| |
Last updated on September 14, 2020. This conference program is tentative and subject to change
Technical Program for Thursday September 24, 2020
|
ThL1P |
Live Sessions |
Innovation for New Value Creation in Manufacturing I |
Organized Session |
Chair: Ito, Akio | Yokogawa Electric Corporation |
Co-Chair: Takayanagi, Yoichi | Toshiba Corporation |
Organizer: Ito, Akio | Yokogawa Electric Corporation |
Organizer: Yamada, Tsutomu | Hitachi, Ltd |
Organizer: Fujita, Junya | Hitachi., Ltd |
Organizer: Takayanagi, Yoichi | Toshiba Corporation |
Organizer: Kumagai, Kenji | The University of Electro-Communications / Murata Machinery, Ltd |
|
09:00-09:15, Paper ThL1P.1 | |
A New Methodology for Providing Insight into Manufacturing Using KPIs Based on SMKL (Smart Manufacturing Kaizen Level), Utilizing Industry Standards (OPC UA, FDT, PLCopen and AutomationML) (I) |
|
Fujishima, Mitsushiro | Mitsubishi Electric Corporation |
Ueda, Shinobu | Tachibana Eletech Co., LTD |
Yoneda, Hisato | DELMIA |
Yoshizawa, Takashi | Software Products |
Ito, Akio | Yokogawa Electric Corporation |
Takeuchi, Tetsuo | Yokogawa Electric Corporation |
Chino, Shinichiro | Mitsubishi Electric Corporation |
Kitayama, Kenji | Mitsubishi Electric Corporation |
Ono, Toshio | Yokogawa Electric Corporation |
Matsukuma, Takashi | OMRON Corporation |
Yoshida, Hiroshi | Omron Corporation |
Okuda, Makoto | Kanagawa Institute of Industrial Science and Technology |
Kumagai, Kenji | The University of Electro-Communications / Murata Machinery, Ltd |
Keywords: Factory Automation, Manufacturing Systems, SCADA and Network Systems
Abstract: This paper presents a new methodology for providing insight into manufacturing using key performance indicators (KPIs), and to achieve a Smart Manufacturing (SM) using a simple indicator. This indicator is very easy to understand for factory owner, production manager and installation staff, and so on. It is Smart Manufacturing Kaizen Level (SMKL). I4.0 was announced by Germany in 2011. Also, Industrial IoT and SM has become a global trend now. Various consortiums related to this trend have been established in each country, such as PI4.0, IIC, RRI and IVI. There are very significant discussions in every consortium. However, there are some issues to achieve a SM. First, it is difficult for factory owners to understand the Return on Investment (ROI), and to make the decisions of continuous investment. Second, especially for Small and Medium Enterprises (SMEs), the company has few or no IIoT experts and only limited consultants who can support the SM. By using SMKL, factory owner will be possible to understand the ROI, and to make the decisions of continuous investment. In addition, SM system can be easily constructed by using the international standardization technology for industry (OPC UA, FDT®, PLCopen®, AutomationML). In this paper, we propose a use case for SMKL and created a demonstration using miniature machines and 3D simulator and proved the effectiveness of our proposal. Also, it is concluded that SMKL use case takes important role to assist the MBSE approach for SM.
|
|
09:15-09:30, Paper ThL1P.2 | |
Evaluation of Analyzed Data for Maintenance (I) |
|
Minemura, Kesaaki | Sumitomo Heavy Industries, Ltd |
Akashi, Tomoyuki | Machine for Human Labo |
Keywords: Standard of Measurement, Signal and/or Image Processing
Abstract: Expanding (of) ICT, machines and its components are (able to be) connected with cloud, data base and data center. In the field of machine condition maintenance, future smart maintenance technology activities called smart maintenance with CBM (Condition Based Monitoring) are working on. The overview of smart maintenance and signal processing method are introduced. For following smart maintenance, development of evaluation method is required. Because CBM criteria is based on machine component domain like design information, machine component operating data and machine component condition. Further, there is a problem that it is difficult to uniformly set a criteria because a mechanical component operation is depending on an operating condition and its environment. In this paper, new initiatives of evaluation method for smart maintenance are proposed.
|
|
09:30-09:45, Paper ThL1P.3 | |
Spindle-Less Embedded Computer Appropriate for CPS Platform (I) |
|
Komiyama, Takuya | Toshiba Infrastructure Systems & Solutions Corp |
Takayanagi, Yoichi | Toshiba Corporation |
Keywords: Components and Devices
Abstract: For realizing Smart Manufacturing, utilization of Internet of Things (IoT) is being greatly advanced. IoT for industrial use is called Industrial IoT (IIoT), and widely applied in the infrastructure-based industries such as petrochemical plants, water supply and wastewater management, and building management etc. IIoT has been enabled to connect various devices and equipment installed in the field (Physical space) to the data era (Cyber space) via the network,and construction of next-generation system with such connections has been progressed. Such a system is called Cyber Physical System (CPS), and various data from the connected devices are collected, stored, processed, and fed them back to the system to improve the system efficiency. In order to construct a more advanced CPS, it is necessary to connect more field devices to the system and collect more data. Therefore, IIoT devices which is installed to CPS has been facing complicated requirement such as, connectivity which enables existing devices to connect to the system, robustness which support long-term continuous operation of the system, and spindle-less which can minimize system downtime due to preventive maintenance and repair.
|
|
09:45-10:00, Paper ThL1P.4 | |
Industrial Control Product(s) with Visualizing Technology Appropriate for CPS Platform (I) |
|
Tangtrustham, Pattavisa | Toshiba Infrastructure Systems & Solutions Corporation |
Okabe, Motohiko | Toshiba Corporation |
Takayanagi, Yoichi | Toshiba Corporation |
Keywords: Components and Devices, Process Automation
Abstract: In the growth of the Internet of Things (IoT) and Smart Manufacturing, manufacturing sites are undergoing a shift towards the Industrial IoT(IIoT) era in which collecting, storing, and processing data in factories and infrastructure facilities via Internet has been integrated. Approaching that, Cyber-Physical Systems (CPS) has been applied, to allow link creation between physical and digital, effectively utilize a big amount of data in plants and factories. With a purpose to become compatible with CPS platform, draws with edge computing to persuade the requirements. Toshiba Infrastructure Systems & Solutions Corporation has elaborately designed and developed the state-of-the-art control product(s) named the Unified Controller Vm series, using virtualizing technology based and integrated from previous control products. Which makes itself possible to connect with multiple network systems, and controller functions assigned separately into each central processing unit (CPU), involving a multiple PLC system.
|
|
10:00-10:15, Paper ThL1P.5 | |
Leveraging IT Technology into FDT3 Specification Realizes FITS Architecture (I) |
|
Hadlich, Thomas | Rockwell Automation GmbH |
Gundel, Manfred | M&M Software GmbH |
Chan, Sin Wai | Yokogawa Engineering Asia Pte Ltd |
Schulz, Glenn | FDT Group |
Takeuchi, Tetsuo | Yokogawa Electric Corporation |
Ito, Akio | Yokogawa Electric Corporation |
Keywords: Process Automation, Factory Automation, SCADA and Network Systems
Abstract: FDT (IEC62453) is a technology which allows integration of devices and networks to engineering tools, e.g. for industrial control systems (ICS) and asset management systems. This paper introduces the latest FDT3 (FDT version 3) technical specification which enables the FDT IIoT Server™ (FITS™) concept. FDT3 addresses end user requirements (total platform independence, support of fieldbus protocols, centralized DTM repository, NAMUR Open Architecture). This paper provides an overview of the FITServer and its components, including OPC UA Server and a Web Server, and how to get started with FITS development with FITServer Common Components.
|
|
ThL2P |
Live Sessions |
Innovation for New Value Creation in Manufacturing II |
Organized Session |
Chair: Yamada, Tsutomu | Hitachi, Ltd |
Co-Chair: Fujita, Junya | Hitachi., Ltd |
Organizer: Ito, Akio | Yokogawa Electric Corporation |
Organizer: Yamada, Tsutomu | Hitachi, Ltd |
Organizer: Fujita, Junya | Hitachi., Ltd |
Organizer: Takayanagi, Yoichi | Toshiba Corporation |
Organizer: Kumagai, Kenji | The University of Electro-Communications / Murata Machinery, Ltd |
|
10:30-10:45, Paper ThL2P.1 | |
Security Introduction Framework for Operational Technologies and Applying to Industrial Control System (I) |
|
Yamada, Tsutomu | Hitachi, Ltd |
Nakano, Toshihiko | Hitachi |
Kaji, Tadashi | Hitachi, Ltd |
Tano, Shunichi | The University of Electro-Communication |
Keywords: Innovative Systems Approach for Realizing Smarter World, SCADA and Network Systems, Information Management Systems
Abstract: Business owners of control systems have to ensure their system operations are protected from various security threats. Especially for control systems in critical infrastructures, business owners should deploy security countermeasures that fulfill mission assurance to continue their business function. The purpose of this paper is to introduce security measures that enable business continuation along with satisfying mission assurance. The proposed security introduction framework in this paper enables business owners of control systems to obtain exhaustive security measures from the viewpoint of technical, operational, and management aspects with reasonable effort. The proposed security introduction framework can be applied to a wide variety of control systems.
|
|
10:45-11:00, Paper ThL2P.2 | |
Investigation of Cyber Attack Emulation Methodology for Industrial Control Systems (I) |
|
Fujita, Junya | Hitachi., Ltd |
Ogura, Takashi | Hitachi Ltd |
Matsumoto, Noritaka | Hitachi, Ltd |
Kaneko, Osamu | The University of Electro-Communications |
Sawada, Kenji | The University of Electro-Communications |
Keywords: System Engineering
Abstract: To identify cyber threats is critical for securing industrial control systems (ICSs) effectively. However, it is difficult to identify threats for target ICSs without knowledge of cybersecurity professionals and hard for ICS engineers to achieve the process. This process can be automated with "cyber attack emulation" technology. The key components to realize cyber attack emulation technology is threat modeling methodologies and application of them. This paper provides a possible framework for ICS cyber attack emulation based on threat modeling methodologies.
|
|
11:00-11:15, Paper ThL2P.3 | |
Method of Asset-Configuration Management for Strengthening Cybersecurity of Industrial Control Systems (I) |
|
Matsumoto, Noritaka | Hitachi, Ltd |
Fujita, Junya | Hitachi., Ltd |
Endoh, Hiromichi | Hitachi, Ltd |
Yamada, Tsutomu | Hitachi, Ltd |
Sawada, Kenji | The University of Electro-Communications |
Kaneko, Osamu | The University of Electro-Communications |
Keywords: Intelligent Systems, System Engineering, SCADA and Network Systems
Abstract: If industrial assets such as programmable logic controllers (PLCs) and field devices such as sensors and actuators, which make up control systems, are networked via the IoT (Internet of Things), cyber-security measures will become an issue. To implement effective security measures, configuration management of each asset is important. It is therefore a goal to appropriately manage information concerning the installed software and settings information related with the network and system passwords. Unlike IT systems, however, control systems consist of a multitude of assets, which are difficult to systematically manage. It is also a problem that when the asset-configuration management is automated, the original control function may be hindered. In this study, therefore, we model various asset-configurations for a control system and design a data structure based on SCAP (Security Content Automation Protocol). We also propose an “asset-configuration-management agent” that incurs low processing load. As a result of prototyping and evaluating this agent, we have demonstrated that (i) its effect on real-time control can be suppressed and (ii) asset-configuration management can be automated.
|
|
11:15-11:30, Paper ThL2P.4 | |
Requirements for IT/OT Cooperation in Safe and Secure IACS (I) |
|
Kanamaru, Hiroo | Mitsubishi Electric Corporation |
Keywords: Safety, Environment and Eco-Systems, System Engineering, SCADA and Network Systems
Abstract: Recently, cyber security of safety instruments systems (SIS) are become important issues. SIS has a critical roles to protect industrial plants and industrial automation control systems (IACS). If security threats make the safety functions disabled and degraded, serious or fatal accidents would occur in the plant. Even without an accident, the threats could down its operation of manufacturing or degrade social infrastructure services. SIS which is a part of IACS shall perform two functions, functional safety and cyber security. To achieve both functions in IACS has been a difficult problem because each has been based on independent technologies and standards. IEC TR 63069: 2019 had been developed to report a technical study on the compatibility between them, and described the terms, concepts and development. However, IT/OT (Information Technology and Operational Technology) cooperation was not yet sufficiently discussed because of the lack of experiments. For example, modifications, impact analysis, patch managements, incident response and plan to recover. This paper considers the cooperation functions of IACS during incident response against cyber attack, and especially proposes IT/OT operational functions of IACS engineering tool.
|
|
11:30-11:45, Paper ThL2P.5 | |
A Consideration of White List Creating Algorithm for Industrial Network Protocols at Network Switch (I) |
|
Enomoto, Masatoshi | Yokohama College of Commerce |
Hosokawa, Shu | Control System Security Center |
Sawada, Kenji | The University of Electro-Communications |
Keywords: System Engineering, Information Management Systems, SCADA and Network Systems
Abstract: In a control system, a network is often constructed because a central monitoring room monitors the status of control devices and sensors arranged in a wide area. Information from control devices and sensors is transmitted to the central monitoring room using a specific communication protocol. Therefore, many sensors and control devices can be accessed from outside by connecting to a system in the central monitoring room or via a computer in the central monitoring room. Attackers can take over control systems and gather information without the risk of physical intrusion. In order to avoid such vulnerabilities, it is necessary to introduce a defense method into the system, but it is difficult to introduce a system used in the information system due to the characteristics of the control system. We will examine the defense method considering the characteristics of the control system. In this paper, we focus on communications performed between control devices and sensors, and consider a white listing protection method that defines communications that are transferred by network switches. In particular, an object of the present invention is to protect against an attack due to connection of an unauthorized device and an attack for performing unauthorized communication from an authorized devices. In addition, in generating a white list, we discuss functions necessary to reduce the generation cost and management cost.
|
|
ThL3P |
Live Sessions |
Recent Advances in the Control of Renewable Energy Management Systems:
Distributed and Multi-Layer Systems Design |
Organized Session |
Chair: Kojima, Akira | Tokyo Metropolitan University |
Co-Chair: Imura, Jun-ichi | Tokyo Institute of Technology |
Organizer: Kojima, Akira | Tokyo Metropolitan University |
Organizer: Imura, Jun-ichi | Tokyo Institute of Technology |
|
14:30-14:45, Paper ThL3P.1 | |
Monotonicity Analysis for Optimal Scheduling of Storage Batteries and Power Generators - Considering Ramp Limit of Thermal Power Plant - (I) |
|
Koike, Masakazu | Tokyo University of Marine Science and Technology |
Ishizaki, Takayuki | Tokyo Institute of Technology |
Imura, Jun-ichi | Tokyo Institute of Technology |
Keywords: Power Systems Control
Abstract: This paper focuses on a day-ahead scheduling problem on power generation of thermal power plants and charge/discharge (C/D) of battery energy storage systems based on the information of the interval prediction of photovoltaic (PV) /demand power. Our purpose is to obtain an exact range of each optimal operation schedule for any possible PV/demand profiles of the interval prediction. If the solution is monotonically increasing or decreasing with respect to the parameter, we can easily find the exact range of the solution in a finite number of trials. In order to obtain the exact range, it is important to find out what problem possesses monotonicity. In previous work, we have shown that monotonicity is preserved in various power system settings. However, it is not clear whether monotonicity is preserved for the problem considering ramp limit of the thermal power plant. Thus, we investigate whether monotonicity is preserved for this problem by using numerical simulation.
|
|
14:45-15:00, Paper ThL3P.2 | |
Tightening Theoretical Error Bound for Multi-Variable Stochastic Linearization Via Scaling (I) |
|
Ito, Kaito | Kyoto University |
Kashima, Kenji | Kyoto University |
Ohta, Yoshito | Kyoto University |
Keywords: Modeling, System Identification and Estimation, Multivariable Control
Abstract: In our previous paper, we proposed a stable process approach to model dynamics under heavy-tailed noise. In this framework, stochastic linearization is a powerful tool to evaluate the systems' stationary fluctuation. In this paper, we give a method to tighten the error bound of the linearization by means of scaling.
|
|
15:00-15:15, Paper ThL3P.3 | |
Structured-Learning of Bi-Layered Controller with Safety Guarantee for Large-Scale Social Infrastructures (I) |
|
Homma, Toshiki | Keio University |
Inoue, Masaki | Keio University |
Imura, Jun-ichi | Tokyo Institute of Technology |
Urata, Kengo | NTT Laboratories |
Keywords: Adaptive and Optimal Control, Power Systems Control
Abstract: In real-world social infrastructures, reliable controllers such as load-frequency control for power systems are already implemented and work well. To further improve the control performance in a reliable manner, bi-layered control with inheriting the exiting controller is proposed: the existing controller generates the reference control signal in the upperlayer, and multiple sub-controllers individually coordinate the reference in the lower-layer to actuate the infrastructure system. The coordination is characterized by designable parameters that represent the degree of the interlayer connection. Then, the learning strategy of the parameter with guaranteeing the safety of the overall system is proposed.
|
|
15:15-15:30, Paper ThL3P.4 | |
A Performance Analysis of Preview Load Frequency Control in Terms of Prediction Length and Accuracy (I) |
|
Miyamoto, Fuga | Tokyo Metropolitan University |
Hashikura, Kotaro | Gunma University |
Kojima, Akira | Tokyo Metropolitan University |
Masuta, Taisuke | Meijo University |
Keywords: Power Systems Control, Robust Control
Abstract: Recent years, it is expected that the penetration of renewable energy enables to save the fossil fuel and prevent global warming. However, the power generation output depends on the surrounding environment, and the balancing of power demand/supply is a key problem for the introduction of a large amount of renewable energy. In this paper, we focus on a design method of H2 type preview load frequency control (LFC) and evaluate the achievable performance from the viewpoint of prediction length and information accuracy.
|
|
15:30-15:45, Paper ThL3P.5 | |
Realization Problem of Passivity-Based Cyber Physical Systems in Power Networks (I) |
|
Tsumura, Koji | The University of Tokyo |
Nguyen, Binh Minh | The University of Tokyo |
Hara, Shinji | The University of Tokyo |
Baros, Stefanos | Massachusetts Institute of Technology |
Annaswamy, Anuradha | Massachusetts Inst. of Tech |
Keywords: Power Systems Control
Abstract: In this paper, we deal with a realization problem of cyber physical systems. Cyber physical systems are known to include many heterogeneous dynamical modules such as physical systems, control rules, or optimization algorithms. The connections between modules, which can be different kind of subsystems, need ``transformation of signals'' between physical quantities and information signals. In the realization of such transformation, we should care about what kind of mechanism is possible or not for its purpose. For example, the passivity based methodology to connect subsystems is convenient for guaranteeing the stability of the total systems, however the problem of the physical realization of the feedback connection emerges. From above discussion, in this paper, we focus on our previously proposed hierarchical control and optimization of power networks based on passivity methodology and discuss a problem what structures are physically realizable.
|
| |