Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247718
Tarik Terzimehic, M. Wenger, Alois Zoitl, Andreas Bayha, Klaus Becker, Thorsten Müller, Hubertus Schauerte
The fourth industrial revolution introduced additional requirements on the industrial systems' control software in order to cope with current manufacturing systems' flexibility demands. These requirements include, among others, a dynamic reconfigurability, software reusability and an external service orchestration. This work presents the design of an industry 4.0 compliant control software architecture resulting from an iterative design process. The architecture is based on the reconfiguration services of the IEC 61499 standard and the service orchestration via OPC UA. We demonstrate the software architecture's compliance to the industry 4.0 requirements on an aluminum cold rolling mill plant demonstrator.
{"title":"Towards an industry 4.0 compliant control software architecture using IEC 61499 & OPC UA","authors":"Tarik Terzimehic, M. Wenger, Alois Zoitl, Andreas Bayha, Klaus Becker, Thorsten Müller, Hubertus Schauerte","doi":"10.1109/ETFA.2017.8247718","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247718","url":null,"abstract":"The fourth industrial revolution introduced additional requirements on the industrial systems' control software in order to cope with current manufacturing systems' flexibility demands. These requirements include, among others, a dynamic reconfigurability, software reusability and an external service orchestration. This work presents the design of an industry 4.0 compliant control software architecture resulting from an iterative design process. The architecture is based on the reconfiguration services of the IEC 61499 standard and the service orchestration via OPC UA. We demonstrate the software architecture's compliance to the industry 4.0 requirements on an aluminum cold rolling mill plant demonstrator.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"88 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83832835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247611
D. B. D. Oliveira, R. S. Oliveira, T. Cucinotta, Luca Abeni
This paper presents a methodology to model and check the behavior of a part of the Linux kernel by applying automaton theory and in-kernel tracing from real execution. It is possible to check that the state transitions of the kernel during a real execution match with the allowed ones, according to the formal model. The scope of the paper is limited to the IRQ/NMI subsystem of the Linux kernel.
{"title":"Automata-based modeling of interrupts in the Linux PREEMPT RT kernel","authors":"D. B. D. Oliveira, R. S. Oliveira, T. Cucinotta, Luca Abeni","doi":"10.1109/ETFA.2017.8247611","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247611","url":null,"abstract":"This paper presents a methodology to model and check the behavior of a part of the Linux kernel by applying automaton theory and in-kernel tracing from real execution. It is possible to check that the state transitions of the kernel during a real execution match with the allowed ones, according to the formal model. The scope of the paper is limited to the IRQ/NMI subsystem of the Linux kernel.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86087539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247637
R. ChandrikaK., J. Amudha, S. Sudarsan
Source code review is a core activity in software engineering where a reviewer examines the code with the intention of finding bugs in the program. A lot of research has been carried out in understanding how software engineers perform code comprehension; however contribution of eye tracking traits seems to have not been addressed. This paper outlines a study conducted in an industrial environment of software engineers. It focused on understanding the visual attention of subjects with programming skills and subjects without programming skills and recognize the eye tracking traits required for source code review. The results indicate a significant difference in gaze behaviors of these groups. The key aspects of subjects with programming skills while source code review are required to have certain eye tracking traits like better code coverage, attention span on error lines and comments.
{"title":"Recognizing eye tracking traits for source code review","authors":"R. ChandrikaK., J. Amudha, S. Sudarsan","doi":"10.1109/ETFA.2017.8247637","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247637","url":null,"abstract":"Source code review is a core activity in software engineering where a reviewer examines the code with the intention of finding bugs in the program. A lot of research has been carried out in understanding how software engineers perform code comprehension; however contribution of eye tracking traits seems to have not been addressed. This paper outlines a study conducted in an industrial environment of software engineers. It focused on understanding the visual attention of subjects with programming skills and subjects without programming skills and recognize the eye tracking traits required for source code review. The results indicate a significant difference in gaze behaviors of these groups. The key aspects of subjects with programming skills while source code review are required to have certain eye tracking traits like better code coverage, attention span on error lines and comments.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"63 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76501326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247640
Junhong Zhou, C. Pang, Weili Yan
Fault diagnosis plays an important role to improve maintenance efficiency. The industry faces the challenges to collect history data that include all type of failures. To overcome the limitation of conventional diagnosis approaches, which misclassify new types of faults into existing categories from training, the unsupervised Gaussian mixture model (GMM) and the semi-supervised GMM diagnosis frameworks are presented in this paper for effective detection on new fault categories. For the unsupervised GMM framework, the component number is known and the hard assignment is applied to classify the new types of faults. For the semi-supervised GMM framework, the component number can be auto selected, and the soft assignment is able to first detect whether new types of faults occur and further categorize them in detail via the GMM update. The effectiveness of the two fault diagnosis frameworks is testified on an industrial fault simulator of rotary machine. Compared with existing hard clustering approaches, the semi-supervised GMM framework is able to achieve an average diagnosis accuracy of 99.3% without new fault categories and it can also classify new fault categories with diagnosis accuracy of 94.0%.
{"title":"Gaussian mixture model for new fault categories diagnosis","authors":"Junhong Zhou, C. Pang, Weili Yan","doi":"10.1109/ETFA.2017.8247640","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247640","url":null,"abstract":"Fault diagnosis plays an important role to improve maintenance efficiency. The industry faces the challenges to collect history data that include all type of failures. To overcome the limitation of conventional diagnosis approaches, which misclassify new types of faults into existing categories from training, the unsupervised Gaussian mixture model (GMM) and the semi-supervised GMM diagnosis frameworks are presented in this paper for effective detection on new fault categories. For the unsupervised GMM framework, the component number is known and the hard assignment is applied to classify the new types of faults. For the semi-supervised GMM framework, the component number can be auto selected, and the soft assignment is able to first detect whether new types of faults occur and further categorize them in detail via the GMM update. The effectiveness of the two fault diagnosis frameworks is testified on an industrial fault simulator of rotary machine. Compared with existing hard clustering approaches, the semi-supervised GMM framework is able to achieve an average diagnosis accuracy of 99.3% without new fault categories and it can also classify new fault categories with diagnosis accuracy of 94.0%.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74507830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247676
N. Papakonstantinou, B. O’Halloran
Modern critical infrastructure systems have grown to be increasingly complex. Among the many reliability and system safety (RSS) characteristics of the system, failure propagation is critical to understand. Understanding failure propagations can significantly reduce the system's risk since corrective design actions can be taken early on. Beyond traditional RSS methods, some are centered on failure propagation including fault tree analysis (FTA), the BowTie method, fishbone diagrams, etc. The BowTie analysis is a method for assessing the prevention and recovery attributes of a complex safety-critical system. The proposed methodology in this paper addresses the prevention aspect of the BowTie analysis. Specifically, we proposed a method based on physics-based multidisciplinary model to accurately simulate the failure propagation of the system. The failure propagation paths are developed naturally by the simulation model and are therefore more complete. The novelty of such an approach is that practitioners do not need to predict the paths. The methodology is demonstrated using a case study of a three tank system with one critical function. The case study results show that the proposed method can successfully identify failure propagation from “causes” to “hazards” and its multidisciplinary nature helps capturing paths that cross system disciplines (such as propagation through the environment).
{"title":"A dynamic failure propagation methodology supporting the risk assessment of multidisciplinary systems","authors":"N. Papakonstantinou, B. O’Halloran","doi":"10.1109/ETFA.2017.8247676","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247676","url":null,"abstract":"Modern critical infrastructure systems have grown to be increasingly complex. Among the many reliability and system safety (RSS) characteristics of the system, failure propagation is critical to understand. Understanding failure propagations can significantly reduce the system's risk since corrective design actions can be taken early on. Beyond traditional RSS methods, some are centered on failure propagation including fault tree analysis (FTA), the BowTie method, fishbone diagrams, etc. The BowTie analysis is a method for assessing the prevention and recovery attributes of a complex safety-critical system. The proposed methodology in this paper addresses the prevention aspect of the BowTie analysis. Specifically, we proposed a method based on physics-based multidisciplinary model to accurately simulate the failure propagation of the system. The failure propagation paths are developed naturally by the simulation model and are therefore more complete. The novelty of such an approach is that practitioners do not need to predict the paths. The methodology is demonstrated using a case study of a three tank system with one critical function. The case study results show that the proposed method can successfully identify failure propagation from “causes” to “hazards” and its multidisciplinary nature helps capturing paths that cross system disciplines (such as propagation through the environment).","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"64 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75636183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247652
Ilya Kovalenko, K. Barton, D. Tilbury
Present-day manufacturing companies encounter a variety of challenges due to the dynamically changing industrial environment. Current control frameworks lack the adaptability and flexibility to effectively deal with challenges such as broken-down machines or altered customer orders. Multi-agent control has been proposed to improve the performance of manufacturing systems in uncertain or dynamic environments. Some multiagent architectures have been introduced with promising results. A key component of these architectures is the product agent, which is responsible for guiding a physical part through the manufacturing system based on the production requirements of the part. Even though the product agent has been previously used in multi-agent frameworks, a well-defined internal architecture for this agent has yet to be proposed. This work specifies a product agent architecture that can be utilized in multi-agent systems. The proposed architecture is tested using a manufacturing system simulation. The simulation results showcase the reactivity, proactiveness, and autonomy of the proposed product agent.
{"title":"Design and implementation of an intelligent product agent architecture in manufacturing systems","authors":"Ilya Kovalenko, K. Barton, D. Tilbury","doi":"10.1109/ETFA.2017.8247652","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247652","url":null,"abstract":"Present-day manufacturing companies encounter a variety of challenges due to the dynamically changing industrial environment. Current control frameworks lack the adaptability and flexibility to effectively deal with challenges such as broken-down machines or altered customer orders. Multi-agent control has been proposed to improve the performance of manufacturing systems in uncertain or dynamic environments. Some multiagent architectures have been introduced with promising results. A key component of these architectures is the product agent, which is responsible for guiding a physical part through the manufacturing system based on the production requirements of the part. Even though the product agent has been previously used in multi-agent frameworks, a well-defined internal architecture for this agent has yet to be proposed. This work specifies a product agent architecture that can be utilized in multi-agent systems. The proposed architecture is tested using a manufacturing system simulation. The simulation results showcase the reactivity, proactiveness, and autonomy of the proposed product agent.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"19 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74999627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247750
Stephan Seidel, M. Franke, F. Baumann, H. Wilson, Ulrike Gromnitza
In many industrial manufacturing processes energy use is one of the most important cost factors. Especially in energy-intensive industries like steel production or glass processing minimizing energy use is a key measure to save resources and reduce manufacturing costs. The research project OptPlanEnergie concentrates on the production of tempered glass. In this project we apply simulation and optimization techniques to identify and reduce energetic losses that occur during the fabrication process. The aim of the project is to supply a toolchain for creating high-performance simulation models of crucial production steps and integrating these models in scheduling frameworks to facilitate the optimization of loading sequences and capacity allocation to reduce energy consumption. In OptPlanEnergie we prototypically study the production of tempered glass, but our approach allows a simple adaptation to a wide range of industries.
{"title":"Enhancing the energy-efficient production of tempered glass by using simulation-based optimisation","authors":"Stephan Seidel, M. Franke, F. Baumann, H. Wilson, Ulrike Gromnitza","doi":"10.1109/ETFA.2017.8247750","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247750","url":null,"abstract":"In many industrial manufacturing processes energy use is one of the most important cost factors. Especially in energy-intensive industries like steel production or glass processing minimizing energy use is a key measure to save resources and reduce manufacturing costs. The research project OptPlanEnergie concentrates on the production of tempered glass. In this project we apply simulation and optimization techniques to identify and reduce energetic losses that occur during the fabrication process. The aim of the project is to supply a toolchain for creating high-performance simulation models of crucial production steps and integrating these models in scheduling frameworks to facilitate the optimization of loading sequences and capacity allocation to reduce energy consumption. In OptPlanEnergie we prototypically study the production of tempered glass, but our approach allows a simple adaptation to a wide range of industries.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"71 1-3 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77936554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247636
Thomas Ulz, Thomas W. Pieber, C. Steger, R. Matischek, H. Bock
The importance of Networked Control Systems (NCS) is steadily increasing due to recent trends such as smart factories. Correct functionality of such NCS needs to be protected as malfunctioning systems could have severe consequences for the controlled process or even threaten human lives. However, with the increase in NCS, also attacks targeting these systems are becoming more frequent. To mitigate attacks that utilize captured sensor data in an NCS, transferred data needs to be protected. While using well-known methods such as Transport Layer Security (TLS) might be suitable to protect the data, resource constraint devices such as sensors often are not powerful enough to perform the necessary cryptographic operations. Also, as we will show in this paper, applying simple encryption in an NCS may enable easy Denial-of-Service (DoS) attacks by attacking single bits of the encrypted data. Therefore, in this paper, we present a hardware-based approach that enables sensors to perform the necessary encryption while being robust against (injected) bit failures.
{"title":"Towards trustworthy data in networked control systems: A hardware-based approach","authors":"Thomas Ulz, Thomas W. Pieber, C. Steger, R. Matischek, H. Bock","doi":"10.1109/ETFA.2017.8247636","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247636","url":null,"abstract":"The importance of Networked Control Systems (NCS) is steadily increasing due to recent trends such as smart factories. Correct functionality of such NCS needs to be protected as malfunctioning systems could have severe consequences for the controlled process or even threaten human lives. However, with the increase in NCS, also attacks targeting these systems are becoming more frequent. To mitigate attacks that utilize captured sensor data in an NCS, transferred data needs to be protected. While using well-known methods such as Transport Layer Security (TLS) might be suitable to protect the data, resource constraint devices such as sensors often are not powerful enough to perform the necessary cryptographic operations. Also, as we will show in this paper, applying simple encryption in an NCS may enable easy Denial-of-Service (DoS) attacks by attacking single bits of the encrypted data. Therefore, in this paper, we present a hardware-based approach that enables sensors to perform the necessary encryption while being robust against (injected) bit failures.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"41 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78100993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247677
Evagoras Makridis, K. M. Deliparaschos, Evangelia Kalyvianaki, Themistoklis Charalambous
Virtualized servers have been the key for the efficient deployment of cloud applications. As the application demand increases, it is important to dynamically adjust the CPU allocation of each component in order to save resources for other applications and keep performance high, e.g., the client mean response time (mRT) should be kept below a Quality of Service (QoS) target. In this work, a new form of Kalman filter, called the Maximum Correntropy Criterion Kalman Filter (MCC-KF), has been used in order to predict, and hence, adjust the CPU allocations of each component while the RUBiS auction site workload changes randomly as the number of clients varies. MCC-KF has shown high performance when the noise is non-Gaussian, as it is the case in the CPU usage. Numerical evaluations compare our designed framework with other current state-of-the-art using real-data via the RUBiS benchmark website deployed on a prototype Xen-virtualized cluster.
{"title":"Dynamic CPU resource provisioning in virtualized servers using maximum correntropy criterion Kalman filters","authors":"Evagoras Makridis, K. M. Deliparaschos, Evangelia Kalyvianaki, Themistoklis Charalambous","doi":"10.1109/ETFA.2017.8247677","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247677","url":null,"abstract":"Virtualized servers have been the key for the efficient deployment of cloud applications. As the application demand increases, it is important to dynamically adjust the CPU allocation of each component in order to save resources for other applications and keep performance high, e.g., the client mean response time (mRT) should be kept below a Quality of Service (QoS) target. In this work, a new form of Kalman filter, called the Maximum Correntropy Criterion Kalman Filter (MCC-KF), has been used in order to predict, and hence, adjust the CPU allocations of each component while the RUBiS auction site workload changes randomly as the number of clients varies. MCC-KF has shown high performance when the noise is non-Gaussian, as it is the case in the CPU usage. Numerical evaluations compare our designed framework with other current state-of-the-art using real-data via the RUBiS benchmark website deployed on a prototype Xen-virtualized cluster.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"151 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76831961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ETFA.2017.8247765
Thomas Bigler, A. Treytl, C. Kienmayer
Within this paper a novel approach for localization of roaming nodes is presented that uses static directional antennas at the receiver side to measure the received signal strength (RSS). In contrast to omni-directional antennas it is not possible to formulate an analytical relationship of distance to received signal power. The characteristics as well as benefits and challenges of directional antennas are analysed and a concept for an iterative approach is presented that uses a stored antenna pattern to estimate the transmitter position. Finally, a Bluetooth based measurement setup is presented, that will be used for the upcoming validation of the proposed algorithm.
{"title":"Increasing localization robustness using directional antennas","authors":"Thomas Bigler, A. Treytl, C. Kienmayer","doi":"10.1109/ETFA.2017.8247765","DOIUrl":"https://doi.org/10.1109/ETFA.2017.8247765","url":null,"abstract":"Within this paper a novel approach for localization of roaming nodes is presented that uses static directional antennas at the receiver side to measure the received signal strength (RSS). In contrast to omni-directional antennas it is not possible to formulate an analytical relationship of distance to received signal power. The characteristics as well as benefits and challenges of directional antennas are analysed and a concept for an iterative approach is presented that uses a stored antenna pattern to estimate the transmitter position. Finally, a Bluetooth based measurement setup is presented, that will be used for the upcoming validation of the proposed algorithm.","PeriodicalId":6522,"journal":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"9 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77622306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}