Automatic generation of field control strategies for supporting (Re-)engineering of manufacturing systems

Christoph Legat, Daniel Schütz, Birgit Vogel-Heuser

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

This paper presents an approach to enable automatic identification and generation of operation strategies for field-level automation software of manufacturing systems. Contrary to the traditional way of implementing field control software, we suggest the modelling and implementation of machine capabilities as basic operations. Driven by the idea to describe what a system is able to do in contrast to traditional formulation of processes in automation software engineering, it is possible to derive necessary sequences of control operations automatically. This results in a framework for automatic generation of such operation strategies to limit the re-engineering effort of field-level automation control software in case of changed requirements caused by modifications of the technical system.

Original languageEnglish
Title of host publicationProceedings - INCOM'12, 14th IFAC Symposium on Information Control Problems in Manufacturing
PublisherIFAC Secretariat
Pages1574-1579
Number of pages6
EditionPART 1
ISBN (Print)9783902661982
DOIs
StatePublished - 2012
Event14th IFAC Symposium on Information Control Problems in Manufacturing, INCOM'12 - Bucharest, Romania
Duration: 23 May 201225 May 2012

Publication series

NameIFAC Proceedings Volumes (IFAC-PapersOnline)
NumberPART 1
Volume14
ISSN (Print)1474-6670

Conference

Conference14th IFAC Symposium on Information Control Problems in Manufacturing, INCOM'12
Country/TerritoryRomania
CityBucharest
Period23/05/1225/05/12

Keywords

  • Factory automation
  • Ontology
  • Planning
  • Programmable logic controllers
  • Reasoning
  • Software engineering

Fingerprint

Dive into the research topics of 'Automatic generation of field control strategies for supporting (Re-)engineering of manufacturing systems'. Together they form a unique fingerprint.

Cite this