Projects overview

Sort by

Show more information
Comments Configurable Diagnosis & Health Assessment (BIBA): Intelligent diagnosis to provide a reliable interpretation of the asset’s health.
 MAILLIS use case: Cold Rolling Mill Result description The ability for machines to perform self-assessment on which basis maintenance decision making can be optimized will allow MAILLIS to reduce its maintenance costs, improve their performance and affect
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Number of developed systems and technologies Comments Configurable Diagnosis & Health Assessment (BIBA): Intelligent diagnosis to provide a reliable interpretation of the asset’s health.
Show more information
Comments Factors Consortium, project team and general project management (TEAM) TEAM - Small teams within the consortium Success Factors Consortium, project team and general project management (TEAM) TEAM - Risk
 Active collision avoidance system and algorithms Result description Real time prototype software for dynamic collision risk detection and avoidance among moving objects and subjects.
Show more information
Comments It will consider existing approaches (e.g. encryption), the specific requirements of the manufacturing domain, and the need for data security.
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18)
 vfOS - ID1.1 - Vision Consensus(M3) Result description In addition this document will include an initial risk table, upgraded from the DOA, which itemises RTD risks in particular and including integration.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Standards Comments It will consider existing approaches (e.g. encryption), the specific requirements of the manufacturing domain, and the need for data security.
 Cybersecurity Comments It will consider existing approaches (e.g. encryption), the specific requirements of the manufacturing domain, and the need for data security.
Show more information
Comments Cybersecurity ICT performance characteristics Security and privacy risk assessment to identify countermeasures to be included in the A4BLUE framework.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Factors Consortium, project team and general project management (TEAM) TEAM - Small teams within the consortium Success Factors Consortium, project team and general project management (TEAM) TEAM - Risk
 RP 3.6 Services for continuous evaluation and mitigation of manufacturing risks Taxon description Prevention and risk mitigation are also desirable options compared to recovery and salvage after damage has been caused.
Show more information
Description The innovative services will include mechanisms for supply network coordination by production-related information- and risk-sharing contracts and predictive maintenance and equipment reconfiguration services
Comments Factors Consortium, project team and general project management (TEAM) TEAM - Small teams within the consortium Success Factors Consortium, project team and general project management (TEAM) TEAM - Risk
 Optimal configuration strategies in production networks Result description outputs this tool generates are: • Identification of robust migration paths for continuous adaptation of the network configuration • Identification of point in time and demand of adaptation • Monetary assessment
Show more information
Comments Factors Consortium, project team and general project management (TEAM) TEAM - Small teams within the consortium Success Factors Consortium, project team and general project management (TEAM) TEAM - Risk
 Industrial scalability studies Result description - An environmental assessment tool integrated into the ICT platform that allow to evaluate the impact of each individual spectacle.
 RP 6.6 Costing and manufacturability assessment Taxon title RP 6.6 Costing and manufacturability assessment
Show more information
 Equipment Assessment and Assurance Report (Version 1) Result title Equipment Assessment and Assurance Report (Version 1)
 Dissemination and Communication Activities (Period 1) Result description Report on the dissemination/communication activities and their assessment
 Dissemination and Communication Activities (Period 2) Result description Report on the dissemination/communication activities and their assessment
Show more information
 VOs Risk Assessment and mitigation Result title VOs Risk Assessment and mitigation Result description A set of software services for VOs focusing on the assessment and mitigation of po-tential risks of collaboration. Result acronym VOs Risk Assessment and mitigation
 RP 4.6 Collaborative Demand and Supply Planning, Traceability, and Execution Taxon description Furthermore, supply network planning and execution would lead to the assessment of supplier performance and identification of bottlenecks in the networks.
Show more information
Description This data allows  robot intelligent motion planners to control robots while safety is ensured by a continuous ergonomics and risk assessment module to face a safety-productivity trade-off.
 Data Security Result title Data Security Result description Cybersecurity & Infrastructure Security Agency and the CIS Critical Security controls. Result acronym Data Security
Show more information
 Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance Result title Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance
 Electronic Equipment Industry Pilot (CONTINENTAL) Result description will have to meet at least the following requirements: Monitoring of the line and possible defects Prediction based on historical data which includes information about what component has a high risk
Show more information
Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
 D9.7 Cost, Benefit, and Risk Evaluation Result title D9.7 Cost, Benefit, and Risk Evaluation Result description For D9.11 a new benefit, cost and risk analysis will be carried out
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Digital manufacturing platforms - data platforms Comments The Security Framework will implement the security core mechanisms aiming to ensure the security, confidentiality, integrity and availability of the managed information for all authorised COMPOSITION stakeholders
Show more information
Comments Risk or security assessment ICT performance characteristics Cybersecurity Difficulties in having access to machines/systems in the shopfloor for end users’ internal security policies was
 Methodology for Z-Factor solution validation / evaluation Result description . • Technical indicators for performance assessment (KPIs).
 Risk or security assessment Taxon title Risk or security assessment
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments ICT performance characteristics Cybersecurity Risk or security assessment ICT performance characteristics Cybersecurity Trustworthy Systems in Platform Lifetime ICT performance characteristics Cybersecurity
 Safety vs. Efficiency: AI-Based Risk Mitigation in Collaborative Robotics Result title Efficiency: AI-Based Risk Mitigation in Collaborative Robotics
 Demonstrator Descriptions and Evaluation Report Result description The report will also include the analysis of the impact of two high impact/high risk security threats on the system behaviour and system performance.
 Risk or security assessment Taxon title Risk or security assessment
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.