Patent classifications
G05B2219/50123
DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND PRODUCTION SYSTEM
A data processing device includes: a collector that collects setting values in operating elements that control a production process for a product at prescribed intervals and collects brand information indicating a brand of the product; a first processor that performs a statistical process for the setting values, obtains representative values for the setting values as operation performance values while the product of the brand indicated in the brand information is being produced, and generates a performance value database; a second processor that performs a statistical process for operation performance values associated with brand information indicating a next brand to be produced in the production process among the operation performance values included in the performance value database, and obtains optimal setting values in the operating elements for producing the product of the next brand; and an outputter that outputs the obtained setting values.
Method and computing device for commissioning an industrial automation control system
To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
I/O virtualization for commissioning
Disclosed herein are techniques for virtualizing the I/O of control modules that are to be implemented by a process controller in the runtime environment of a process plant. A configuration application identifies references to the I/O objects utilized by the control modules. In response, the configuration application generates virtual device signal tags (DSTs) to mimic the performance of the identified I/O objects. To facilitate testing and/or verification of the control module, e.g., during the commissioning of a back-end environment, the configuration application instantiates a virtual controller in a simulation environment. To generate the virtual controller, the configuration application replaces any references to the I/O objects with references to respective, generated virtual DSTs. Thus, by using the virtual DSTs as a proxy for the I/O to the field devices, the control module and/or controller may be tested prior to the field devices without the field environment being fully commissioned.
Grinding and/or erosion machine
Grinding and/or erosion machine (10) for machining a chip-cutting rotary tool including a tool body (18) and several cutting plates (19) per existing pitch (TR). A control device (25) activates an axis arrangement (11) to move a machine tool (12) and the rotary tool (13) to be machined relative to each other. An interface device (26) triggers a data import function for reading-in the position data of the cutting plates (19). The position data (P) describe at least one angular value (1, 2), a first length value (z1) and a second length value (z2). The control device (25) imports the position data (P) in chaotic order and allocates the position data (P) of each cutting plate (19) in the imported machine data set (M) to respectively one separate virtual pitch (TV), independent of whether the cutting plates (19) belong to a common pitch of the rotary tool (13).
MACHINE TOOL CONTROL METHOD, MACHINE TOOL CONTROL DEVICE, MACHINE TOOL SETTING ASSISTANCE DEVICE, MACHINE TOOL CONTROL SYSTEM AND PROGRAM
This machine tool control method has: a step for accepting processing content about a workpiece; a step for referring to a storage unit, which stores, for each piece of processing content, a range of set conditions regarding the movements of a machine tool for performing the processing, and specifying the range of the set conditions corresponding to the accepted processing content; and a step for determining the settings of the movements of the machine tool on the premise of the range of the specified set conditions upon accepting a processing order according to the processing content about the workpiece.
MULTI-TENANT DASHBOARD FOR ROBOTIC PROCESS AUTOMATION SYSTEMS
A system providing a multi-tenant dashboard for allowing multiple users across a variety of tenants to access, view and report on the progress and performance of a robotic process automation system. Through the multi-tenant dashboard at least one tenant is established with identifying information. One or more users are assigned within the at least one tenant profile having a unique role and a unique a set of process steps to complete. The multi-tenant dashboard further provides a triggering system for evaluation and completion of set of process steps assigned to each user. Messages are sent through a messaging system notifying the at least one tenant of status of the automated processing system based on execution of the set of process steps.
COLD ROLLING MILL ROLLING CONDITION CALCULATION METHOD, COLD ROLLING MILL ROLLING CONDITION CALCULATION DEVICE, COLD ROLLING METHOD, COLD ROLLING MILL, AND STEEL SHEET MANUFACTURING METHOD
A cold rolling mill rolling condition calculation method includes: an estimation step of estimating a rolling constraint condition with respect to a target steady rolling condition of a roll target material, by inputting second multi-dimensional data to a prediction model, the prediction model having been trained with explanatory variable and response variable, the explanatory variable being first multi-dimensional data generated based on non-steady rolling performance data, among past rolling performance in rolling a roll material by a cold rolling mill, and the response variable being steady rolling performance data and rolling constraint condition data during steady rolling, and the second multi-dimensional data having been generated based on non-steady rolling performance data of the roll target material; and a change step of changing the target steady rolling condition so that the estimated rolling constraint condition satisfies a predetermined condition.
MACHINING PARAMETER RECOMMENDATIONS USING IN-PROCESS MACHINING DATA AGGREGATION
Historical in-process machining information can be used to make machining process parameter recommendations. The disclosed systems and methods enable continuous learning for machining parameter selection using aggregated in-process machining information. The systems and methods save in-process machining data in a database using a standardized format, use data augmentation outlier detection, aggregation, and clustering algorithms to make machining process parameter recommendations and expected cut time predictions based on user inputs. The system can include a front-end dashboard to facilitate visualization and interpret results.
I/O Virtualization for Commissioning
Disclosed herein are techniques for virtualizing the I/O of control modules that are to be implemented by a process controller in the runtime environment of a process plant. A configuration application identifies references to the I/O objects utilized by the control modules. In response, the configuration application generates virtual device signal tags (DSTs) to mimic the performance of the identified I/O objects. To facilitate testing and/or verification of the control module, e.g., during the commissioning of a back-end environment, the configuration application instantiates a virtual controller in a simulation environment. To generate the virtual controller, the configuration application replaces any references to the I/O objects with references to respective, generated virtual DSTs. Thus, by using the virtual DSTs as a proxy for the I/O to the field devices, the control module and/or controller may be tested prior to the field devices without the field environment being fully commissioned.
METHOD AND COMPUTING DEVICE FOR COMMISSIONING AN INDUSTRIAL AUTOMATION CONTROL SYSTEM
To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.