Читать книгу Industry 4.1 - Группа авторов - Страница 4

List of Illustrations

Оглавление

1 Chapter 1Figure 1.1 ISMT e‐Manufacturing hierarchy.Figure 1.2 Four key components for the advanced e‐Manufacturing model.Figure 1.3 MES operation procedures.Figure 1.4 Functional architecture of the ISMT CIM framework.Figure 1.5 The HMES framework. Figure 1.6 ESCM architecture and key processes.Figure 1.7 Functional‐block diagram of the holonic supply‐chain system.Figure 1.8 The ISMT EES framework.Figure 1.9 The proposed EES framework.Figure 1.10 Comparison of SC and EC.Figure 1.11 Engineering‐chain‐management system framework.Figure 1.12 Changing curves of yield and cost during the product life cycle....Figure 1.13 Five‐stage strategy for increasing yield in RD/ramp‐up and MP ph...Figure 1.14 Production line of the bumping process.

2 Chapter 2Figure 2.1 Fundamental steps for developing an intelligent application.Figure 2.2 An external data acquisition system for acquiring process and met...Figure 2.3 Relative motion between a cutting tool and a workpiece.Figure 2.4 Installation of a Dynamometer.Figure 2.5 Installation of a CT.Figure 2.6 Installation of accelerometer by stud mounting.Figure 2.7 Vibration data collection of Z‐axis.Figure 2.8 Installation of thermal couple.Figure 2.9 Distance between a thermal couple and spindle.Figure 2.10 Installation of an AE sensor.Figure 2.11 Sensor fusion system comprising an accelerometer and a thermal c...Figure 2.12 Sensor fusion system using five types of sensors.Figure 2.13 An external data acquisition system triggered by electronic rela...Figure 2.14 An DC signal: (a) in time‐domain; (b) in frequency‐domain; (c) i...Figure 2.15 A random signal: (a) in time‐domain; (b) in frequency‐domain; (c...Figure 2.16 Three‐level decomposition tree of the DWT.Figure 2.17 View of the time and frequency domains.Figure 2.18 A vibration signal: (a) in time‐domain; and (b) in FFT spectrum....Figure 2.19 Unchanged resolution of STFT time‐frequency plane.Figure 2.20 Dynamic window of WPT time‐frequency plane.Figure 2.21 WPT decomposition binary tree.Figure 2.22 Architecture of the AEN.Figure 2.23 Using a smart tool holder to detect tool state.Figure 2.24 Detrending of the thermal effect in strain‐gauge data: (a) befor...Figure 2.25 De‐noising signals to highlight differences between dry‐run and ...Figure 2.26 Collected vibration signals (including idling and machining peri...Figure 2.27 Comparison of the original and decoded features under four idlin...Figure 2.28 Automated segmentation of machining signals using an AEN: (a) di...Figure 2.29 Comparison of time‐domain signals (upper portion), WPT features ...Figure 2.30 WPT distribution results for different cutting depths in the X a...Figure 2.31 Comparison of four SFs extracted by using an AEN for samples of ...Figure 2.32 A forging load (pressure)‐stroke curve.Figure 2.33 Failure diagnosis in a forming process.Figure 2.34 Sample validation using the single dimension feature of the midd...Figure 2.35 AEN‐DNN architecture for failure diagnosis.

3 Chapter 3Figure 3.1 SECS block.Figure 3.2 Block transfer.Figure 3.3 Multi‐block message (677 data bytes).Figure 3.4 Illustration of system bytes.Figure 3.5 Block transfer protocol in a multi‐block message.Figure 3.6 T1, T2, and T3 timeouts.Figure 3.7 Example of T2 timeout and retry limit.Figure 3.8 Equipment is Master and Host is Slave.Figure 3.9 Primary and secondary messages.Figure 3.10 SECS‐II message detail of host sending S1F3 to equipment.Figure 3.11 SECS‐II message detail of Equipment sending S1F4 to Host.Figure 3.12 Message detail style.Figure 3.13 Message structure receiving S1F3.Figure 3.14 Message structure sending S1F4.Figure 3.15 Scopes of GEM, SECS‐II, and other communications alternatives.Figure 3.16 Subsidiary standards of HSMS.Figure 3.17 SECS‐I RS‐232 connections versus HSMS TCP/IP Ethernet connection...Figure 3.18 HSMS‐SS message format.Figure 3.19 Connect.Figure 3.20 Data.Figure 3.21 Disconnect.Figure 3.22 Linktest.Figure 3.23 HSMS can share network with other TCP/IP protocols.Figure 3.24 SECS‐I and HSMS‐SS protocol stacks.Figure 3.25 Interface A Standards on equipment.Figure 3.26 Interface A Integrated Scenario.Figure 3.27 E132 Authentication model.Figure 3.28 CEM example – diagram of a conveyor system.Figure 3.29 CEM example – photo of a conveyor system.Figure 3.30 CEM example‐conveyor CEM description diagram.Figure 3.31 E125 Equipment metadata.Figure 3.32 Example of CEM and EqSD – conveyor system.Figure 3.33 E164 in CEM and EqSD.Figure 3.34 Overview of data collection.Figure 3.35 Data collection manager and consumer interfaces.Figure 3.36 Definition of data collection report.Figure 3.37 Definition and example of event report.Figure 3.38 Definition and example of exception report.Figure 3.39 Definition of trace report.Figure 3.40 Example of trace data collection.Figure 3.41 Example of DCR buffering.Figure 3.42 Automation pyramid.Figure 3.43 Illustrative use case of OPC clients and servers.Figure 3.44 Foundations of OPC‐UAFigure 3.45 OPU‐UA architecture.Figure 3.46 Architecture overview of an OPC‐UA client and an OPC‐UA server....Figure 3.47 OPC‐UA security model.Figure 3.48 Sequence diagram of operating procedure between a pair of OPC‐UA...Figure 3.49 Intelligent Manufacturing architecture in the FCCL industry.Figure 3.50 Monitoring and control system architecture of Coater by applying...Figure 3.51 Use cases of data manipulation.Figure 3.52 Sequence diagram of Data Collection.Figure 3.53 Sequence diagram of recipe download.

4 Chapter 4Figure 4.1 Architecture of virtual machines on top of hypervisor and physica...Figure 4.2 Comparison of cloud computing service models.Figure 4.3 Architecture of the three cloud deployment models.Figure 4.4 Traditional IT utilization of enterprises and factories using on‐...Figure 4.5 Manufacturing company or factory utilizing cloud computing to ext...Figure 4.6 Simplified generic system architecture of cloud manufacturing (CM...Figure 4.7 Architecture and operational flow of the cloud‐based AVM system....Figure 4.8 Generic three‐layer cloud‐based IoT architecture.Figure 4.9 MQTT Publish/Subscribe architecture for the communication of IoT....Figure 4.10 AMQP Publish/Subscribe architecture for the communication of IoT...Figure 4.11 Cloud‐based IoT architecture with an edge computing layer.Figure 4.12 Application of IoT and edge computing in wheel machining.Figure 4.13 Software stack for a HDS server.Figure 4.14 Programming in DRS.

5 Chapter 5Figure 5.1 Comparison of virtual machines and Docker containers.Figure 5.2 Illustration of Docker containers running on virtual machines.Figure 5.3 Constituent components of Docker Engine.Figure 5.4 A high‐level view of Docker architecture with some of its workflo...Figure 5.5 Architecture of a Linux Docker host.Figure 5.6 Architecture of a Windows Docker host.Figure 5.7 Architecture of Windows Server Containers.Figure 5.8 Architecture of Hyper‐V Containers.Figure 5.9 Anatomy of a Docker container image.Figure 5.10 An example of Dockerfile.Figure 5.11 The process of building an image.Figure 5.12 The history of the pythonapp:latest image.Figure 5.13 The sizes of two Linux container images.Figure 5.14 A shorthand Dockerfile for building a Linux container image.Figure 5.15 The stacked layers of the Linux container image built by the Doc...Figure 5.16 A shorthand Dockerfile for building a Windows container image.Figure 5.17 The stacked layers of the Windows container image built by the D...Figure 5.18 Illustration of many containers sharing the same image layers.Figure 5.19 Architecture of the container network model (CNM) for Linux cont...Figure 5.20 Architecture of bridge networking.Figure 5.21 Architecture of host networking.Figure 5.22 Architecture of none networking.Figure 5.23 Architecture of overlay networking.Figure 5.24 Architecture of CNM for Windows containers.Figure 5.25 Workflow of building, shipping, and deploying a containerized ap...Figure 5.26 An example Dockerfile for building a Linux web application image...Figure 5.27 Building steps of the Linux web application image.Figure 5.28 Execution results of the docker tag and docker push commands.Figure 5.29 Screenshot showing that the “imrc/example‐linux” image has been ...Figure 5.30 Execution result of the docker pull command.Figure 5.31 Execution result of the docker run command.Figure 5.32 Screenshot displaying the home page of the running containerized...Figure 5.33 An example Dockerfile for building a Windows web application ima...Figure 5.34 Building steps of the Windows web application image.Figure 5.35 Execution result of the docker push command.Figure 5.36 Screenshot showing that the “imrc/example‐windows” image has bee...Figure 5.37 Docker pull command's execution result on a Windows Docker host....Figure 5.38 Execution result of the docker run command.Figure 5.39 Screenshot displaying the home page of the running containerized...Figure 5.40 Architecture of Kubernetes.Figure 5.41 Creation Process of a Pod.Figure 5.42 System architecture with three Control Plane Nodes.Figure 5.43 System architecture with the stacked etcd topology.Figure 5.44 System architecture with the external etcd topology.Figure 5.45 System architecture without ingress.Figure 5.46 System architecture with ingress.Figure 5.47 Two phases of scheduler.Figure 5.48 Ready status of the control plane node.Figure 5.49 Dashboard while the control plane node is ready.Figure 5.50 Generating the join token of the control plane.Figure 5.51 Worker node joining the cluster by the join token.Figure 5.52 Status of the cluster shown by kubectl.Figure 5.53 Status of the worker1 shown in dashboard.Figure 5.54 Example of a YAML fileFigure 5.55 Deploying the httpd service by applying example.yaml.Figure 5.56 Status of Pods shown in dashboard.Figure 5.57 Screenshot displaying a workable httpd service.

6 Chapter 6Figure 6.1 Architecture design of the AMCoT framework.Figure 6.2 Functional block diagram of the AVM server.Figure 6.3 Functional block diagram of the BPM scheme in the IPM server.Figure 6.4 Functional block diagram of the KSA scheme in the IYM server.Figure 6.5 Cloud‐based iFA system platform.Figure 6.6 Server‐based iFA system platform.

7 Chapter 7Figure 7.1 Architecture design of the AMCoT framework.Figure 7.2 An example of intelligent manufacturing platform based on the AMC...Figure 7.3 Framework of CPA.Figure 7.4 Framework of CPAC.Figure 7.5 System architecture of RCSCPA.Figure 7.6 Horizontal auto‐scaling mechanism of PAMC’s in RCSCPA.Figure 7.7 Load balance mechanism of PAMC’s in RCSCPA.Figure 7.8 Failover mechanism among the Pods of a PAMC in RCSCPA.Figure 7.9 Screenshot showing that a Kubernetes cluster has been created, an...Figure 7.10 Screenshot showing that the BPMC has four Pods for load balance....Figure 7.11 Screenshot showing that the four Pods of the BPMC are distribute...Figure 7.12 Health‐gauging web GUI of the BPMC, which contains four Pods wor...Figure 7.13 Framework of the big‐data‐analytics application platform.Figure 7.14 Comparison of query times using four types of data table in expe...Figure 7.15 Comparison of query times using four types of data format in exp...Figure 7.16 Architecture of the proposed BEDPS.Figure 7.17 Three‐phase workflow of MSACS.Figure 7.18 System architecture of MSACS.Figure 7.19 Hierarchical information of a Jar SSLP in a Java decompiler.Figure 7.20 Hierarchical information of a C# DLL SSLP in a C# decompiler....Figure 7.21 Generic KI extraction algorithm of SSLPs.Figure 7.22 Illustration of the Lib. Info. Template in JSON.Figure 7.23 Illustration of the SI Info. Template in JSON.Figure 7.24 C# WSP template.Figure 7.25 Example of “APIController.cs” for C# WSP template.Figure 7.26 Flowchart of the automated source code generation.Figure 7.27 Result of automated code generation for the WSP template in Figu...Figure 7.28 Automated service construction mechanism designed in Server Cons...Figure 7.29 Web GUI of MSACS.Figure 7.30 GUI showing the method information in the AVMService.dll.Figure 7.31 GUI showing the web API information of the AVM service.Figure 7.32 GUI for conducting virtual metrology using the created AVM CMfg ...Figure 7.33 Four‐phase workflow of MSACSC.

8 Chapter 8Figure 8.1 Comparison between actual metrology and virtual metrology.Figure 8.2 Current physical metrology operating scenarios.Figure 8.3 Tool and process monitoring without and with VM.Figure 8.4 Illustration of a false alarm and a missed detection.Figure 8.5 Automatic Virtual Metrology (AVM) system.Figure 8.6 AVM server.Figure 8.7 Advanced dual‐phase VM algorithm.Figure 8.8 Plugging AVM into the MES framework.Figure 8.9 Relationships among AVM, MES components, and R2R controllers.Figure 8.10 Operating scenarios among AVM, MES components, and R2R controlle...Figure 8.11 Collaboration diagram for integrating AVM into MES.Figure 8.12 Model of EWMA R2R control.Figure 8.13 W2W control scheme utilizing VM [15, 16, 32].Figure 8.14 AVM server with PreY input.Figure 8.15 Schematic Diagram of Defining RI for Normal Distribution.Figure 8.16 Schematic diagram of defining RIW for Weibull distribution.Figure 8.17 W2W control scheme utilizing AVM with RI and GSI. (a) Complete W...Figure 8.18 Simulation results of 5‐cases APC methods of Round 1.Figure 8.19 RI and GSI exceed their thresholds at Sample 50 of Round 1.Figure 8.20 GSI exceeds its threshold at Sample 349 of Round 1.Figure 8.21 Simulation results of Cases 3‐5 for the first 200 samples. (a) R...Figure 8.22 Mean MAPEP curves as functions of α1 of 5‐cases APC methods...Figure 8.23 Automation levels of virtual metrology systems.

9 Chapter 9Figure 9.1 SPC control chart of throttle‐valve angles in a PECVD tool.Figure 9.2 BPM scheme.Figure 9.3 State diagram of a device.Figure 9.4 Procedure of collecting the important samples needed for creating...Figure 9.5 Configurations of SPC control charts of DHI and BEI. (a) Converti...Figure 9.6 Flow chart of baseline FDC execution procedure.Figure 9.7 ECF RUL prediction model.Figure 9.8 Flowchart for calculating ECF RUL.Figure 9.9 Advanced BPM (ABPM) scheme.Figure 9.10 Prediction results of the ECF model. (a) Aging feature predictio...Figure 9.11 Flow chart of the TSP algorithm.Figure 9.12 Flow chart of the pre‐alarm module (PreAM).Figure 9.13 Management and equipment views of a solar‐cell manufacturing fac...Figure 9.14 Health index hierarchy.Figure 9.15 Intelligent predictive maintenance (IPM).Figure 9.16 Implementation architecture of the IPMC (i.e. IPMC‐IA) based on ...Figure 9.17 Workflow for constructing and deploying the IPMC in a Kubernetes...Figure 9.18 Example IPMC volume YAML file.Figure 9.19 Example IPMC deployment YAML file.Figure 9.20 Example Dockerfile for creating the ABPM image.Figure 9.21 Example IPMC service YAML file.

10 Chapter 10Figure 10.1 Changing curves of yield and cost during the product life cycle....Figure 10.2 Traditional root‐cause search process of a yield loss.Figure 10.3 Intelligent yield management system.Figure 10.4 Procedure for finding the root causes of a yield loss by applyin...Figure 10.5 The KSA scheme.Figure 10.6 Flowchart of ALASSO with automated λ adjusting. λ: penalty; KV...Figure 10.7 Flow chart of the BSA module.Figure 10.8 Rule I in the BSA module.Figure 10.9 Rule II in the BSA module.Figure 10.10 Flow Chart of the Regression Tree.Figure 10.11 Description of Regression Tree Step 1 and Step 2.

11 Chapter 11Figure 11.1 Process flow of TFT‐LCD manufacturing.Figure 11.2 Semiconductor layer of the TFT process flow with deployment of A...Figure 11.3 Thin‐film structure in CVD process.Figure 11.4 Combination of TFT photo step.Figure 11.5 CF manufacturing process flow with deployment of AVM servers. (a...Figure 11.6 PS layer flow of the CF manufacturing process with deployment of...Figure 11.7 LCD manufacturing process flow with deployment of AVM servers. (...Figure 11.8 Dual‐stage indirect VM architecture.Figure 11.9 Single‐stage example: Stage‐I VM results at Position 2. LCL, low...Figure 11.10 Dual‐stage example: Stage‐II VM results at Position 2. LCL, low...Figure 11.11 Combination example of cooperative‐tools: VMI result at Positio...Figure 11.12 Illustration of an erroneous measurement.Figure 11.13 Inline example of cooperative‐tools at Position 1: (a) NNI and ...Figure 11.14 TFT manufacturing process.Figure 11.15 PEP flow of the semiconductor layer.Figure 11.16 Accumulated Type 2 loss results.Figure 11.17 Procedure for finding the root causes of a yield loss by applyi...Figure 11.18 RIK result of XR search.Figure 11.19 KSA search results of Type 2 loss on Lot 49. (a) Top 1 Device: ...Figure 11.20 RIK result of XP search.Figure 11.21 Root cause analysis of control voltage on Chamber A of Equipmen...Figure 11.22 T2T control scenario of the PECVD manufacturing process.Figure 11.23 T2T control scheme.Figure 11.24 T2T controller.Figure 11.25 Scenario of Applying the AVM system to the PECVD process.Figure 11.26 VM accuracy verification.Figure 11.27 T2T with AM. (a) All samples. (b) APC samples.Figure 11.28 T2T with VM. (a) All samples. (b) APC samples.Figure 11.29 T2T+VM without RI&GSI. (a) All samples. (b) APC samples.Figure 11.30 T2T+VM with RI&GSI. (a) All samples. (b) APC samples.Figure 11.31 RI and GSI are lower than RIT and GSIT, respectively at Sample ...Figure 11.32 Cycle‐time improvement by applying T2T+AVM.Figure 11.33 Illustration of the necessity of adopting the C&H modeling samp...Figure 11.34 Results of the FDC portion of the BPM scheme.Figure 11.35 BPM‐related data and indexes of an entire PM period.Figure 11.36 ECF RUL predictive results.Figure 11.37 Throttle valve RUL predictive results of the TSP algorithm. (a)...Figure 11.38 IPM dashboard. (a) Management view. (b) Equipment view.Figure 11.39 Equipment status dashboard in MES.Figure 11.40 Sequence diagram showing the interfaces between the MES and IPM...Figure 11.41 Illustrations of the functions of RI, GSI, and dual‐phase schem...Figure 11.42 Production line of the bumping process.Figure 11.43 Common equipment model of the Sputter equipment.Figure 11.44 Turbo Pump RUL predictive results of the TSP algorithm. (a) Agi...Figure 11.45 Illustration of UBM bumping process variables (5 device variabl...Figure 11.46 Analysis results with/without IESA. (a) Without IESA analysis. ...Figure 11.47 IESA Regression Tree analysis results.Figure 11.48 Illustration of adding new interaction‐effect variables (SD 01 ...Figure 11.49 Conversion of the OS‐to‐SS Q‐time variable into binary form....Figure 11.50 Trend chart of the accumulated yield loss vs. OS‐to‐SS Q‐time....Figure 11.51 Integrating GAVM into WMA.Figure 11.52 GAVM architecture for machine tools.Figure 11.53 A unique QR‐code‐identification engraved on the mounting‐surfac...Figure 11.54 One‐to‐many relationship among a vender and its customers via A...Figure 11.55 Architecture of the existing GAVM system.Figure 11.56 Detailed drawing of integrating WMA’s vender and customers into...Figure 11.57 Global cyber‐physical interactions (AVM models refreshing). LCL...Figure 11.58 Operating scenarios of modeling and running samples of the TVA ...Figure 11.59 Flowchart of the TVA scheme.Figure 11.60 VM results with and without the TVA scheme.Figure 11.61 Comparison of on‐machine probing (OMP), CMM, and VM.Figure 11.62 Using a probe to touch the outside of an EC end‐face.Figure 11.63 Position trends and their curve‐fitting results of 10 ECs.Figure 11.64 Actual deformed position (D) and ideal position (I) of an EC....Figure 11.65 Approximate machining position (A) on a deformed EC.Figure 11.66 Flowchart of generating the fittest ellipse and AC via GA.Figure 11.67 Flowchart of integrating the on‐line probing, the DF scheme, an...Figure 11.68 AVM results for diameter prediction.Figure 11.69 Position prediction. (a) VM results of four cases: (1) without ...Figure 11.70 Comparison of off‐line measurement and virtual metrology.Figure 11.71 CPAVM scheme.Figure 11.72 Illustration of the production‐data‐traceback (PDT) mechanism....Figure 11.73 Information flow of the PDT mechanism.Figure 11.74 AMCoT for carbon‐fiber manufacturing.Figure 11.75 AVM results of sizing percentage.Figure 11.76 Carbon‐fiber manufacturing on‐line display results.Figure 11.77 Two‐stage PET stretch‐blow molding machine.Figure 11.78 Implementation of AVM for blow molding machines.Figure 11.79 Architecture of IM‐based R2R control.Figure 11.80 Architecture of AVM‐based R2R control.Figure 11.81 AVM‐based R2R control implementation in multiple machines.Figure 11.82 Flow chart of AVM‐based R2R control scheme.Figure 11.83 Experimental results of AVM‐based R2R control for Case 1‐out‐of...Figure 11.84 CPM values of Case 1‐out‐of‐1 lot.

Industry 4.1

Подняться наверх