Automatic generation of cyber-physical software applications based on physical to cyber transformation using ontologies

Chen Wei Yang*, Valeriy Vyatkin, Victor Dubinin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

In this paper, the aim of automatically generating a cyber-physical control system (more precisely, an IEC61499 control system) is discussed. The method is enabled by ontology models, specifically the source plant ontology model and the target control model for the CPS system implemented in the preferred programming language. The transforming of ontologies is enabled by an extension of SWRL (called eSWRL) and it is introduced here. There interpreter of eSWRL is developed using the Prolog language. A case study Baggage Handling System is used to demonstrate how the ontology models are transformed and the corresponding transforming rules that are developed.

Original languageEnglish
Title of host publicationIFIP Advances in Information and Communication Technology
EditorsLuis M. Camarinha-Matos, António J. Falcão, Nazanin Vafaei, Shirin Najdi
PublisherSPRINGER
Pages37-45
Number of pages9
Volume470
ISBN (Electronic)9783319311654
ISBN (Print)9783319311647
DOIs
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventAdvanced Doctoral Conference on Computing, Electrical and Industrial Systems - Costa de Caparica, Portugal
Duration: 11 Apr 201613 Apr 2016
Conference number: 7

Publication series

NameIFIP Advances in Information and Communication Technology
Volume470
ISSN (Print)18684238

Conference

ConferenceAdvanced Doctoral Conference on Computing, Electrical and Industrial Systems
Abbreviated titleDoCEIS
Country/TerritoryPortugal
CityCosta de Caparica
Period11/04/201613/04/2016

Keywords

  • BHS
  • CPS
  • ESWRL
  • IEC61499
  • Ontology transformation

Fingerprint

Dive into the research topics of 'Automatic generation of cyber-physical software applications based on physical to cyber transformation using ontologies'. Together they form a unique fingerprint.

Cite this