Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
***** Acces problem to record *****\

Identifieur interne : 000045 ( Pmc/Corpus ); précédent : 0000449; suivant : 0000460 ***** probable Xml problem with record *****

Links to Exploration step


Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">TF4SM: A Framework for Developing Traceability Solutions in Small Manufacturing Companies</title>
<author>
<name sortKey="Bordel Sanchez, Borja" sort="Bordel Sanchez, Borja" uniqKey="Bordel Sanchez B" first="Borja" last="Bordel Sánchez">Borja Bordel Sánchez</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Alcarria, Ram N" sort="Alcarria, Ram N" uniqKey="Alcarria R" first="Ram N" last="Alcarria">Ram N Alcarria</name>
<affiliation>
<nlm:aff id="af2-sensors-15-29478">Departamento de Ingeniería Topográfica y Cartografía, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, Madrid 28031, Spain; E-Mail:
<email>ramon.alcarria@upm.es</email>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Martin, Diego" sort="Martin, Diego" uniqKey="Martin D" first="Diego" last="Martín">Diego Martín</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Robles, Tomas" sort="Robles, Tomas" uniqKey="Robles T" first="Tomás" last="Robles">Tomás Robles</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">26610509</idno>
<idno type="pmc">4701345</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701345</idno>
<idno type="RBID">PMC:4701345</idno>
<idno type="doi">10.3390/s151129478</idno>
<date when="2015">2015</date>
<idno type="wicri:Area/Pmc/Corpus">000045</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000045</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">TF4SM: A Framework for Developing Traceability Solutions in Small Manufacturing Companies</title>
<author>
<name sortKey="Bordel Sanchez, Borja" sort="Bordel Sanchez, Borja" uniqKey="Bordel Sanchez B" first="Borja" last="Bordel Sánchez">Borja Bordel Sánchez</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Alcarria, Ram N" sort="Alcarria, Ram N" uniqKey="Alcarria R" first="Ram N" last="Alcarria">Ram N Alcarria</name>
<affiliation>
<nlm:aff id="af2-sensors-15-29478">Departamento de Ingeniería Topográfica y Cartografía, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, Madrid 28031, Spain; E-Mail:
<email>ramon.alcarria@upm.es</email>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Martin, Diego" sort="Martin, Diego" uniqKey="Martin D" first="Diego" last="Martín">Diego Martín</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Robles, Tomas" sort="Robles, Tomas" uniqKey="Robles T" first="Tomás" last="Robles">Tomás Robles</name>
<affiliation>
<nlm:aff id="af1-sensors-15-29478">Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">Sensors (Basel, Switzerland)</title>
<idno type="eISSN">1424-8220</idno>
<imprint>
<date when="2015">2015</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Nowadays, manufacturing processes have become highly complex. Besides, more and more, governmental institutions require companies to implement systems to trace a product’s life (especially for foods, clinical materials or similar items). In this paper, we propose a new framework, based on cyber-physical systems, for developing traceability systems in small manufacturing companies (which because of their size cannot implement other commercial products). We propose a general theoretical framework, study the requirements of these companies in relation to traceability systems, propose a reference architecture based on both previous elements and build the first minimum functional prototype, to compare our solution to a traditional tag-based traceability system. Results show that our system reduces the number of inefficiencies and reaction time.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Woodall, W H" uniqKey="Woodall W">W.H. Woodall</name>
</author>
<author>
<name sortKey="Montgomery, D C" uniqKey="Montgomery D">D.C. Montgomery</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Weske, M" uniqKey="Weske M">M. Weske</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Condea, C" uniqKey="Condea C">C. Condea</name>
</author>
<author>
<name sortKey="Thiesse, F" uniqKey="Thiesse F">F. Thiesse</name>
</author>
<author>
<name sortKey="Fleisch, E" uniqKey="Fleisch E">E. Fleisch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cook, D" uniqKey="Cook D">D. Cook</name>
</author>
<author>
<name sortKey="Das, S" uniqKey="Das S">S. Das</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gungor, V C" uniqKey="Gungor V">V.C. Gungor</name>
</author>
<author>
<name sortKey="Hancke, G P" uniqKey="Hancke G">G.P. Hancke</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Al Agha, K" uniqKey="Al Agha K">K. Al Agha</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cao, H" uniqKey="Cao H">H. Cao</name>
</author>
<author>
<name sortKey="Folan, P" uniqKey="Folan P">P. Folan</name>
</author>
<author>
<name sortKey="Mascolo, J" uniqKey="Mascolo J">J. Mascolo</name>
</author>
<author>
<name sortKey="Browne, J" uniqKey="Browne J">J. Browne</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dai, Q Y" uniqKey="Dai Q">Q.Y. Dai</name>
</author>
<author>
<name sortKey="Zhong, R Y" uniqKey="Zhong R">R.Y. Zhong</name>
</author>
<author>
<name sortKey="Zhou, K" uniqKey="Zhou K">K. Zhou</name>
</author>
<author>
<name sortKey="Jiang, Z Y" uniqKey="Jiang Z">Z.Y. Jiang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Banks, J" uniqKey="Banks J">J. Banks</name>
</author>
<author>
<name sortKey="Pachano, M A" uniqKey="Pachano M">M.A. Pachano</name>
</author>
<author>
<name sortKey="Thompson, L G" uniqKey="Thompson L">L.G. Thompson</name>
</author>
<author>
<name sortKey="Hanny, D" uniqKey="Hanny D">D. Hanny</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ilie Zudor, E" uniqKey="Ilie Zudor E">E. Ilie-Zudor</name>
</author>
<author>
<name sortKey="Kemeny, Z" uniqKey="Kemeny Z">Z. Kemény</name>
</author>
<author>
<name sortKey="Van Blommestein, F" uniqKey="Van Blommestein F">F. van Blommestein</name>
</author>
<author>
<name sortKey="Monostori, L" uniqKey="Monostori L">L. Monostori</name>
</author>
<author>
<name sortKey="Van Der Meulen, A" uniqKey="Van Der Meulen A">A. van der Meulen</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dai, Q" uniqKey="Dai Q">Q. Dai</name>
</author>
<author>
<name sortKey="Zhong, R" uniqKey="Zhong R">R. Zhong</name>
</author>
<author>
<name sortKey="Huang, G Q" uniqKey="Huang G">G.Q. Huang</name>
</author>
<author>
<name sortKey="Qu, T" uniqKey="Qu T">T. Qu</name>
</author>
<author>
<name sortKey="Zhang, T" uniqKey="Zhang T">T. Zhang</name>
</author>
<author>
<name sortKey="Luo, T Y" uniqKey="Luo T">T.Y. Luo</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hur, S M" uniqKey="Hur S">S.M. Hur</name>
</author>
<author>
<name sortKey="Jeong, S" uniqKey="Jeong S">S. Jeong</name>
</author>
<author>
<name sortKey="Suh, S H" uniqKey="Suh S">S.H. Suh</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bendavid, Y" uniqKey="Bendavid Y">Y. Bendavid</name>
</author>
<author>
<name sortKey="Cassivi, L" uniqKey="Cassivi L">L. Cassivi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lee, E A" uniqKey="Lee E">E.A. Lee</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wang, Y" uniqKey="Wang Y">Y. Wang</name>
</author>
<author>
<name sortKey="Vuran, M C" uniqKey="Vuran M">M.C. Vuran</name>
</author>
<author>
<name sortKey="Goddard, S" uniqKey="Goddard S">S. Goddard</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wu, F" uniqKey="Wu F">F. Wu</name>
</author>
<author>
<name sortKey="Kao, Y" uniqKey="Kao Y">Y. Kao</name>
</author>
<author>
<name sortKey="Tseng, Y" uniqKey="Tseng Y">Y. Tseng</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Li, S" uniqKey="Li S">S. Li</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hussain, T" uniqKey="Hussain T">T. Hussain</name>
</author>
<author>
<name sortKey="Frey, G" uniqKey="Frey G">G. Frey</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Davenport, T H" uniqKey="Davenport T">T.H. Davenport</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Vyatkin, V" uniqKey="Vyatkin V">V. Vyatkin</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Thramboulidis, K" uniqKey="Thramboulidis K">K. Thramboulidis</name>
</author>
<author>
<name sortKey="Zoupas, A" uniqKey="Zoupas A">A. Zoupas</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jimenez, M" uniqKey="Jimenez M">M. Jimenez</name>
</author>
<author>
<name sortKey="Rosique, F" uniqKey="Rosique F">F. Rosique</name>
</author>
<author>
<name sortKey="Sanchez, P" uniqKey="Sanchez P">P. Sanchez</name>
</author>
<author>
<name sortKey="Alvarez, B" uniqKey="Alvarez B">B. Alvarez</name>
</author>
<author>
<name sortKey="Iborra, A" uniqKey="Iborra A">A. Iborra</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Alcarria, R" uniqKey="Alcarria R">R. Alcarria</name>
</author>
<author>
<name sortKey="Robles, T" uniqKey="Robles T">T. Robles</name>
</author>
<author>
<name sortKey="Morales, A" uniqKey="Morales A">A. Morales</name>
</author>
<author>
<name sortKey="L Pez De Ipi A, D" uniqKey="L Pez De Ipi A D">D. López-de-Ipiña</name>
</author>
<author>
<name sortKey="Aguilera, U" uniqKey="Aguilera U">U. Aguilera</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Erl, T" uniqKey="Erl T">T. Erl</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jammes, F" uniqKey="Jammes F">F. Jammes</name>
</author>
<author>
<name sortKey="Smit, H" uniqKey="Smit H">H. Smit</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kirova, V" uniqKey="Kirova V">V. Kirova</name>
</author>
<author>
<name sortKey="Kirby, N" uniqKey="Kirby N">N. Kirby</name>
</author>
<author>
<name sortKey="Kothari, D" uniqKey="Kothari D">D. Kothari</name>
</author>
<author>
<name sortKey="Childress, G" uniqKey="Childress G">G. Childress</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Moe, T" uniqKey="Moe T">T. Moe</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Muldoon, M" uniqKey="Muldoon M">M. Muldoon</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wall, B" uniqKey="Wall B">B. Wall</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Li, M" uniqKey="Li M">M. Li</name>
</author>
<author>
<name sortKey="Qian, J P" uniqKey="Qian J">J.P. Qian</name>
</author>
<author>
<name sortKey="Yang, X T" uniqKey="Yang X">X.T. Yang</name>
</author>
<author>
<name sortKey="Sun, C H" uniqKey="Sun C">C.H. Sun</name>
</author>
<author>
<name sortKey="Ji, Z T" uniqKey="Ji Z">Z.T. Ji</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Seine, K" uniqKey="Seine K">K. Seine</name>
</author>
<author>
<name sortKey="Kuwabara, S" uniqKey="Kuwabara S">S. Kuwabara</name>
</author>
<author>
<name sortKey="Mikami, S" uniqKey="Mikami S">S. Mikami</name>
</author>
<author>
<name sortKey="Takahashi, Y" uniqKey="Takahashi Y">Y. Takahashi</name>
</author>
<author>
<name sortKey="Yoshikawa, M" uniqKey="Yoshikawa M">M. Yoshikawa</name>
</author>
<author>
<name sortKey="Narumi, H" uniqKey="Narumi H">H. Narumi</name>
</author>
<author>
<name sortKey="Koganezaki, K" uniqKey="Koganezaki K">K. Koganezaki</name>
</author>
<author>
<name sortKey="Wakabayashi, T" uniqKey="Wakabayashi T">T. Wakabayashi</name>
</author>
<author>
<name sortKey="Nagano, A" uniqKey="Nagano A">A. Nagano</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hsu, Y C" uniqKey="Hsu Y">Y.-C. Hsu</name>
</author>
<author>
<name sortKey="Chen, A P" uniqKey="Chen A">A.-P. Chen</name>
</author>
<author>
<name sortKey="Wang, C H" uniqKey="Wang C">C.-H. Wang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gandino, F" uniqKey="Gandino F">F. Gandino</name>
</author>
<author>
<name sortKey="Montrucchio, B" uniqKey="Montrucchio B">B. Montrucchio</name>
</author>
<author>
<name sortKey="Rebaudengo, M" uniqKey="Rebaudengo M">M. Rebaudengo</name>
</author>
<author>
<name sortKey="Sanchez, E R" uniqKey="Sanchez E">E.R. Sanchez</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Das, S K" uniqKey="Das S">S.K. Das</name>
</author>
<author>
<name sortKey="Cook, D J" uniqKey="Cook D">D.J. Cook</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Das, S K" uniqKey="Das S">S.K. Das</name>
</author>
<author>
<name sortKey="Cook, D J" uniqKey="Cook D">D.J. Cook</name>
</author>
<author>
<name sortKey="Battacharya, A" uniqKey="Battacharya A">A. Battacharya</name>
</author>
<author>
<name sortKey="Heierman, E O" uniqKey="Heierman E">E.O. Heierman</name>
</author>
<author>
<name sortKey="Lin, T Y" uniqKey="Lin T">T-Y. Lin</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Le Gal, C" uniqKey="Le Gal C">C. Le Gal</name>
</author>
<author>
<name sortKey="Martin, J" uniqKey="Martin J">J. Martin</name>
</author>
<author>
<name sortKey="Lux, A" uniqKey="Lux A">A. Lux</name>
</author>
<author>
<name sortKey="Crowley, J L" uniqKey="Crowley J">J.L. Crowley</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lesser, V" uniqKey="Lesser V">V. Lesser</name>
</author>
<author>
<name sortKey="Atighetchi, M" uniqKey="Atighetchi M">M. Atighetchi</name>
</author>
<author>
<name sortKey="Benyo, B" uniqKey="Benyo B">B. Benyo</name>
</author>
<author>
<name sortKey="Horling, B" uniqKey="Horling B">B. Horling</name>
</author>
<author>
<name sortKey="Raja, A" uniqKey="Raja A">A. Raja</name>
</author>
<author>
<name sortKey="Wagner, T" uniqKey="Wagner T">T. Wagner</name>
</author>
<author>
<name sortKey="Xuan, P" uniqKey="Xuan P">P. Xuan</name>
</author>
<author>
<name sortKey="Zhang, S" uniqKey="Zhang S">S. Zhang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Misra, A" uniqKey="Misra A">A. Misra</name>
</author>
<author>
<name sortKey="Das, S K" uniqKey="Das S">S.K. Das</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Nixon, P" uniqKey="Nixon P">P. Nixon</name>
</author>
<author>
<name sortKey="Lacey, G" uniqKey="Lacey G">G. Lacey</name>
</author>
<author>
<name sortKey="Dobson, S" uniqKey="Dobson S">S. Dobson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Derler, P" uniqKey="Derler P">P. Derler</name>
</author>
<author>
<name sortKey="Lee, E A" uniqKey="Lee E">E.A. Lee</name>
</author>
<author>
<name sortKey="Vincentelli, A S" uniqKey="Vincentelli A">A.S. Vincentelli</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lee, E A" uniqKey="Lee E">E.A. Lee</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kelepouris, T" uniqKey="Kelepouris T">T. Kelepouris</name>
</author>
<author>
<name sortKey="Pramatari, K" uniqKey="Pramatari K">K. Pramatari</name>
</author>
<author>
<name sortKey="Doukidis, G" uniqKey="Doukidis G">G. Doukidis</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Riedl, M" uniqKey="Riedl M">M. Riedl</name>
</author>
<author>
<name sortKey="Zipper, H" uniqKey="Zipper H">H. Zipper</name>
</author>
<author>
<name sortKey="Meier, M" uniqKey="Meier M">M. Meier</name>
</author>
<author>
<name sortKey="Diedrich, C" uniqKey="Diedrich C">C. Diedrich</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Colombo, A" uniqKey="Colombo A">A. Colombo</name>
</author>
<author>
<name sortKey="Karnouskos, S" uniqKey="Karnouskos S">S. Karnouskos</name>
</author>
<author>
<name sortKey="Bangemann, T" uniqKey="Bangemann T">T. Bangemann</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Al Anbagi, I" uniqKey="Al Anbagi I">I. Al-Anbagi</name>
</author>
<author>
<name sortKey="Erol Kantarci, M" uniqKey="Erol Kantarci M">M. Erol-Kantarci</name>
</author>
<author>
<name sortKey="Mouftah, H T" uniqKey="Mouftah H">H.T. Mouftah</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Blackburn, M" uniqKey="Blackburn M">M. Blackburn</name>
</author>
<author>
<name sortKey="Denno, P" uniqKey="Denno P">P. Denno</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gupta, I" uniqKey="Gupta I">I. Gupta</name>
</author>
<author>
<name sortKey="Kaur, R" uniqKey="Kaur R">R. Kaur</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Suender, C" uniqKey="Suender C">C. Suender</name>
</author>
<author>
<name sortKey="Wenger, M" uniqKey="Wenger M">M. Wenger</name>
</author>
<author>
<name sortKey="Hanni, C" uniqKey="Hanni C">C. Hanni</name>
</author>
<author>
<name sortKey="Gosetti, I" uniqKey="Gosetti I">I. Gosetti</name>
</author>
<author>
<name sortKey="Steininger, H" uniqKey="Steininger H">H. Steininger</name>
</author>
<author>
<name sortKey="Fritsche, J" uniqKey="Fritsche J">J. Fritsche</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wenger, M" uniqKey="Wenger M">M. Wenger</name>
</author>
<author>
<name sortKey="Zoitl, A" uniqKey="Zoitl A">A. Zoitl</name>
</author>
<author>
<name sortKey="Sunder, C" uniqKey="Sunder C">C. Sunder</name>
</author>
<author>
<name sortKey="Steininger, H" uniqKey="Steininger H">H. Steininger</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Von Krosigk, H" uniqKey="Von Krosigk H">H. Von Krosigk</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ito, M" uniqKey="Ito M">M. Ito</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tokuda, H" uniqKey="Tokuda H">H. Tokuda</name>
</author>
<author>
<name sortKey="Takashio, K" uniqKey="Takashio K">K. Takashio</name>
</author>
<author>
<name sortKey="Nakazawa, J" uniqKey="Nakazawa J">J. Nakazawa</name>
</author>
<author>
<name sortKey="Matsumiya, K" uniqKey="Matsumiya K">K. Matsumiya</name>
</author>
<author>
<name sortKey="Ito, M" uniqKey="Ito M">M. Ito</name>
</author>
<author>
<name sortKey="Saito, M" uniqKey="Saito M">M. Saito</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hagale, A R" uniqKey="Hagale A">A.R. Hagale</name>
</author>
<author>
<name sortKey="Kelley, J E" uniqKey="Kelley J">J.E. Kelley</name>
</author>
<author>
<name sortKey="Rozich, R" uniqKey="Rozich R">R. Rozich</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fishkin, K P" uniqKey="Fishkin K">K.P. Fishkin</name>
</author>
<author>
<name sortKey="Philipose, M" uniqKey="Philipose M">M. Philipose</name>
</author>
<author>
<name sortKey="Rea, A" uniqKey="Rea A">A. Rea</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kirstein, T" uniqKey="Kirstein T">T. Kirstein</name>
</author>
<author>
<name sortKey="Cottet, D" uniqKey="Cottet D">D. Cottet</name>
</author>
<author>
<name sortKey="Grzyb, J" uniqKey="Grzyb J">J. Grzyb</name>
</author>
<author>
<name sortKey="Troster, G" uniqKey="Troster G">G. Tröster</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Marculescu, D" uniqKey="Marculescu D">D. Marculescu</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wolf, M" uniqKey="Wolf M">M. Wolf</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kortuem, G" uniqKey="Kortuem G">G. Kortuem</name>
</author>
<author>
<name sortKey="Kawsar, F" uniqKey="Kawsar F">F. Kawsar</name>
</author>
<author>
<name sortKey="Fitton, D" uniqKey="Fitton D">D. Fitton</name>
</author>
<author>
<name sortKey="Sundramoorthy, V" uniqKey="Sundramoorthy V">V. Sundramoorthy</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Osaka, K" uniqKey="Osaka K">K. Osaka</name>
</author>
<author>
<name sortKey="Takagi, T" uniqKey="Takagi T">T. Takagi</name>
</author>
<author>
<name sortKey="Yamazaki, K" uniqKey="Yamazaki K">K. Yamazaki</name>
</author>
<author>
<name sortKey="Takahashi, O" uniqKey="Takahashi O">O. Takahashi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Schmidt, A" uniqKey="Schmidt A">A. Schmidt</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fouquet, F" uniqKey="Fouquet F">F. Fouquet</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kim, K" uniqKey="Kim K">K. Kim</name>
</author>
<author>
<name sortKey="Panganamala, R" uniqKey="Panganamala R">R. Panganamala</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Morales, A" uniqKey="Morales A">A. Morales</name>
</author>
<author>
<name sortKey="Robles, T" uniqKey="Robles T">T. Robles</name>
</author>
<author>
<name sortKey="Alcarria, R" uniqKey="Alcarria R">R. Alcarria</name>
</author>
<author>
<name sortKey="Cede O, E" uniqKey="Cede O E">E. Cedeño</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fortino, G" uniqKey="Fortino G">G. Fortino</name>
</author>
<author>
<name sortKey="Guerrieri, A" uniqKey="Guerrieri A">A. Guerrieri</name>
</author>
<author>
<name sortKey="Russo, W" uniqKey="Russo W">W. Russo</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tang, L" uniqKey="Tang L">L. Tang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Schmitt, C" uniqKey="Schmitt C">C. Schmitt</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zuo, X" uniqKey="Zuo X">X. Zuo</name>
</author>
<author>
<name sortKey="Tan, W" uniqKey="Tan W">W. Tan</name>
</author>
<author>
<name sortKey="Lin, H" uniqKey="Lin H">H. Lin</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">Sensors (Basel)</journal-id>
<journal-id journal-id-type="iso-abbrev">Sensors (Basel)</journal-id>
<journal-id journal-id-type="publisher-id">sensors</journal-id>
<journal-title-group>
<journal-title>Sensors (Basel, Switzerland)</journal-title>
</journal-title-group>
<issn pub-type="epub">1424-8220</issn>
<publisher>
<publisher-name>MDPI</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">26610509</article-id>
<article-id pub-id-type="pmc">4701345</article-id>
<article-id pub-id-type="doi">10.3390/s151129478</article-id>
<article-id pub-id-type="publisher-id">sensors-15-29478</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>TF4SM: A Framework for Developing Traceability Solutions in Small Manufacturing Companies</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Bordel Sánchez</surname>
<given-names>Borja</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-15-29478">1</xref>
<xref rid="c1-sensors-15-29478" ref-type="corresp">*</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Alcarria</surname>
<given-names>Ramón</given-names>
</name>
<xref ref-type="aff" rid="af2-sensors-15-29478">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Martín</surname>
<given-names>Diego</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-15-29478">1</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Robles</surname>
<given-names>Tomás</given-names>
</name>
<xref ref-type="aff" rid="af1-sensors-15-29478">1</xref>
</contrib>
</contrib-group>
<contrib-group>
<contrib contrib-type="editor">
<name>
<surname>Cheng</surname>
<given-names>Albert M. K.</given-names>
</name>
<role>Academic Editor</role>
</contrib>
</contrib-group>
<aff id="af1-sensors-15-29478">
<label>1</label>
Departamento de Ingeniería de Sistemas Telemáticos, Universidad Politécnica de Madrid, Avenida Complutense n°30, Madrid 28040, Spain; E-Mails:
<email>diego.martin.de.andres@upm.es</email>
(D.M.);
<email>tomas.robles@upm.es</email>
(T.R.)</aff>
<aff id="af2-sensors-15-29478">
<label>2</label>
Departamento de Ingeniería Topográfica y Cartografía, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, Madrid 28031, Spain; E-Mail:
<email>ramon.alcarria@upm.es</email>
</aff>
<author-notes>
<corresp id="c1-sensors-15-29478">
<label>*</label>
Author to whom correspondence should be addressed; E-Mail:
<email>bbordel@dit.upm.es</email>
; Tel.:+34-91-549-57-00 (ext. 3035).</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>20</day>
<month>11</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="collection">
<month>11</month>
<year>2015</year>
</pub-date>
<volume>15</volume>
<issue>11</issue>
<fpage>29478</fpage>
<lpage>29510</lpage>
<history>
<date date-type="received">
<day>20</day>
<month>7</month>
<year>2015</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>11</month>
<year>2015</year>
</date>
</history>
<permissions>
<copyright-statement>© 2015 by the authors; licensee MDPI, Basel, Switzerland.</copyright-statement>
<copyright-year>2015</copyright-year>
<license>
<license-p>
<pmc-comment>CREATIVE COMMONS</pmc-comment>
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>
).</license-p>
</license>
</permissions>
<abstract>
<p>Nowadays, manufacturing processes have become highly complex. Besides, more and more, governmental institutions require companies to implement systems to trace a product’s life (especially for foods, clinical materials or similar items). In this paper, we propose a new framework, based on cyber-physical systems, for developing traceability systems in small manufacturing companies (which because of their size cannot implement other commercial products). We propose a general theoretical framework, study the requirements of these companies in relation to traceability systems, propose a reference architecture based on both previous elements and build the first minimum functional prototype, to compare our solution to a traditional tag-based traceability system. Results show that our system reduces the number of inefficiencies and reaction time.</p>
</abstract>
<kwd-group>
<kwd>traceability</kwd>
<kwd>real-time manufacturing</kwd>
<kwd>manufacturing execution system</kwd>
<kwd>cybernetic devices</kwd>
<kwd>cybernetic glove</kwd>
<kwd>cybernetic table</kwd>
<kwd>prosumer</kwd>
<kwd>RFID</kwd>
<kwd>Bluetooth</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="sec1-sensors-15-29478">
<title>1. Introduction</title>
<p>In recent years, companies, government institutions, researchers and traders, among others, have stressed the importance of manufacturing process monitoring systems as a primary source of information. Projects such as [
<xref rid="B1-sensors-15-29478" ref-type="bibr">1</xref>
] or works such as [
<xref rid="B2-sensors-15-29478" ref-type="bibr">2</xref>
,
<xref rid="B3-sensors-15-29478" ref-type="bibr">3</xref>
] demonstrate the importance of the ability of systems to extract valuable data from these processes. However, as the complexity of manufacturing processes increases, monitoring (especially if involving human operators) becomes very costly and inefficient [
<xref rid="B4-sensors-15-29478" ref-type="bibr">4</xref>
]. From the beginning, solutions based on information technologies were adopted to reduce the complexity associated with traceability by operators. Relevant works, such as [
<xref rid="B5-sensors-15-29478" ref-type="bibr">5</xref>
,
<xref rid="B6-sensors-15-29478" ref-type="bibr">6</xref>
,
<xref rid="B7-sensors-15-29478" ref-type="bibr">7</xref>
], have developed successfully traceability solutions categorized as “Smart Environments” or “Wireless Sensor Networks”. Moreover, approximately between 2000 and 2010, a number of important manufacturing companies (specially leading vehicle manufacturers) started to employ radio frequency identification (RFID) to facilitate traceability in manufacturing processes. First, Volvo Trucks established a RFID system to achieve continuous production [
<xref rid="B8-sensors-15-29478" ref-type="bibr">8</xref>
,
<xref rid="B9-sensors-15-29478" ref-type="bibr">9</xref>
]. Later, Toyota implemented information systems based on RFID to track auto parts production [
<xref rid="B10-sensors-15-29478" ref-type="bibr">10</xref>
,
<xref rid="B11-sensors-15-29478" ref-type="bibr">11</xref>
]. Most recently, in 2012, the Chinese manufacturer Guangdong Greatoo Molds Inc. deployed a RFID-enabled manufacturing execution system as a case study [
<xref rid="B12-sensors-15-29478" ref-type="bibr">12</xref>
].</p>
<p>However, the previous examples relate to large-sized companies, while most manufacturers are actually small and medium-sized companies, which must face financial and technological challenges when they attempt to implement RFID-based traceability systems. Currently, most of the RFID systems are provided by important information technology companies, such as IBM or Ubisense. The kind of solutions developed by these Information Technologies (IT) providers makes the cost and technical requirements of adopting their RFID solutions too high for small and medium-sized manufacturing companies [
<xref rid="B13-sensors-15-29478" ref-type="bibr">13</xref>
,
<xref rid="B14-sensors-15-29478" ref-type="bibr">14</xref>
]. When a small manufacturing company considers applying an automated traceability system (particularly a RFID-based system) three basic questions must be confronted [
<xref rid="B12-sensors-15-29478" ref-type="bibr">12</xref>
]. The first is how to deploy RFID devices to collect real-time data in a cost-effective way. The second is how to translate the real-time data into meaningful information to enable the field operator’s convenient operations (e.g., inefficiency detection and correction). The third is how to integrate the RFID system into the company’s current production processes.</p>
<p>We argue herein that a framework strongly based on Cyber-Physical Systems (CPS) can successfully address all the previous questions. As described in the relevant NSF reports [
<xref rid="B15-sensors-15-29478" ref-type="bibr">15</xref>
] CPS are integrations of computation and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and
<italic>vice versa</italic>
. However, this initial definition has been modified and expanded by many authors. If in the first instance CPS referred to a kind of networked embedded systems running real-time applications, nowadays CPS (as described by the National Institute of Standards and Technology [
<xref rid="B16-sensors-15-29478" ref-type="bibr">16</xref>
]) have a more vertical approach, including from the user goals to the underlying physical system. In addition, in this second focus, issues related to traceability systems, such as the Human-System Interaction, are a main part of the architecture [
<xref rid="B17-sensors-15-29478" ref-type="bibr">17</xref>
].</p>
<p>Notwithstanding this great interest, the heterogeneity in CPS has revealed several problems in industrial applications that cannot be easily solved through current control, communications, and software theory [
<xref rid="B18-sensors-15-29478" ref-type="bibr">18</xref>
]. Consequently, some industrial researchers have recently returned to the simplicity and uniformity of Wireless Sensor Networks (WSNs) [
<xref rid="B19-sensors-15-29478" ref-type="bibr">19</xref>
] to integrate them with traditional intelligent industrial systems. Thus, new definitions, such as Industrial Wireless Sensor Networks [
<xref rid="B20-sensors-15-29478" ref-type="bibr">20</xref>
] have appeared. Nonetheless, the knowledge created around Cyber-Physical Systems could provide many advantages over existing industrial applications [
<xref rid="B18-sensors-15-29478" ref-type="bibr">18</xref>
].</p>
<p>In this paper we propose a framework based on CPS to reduce the complexity associated with its application in manufacturing scenarios, including other aspects originally derived from traditional intelligent industrial solutions. The objective of this paper is to describe this framework, and to validate its usability as a traceability solution for reducing the number of inefficiencies and to improve their time response in companies. Thus, the contribution of this paper is the proposal of a CPS-based traceability framework, merging both CPS technologies and traceability capabilities. Our work also includes a validation of how a proof of concept of this framework can reduce inefficiencies and improve time response for industrial processes in companies.</p>
<p>In order to validate the Traceability Framework for Small Manufacturers (TF4SM) as a useful framework to develop traceability systems and applications, the authors conducted an experimental validation to address the following two research questions:
<list list-type="order">
<list-item>
<p>Would the time response to inefficiencies improve by deploying a system based on our TF4SM in companies?</p>
</list-item>
<list-item>
<p>Is it possible to reduce the number of inefficiencies in productive processes using a TF4SM-based system?</p>
</list-item>
</list>
</p>
<p>The experimental validation consisted in two typical kinds of manufacturing processes: logistical shortages detection process in warehouses and productive activities that lead to a quality system checkpoint. A statistical analysis of the results showed that a system based on our TF4SM provides a significant improvement in time response to inefficiencies in companies and a remarkable reduction in the number of inefficiencies due to procedural errors.</p>
<p>The rest of the paper is organized as follows:
<xref ref-type="sec" rid="sec2-sensors-15-29478">Section 2</xref>
introduces the state of the art in traceability systems and automated industrial processes, as well as different theories about networked embedded systems and related commercial products.
<xref ref-type="sec" rid="sec3-sensors-15-29478">Section 3</xref>
analyzes the requirements of small manufacturers, presents the reference architecture of our new framework and the design of the first minimum functional prototype based on it.
<xref ref-type="sec" rid="sec4-sensors-15-29478">Section 4</xref>
describes our proposal hardware implementation and our proposed process model.
<xref ref-type="sec" rid="sec5-sensors-15-29478">Section 5</xref>
provides an experimental validation of this approach. Finally,
<xref ref-type="sec" rid="sec6-sensors-15-29478">Section 6</xref>
and
<xref ref-type="sec" rid="sec7-sensors-15-29478">Section 7</xref>
explain some results of this experimental validation and the conclusions of our work.</p>
</sec>
<sec id="sec2-sensors-15-29478">
<title>2. State of the Art in Traceability Systems, Different Theories of Networked Embedded Systems, and RFID-Based Products</title>
<p>During the last fifteen years, many concepts referring to networked embedded systems have appeared. As mentioned in the Introduction, some of them have already been used as a framework for building traceability solutions. However, we argue that the CPS paradigm fits better with traceability solutions than any other previous definition.</p>
<p>In this Section we review the state of the art in traceability solutions and automated industrial processes. Later, we analyze different definitions of networked embedded systems to find the one which best fits with traceability systems. Finally, a review of RFID integration in daily living objects is provided.</p>
<sec id="sec2dot1-sensors-15-29478">
<title>2.1. Automated Industrial Processes and Traceability Systems: State of the Art</title>
<p>The application of software engineering to industrial automation spans from manufacturing automation to process control systems and energy automation systems. There is ample evidence of the extensive use of automated systems in industrial environments. For example, the German Engineering Federation has calculated [
<xref rid="B21-sensors-15-29478" ref-type="bibr">21</xref>
] the ratio of control software to the cost of machinery where it is used has doubled in value from 20% to 40% in one decade.</p>
<p>The Automation Research Corporation (ARC) advisory group [
<xref rid="B22-sensors-15-29478" ref-type="bibr">22</xref>
] and the International Electrotechnical Commission (IEC) [
<xref rid="B23-sensors-15-29478" ref-type="bibr">23</xref>
] distinguish various kinds of automation products for industrial processes, among which we find the high and low power AC drivers, human machine interfaces (HMIs) and programmable logic controllers (PLC). In most solutions, several of these products must be integrated creating libraries for the interconnection which, in most cases, are proprietary technologies [
<xref rid="B24-sensors-15-29478" ref-type="bibr">24</xref>
]. Thus, typically, there is not a homogeneous solution that could be standardized (except for certain cases, such as Object Linking and Embedding—OLE—for Process Control, usually called OPC [
<xref rid="B25-sensors-15-29478" ref-type="bibr">25</xref>
]). Therefore, our approach should be a complete integrated solution, which would include all the necessary functions for automated industrial processes. This approach would allow a reduction in the system’s complexity, control the investment needed, remove technical positions and, ultimately, reduce the cost of deploying and operating systems [
<xref rid="B26-sensors-15-29478" ref-type="bibr">26</xref>
]. In that way, we could address the first basic question presented in the Introduction (“how to deploy RFID devices to collect real-time data in a cost-effective way?”).</p>
<p>Later, nowadays, most components automated industrial process solutions virtualized, however, the structure is similar to that of the traditional hardware architecture [
<xref rid="B27-sensors-15-29478" ref-type="bibr">27</xref>
]. In these systems, there are four types of devices communicating via networks: an engineering and simulation station (including a database and a programming software), a human-machine interface (HMI), at least one programmable logic controller (PLC) with control software and, at least, one driver controlling machines. It would be a good practice to adapt the TF4SM-based system to this generic structure (already tested in industry).</p>
<p>On the other hand, traditional automated industrial systems require workers to train in both software engineering and industrial processes (as PLC must be programmed in proprietary low-level languages [
<xref rid="B28-sensors-15-29478" ref-type="bibr">28</xref>
,
<xref rid="B29-sensors-15-29478" ref-type="bibr">29</xref>
]). In order to improve the cost efficiency (so important in small companies) a prosumer-oriented [
<xref rid="B30-sensors-15-29478" ref-type="bibr">30</xref>
] framework would be desirable. Thus, only industrial domain experts would be necessary.</p>
<p>Furthermore, the embedded devices usually considered in automated industrial processes (including traceability solutions), implement a fixed network architecture model, making it impossible to monitor workers, replace the devices easily or rearrange the machine distribution [
<xref rid="B31-sensors-15-29478" ref-type="bibr">31</xref>
,
<xref rid="B32-sensors-15-29478" ref-type="bibr">32</xref>
]. This increases the cost of system updates and tracking of manual processes. Then, adaptable policies should be included in traceability systems for small companies, so workers can be monitored without affecting their movement and machines could be replaced, rearranged or removed without modifying the system configuration.</p>
<p>Specifying now the debate on existing traceability systems for small-sized companies, five different technological states coexist in small companies nowadays, namely:
<list list-type="order">
<list-item>
<p>There are some manufacturers that do not apply any traceability system, such as small handicraft companies where production processes do not generate intermediate products [
<xref rid="B33-sensors-15-29478" ref-type="bibr">33</xref>
].</p>
</list-item>
<list-item>
<p>Some companies implement systems based on invoices and control record sheets (commonly known as “system based on pen and paper” [
<xref rid="B34-sensors-15-29478" ref-type="bibr">34</xref>
]). In these systems, each product carries a label with a serial number and a description. An operator is responsible for, at each stage of the production process, writing both data items in the appropriate form. Although these systems work fine, the use of IT enables a larger amount of data to be handled, and thereby it becomes realistic to develop traceability systems with very detailed information about both the product and its processing history [
<xref rid="B35-sensors-15-29478" ref-type="bibr">35</xref>
,
<xref rid="B36-sensors-15-29478" ref-type="bibr">36</xref>
].</p>
</list-item>
<list-item>
<p>We find companies which implement systems based on Personal Digital Assistants (PDAs) [
<xref rid="B37-sensors-15-29478" ref-type="bibr">37</xref>
]. In these systems, each product still carries a label with a serial number and a description; however, in this case the responsible operator, instead of using control record sheets, uses a PDA to transmit data in real-time. Although these systems reduce the time requirements related to traceability processes, they still are extremely sensitive to human errors.</p>
</list-item>
<list-item>
<p>Around ten years ago, in order to reduce human errors in traceability systems, labels with the serial number and the description of each product were replaced by codes (e.g., QR or barcodes) storing both data [
<xref rid="B38-sensors-15-29478" ref-type="bibr">38</xref>
]. Then, equipping PDAs with the appropriate reader is enough to avoid operators having to manually input any data.</p>
</list-item>
<list-item>
<p>More recently, the old stickers with printed codes have been replaced by RFID labels [
<xref rid="B39-sensors-15-29478" ref-type="bibr">39</xref>
]. This is basically due to two factors [
<xref rid="B40-sensors-15-29478" ref-type="bibr">40</xref>
]: RFID tags can store kilobytes of information, and they also can include security and privacy policies (what it is especially important in confidential products). These systems have been widely applied in the manufacturing sector.</p>
</list-item>
</list>
</p>
<p>Our framework intends to improve current traceability systems in such a way that new systems would not require performing traceability-specific tasks; instead, traceability information can be deduced from the usual activities of operators.</p>
</sec>
<sec id="sec2dot2-sensors-15-29478">
<title>2.2. Networked Embedded Systems and Traceability Systems</title>
<p>As stated in the previous section, we need a complete integrated solution to collect data in real-time in the most cost-effective way. Moreover, the framework must include adaptation capabilities and allow the development of system architectures similar to the generic structure of automated industrial processes. Finally, if product life cycle has to be deduced from the usual activities of operators, RFID readers (we selected RFID as the base technology for its successful results in previous deployments) must be seamlessly integrated into daily objects.</p>
<p>Given these premises, it is necessary to first select a basic theory that will help us develop our framework. It is clear that this basis must be related to networked embedded systems. The first efforts for integrating information technologies in the physical world and supporting different applications (including traceability systems), occurred in the electronics world. Since 2000, several terms have appeared in the literature and have been proposed in conferences to describe smart distributed electronic systems (more or less embedded in the physical world): Smart Home [
<xref rid="B41-sensors-15-29478" ref-type="bibr">41</xref>
,
<xref rid="B42-sensors-15-29478" ref-type="bibr">42</xref>
], Smart Office [
<xref rid="B43-sensors-15-29478" ref-type="bibr">43</xref>
], Intelligent Home [
<xref rid="B44-sensors-15-29478" ref-type="bibr">44</xref>
], and Smart Environments [
<xref rid="B5-sensors-15-29478" ref-type="bibr">5</xref>
,
<xref rid="B45-sensors-15-29478" ref-type="bibr">45</xref>
,
<xref rid="B46-sensors-15-29478" ref-type="bibr">46</xref>
], among others.</p>
<p>In parallel, some of the existing definitions delimited what kind of infrastructure could be considered one of these new systems. In 2000, [
<xref rid="B7-sensors-15-29478" ref-type="bibr">7</xref>
] stated that: “a smart space is a region of the real world that is extensively equipped with sensors, actuators and computing components”. In 2002, some authors decided to propose their own definitions. [
<xref rid="B47-sensors-15-29478" ref-type="bibr">47</xref>
] defines a Smart Environment as: “a system that is able to autonomously acquire and apply knowledge about the environment and adapt to its inhabitants’ preferences and requirements in order to improve their experience”. In 2005, the same authors proposed in [
<xref rid="B5-sensors-15-29478" ref-type="bibr">5</xref>
] a new definition: “a smart environment is a physical world that is interconnected through a continuous network abundantly and invisibly with sensors, actuators and computational units, embedded seamlessly in the everyday objects of our lives”.</p>
<p>Around 2010 interest in these systems waned, and researchers abandoned attempts to formalize the theoretical framework. At that time, a new concept had captured everyone’s attention: cyber-physical systems (CPS) [
<xref rid="B48-sensors-15-29478" ref-type="bibr">48</xref>
]. The term “cyber-physical systems” emerged around 2006, when it was coined by Gill at the National Science Foundation in the United States. Later, Lee developed the term in a relevant NSF report [
<xref rid="B15-sensors-15-29478" ref-type="bibr">15</xref>
]. However, in this work CPS are described as networked entities for real-time processing. Thus, research challenges are related to computational problems such as the creation of real-time applications or operating systems [
<xref rid="B49-sensors-15-29478" ref-type="bibr">49</xref>
]. Meanwhile the interest in CPS has changed to more vertical issues such as networking, communications, data services, decision making and pattern recognition.</p>
<p>Extremely important is the reference architecture (see
<xref ref-type="fig" rid="sensors-15-29478-f001">Figure 1</xref>
) proposed in June 2015 by the National Institute of Standards and Technology (NIST). The CPS public working group proposes that: “cyber-physical Systems or “smart” systems are co-engineered interacting networks of physical and computational components”. Besides being more general than the original, this new definition and reference architecture present the advantage of being the standard on which commercial products of CPS will be based.</p>
<p>
<xref ref-type="table" rid="sensors-15-29478-t001">Table 1</xref>
compares the most important theories about networked embedded devices in relation to the classical features of RFID-based traceability systems (as described in [
<xref rid="B49-sensors-15-29478" ref-type="bibr">49</xref>
]). Besides, the requirements deducted in the previous sections related to the three basic questions about traceability systems in small manufacturers (see the Introduction) are also included. As can be seen, CPS (as defined by the NIST) are aligned to the requirements of traceability systems, so we selected its reference architecture as the basis for our framework.</p>
<fig id="sensors-15-29478-f001" position="float">
<label>Figure 1</label>
<caption>
<p>Reference CPS architecture (NIST).</p>
</caption>
<graphic xlink:href="sensors-15-29478-g001"></graphic>
</fig>
<table-wrap id="sensors-15-29478-t001" position="float">
<object-id pub-id-type="pii">sensors-15-29478-t001_Table 1</object-id>
<label>Table 1</label>
<caption>
<p>Comparison among different theories about networked embedded systems in relation to traceability systems.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Feature and Requirements</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Smart Space Along [
<xref rid="B7-sensors-15-29478" ref-type="bibr">7</xref>
]</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Smart Environments Along [
<xref rid="B1-sensors-15-29478" ref-type="bibr">1</xref>
]</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Smart Environments Along [
<xref rid="B5-sensors-15-29478" ref-type="bibr">5</xref>
]</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">CPS From [
<xref rid="B15-sensors-15-29478" ref-type="bibr">15</xref>
]</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">CPS From NIST</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Object identification capability</td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Real-time data capture</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Execution engine</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Decision capability</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Learning capability</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Prosumer focused</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Dynamical adaptation</td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Vertical approach</td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" rowspan="1" colspan="1"></td>
</tr>
<tr>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Can offer meaningful human-understandable information</td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1"></td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">✓/✗</td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1"></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>✓: Included in the definition; ✗: Not considered in the definition; ✓/✗: Available in some works.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>In the last three years, various works relating to CPS and process monitoring and traceability systems have appeared. In [
<xref rid="B50-sensors-15-29478" ref-type="bibr">50</xref>
], the future demands on automation systems (based on CPS) are shown, and new strategies for software deployment of automation applications and communication systems are discussed; more specifically, the system presented in [
<xref rid="B51-sensors-15-29478" ref-type="bibr">51</xref>
] describes an industrial cloud-based CPS.</p>
<p>Some works, such as [
<xref rid="B52-sensors-15-29478" ref-type="bibr">52</xref>
], focused on designing communication models for monitoring systems and processes using CPS while others provide simulation environments for CPS-based industrial systems ([
<xref rid="B53-sensors-15-29478" ref-type="bibr">53</xref>
] describes a CPS research project to support virtual design and verification of industrial processes).</p>
<p>However, as we mentioned in the Introduction and can be seen in [
<xref rid="B18-sensors-15-29478" ref-type="bibr">18</xref>
], the actual deployment of CPS in manufacturing environments has several drawbacks that are not easily resolved. We argue the new reference architecture proposed by the NIST will allow us to develop a framework being able to address these issues.</p>
</sec>
<sec id="sec2dot3-sensors-15-29478">
<title>2.3. RFID-Based Products</title>
<p>Compared to other research on automated industrial processes and traceability systems (usually focused on simulation environments [
<xref rid="B54-sensors-15-29478" ref-type="bibr">54</xref>
], software compatibility [
<xref rid="B55-sensors-15-29478" ref-type="bibr">55</xref>
,
<xref rid="B56-sensors-15-29478" ref-type="bibr">56</xref>
], wireless sensor networks [
<xref rid="B20-sensors-15-29478" ref-type="bibr">20</xref>
], or safety in automation systems [
<xref rid="B57-sensors-15-29478" ref-type="bibr">57</xref>
]), our framework will not only consider high-capacity generic computing platforms, but also both software and hardware components. Thus, all knowledge of low-energy computing platforms, seamless integration of electronic systems and real-time communications (originating from the world of CPS) can be applied to the manufacturing environment.</p>
<p>In this section, we focus on hardware components and review the state of the art in relation to the integration of RFID tags and readers in different everyday objects. In that way the third basic question about traceability systems in small companies (how to integrate RFID systems into the company’s current production processes?) is answered: by means of embedded tags and readers in daily objects.</p>
<p>Due to the business interest in control and traceability systems, over the years, some products, articles, conferences and so on have been about issues related to our aim (directly or indirectly).</p>
<p>On the one hand, as we have mentioned, since 2000, various research proposals for integrating electronic systems at home or in the workplace emerged: [
<xref rid="B41-sensors-15-29478" ref-type="bibr">41</xref>
] present the concept of “Smart Home”, in [
<xref rid="B43-sensors-15-29478" ref-type="bibr">43</xref>
] a “Smart Office” is designed and an “Intelligent Home” is planned in [
<xref rid="B44-sensors-15-29478" ref-type="bibr">44</xref>
].</p>
<p>Later, between 2003 and 2004, the concept of “smart furniture” became very popular in research. Various research papers on this subject, such as the general framework presented in [
<xref rid="B58-sensors-15-29478" ref-type="bibr">58</xref>
,
<xref rid="B59-sensors-15-29478" ref-type="bibr">59</xref>
], appeared. Furthermore, some patents, such as [
<xref rid="B60-sensors-15-29478" ref-type="bibr">60</xref>
], in which a RFID smart chair is described, were also given.</p>
<p>Finally, related to wearable technologies, several papers describe their use in traceability systems, especially cybernetic gloves. Thus, in 2005 a first prototype of a cybernetic glove appeared [
<xref rid="B61-sensors-15-29478" ref-type="bibr">61</xref>
], and recently, in February 2014, Fujitsu presented its own design for industrials environments [
<xref rid="B62-sensors-15-29478" ref-type="bibr">62</xref>
]. Independently, textile industry advances in the seamless integration between electronics and textiles, will enable a qualitative leap in wearable products [
<xref rid="B63-sensors-15-29478" ref-type="bibr">63</xref>
,
<xref rid="B64-sensors-15-29478" ref-type="bibr">64</xref>
].</p>
<p>On the other hand, although they are not considered integrated systems, several commercial “smart products” for stock control, environment adaptation to user and traceability have been developed recently.</p>
<p>In 2011, a smart poker table was presented in Italy by GTI Gaming [
<xref rid="B65-sensors-15-29478" ref-type="bibr">65</xref>
]. Based on RFID technology, this table implements a real-time technology capable of calculating the amount of pot, and rake, reporting defects, identifying the dealer, establishing a network of tables and so on.</p>
<p>Later, between December 2013 and February 2015, up to three smart clinical medicine dispensers were presented in Europe. The first, in Portugal [
<xref rid="B66-sensors-15-29478" ref-type="bibr">66</xref>
], was developed with Fujitsu’s collaboration. The others [
<xref rid="B67-sensors-15-29478" ref-type="bibr">67</xref>
,
<xref rid="B68-sensors-15-29478" ref-type="bibr">68</xref>
], developed in Spain in June 2015, are still undergoing tests.</p>
<p>Nevertheless, the most successful product in the market is SATO’s VINICITY technology [
<xref rid="B69-sensors-15-29478" ref-type="bibr">69</xref>
]. This technology is able to read various RFID tags at once, so it has been employed in several “smart products” such as trays, tables and medicine dispensers.</p>
</sec>
</sec>
<sec id="sec3-sensors-15-29478">
<title>3. Analysis of Manufacturing Scenarios. TF4SM: First Prototype Design</title>
<p>Manufacturing processes require precise control over each one of the phases comprising a process. Therefore, traceability becomes an increasingly important functionality to be implemented in process control systems. This section analyzes manufacturing scenarios in small companies (the motivation scenario of our work), and the requirements to be met to enable precise monitoring and traceability information acquisition. After describing the requirements of small manufacturing companies, we present the new traceability framework and the design of a first minimum functional prototype is proposed.</p>
<sec id="sec3dot1-sensors-15-29478">
<title>3.1. Analysis of Manufacturing Scenarios: Motivation Scenario</title>
<p>Manufacturing companies, in their day to day operation, perform various kinds of processes, such as logistic processes (including the receiving process and the inventory process) and production processes. The
<italic>receiving process</italic>
models the arrival of some units that must be tagged with RFID and reported in the corresponding receipt notice (which it was traditionally printed and, nowadays, it is digitalized). The received units may optionally aggregate into larger logistics units. If some units are not included in a purchase order, typically they must be discarded. After that, the received logistics units are moved to a warehouse. The execution results are reported in the corresponding transfer notice (which, one more time, was traditionally printed and, nowadays, it is digitalized). An
<italic>inventory process</italic>
is executed in parallel, and applies to all stored items that are cyclically counted. It would be a desirable feature that the system will issue alerts in cases of shortage or inconsistency of inventoried goods.</p>
<p>During the
<italic>production process</italic>
, warehouse operators select and supply the required quantities of raw materials that are specified in the production task instructions and attach the RFID labels of their containers onto the electronic reader. The production operator attaches his personal identification card to start a
<italic>production task</italic>
. Once the production process is finished the operator prints new RFID and/or barcode labels (depending on the system implemented) for the remaining materials that are scheduled for return to the warehouse and the products (ready or semi-finished) that are processed during each production task. Traceability information is used to execute consistency checks to determine quantities of raw materials consumed, the spoilage, the utilization of tools and labor, as well as the machine operation and stop times. It would be a desirable feature that the system will issue alarms in case of discrepancy (
<italic>i.e.</italic>
, illegal operator or equipment), excessive consumption, and/or low production rate.</p>
<p>Taking into account the previous description, some additional requirements (introduced by the specific needs of small-sized manufacturing companies) have been considered in the framework development (apart from the ones presented in the previous sections):
<list list-type="bullet">
<list-item>
<p>REQ#1: the event monitoring function and production task traceability must be independent of the location of the information source and the hardware used. Traditional control systems were limited to the capability of the controller residing inside.</p>
</list-item>
<list-item>
<p>REQ#2: it should define a flexible and extensible architecture for the integration of various systems, wireless sensor networks (WSN), actuators, execution engines, among other things.</p>
</list-item>
<list-item>
<p>REQ#3: it should be capable of suspending current operations when the data obtained is corrupt, the task performed does not correspond to the expected one and/or some defined rules for the tasks are not satisfied.</p>
</list-item>
<list-item>
<p>REQ#4: the system must be easily configurable to allow communication with new elements and seamless interchange of new events. Traditional tag-based systems required early binding, that is, a configuration stage to link data sources and consumers of data.</p>
</list-item>
<list-item>
<p>REQ#5: the infrastructure must be capable of identifying each user or user role to determine the task to be performed. User roles are also considered for the cases when regulation does not allow identification of employees.</p>
</list-item>
<list-item>
<p>REQ#6: the system must assign tasks to different users who collaborate to complete the process.</p>
</list-item>
<list-item>
<p>REQ#7: ability to reconstruct every production step. This is required both for regulatory compliance and as an important basis for production environments.</p>
</list-item>
</list>
</p>
</sec>
<sec id="sec3dot2-sensors-15-29478">
<title>3.2. TF4SM: A New Traceability Framework for Small Manufacturing Companies</title>
<p>As we have seen, improving traceability systems in small-sized manufacturing companies inevitably requires using information technologies. Among all the available technologies, we selected cyber-physical systems (and specifically, CPS according to the NIST definition) as the most appropriate. Therefore, we took the reference architecture showed in
<xref ref-type="fig" rid="sensors-15-29478-f001">Figure 1</xref>
as our basis. Over it, we added or changed the elements necessary to fully check the requirements described in the previous sections. Our proposed Traceability Framework for Small Manufacturers (TF4SM) is the result of this process (
<xref ref-type="fig" rid="sensors-15-29478-f002">Figure 2</xref>
).</p>
<fig id="sensors-15-29478-f002" position="float">
<label>Figure 2</label>
<caption>
<p>TF4SM architecture.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g002"></graphic>
</fig>
<p>Next, we are briefly describing each part of the framework, and how they cover the previously presented requirements. The TF4SM framework consists of six levels of abstraction:
<list list-type="bullet">
<list-item>
<p>The physical systems include all instruments, industrial systems and manufacturing elements and products present in the company’s facilities.</p>
</list-item>
<list-item>
<p>Cybernetic devices layer refers to the embedded devices which contains RFID readers and/or RFID tags, as well as to all elements which make up the subjacent pervasive computing system [
<xref rid="B70-sensors-15-29478" ref-type="bibr">70</xref>
]. The inclusion of mobile computing in the framework (we describe the communications plane later) partially covers REQ#1 (the system must show correct performance, independently of the information source’s location). In addition, working with embedded devices allows us to answer the third basic question about traceability systems: how to integrate RFID system into the company’s production processes. Although this paper refers to cybernetic devices, this kind of technologies has been commonly studied as “smart objects”. For example, in [
<xref rid="B71-sensors-15-29478" ref-type="bibr">71</xref>
] the relevance of smart objects is highlighted in several application scenarios.</p>
</list-item>
<list-item>
<p>The Monitor and Control System refer to the interlayer which adapts cybernetic devices to high level computing schemes. It contains, mainly, data acquisition from RFID readers and data pre-processing. The inclusion of this layer allows creating hardware independent traceability systems. Embedded devices are placed below this layer and knowledge feedback loops are defined on top. This breakdown between knowledge management processes and the hardware which supports the system agree fully with the second part of REQ#1.</p>
</list-item>
<list-item>
<p>The Data Analytics layer, as in NIST reference architecture, processes data from different devices for pattern recognition and extracts data using machine learning and data mining. It also includes visual analytics oriented to the operator. Moreover, pattern recognition capability fulfills REQ#7 (which describes the ability to reconstruct every production step), as it allows inferring workers’ activities from data collected by RFID readers. The algorithms included in this layer also answer the last basic question which remains unresolved (how to translate the real-time data into meaningful information for the field operator?). Decision making uses results from Data Analytics as input for determining the next action which must be executed (issue an alert, suspend an operation,
<italic>etc.</italic>
). Thanks to the support of Data Analytics layer corrupt data can be detected, and this layer can order an operation to be suspended. In that way, REQ#3 is covered, and some desirable features are included.</p>
</list-item>
<list-item>
<p>Finally, in the Business Goals layer, rules about alerts, user’s roles, minimum stock, automatic orders or emergency situations can be defined. The interface offered by the system at this level will be specific of the application domain (depend on the product manufactured in the company), so any technological expert must control the traceability system (what was desirable). As this layer is placed at human abstraction level, identities, workflows, tasks or collaborative work can be defined. Thus, REQ#5 and REQ#6 get fulfilled.</p>
</list-item>
<list-item>
<p>Apart the previously described layers, the framework architecture includes six planes which cross vertically all the layers:
<list list-type="bullet">
<list-item>
<p>Timing: In traceability systems, time issues are not critical. Therefore, in our framework timing has been resolved including a timestamp in each data produced by the cybernetic devices. Any other solution is considered as this datum is enough for tracing the products’ life;</p>
</list-item>
<list-item>
<p>Interoperability: Traceability systems are conceived as corporative infrastructure, so typically any external access will be admitted. In the case of joining various systems, communication will be performed at high level through Representational State Transfer (REST) interfaces, much more flexible than other technologies;</p>
</list-item>
<list-item>
<p>Security: Security systems native from RFID-based traceability systems (based on safe RFID tags [
<xref rid="B72-sensors-15-29478" ref-type="bibr">72</xref>
] and hash tables) have been widely proved as enough safe, so we maintain the same technologies in our framework;</p>
</list-item>
<list-item>
<p>Human-System interaction: Two different levels are distinguished. At cybernetic devices layer, any direct interface toward the physical world is described, so the communication will be based on Implicit Human-Computer Interaction (IHCI) [
<xref rid="B73-sensors-15-29478" ref-type="bibr">73</xref>
]. In higher layers, specific graphical interfaces will be defined to communicate operators with the system;</p>
</list-item>
<list-item>
<p>Data and data services: The same philosophy applied in the case of “Interoperability” is valid here;</p>
</list-item>
<list-item>
<p>Networking and communications: Communications must support a flexible architecture [
<xref rid="B74-sensors-15-29478" ref-type="bibr">74</xref>
,
<xref rid="B75-sensors-15-29478" ref-type="bibr">75</xref>
]. In order to achieve this objective four technologies coexist in our proposed framework. First, cybernetic devices must implement RFID technology (to trace products’ life) and Bluetooth Low-Energy (BLE) standard (to transmit the readings toward the monitor and control system). The use of wireless technologies, in addition, supports the creation of a mobile computing scheme. Second, over BLE, a Publish/Subscribe protocol will be deployed. Actually, the use of the Publish/Subscribe communication paradigm facilitates binding between data sources and consumers of data [
<xref rid="B76-sensors-15-29478" ref-type="bibr">76</xref>
], as the intermediate entity called “broker” manages registration and decouples entities in time and space. This improves system architecture flexibility (which deals with REQ#4 and REQ#2), as data sources do not have to be aware of the existence or number of data consumers and
<italic>vice versa</italic>
. Furthermore, some Publish/Subscribe communication protocols, such as the Message Queuing Telemetry Transport (MQTT), support reliable communication that includes retransmission of lost frames and acknowledge events (which guaranteed the delivery of information). Finally, the communication among the monitor and control system and the higher abstraction layers will be performed over standard network technologies such as TCP/IP (which allows using the existent communications infrastructure in the company).</p>
</list-item>
<list-item>
<p>Inter-systems services: One more time, the same philosophy applied in the case of “Interoperability” is valid here.</p>
</list-item>
</list>
</p>
</list-item>
</list>
</p>
</sec>
<sec id="sec3dot3-sensors-15-29478">
<title>3.3. First Prototype Design</title>
<p>Once presented the reference architecture for our framework, we design and build the first minimum functional prototype based on it. In this section, we first evaluate the minimum features we must include in the prototype for being able to validate its usability. Later, we present the list of elements which have to be built and the physical architecture considered.</p>
<p>In manufacturing companies three basic elements are involved: workers, products and the workplace (usually a bench of some type). In some traceability solutions, such as fully automated solutions, only products and the workplace are taking into account. However, these kinds of solutions are commonly designed for heavy industry companies (such as automakers), where companies have very extensive work areas, lots of investment and production processes use high-volume products. In these scenarios, high-tech expensive deployments such as robotics (which may be part of both the traceability system and the production system), or high arches for automated reading of low frequency RFID tags (which can be used without risk of reading tags of wrong areas thanks to the breadth of the production area) are feasible solutions. In contrast, in small manufacturing companies products are made with small supplies, which does not require manipulation by robots (that sometimes cannot even be done), so that investment in traceability systems based on robotics is not justified (especially considering the resources these companies usually have). Furthermore, deployment of fully automated systems often requires large spaces, not always available in small companies (sometimes made up of less than five workers), so alternatives must be evaluated. In works on this issue [
<xref rid="B9-sensors-15-29478" ref-type="bibr">9</xref>
,
<xref rid="B12-sensors-15-29478" ref-type="bibr">12</xref>
], it is clear that the key to overcome this difficulty passes to monitor actions performed by workers without replacing them with robots, including heavy infrastructure in the work area or assigning additional tasks to operators which decline their productivity. Therefore, our prototype must include human interaction, and workers have to be incorporated into the system in the most appropriate way.</p>
<p>Products, as considered in the TF4SM framework, will be provided with a NFC tag which identifies each one unequivocally. Later, this NFC tag must be detected when products are placed on the work table and when they are being manipulated by workers, so both elements (workers and work areas) have to be provided with NFC reader capability. For the operators, we designed a cybernetic glove with only NFC reader capability as the objective was to create a very light wearable device, which does not impede work, and for which ”pay attention once placed” is not necessary. For the workspace, NFC reader capability was not enough (we designed a cybernetic surface with four different reader zones), so four types of LED are included to notify the user of the progress in the process.</p>
<p>Previously described devices complete the cybernetic devices layer. Although in the general case layers can be implemented in different systems, in this first prototype we implement them into the execution engine to orchestrate the whole system. In order to enable human-system interactions at the top level, a visual application running in a visualization platform (or human-machine interface) is also provided. Through this platform, the state of the production process can be monitored and workflows and tasks can be defined (being also able to consult their compliance). Then, the final prototype’s physical architecture can be seen in
<xref ref-type="fig" rid="sensors-15-29478-f003">Figure 3</xref>
a.</p>
<fig id="sensors-15-29478-f003" position="float">
<label>Figure 3</label>
<caption>
<p>(
<bold>a</bold>
) Designed TF4SM physical architecture (
<bold>b</bold>
) Designed TF4SM functional architecture.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g003"></graphic>
</fig>
<p>As
<xref ref-type="fig" rid="sensors-15-29478-f003">Figure 3</xref>
a shows, another element has been included: a Publish/Subscribe broker. This element allows the spatial and temporal decoupling between publishers and subscribers and, in our system; it avoids having to reconfigure the rest of devices each time a device goes on or off. However, as this element belongs to the networking and communications plane and was not the focus of this work, it was omitted (an in-depth discussion about this subject can be found in articles, such as [
<xref rid="B77-sensors-15-29478" ref-type="bibr">77</xref>
]). A functional architecture can be also considered (
<xref ref-type="fig" rid="sensors-15-29478-f003">Figure 3</xref>
b). First, we developed the NFC reader capability and the LED handling capability. These modules must be controlled from a component capable of extracting useful information from the NFC frames and capable of generating the electrical signal needed for turning on (or off) the LEDs. The cybernetic table and the cybernetic glove both support these capabilities. The event generation capability was later distributed among all the cybernetic devices and the execution engine. Depending on the system’s state at a particular moment any of these components can generate an event (see
<xref ref-type="sec" rid="sec4dot2-sensors-15-29478">Section 4.2</xref>
). Once an event has been generated, an evaluation step (executed in the same device where the event was produced) decides if the event must be published (using the Publish/Subscribe system) or any action must be directly executed (both options may be necessary). All the components in the prototype (cybernetic devices, execution engine and visualization platform) have processing capability (so they form a pervasive computing scheme). The processing step can cause a change in visualization platform, in LED state, a workflow update and/or an operation over the databases (in
<xref ref-type="sec" rid="sec4dot1-sensors-15-29478">Section 4.1</xref>
the storage capacity of the system is described in detail). Both workflow management and storage management capabilities belong to the execution engine. Finally, depending on the workflow defined in the human-machine interface (HMI, also implemented in the execution engine), a workflow update can generate a new event, which performs the same cycle described.</p>
</sec>
</sec>
<sec id="sec4-sensors-15-29478">
<title>4. System Construction</title>
<p>This section explains the implementation of the solution that was designed following the TF4SM framework, and its deployment in the application scenario.</p>
<sec id="sec4dot1-sensors-15-29478">
<title>4.1. System Implementation</title>
<p>As we have said in
<xref ref-type="sec" rid="sec3dot3-sensors-15-29478">Section 3.3</xref>
, the system must be made up of the following four elements: a cybernetic glove, a cybernetic table, an execution engine which communicates with cybernetic devices by means of a byte-oriented protocol, and a visualization platform displaying the status of the monitoring system and process execution.</p>
<p>One of the most important components in the designed system is the cybernetic glove. Even workers monitoring the system should increase process efficiency. However, human behavior is complex and sometimes random. Because of this, false measurements, erroneous events and similar mistakes can appear in the system if a cybernetic glove alone is considered (for example, as we will see later, if in the production process the glove passes near a tag it might be read, even when the object has not been picked up or used). In order to eliminate these measurement errors, more cybernetic devices are necessary (in this case we have selected a table because of the type of process considered). With the additional information provided by these additional devices, and using a proper algorithm (running in the execution engine), a more accurate picture of the current situation can be obtained.</p>
<p>
<xref ref-type="fig" rid="sensors-15-29478-f004">Figure 4</xref>
shows our prototype for a cybernetic glove. The cybernetic glove consists of a plastic package placed on the front side of the wrist (so as not to impede movement), a galvanized copper coil to allow NFC communication with tagged cybernetic devices, and a synthetic textile support, whose properties do not significantly affect the magnetic field generated by the NFC module.</p>
<fig id="sensors-15-29478-f004" position="float">
<label>Figure 4</label>
<caption>
<p>Example of hand movement with our cybernetic glove, (
<bold>a</bold>
) palm and (
<bold>b</bold>
) back sides.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g004"></graphic>
</fig>
<p>In
<xref ref-type="fig" rid="sensors-15-29478-f005">Figure 5</xref>
a we present the electronic scheme of the cybernetic glove. As can be seen, five elements compose the glove: a LiPO battery, a galvanized copper coil as an inductive antenna, an RDM8800 NFC chip [
<xref rid="B78-sensors-15-29478" ref-type="bibr">78</xref>
], an Arduino Nano platform, and an HC-06 Bluetooth slave module. The cybernetic table is also provided with four different types of LED.</p>
<p>A brief explanation of the function of each element follows:
<list list-type="bullet">
<list-item>
<p>The LiPO battery has a capacity of 850 mAh and 3.7 V. As the total current consumption of the glove is 140 mA, the glove has the capacity to operate for about 6 h;</p>
</list-item>
<list-item>
<p>The galvanized copper coil acts as an inductive antenna, resonant at NFC frequency (13.56 MHz);</p>
</list-item>
<list-item>
<p>The RDM8800 NFC chip receives physical signals from the antenna, and produces a data frame encapsulating, among other fields, the identifier of the tagged cybernetic device that is in contact with the glove. The output interface is UART-serial type (at 9600 bauds);</p>
</list-item>
<list-item>
<p>The Arduino Nano platform receives data from RDM8800 by UART and extracts the tagged cybernetic device’s identifier. Finally, it encapsulates the identifier in an application protocol message and transmits the message by a second UART at 19,200 bauds;</p>
</list-item>
<list-item>
<p>The HC-06 Bluetooth slave module receives data by UART at 19,200 bauds and transmits them through a Bluetooth 3.0 interface;</p>
</list-item>
<list-item>
<p>The table’s LEDs are used as actuators to notify the user of different types of events.</p>
</list-item>
</list>
</p>
<p>Thanks to NFC technology, and controlling some of the antenna configurations, we can greatly reduce the distance at which the glove detects the presence of a tagged cybernetic object (see
<xref ref-type="fig" rid="sensors-15-29478-f006">Figure 6</xref>
). Thus, we can say that the glove performs readings by contact.</p>
<fig id="sensors-15-29478-f005" position="float">
<label>Figure 5</label>
<caption>
<p>(
<bold>a</bold>
) Electronic scheme of the cybernetic glove; (
<bold>b</bold>
) Plastic holder graduated in height for measuring glove behavior.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g005"></graphic>
</fig>
<p>Despite this, it is necessary to consider some limitations. On the one hand, metallic objects cannot be considered due to their capacity to affect magnetic fields. On the other, as the magnetic field generated by the NFC reaches a maximum distance of 1.5 cm and only one device can be detected at once by the glove, we must guarantee that only one tagged cybernetic device is less than 1.5 cm from the glove.</p>
<p>In order to measure the data, from which we prepared
<xref ref-type="fig" rid="sensors-15-29478-f006">Figure 6</xref>
, we used a plastic holder with several grids, separated (from each other) vertically by 0.5 cm (see
<xref ref-type="fig" rid="sensors-15-29478-f005">Figure 5</xref>
b). The experimental procedure was conducted as follows:
<list list-type="bullet">
<list-item>
<p>Five points were selected in height: 0 cm, 1 cm, 1.5 cm, 1.8 cm and 2 cm;</p>
</list-item>
<list-item>
<p>For each point in height, a set of 10 measurements were made. The probability of correct reading for each point was calculated by means of Laplace definition Equation (1):
<disp-formula id="FD1">
<label>(1)</label>
<mml:math id="mm1">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mo stretchy="false">(</mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>t</mml:mi>
<mml:mo> </mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo>=</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>b</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mo> </mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>t</mml:mi>
<mml:mo> </mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>b</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mo> </mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mo> </mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
</list-item>
<list-item>
<p>The second step was repeated ten times, obtaining ten different values of the correct reading probability for each point in height.
<xref ref-type="fig" rid="sensors-15-29478-f005">Figure 5</xref>
shows the clouds of points obtained, along with a piecewise linear fit (blue line) obtained by minimizing the mean square error. The bubble size indicates the number of times a given value has occurred.</p>
</list-item>
</list>
</p>
<fig id="sensors-15-29478-f006" position="float">
<label>Figure 6</label>
<caption>
<p>Evolution of the detection probability based on distance between the glove and the tagged device.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g006"></graphic>
</fig>
<p>In
<xref ref-type="fig" rid="sensors-15-29478-f007">Figure 7</xref>
a we present our prototype for a cybernetic table. It is made of a plastic material (which does not interfere with electromagnetic fields) and on whose surface we have defined four detector areas.</p>
<p>In
<xref ref-type="fig" rid="sensors-15-29478-f007">Figure 7</xref>
b an electronic scheme of the table is presented. As can be seen, there are four dedicated microcontrollers (one for each detector area), and one manager microcontroller. When a dedicated microcontroller has data to transmit, it requests permission from the manager, and transfers the message using a physical protocol. This physical protocol consists of two lines: the permission line serves as output for manager and input for dedicated microcontrollers, and the solicitation line serves as input for manager microcontroller and output for dedicated units.</p>
<p>The protocol is defined below and is also presented in
<xref ref-type="fig" rid="sensors-15-29478-f008">Figure 8</xref>
:
<list list-type="bullet">
<list-item>
<p>When a dedicated microcontroller wants to transmit data using the Bluetooth module connected to the manager unit, it sets the solicitation line to high value;</p>
</list-item>
<list-item>
<p>The manager unit recognizes this signal change and checks whether or not the Bluetooth module is in use. If it is not, it clears the Bluetooth buffers and deletes old transitions. It also sets the permission line to high value to indicate that it is expecting Bluetooth connections;</p>
</list-item>
<list-item>
<p>When the dedicated microcontroller detects a high level in the permission line, it starts the data transmission. At the end of the transmission, it also sets the solicitation line to low level;</p>
</list-item>
<list-item>
<p>Finally, when the solicitation line changes to low level, the manager microcontroller also sets the permission line to low level again. </p>
</list-item>
</list>
</p>
<p>Additionally, the maximum distance at which a tagged device is detected by the table is much shorter than the corresponding distance in the glove (see
<xref ref-type="fig" rid="sensors-15-29478-f009">Figure 9</xref>
). As can be seen, this maximum distance is, in this case, 2.5 mm. To obtain this result, the same procedure explained for
<xref ref-type="fig" rid="sensors-15-29478-f006">Figure 6</xref>
was followed (although, in this case, only four points in height were considered).</p>
<fig id="sensors-15-29478-f007" position="float">
<label>Figure 7</label>
<caption>
<p>(
<bold>a</bold>
) Prototype of a cybernetic table; (
<bold>b</bold>
) Electronic scheme of the cybernetic table.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g007"></graphic>
</fig>
<fig id="sensors-15-29478-f008" position="float">
<label>Figure 8</label>
<caption>
<p>Physical protocol to allow communication between the manager Arduino and dedicated Arduinos, (
<bold>a</bold>
) Sequence diagram; (
<bold>b</bold>
) Chronogram.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g008a"></graphic>
<graphic xlink:href="sensors-15-29478-g008b"></graphic>
</fig>
<fig id="sensors-15-29478-f009" position="float">
<label>Figure 9</label>
<caption>
<p>Evolution of the detection probability based on the distance between the table and the tagged device.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g009"></graphic>
</fig>
<p>
<xref ref-type="fig" rid="sensors-15-29478-f010">Figure 10</xref>
a shows the functional decomposition of the execution engine. As can be seen, four elements can be characterized (see
<xref ref-type="sec" rid="sec3dot3-sensors-15-29478">Section 3.3</xref>
and
<xref ref-type="fig" rid="sensors-15-29478-f003">Figure 3</xref>
b). First, there is an HMI through which users can define the system’s behavior and workflows. Second, it includes a processor where workflow management, storage management, event processing and generation and system coordination are executed. Finally, two databases for information storing are also included. The first one stores the traces generated by the system in order to be able to recover past executions. The second one stores all the information about cybernetic devices, users and tagged objects (such as ID, logical name and actions allowed). All the elements that make up the execution engine are built using Java technologies, such as JavaX Bluetooth libraries and hsqlDB manager.</p>
<p>As we have explained in the previous sections, the execution engine has workflow and storage management capabilities. Thus, it will usually be informed about all the events in the system. However, as we have said in
<xref ref-type="sec" rid="sec3-sensors-15-29478">Section 3</xref>
and will see in
<xref ref-type="table" rid="sensors-15-29478-t002">Table 2</xref>
and
<xref ref-type="table" rid="sensors-15-29478-t003">Table 3</xref>
, our TF4SM framework (and consequently this first prototype) allows distributed event processing. Each event may be processed on the same device where it is generated (totally or partially), or it can be transmitted toward remote components. It is also possible to perform both actions.</p>
<p>Other capabilities, such as signal power or signal quality measurements, are considered to detect when a device is entering or leaving the system (this way the system will adapt automatically).</p>
<fig id="sensors-15-29478-f010" position="float">
<label>Figure 10</label>
<caption>
<p>(
<bold>a</bold>
) Functional decomposition of the execution engine; (
<bold>b</bold>
) Visualization platform.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g010"></graphic>
</fig>
<p>The visualization platform consists of a Java graphical application on which the system state and workflows advances are constantly shown (
<xref ref-type="fig" rid="sensors-15-29478-f010">Figure 10</xref>
b). Finally, we must describe the byte-oriented application protocol that allows communication among the different cybernetic devices and the execution engine. A byte-oriented (also called character-oriented or text-oriented) protocol is a communications protocol in which full bytes are used as control codes. The main advantage of these protocols is that they can be directly understood by humans.</p>
<p>In many CPS scenarios [
<xref rid="B79-sensors-15-29478" ref-type="bibr">79</xref>
,
<xref rid="B80-sensors-15-29478" ref-type="bibr">80</xref>
], other technologies such as XML or JSON are preferred, as they are also efficient, human readable and can also be transmitted via HTTP. However, this is not possible with the selected hardware (which only has 2 KB of SRAM and 30 KB available in EEPROM). First, specific and heavy libraries are necessary (because Arduino is not designed for parsing XML or JSON documents). Nevertheless, the EEPROM space is almost full with Arduino libraries (which includes String library), Publish/Subscribe protocol code and NFC processing code, so it would be quite impossible to add any additional library. Second, the control characters needed in XML or JSON are more than the ones used in a specific protocol, so communication slows down in these cases (We used virtual communication infrastructures and an 8 MHz processor). And, finally, a rigid message structure allows processing the messages while they are being received, so not all the characters must be stored, and the available SRAM needed is smaller. Therefore, we have designed a specific byte-oriented application protocol for this scenario.</p>
<p>In this case, only two different messages are considered: DEVICE ADVERTISEMENT message and EVENT message (
<xref ref-type="fig" rid="sensors-15-29478-f011">Figure 11</xref>
).</p>
<fig id="sensors-15-29478-f011" position="float">
<label>Figure 11</label>
<caption>
<p>Scheme of protocol messages; (
<bold>a</bold>
) DEVICE ADVERTISEMENT message; (
<bold>b</bold>
) EVENT message.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g011"></graphic>
</fig>
<p>When a new cybernetic device (uniquely identified throughout the world by its Bluetooth MAC address) is connected to the prototype, the first thing it must do is to inform about the events it can generate (for example, new tagged-object detected) and the operations it can execute (such as blinking a LED). This way, the execution engine (which will be subscribed to the appropriate topic) can present that information on the HMI, and users are able to use them in their workflows and processes. This way the proposed prototype is adapted to the arrival of new devices and is adaptable to use new capabilities provided by the cybernetic device. This information is sent via a DEVICE ADVERTISEMENT message. The message structure is as follows:
<list list-type="bullet">
<list-item>
<p>In the header line, we must indicate the message type: Device Advertisement;</p>
</list-item>
<list-item>
<p>In the first line of the body, we must place the identification of the new device, followed by a blank space and (optionally) an alias which will appear on the HMI;</p>
</list-item>
<list-item>
<p>Then, an empty line indicates the beginning of the list of events the device can generate. In each line, first the event code must be placed (see
<xref ref-type="sec" rid="sec4dot2-sensors-15-29478">Section 4.2</xref>
). Later, optionally and separated by a blank space, a description of the event including its parameters, meaning or any other information can be incorporated;</p>
</list-item>
<list-item>
<p>A new empty line indicates the end of the list of events, and the beginning of the list of actions the device can execute. The list format is the same as in the previous case;</p>
</list-item>
<list-item>
<p>The message ends with an empty line.</p>
</list-item>
</list>
</p>
<p>Being strict, as our prototype is only going to have two types of devices (cybernetic gloves and cybernetic tables), a manual configuration of these elements could be done, and the ADVERTISEMENT message is dispensable. However, in order to verify the full performance of the TF4SM framework (including the initial configuration) we have chosen to consider this transaction. An EVENT message is sent each time a cybernetic device generates an event, and this event must be notified to another device. The message structure is as follows:
<list list-type="bullet">
<list-item>
<p>In the header line, we must indicate the message type: Event;</p>
</list-item>
<list-item>
<p>In the first line of the body, we must place the identification of the device which notifies the event;</p>
</list-item>
<list-item>
<p>In the second line the event code (see
<xref ref-type="sec" rid="sec4dot2-sensors-15-29478">Section 4.2</xref>
) must be placed first. Then, after a blank space, it is possible to place as many parameters as required in the event, following the format “parameter = value” and separated from each other by semicolons. The carriage return marks the end of the parameter list;</p>
</list-item>
<list-item>
<p>The message ends with an empty line.</p>
</list-item>
</list>
</p>
</sec>
<sec id="sec4dot2-sensors-15-29478">
<title>4.2. Process Model</title>
<p>Having described the physical implementation, in this section we now present how workflow definition and verification work in our prototype and, in general, how a TF4SM-based system operates.</p>
<p>In our prototype, we consider a workflow as a collection of states related to each other by transitions, which are executed when one or various events occur (as in a finite-state machine). Examples of workflows are the inventory and the manufacturing processes explained in the motivation scenario. Additionally, workflows are considered logical objects, so they encapsulate their own attributes and methods (such as the owner or the date of the last execution).</p>
<p>In each state two activities are executed, one when entering the state (entry activity) and another when exiting (exit activity). The problem is that the activities that are usually described in a workflow consist of several actions that cannot be run directly on cybernetic devices, but should be modeled using the operations they offer. An example of activity is the production task explained in the motivation scenario. Activities encapsulate their own attributes and methods (such as the activity number).</p>
<p>We define an activity as an ordered collection of atomic operations. One operation can only be executed if all the previous operations have been successfully completed. As activities are the smallest logical object, if one atomic operation fails, the whole activity fails. Finally, we call atomic operations those operations which can be executed only with one interaction in the prototype (for example, picking up a tagged-object, turning on a LED,
<italic>etc.</italic>
). Atomic operations match operations announced by cybernetic devices in their DEVICE ADVERTISEMENT message.
<xref ref-type="table" rid="sensors-15-29478-t002">Table 2</xref>
presents the atomic operations currently supported in our system.</p>
<table-wrap id="sensors-15-29478-t002" position="float">
<object-id pub-id-type="pii">sensors-15-29478-t002_Table 2</object-id>
<label>Table 2</label>
<caption>
<p>Atomic operations currently supported in the TF4SM.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Operation</th>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Source</th>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">LED_ON</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns on the LED specified in the
<italic>identification</italic>
parameter. If
<italic>durationTime</italic>
value is not included, LED remains on indefinitely. Otherwise, LED is on during
<italic>durationTime</italic>
seconds. If the LED is already on, nothing happens.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">LED_OFF</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns off the LED specified in the
<italic>identification</italic>
parameter. If
<italic>durationTime</italic>
value is not included, LED remains off indefinitely. Otherwise, LED is off during
<italic>durationTime</italic>
seconds. If the LED is already off, nothing happens.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_PUSH_GLOVE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Glove</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns on the glove’s NFC interface. If any parameter is included, the operation finishes when any NFC tag is read. If
<italic>durationTime</italic>
value is specified NFC interface stays on during
<italic>durationTime</italic>
seconds. If
<italic>identification</italic>
parameter is included, NFC interface stays on until the tag with the specified ID is read. It is possible to combine
<italic>durationTime</italic>
and
<italic>identification</italic>
value to obtain more complex behaviors.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_PUSH_TABLE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns on the table’s NFC interface associated with
<italic>activeZone</italic>
area. If any parameter is included, operation finishes when any NFC tag is read. If
<italic>durationTime</italic>
value is specified NFC interface stays on during
<italic>durationTime</italic>
seconds. If
<italic>identification</italic>
parameter is included, NFC interface stays on until the tag with the specified ID is read. It is possible to combine
<italic>durationTime</italic>
and
<italic>identification</italic>
value to obtain more complex behaviors.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_POP_GLOVE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Glove</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns off the glove’s NFC interface. If any parameter is included, operation finishes when the NFC tag that is being read is withdrawn or if there is none, immediately. If
<italic>durationTime</italic>
value is specified NFC interface stays on during
<italic>durationTime</italic>
seconds and then turned off.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_POP_TABLE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Turns off the table’s NFC interface associated with
<italic>activeZone</italic>
area. If any parameter is included, operation finishes when the NFC tag which is being read is withdrawn, or, if there is none, immediately. If
<italic>durationTime</italic>
value is specified NFC interface stays on during
<italic>durationTime</italic>
seconds and then turned off.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">SHOW_MESSAGE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Visualization platform</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Shows on visualization platform a pop-up window, where the content of
<italic>message</italic>
value is printed.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Besides the atomic operations, as we mentioned in
<xref ref-type="sec" rid="sec3dot3-sensors-15-29478">Section 3.3</xref>
, cybernetic devices can also generate, process and receive different types of events. In an evaluation step, it is decided whether or not one event is processed in the same device where it is generated, or transmitted by means of an EVENT message to other devices (to execution engine, for example, in order to update workflow state).
<xref ref-type="table" rid="sensors-15-29478-t003">Table 3</xref>
presents the events that are currently supported in our system.</p>
<p>Considering the motivation scenario (see
<xref ref-type="sec" rid="sec3dot1-sensors-15-29478">Section 3.1</xref>
), although various workflows can be executed in parallel (
<italic>receiving process</italic>
and
<italic>inventory process</italic>
), activities in each workflow such as the
<italic>production task</italic>
can always be executed sequentially. We simplify our process design and support only linear workflows. In this scheme, only one set of events allows advancing to the next state, and any other set causes the workflow to fail (see
<xref ref-type="fig" rid="sensors-15-29478-f012">Figure 12</xref>
).</p>
<p>Finally, three states are mandatory in all the workflows defined in this first prototype. First, in all workflows
<italic>the fail state</italic>
must be included. When a WORKFLOW_FAIL event is triggered, workflow transits toward
<italic>fail state</italic>
from any other state. Second, the
<italic>final state</italic>
is also mandatory.</p>
<table-wrap id="sensors-15-29478-t003" position="float">
<object-id pub-id-type="pii">sensors-15-29478-t003_Table 3</object-id>
<label>Table 3</label>
<caption>
<p>Events currently supported in the TF4SM.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Event</th>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Source</th>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_PUSH_GLOVE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Glove</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when an NFC tag is detected by the cybernetic glove. In
<italic>identification</italic>
parameter, the read tag’s ID must be indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_PUSH_TABLE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when one NFC tag is detected by the cybernetic table. The
<italic>activeZone</italic>
value includes the reader area where the tag has been detected and in
<italic>identification</italic>
parameter, the tag’s ID must be indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_POP_GLOVE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Glove</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when an NFC tag previously detected by the cybernetic glove is withdrawn. In
<italic>identification</italic>
parameter, the withdrawn tag’s ID must be indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TAG_POP_TABLE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic Table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when one NFC tag previously detected by the cybernetic table is withdrawn. The
<italic>activeZone</italic>
value includes the reader area where the tag has been withdrawn and in
<italic>identification</italic>
parameter, the withdrawn tag’s ID must be indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">WORKFLOW_START</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when a workflow has been recovered by a user and must start. In
<italic>identification</italic>
parameter the workflow ID is indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">WORKFLOW_END</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when a workflow has finished successfully. In
<italic>identification</italic>
parameter the workflow ID is indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">ACTIVITY_COMPLETE</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when an activity has finished successfully. In
<italic>identification</italic>
parameter the activity ID is indicated and, in
<italic>parentIdentification</italic>
, the workflow’s ID to which this activity belongs is included. This event will allow not only store traces of atomic operations and activities.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">ACTIVITY_FAIL</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when an activity has failed. In
<italic>identification</italic>
parameter the activity ID is indicated and, in
<italic>parentIdentification</italic>
, the workflow’s ID to which this activity belongs is included.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">WORKFLOW_FAIL</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when a workflow has failed. In
<italic>identification</italic>
parameter the workflow ID is indicated.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">WORKFLOW_NEW</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">This event is triggered when a new workflow is created in the execution engine. In the
<italic>workflow</italic>
parameter, the new workflow is codified using bytes.</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="sensors-15-29478-f012" position="float">
<label>Figure 12</label>
<caption>
<p>General workflow format in the TF4SM-based prototype.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g012"></graphic>
</fig>
<p>This state represents the completion of the state machine and does not have exit activity. Third, the
<italic>awaiting identification</italic>
state must be considered an initial state. This state represents the workflow’s starting point, and always has to be defined as follows:
<list list-type="bullet">
<list-item>
<p>Entry activity: first a SHOW_MESSAGE operation must be executed in order to ask users to identify themselves. Then, a TAG_PUSH_GLOVE operation turns on the glove’s NFC interface, which is not deactivated until the users again uses his ID to close the state;</p>
</list-item>
<list-item>
<p>As the execution engine subscribes to the corresponding topic (see
<xref ref-type="sec" rid="sec4dot3-sensors-15-29478">Section 4.3</xref>
), it will receive information on the user’s ID. The execution engine checks whether the workflow owner user is the same user that was identified. If so, a WORKFLOW_START event is generated;</p>
</list-item>
<list-item>
<p>Transition: the workflow will execute the transition toward the next state when a WORKFLOW_START event is received;</p>
</list-item>
<list-item>
<p>Exit activity: this activity is made up of only one SHOW_MESSAGE operation, to indicate to users that the workflow verification has started.</p>
</list-item>
</list>
</p>
<p>Although the process model described is a simplification, it matches the model used in a large number of manufacturing companies. For example in [
<xref rid="B81-sensors-15-29478" ref-type="bibr">81</xref>
] the cigarette manufacturing process is described by workflows consisting on sequences of activities beginning at an initial activity and ending at a completion activity. Transitions between activities also are run when the associated trigger event occurs. For all this, the model can be considered valid to verify the usability of our prototype.</p>
</sec>
<sec id="sec4dot3-sensors-15-29478">
<title>4.3. System Deployment</title>
<p>Our first TF4SM-based prototype was deployed as a laboratory prototype at the Technical University of Madrid. The scenario was built simulating the scenario we can find in a real small-sized manufacturing company.</p>
<p>In the object database we have registered 56 different objects and 36 different user profiles. In the execution engine we have developed only one workflow, made up of 10 different states (13, if we take into account the mandatory states describe above). Finally, in this prototype, devices have been configured as
<xref ref-type="table" rid="sensors-15-29478-t004">Table 4</xref>
shows.</p>
<table-wrap id="sensors-15-29478-t004" position="float">
<object-id pub-id-type="pii">sensors-15-29478-t004_Table 4</object-id>
<label>Table 4</label>
<caption>
<p>Devices’ configuration.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Device</th>
<th align="left" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">Configuration</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic glove</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">All the events generated in the glove are directly published without been processed.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Cybernetic table</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">The TAG_PUSH_TABLE event turns on one green LED. The TAG_POP_TABLE event turns off the same green LED. The WORKFLOW_START event turns on an orange LED. Both TAG_PUSH_TABLE and TAG_POP_TABLE events are also published. The WORKFLOW_END event turns on a blue LED for 10 seconds, and the WORKFLOW_FAIL does the same with a red LED.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Visualization platform</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">It is subscribed to all the topics that are used to update the platform.</td>
</tr>
<tr>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Execution engine</td>
<td align="left" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">It is subscribed to all the topics that are used to update the workflow, and also to publish all the events it generates.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="sec5-sensors-15-29478">
<title>5. Experimental Validation</title>
<p>This research paper attempts to answer the following research questions:
<list list-type="order">
<list-item>
<p>Would the time response to inefficiencies improve by deploying a system based on our TF4SM in companies?</p>
</list-item>
<list-item>
<p>Is it possible to reduce the number of inefficiencies in productive processes using a TF4SM-based system?</p>
</list-item>
</list>
</p>
<p>An experimental validation was carried out in order to address these research questions. In this experimental validation two different experiments were executed. In the first one, the response time to inefficiencies (specifically, product shortages) is qualitatively compared in our proposed protoype with a traditional tag-based traceability system (similar to the one described in [
<xref rid="B23-sensors-15-29478" ref-type="bibr">23</xref>
]). In the second one, we compare a traditional tag-based traceability system with our proposed TF4SM-base prototype, where notifications to users about process execution are activated for the number of inefficiencies by worker.</p>
<p>The total response time to inefficiencies may be grouped into three different times (
<xref ref-type="fig" rid="sensors-15-29478-f013">Figure 13</xref>
). The
<italic>time-to-alert</italic>
time starts when the inefficiency occurs and finishes when an alert is generated in the process monitoring system. Secondly, the
<italic>time-to-reaction</italic>
time starts when an alert is generated in the process monitoring system and finishes when the person in charge responds to the alert and identifies the solution. Finally, the
<italic>time-to-solution</italic>
time involves all the time needed to solve the problem previously identified.</p>
<fig id="sensors-15-29478-f013" position="float">
<label>Figure 13</label>
<caption>
<p>Response time to inefficiencies decomposition.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g013"></graphic>
</fig>
<p>One of the most important inefficiency types, in which response time is critical, is product shortages. If the amount of remaining product is not accurately controlled, it might not only stop production (such as when other types of inefficiencies occur), but also all the processes in which the product is needed (which can be most processes if it is a basic product).</p>
<p>In product shortages, the
<italic>time-to-solution</italic>
is independent of the monitoring process implemented as it is more related to the presence or not of automatic order systems. Consequently, we conducted an experiment to qualitatively compare a traditional tag-based traceability system with our prototype for the
<italic>time-to-alert</italic>
and
<italic>time-to-reaction</italic>
times in the case of product shortage.</p>
<p>Thirty six (36) people were involved in this first experiment. In our manufacturing scenario, these people were divided into two equal groups called the
<italic>TF4SM</italic>
and
<italic>TAG</italic>
groups. Both groups were isolated from each other. Within each group four different productive processes were assigned at random among the participants, and one additional person was in charge of solving the possible product shortages. 56 different products were located in the warehouse, but the amount of some of them was insufficient to finalize all the processes in execution.</p>
<p>In the
<italic>TF4SM</italic>
group all the products were on a cybernetic table that monitored the amount of remaining product. Each worker also wore our cybernetic glove. The person in charge was also provided with a mobile visualization platform for controlling the warehouse state.</p>
<p>In the
<italic>TAG</italic>
group, each worker had a tag-reader, which he had to pass over the product’s tag before removing one unit from the warehouse. There was also a control point where commercial retail control software runs, and where the person in charge could verify the products available in the warehouse.</p>
<p>Finally, an external observatory was placed in both groups to qualitatively evaluate the
<italic>time-to-alert</italic>
and
<italic>time-to-reaction</italic>
times.</p>
<p>In the second experiment, the number of inefficiencies was evaluated. In general, inefficiencies were due to three types of errors. Firstly, there were inefficiencies due to procedural errors. In these cases, an activity was not executed in the correct order, unfinished or some step had not been executed. Secondly, there were inefficiencies due to execution errors. In these cases, all steps of the activity were executed, but (at least) one of them had not been developed as expected (a badly tightened screw or badly applied paint were examples of such errors). Finally, there were inefficiencies due to other errors, such as power outages and shortages.</p>
<p>In traditional tag-based systems, all errors are considered equal, and were evaluated at the workflow’s end (in the so-called quality control point). However, our TF4SM-base prototype allows to provide users with real-time information on process execution and, therefore, it enables the possibility of notifying procedure errors as they occur. Thus, workers can correct their last action, thereby reducing the number of errors when the product is delivered for quality control.</p>
<p>To compare the inefficiencies in a manufacturing company where a traditional tag-based traceability system was deployed with the inefficiencies in a manufacturing company where our proposed TF4SM-base prototype was available, we conducted the following validation.</p>
<p>Thirty six (36) people were involved in this second experiment. In our warehouse scenario, these people were divided into two separate groups.
<italic>TF4SM</italic>
was made up of 20 people and
<italic>non-TF4SM</italic>
the remaining 16.</p>
<p>The
<italic>TF4SM</italic>
group went one by one to a cybernetic table where they had to run a 10-step workflow. Each user had 16 kinds of products, of which only nine had to be processed, and they wore our cybernetic glove. During the execution of the workflow, our prototype monitored the process in real-time and alerted workers by means of a red LED whether they had performed an action that was not provided. At any time workers could undo any action. At the end of the workflow, an expert validated the final product and, in case of inefficiency, he specified the number of errors and type.</p>
<p>The
<italic>non-TF4SM</italic>
group worked in a similar way, except that in this case; the prototype was turned off, leaving only as checkpoint the final quality control (as in most manufacturing processes).</p>
</sec>
<sec id="sec6-sensors-15-29478">
<title>6. Results</title>
<p>This section presents and discusses the results obtained in the experimental validation. Results are shown following the research questions defined in this paper.
<xref ref-type="table" rid="sensors-15-29478-t005">Table 5</xref>
summarizes the magnitude order of the
<italic>time-to-alert</italic>
and
<italic>time-to-reaction</italic>
times for the first experiment.</p>
<table-wrap id="sensors-15-29478-t005" position="float">
<object-id pub-id-type="pii">sensors-15-29478-t005_Table 5</object-id>
<label>Table 5</label>
<caption>
<p>Devices’ configuration.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">System Employed</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">
<italic>Time-to-Alert</italic>
Time</th>
<th align="center" valign="middle" style="border-top:solid thin;border-bottom:solid thin" rowspan="1" colspan="1">
<italic>Time-to-Reaction</italic>
Time</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="middle" rowspan="1" colspan="1">Tag-based system</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Less than 10 s</td>
<td align="center" valign="middle" rowspan="1" colspan="1">Between 1 and 3 min</td>
</tr>
<tr>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">TF4SM</td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Immediate</td>
<td align="center" valign="middle" style="border-bottom:solid thin" rowspan="1" colspan="1">Less than 30 s</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Some considerations should be given to
<xref ref-type="table" rid="sensors-15-29478-t005">Table 5</xref>
. First, we verified that time response to inefficiencies improved by deploying our prototype. As the system required no consumables, the only expenditure was the initial investment, so we can say that we have achieved this improvement. Second, we can explore some reasons for this improvement. In respect to
<italic>time-to-alert</italic>
time, the need for human intervention in traditional tag-based systems causes, inevitably, higher delays. Operations, such as finding the tag or preparing the reader, can be made really fast, but automatic systems (such as the one TF4SM framework proposes) will always be much faster than humans. With respect to
<italic>time-to-reaction</italic>
time, the event monitoring independence from hardware (achieved in TF4SM framework) allows to develop mobile platforms that are permanently connected to the person in charge (who can respond to the emergency very quickly). In traditional tag-based systems, software commercial platforms require hard configurations and, in most cases, specific hardware to be deployed. Therefore, as in our experiment, in most companies there is a fixed control point that is periodically reviewed by managers. Depending on the review period, events may be processed faster or slower.</p>
<p>Considering the second experiment,
<xref ref-type="fig" rid="sensors-15-29478-f014">Figure 14</xref>
shows two boxplot measuring the number of errors committed by the
<italic>TF4SM</italic>
group (median = 3.5, SD = 1.76) and the
<italic>non-TF4SM</italic>
group (median = 6, SD = 2.28).</p>
<p>As both boxplots have an overlapping area, a Mann-Whitney U test was conducted to confirm whether the use of our proposed TF4SM framework reduces the number of errors. The Mann-Whitney U test is a nonparametric test of the null hypothesis that two samples come from the same population against an alternative hypothesis, comparing the mean values of the two samples. It is used to evaluate if two different data populations are similar or different (higher or lower). The
<italic>p</italic>
-value indicates the significance level of Mann-Whitney U test. The results are positive and support the previous assertion within the expected significance,
<italic>p</italic>
< 0.005 (U-values omitted as the comparison results have relatively little importance).</p>
<p>As can be seen, our proposed TF4SM framework does not eliminate the inefficiencies, but it allows workers to make some mistakes (specifically, procedure errors) and gives them the opportunity to correct a production task, which, in the end, reduces the number of inefficiencies (answering in this way our second research question).</p>
<fig id="sensors-15-29478-f014" position="float">
<label>Figure 14</label>
<caption>
<p>Response time to inefficiencies decomposition.</p>
</caption>
<graphic xlink:href="sensors-15-29478-g014"></graphic>
</fig>
</sec>
<sec id="sec7-sensors-15-29478">
<title>7. Conclusions</title>
<p>Traceability systems are rapidly becoming very important in manufacturing sector. Governments, costumers, workers among others ask companies for tighter controls in production processes. However, the complexity associated with manufacturing processes nowadays makes this task greatly complicated, especially for small companies. On the one hand, traditional traceability systems increase costs when logistics increases in complexity, and the necessary investments are not always acceptable for small companies. On the other hand, any type of completely automatic process monitoring or traceability system is widely used in industry, so companies are reluctant to implement such solutions (except in the case of proprietary solutions, something unattainable for small companies). Our Traceability Framework For Small Companies (TF4SM) fills this gap, by allowing real-time traceability and process monitoring through a flexible, open architecture (based on CPS NIST definition) capable of adapting to all types of manufacturing companies.</p>
<p>With TF4SM-based systems small manufacturing companies can monitor both workers’ actions and movement of the products at any given moment. This, together with the ability to use mobile platforms for system control, allows a significant reduction in the response time to inefficiencies obtained in our systems, compared to traditional tag-based traceability systems.</p>
<p>Moreover, the use of real-time monitoring enables the possibility of notifying users of their errors, allowing the workers to correct them (when it is possible). Thus, the number of inefficiencies in companies that implement TF4SM-based traceability systems is lower than in companies that use traditional traceability systems.</p>
</sec>
</body>
<back>
<notes>
<title>Author Contributions</title>
<p>The contributions described in this work are distributed among the authors in the way that follows: All the authors conceived and designed the experiments; Borja Bordel built the prototypes; Ramón Alcarria contributed to process modeling and design; Diego Martín performed the experiments; Diego Martín and Tomás Robles analyzed the data; Borja Bordel and Ramón Alcarria wrote the paper.</p>
</notes>
<notes>
<title>Conflicts of Interest</title>
<p>The authors declare no conflict of interest.</p>
</notes>
<ref-list>
<title>References</title>
<ref id="B1-sensors-15-29478">
<label>1.</label>
<element-citation publication-type="webpage">
<article-title>European Project: Real-time Monitoring and Optimization of Resource Efficiency in Integrated Processing Plants (FP7-NMP-2013-SMALL-7), Supported by the European Commission</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://cordis.europa.eu/project/rcn/110822_en.html">http://cordis.europa.eu/project/rcn/110822_en.html</ext-link>
</comment>
<date-in-citation>(accessed on 26 August 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B2-sensors-15-29478">
<label>2.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Woodall</surname>
<given-names>W.H.</given-names>
</name>
<name>
<surname>Montgomery</surname>
<given-names>D.C.</given-names>
</name>
</person-group>
<article-title>Some current directions in the theory and application of statistical process monitoring</article-title>
<source>J. Qual. Technol.</source>
<year>2014</year>
<volume>46</volume>
<fpage>78</fpage>
<lpage>94</lpage>
</element-citation>
</ref>
<ref id="B3-sensors-15-29478">
<label>3.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Weske</surname>
<given-names>M.</given-names>
</name>
</person-group>
<source>Business Process Management: Concepts, Languages, Architectures</source>
<publisher-name>Springer Science & Business Media</publisher-name>
<publisher-loc>Berlin, Germany</publisher-loc>
<year>2012</year>
</element-citation>
</ref>
<ref id="B4-sensors-15-29478">
<label>4.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Condea</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Thiesse</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Fleisch</surname>
<given-names>E.</given-names>
</name>
</person-group>
<article-title>RFID-enabled shelf replenishment with backroom monitoring in retail stores</article-title>
<source>Decis. Support Syst.</source>
<year>2012</year>
<volume>52</volume>
<fpage>839</fpage>
<lpage>849</lpage>
<pub-id pub-id-type="doi">10.1016/j.dss.2011.11.018</pub-id>
</element-citation>
</ref>
<ref id="B5-sensors-15-29478">
<label>5.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Cook</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Das</surname>
<given-names>S.</given-names>
</name>
</person-group>
<source>Smart Environments: Technology, Protocols and Applications</source>
<publisher-name>John Wiley & Sons</publisher-name>
<publisher-loc>Hoboken, NJ, USA</publisher-loc>
<year>2004</year>
</element-citation>
</ref>
<ref id="B6-sensors-15-29478">
<label>6.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gungor</surname>
<given-names>V.C.</given-names>
</name>
<name>
<surname>Hancke</surname>
<given-names>G.P.</given-names>
</name>
</person-group>
<article-title>Industrial wireless sensor networks: Challenges, design principles, and technical approaches</article-title>
<source>IEEE Trans. Ind. Electron.</source>
<year>2009</year>
<volume>56</volume>
<fpage>4258</fpage>
<lpage>4265</lpage>
<pub-id pub-id-type="doi">10.1109/TIE.2009.2015754</pub-id>
</element-citation>
</ref>
<ref id="B7-sensors-15-29478">
<label>7.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Al Agha</surname>
<given-names>K.</given-names>
</name>
</person-group>
<article-title>Which wireless technology for industrial wireless sensor networks? The development of OCARI technology</article-title>
<source>IEEE Trans. Ind. Electron.</source>
<year>2009</year>
<volume>56</volume>
<fpage>4266</fpage>
<lpage>4278</lpage>
<pub-id pub-id-type="doi">10.1109/TIE.2009.2027253</pub-id>
</element-citation>
</ref>
<ref id="B8-sensors-15-29478">
<label>8.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Folan</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Mascolo</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Browne</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>RFID in product lifecycle management: A case in the automotive industry</article-title>
<source>Int. J. Comput. Integr. Manuf.</source>
<year>2009</year>
<volume>22</volume>
<fpage>616</fpage>
<lpage>637</lpage>
<pub-id pub-id-type="doi">10.1080/09511920701522981</pub-id>
</element-citation>
</ref>
<ref id="B9-sensors-15-29478">
<label>9.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Dai</surname>
<given-names>Q.Y.</given-names>
</name>
<name>
<surname>Zhong</surname>
<given-names>R.Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>Z.Y.</given-names>
</name>
</person-group>
<article-title>A RFID-enabled Real-Time Manufacturing Hardware Platform for Discrete Industry</article-title>
<source>Proceeding of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology</source>
<conf-loc>Hong Kong, China</conf-loc>
<conf-date>14–16 December 2010</conf-date>
<publisher-name>Springer-Verlag</publisher-name>
<publisher-loc>Berlin, Heidelberg</publisher-loc>
<year>2010</year>
<volume>Volume 66</volume>
<fpage>1743</fpage>
<lpage>1750</lpage>
</element-citation>
</ref>
<ref id="B10-sensors-15-29478">
<label>10.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Banks</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Pachano</surname>
<given-names>M.A.</given-names>
</name>
<name>
<surname>Thompson</surname>
<given-names>L.G.</given-names>
</name>
<name>
<surname>Hanny</surname>
<given-names>D.</given-names>
</name>
</person-group>
<source>RFID Applied</source>
<publisher-name>John Wiley & Sons</publisher-name>
<publisher-loc>Hoboken, NJ, USA</publisher-loc>
<year>2007</year>
</element-citation>
</ref>
<ref id="B11-sensors-15-29478">
<label>11.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ilie-Zudor</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Kemény</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>van Blommestein</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Monostori</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>van der Meulen</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>A survey of applications and requirements of unique identification systems and RFID techniques</article-title>
<source>Comput. Ind.</source>
<year>2010</year>
<volume>62</volume>
<fpage>227</fpage>
<lpage>252</lpage>
<pub-id pub-id-type="doi">10.1016/j.compind.2010.10.004</pub-id>
</element-citation>
</ref>
<ref id="B12-sensors-15-29478">
<label>12.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dai</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zhong</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>G.Q.</given-names>
</name>
<name>
<surname>Qu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>T.Y.</given-names>
</name>
</person-group>
<article-title>Radio frequency identification-enabled real-time manufacturing execution system: A case study in an automotive part manufacturer</article-title>
<source>Int. J. Comput. Integr. Manuf.</source>
<year>2012</year>
<volume>25</volume>
<fpage>51</fpage>
<lpage>65</lpage>
<pub-id pub-id-type="doi">10.1080/0951192X.2011.562546</pub-id>
</element-citation>
</ref>
<ref id="B13-sensors-15-29478">
<label>13.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hur</surname>
<given-names>S.M.</given-names>
</name>
<name>
<surname>Jeong</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Suh</surname>
<given-names>S.H.</given-names>
</name>
</person-group>
<article-title>An experimental approach to RFID system performance prediction model</article-title>
<source>Int. J. Comput. Integr. Manuf.</source>
<year>2009</year>
<volume>22</volume>
<fpage>686</fpage>
<lpage>697</lpage>
<pub-id pub-id-type="doi">10.1080/09511920903068775</pub-id>
</element-citation>
</ref>
<ref id="B14-sensors-15-29478">
<label>14.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bendavid</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Cassivi</surname>
<given-names>L.</given-names>
</name>
</person-group>
<article-title>Bridging the gap between RFID/EPC concepts, technological requirements and supply chain e-business processes</article-title>
<source>J. Theor. Appl. Electron. Commer. Res.</source>
<year>2010</year>
<volume>5</volume>
<fpage>1</fpage>
<lpage>16</lpage>
<pub-id pub-id-type="doi">10.4067/S0718-18762010000300002</pub-id>
</element-citation>
</ref>
<ref id="B15-sensors-15-29478">
<label>15.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>E.A.</given-names>
</name>
</person-group>
<article-title>Cyber-physical systems—Are computing foundations adequate?</article-title>
<source>NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap</source>
<conf-loc>Austin, TX, USA</conf-loc>
<conf-date>16–17 October 2006</conf-date>
</element-citation>
</ref>
<ref id="B16-sensors-15-29478">
<label>16.</label>
<element-citation publication-type="gov">
<person-group person-group-type="author">
<collab>National Institute of Standards and Technology</collab>
</person-group>
<article-title>Cyber-Physical Systems Homepage</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.nist.gov/cps/">http://www.nist.gov/cps/</ext-link>
</comment>
<date-in-citation>(accessed on 19 November 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B17-sensors-15-29478">
<label>17.</label>
<element-citation publication-type="gov">
<person-group person-group-type="author">
<collab>National Institute of Standards and Technology</collab>
</person-group>
<article-title>CPS Public Working Group Presentation</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.nist.gov/el/upload/CPS-PWG-Kickoff-Webinar-Presentation-FINAL.PDF">http://www.nist.gov/el/upload/CPS-PWG-Kickoff-Webinar-Presentation-FINAL.PDF</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B18-sensors-15-29478">
<label>18.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Vuran</surname>
<given-names>M.C.</given-names>
</name>
<name>
<surname>Goddard</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Cyber-physical systems in industrial process control</article-title>
<source>ACM SIGBED Rev.</source>
<year>2008</year>
<volume>5</volume>
<pub-id pub-id-type="doi">10.1145/1366283.1366295</pub-id>
</element-citation>
</ref>
<ref id="B19-sensors-15-29478">
<label>19.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Kao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Tseng</surname>
<given-names>Y.</given-names>
</name>
</person-group>
<article-title>From wireless sensor networks towards cyber physical systems</article-title>
<source>Pervasive Mob. Comput.</source>
<year>2011</year>
<volume>7</volume>
<fpage>397</fpage>
<lpage>413</lpage>
<pub-id pub-id-type="doi">10.1016/j.pmcj.2011.03.003</pub-id>
</element-citation>
</ref>
<ref id="B20-sensors-15-29478">
<label>20.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Industrial wireless sensor networks</article-title>
<source>Int. J. Distrib. Sensor Netw.</source>
<year>2014</year>
<volume>2014</volume>
<fpage>1</fpage>
<lpage>2</lpage>
<pub-id pub-id-type="doi">10.1155/2014/218050</pub-id>
</element-citation>
</ref>
<ref id="B21-sensors-15-29478">
<label>21.</label>
<element-citation publication-type="webpage">
<article-title>Software Im Maschinenbau-Lästiges Anhängsel Oder Chance Zur Marktführerschaft?</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.software-kompetenz.de/servlet/is/21700/StetterSW_im_Maschinenbau.pdf?command=downloadContent&filename=Stetter-SW_im_Maschinenbau.pdf">http://www.software-kompetenz.de/servlet/is/21700/StetterSW_im_Maschinenbau.pdf?command=downloadContent&filename=Stetter-SW_im_Maschinenbau.pdf</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B22-sensors-15-29478">
<label>22.</label>
<element-citation publication-type="webpage">
<article-title>Automation Expenditures for Discrete Industries</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.arcweb.com/market-studies/pages/automation-systems-for-discrete-industries.aspx">http://www.arcweb.com/market-studies/pages/automation-systems-for-discrete-industries.aspx</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B23-sensors-15-29478">
<label>23.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>InternationalElectrotechnical Commission</collab>
</person-group>
<source>International Standard IEC 62264-1: Enterprise-Control System Integration Part 1: Models and Terminology</source>
<publisher-name>IEC</publisher-name>
<publisher-loc>Geneva, Switzerland</publisher-loc>
<year>2003</year>
</element-citation>
</ref>
<ref id="B24-sensors-15-29478">
<label>24.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hussain</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Frey</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>Migration of a PLC controller to an IEC 61499 compliant distributed control system: Hands-on experiences</article-title>
<source>Proceedings of the IEEE International Conference on Robotics and Automation</source>
<conf-loc>Barcelona, Spain</conf-loc>
<conf-date>18–22 April 2005</conf-date>
<fpage>3984</fpage>
<lpage>3989</lpage>
</element-citation>
</ref>
<ref id="B25-sensors-15-29478">
<label>25.</label>
<element-citation publication-type="webpage">
<article-title>OPC 2.1 Standard</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="https://opcfoundation.org/">https://opcfoundation.org/</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B26-sensors-15-29478">
<label>26.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Davenport</surname>
<given-names>T.H.</given-names>
</name>
</person-group>
<source>Process Innovation: Reengineering Work through Information Technology</source>
<publisher-name>Harvard Business Press</publisher-name>
<publisher-loc>Boston, MA, USA</publisher-loc>
<year>2013</year>
</element-citation>
</ref>
<ref id="B27-sensors-15-29478">
<label>27.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vyatkin</surname>
<given-names>V.</given-names>
</name>
</person-group>
<article-title>Software engineering in industrial automation: State-of-the-art review</article-title>
<source>IEEE Trans. Ind. Inform.</source>
<year>2013</year>
<volume>9</volume>
<fpage>1234</fpage>
<lpage>1249</lpage>
<pub-id pub-id-type="doi">10.1109/TII.2013.2258165</pub-id>
</element-citation>
</ref>
<ref id="B28-sensors-15-29478">
<label>28.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Thramboulidis</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Zoupas</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Real-time Java in control and automation: A model driven development approach</article-title>
<source>Proceedings of the 10th IEEE Conference on Emerging Technologies and Factory Automation</source>
<conf-loc>Catania, Italy</conf-loc>
<conf-date>19–22 September 2005</conf-date>
<fpage>8</fpage>
<lpage>46</lpage>
</element-citation>
</ref>
<ref id="B29-sensors-15-29478">
<label>29.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jimenez</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Rosique</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Sanchez</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Alvarez</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Iborra</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Habitation: A domain-specific language for home automation</article-title>
<source>IEEE Softw.</source>
<year>2009</year>
<volume>26</volume>
<fpage>30</fpage>
<lpage>38</lpage>
<pub-id pub-id-type="doi">10.1109/MS.2009.93</pub-id>
</element-citation>
</ref>
<ref id="B30-sensors-15-29478">
<label>30.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alcarria</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Robles</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Morales</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>López-de-Ipiña</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Aguilera</surname>
<given-names>U.</given-names>
</name>
</person-group>
<article-title>Enabling flexible and continuous capability invocation in mobile prosumer environments</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>8930</fpage>
<lpage>8954</lpage>
<pub-id pub-id-type="doi">10.3390/s120708930</pub-id>
<pub-id pub-id-type="pmid">23012526</pub-id>
</element-citation>
</ref>
<ref id="B31-sensors-15-29478">
<label>31.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Erl</surname>
<given-names>T.</given-names>
</name>
</person-group>
<source>Service-Oriented Architecture: Concepts, Technology, and Design</source>
<publisher-name>Prentice Hall PTR</publisher-name>
<publisher-loc>Upper Saddle River, NJ, USA</publisher-loc>
<year>2005</year>
</element-citation>
</ref>
<ref id="B32-sensors-15-29478">
<label>32.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jammes</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Smit</surname>
<given-names>H.</given-names>
</name>
</person-group>
<article-title>Service-oriented paradigms in industrial automation</article-title>
<source>IEEE Trans. Ind. Inform.</source>
<year>2005</year>
<volume>1</volume>
<fpage>62</fpage>
<lpage>70</lpage>
<pub-id pub-id-type="doi">10.1109/TII.2005.844419</pub-id>
</element-citation>
</ref>
<ref id="B33-sensors-15-29478">
<label>33.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kirova</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Kirby</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Kothari</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Childress</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>Effective requirements traceability: Models, tools, and practices</article-title>
<source>Bell Labs Tech. J.</source>
<year>2008</year>
<volume>12</volume>
<fpage>143</fpage>
<lpage>157</lpage>
<pub-id pub-id-type="doi">10.1002/bltj.20272</pub-id>
</element-citation>
</ref>
<ref id="B34-sensors-15-29478">
<label>34.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Moe</surname>
<given-names>T.</given-names>
</name>
</person-group>
<article-title>Perspectives on traceability in food manufacture</article-title>
<source>Trend Food Sci. Technol.</source>
<year>1998</year>
<volume>9</volume>
<fpage>211</fpage>
<lpage>214</lpage>
<pub-id pub-id-type="doi">10.1016/S0924-2244(98)00037-5</pub-id>
</element-citation>
</ref>
<ref id="B35-sensors-15-29478">
<label>35.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Muldoon</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>Integrating information systems to improve competitiveness</article-title>
<source>Brew. Distill. Int.</source>
<year>1992</year>
<volume>23</volume>
<fpage>13</fpage>
<lpage>14</lpage>
</element-citation>
</ref>
<ref id="B36-sensors-15-29478">
<label>36.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wall</surname>
<given-names>B.</given-names>
</name>
</person-group>
<article-title>Golden gains from weightwatching</article-title>
<source>Potato Bus. World</source>
<year>1995</year>
<volume>3</volume>
<fpage>34</fpage>
<lpage>37</lpage>
</element-citation>
</ref>
<ref id="B37-sensors-15-29478">
<label>37.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>J.P.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>X.T.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>C.H.</given-names>
</name>
<name>
<surname>Ji</surname>
<given-names>Z.T.</given-names>
</name>
</person-group>
<article-title>A PDA-based record-keeping and decision-support system for traceability in cucumber production</article-title>
<source>Comput. Electron. Agric.</source>
<year>2010</year>
<volume>70</volume>
<fpage>69</fpage>
<lpage>77</lpage>
<pub-id pub-id-type="doi">10.1016/j.compag.2009.09.009</pub-id>
</element-citation>
</ref>
<ref id="B38-sensors-15-29478">
<label>38.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Seine</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Kuwabara</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Mikami</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Takahashi</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yoshikawa</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Narumi</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Koganezaki</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Wakabayashi</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Nagano</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>development of the traceability system which secures the safety of fishery products using the QR code and a digital signature</article-title>
<source>Proceedings of the OCEANS’04. MTTS/IEEE TECHNO-OCEAN ’04</source>
<conf-loc>Kobe, Japan</conf-loc>
<conf-date>9–12 November 2004</conf-date>
<fpage>476</fpage>
<lpage>481</lpage>
</element-citation>
</ref>
<ref id="B39-sensors-15-29478">
<label>39.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hsu</surname>
<given-names>Y.-C.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>A.-P.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>C.-H.</given-names>
</name>
</person-group>
<article-title>A RFID-enabled traceability system for the supply chain of live fish</article-title>
<source>Proceedings of the IEEE International Conference on Automation and Logistics</source>
<conf-loc>Qingdao, China</conf-loc>
<conf-date>1–3 September 2008</conf-date>
<fpage>81</fpage>
<lpage>86</lpage>
</element-citation>
</ref>
<ref id="B40-sensors-15-29478">
<label>40.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gandino</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Montrucchio</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Rebaudengo</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sanchez</surname>
<given-names>E.R.</given-names>
</name>
</person-group>
<article-title>On improving automation by integrating RFID in the traceability management of the Agri-food sector</article-title>
<source>IEEE Trans. Ind. Electron.</source>
<year>2009</year>
<volume>56</volume>
<fpage>2357</fpage>
<lpage>2365</lpage>
<pub-id pub-id-type="doi">10.1109/TIE.2009.2019569</pub-id>
</element-citation>
</ref>
<ref id="B41-sensors-15-29478">
<label>41.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Das</surname>
<given-names>S.K.</given-names>
</name>
<name>
<surname>Cook</surname>
<given-names>D.J.</given-names>
</name>
</person-group>
<article-title>Agent based health monitoring in smart homes</article-title>
<source>Proceedings of the International Conference on Smart Homes and Health Telematics (ICOST)</source>
<conf-loc>Singapore</conf-loc>
<conf-date>15–17 September 2004</conf-date>
<fpage>3</fpage>
<lpage>14</lpage>
</element-citation>
</ref>
<ref id="B42-sensors-15-29478">
<label>42.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Das</surname>
<given-names>S.K.</given-names>
</name>
<name>
<surname>Cook</surname>
<given-names>D.J.</given-names>
</name>
<name>
<surname>Battacharya</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Heierman</surname>
<given-names>E.O.</given-names>
<suffix>III</suffix>
</name>
<name>
<surname>Lin</surname>
<given-names>T-Y.</given-names>
</name>
</person-group>
<article-title>The role of prediction algorithms in the MavHome smart home architecture</article-title>
<source>IEEE Wirel. Commun.</source>
<year>2002</year>
<volume>9</volume>
<fpage>77</fpage>
<lpage>84</lpage>
<pub-id pub-id-type="doi">10.1109/MWC.2002.1160085</pub-id>
</element-citation>
</ref>
<ref id="B43-sensors-15-29478">
<label>43.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Le Gal</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Martin</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Lux</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Crowley</surname>
<given-names>J.L.</given-names>
</name>
</person-group>
<article-title>Smart office: Design of an intelligent environment</article-title>
<source>IEEE Intell. Syst.</source>
<year>2001</year>
<volume>4</volume>
<fpage>60</fpage>
<lpage>66</lpage>
<pub-id pub-id-type="doi">10.1109/5254.941359</pub-id>
</element-citation>
</ref>
<ref id="B44-sensors-15-29478">
<label>44.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Lesser</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Atighetchi</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Benyo</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Horling</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Raja</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Wagner</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Xuan</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>The intelligent home testbed</article-title>
<source>Proceedings of the Autonomy Control Software Workshop</source>
<conf-loc>Seattle, WA, USA</conf-loc>
<conf-date>29 January 1999</conf-date>
</element-citation>
</ref>
<ref id="B45-sensors-15-29478">
<label>45.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Misra</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Das</surname>
<given-names>S.K.</given-names>
</name>
</person-group>
<article-title>Location estimation (determination and prediction) techniques in smart environments</article-title>
<source>Smart Environments: Technology, Protocols and Applications</source>
<person-group person-group-type="editor">
<name>
<surname>Cook</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Das</surname>
<given-names>S.</given-names>
</name>
</person-group>
<publisher-name>John Wiley & Sons</publisher-name>
<publisher-loc>Hoboken, NJ, USA</publisher-loc>
<year>2005</year>
<fpage>193</fpage>
<lpage>228</lpage>
</element-citation>
</ref>
<ref id="B46-sensors-15-29478">
<label>46.</label>
<element-citation publication-type="book">
<person-group person-group-type="editor">
<name>
<surname>Nixon</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Lacey</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Dobson</surname>
<given-names>S.</given-names>
</name>
</person-group>
<source>Managing Interactions in Smart Environments: 1st International Workshop on Managing Interactions in Smart Environments (MANSE’99), Dublin, December 1999</source>
<publisher-name>Springer-Verlag</publisher-name>
<publisher-loc>London, UK</publisher-loc>
<year>2000</year>
</element-citation>
</ref>
<ref id="B47-sensors-15-29478">
<label>47.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Derler</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>E.A.</given-names>
</name>
<name>
<surname>Vincentelli</surname>
<given-names>A.S.</given-names>
</name>
</person-group>
<article-title>Modeling cyber-physical systems</article-title>
<source>Proc. IEEE</source>
<year>2012</year>
<volume>100</volume>
<fpage>13</fpage>
<lpage>28</lpage>
<pub-id pub-id-type="doi">10.1109/JPROC.2011.2160929</pub-id>
</element-citation>
</ref>
<ref id="B48-sensors-15-29478">
<label>48.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>E.A.</given-names>
</name>
</person-group>
<article-title>The past, present and future of cyber-physical systems: A focus on models</article-title>
<source>Sensors</source>
<year>2015</year>
<volume>15</volume>
<fpage>4837</fpage>
<lpage>4869</lpage>
<pub-id pub-id-type="doi">10.3390/s150304837</pub-id>
<pub-id pub-id-type="pmid">25730486</pub-id>
</element-citation>
</ref>
<ref id="B49-sensors-15-29478">
<label>49.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kelepouris</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Pramatari</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Doukidis</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>RFID-enabled traceability in the food supply chain</article-title>
<source>Ind. Manag. Data Syst.</source>
<year>2007</year>
<volume>107</volume>
<fpage>183</fpage>
<lpage>200</lpage>
<pub-id pub-id-type="doi">10.1108/02635570710723804</pub-id>
</element-citation>
</ref>
<ref id="B50-sensors-15-29478">
<label>50.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Riedl</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zipper</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Meier</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Diedrich</surname>
<given-names>C.</given-names>
</name>
</person-group>
<article-title>Cyber-physical systems alter automation architectures</article-title>
<source>Annu. Rev. Control</source>
<year>2014</year>
<volume>38</volume>
<fpage>123</fpage>
<lpage>133</lpage>
<pub-id pub-id-type="doi">10.1016/j.arcontrol.2014.03.012</pub-id>
</element-citation>
</ref>
<ref id="B51-sensors-15-29478">
<label>51.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Colombo</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Karnouskos</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Bangemann</surname>
<given-names>T.</given-names>
</name>
</person-group>
<article-title>Towards the Next Generation of Industrial Cyber-Physical Systems</article-title>
<source>Industrial Cloud-based Cyber-physical Systems</source>
<person-group person-group-type="editor">
<name>
<surname>Colombo</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Bangemann</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Karnouskos</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Delsing</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Stluka</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Harrison</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Jammes</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Lastra</surname>
<given-names>J.L.</given-names>
</name>
</person-group>
<publisher-name>Springer International Publishing</publisher-name>
<publisher-loc>Geneva, Switzerland</publisher-loc>
<year>2014</year>
<fpage>1</fpage>
<lpage>22</lpage>
</element-citation>
</ref>
<ref id="B52-sensors-15-29478">
<label>52.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Al-Anbagi</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Erol-Kantarci</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Mouftah</surname>
<given-names>H.T.</given-names>
</name>
</person-group>
<article-title>A reliable IEEE 802.15. 4 model for cyber physical power grid monitoring systems</article-title>
<source>IEEE Trans. Emerg. Top. Comput.</source>
<year>2013</year>
<volume>1</volume>
<fpage>258</fpage>
<lpage>272</lpage>
<pub-id pub-id-type="doi">10.1109/TETC.2013.2281192</pub-id>
</element-citation>
</ref>
<ref id="B53-sensors-15-29478">
<label>53.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Blackburn</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Denno</surname>
<given-names>P.</given-names>
</name>
</person-group>
<article-title>Virtual design and verification of cyber-physical systems: Industrial process plant design</article-title>
<source>Proced. Comput. Sci.</source>
<year>2014</year>
<volume>28</volume>
<fpage>883</fpage>
<lpage>890</lpage>
<pub-id pub-id-type="doi">10.1016/j.procs.2014.03.006</pub-id>
</element-citation>
</ref>
<ref id="B54-sensors-15-29478">
<label>54.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gupta</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Kaur</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Realization of automated industrial pollution control system using LabVIEW</article-title>
<source>Int. J. Res.</source>
<year>2014</year>
<volume>1</volume>
<fpage>834</fpage>
<lpage>838</lpage>
</element-citation>
</ref>
<ref id="B55-sensors-15-29478">
<label>55.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Suender</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Wenger</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Hanni</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Gosetti</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Steininger</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Fritsche</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>Transformation of existing IEC 61131-3 automation projects into control logic according to IEC 61499</article-title>
<source>Proceedings of the IEEE International Conference on Emerging Technologies and Factory Automation</source>
<conf-loc>Hamburg, Germany</conf-loc>
<conf-date>15–18 September 2008</conf-date>
<fpage>369</fpage>
<lpage>376</lpage>
</element-citation>
</ref>
<ref id="B56-sensors-15-29478">
<label>56.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Wenger</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zoitl</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Sunder</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Steininger</surname>
<given-names>H.</given-names>
</name>
</person-group>
<article-title>Transformation of IEC 61131-3 to IEC 61499 based on a model driven development approach</article-title>
<source>Proceedings of the 7th IEEE International Conference on Industrial Informatics</source>
<conf-loc>Cardiff, UK</conf-loc>
<conf-date>23–26 June 2009</conf-date>
<volume>Volume 1</volume>
<fpage>715</fpage>
<lpage>720</lpage>
</element-citation>
</ref>
<ref id="B57-sensors-15-29478">
<label>57.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Von Krosigk</surname>
<given-names>H.</given-names>
</name>
</person-group>
<article-title>Functional safety in the field of industrial automation. The influence of IEC 61508 on the improvement of safety-related control systems</article-title>
<source>Comput. Control Eng. J.</source>
<year>2000</year>
<volume>11</volume>
<fpage>13</fpage>
<lpage>18</lpage>
<pub-id pub-id-type="doi">10.1049/cce:20000102</pub-id>
</element-citation>
</ref>
<ref id="B58-sensors-15-29478">
<label>58.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ito</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>Smart Furniture: Improvising ubiquitous hot-spot environment</article-title>
<source>Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops</source>
<conf-loc>Providence, RI, USA</conf-loc>
<conf-date>19–22 May 2003</conf-date>
<fpage>248</fpage>
<lpage>253</lpage>
</element-citation>
</ref>
<ref id="B59-sensors-15-29478">
<label>59.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Tokuda</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Takashio</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Nakazawa</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Matsumiya</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Ito</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Saito</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>SF2: Smart furniture for creating ubiquitous applications</article-title>
<source>Proceedings of the International Symposium on Applications and the Internet</source>
<conf-loc>Tokyo, Japan</conf-loc>
<conf-date>26–30 January 2004</conf-date>
<fpage>423</fpage>
<lpage>429</lpage>
</element-citation>
</ref>
<ref id="B60-sensors-15-29478">
<label>60.</label>
<element-citation publication-type="patent">
<person-group person-group-type="author">
<name>
<surname>Hagale</surname>
<given-names>A.R.</given-names>
</name>
<name>
<surname>Kelley</surname>
<given-names>J.E.</given-names>
</name>
<name>
<surname>Rozich</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>RFID Smart Office Chair</article-title>
<source>U.S. Patent</source>
<patent>6,964,370</patent>
<day>15</day>
<month>11</month>
<year>2005</year>
</element-citation>
</ref>
<ref id="B61-sensors-15-29478">
<label>61.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Fishkin</surname>
<given-names>K.P.</given-names>
</name>
<name>
<surname>Philipose</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Rea</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Hands-on RFID: Wireless wearables for detecting use of objects</article-title>
<source>Proceedings of the 9th International Symposium on Wearable Computers</source>
<conf-loc>Osaka, Japan</conf-loc>
<conf-date>18–21 October 2005</conf-date>
<fpage>38</fpage>
<lpage>43</lpage>
</element-citation>
</ref>
<ref id="B62-sensors-15-29478">
<label>62.</label>
<element-citation publication-type="webpage">
<article-title>Fujitsu’s Smart Glove</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.qore.com/articulos/17335/Fujitsu-desarrolla-un-guante-de-realidad-aumentada">http://www.qore.com/articulos/17335/Fujitsu-desarrolla-un-guante-de-realidad-aumentada</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B63-sensors-15-29478">
<label>63.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Kirstein</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Cottet</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Grzyb</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Tröster</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>Textiles for signal transmission in wearables</article-title>
<source>Proceedings of the ACM of First Workshop on Electronic Textiles (MAMSET 2002)</source>
<conf-loc>San Jose, CA, USA</conf-loc>
<conf-date>4 October 2002</conf-date>
</element-citation>
</ref>
<ref id="B64-sensors-15-29478">
<label>64.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marculescu</surname>
<given-names>D.</given-names>
</name>
</person-group>
<article-title>Electronic textiles: A platform for pervasive computing</article-title>
<source>IEEE Proc.</source>
<year>2003</year>
<volume>91</volume>
<fpage>1995</fpage>
<lpage>2018</lpage>
<pub-id pub-id-type="doi">10.1109/JPROC.2003.819612</pub-id>
</element-citation>
</ref>
<ref id="B65-sensors-15-29478">
<label>65.</label>
<element-citation publication-type="webpage">
<article-title>Giochi SmartPoker</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.gtigaming.com/en/product-service/smartpoker-2/">http://www.gtigaming.com/en/product-service/smartpoker-2/</ext-link>
</comment>
<date-in-citation>(accessed on 18 July 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B66-sensors-15-29478">
<label>66.</label>
<element-citation publication-type="webpage">
<article-title>Argos Smart Clinical Cupboard</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://sicolareshigia.com/armario-de-control-de-stock/">http://sicolareshigia.com/armario-de-control-de-stock/</ext-link>
</comment>
<date-in-citation>(accessed on 18 July 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B67-sensors-15-29478">
<label>67.</label>
<element-citation publication-type="webpage">
<article-title>Palex Smart Clinical Cupboard</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.europapress.es/extremadura/salud-00924/noticia-infanta-cristina-badajoz-acogera-forma-piloto-armario-inteligente-suministro-material-sanitario-20150225143205.html">http://www.europapress.es/extremadura/salud-00924/noticia-infanta-cristina-badajoz-acogera-forma-piloto-armario-inteligente-suministro-material-sanitario-20150225143205.html</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B68-sensors-15-29478">
<label>68.</label>
<element-citation publication-type="webpage">
<article-title>Izco Smart Clinical Cupboard</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.farodevigo.es/economia/2014/09/28/viguesa-izco-lanza-fabricacion-armarios/1102202.html">http://www.farodevigo.es/economia/2014/09/28/viguesa-izco-lanza-fabricacion-armarios/1102202.html</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B69-sensors-15-29478">
<label>69.</label>
<element-citation publication-type="webpage">
<article-title>SATO’s VINICITY Technology</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.satovicinity.com/sp/products_magellan_pjm_rfid_smart_readers.asp">http://www.satovicinity.com/sp/products_magellan_pjm_rfid_smart_readers.asp</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B70-sensors-15-29478">
<label>70.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Wolf</surname>
<given-names>M.</given-names>
</name>
</person-group>
<source>High-Performance Embedded Computing: Applications in Cyber-Physical Systems and Mobile Computing</source>
<edition>2nd ed.</edition>
<publisher-name>Morgan Kaufmann</publisher-name>
<publisher-loc>Burlington, MA, USA</publisher-loc>
<year>2014</year>
</element-citation>
</ref>
<ref id="B71-sensors-15-29478">
<label>71.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kortuem</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Kawsar</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Fitton</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Sundramoorthy</surname>
<given-names>V.</given-names>
</name>
</person-group>
<article-title>Smart objects as building blocks for the internet of things</article-title>
<source>IEEE Internet Comput.</source>
<year>2010</year>
<volume>14</volume>
<fpage>44</fpage>
<lpage>51</lpage>
<pub-id pub-id-type="doi">10.1109/MIC.2009.143</pub-id>
</element-citation>
</ref>
<ref id="B72-sensors-15-29478">
<label>72.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Osaka</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Takagi</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Yamazaki</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Takahashi</surname>
<given-names>O.</given-names>
</name>
</person-group>
<article-title>An efficient and secure RFID security method with ownership transfer</article-title>
<source>Proceedings of the International Conference on Computational Intelligence and Security</source>
<conf-loc>Guangzhou, China</conf-loc>
<conf-date>3–6 November 2006</conf-date>
<volume>Volume 2</volume>
<fpage>1090</fpage>
<lpage>1095</lpage>
</element-citation>
</ref>
<ref id="B73-sensors-15-29478">
<label>73.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schmidt</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Implicit human computer interaction through context</article-title>
<source>Pers. Technol.</source>
<year>2000</year>
<volume>4</volume>
<fpage>191</fpage>
<lpage>199</lpage>
<pub-id pub-id-type="doi">10.1007/BF01324126</pub-id>
</element-citation>
</ref>
<ref id="B74-sensors-15-29478">
<label>74.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Fouquet</surname>
<given-names>F.</given-names>
</name>
</person-group>
<article-title>A dynamic component model for cyber physical systems</article-title>
<source>Proceedings of the 15th ACM SIGSOFT Symposium on Component Based Software Engineering</source>
<conf-loc>Bertinoro, Italy</conf-loc>
<conf-date>25–28 June 2012</conf-date>
<fpage>135</fpage>
<lpage>144</lpage>
</element-citation>
</ref>
<ref id="B75-sensors-15-29478">
<label>75.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kim</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Panganamala</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Cyber-physical systems: A perspective at the centennial</article-title>
<source>IEEE Proc.</source>
<year>2012</year>
<volume>100</volume>
<fpage>1287</fpage>
<lpage>1308</lpage>
</element-citation>
</ref>
<ref id="B76-sensors-15-29478">
<label>76.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Morales</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Robles</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Alcarria</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Cedeño</surname>
<given-names>E.</given-names>
</name>
</person-group>
<article-title>On the support of scientific workflows over Pub/Sub brokers</article-title>
<source>Sensors</source>
<year>2013</year>
<volume>13</volume>
<fpage>10954</fpage>
<lpage>10980</lpage>
<pub-id pub-id-type="doi">10.3390/s130810954</pub-id>
<pub-id pub-id-type="pmid">23966191</pub-id>
</element-citation>
</ref>
<ref id="B77-sensors-15-29478">
<label>77.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Fortino</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Guerrieri</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Russo</surname>
<given-names>W.</given-names>
</name>
</person-group>
<article-title>Agent-oriented smart objects development</article-title>
<source>Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design</source>
<conf-loc>Wuhan, China</conf-loc>
<conf-date>23–25 May 2012</conf-date>
<fpage>907</fpage>
<lpage>912</lpage>
</element-citation>
</ref>
<ref id="B78-sensors-15-29478">
<label>78.</label>
<element-citation publication-type="webpage">
<article-title>RDM 8800 Datasheet</article-title>
<comment>Available online:
<ext-link ext-link-type="ftp" xlink:href="ftp://imall.iteadstudio.com/Modules/IM131218001/DS_IM131218001.pdf">ftp://imall.iteadstudio.com/Modules/IM131218001/DS_IM131218001.pdf</ext-link>
</comment>
<date-in-citation>(accessed on 26 October 2015)</date-in-citation>
</element-citation>
</ref>
<ref id="B79-sensors-15-29478">
<label>79.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>L.</given-names>
</name>
</person-group>
<article-title>Trustworthiness analysis of sensor data in cyber-physical systems</article-title>
<source>J. Comput. Syst. Sci.</source>
<year>2013</year>
<volume>79</volume>
<fpage>383</fpage>
<lpage>401</lpage>
<pub-id pub-id-type="doi">10.1016/j.jcss.2012.09.012</pub-id>
</element-citation>
</ref>
<ref id="B80-sensors-15-29478">
<label>80.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schmitt</surname>
<given-names>C.</given-names>
</name>
</person-group>
<article-title>TinyIPFIX: An efficient application protocol for data exchange in cyber physical systems</article-title>
<source>Comput. Commun.</source>
<year>2014</year>
<pub-id pub-id-type="doi">10.1016/j.comcom.2014.05.012</pub-id>
</element-citation>
</ref>
<ref id="B81-sensors-15-29478">
<label>81.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zuo</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>H.</given-names>
</name>
</person-group>
<article-title>Cigarette production scheduling by combining workflow model and immune algorithm</article-title>
<source>IEEE Trans. Autom. Sci. Eng.</source>
<year>2014</year>
<volume>11</volume>
<fpage>251</fpage>
<lpage>264</lpage>
<pub-id pub-id-type="doi">10.1109/TASE.2012.2227728</pub-id>
</element-citation>
</ref>
</ref-list>
</back>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000045  | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000045  | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     
   |texte=   
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024