Projects overview

Sort by

Showing 1 to 30 of 34 entries


Show more information
Description Data across the (multi-sided) company internal value chain is integrated by the IIMS with optimisation and modelling tools for resource management including innovative, multi-level, real-time
Comments The Digital Factory Model (DFM) will provide an integrated representation of the intra-factory domain at machine-level, end-user-level, and process-level.
 Design of the Security Framework I Result title Design of the Security Framework I
 Design of the Security Framework II Result title Design of the Security Framework I Result comments Cybersecurity
 Communcation strategy and plan Result description , (ii) production line/factory level and (iii) overall value chain level.
 Prototype of the Security Framework II Result comments Cybersecurity
 Connectors for Inter-factory Interoperability and Logistics II Result comments Cybersecurity
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 IoT - Internet of Things Comments The Digital Factory Model (DFM) will provide an integrated representation of the intra-factory domain at machine-level, end-user-level, and process-level.
Show more information
Comments Optimization on the assembly line Optimization on security level and safety monitoring Applicable, real time analysis in received data from the production line.
 Context-Aware Manager Result description It provides high level information that can be leveraged by other modules of the SatisFactory ecosystem to deliver advanced services for an effective support of workers. the GCRM can reliably identify
 Off-line Digital Manufacturing Process Optimisation on machine level Taxon title Off-line Digital Manufacturing Process Optimisation on machine level
 Condition and performance monitoring technologies Taxon description Continuous monitoring of the condition and performance of the manufacturing system on component and machine level, enables sustainable and competive manufacturing, also by introducing autonomous diagnosis
Show more information
Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
 R&I Objective 4.1: Digital platforms and engineering tools supporting creativity and productivity of manufacturing development Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level.
 Periodic Reporting for period 1 - DIGICOR (Decentralised Agile Coordination Across Supply Chains) Result description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
 Cybersecurity Taxon title Cybersecurity Comments DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description The Intelligent Manufacturing approach will work at machine-mold project level to optimise/adapt the production of the specific product and can be extended at factory level to select/plan the appropriated
Comments The application of Smart Prod ACTIVE system has been demonstrated and validated at foundry level.
 Autonomous /online/realtime Manufacturing Process Optimisation on machine level Taxon title Autonomous /online/realtime Manufacturing Process Optimisation on machine level
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Significant innovations and achievements Comments The application of Smart Prod ACTIVE system has been demonstrated and validated at foundry level.
Show more information
Comments Implementation of security mechanism on the Z-Fact0r platform components, to achieve security.
 Z-PREVENT Validation and Verification of KPIs Result description The models for the 5 KPIs (Productivity, Efficiency, Quality (Customer Satisfaction), Environmental Impact, and Inventory levels) will be measured and fine-tuned.
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 A Security Architecture for Digital Manufacturing Platforms Comments Implementation of security mechanism on the Z-Fact0r platform components, to achieve security.
Show more information
Comments through a methodology that considers levels of automation and workers satisfaction.
 Periodic Reporting for period 1 - A4BLUE (Adaptive Automation in Assembly For BLUE collar workers satisfaction in Evolvable context) Result description Method and tool for the definition of different levels of automation and assessing the optimal degree of automation from a socio-technical an economic perspective considering static boundary conditions
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 RP 5.3 Levels of automation and continuous adaptation of workplaces Comments through a methodology that considers levels of automation and workers satisfaction.
Show more information
Description More specifically, SERENA project will focus on advancing the TRL of the existing developments into levels TRL5 to TRL7.
 Periodic Reporting for period 1 - SERENA (VerSatilE plug-and-play platform enabling remote pREdictive mainteNAnce) Result description The definition and design of the security middle-ware for the cloud platform.
Show more information
Description In order to achieve these results, the proposed approach relies on a Smart Objects Technology (named Smart Control System) deployed at factory level and on the concept of cloud-enabled Central Application
Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
 Periodic Reporting for period 1 - PROGRAMS (PROGnostics based Reliability Analysis for Maintenance Scheduling) Result description Physical Layer: the data monitoring tool on which the predictive maintenance techniques rely is deployed at factory level; 2.
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Process reliability - dependability Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
Show more information
 Periodic Reporting for period 1 - PreCoM (Predictive Cognitive Maintenance Decision Support System) Result description We expect that the PreCoM system will impact positively on the levels of in-service availability, maintainability, quality and worker safety.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
 Periodic Reporting for period 2 - TWIN-CONTROL (Twin-model based virtual manufacturing for machine tool-process simulation and control) Result description . - Component-level energy monitoring: a low-cost energy monitoring concept is proposed, based on the disaggregation of the machine?
 Machine Tool Digital Twin with Life Cycle features Result comments Open APIs and Communication Protocols APIs and Integration Protocols Design/development Product design/development Product use phase Off-line Digital Manufacturing Process Optimisation on machine level
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Data Analytics and Complex Event Processing will deal with semantic interoperability and security at lower data acquisition layers Decision Support Toolkit will tackle mid- to large-scale decision problems
 Periodic Reporting for period 1 - DISRUPT (Decentralised architectures for optimised operations via virtualised processes and manufacturing ecosystem collaboration) Result description deploy analytics both at the lower and higher level ? provide modelling and design services that allow the abstract representation of actual manufacturing systems ?
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments This is a high-level functional decomposition which identifies three functional scopes: Automation, Virtualization and Analytics (more on that in the API section below).
 Periodic Reporting for period 1 - FAR-EDGE (Factory Automation Edge Computing Operating System Reference Implementation) Result description O4: Implement and integrate multi-layer and compositional security-by-design techniques within the FAREDGE approach.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 ICT Architectures Comments This is a high-level functional decomposition which identifies three functional scopes: Automation, Virtualization and Analytics (more on that in the API section below).
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Periodic Reporting for period 1 - SAFIRE (Cloud-based Situational Analysis for Factories providing Real-time Reconfiguration Services) Result description The project will provide several methods and tools, aiming to bring these tools to Technology Readiness Level 6 by the end of the third year.
 Methodology for Dynamic and Predictable Reconfiguration and Optimisation Engine Result comments result_rcn_EC deliverableType_EC Documents, reports IoT enabled SCADA, MOM-MES, ERP (…) connectivity Autonomous /online/realtime Manufacturing Process Optimisation on factory level
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.
Show more information
 Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems Result title Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems
 ENISA Based Evaluation of IaaS-Cloud Backend for Industry 4.0 Result description To handle such security issues, defining a set of security parameters in the service level agreements between both, IaaS provider and customer, is of utmost importance.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description need to be addressed in order to progress on the pathways be inspired by industrial and research cases and share your experience and cases engage with stakeholders at European, national and regional level
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 Periodic Reporting for period 1 - ConnectedFactories (Industrial scenarios for connected factories) Result description A pathway is composed of different levels of digitalisation that are associated to a number of milestones.
 Cybersecurity Taxon title Cybersecurity
 Cybersecurity Taxon title Cybersecurity
 Data ownership - data governance Taxon description How is fairness/ a level playing field between the platform and smaller players ensured ?
Show more information
 Periodic Reporting for period 1 - AUTOWARE (Wireless Autonomous, Reliable and Resilient ProductIon Operation ARchitecture for Cognitive Manufacturing) Result description AUTOWARE high-level objective is to build an open consolidated ecosystem and single community that will lower the barriers of SMMEs for cognitive automation application development and application of autonomous
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Design and Implementation of Security and Privacy for Core Business Services Result title Design and Implementation of Security and Privacy for Core Business Services Result comments result_rcn_EC deliverableType_EC Documents, reports Cybersecurity Privacy Common digital platform used for tenders and bidding
 Periodic Reporting for period 1 - NIMBLE (Collaboration Network for Industry, Manufacturing, Business and Logistics in Europe) Result description , ensure trust, security and privacy.
 Cybersecurity Taxon title Cybersecurity Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Agent-level Showcase. Machine-level Showcase. Factory-level Showcase. Plant-level Showcase.
 Daedalus proof-of-concept showcases - 4 Result description Daedalus proof-of-concept showcases - plant-level
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments The Open vf-OS covers from the control device level, where information from the systems (IoT, CPS, embedded systems) is gathered, processed and empowered.
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18) Result comments result_rcn_EC deliverableType_EC Other Cybersecurity
 vfOS - ID1.5 - Requirements Specification(M6) Result description This deliverable will be a joint document for the requirements of all project components, divided into strategic, high level functional and technical requirements.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Information and communication technologies Comments The Open vf-OS covers from the control device level, where information from the systems (IoT, CPS, embedded systems) is gathered, processed and empowered.
Show more information
Description UPTIME will enable manufacturing companies to reach Gartner's level 4 of data analytics maturity (optimized decision-making) in order to improve physically-based models and to synchronise maintenance
Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
 Market Research Result description selected KPIs, a number of solutions to perform Predictive Maintenance (PM), ranging from reactive maintenance to proactive maintenance, as well as currently available on both commercial and research level
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls. Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
Show more information
Organisation EVOLARIS NEXT LEVEL GMBH
 Requirements of workers and organisations Result description illustration of our methodical approach, which primarily describes the aforementioned types of boundary objects as the best possible way to avoid inconsistencies in the requirements and thus to provide a high level
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description state-of-the-art R&I advances in the fields of Internet of Things, Future Internet and CPS / Smart Systems and able to bi-directionally interoperate data pertaining to the machine, the factory and the cloud levels
 D3.3b Virtual World BEinCPPS components Result description Components deployed at Cloud level
 D3.3a Virtual World BEinCPPS components Result description Components deployed at Cloud level
 Lombardy Champion - Zero-Hours Quality Result comments model interoperability - Data exchange formats - APIs OPC UA Address Space for Testing Stations Connectivity & network interoperability – communication protocols OPC UA, NGSI Performance characteristics Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description Increase worker satisfaction and strengthen global position of industry in Europe through higher social acceptance levels.
Comments A cluster has been created with the other 4 projects dealing with the topic "Continuous adaptation of work environments with changing levels of automation in evolving
 Periodic Reporting for period 1 - INCLUSIVE (Smart and adaptive interfaces for INCLUSIVE work environment) Result description This increased level of acceptability will open new market opportunities, for producers and integrators of automatic machines and robotic cells.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Clustering Comments A cluster has been created with the other 4 projects dealing with the topic "Continuous adaptation of work environments with changing levels of automation in evolving
Show more information
Comments SOA-EDA Secure IT for Manufacturing Intelligence symbiotically solves the SOA-EDA technical tussle, by defining three main topics to be studied and developed (privacy-security-trust, IoT and semantic interoperability
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design Result comments result_rcn_EC deliverableType_EC Other Cybersecurity Privacy Collaborative Product-Service Factories
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Digital manufacturing platforms Comments SOA-EDA Secure IT for Manufacturing Intelligence symbiotically solves the SOA-EDA technical tussle, by defining three main topics to be studied and developed (privacy-security-trust, IoT and semantic interoperability
Show more information
Description deployment including the issues of data fragmentation, limited data interoperability, poor deployment of advanced analytics and lack of effective integration with other systems at the enterprise and field levels
 Security, Trustworthiness and Data Protection Framework v1 Result title Security, Trustworthiness and Data Protection Framework v1 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
Show more information
 EPES Virtual Collaborative Network (VCN) Result description These KPIs belong to the item level, i.e. they are directly applicable so as to augment a simulation / optimization model.
 Condition and performance monitoring technologies Taxon description Continuous monitoring of the condition and performance of the manufacturing system on component and machine level, enables sustainable and competive manufacturing, also by introducing autonomous diagnosis
Show more information
Title 5G Enablers for Network and System Security and Resilience
Description Moreover, the potential of the developed 5G Security enablers will be showcased and demonstrated in the context of carefully selected 5G security use cases (e.g. use cases related to cybersecurity and
Comments for real-time information acquisition Potential for new business models Cyper Physical Production System and digital twins requires data collection from real system 5G 5G Security
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature
 5G Security and Privacy Enablers Result comments Manufacturing The heterogeneous nature of the new networks, devices and services will raise a lot of security concerns, such as trust and privacy, that have to be addressed to enable wide deployment of
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems