Hasil untuk "Industrial directories"

Menampilkan 20 dari ~3285936 hasil · dari arXiv, DOAJ, Semantic Scholar, CrossRef

JSON API
S2 Open Access 2018
Industrial IoT in 5G environment towards smart manufacturing

Jiangfeng Cheng, Weihai Chen, F. Tao et al.

Abstract Smart manufacturing based on cyber-physical manufacturing systems (CPMS) has become the development trend and been widely recognized all over the world. Throughout the development trend of CPMS, one of the key issues is industrial Internet-of-Things (IIoT) with the characteristics of automation, smart connected, real-time monitoring, and collaborative control. Along with the permeation and applications of advanced technologies in manufacturing, massive amounts of data have been generated in the manufacturing process. However, the current 3th generation mobile network (3G), 4G and other communication technologies cannot meet the demands of CPMS for high data rate, high reliability, high coverage, low latency, etc., which hinders the development and implementation of CPMS. As a future advanced wireless transmission technology, 5G has a significant potential to promote IIoT and CPMS. Based on the architecture and characteristics of 5G wireless communication technology, this paper proposes the architecture of 5G-based IIoT, and describes the implementation methods of different advanced manufacturing scenarios and manufacturing technologies under the circumstances of three typical application modes of 5G, respectively, i.e., enhance mobile broadband (eMBB), massive machine type communication (mMTC), ultra-reliable and low latency communication (URLLC). Besides, the characteristics, key technologies and challenges of the 5G based IIoT are also analyzed.

396 sitasi en Computer Science
S2 Open Access 2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li, J. Niu, Md Zakirul Alam Bhuiyan et al.

Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.

345 sitasi en Computer Science
S2 Open Access 2019
Removal of phenolic compounds from industrial waste water based on membrane-based technologies

W. Raza, Jechan Lee, Nadeem Raza et al.

Abstract Phenol and its derivatives from various man-made activities pose threats to public health and aquatic ecosystems. A number of technologies (e.g., adsorption, oxidation, and biological methods) have been proposed and tested to remove phenolic compounds from waste water. Among these technologies, membrane separation is considered one of the most efficient tools for abating phenolic compounds from waste water because of low capital cost, easy scalability, and ecofriendly production with the lowest emission of noxious compounds. In this review, we aim to address the potent role of membrane technology by evaluating its performance in separating various phenolic compounds from industrial effluents.

311 sitasi en Environmental Science
S2 Open Access 2019
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data

Fan Zhang, Hansaka Angel Dias Edirisinghe Kodituwakku, J. Hines et al.

The growing number of attacks against cyber-physical systems in recent years elevates the concern for cybersecurity of industrial control systems (ICSs). The current efforts of ICS cybersecurity are mainly based on firewalls, data diodes, and other methods of intrusion prevention, which may not be sufficient for growing cyber threats from motivated attackers. To enhance the cybersecurity of ICS, a cyber-attack detection system built on the concept of defense-in-depth is developed utilizing network traffic data, host system data, and measured process parameters. This attack detection system provides multiple-layer defense in order to gain the defenders precious time before unrecoverable consequences occur in the physical system. The data used for demonstrating the proposed detection system are from a real-time ICS testbed. Five attacks, including man in the middle (MITM), denial of service (DoS), data exfiltration, data tampering, and false data injection, are carried out to simulate the consequences of cyber attack and generate data for building data-driven detection models. Four classical classification models based on network data and host system data are studied, including k-nearest neighbor (KNN), decision tree, bootstrap aggregating (bagging), and random forest (RF), to provide a secondary line of defense of cyber-attack detection in the event that the intrusion prevention layer fails. Intrusion detection results suggest that KNN, bagging, and RF have low missed alarm and false alarm rates for MITM and DoS attacks, providing accurate and reliable detection of these cyber attacks. Cyber attacks that may not be detectable by monitoring network and host system data, such as command tampering and false data injection attacks by an insider, are monitored for by traditional process monitoring protocols. In the proposed detection system, an auto-associative kernel regression model is studied to strengthen early attack detection. The result shows that this approach detects physically impactful cyber attacks before significant consequences occur. The proposed multiple-layer data-driven cyber-attack detection system utilizing network, system, and process data is a promising solution for safeguarding an ICS.

305 sitasi en Computer Science
S2 Open Access 2019
Review and Perspectives of Data-Driven Distributed Monitoring for Industrial Plant-Wide Processes

Qingchao Jiang, Xue-feng Yan, Biao Huang

Process monitoring is crucial for maintaining favorable operating conditions and has received considerable attention in previous decades. Currently, a plant-wide process generally consists of multiple operational units and a large number of measured variables. The correlation among the variables and units is complex and results in the imperative but challenging monitoring of such plant-wide processes. With the rapid advancement of industrial sensing techniques, process data with meaningful process information are collected. Data-driven multivariate statistical plant-wide process monitoring (DMSPPM) has become popular. The key idea of DMSPPM is first decomposing a plant-wide process into multiple subprocesses and then establishing a data-driven model for monitoring the process, in which process variable decomposition is important for guaranteeing the monitoring performance. In the current review, we first introduce the basics of multivariate statistical process monitoring and highlight the necessity of des...

260 sitasi en Computer Science
S2 Open Access 2019
Artificial Intelligence-Driven Mechanism for Edge Computing-Based Industrial Applications

A. Sodhro, Sandeep Pirbhulal, V. H. C. de Albuquerque

Due to various challenging issues such as, computational complexity and more delay in cloud computing, edge computing has overtaken the conventional process by efficiently and fairly allocating the resources i.e., power and battery lifetime in Internet of things (IoT)-based industrial applications. In the meantime, intelligent and accurate resource management by artificial intelligence (AI) has become the center of attention especially in industrial applications. With the coordination of AI at the edge will remarkably enhance the range and computational speed of IoT-based devices in industries. But the challenging issue in these power hungry, short battery lifetime, and delay-intolerant portable devices is inappropriate and inefficient classical trends of fair resource allotment. Also, it is interpreted through extensive industrial datasets that dynamic wireless channel could not be supported by the typical power saving and battery lifetime techniques, for example, predictive transmission power control (TPC) and baseline. Thus, this paper proposes 1) a forward central dynamic and available approach (FCDAA) by adapting the running time of sensing and transmission processes in IoT-based portable devices; 2) a system-level battery model by evaluating the energy dissipation in IoT devices; and 3) a data reliability model for edge AI-based IoT devices over hybrid TPC and duty-cycle network. Two important cases, for instance, static (i.e., product processing) and dynamic (i.e., vibration and fault diagnosis) are introduced for proper monitoring of industrial platform. Experimental testbed reveals that the proposed FCDAA enhances energy efficiency and battery lifetime at acceptable reliability (∼0.95) by appropriately tuning duty cycle and TPC unlike conventional methods.

257 sitasi en Computer Science
S2 Open Access 2020
Secure Data Storage and Recovery in Industrial Blockchain Network Environments

W. Liang, Yongkai Fan, Kuan Ching Li et al.

The massive redundant data storage and communication in network 4.0 environments have issues of low integrity, high cost, and easy tampering. To address these issues, in this article, a secure data storage and recovery scheme in the blockchain-based network is proposed by improving the decentration, tampering-proof, real-time monitoring, and management of storage systems, as such design supports the dynamic storage, fast repair, and update of distributed data in the data storage system of industrial nodes. A local regenerative code technology is used to repair and store data between failed nodes while ensuring the privacy of user data. That is, as the data stored are found to be damaged, multiple local repair groups constructed by vector code can simultaneously yet efficiently repair multiple distributed data storage nodes. Based on the unique chain storage structure, such as data consensus mechanism and smart contract, the storage structure of blockchain distributed coding not only quickly repair the nearby local regenerative codes in the blockchain but also reduce the resource overhead in the data storage process of industrial nodes. Experimental results show that the proposed scheme improves the repair rate of multinode data by 9% and data storage rate increased by 8.6%, indicating to be promising with good security and real-time performance.

221 sitasi en Computer Science
S2 Open Access 2020
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems

Pathum Chamikara Mahawaga Arachchige, P. Bertók, I. Khalil et al.

Industrial Internet of Things (IIoT) is revolutionizing many leading industries such as energy, agriculture, mining, transportation, and healthcare. IIoT is a major driving force for Industry 4.0, which heavily utilizes machine learning (ML) to capitalize on the massive interconnection and large volumes of IIoT data. However, ML models that are trained on sensitive data tend to leak privacy to adversarial attacks, limiting its full potential in Industry 4.0. This article introduces a framework named PriModChain that enforces privacy and trustworthiness on IIoT data by amalgamating differential privacy, federated ML, Ethereum blockchain, and smart contracts. The feasibility of PriModChain in terms of privacy, security, reliability, safety, and resilience is evaluated using simulations developed in Python with socket programming on a general-purpose computer. We used Ganache_v2.0.1 local test network for the local experiments and Kovan test network for the public blockchain testing. We verify the proposed security protocol using Scyther_v1.1.3 protocol verifier.

218 sitasi en Computer Science
S2 Open Access 2020
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT

F. Farivar, M. S. Haghighi, A. Jolfaei et al.

This article proposes a hybrid intelligent-classic control approach for reconstruction and compensation of cyber attacks launched on inputs of nonlinear cyber-physical systems (CPS) and industrial Internet of Things systems, which work through shared communication networks. In this article, a class of n-order nonlinear systems is considered as a model of CPS while it is in presence of cyber attacks only in the forward channel. An intelligent-classic control system is developed to compensate cyber-attacks. Neural network (NN) is designed as an intelligent estimator for attack estimation and a classic nonlinear control system based on the variable structure control method is designed to compensate the effect of attacks and control the system performance in tracking applications. In the proposed strategy, nonlinear control theory is applied to guarantee the stability of the system when attacks happen. In this strategy, a Gaussian radial basis function NN is used for online estimation and reconstruction of cyber-attacks launched on the networked system. An adaptation law of the intelligent estimator is derived from a Lyapunov function. Simulation results demonstrate the validity and feasibility of the proposed strategy in car cruise control application as the testbed.

204 sitasi en Computer Science
arXiv Open Access 2026
IndustryCode: A Benchmark for Industry Code Generation

Puyu Zeng, Zhaoxi Wang, Zhixu Duan et al.

Code generation and comprehension by Large Language Models (LLMs) have emerged as core drivers of industrial intelligence and decision optimization, finding widespread application in fields such as finance, automation, and aerospace. Although recent advancements have demonstrated the remarkable potential of LLMs in general code generation, existing benchmarks are mainly confined to single domains and languages. Consequently, they fail to effectively evaluate the generalization capabilities required for real-world industrial applications or to reflect the coding proficiency demanded by complex industrial scenarios. To bridge this gap, we introduce IndustryCode, the first comprehensive benchmark designed to span multiple industrial domains and programming languages. IndustryCode comprises 579 sub-problems derived from 125 primary industrial challenges, accompanied by rigorous problem descriptions and test cases. It covers a wide range of fields, including finance, automation, aerospace, and remote sensing-and incorporates diverse programming languages such as MATLAB, Python, C++, and Stata. In our evaluation, the top-performing model, Claude 4.5 Opus, achieved an overall accuracy of 68.1% on sub-problems and 42.5% main problems. The benchmark dataset and automated evaluation code will be made publicly available upon acceptance.

en cs.SE, cs.AI
arXiv Open Access 2026
Navigating Ethical AI Challenges in the Industrial Sector: Balancing Innovation and Responsibility

Ruomu Tan, Martin W Hoffmann

The integration of artificial intelligence (AI) into the industrial sector has not only driven innovation but also expanded the ethical landscape, necessitating a reevaluation of principles governing technology and its applications and awareness in research and development of industrial AI solutions. This chapter explores how AI-empowered industrial innovation inherently intersects with ethics, as advancements in AI introduce new challenges related to transparency, accountability, and fairness. In the chapter, we then examine the ethical aspects of several examples of AI manifestation in industrial use cases and associated factors such as ethical practices in the research and development process and data sharing. With the progress of ethical industrial AI solutions, we emphasize the importance of embedding ethical principles into industrial AI systems and its potential to inspire technological breakthroughs and foster trust among stakeholders. This chapter also offers actionable insights to guide industrial research and development toward a future where AI serves as an enabler for ethical and responsible industrial progress as well as a more inclusive industrial ecosystem.

en cs.CY, cs.AI
DOAJ Open Access 2026
Multidisciplinary analysis of preventive occupational safety measures in tunnel construction

Ekrem Bektašević, Kemal Gutić, Zijad Požegić

Driven by rapid urbanization and expanding demand for underground space, tunnel construction has become an increasingly important component of modern infrastructure. However, the confined working environment, complex geological conditions, and intensive construction processes pose substantial occupational safety challenges. This paper provides a multidisciplinary analysis of preventive safety measures in tunnel construction, with the goal of enhancing safety performance and reducing risks to workers' health and well-being. The study classifies safety strategies into three dimensions: technical, organizational, and personal, and examines the role of advanced technologies in optimizing working conditions and supporting risk prevention. It also highlights the importance of employee education and continuous safety training, and presents a statistical analysis of injury patterns during high-risk construction phases to identify major contributing factors. By integrating international safety standards, domestic engineering practices, and representative case studies, this research proposes a comprehensive framework for safety management tailored to the complex context of underground construction.

Industrial safety. Industrial accident prevention
S2 Open Access 2020
Private 5G: The Future of Industrial Wireless

Adnan Aijaz

High-performance wireless communication is crucial to the digital transformation of industrial systems, which is driven by Industry 4.0 and Industrial Internet initiatives. Among the candidate industrial wireless technologies, 5G (cellular/mobile) holds significant potential. The operation of private (nonpublic) 5G networks in industrial environments is promising to fully unleash this potential. This article provides a technical overview of private 5G networks. It introduces the concept and functional architecture of private 5G while highlighting key benefits and industrial use cases. It explores spectrum opportunities for private 5G networks and discusses design aspects of private 5G along with key challenges. Finally, it examines the emerging standardization and open innovation ecosystem for private 5G.

182 sitasi en Computer Science
arXiv Open Access 2025
Industrial Synthetic Segment Pre-training

Shinichi Mae, Ryousuke Yamada, Hirokatsu Kataoka

Pre-training on real-image datasets has been widely proven effective for improving instance segmentation. However, industrial applications face two key challenges: (1) legal and ethical restrictions, such as ImageNet's prohibition of commercial use, and (2) limited transferability due to the domain gap between web images and industrial imagery. Even recent vision foundation models, including the segment anything model (SAM), show notable performance degradation in industrial settings. These challenges raise critical questions: Can we build a vision foundation model for industrial applications without relying on real images or manual annotations? And can such models outperform even fine-tuned SAM on industrial datasets? To address these questions, we propose the Instance Core Segmentation Dataset (InsCore), a synthetic pre-training dataset based on formula-driven supervised learning (FDSL). InsCore generates fully annotated instance segmentation images that reflect key characteristics of industrial data, including complex occlusions, dense hierarchical masks, and diverse non-rigid shapes, distinct from typical web imagery. Unlike previous methods, InsCore requires neither real images nor human annotations. Experiments on five industrial datasets show that models pre-trained with InsCore outperform those trained on COCO and ImageNet-21k, as well as fine-tuned SAM, achieving an average improvement of 6.2 points in instance segmentation performance. This result is achieved using only 100k synthetic images, more than 100 times fewer than the 11 million images in SAM's SA-1B dataset, demonstrating the data efficiency of our approach. These findings position InsCore as a practical and license-free vision foundation model for industrial applications.

en cs.CV
arXiv Open Access 2025
Rethinking industrial artificial intelligence: a unified foundation framework

Jay Lee, Hanqi Su

Recent advancements in industrial artificial intelligence (AI) are reshaping the industry by driving smarter manufacturing, predictive maintenance, and intelligent decision-making. However, existing approaches often focus primarily on algorithms and models while overlooking the importance of systematically integrating domain knowledge, data, and models to develop more comprehensive and effective AI solutions. Therefore, the effective development and deployment of industrial AI require a more comprehensive and systematic approach. To address this gap, this paper reviews previous research, rethinks the role of industrial AI, and proposes a unified industrial AI foundation framework comprising three core modules: the knowledge module, data module, and model module. These modules help to extend and enhance the industrial AI methodology platform, supporting various industrial applications. In addition, a case study on rotating machinery diagnosis is presented to demonstrate the effectiveness of the proposed framework, and several future directions are highlighted for the development of the industrial AI foundation framework.

en cs.LG, cs.AI
arXiv Open Access 2025
Aligning Academia with Industry: An Empirical Study of Industrial Needs and Academic Capabilities in AI-Driven Software Engineering

Hang Yu, Yuzhou Lai, Li Zhang et al.

The rapid advancement of large language models (LLMs) is fundamentally reshaping software engineering (SE), driving a paradigm shift in both academic research and industrial practice. While top-tier SE venues continue to show sustained or emerging focus on areas like automated testing and program repair, with researchers worldwide reporting continuous performance gains, the alignment of these academic advances with real industrial needs remains unclear. To bridge this gap, we first conduct a systematic analysis of 1,367 papers published in FSE, ASE, and ICSE between 2022 and 2025, identifying key research topics, commonly used benchmarks, industrial relevance, and open-source availability. We then carry out an empirical survey across 17 organizations, collecting 282 responses on six prominent topics, i.e., program analysis, automated testing, code generation/completion, issue resolution, pre-trained code models, and dependency management, through structured questionnaires. By contrasting academic capabilities with industrial feedback, we derive seven critical implications, highlighting under-addressed challenges in software requirements and architecture, the reliability and explainability of intelligent SE approaches, input assumptions in academic research, practical evaluation tensions, and ethical considerations. This study aims to refocus academic attention on these important yet under-explored problems and to guide future SE research toward greater industrial impact.

en cs.SE
DOAJ Open Access 2025
Exploring National Transportation Safety Board Aviation Modality Recommendations Through Content and Sentiment Analyses: 2015–2019

Brian J. Roggow

Aviation safety recommendations are the National Transportation Safety Board’s key mechanism for effecting improvements and curtailing subsequent accidents. Aviation safety recommendations and their associated correspondence have been minimally explored in the extant literature, potentially overlooking constrained versus successful risk mitigation themes. This research aimed to qualitatively explore 187 aviation safety recommendations using a framework adapted from the SHELL model. The research also examined the recommendations’ correspondence content to illuminate the characteristics typical of positive versus negative sentiments. The results included risk mitigation themes distributed across the categories of addressees, report statuses, and reiterations. Addressing company, management, manning, or regulatory issues was the most prevalent risk mitigation strategy, followed by physical environment and other human-system support mitigations. The sentiment analyses’ results included distributions across addressees, statuses, time, reiterations, and correspondences. NTSB and addressee correspondence sentiments remained mostly consistent over time and interactions, whereas differences were observed based on addressees and unacceptable report statuses. This article offers the first systematic analysis of NTSB aviation safety recommendations’ risk mitigation themes and addressee correspondences.

Industrial safety. Industrial accident prevention, Medicine (General)
S2 Open Access 2020
Condition Monitoring of Industrial Electric Machines: State of the Art and Future Challenges

Sang Bin Lee, G. Stone, J. Antonino-Daviu et al.

The limitations of the thermal, vibration, or electrical monitoring of electric machines such as false indications, low sensitivity, and difficulty of fault interpretation have recently been exposed. This has led to a shift in the direction in research toward applying new techniques for improving the reliability of condition monitoring. With the changing environment, the purpose of this article is to provide an overview of the recent trends in the industrial demand and research activity in condition monitoring technology. The new developments in insulation testing, electrical testing, flux analysis, transient analysis, and fault prognostics are summarized. The challenges and recommendations for future work for the new technologies are also explored to help support target research and development efforts according to industrial needs.

166 sitasi en
S2 Open Access 2021
Deep Learning for Industrial KPI Prediction: When Ensemble Learning Meets Semi-Supervised Data

Qingqiang Sun, Zhiqiang Ge

Soft-sensing techniques are of great significance in industrial processes for monitoring and prediction of key performance indicators. Due to the effectiveness of nonlinear feature extraction and strong expansibility, an autoencoder (AE) and its extensions have been widely developed for industrial applications. Nevertheless, an AE commonly uses the last hidden layer for regression modeling with the output, which seems to be a kind of information waste as the shallow layers are also abstractions of input data. Besides, when there are excessive unlabeled samples, AE-based models are less likely to make full use of them or even degrade the performance. To deal with these issues, a method called ensemble semi-supervised gated stacked AE (ES2GSAE) is proposed in this article. Gate units are used to develop connections between different layers and the output layer, which also help quantify the contribution of different hidden layers. Moreover, the idea of ensemble learning is combined with semi-supervised learning, in which different unlabeled datasets are used for training different submodels to ensure their diversities. In this way, unlabeled samples can be utilized more efficiently and help enhance the model performance. The effectiveness and superiority are verified in a real industrial process by comparing the proposed method with other typical AE-based models.

116 sitasi en Computer Science

Halaman 9 dari 164297