Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622918
T. Shimanouchi, O. Toyoda, F. Nakazawa
A wireless motor condition precise analysis system that uses a highly efficient energy harvester is described in this paper. A continuation data sampling is required for the condition analysis of a motor. We developed the technology that makes a vibration energy harvester highly efficient and reduces the energy consumption of the whole system. A battery-less wireless analysis system was created in which the operation and life prediction of a motor was made possible. The original structure of the highly efficient energy harvester was developed using magnetic strain material rods. Electric power is generated using the coils around the rods when the rods are bent by external vibration. Therefore, the efficiency of the energy harvester is raised by optimizing the internal stress of the rods using buffer plates. The energy harvester has a resonant frequency of 90 Hz, a maximum electromotive force of 2.7 V, and a maximum power of 28 mW using 0.5-G acceleration. The wireless motor condition monitoring system includes the energy harvester, an end device, a coordinator, and a PC for data processing. The end device for the monitoring and data transfer is operated using only the electric power from the energy harvester. The monitoring information on the temperature, humidity, supplied voltage, and communication quality every three seconds and for the vibration waveform every five seconds is transmitted to the coordinators by the end device and handled by the PC. This enables for the condition monitoring and fault prediction of the motor.
{"title":"A wireless motor-condition, precise analysis system using a highly efficient vibration-energy harvester","authors":"T. Shimanouchi, O. Toyoda, F. Nakazawa","doi":"10.1109/INDIN.2013.6622918","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622918","url":null,"abstract":"A wireless motor condition precise analysis system that uses a highly efficient energy harvester is described in this paper. A continuation data sampling is required for the condition analysis of a motor. We developed the technology that makes a vibration energy harvester highly efficient and reduces the energy consumption of the whole system. A battery-less wireless analysis system was created in which the operation and life prediction of a motor was made possible. The original structure of the highly efficient energy harvester was developed using magnetic strain material rods. Electric power is generated using the coils around the rods when the rods are bent by external vibration. Therefore, the efficiency of the energy harvester is raised by optimizing the internal stress of the rods using buffer plates. The energy harvester has a resonant frequency of 90 Hz, a maximum electromotive force of 2.7 V, and a maximum power of 28 mW using 0.5-G acceleration. The wireless motor condition monitoring system includes the energy harvester, an end device, a coordinator, and a PC for data processing. The end device for the monitoring and data transfer is operated using only the electric power from the energy harvester. The monitoring information on the temperature, humidity, supplied voltage, and communication quality every three seconds and for the vibration waveform every five seconds is transmitted to the coordinators by the end device and handled by the PC. This enables for the condition monitoring and fault prediction of the motor.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"2 1","pages":"402-407"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74610727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622969
Ibéria Medeiros, N. Neves, M. Correia
Industry is using power meters to monitor the consumption of energy and achieving cost savings. This monitoring often involves energy metering software with a web interface. However, web applications often have vulnerabilities that can be exploited by cyber-attacks. We present an approach and a tool to solve this problem by analyzing the application source code and automatically inserting fixes to remove the discovered vulnerabilities. We demonstrate the use of the tool with two open source energy metering applications in which it found and corrected 17 vulnerabilities. By looking in more detail into some of these vulnerabilities, we argue that they are very serious, leading to the following impacts: violation of user privacy, counter the benefits of energy metering, and serve as entering points for attacks on other user software.
{"title":"Securing energy metering software with automatic source code correction","authors":"Ibéria Medeiros, N. Neves, M. Correia","doi":"10.1109/INDIN.2013.6622969","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622969","url":null,"abstract":"Industry is using power meters to monitor the consumption of energy and achieving cost savings. This monitoring often involves energy metering software with a web interface. However, web applications often have vulnerabilities that can be exploited by cyber-attacks. We present an approach and a tool to solve this problem by analyzing the application source code and automatically inserting fixes to remove the discovered vulnerabilities. We demonstrate the use of the tool with two open source energy metering applications in which it found and corrected 17 vulnerabilities. By looking in more detail into some of these vulnerabilities, we argue that they are very serious, leading to the following impacts: violation of user privacy, counter the benefits of energy metering, and serve as entering points for attacks on other user software.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"50 1","pages":"701-706"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79155098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622856
T. Koch, Matthias Breier, Wei Li
Electronic devices are nowadays an integral part of our everyday lives. The number of discarded electronical items has grown significantly over the last years. As the amount of precious materials used in the manufacturing of these devices has increased over the last years recycling of these devices is becoming more and more important. Currently the processes to regain some of these precious materials like gold, copper, scarce elements etc. do not differentiate much the input material composition. To enhance these processes as much information about the input material as possible is needed. Especially information used for the classification of the processed printed circuit boards (PCBs) is important as PCBs have been used extensively in electronic devices. One key aspect of this classification process is the acquisition of geometrical properties of the processed PCBs. In this paper employing laser triangulation to gain the height profile of PCBs is discussed. The basic principles of laser triangulation are introduced as well as several laser line detection algorithms. The variability of shapes of the components mounted on PCBs is limited. Due to this limitation the correction of geometrical distortions (called rise extension slope contraction (RESC)) resulting in a systematic error is feasible and discussed in this paper as well. Finally all algorithms presented are evaluated in a comprehensive testing environment and the results are shown in the end.
{"title":"Heightmap generation for printed circuit boards (PCB) using laser triangulation for pre-processing optimization in industrial recycling applications","authors":"T. Koch, Matthias Breier, Wei Li","doi":"10.1109/INDIN.2013.6622856","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622856","url":null,"abstract":"Electronic devices are nowadays an integral part of our everyday lives. The number of discarded electronical items has grown significantly over the last years. As the amount of precious materials used in the manufacturing of these devices has increased over the last years recycling of these devices is becoming more and more important. Currently the processes to regain some of these precious materials like gold, copper, scarce elements etc. do not differentiate much the input material composition. To enhance these processes as much information about the input material as possible is needed. Especially information used for the classification of the processed printed circuit boards (PCBs) is important as PCBs have been used extensively in electronic devices. One key aspect of this classification process is the acquisition of geometrical properties of the processed PCBs. In this paper employing laser triangulation to gain the height profile of PCBs is discussed. The basic principles of laser triangulation are introduced as well as several laser line detection algorithms. The variability of shapes of the components mounted on PCBs is limited. Due to this limitation the correction of geometrical distortions (called rise extension slope contraction (RESC)) resulting in a systematic error is feasible and discussed in this paper as well. Finally all algorithms presented are evaluated in a comprehensive testing environment and the results are shown in the end.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"123 1","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75673155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622921
P. Trivedi, B. Bandyopadhyay, S. K. Chaudhuri, Santosh K. Mahata
The robust stabilization of roll angle is considered in this paper. The roll dynamics is stable but it has large parametric variations and slow response behaviour. Here, a new method for sliding mode control is presented to robustly stabilize the roll angle within prescribed time. The dynamics of servo actuator and gyroscope sensors are also considered which makes the problem more realistic.
{"title":"Roll stabilization: A higher order sliding mode approach","authors":"P. Trivedi, B. Bandyopadhyay, S. K. Chaudhuri, Santosh K. Mahata","doi":"10.1109/INDIN.2013.6622921","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622921","url":null,"abstract":"The robust stabilization of roll angle is considered in this paper. The roll dynamics is stable but it has large parametric variations and slow response behaviour. Here, a new method for sliding mode control is presented to robustly stabilize the roll angle within prescribed time. The dynamics of servo actuator and gyroscope sensors are also considered which makes the problem more realistic.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"11 1","pages":"420-425"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72736014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622956
Tung-Linh Pham, Dong-Seong Kim
This paper proposes a routing algorithm that enhances a network lifetime and decreases an end-to-end latency for industrial wireless sensor networks (IWSNs) based on ISA100.11a standard. The proposed algorithm can be applied to large-scale networks where data is conveyed by multi-hop forwarding scheme from source nodes to the sink. By estimating a residual energy and a packet reception rate (PRR) of a next hop, data can be forwarded through the optimal path. Furthermore, the energy consumption and the network latency are minimized by using an integer linear programming (ILP). Simulation results show that the proposed algorithm is fully effective in terms of energy saving and network latency for IWSNs.
{"title":"Lossy link-aware routing algorithm for ISA100.11a wireless networks","authors":"Tung-Linh Pham, Dong-Seong Kim","doi":"10.1109/INDIN.2013.6622956","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622956","url":null,"abstract":"This paper proposes a routing algorithm that enhances a network lifetime and decreases an end-to-end latency for industrial wireless sensor networks (IWSNs) based on ISA100.11a standard. The proposed algorithm can be applied to large-scale networks where data is conveyed by multi-hop forwarding scheme from source nodes to the sink. By estimating a residual energy and a packet reception rate (PRR) of a next hop, data can be forwarded through the optimal path. Furthermore, the energy consumption and the network latency are minimized by using an integer linear programming (ILP). Simulation results show that the proposed algorithm is fully effective in terms of energy saving and network latency for IWSNs.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"140 1","pages":"624-629"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74694778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622940
S. Nimmagadda, H. Dreher, O. Shtukert, N. Zolotoi
Many sedimentary basins comprise of numerous oil and gas fields. Each field has multiple oil and gas producing wells and each drilled well has multiple reservoir pay zones, with each pay zone having different fluids - either oil or gas and both. From a sedimentary basin scale, a super-type dimension is distinguished into its atomic and non-divisible dimensions, such as reservoir and structure. In database terminology, cardinality is representative of the set of elements-, and attributes and their relationships. Here, each element is interpreted as a dimension, narration of multiple dimensions for multiple elements within the context of a petroleum ecosystem. Ontology based cardinalities are described for designing constraints and business rules among multidimensional data models, to maintain integrity and consistency of the cardinalities. For the purpose of analyzing petroleum ecosystem and its reservoir connectivity, ontologies based cardinalities are described. Though sedimentary-basin ontology narrates, connectivity among structures, reservoirs, seals, source and other processes, such as migration and timing of occurrence or existence of these elements, but we focus on an approach exploring connections among multiple reservoirs and traps within a petroleum ecosystem. This approach minimizes the ambiguity during interpretation and management of reservoir ecosystems' limits or boundaries.
{"title":"Multidimensional data warehousing and mining - An approach for managing multiple reservoir ecosystems","authors":"S. Nimmagadda, H. Dreher, O. Shtukert, N. Zolotoi","doi":"10.1109/INDIN.2013.6622940","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622940","url":null,"abstract":"Many sedimentary basins comprise of numerous oil and gas fields. Each field has multiple oil and gas producing wells and each drilled well has multiple reservoir pay zones, with each pay zone having different fluids - either oil or gas and both. From a sedimentary basin scale, a super-type dimension is distinguished into its atomic and non-divisible dimensions, such as reservoir and structure. In database terminology, cardinality is representative of the set of elements-, and attributes and their relationships. Here, each element is interpreted as a dimension, narration of multiple dimensions for multiple elements within the context of a petroleum ecosystem. Ontology based cardinalities are described for designing constraints and business rules among multidimensional data models, to maintain integrity and consistency of the cardinalities. For the purpose of analyzing petroleum ecosystem and its reservoir connectivity, ontologies based cardinalities are described. Though sedimentary-basin ontology narrates, connectivity among structures, reservoirs, seals, source and other processes, such as migration and timing of occurrence or existence of these elements, but we focus on an approach exploring connections among multiple reservoirs and traps within a petroleum ecosystem. This approach minimizes the ambiguity during interpretation and management of reservoir ecosystems' limits or boundaries.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"2 1","pages":"529-534"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74931195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622968
A. Hristova, S. Obermeier, Roman Schlegel
Industrial Automation and Control Systems (IACS) used in critical infrastructure typically perform their tasks using embedded devices. While the security of the embedded devices during the operation of the system is naturally the focus of security considerations, the security of the engineering framework is often overlooked. In this paper, we model the trust boundaries of a typical engineering tool used in an IACS, identify security risks in this context, suggest mitigation techniques for end users, and finally propose an architecture that allows to implement secure engineering frameworks.
{"title":"Secure design of engineering software tools in Industrial Automation and Control Systems","authors":"A. Hristova, S. Obermeier, Roman Schlegel","doi":"10.1109/INDIN.2013.6622968","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622968","url":null,"abstract":"Industrial Automation and Control Systems (IACS) used in critical infrastructure typically perform their tasks using embedded devices. While the security of the embedded devices during the operation of the system is naturally the focus of security considerations, the security of the engineering framework is often overlooked. In this paper, we model the trust boundaries of a typical engineering tool used in an IACS, identify security risks in this context, suggest mitigation techniques for end users, and finally propose an architecture that allows to implement secure engineering frameworks.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"51 1","pages":"695-700"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75068774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622863
Katsunori Sato, M. Samejima, N. Komoda
In order to save energy with preventing the lack of the resources on servers in data centers, we address the dynamic optimization of virtual machine placement. A decision problem of the virtual machine placement has been formulated as Bin Packing problem. Conventional methods repeat to solve the problem at regular intervals. Live migration is used for changing the virtual machine placement, but some of live migrations are unnecessary; the virtual machine is migrated repeatedly between the physical servers. For the purpose of reducing the unnecessary live migrations, we propose a dynamic optimization of virtual machine placement by resource usage prediction. The proposed method predicts the future resource usage by Auto Regressive Model. The proposed method decides the virtual machine placement by solving the Bin Packing problem with the predicted resource usage.
{"title":"Dynamic optimization of virtual machine placement by resource usage prediction","authors":"Katsunori Sato, M. Samejima, N. Komoda","doi":"10.1109/INDIN.2013.6622863","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622863","url":null,"abstract":"In order to save energy with preventing the lack of the resources on servers in data centers, we address the dynamic optimization of virtual machine placement. A decision problem of the virtual machine placement has been formulated as Bin Packing problem. Conventional methods repeat to solve the problem at regular intervals. Live migration is used for changing the virtual machine placement, but some of live migrations are unnecessary; the virtual machine is migrated repeatedly between the physical servers. For the purpose of reducing the unnecessary live migrations, we propose a dynamic optimization of virtual machine placement by resource usage prediction. The proposed method predicts the future resource usage by Auto Regressive Model. The proposed method decides the virtual machine placement by solving the Bin Packing problem with the predicted resource usage.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"37 1","pages":"86-91"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75100373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622898
S. Loughlin, J. McGrory
This paper outlines a novel method of classifying industrial assembly and packaging equipment and analyzes if mechatronics engineering is sufficient for the support of all of the equipment types throughout their complete lifecycle. It explains the requirement for a new equipment systems engineer role with an expanded number of subjects which integrates risk assessment, inspection systems and software validation functions, which must be applied to software centric equipment. The paper concludes by defining a skill set and expertise level, which should be incorporated into equipment systems engineer subjects to adequately support each of the equipment types. This refinement in skill set fundamentals is required in order to achieve optimum level of Overall Equipment Effectiveness (OEE).
{"title":"A method of classifying industrial assembly and packaging equipment","authors":"S. Loughlin, J. McGrory","doi":"10.1109/INDIN.2013.6622898","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622898","url":null,"abstract":"This paper outlines a novel method of classifying industrial assembly and packaging equipment and analyzes if mechatronics engineering is sufficient for the support of all of the equipment types throughout their complete lifecycle. It explains the requirement for a new equipment systems engineer role with an expanded number of subjects which integrates risk assessment, inspection systems and software validation functions, which must be applied to software centric equipment. The paper concludes by defining a skill set and expertise level, which should be incorporated into equipment systems engineer subjects to adequately support each of the equipment types. This refinement in skill set fundamentals is required in order to achieve optimum level of Overall Equipment Effectiveness (OEE).","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"21 1","pages":"293-298"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75116253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622939
Danijel Novakovic, C. Huemer
Business document standards usually cover a hierarchical structure of thousands of elements that may be relevant in any business context (any industry, any geopolitical region, etc.). In order to use a business document standard in a specific context, user groups define so-called implementation guidelines based on a subset consisting usually of 3 - 5% of the overall elements. When one defines a new implementation guideline for a specific context, one has always to start from scratch, which is time-consuming and also leads to heterogeneous interpretations of the standard. It is our goal to speed up the development process and to create more homogeneous implementation guidelines by learning from existing models. In the previous phases of our research we have developed the Enhanced Unified Context (E-UCM) model to represent business context. If we could assign instances of this model to already existing business document implementation guidelines, we may guess the subset of a new implementation guideline for a required BC. Accordingly, this paper describes our approach to calculate the content model (subset) of a message implementation guideline which is relevant in a required BC presented by the E-UCM context model.
{"title":"Business context sensitive business documents: Business context aware core components modeling using the E-UCM model","authors":"Danijel Novakovic, C. Huemer","doi":"10.1109/INDIN.2013.6622939","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622939","url":null,"abstract":"Business document standards usually cover a hierarchical structure of thousands of elements that may be relevant in any business context (any industry, any geopolitical region, etc.). In order to use a business document standard in a specific context, user groups define so-called implementation guidelines based on a subset consisting usually of 3 - 5% of the overall elements. When one defines a new implementation guideline for a specific context, one has always to start from scratch, which is time-consuming and also leads to heterogeneous interpretations of the standard. It is our goal to speed up the development process and to create more homogeneous implementation guidelines by learning from existing models. In the previous phases of our research we have developed the Enhanced Unified Context (E-UCM) model to represent business context. If we could assign instances of this model to already existing business document implementation guidelines, we may guess the subset of a new implementation guideline for a required BC. Accordingly, this paper describes our approach to calculate the content model (subset) of a message implementation guideline which is relevant in a required BC presented by the E-UCM context model.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"35 1","pages":"523-528"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81979567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}