423 - 443"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43989727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tim Moser, Julius Durmann, Maximilian Bonauer, B. Lohmann
Abstract We present a novel software toolbox MORpH for the efficient storage, analysis, interconnection and structure-preserving model order reduction (MOR) of linear port-Hamiltonian differential-algebraic equation systems (pH-DAEs). The model class of pH-DAEs enables energy-based modeling and a flexible coupling of models across different physical domains. This makes them particularly suited for the simulation and control of complex technical systems. To promote the use of recent theoretical findings in engineering practice, efficient software solutions are required. In this work, we illustrate how possibly large-scale pH-DAEs can be efficiently stored and interconnected in MATLAB in an object-oriented way. We discuss three structure-preserving MOR strategies that are supported by MORpH and demonstrate the application and performance of selected MOR algorithms by means of two benchmark examples.
{"title":"MORpH: Model reduction of linear port-Hamiltonian systems in MATLAB","authors":"Tim Moser, Julius Durmann, Maximilian Bonauer, B. Lohmann","doi":"10.1515/auto-2022-0119","DOIUrl":"https://doi.org/10.1515/auto-2022-0119","url":null,"abstract":"Abstract We present a novel software toolbox MORpH for the efficient storage, analysis, interconnection and structure-preserving model order reduction (MOR) of linear port-Hamiltonian differential-algebraic equation systems (pH-DAEs). The model class of pH-DAEs enables energy-based modeling and a flexible coupling of models across different physical domains. This makes them particularly suited for the simulation and control of complex technical systems. To promote the use of recent theoretical findings in engineering practice, efficient software solutions are required. In this work, we illustrate how possibly large-scale pH-DAEs can be efficiently stored and interconnected in MATLAB in an object-oriented way. We discuss three structure-preserving MOR strategies that are supported by MORpH and demonstrate the application and performance of selected MOR algorithms by means of two benchmark examples.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"476 - 489"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48238899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract PI-C (Proportional-Integral-Compensating) controllers are observer-based compensators with integral action containing an inverse model of the plant. Originally developed for windup prevention in case of sensor saturation they are also useful in the presence of actuator saturation. They allow to achieve a nearly perfect disturbance attenuation while the loop gain satisfies the Circle Criterion. It has also been demonstrated that PI-C controllers can solve the windup problem in case of joint input and output saturation. The design of PI-C controllers has only been formulated in the frequency domain so far which, in the MIMO case, requires the manipulation of polynomial matrices. Here, the state-space design of PI-C controllers is presented.
{"title":"Time domain design of PI-C controllers","authors":"P. Hippe","doi":"10.1515/auto-2022-0142","DOIUrl":"https://doi.org/10.1515/auto-2022-0142","url":null,"abstract":"Abstract PI-C (Proportional-Integral-Compensating) controllers are observer-based compensators with integral action containing an inverse model of the plant. Originally developed for windup prevention in case of sensor saturation they are also useful in the presence of actuator saturation. They allow to achieve a nearly perfect disturbance attenuation while the loop gain satisfies the Circle Criterion. It has also been demonstrated that PI-C controllers can solve the windup problem in case of joint input and output saturation. The design of PI-C controllers has only been formulated in the frequency domain so far which, in the MIMO case, requires the manipulation of polynomial matrices. Here, the state-space design of PI-C controllers is presented.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"467 - 475"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42548450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vom 22. bis zum 24. Februar 2023 fand in Boppard das 57. Regelungstechnische Kolloquiummit fast 170 Teilnehmerinnen und Teilnehmern statt. Von dieser sehr interessanten Veranstaltung soll hier kurz berichtet werden. Gleichzeitig wird zur Teilnahme am 58. Regelungstechnischen Kolloquium in Boppard vom 21. – 23. Februar 2024 aufgerufen. Nach den zwei Corona-Jahren, in denen das Kolloquium leider nur online und in stark reduziertemUmfang stattfand, konnte sich die Teilnehmerinnen und Teilnehmerwieder physisch in Boppard treffen. Die wissenschaftliche Leitung, die jedes Jahrwechselt, lag diesmal inmeinenHänden. Für die bewährte organisatorische Leitung des Kolloquiums sorgten wieder Dr. Janko Petereit und Frau Ingrid Alves da Silva vom Fraunhofer-Institut für Optronik, Systemtechnik und Bildauswertung IOSB in Karlsruhe. Vielen Dank für die umfängliche Unterstützung und das große Engagement bei der Durchführung. Das wissenschaftliche Programm des 57. Regelungstechnischen Kolloquiums mit seinen insgesamt 30 Fachbeiträgen in zwei parallelen Strängen sowie dem abendlichen Plenarvortrag am ersten Tag zeigte aktuelle Forschungsgebiete sowohl der Regelungsals auch der Automatisierungstechnik. Das Spektrum der Sessions reichte von anwendungsbezogenen Themen wie Fahrzeugregelung zu Wasser und auf der Straße, Trajektorienplanung, Diagnose und Zustandsschätzung sowie den klassischen Themen, Reglerentwurf, Synthese und Identifikation, Beobachtbarkeit und diskrete Systeme. Vorträge zur verschlüsselten Regelung und zur Anwendung von KI-basierten Methoden komplettierten den Kanon der Beiträge. Das vollständige Programm mit den Kurzfassungen der Beiträge kann auf der hier angegebenen
从22。直到24。2023年2月在Boppard发现57。有近170名参与者参加的监管座谈会。这里将简要报道这一非常有趣的事件。同时,参与58。Boppard监管座谈会,从21日开始2024年2月23日。不幸的是,在科罗纳的两年里,学术讨论会只在网上举行,而且在很大程度上减少了,在那之后,参与者能够在博帕德再次见面。每年都在变化的科学领导力这次掌握在我手中。来自卡尔斯鲁厄Fraunhofer光电子、系统工程和图像分析研究所IOSB的Janko Petereit博士和Ingrid Alves da Silva女士再次对研讨会的组织领导力负责。非常感谢你在执行过程中给予的广泛支持和巨大承诺。57的科学计划。监管座谈会共有30项技术贡献,分为两部分,以及第一天的晚间全体讲座,展示了控制室和自动化技术的当前研究领域。课程范围从应用相关主题,如水上和道路上的车辆控制、轨迹规划、诊断和状态估计,以及经典主题、控制器设计、综合和识别、可观测性和离散系统。关于加密监管和基于人工智能的方法应用的讲座完成了经典贡献。载有捐款摘要的完整方案可在
{"title":"Vom 57. Regelungstechnischen Kolloquium in Boppard","authors":"C. Diedrich","doi":"10.1515/auto-2023-0077","DOIUrl":"https://doi.org/10.1515/auto-2023-0077","url":null,"abstract":"Vom 22. bis zum 24. Februar 2023 fand in Boppard das 57. Regelungstechnische Kolloquiummit fast 170 Teilnehmerinnen und Teilnehmern statt. Von dieser sehr interessanten Veranstaltung soll hier kurz berichtet werden. Gleichzeitig wird zur Teilnahme am 58. Regelungstechnischen Kolloquium in Boppard vom 21. – 23. Februar 2024 aufgerufen. Nach den zwei Corona-Jahren, in denen das Kolloquium leider nur online und in stark reduziertemUmfang stattfand, konnte sich die Teilnehmerinnen und Teilnehmerwieder physisch in Boppard treffen. Die wissenschaftliche Leitung, die jedes Jahrwechselt, lag diesmal inmeinenHänden. Für die bewährte organisatorische Leitung des Kolloquiums sorgten wieder Dr. Janko Petereit und Frau Ingrid Alves da Silva vom Fraunhofer-Institut für Optronik, Systemtechnik und Bildauswertung IOSB in Karlsruhe. Vielen Dank für die umfängliche Unterstützung und das große Engagement bei der Durchführung. Das wissenschaftliche Programm des 57. Regelungstechnischen Kolloquiums mit seinen insgesamt 30 Fachbeiträgen in zwei parallelen Strängen sowie dem abendlichen Plenarvortrag am ersten Tag zeigte aktuelle Forschungsgebiete sowohl der Regelungsals auch der Automatisierungstechnik. Das Spektrum der Sessions reichte von anwendungsbezogenen Themen wie Fahrzeugregelung zu Wasser und auf der Straße, Trajektorienplanung, Diagnose und Zustandsschätzung sowie den klassischen Themen, Reglerentwurf, Synthese und Identifikation, Beobachtbarkeit und diskrete Systeme. Vorträge zur verschlüsselten Regelung und zur Anwendung von KI-basierten Methoden komplettierten den Kanon der Beiträge. Das vollständige Programm mit den Kurzfassungen der Beiträge kann auf der hier angegebenen","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"499 - 500"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45592613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marco Ehrlich, Andre Bröring, C. Diedrich, J. Jasperneite
Abstract Manufacturing systems based on Industry 4.0 concepts provide a greater availability of data and have modular characteristics enabling frequent changes. This raises the need for new security engineering concepts that cover the increasing complexity and frequency of mandatory security risk assessments. In contrast, the current standardization landscape used for the assessment of these systems only offers abstract, static, manual, and resource-intensive procedures. Therefore, this work proposes a method that further specifies the IEC 62443 aiming to automate the security risk assessments in such a way that manual efforts can be reduced and a consistent quality can be achieved. The methodology is presented using network segmentation as a guiding example and consists of four main steps: Information collection based on a process analysis, information formalisation with a semi-formal model, information usage applying first order logic to extract expert knowledge, and information access using the concept of the digital twin. In addition, the applicability of the IEC 62443 standard to the risk assessment of modular manufacturing systems is evaluated.
{"title":"Towards automated risk assessments for modular manufacturing systems","authors":"Marco Ehrlich, Andre Bröring, C. Diedrich, J. Jasperneite","doi":"10.1515/auto-2022-0098","DOIUrl":"https://doi.org/10.1515/auto-2022-0098","url":null,"abstract":"Abstract Manufacturing systems based on Industry 4.0 concepts provide a greater availability of data and have modular characteristics enabling frequent changes. This raises the need for new security engineering concepts that cover the increasing complexity and frequency of mandatory security risk assessments. In contrast, the current standardization landscape used for the assessment of these systems only offers abstract, static, manual, and resource-intensive procedures. Therefore, this work proposes a method that further specifies the IEC 62443 aiming to automate the security risk assessments in such a way that manual efforts can be reduced and a consistent quality can be achieved. The methodology is presented using network segmentation as a guiding example and consists of four main steps: Information collection based on a process analysis, information formalisation with a semi-formal model, information usage applying first order logic to extract expert knowledge, and information access using the concept of the digital twin. In addition, the applicability of the IEC 62443 standard to the risk assessment of modular manufacturing systems is evaluated.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"453 - 466"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43538200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This thesis investigates numerical differentiation methods based on orthogonal polynomials and applies the methods to fault detection and parameter estimation problems. Time-domain and frequency-domain analyses of the differentiators are provided. Tuning guidelines and real-time implementations are proposed.
{"title":"Contributions to numerical differentiation using orthogonal polynomials and its application to fault detection and parameter identification","authors":"A. Othmane","doi":"10.1515/auto-2023-0008","DOIUrl":"https://doi.org/10.1515/auto-2023-0008","url":null,"abstract":"Abstract This thesis investigates numerical differentiation methods based on orthogonal polynomials and applies the methods to fault detection and parameter estimation problems. Time-domain and frequency-domain analyses of the differentiators are provided. Tuning guidelines and real-time implementations are proposed.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"496 - 498"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46915226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}