Projects overview

Sort by


Show more information
Description of year 2024; engage over 100 key European industry actors, (through Open Calls and workshops); transfer knowledge and technology to increase use of KYKLOS 4.0 Ecosystem to at least 50%; strengthen
 Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance Result title Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance
 Aerospace Pilot – Jet engine manufacturing & maintenance (GRC) Result description Such parts are expensive so storing a high level of stock for each of the thousands of parts is prohibitively expensive, as well as not matching the goal of low-waste circular manufacturing.
Show more information
Description high-quality products at the necessary production rates while minimizing waste and energy consumption, maximizing efficiency and ROI. openZDM project is an Innovation Action that will develop and demonstrate in 5
 Thermal images of steel bars Result description   Thermal camera employed: Optris PI 1M, spectral range 0.85-1.1 μm, temperature range 500 - 1800°C.
Show more information
 Security Implications of Interoperability Result title Security Implications of Interoperability
 Analysis of Manufacturing Platforms in the Context of Zero-Defect Process Establishment Result description 23–25, 2020, ProceedingsJournal number: 598Journal publisher: Springer International PublishingPublished year: 2020Published pages: 583-596DOI identifier: 10.1007/978-3-030-62412-5_48ISBN:978-3-030-62411
Show more information
Description Moreover, based on the use of trustworthy AI techniques, Circular TwAIn will enable human centric sustainable manufacturing, fostering the transition towards Industry 5.0.
 Open-Source Implementations of the Reactive Asset Administration Shell: A Survey Result description engines listed on this page.Authors: Jakoby, Michael; Baumann, Michael; Bischoff, Tino; Mees, Hans; Müller, Jens; Stojanovic, Ljiljana; Volz, FriedrichJournal title: Sensors; Volume 23; Issue 11; Pages: 5229Published
Show more information
Comments processes Software development and ownership model Business model aspects Interoperability (ICT) ICT performance characteristics Real-time communication capability ICT performance characteristics Cybersecurity
 D3.3b Virtual World BEinCPPS components Result description Components deployed at Cloud level
 D3.3a Virtual World BEinCPPS components Result description Components deployed at Cloud level
 Implementing Cyber-Physical Systems in Manufacturing Result acronym BEinCPPS-549115
 Cybersecurity Taxon title Cybersecurity
Show more information
Description Validation of above overall targets through >100 interdisciplinary innovation driven technical, business and service-level KPIs for 09 diverse WVC usecases across 3 categories i.e., data driven sawmill
 5G-TIMBER Project video Result title 5G-TIMBER Project video Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 1.3: Data and AI driven industrial machines fault prediction and design support Result description Key Challenge Data aggregation, AI adaption, security and trust. Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Timber Helix Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial specification of functional and technical requirements of 5G NPN implementations for pilots and beyond Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial 5G TIMBER data flow architecture for the circular material and production process management Result comments 5G-TIMBER Result acronym 5G-TIMBER
 5G TIMBER Market analysis report Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial KPIs definition report Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial descriptions of use cases with expected outcomes and impact projections to 3 target domains Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Data and ethics management plan Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial AI-driven edge computing and precise localization demonstrator Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Dissemination, Communication and Clustering Plan Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Performance Evaluation of UWB Active-Passive Two-Way Ranging Distance Estimation Matrix Weighting Methods Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Input database for selected wood parts and timber components: material properties, representative environmental conditions and loads Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 1.1: Data and material models driven lumber production and handling Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 1.2: DTs assisted assembly, remote operation & servicing for woodworking machinery Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 2.1: Precise localisation for production processes optimisation and human safety Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 2.2: DT, AR and Industry 5.0 UX assisted production supported by ZSM 5G data exchange Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 2.3: Data driven design to production cycle optimisation Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 3.1: AR and Industry 5.0 UX assisted assembly and renovation of green buildings Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 3.2: Long term SHM of wooden constructions using IoT and embedded AI Result comments 5G-TIMBER Result acronym 5G-TIMBER
 UC 3.3: Wooden composites waste recycling Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Enhanced Decision Mechanism for RAN Subslicing in Management Closed Control Loop Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Adaptive Extended Kalman Filter Position Estimation Based on Ultra-Wideband Active-Passive Ranging Protocol Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Automatic NLOS Classification from Virtual 3D City Models Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Inertial and positioning sensors fusion for indirect location tracking in warehouse inventory management Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Hygro-thermal modeling of timber bridge decks considering the effect of solar radiation Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Heuristic Radio Access Network Subslicing with User Clustering and Bandwidth Subpartitioning Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Inter O-DUs coordination for scheduling of massive users in O-RAN Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial integration report of 5G NPN lab implementation Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial data management report Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial wood product chain data exchange software prototype Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial digitalized predictive lifecycle analytic services and hardware demonstrator for selected timber processing local platforms Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Initial operational DT AR solution for piloting Result comments 5G-TIMBER Result acronym 5G-TIMBER
 Intermediate report on Dissemination, Communication and Clustering activities Result comments 5G-TIMBER Result acronym 5G-TIMBER
Show more information
Comments level interoperability ICT performance characteristics General interoperability framework Interoperability (ICT) Cybersecurity ICT performance characteristics Occupational safety and health Manufacturing
 Estimating remaining useful life of machine tool ball screws via probabilistic classification Result description Management (ICPHM)Journal publisher: IEEE International Conference on Prognostics and Health Management 2019Published year: 2019Published pages: 1-7DOI identifier: 10.1109/icphm.2019.8819445ISBN:978-1-5386
 Cybersecurity Taxon title Cybersecurity
 RP 3.4 Energy monitoring and management in future manufacturing enterprises Taxon description Energy savings areas in the production environment have to be considered from different perspectives: component level, field level, machine level, process and plant level.
Show more information
Comments Agent-level Showcase. Machine-level Showcase.
 Daedalus proof-of-concept showcases - 5 Result title Daedalus proof-of-concept showcases - 5
 Daedalus proof-of-concept showcases - 4 Result description Daedalus proof-of-concept showcases - plant-level
 Structured Approach to the Design of Automation Systems through IEC 61499 Standard Result acronym Daedalus-588683
 Cybersecurity Taxon title Cybersecurity
 Field Device Comments Agent-level Showcase. Machine-level Showcase.
Show more information
Comments Cybersecurity ICT performance characteristics Resilience ICT performance characteristics Scalability ICT performance characteristics Work station Manufacturing system levels Manufacturing system levels
 Protocol interoperability of OPC UA in service oriented architectures Result description identifier: 10.1109/indin.2017.8104744ISBN:978-1-5386-0837-1
 Architectural Design Principles For Industrial Internet of Things Result acronym FAR-EDGE-588364
 Cybersecurity Taxon title Cybersecurity
 RP 2.13 M2M cloud connectivity for future manufacturing enterprises Taxon description It is currently estimated that we will have in the order of 50 billion connected devices by the year 2020.
Show more information
Description engineering and management, adapted to: existing automation and digitalisation engineering methodologies and tools new IoT and SoS automation and digitalisation engineering and management tools security
 Security Standard Compliance Verification in System of Systems Result title Security Standard Compliance Verification in System of Systems
 Eclipse Arrowhead Pitch Result description Market addressed with high level technology introduction.
Show more information
Comments Security and trust will be handled by the network layers below the data protocols.
 Domain 5: Human-centric manufacturing Taxon title Domain 5: Human-centric manufacturing
 RP 3.4 Energy monitoring and management in future manufacturing enterprises Taxon description Energy savings areas in the production environment have to be considered from different perspectives: component level, field level, machine level, process and plant level.
 ICT solutions for next generation data storage and information mining Comments Security and trust will be handled by the network layers below the data protocols.
Show more information
Organisation EVOLARIS NEXT LEVEL GMBH
 Towards a Resilient Society – Technology 5.0, Risks and Ethics Result title Towards a Resilient Society – Technology 5.0, Risks and Ethics
 RSS-Based DoA Estimation Using ESPAR Antenna Radiation Patterns Spline Interpolation Result description :978-1-5386-5635-8
Show more information
Description Now reaching this step requires due diligence to security implications.
Organisation AIRBUS CYBERSECURITY SAS (ACS)
Comments project_id_EC super_admin project_rcn_EC super_admin topic_EC super_admin ICT-08-2019 call_EC super_admin H2020-ICT-2019-2 Cybersecurity ICT performance characteristics Research & Innovation Action
 Review on Cybersecurity Threats Related to Cyber Ranges Result title Review on Cybersecurity Threats Related to Cyber Ranges
 Secure Collaborative Robotics (Cross-sectorial UC) Result description Still, some activities of lower added value could be automated, provided we come to a level of technology that enables robots: to progress in similar environments as humans (Aerospace shop floor
 Cybersecurity Taxon title Cybersecurity
Show more information
Comments upscaling (UPSCALE) UPSCALE - Assessment of technical readiness of both equipment and process for industrial use Success Factors Demonstration and upscaling (UPSCALE) UPSCALE - Address data protection/security
 External Communication Package for Open Source Domains Result description The control is possible to do on both high and low level.
 Autonomous /online/realtime Manufacturing Process Optimisation on machine level Taxon title Autonomous /online/realtime Manufacturing Process Optimisation on machine level
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result title CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result acronym CF_Final_Event_Cybersecurity
 Pathways alignment with National / Regional Initiatives - First Iteration Result description Conceptual and knowledge models to interrelate the EU-level CF pathways with National and Regional DEI initiatives. First iteration
Show more information
Comments and other resources in manufacturing systems FoF Partnership SRIA Research priorities Domain 5: Human-centric manufacturing RP 5.8 Enhanced Visualisation of complex Manufacturing and Production data
 Robotics Use Case Result description it is working according to the COMAU’s internal network and security policies.
 RP 3.5 Multi-level simulation and analytics for improving production quality and throughput Taxon title RP 3.5 Multi-level simulation and analytics for improving production quality and throughput
 RP 5.8 Enhanced Visualisation of complex Manufacturing and Production data Taxon description These data visualization systems should be role-based maintaining a level of abstraction and anonymisation based on viewer access levels.
Show more information
Description UPTIME will enable manufacturing companies to reach Gartner's level 4 of data analytics maturity (optimized decision-making) in order to improve physically-based models and to synchronise maintenance
Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
 Streaming Analytics in Edge-Cloud Environment for Logistics Processes Result description International PublishingPublished year: 2020Published pages: 245-253DOI identifier: 10.1007/978-3-030-57997-5_29ISBN:978-3-030-57996-8
 Platform level interoperability Taxon title Platform level interoperability
 Cloud computing Taxon description   Considerations need to be made to security measures in the cloud (kubernetes, container security), identity & access, or carefully considering the security measures by the respective
 AAA - Access, Authorisation and Authentication Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
Show more information
 Self-service business process modelling platform for interorganizational collaboration Result description BPMN), which aim to bring all users to the same (high) level of abstraction.
 RP 4.8 Multi-Enterprise Role-Based Access Control (mRBAC) in manufacturing enterprises Taxon description Development of security engines that are able to enforce security rules expressed in terms of roles and permissions on shared data and services during runtime and formal specifications of role hierarchies
Show more information
Comments Cybersecurity ICT performance characteristics Data Analytics and Complex Event Processing will deal with semantic interoperability and security at lower data acquisition layers Scalability ICT performance
 D3.1: DESIGN OF DECISION SUPPORT TOOLKIT Result description within the DISRUPT project to cover the project objectives and building upon the use case requirements and specifications, and c) to define on a methodological (and not on a technical or architectural) level
 Data Analysis and Knowledge Management in Industrie 4.0 Result acronym DISRUPT-589090
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems