scholarly journals Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications

Information ◽  
2021 ◽  
Vol 12 (12) ◽  
pp. 529
Author(s):  
Stefan A. Aebersold ◽  
Mobayode O. Akinsolu ◽  
Shafiul Monir ◽  
Martyn L. Jones

In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for the ubiquitous control of industrial machines. As a PoC, the proposed system provides useful insights to support the further development of full-fledged systems for Industrial Internet of Things (IIoT) applications. The proposed system allows for the quasi-decentralisation of the control architecture of conventional programmable logic controller (PLC)-based industrial control systems (ICSs) through data and information exchange over the transmission control protocol and the internet protocol (TCP/IP) suite using multiple agents. Based on the TCP/IP suite, a network device (Samsung Galaxy Tablet S2) and a process field net (PROFINET) device (Siemens Simatic S7-1200) are interfaced using a single-board computer (Raspberry Pi 4). An override system mainly comprising emergency stop and acknowledge buttons is also configured using the single-board computer. The input signals from the override system are transmitted to the PROFINET device (i.e., the industrial control unit (ICU)) over TCP/IP. A fully functional working prototype is realised as a PoC for an integrated system designated for the wireless and ubiquitous control of the CNC machine. The working prototype as an entity mainly comprises a mobile (handheld) touch-sensitive human-machine interface (HMI), a shielded single-board computer, and an override system, all fitted into a compact case with physical dimensions of 300 mm by 180 mm by 175 mm. To avert potential cyber attacks or threats to a reasonable extent and to guarantee the security of the PoC, a multi-factor authentication (MFA) including an administrative password and an IP address is implemented to control the access to the web-based ubiquitous HMI proffered by the PoC.

Author(s):  
Xiaolei Deng ◽  
Jianzhong Fu ◽  
Yuwen Zhang

In order to obtain the thermal characteristics of the spindle–bearing integrated system of the computer numerical control (CNC) machine tools effectively, a mathematical model is established by employing the heat source method (HSM). The thermal characteristics of spindle–bearing system are identified by using the derived mathematical formula, and the presented model is validated by the finite element method (FEM) under four types of conditions corresponding to different heat intensities, heat transfer coefficients, geometrical model sizes, and heat source positions. Compared with the FEM, the presented model has better computational efficiency. The temperature fields of the two spindle systems of a CNC machine tool are predicted by using the present model. The predicted temperature field is compared with the measured data and results show that the maximum relative errors for the two systems are 0.41% and 8.38%, respectively. The proposed model has a potential to be applied in calculating temperature field and thermal deformation or other related engineering area.


2020 ◽  
Vol 12 (2) ◽  
pp. 104-109
Author(s):  
Dušan Nedeljković ◽  
Živana Jakovljević ◽  
Zoran Miljković ◽  
Miroslav Pajić

Concept of Industry 4.0 and implementation of Cyber Physical Systems (CPS) and Internet of Things (IoT) in industrial plants are changing the way we manufacture. Introduction of industrial IoT leads to ubiquitous communication (usually wireless) between devices in industrial control systems, thus introducing numerous security concerns and opening up wide space for potential malicious threats and attacks. As a consequence of various cyber-attacks, fatal failures can occur on system parts or the system as a whole. Therefore, security mechanisms must be developed to provide sufficient resilience to cyber-attacks and keep the system safe and protected. In this paper we present a method for detection of attacks on sensor signals, based on e insensitive support vector regression (e-SVR). The method is implemented on publicly available data obtained from Secure Water Treatment (SWaT) testbed as well as on a real-world continuous time controlled electro-pneumatic positioning system. In both cases, the method successfully detected all considered attacks (without false positives).


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3119 ◽  
Author(s):  
Abdelouahid Derhab ◽  
Mohamed Guerroumi ◽  
Abdu Gumaei ◽  
Leandros Maglaras ◽  
Mohamed Amine Ferrag ◽  
...  

The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be adopted. In this paper, we focus on the security of commands in industrial IoT against forged commands and misrouting of commands. To this end, we propose a security architecture that integrates the Blockchain and the Software-defined network (SDN) technologies. The proposed security architecture is composed of: (a) an intrusion detection system, namely RSL-KNN, which combines the Random Subspace Learning (RSL) and K-Nearest Neighbor (KNN) to defend against the forged commands, which target the industrial control process, and (b) a Blockchain-based Integrity Checking System (BICS), which can prevent the misrouting attack, which tampers with the OpenFlow rules of the SDN-enabled industrial IoT systems. We test the proposed security solution on an Industrial Control System Cyber attack Dataset and on an experimental platform combining software-defined networking and blockchain technologies. The evaluation results demonstrate the effectiveness and efficiency of the proposed security solution.


2016 ◽  
Vol 12 (2) ◽  
pp. 48
Author(s):  
Darmawan Darmawan ◽  
Pharmayeni Pharmayeni

The use of computer technology in manufacturing industries can improve manufacturing flexibility significantly, especially in manufacturing processes; many software applications have been utilized to improve machining performance. However, none of them has discussed the abilities to perform direct machining. In this paper, an integrated system for remote operation and monitoring of Computer Numerical Control (CNC) machines is put into consideration. The integrated system includes computerization, network technology, and improved holding mechanism. The work proposed by this research is mainly on the software development for such integrated system. It uses Java three-dimensional (3D) programming and Virtual Reality Modeling Language (VRML) at the client side for visualization of machining environment. This research is aimed at developing a control system to remotely operate and monitor a self-reconfiguration fixture mechanism of a CNC milling machine through internet connection and integration of Personal Computer (PC)-based CNC controller, a server side, a client side and CNC milling. The performance of the developed system was evaluated by testing with one type of common protocols particularly User Datagram Protocol (UDP).  Using UDP, the developed system requires 3.9 seconds to complete the close clamping, less than 1 second to release the clamping and it can deliver 463 KiloByte.


Materials ◽  
2021 ◽  
Vol 14 (14) ◽  
pp. 3819
Author(s):  
Ting-Hsun Lan ◽  
Yu-Feng Chen ◽  
Yen-Yun Wang ◽  
Mitch M. C. Chou

The computer-aided design/computer-aided manufacturing (CAD/CAM) fabrication technique has become one of the hottest topics in the dental field. This technology can be applied to fixed partial dentures, removable dentures, and implant prostheses. This study aimed to evaluate the feasibility of NaCaPO4-blended zirconia as a new CAD/CAM material. Eleven different proportional samples of zirconia and NaCaPO4 (xZyN) were prepared and characterized by X-ray diffractometry (XRD) and Vickers microhardness, and the milling property of these new samples was tested via a digital optical microscope. After calcination at 950 °C for 4 h, XRD results showed that the intensity of tetragonal ZrO2 gradually decreased with an increase in the content of NaCaPO4. Furthermore, with the increase in NaCaPO4 content, the sintering became more obvious, which improved the densification of the sintered body and reduced its porosity. Specimens went through milling by a computer numerical control (CNC) machine, and the marginal integrity revealed that being sintered at 1350 °C was better than being sintered at 950 °C. Moreover, 7Z3N showed better marginal fit than that of 6Z4N among thirty-six samples when sintered at 1350 °C (p < 0.05). The milling test results revealed that 7Z3N could be a new CAD/CAM material for dental restoration use in the future.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 911
Author(s):  
Vlad Mihaly ◽  
Mircea Şuşcă ◽  
Dora Morar ◽  
Mihai Stănese ◽  
Petru Dobra

The current article presents a design procedure for obtaining robust multiple-input and multiple-output (MIMO) fractional-order controllers using a μ-synthesis design procedure with D–K iteration. μ-synthesis uses the generalized Robust Control framework in order to find a controller which meets the stability and performance criteria for a family of plants. Because this control problem is NP-hard, it is usually solved using an approximation, the most common being the D–K iteration algorithm, but, this approximation leads to high-order controllers, which are not practically feasible. If a desired structure is imposed to the controller, the corresponding K step is a non-convex problem. The novelty of the paper consists in an artificial bee colony swarm optimization approach to compute the nearly optimal controller parameters. Further, a mixed-sensitivity μ-synthesis control problem is solved with the proposed approach for a two-axis Computer Numerical Control (CNC) machine benchmark problem. The resulting controller using the described algorithm manages to ensure, with mathematical guarantee, both robust stability and robust performance, while the high-order controller obtained with the classical μ-synthesis approach in MATLAB does not offer this.


Materials ◽  
2021 ◽  
Vol 14 (11) ◽  
pp. 2913
Author(s):  
Rafał Gołębski ◽  
Piotr Boral

Classic methods of machining cylindrical gears, such as hobbing or circumferential chiseling, require the use of expensive special machine tools and dedicated tools, which makes production unprofitable, especially in small and medium series. Today, special attention is paid to the technology of making gears using universal CNC (computer numerical control) machine tools with standard cheap tools. On the basis of the presented mathematical model, a software was developed to generate a code that controls a machine tool for machining cylindrical gears with straight and modified tooth line using the multipass method. Made of steel 16MnCr5, gear wheels with a straight tooth line and with a longitudinally modified convex-convex tooth line were machined on a five-axis CNC milling machine DMG MORI CMX50U, using solid carbide milling cutters (cylindrical and ball end) for processing. The manufactured gears were inspected on a ZEISS coordinate measuring machine, using the software Gear Pro Involute. The conformity of the outline, the tooth line, and the gear pitch were assessed. The side surfaces of the teeth after machining according to the planned strategy were also assessed; the tests were carried out using the optical microscope Alicona Infinite Focus G5 and the contact profilographometer Taylor Hobson, Talysurf 120. The presented method is able to provide a very good quality of machined gears in relation to competing methods. The great advantage of this method is the use of a tool that is not geometrically related to the shape of the machined gear profile, which allows the production of cylindrical gears with a tooth and profile line other than the standard.


2021 ◽  
Vol 13 (3) ◽  
pp. 168781402110027
Author(s):  
Byung Chul Kim ◽  
Ilhwan Song ◽  
Duhwan Mun

Manufacturers of machine parts operate computerized numerical control (CNC) machine tools to produce parts precisely and accurately. They build computer-aided manufacturing (CAM) models using CAM software to generate code to control these machines from computer-aided design (CAD) models. However, creating a CAM model from CAD models is time-consuming, and is prone to errors because machining operations and their sequences are defined manually. To generate CAM models automatically, feature recognition methods have been studied for a long time. However, since the recognition range is limited, it is challenging to apply the feature recognition methods to parts having a complicated shape such as jet engine parts. Alternatively, this study proposes a practical method for the fast generation of a CAM model from CAD models using shape search. In the proposed method, when an operator selects one machining operation as a source machining operation, shapes having the same machining features are searched in the part, and the source machining operation is copied to the locations of the searched shapes. This is a semi-automatic method, but it can generate CAM models quickly and accurately when there are many identical shapes to be machined. In this study, we demonstrate the usefulness of the proposed method through experiments on an engine block and a jet engine compressor case.


2011 ◽  
Vol 105-107 ◽  
pp. 2217-2220
Author(s):  
Mu Lan Wang ◽  
Jian Min Zuo ◽  
Kun Liu ◽  
Xing Hua Zhu

In order to meet the development demands for high-speed and high-precision of Computer Numerical Control (CNC) machine tools, the equipped CNC systems begin to employ the technical route of software hardening. Making full use of the advanced performance of Large Scale Integrated Circuits (LSIC), this paper puts forward using Field Programmable Gates Array (FPGA) for the functional modules of CNC system, which is called Intelligent Software Hardening Chip (ISHC). The CNC system architecture with high performance is constructed based on the open system thought and ISHCs. The corresponding programs can be designed with Very high speed integrate circuit Hardware Description Language (VHDL) and downloaded into the FPGA. These hardening modules, including the arithmetic module, contour interpolation module, position control module and so on, demonstrate that the proposed schemes are reasonable and feasibility.


Sign in / Sign up

Export Citation Format

Share Document