2016
DOI: 10.1007/978-3-319-42559-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Overview of the CPS for Smart Factories Project: Deep Learning, Knowledge Acquisition, Anomaly Detection and Intelligent User Interfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…Deep learning where multiple layers have been employed in order to build an ANN, which is able to make intelligent decisions, handling large amounts of data with high complexity, without any human intervention [15,22,23]. Some DL algorithms are convolutional neural networks (CNNs), restricted Boltzmann machine (RBM) and auto-encoders (AE) [23].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning where multiple layers have been employed in order to build an ANN, which is able to make intelligent decisions, handling large amounts of data with high complexity, without any human intervention [15,22,23]. Some DL algorithms are convolutional neural networks (CNNs), restricted Boltzmann machine (RBM) and auto-encoders (AE) [23].…”
mentioning
confidence: 99%
“…These include process monitoring and quality control, fault detection and diagnosis, as well as machine health monitoring and predictive maintenance [24]. Moreover, the capabilities of ML, regarding the timely processing of an abundance of data are critical to safeguarding the cyber-security of the Industrial Internet of Things (IIoT) enabled interconnected manufacturing environments, accurately detecting and mitigating threats [22,25].…”
mentioning
confidence: 99%
“…Deep neural networks (DNNs) has been used in various applications of Artificial Intelligence (AI), computer vision and recognition models (Liu et al, 2017). Nowadays, these are extremely effective and flexible for extracting actionable, highlevel information from the raw data produced by a wide variety of sensors in CPSs (Sonntag, Zillner, Smagt, & Lorincz, 2017). They are also used in computer security applications such as malware detection.…”
Section: Adversarial Attacksmentioning
confidence: 99%
“…They are also fast because they obey weak consistency constraint instead of strong consistency constraint to trade consistency for processing speed. The data stored in the database are useful not only for the product whole lifecycle service, but also for modern data analysis schemes, like the big data analysis, 29 machine learning, 30 and deep learning 31 schemes, to perform prognostics and health management (PHM) 32 of machines, to optimize the production process, 30 to predict future demands, to improve services, and/or to save energy in production. 33 Since the cloud plays an important role in our CPS implementation, we now describe cloud implementation considerations.…”
Section: Focus On Both Vertical Integration and Horizontal Integrationmentioning
confidence: 99%