Projects overview

Sort by


Show more information
Description material, part and components reuse) for the whole manufacturing sectors; ensure scalability for future scale of novel CM (Circular Manufacturing) technologies and services at least at the level
 Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance Result title Information Security Risk Assessment Methodology for Industrial Systems Supporting ISA/IEC 62443 Compliance
 Aerospace Pilot – Jet engine manufacturing & maintenance (GRC) Result description Such parts are expensive so storing a high level of stock for each of the thousands of parts is prohibitively expensive, as well as not matching the goal of low-waste circular manufacturing.
Show more information
Description strategies at component, work-station and shopfloor level.
Comments project_rcn_EC super_admin topic_EC super_admin DT-FOF-06-2019 call_EC super_admin H2020-NMBP-FOF-2019 Specific Objective 2: Circular products & Climate-neutral manufacturing MIE Consultation 2020 (Closed) LEVEL-UP
 LEVEL-UP's KBS Result title LEVEL-UP's KBS Result comments LEVEL-UP
 Periodic Reporting for period 3 - LEVEL-UP (Protocols and Strategies for extending the useful Life of major capital investments and Large Industrial Equipment) Result comments LEVEL-UP Result acronym LEVEL-UP-716545
 LEVEL-UP SoA analysis Result comments LEVEL-UP
 Data Management Plan (DMP) Result comments LEVEL-UP
 Protocols design and PSD report Result comments LEVEL-UP
 Project Website Result comments LEVEL-UP
 LEVEL-UP system architecture and Domain Model Result comments LEVEL-UP
 Incorporation of AUTOWARE and other Operating system into LEVEL-UP Digital Automation OS Result comments LEVEL-UP
 Life Cycle Assessment of a Circularity Case Study Using Additive Manufacturing Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at ESMA Result comments LEVEL-UP
 Domain-specific semantics for lifecycle of the equipment Result comments LEVEL-UP
 Integration Discipline and Incremental Strategy Result comments LEVEL-UP
 Report on end-of-life analysis and Recycling options Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at TRIM Result comments LEVEL-UP
 LEVEL-UP strategies Result comments LEVEL-UP
 In-line & in-process semantic dimensional metrology Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at MARL Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at CRF Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration ath THU Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at LUCC Result comments LEVEL-UP
 Technology Validation Plan Result comments LEVEL-UP
 LEVEL-UP Solution Validation through Demonstration at ISOK Result comments LEVEL-UP
 LEVEL-UP IoT/Edge middleware Result comments LEVEL-UP
 CBA and ROI optimisation Tool for decision making Result comments LEVEL-UP
 New Insight Into Crack-Healing Mechanism via Electropulsing Treatment Result comments LEVEL-UP
 Modified OEE Framework for Comprehensive Profitability Impact Assessment Result comments LEVEL-UP
 Virtual Sensor for Accuracy Monitoring in CNC Machines Result comments LEVEL-UP
 Circularity Protocols for Extending the Useful Lifetime of Obsolete Large Industrial Equipment and Assets Result comments LEVEL-UP
 PROFITABILITY IMPACT OF THE MACHINE VISION SYSTEM: CASE ANALYSIS Result comments LEVEL-UP
 Identifying Potentially Profitability Impact Areas of the Implementation of New Production Technology Result comments LEVEL-UP
 Virtueller Sensor zur Ãœberwachung von Schwingungen an spanenden Werkzeugmaschinen Result comments LEVEL-UP
 Development of a Digital Thread Tool for Extending the Useful Life of Capital Items in Manufacturing Companies - an Example Applied for the Refurbishment Protocol Result comments LEVEL-UP
 UNDERSTANDING USERS AND PRODUCTS IN PRODUCT DEVELOPMENT: THE APPLICATION OF PRODUCT USAGE INFORMATION AND ITS CHALLENGES Result comments LEVEL-UP
 A Systematic Procedure for Utilization of Product Usage Information in Product Development Result comments LEVEL-UP
 Modularer digitaler Zwilling für Werkzeugmaschinen Result comments LEVEL-UP
 Enhancement of the Virtual assets to reflect remedy actions Result comments LEVEL-UP
 Final Improved LEVEL-UP system at TRL7 Result comments LEVEL-UP
 Evaluation Methodology and Plan Result comments LEVEL-UP
 Consolidated Evaluation Report Result comments LEVEL-UP
Show more information
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result title The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result description The COLLABS Level-1 Security Package for Securely Connected Objects: MVP
 Domain 2: Adaptive and smart manufacturing systems Taxon description The set of research priorities under this domain focuses on innovative manufacturing equipment at component and system level, including mechatronics, control and monitoring systems The research priorities
Show more information
Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
 Efficiency Optimization of a Water Turbine via CFD Simulation on the Cloud Result description By increasing the accuracy of the CFD, Stellba can reduce the security margin for their efficiency guarantees, which increases the competitiveness in the market.
 RP 3.5 Multi-level simulation and analytics for improving production quality and throughput Taxon title RP 3.5 Multi-level simulation and analytics for improving production quality and throughput
 Domain 3: Digital, virtual and resource-efficient factories Taxon description A prerequisite for advanced factory lifecycle management is the availability of an integrated and scalable factory model with multi-level semantic access to features, aggregation of data with different
 Number of participating SMEs Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
Show more information
Comments Manufacturing Process Optimisation on factory level Pathways Off-line optimisation Autonomous Smart Factories Pathway Optimization on security level and safety monitoring Autonomous /online/realtime
 Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms Result title Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms Result description engines listed on this page.Authors: Enrico Ferrera, Rosaria Rossini, Davide Conzon, Sandro Tassone, Claudio PastroneJournal title: 2016 8th IFIP International Conference on New Technologies, Mobility and Security
 Off-line Digital Manufacturing Process Optimisation on factory level Taxon title Off-line Digital Manufacturing Process Optimisation on factory level
 Domain 5: Human-centric manufacturing Taxon description At the core of future manufacturing is the information generated in the factory environment, which needs to be managed and adequately transformed from the data level to the knowledge level.
Show more information
Comments framework Interoperability (ICT) 5G, WirelessHart Operating systems Technologies and enablers Information and communication technologies ROS (http://www.ros.org/ ) Cybersecurity ICT performance characteristics
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description Moreover, the potential of the developed 5G Security enablers will be showcased and demonstrated in the context of carefully selected 5G security use cases (e.g. use cases related to cybersecurity and
Comments Manufacturing system levels Work station Manufacturing system levels Manufacturing system levels Connected Enterprises - Factories Manufacturing system levels Manufacturing system levels Connecting
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature Result acronym 5G Security Architecture
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description In order to achieve these results, the proposed approach relies on a Smart Objects Technology (named Smart Control System) deployed at factory level and on the concept of cloud-enabled Central Application
Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
 Foresee Cluster - Predictive maintenance technologies for production systems. A roadmap to development and implementation. Result description The core target groups of this report are industry practitioners, people in academia and policy makers at the local, national and EU levels.
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Process reliability - dependability - availability Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
Show more information
Description engineering and management, adapted to: existing automation and digitalisation engineering methodologies and tools new IoT and SoS automation and digitalisation engineering and management tools security
 Security Standard Compliance Verification in System of Systems Result title Security Standard Compliance Verification in System of Systems
 Eclipse Arrowhead Pitch Result description Market addressed with high level technology introduction.
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result title CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result acronym CF_Final_Event_Cybersecurity
 Pathways alignment with National / Regional Initiatives - First Iteration Result description Conceptual and knowledge models to interrelate the EU-level CF pathways with National and Regional DEI initiatives. First iteration
Show more information
Description Now reaching this step requires due diligence to security implications.
Organisation AIRBUS CYBERSECURITY SAS (ACS)
Comments project_id_EC super_admin project_rcn_EC super_admin topic_EC super_admin ICT-08-2019 call_EC super_admin H2020-ICT-2019-2 Cybersecurity ICT performance characteristics Research & Innovation Action
 Review on Cybersecurity Threats Related to Cyber Ranges Result title Review on Cybersecurity Threats Related to Cyber Ranges
 Secure Collaborative Robotics (Cross-sectorial UC) Result description Still, some activities of lower added value could be automated, provided we come to a level of technology that enables robots: to progress in similar environments as humans (Aerospace shop floor
 Cybersecurity Taxon title Cybersecurity
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments Human & technology complementarity and excellence in manufacturing MIE Consultation 2020 (Closed) Specific Objective 4: Human-centered and human-driven manufacturing innovation Manufacturing system levels
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description UPTIME will enable manufacturing companies to reach Gartner's level 4 of data analytics maturity (optimized decision-making) in order to improve physically-based models and to synchronise maintenance
Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
 Foresee Cluster - Predictive maintenance technologies for production systems. A roadmap to development and implementation. Result description The core target groups of this report are industry practitioners, people in academia and policy makers at the local, national and EU levels.
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls. Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
Show more information
Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
 R&I Objective 4.1: Digital platforms and engineering tools supporting creativity and productivity of manufacturing development Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
Show more information
Description STAR will eliminate security and safety barriers against deploying sophisticated AI systems in production lines.
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 On-the-fly image-level oversampling for imbalanced datasets of manufacturing defects Result title On-the-fly image-level oversampling for imbalanced datasets of manufacturing defects
 Security and Data Governance Infrastructure-Initial version Result description Prototype implementation of the data governance and security policy management infrastructure of task T34 M17 Initial version
Show more information
Description from a Distributed Multi-sensor Network, which, when combined with a DQM Toolkit and Modeling and Simulation Layer, and further integrated with existing Cyber-Physical Systems (CPS), offers adequate levels
 A decade of research on patterns and architectures for IoT security Result title A decade of research on patterns and architectures for IoT security
 A Systematic Review of Secure IoT Data Sharing Result description pre-formated search via the search engines listed on this page.Authors: Thanh Thao Thi Tran, Phu Nguyen, Gencer ErdoganJournal title: Proceedings of the 9th International Conference on Information Systems Security
Show more information
Comments Manufacturing system levels Manufacturing system levels Enterprise - Factory Manufacturing system levels Manufacturing system levels Connected Enterprises - Factories Manufacturing system levels Manufacturing
 D2.9: Requirements Analysis and User Stories Result description This deliverable will be a joint document for the requirements of all project components divided into strategic high level functional and technical requirements
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description state-of-the-art R&I advances in the fields of Internet of Things, Future Internet and CPS / Smart Systems and able to bi-directionally interoperate data pertaining to the machine, the factory and the cloud levels
Comments General interoperability framework Interoperability (ICT) Cybersecurity ICT performance characteristics Manufacturing system levels Manufacturing system levels Field Device Manufacturing system levels
 D3.3b Virtual World BEinCPPS components Result description Components deployed at Cloud level
 D3.3a Virtual World BEinCPPS components Result description Components deployed at Cloud level
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems