Refine
Year of publication
Document type
- Article (peer-reviewed) (26) (remove)
Is part of the Bibliography
- Yes (26)
Keywords
- Industry 4.0 (4)
- Machine learning (4)
- Blockchain (3)
- Cloud computing (3)
- Predictive maintenance (3)
- Security (3)
- Agents (2)
- Chronicle mining (2)
- Deep learning (2)
- IoT (2)
- Knowledge-based system (2)
- Manufacturing process (2)
- Resource discovery (2)
- Address distribution (1)
- Assessment (1)
- Audit (1)
- Authentication (1)
- Authentication technologies (1)
- Authorization (1)
- Availability (1)
- Biometrics (1)
- Cloud audit (1)
- Cloud audits (1)
- Cloud forensic challenges (1)
- Cloud forensic solutions (1)
- Cloud security (1)
- Condition monitoring (1)
- Continuous authentication (1)
- Cooperative intelligent transportation systems (C-ITS) (1)
- Cross authentication (1)
- Cybersecurity (1)
- DHT (1)
- Decentralized architecture (1)
- Digital agriculture (1)
- Digital forensics (1)
- Digital health (1)
- Discriminative convolutional neural network (1)
- Distributed ledger (1)
- Dynamic VM creation (1)
- Experience capitalization (1)
- Fault prognostics (1)
- Forensic acquisition (1)
- Forensic analysis (1)
- Industrial blockchain (1)
- Internet der Dinge (1)
- Legacy machines (1)
- MLOps Mlflow DVC (1)
- MUWS (1)
- Maintenance (1)
- Metrics (1)
- NAT traversal (1)
- Ontology (1)
- Ontology reasoning (1)
- P2P (1)
- PaaS (1)
- QoS (1)
- Quality assurance (1)
- Rule base refinement (1)
- SOA (1)
- Security policies (1)
- Self adaptive algorithm (1)
- Semantic technology (1)
- Semantics (1)
- Shear wave elastography (1)
- Shibboleth (1)
- Shop floor (1)
- Sicherheit (1)
- Smart farming (1)
- Transparent authentication (1)
- Trust (1)
- Trust management (1)
- Ultrasound (1)
- Usability (1)
- User authentication (1)
- Verifiability (1)
- WSDM (1)
- Web Service Ping (1)
- Web Services (1)
- XAI (1)
- e-Learning (1)
- eHealth/mHealth (1)
Data processed in context is more meaningful, easier to understand and has higher information content, hence it derives its semantic meaning from the surrounding context. Even in the field of acoustic signal processing. In this work, a Deep Learning based approach using Ensemble Neural Networks to integrate context into a learning system is presented. For this purpose, different use cases are considered and the method is demonstrated using acoustic signal processing of machine sound data for valves, pumps and slide rails. Mel-spectrograms are used to train convolutional neural networks in order to analyse acoustic data using image processing techniques.
Quality assurance (QA) plays a crucial role in manufacturing to ensure that products meet their specifications. However, manual QA processes are costly and time-consuming, thereby making artificial intelligence (AI) an attractive solution for automation and expert support. In particular, convolutional neural networks (CNNs) have gained a lot of interest in visual inspection. Next to AI methods, the explainable artificial intelligence (XAI) systems, which achieve transparency and interpretability by providing insights into the decision-making process of the AI, are interesting methods for achieveing quality inspections in manufacturing processes. In this study, we conducted a systematic literature review (SLR) to explore AI and XAI approaches for visual QA (VQA) in manufacturing. Our objective was to assess the current state of the art and identify research gaps in this context. Our findings revealed that AI-based systems predominantly focused on visual quality control (VQC) for defect detection. Research addressing VQA practices, like process optimization, predictive maintenance, or root cause analysis, are more rare. Least often cited are papers that utilize XAI methods. In conclusion, this survey emphasizes the importance and potential of AI and XAI in VQA across various industries. By integrating XAI, organizations can enhance model transparency, interpretability, and trust in AI systems. Overall, leveraging AI and XAI improves VQA practices and decision-making in industries.
The common corpus optimization method “stop words removal” is based on the assumption that text tokens with high occurrence frequency can be removed without affecting classification performance. Linguistic information regarding sentence structure is ignored as well as preferences of the classification technology. We propose the Weighted Unimportant Part-of-Speech Model (WUP-Model) for token removal in the pre-processing of text corpora. The weighted relevance of a token is determined using classification relevance and classification performance impact. The WUP-Model uses linguistic information (part of speech) as grouping criteria. Analogous to stop word removal, we provide a set of irrelevant part of speech (WUP-Instance) for word removal. In a proof-of-concept we created WUP-Instances for several classification algorithms. The evaluation showed significant advantages compared to classic stop word removal. The tree-based classifier increased runtime by 65% and 25% in performance. The performance of the other classifiers decreased between 0.2% and 2.4%, their runtime improved between −4.4% and −24.7%. These results prove beneficial effects of the proposed WUP-Model.
The Industrial Internet of Things (IIoT) holds significant potential for improving efficiency, quality, and flexibility. In decentralized systems, there are no trust based centralized authentication techniques, which are unsuitable for distributed networks or subnets, as they have a single point of failure. However, in a decentralized system, more emphasis is needed on trust management, which presents significant challenges in ensuring security and trust in industrial devices and applications. To address these issues, industrial blockchain has the potential to make use of trustless and transparent technologies for devices, applications, and systems. By using a distributed ledger, blockchains can track devices and their data exchanges, improving relationships between trading partners, and proving the supply chain. In this paper, we propose a model for cross-domain authentication between the blockchain-based infrastructure and industrial centralized networks outside the blockchain to ensure secure communication in industrial environments. Our model enables cross authentication for different sub-networks with different protocols or authentication methods while maintaining the transparency provided by the blockchain. The core concept is to build a bridge of trust that enables secure communication between different domains in the IIoT ecosystem. Our proposed model enables devices and applications in different domains to establish secure and trusted communication channels through the use of blockchain technology, providing an efficient and secure way to exchange data within the IIoT ecosystem. Our study presents a decentralized cross-domain authentication mechanism for field devices, which includes enhancements to the standard authentication system. To validate the feasibility of our approach, we developed a prototype and assessed its performance in a real-world industrial scenario. By improving the security and efficiency in industrial settings, this mechanism has the potential to inspire this important area.
The Present and Future of a Digital Montenegro: Analysis of C-ITS, Agriculture, and Healthcare
(2023)
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of important information, products becoming compromised, and damage to industrial controls. Recently, blockchain technology has been used to increase the trust between stakeholders collaborating in the supply chain in order to preserve privacy, ensure the provenance of material, provide machine-led maintenance, etc. In all cases, such industrial blockchains establish a novel foundation of trust for business transactions which could potentially streamline and expedite economic processes to a significant extent. This paper presents an examination of “Schloss”, an industrial blockchain system architecture designed for multi-factory environments. It proposes an innovative solution to increase trust in industrial networks by incorporating a fairness concept as a subsystem of an industrial blockchain. The proposed mechanism leverages the concept of taxes imposed on blockchain nodes to enforce ethical conduct and discipline among participants. In this paper, we propose a game theory-based mechanism to address security and trust difficulties in industrial networks. The mechanism, inspired by the ultimatum game, progressively punishes malicious actors to increase the cost of fraud, improve the compensation system, and utilise the reward reporting capabilities of blockchain technology to further discourage fraudulent activities. Furthermore, the blockchain’s incentive structure is utilised to reduce collusion and speed up the process of reaching equilibrium, thereby promoting a secure and trustworthy environment for industrial collaboration. The objective of this paper is to address lack of trust among industrial partners and introduce a solution that brings security and trust to the forefront of industrial blockchain applications.
In the context of Industry 4.0, smart factories use advanced sensing and data analytic technologies to understand and monitor the manufacturing processes. To enhance production efficiency and reliability, statistical Artificial Intelligence (AI) technologies such as machine learning and data mining are used to detect and predict potential anomalies within manufacturing processes. However, due to the heterogeneous nature of industrial data, sometimes the knowledge extracted from industrial data is presented in a complex structure. This brings the semantic gap issue which stands for the lack of interoperability among different manufacturing systems. Furthermore, as the Cyber-Physical Systems (CPS) are becoming more knowledge-intensive, uniform knowledge representation of physical resources and real-time reasoning capabilities for analytic tasks are needed to automate the decision-making processes for these systems. These requirements highlight the potential of using symbolic AI for predictive maintenance.
To automate and facilitate predictive analytics in Industry 4.0, in this paper, we present a novel Knowledge-based System for Predictive Maintenance in Industry 4.0 (KSPMI). KSPMI is developed based on a novel hybrid approach that leverages both statistical and symbolic AI technologies. The hybrid approach involves using statistical AI technologies such as machine learning and chronicle mining (a special type of sequential pattern mining approach) to extract machine degradation models from industrial data. On the other hand, symbolic AI technologies, especially domain ontologies and logic rules, will use the extracted chronicle patterns to query and reason on system input data with rich domain and contextual knowledge. This hybrid approach uses Semantic Web Rule Language (SWRL) rules generated from chronicle patterns together with domain ontologies to perform ontology reasoning, which enables the automatic detection of machinery anomalies and the prediction of future events’ occurrence. KSPMI is evaluated and tested on both real-world and synthetic data sets.
While the number of devices connected together as the Internet of Things (IoT) is growing, the demand for an efficient and secure model of resource discovery in IoT is increasing. An efficient resource discovery model distributes the registration and discovery workload among many nodes and allow the resources to be discovered based on their attributes. In most cases this discovery ability should be restricted to a number of clients based on their attributes, otherwise, any client in the system can discover any registered resource. In a binary discovery policy, any client with the shared secret key can discover and decrypt the address data of a registered resource regardless of the attributes of the client. In this paper we propose Attred, a decentralized resource discovery model using the Region-based Distributed Hash Table (RDHT) that allows secure and location-aware discovery of the resources in IoT network. Using Attribute Based Encryption (ABE) and based on predefined discovery policies by the resources, Attred allows clients only by their inherent attributes, to discover the resources in the network. Attred distributes the workload of key generations and resource registration and reduces the risk of central authority management. In addition, some of the heavy computations in our proposed model can be securely distributed using secret sharing that allows a more efficient resource registration, without affecting the required security properties. The performance analysis results showed that the distributed computation can significantly reduce the computation cost while maintaining the functionality. The performance and security analysis results also showed that our model can efficiently provide the required security properties of discovery correctness, soundness, resource privacy and client privacy.