Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869477
Caezarina Marie Calimbahin, S. Pancho-Festin, J. Pedrasa
Ensuring data integrity is one of the critical needs in cyber-physical systems (CPS). An integrity breach in a CPS can drive the underlying controlled physical process into undesired operating conditions. To evaluate CPS security against malicious entities, attacker models are often employed. In this work, our objective is to incorporate domain-knowledge in modeling attacks in building automation systems (BAS). Specifically, we modify the general sensor integrity attack model based on targeted attacks. We use the model to formulate different attacker types, including a powerful attacker who becomes stealthier as the number of captured node increases. We simulate the attacks by injecting corruption on real-world data obtained from a retrofitted BAS testbed for air conditioning (AC) control. Results show that the vulnerabilities of an underlying system can be explored by leveraging on domain-based attack testing.
{"title":"Domain-based Attack Models in Building Automation Systems","authors":"Caezarina Marie Calimbahin, S. Pancho-Festin, J. Pedrasa","doi":"10.1109/ETFA.2019.8869477","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869477","url":null,"abstract":"Ensuring data integrity is one of the critical needs in cyber-physical systems (CPS). An integrity breach in a CPS can drive the underlying controlled physical process into undesired operating conditions. To evaluate CPS security against malicious entities, attacker models are often employed. In this work, our objective is to incorporate domain-knowledge in modeling attacks in building automation systems (BAS). Specifically, we modify the general sensor integrity attack model based on targeted attacks. We use the model to formulate different attacker types, including a powerful attacker who becomes stealthier as the number of captured node increases. We simulate the attacks by injecting corruption on real-world data obtained from a retrofitted BAS testbed for air conditioning (AC) control. Results show that the vulnerabilities of an underlying system can be explored by leveraging on domain-based attack testing.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"370 1","pages":"1752-1758"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83929536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869034
Claudia Cervantes-Jilaja, Liz Bernedo-Flores, Elizabeth Morales-Muñoz, R. E. Patiño-Escarcina, D. Barrios-Aranibar, Roger Ripas-Mamani, H. H. Álvarez-Valera
In the agro-industry automation, computer vision has become very important to the product selection and classification process. The problem becomes more challenging when it is necessary to detect defects or diseases in the product images. In literature, it was observed that when the fruit or vegetable image is treated as only one problem, efficiency is lower than when dividing it into sub-problems considering regions with similar appearance. Thus, in this paper, the target is to automate the detection and identification of visual defects in Brazil nuts by dividing the problem into two sub-problems (pulp and epidermis defects recognition) and by using color, shape and texture descriptors. First, the original image is segmented into two regions (one dark and one light). Then, First Order Descriptor, is applied to detect the presence or absence of defects in each region through the texture descriptor. Next, color, size and texture descriptors are used to the identification of each defect. This approach improves results obtained in previous research (Álvarez-Valera et al. [1]). We obtained an efficiency rate of 98.03 % with a processing time of 75 ms at worst and 51 at the best for every 3 images processed, unlike the previous attempt that had an efficiency rate of 91.79 % with a processing time of 130 ms. Finally, this approach can be applied in different types of products with other characteristics, since its inherent characteristics allows us to divide the original problem in two or more sub-problems.
在农业工业自动化中,计算机视觉在产品选择和分类过程中已经变得非常重要。当需要检测产品图像中的缺陷或疾病时,问题变得更具挑战性。在文献中观察到,当水果或蔬菜图像仅作为一个问题处理时,效率低于考虑具有相似外观的区域将其划分为子问题。因此,本文的目标是通过将巴西坚果视觉缺陷问题分为果肉和表皮缺陷识别两个子问题,并使用颜色、形状和纹理描述符,实现巴西坚果视觉缺陷的自动检测和识别。首先,将原始图像分割成两个区域(一个暗区和一个亮区)。然后,利用一阶描述符,通过纹理描述符检测每个区域是否存在缺陷。接下来,使用颜色、大小和纹理描述符来识别每个缺陷。该方法改进了先前研究的结果(Álvarez-Valera et al.[1])。我们获得了98.03%的效率,最坏的处理时间为75毫秒,最好的处理时间为51毫秒,每处理3张图像,不像以前的尝试,效率为91.79%,处理时间为130毫秒。最后,这种方法可以应用于具有其他特征的不同类型的产品,因为它的固有特征允许我们将原始问题划分为两个或多个子问题。
{"title":"Optimal Selection and Identification of Defects in Chestnuts Processing, through Computer Vision, Taking Advantage of its Inherent Characteristics","authors":"Claudia Cervantes-Jilaja, Liz Bernedo-Flores, Elizabeth Morales-Muñoz, R. E. Patiño-Escarcina, D. Barrios-Aranibar, Roger Ripas-Mamani, H. H. Álvarez-Valera","doi":"10.1109/ETFA.2019.8869034","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869034","url":null,"abstract":"In the agro-industry automation, computer vision has become very important to the product selection and classification process. The problem becomes more challenging when it is necessary to detect defects or diseases in the product images. In literature, it was observed that when the fruit or vegetable image is treated as only one problem, efficiency is lower than when dividing it into sub-problems considering regions with similar appearance. Thus, in this paper, the target is to automate the detection and identification of visual defects in Brazil nuts by dividing the problem into two sub-problems (pulp and epidermis defects recognition) and by using color, shape and texture descriptors. First, the original image is segmented into two regions (one dark and one light). Then, First Order Descriptor, is applied to detect the presence or absence of defects in each region through the texture descriptor. Next, color, size and texture descriptors are used to the identification of each defect. This approach improves results obtained in previous research (Álvarez-Valera et al. [1]). We obtained an efficiency rate of 98.03 % with a processing time of 75 ms at worst and 51 at the best for every 3 images processed, unlike the previous attempt that had an efficiency rate of 91.79 % with a processing time of 130 ms. Finally, this approach can be applied in different types of products with other characteristics, since its inherent characteristics allows us to divide the original problem in two or more sub-problems.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"54 1","pages":"513-520"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86181975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8868967
M. Tarkowski, Mateusz Burtowy, M. Rzymowski, K. Nyka, M. Groth, L. Kulas
In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using low-profile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength (RSS) values recorded at the antenna output port for different directional radiation patterns produced by the antenna steering circuit, the algorithm is well-suited for IoT nodes based on inexpensive radio transceivers. Measurement results indicate that, although the antenna can provide 8 unique main beam directions, SVM-based DoA of unknown incoming signals can successfully be estimated with good accuracy in a fast way using limited number of radiation patterns. Consequently, such an approach can be used in efficient location-based security methods in Industrial Internet of Things (IIoT) applications.
{"title":"Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach","authors":"M. Tarkowski, Mateusz Burtowy, M. Rzymowski, K. Nyka, M. Groth, L. Kulas","doi":"10.1109/ETFA.2019.8868967","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8868967","url":null,"abstract":"In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using low-profile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength (RSS) values recorded at the antenna output port for different directional radiation patterns produced by the antenna steering circuit, the algorithm is well-suited for IoT nodes based on inexpensive radio transceivers. Measurement results indicate that, although the antenna can provide 8 unique main beam directions, SVM-based DoA of unknown incoming signals can successfully be estimated with good accuracy in a fast way using limited number of radiation patterns. Consequently, such an approach can be used in efficient location-based security methods in Industrial Internet of Things (IIoT) applications.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"39 1","pages":"1759-1763"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86118265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869268
Sebastian R. Bader, Irlán Grangel-González, Mayesha Tasnim, S. Lohmann
The industry and research efforts to standardize Industry 4.0 related developments have merged into an unmanageable amount of reference models, architectures and specification activities. As these efforts have only been roughly coordinated, am incomprehensible and confusing landscape occurred. These developments contradict the initial need for more clarity and structure, especially as many different aspects are framed under the same terminology.We contribute to this challenge by providing a structured overview of the current state of standardization. We create a graphical landscape of Industry 4.0 specifications and standards based on an integrated knowledge graph. Various views provide different illustrations for several information needs. Explicitly stated relations between Industry 4.0 frameworks and technical standards enable the flexible discovery of related information. In addition, we use machine inference techniques to add new links and to further extend the knowledge graph.
{"title":"Structuring the Industry 4.0 Landscape","authors":"Sebastian R. Bader, Irlán Grangel-González, Mayesha Tasnim, S. Lohmann","doi":"10.1109/ETFA.2019.8869268","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869268","url":null,"abstract":"The industry and research efforts to standardize Industry 4.0 related developments have merged into an unmanageable amount of reference models, architectures and specification activities. As these efforts have only been roughly coordinated, am incomprehensible and confusing landscape occurred. These developments contradict the initial need for more clarity and structure, especially as many different aspects are framed under the same terminology.We contribute to this challenge by providing a structured overview of the current state of standardization. We create a graphical landscape of Industry 4.0 specifications and standards based on an integrated knowledge graph. Various views provide different illustrations for several information needs. Explicitly stated relations between Industry 4.0 frameworks and technical standards enable the flexible discovery of related information. In addition, we use machine inference techniques to add new links and to further extend the knowledge graph.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"277 1","pages":"224-231"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86169318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869365
A. Finzi, Silviu S. Craciunas
In mixed-criticality Ethernet-based time-triggered networks, like TTEthernet, time-triggered communication (TT) coexists with rate-constrained (RC) and best-effort (BE) traffic. A global communication scheme, i.e., a schedule, establishes contention-free transmission times for TT flows ensuring guaranteed low latency and minimal jitter. Current approaches use Satisfiability Modulo Theories (SMT) to formulate the scheduling constraints and solve the resulting problem. However, these approaches do not take into consideration the impact of the TT schedule on RC traffic. Hence, the resulting TT schedule may cause the worst-case latency requirements of RC traffic not to be fulfilled anymore.In this paper, we present a novel method for including an RC analysis in state-of-the-art SMT-based schedule synthesis algorithms via a feedback loop in order to maintain the optimality properties of the SMT-based approaches while also being able to improve the RC traffic delays. Our method is designed in such a way that it can be readily integrated into existing SMT- or MiP-based solutions. We evaluate our approach using variants derived from a realistic use-case and present methods to further improve the efficiency of our feedback-based approach.
{"title":"Integration of SMT-based Scheduling with RC Network Calculus Analysis in TTEthernet Networks","authors":"A. Finzi, Silviu S. Craciunas","doi":"10.1109/ETFA.2019.8869365","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869365","url":null,"abstract":"In mixed-criticality Ethernet-based time-triggered networks, like TTEthernet, time-triggered communication (TT) coexists with rate-constrained (RC) and best-effort (BE) traffic. A global communication scheme, i.e., a schedule, establishes contention-free transmission times for TT flows ensuring guaranteed low latency and minimal jitter. Current approaches use Satisfiability Modulo Theories (SMT) to formulate the scheduling constraints and solve the resulting problem. However, these approaches do not take into consideration the impact of the TT schedule on RC traffic. Hence, the resulting TT schedule may cause the worst-case latency requirements of RC traffic not to be fulfilled anymore.In this paper, we present a novel method for including an RC analysis in state-of-the-art SMT-based schedule synthesis algorithms via a feedback loop in order to maintain the optimality properties of the SMT-based approaches while also being able to improve the RC traffic delays. Our method is designed in such a way that it can be readily integrated into existing SMT- or MiP-based solutions. We evaluate our approach using variants derived from a realistic use-case and present methods to further improve the efficiency of our feedback-based approach.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"10 1","pages":"192-199"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77125290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869458
Alejandro Mora, Edmundo Guerra, M. Manzanares, A. Grau-Saldes
One of the most critical issues that arises when controlling a robot is the necessity to locate itself in the environment. Ranging from industrial processes applications to outdoor mobile robots, landmarks are used to such purpose: by recognizing them, the robots are able to know where they are with the aid of computer vision. Fiducial markers are the cheapest and one of the most common solutions to this issue: 2D planar patterns that embed some information that can be identified using artificial vision techniques. Many different typologies of markers as well as image processing algorithms are being implemented nowadays, using C++ / Python / MATLAB® libraries and ROS as middleware. In this work we have evaluated the robustness of various fiducial marker typologies, documenting the main technical aspects of the used implementations and commenting how each algorithm operates. Aggregated results are presented and discussed, evaluating the different implementations tested.
{"title":"Towards robust 6-DoF detection in uncontrolled lightning enviroments","authors":"Alejandro Mora, Edmundo Guerra, M. Manzanares, A. Grau-Saldes","doi":"10.1109/ETFA.2019.8869458","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869458","url":null,"abstract":"One of the most critical issues that arises when controlling a robot is the necessity to locate itself in the environment. Ranging from industrial processes applications to outdoor mobile robots, landmarks are used to such purpose: by recognizing them, the robots are able to know where they are with the aid of computer vision. Fiducial markers are the cheapest and one of the most common solutions to this issue: 2D planar patterns that embed some information that can be identified using artificial vision techniques. Many different typologies of markers as well as image processing algorithms are being implemented nowadays, using C++ / Python / MATLAB® libraries and ROS as middleware. In this work we have evaluated the robustness of various fiducial marker typologies, documenting the main technical aspects of the used implementations and commenting how each algorithm operates. Aggregated results are presented and discussed, evaluating the different implementations tested.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"118 1","pages":"1607-1611"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77383425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869096
Enrique Hernández-Murillo, Rosario Aragues, G. López-Nicolás
Building the 3D model of an object is a complex problem that involves aspects such as modeling, control, perception or planning. Performing this task requires a set of different views to cover the entire surface of the object. Since a single camera takes too long to travel through all these positions, we consider a multi-camera scenario. Due to the camera constraints such as the limited field of view or self occlusions, it is essential to use an effective configuration strategy to select the appropriate views that provide more information of the model. In this paper, we develop a multi-camera architecture built on the Robot Operating System. The advantages of the proposed architecture are illustrated with a formation-based algorithm to compute the view that satisfies these constraints for each robot of the formation to obtain the volumetric reconstruction of the target object.
{"title":"Multi-camera architecture for perception strategies","authors":"Enrique Hernández-Murillo, Rosario Aragues, G. López-Nicolás","doi":"10.1109/ETFA.2019.8869096","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869096","url":null,"abstract":"Building the 3D model of an object is a complex problem that involves aspects such as modeling, control, perception or planning. Performing this task requires a set of different views to cover the entire surface of the object. Since a single camera takes too long to travel through all these positions, we consider a multi-camera scenario. Due to the camera constraints such as the limited field of view or self occlusions, it is essential to use an effective configuration strategy to select the appropriate views that provide more information of the model. In this paper, we develop a multi-camera architecture built on the Robot Operating System. The advantages of the proposed architecture are illustrated with a formation-based algorithm to compute the view that satisfies these constraints for each robot of the formation to obtain the volumetric reconstruction of the target object.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"59 1","pages":"1799-1804"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91416965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8868950
M. Indri, C. Possieri, Fiorella Sibona, Pangcheng David Cen Cheng, V. D. Hoang
The presence of mobile agents in the industrial environment is growing, introducing specific safety issues in their path planning. This paper proposes the implementation of a three-level path planning procedure, which allows: (i) the imposition of a set of waypoints, tending to a safe path, generated by a supervisory planner on the basis of a static map of the environment (not necessarily fully updated), (ii) the generation of a global path including such waypoints exploiting a cost-based algorithm, taking into account also the obstacles not included in the static map, but detected at the beginning of the global planning phase, and (iii) the avoidance of dynamic obstacles appearing during the robot motion, thanks to the action of a local planner. The procedure has been experimentally tested to plan the motion of a differential mobile robot.
{"title":"Supervised global path planning for mobile robots with obstacle avoidance","authors":"M. Indri, C. Possieri, Fiorella Sibona, Pangcheng David Cen Cheng, V. D. Hoang","doi":"10.1109/ETFA.2019.8868950","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8868950","url":null,"abstract":"The presence of mobile agents in the industrial environment is growing, introducing specific safety issues in their path planning. This paper proposes the implementation of a three-level path planning procedure, which allows: (i) the imposition of a set of waypoints, tending to a safe path, generated by a supervisory planner on the basis of a static map of the environment (not necessarily fully updated), (ii) the generation of a global path including such waypoints exploiting a cost-based algorithm, taking into account also the obstacles not included in the static map, but detected at the beginning of the global planning phase, and (iii) the avoidance of dynamic obstacles appearing during the robot motion, thanks to the action of a local planner. The procedure has been experimentally tested to plan the motion of a differential mobile robot.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"62 1","pages":"601-608"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91356097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869440
Christoph-Alexander Holst, V. Lohweg, Kristian Röckemann, A. Steinmetz
On-site aircraft repairs are gaining in importance due to the susceptibility of carbon fibre reinforced polymers to damage. Repairs themselves are required to be inspected for quality, preferably cost- and time-efficiently. This paper presents an approach for the inspection of repaired composites based on guided Lamb waves. The focus is on cost-effective signal excitation and effective signal processing. Lamb waves are excited with piezoelectric transducers at the resonance frequency of the material under test. Measured signals are processed with a complex wavelet transform to improve damage detection. The proposed approach is evaluated on two test specimens, one of which has a defect in the adhesive bond.
{"title":"Lamb Wave-based Quality Inspection of Repaired Carbon Fibre Reinforced Polymers for On-Site Aircraft Maintenance","authors":"Christoph-Alexander Holst, V. Lohweg, Kristian Röckemann, A. Steinmetz","doi":"10.1109/ETFA.2019.8869440","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869440","url":null,"abstract":"On-site aircraft repairs are gaining in importance due to the susceptibility of carbon fibre reinforced polymers to damage. Repairs themselves are required to be inspected for quality, preferably cost- and time-efficiently. This paper presents an approach for the inspection of repaired composites based on guided Lamb waves. The focus is on cost-effective signal excitation and effective signal processing. Lamb waves are excited with piezoelectric transducers at the resonance frequency of the material under test. Measured signals are processed with a complex wavelet transform to improve damage detection. The proposed approach is evaluated on two test specimens, one of which has a defect in the adhesive bond.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"1 1","pages":"1643-1646"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87171513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ETFA.2019.8869302
Daniel Rivas, L. Ribas-Xirgo
Transportation to solve intralogistics is becoming as complex as managing transportation in road logistics. Luckily, it takes place in structured environments where automation is easier. This work is about solving the task assignment problem for a group of automated guided vehicles (AGVs) serving the internal transport of a warehouse or factory. Instead of having a centralized task planner, we use an agent-based approach where agents represent all the stakeholders in the transport system. Namely, the clients are the transport orders and the taxis, the AGVs. We have modeled client and taxi behaviors by using extended finite-state stack machines (EFS2Ms) because they enable both modeling belief-desire-intention (BDI) agents and lower-level controllers. As a result, agent software is produced in a systematic way and, what is more, analyses of different working conditions can be done to fine-tune parameters of the models to achieve an efficient transportation. Results on one realistic study-case show that average service times can be shortened with respect to fixed planning and that this system can operate in legacy systems.
{"title":"Agent-based Model for Transport Order Assignment in AGV Systems","authors":"Daniel Rivas, L. Ribas-Xirgo","doi":"10.1109/ETFA.2019.8869302","DOIUrl":"https://doi.org/10.1109/ETFA.2019.8869302","url":null,"abstract":"Transportation to solve intralogistics is becoming as complex as managing transportation in road logistics. Luckily, it takes place in structured environments where automation is easier. This work is about solving the task assignment problem for a group of automated guided vehicles (AGVs) serving the internal transport of a warehouse or factory. Instead of having a centralized task planner, we use an agent-based approach where agents represent all the stakeholders in the transport system. Namely, the clients are the transport orders and the taxis, the AGVs. We have modeled client and taxi behaviors by using extended finite-state stack machines (EFS2Ms) because they enable both modeling belief-desire-intention (BDI) agents and lower-level controllers. As a result, agent software is produced in a systematic way and, what is more, analyses of different working conditions can be done to fine-tune parameters of the models to achieve an efficient transportation. Results on one realistic study-case show that average service times can be shortened with respect to fixed planning and that this system can operate in legacy systems.","PeriodicalId":6682,"journal":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","volume":"21 1","pages":"947-954"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88568584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}