Multi-Approach Debugging of Industrial IoT Workflows

09/12/2020
by   Andreia Rodrigues, et al.
0

Industrial Internet-of-Things (IIoT) results from the addition of sensing and actuating capabilities to industrial environments to improve the overall manufacturing processes. Some of these systems have highly-complex tasks of monitorization and control and need to be programmed accordingly. The use of visual programming, such as workflows, is common in these systems due to the abstraction they provide to the systems programmer. However, such programming environments have several deficiencies on what regards debugging capabilities, mostly due to the constraints that difficult the use of traditional mechanisms. The work presented in this paper approaches these issues, delving into the design and implementation of a multi-strategy debugging mechanism into a commercial-grade Manufacturing Execution System. To validate the approach, a proof-of-concept was then developed and validated against different debugging scenarios.

READ FULL TEXT

page 2

page 11

research
03/12/2021

Empowering Visual Internet-of-Things Mashups with Self-Healing Capabilities

Internet-of-Things (IoT) systems have spread among different application...
research
10/26/2017

SRE: Semantic Rules Engine For the Industrial Internet-Of-Things Gateways

The Advent of the Internet-of-Things (IoT) paradigm has brought opportun...
research
09/02/2021

Towards a Reference Architecture for Future Industrial Internet of Things Networks

With the continuing decrease of sensor technology prices as well as the ...
research
01/01/2019

A structured approach for the implementation of distributed manufacturing simulation

Manufacturing has been changing from a mainly inhouse effort to a distri...
research
02/18/2023

Security of IT/OT Convergence: Design and Implementation Challenges

IoT is undoubtedly considered the future of the Internet. Many sectors a...
research
12/02/2019

Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning

Machine learning algorithms have been shown to be suitable for securing ...

Please sign up or login with your details

Forgot password? Click here to reset