研究生: |
黃憲成 Huang, Wilson |
---|---|
論文名稱: |
具支援機台失效偵測與分類能力的藍芽無線通訊架構 Bluetooth Communication Framework for Supporting Equipment Fault Detection and Classification |
指導教授: |
鄭芳田
Cheng, Fan-Tien |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 製造工程研究所 Institute of Manufacturing Engineering |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 中文 |
論文頁數: | 105 |
中文關鍵詞: | 通用型嵌入式裝置 、藍芽無線通訊 、網路式預測保養系統 、掌上型電腦 |
外文關鍵詞: | PDA (Personal Digital Assistant), Generic Embedded Device, Bluetooth wireless Communication, Web-based Prognostics Maintenance System |
相關次數: | 點閱:76 下載:4 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
藍芽(Bluetooth)無線通訊傳輸已成為現今最熱門的新興技術。然而,在半導體 及 TFT-LCD產業尚未全面性的導入此項技術。本研究提出一套架構在通用型嵌入式裝置(GED)上之藍芽無線通訊傳輸方式,以期能讓嵌入於GED內部之預測保養功能模組在設備尚未發生故障之前,即可預測出設備未來可能發生異常等現象,並將此預測資訊,利用無線通訊方式即時傳送至機台維修人員手持個人數位助理(Personal Digital Assistant, PDA)上,以採取必要之防範措施,進而有效提高設備的使用效能(Utility)及妥善率(Availability)。
本研究之主要目的即在於運用藍芽無線通訊技術結合GED裝置,並對此架構進行設計與實作,以取代原本之有線網路通訊傳輸方式,並藉由維修人員之PDA,直接監控機台狀況。本研究之成果可作為自動化生產設備之實際運用,除可將異常預測訊息即時傳送至維修人員,大幅提昇設備維護效率及妥善率外,亦可有效降低人力成本。
Bluetooth communication has become the emerging technology nowadays; however, this technology has not been overall implemented to semiconductor and TFT-LCD industries. This work proposes a framework for Bluetooth communication method of generic embedded device (GED). Such a framework enables the prognostics maintenance function module embedded in GED to prognose the equipment errors and wirelessly send the prognosis results to maintenance engineer’s personal digital assistant (PDA) in real-time. The maintenance engineers can take the necessary precaution actions, and thus the utility and availability of the equipment are effectively improved.
This work is aimed at applying Bluetooth communication technology to GED, and further the framework is designed and developed to replace the existing wired network communication. With the Bluetooth wireless communication technology, the maintenance engineers are able to monitoring the equipment via PDA. The achievements of this work are practically applicable to equipment automation; besides, the real-time transformation of alarm messages to maintenance engineers not only greatly improves the utility and availability of the equipment but also significantly lowers down the cost of manpower.
[1] Bluetooth standard version 1 .OB, www.bluetooth.org.
[2] SEMI, Semiconductor Equipment and Material International. [Online]. Available: http://www.semi.org/
[3] L.M. Correia and R. Prasad, “An overview of wireless broadband communications,” IEEE Communications Magazine, vol. 35, no. 1, pp. 28-38, Jan. 1997.
[4] B.P Crow and J.G. Kim, “IEEE 802.11 Wireless Local Area Networks,”IEEE Communications Magazine, Vol. 35, no. 9, pp. 116-126, Sep.1997.
[5] R. van Nee and G. Awater, “New High-rate Wireless LAN Standards,”IEEE Communications Magazine, Vol. 37, no. 12, pp. 82-88, Dec. 1999
[6] P. Y. L. Tu1, R. Yam, P. Tse, and A. O. W. Sun, “An Integrated Maintenance Management System for an Advanced Manufacturing Company,” International Journal of Advanced Manufacturing Technology, 17(9), pp. 692-703, 2001.
[7] e-Diagnostics and EEC Workshop, International SEMATECH, Austin, Texas, USA, Oct. 19, 2001. http://www.sematech.org/
[8] IMS Vision, Center for Intelligent Maintenance Systems. [Online]. Available: http://www.imscenter.net/
[9] International SEMATECH, Equipment Engineering Capabilities (EEC) Guidelines, Version 2.5, International SEMATECH, July 2002.
[10] Hao-Yu Liu, “A Bluetooth Routing Protocol for Ad Hoc Networks”, available from http://ethesys.lib.nsysu.edu.tw/ETD-db/ETD-browse/browse?first_letter=C;browse_by=department IBM, Enhanced Fab Performance through Interface A, IBM, 18 July 2003.
[11] UML, OMG's 1997 Press Releases. [Online]. Available: http://www.omg.org/news/pr97.htm
[12] SEMI, The EDA Dataport - An Overview, in e-Manufacturing Workshop.
[13] Das, A.; Ghose, A.; Razdan, A.; Saran, H.; Shorey, R., “Enhancing performanceof asynchronous data traffic over the Bluetooth wireless ad-hoc network”, INFOCOM2001.D
[14] Johansson, P.; Kazantzidis, M.; Kapoor, R.; Gerla, M., “Bluetooth: an enabler for personal area networking”, IEEE Network, Volume: 15 Issue: 5, Sept.-Oct. 2001.
[15] Groten, D.; Schmidt, J.R., ”Bluetooth-based mobile ad hoc networks: opportunities and challenges for a telecommunications operator”, Vehicular Technology Conference, 2001. VTC 2001 spring. IEEE VTS 53rd, Volume: 2, 2001.
[16] Pravin Bhagwat and Adrian Segal, “A Routing Vector Method (RVM) for Routing in Bluetooth Scatternets”, Mobile Multimedia Communications, 1999.
[17] Perkins, C.E.; Royer, E.M., “Ad-hoc on-demand distance vector routing”,Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99.Second IEEE Workshop on, 1999.
[18] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-Hoc Wireless Networks”, Mobile Computing, T. Imielinski and H. Korth, Eds., Kluwer, 1996, pp. 153-81.
[19] Z. J. Haas and M. R. Pearlman, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, Internet Draft draft-zone-routing-protocol-01.txt, Aug, 1998.
[20] J. C. Haartsen, “The bluetooth radio system,” IEEE Pers. Comm., vol. 7, no. 1, pp. 28–36, Feb 2000.
[21] SEMI E132, Provisional Specification for Equipment Client Authentication and Authorization, SEMI, 2004.
[22] SEMI E120-0703, Provisional Specification for the Common Equipment Model (CEM), SEMI, 2003.
[23] SEMI E125-0703, Provisional Specification for Equipment Self -Description (ESD), SEMI, 2003.
[24] SEMI E134, Provisional Specification for Data Collection Management (DCM), U.S.A. 2004.
[25] R. Mukaro and X. F. Carelse, “A Microcontroller-Based Data Acquisition System for Solar Radiation and Environmental Monitoring,” IEEE Transactions on Instrument and Measurement, Vol. 48, No. 6, pp. 1232-1238, December 1999.
[26] R. Lombardi, G. Coldani, G. Danese, R. Gandolfi, and F. Leporati, “Data Acquisition System for Measurements in Free Moving Subjects and its Applications,” IEEE Transactions on Instrument and Measurement, Vol. 52, No. 3, pp. 878-884, June 2003.
[27] M. Benghanem and A. Maafi, “Data Acquisition System for Photovoltaic Systems Performance Monitoring,” IEEE Transactions on Instrument and Measurement, Vol. 47, No. 1, pp. 30-33, February 1998.
[28] Microsoft Windows CE, http://www.microsoft.com/windows/embedded/ce/default.asp
[29] 田華湘, Windows CE 應用特性介紹, 新電子6 月159 期, 1999。
[30] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” Proc. ACM SIGCOMM’94, pp. 234-244, Oct.1994.
[31] C. Perkins, E. M. Royer, “Ad hoc on demand distance vector (ADOV) routing, “ Mobile Ad-hoc Networks (manet),” http://www.ietf.org/html.charters/manet-charter.html, Aug. 1998.
[32] B. Das, R. Sivakumar and V. Bharghavan, “Routing in ad hoc networks using a spine,” Proc. IEEE Computer Communication and Networks, pp. 34-39,1997.
[33] M. Gerla, G. P. and S.-J. Lee. “Wireless, mobile ad-hoc network routing,” IEEE/ACM FOUCUS’99, 1999.
[34] Z. J. Haas and M. R. Pearlman, “The zone routing protocol (ZRP) for ad hoc networks,” Mobile Ad-hoc Networks (manet), http://www.ietf.org/html.charters/manet-charter.html, Nov. 1997.
[35] T. -C. Hou, T. -J. Tsai, “Adaptive clustering in a hierarchical ad hoc network,” Proc. ICS Workshop on Computer Networks, Internet, and Multimedia, 1998.
[36] F.-K. Hwang, D. S. Richards, P. Winter, “The steiner tree problem,” Elsevier Science Publishers B. V., 1992.
[37] A. Iwata, C.-C. Chiang, G. pei, M. Gerla, and T.-W. Chen, “Scalable routing strategies for ad hoc wireless networks,” IEEE Journal on selected area in communications, vol. 17, no. 8, Aug 1999.
[38] D. A. Maltz, J. Rroch, J. Jetcheva, and D. B Johnson, “The effects of on- demand behavior in routing protocols for multihop wireless ad hoc networks,” IEEE journal on selected areas in communications, vol. 17,no. 8 Aug 1999.
[39] G. Pei, M. Gerla, X. Hong and C. -C. Chiang, “A wireless hierarchical routing protocol with group mobility,” Proc. Wireless Communications and Networking Conference, vol. 3, pp. 1538-1542, 1999.
[40] Y. Rekhter, S. Hotz and D. Estrin, “Constraints on forming clusters with link-stats hop-by-hop routing,” Technical Report USC-CS-93-536, University of Southern California, 1993.
[41] M. Gerla and J.T.-C. Tsai, “Multicluster, mobile, multimedia radio network,” ACM Journal on Wireless Networks, pp. 255-265, 1995.
[42] Y. -B Ko and N.H. Vaidya, “Location-aided routing (LAR) in mobile ad-hoc network,” Proc. ACM/IEEE MOBICOM’98, pp. 66-75, 1998.
[43] J. Broch, D. B. Johson, D. A. Maltz, “The dynamic source routing protocol for mobile ad hoc networks,” Mobile Ad-hoc Networks (manet), http://www.ietf.org/html.charters/ manet-charter.html, Aug. 1998.
[44] D. B. Johnson and D. A. Maltz, “Protocols for adaptive wireless and mobile networking,” To appear in IEEE Personal Communications, 3(1), February 1996.
[45] M. Joa-Ng, I. -T. Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks,” IEEE Journal on selected area in communications, vol. 17, no. 8, Aug 1999.
[46] Y. -L. Chang, C. -C. Hsu, “Connection-oriented routing in ad-hoc networks based on dynamic group level recovery,” in Proc. the 6th Mobile Computing Workshop.,2000.
[47] C. Ho, K. Obraczka, G. Tsudik,” Flooding for reliable multicast in multi-hop ad hoc networks,” Proc. the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 64-71, 1999.
[48] H.-E. Eriksson and M. Penker, UML Toolkit, NY: John Willy & Sons, 1998.
[49] G. Booch, Object-Oriented Analysis and Design with Applications, Redwood City, CA: Benjamin Cummings, 1994.
[50] J. Rumbough, M. Blaha, and W. Premerlani, F. Eddy, and F. Lorensen, Object-Oriented Modeling and Design, Englewood Cliffs, NJ: Prentice-Hall, 1991.
[51] A. Jacobson, M. Christerson, and G. Övergaard, Object-Oriented Software Engineering, Reding, NY: Addison-Wesley, 1992.
[52] D. Coleman, S. Bodoff, and P. Arnold, Object-Oriented Development: The Fusion Method, Prentice Hall, 1994.
[53] OMG, “OMG's 1997 Press Releases,” Object Management Group, 1997, http://www.omg.org/news/pr97.htm.
[54] W. A. Arbaugh, “Wireless Research”, available from http://www.cs.umd.edu/~waa/wireless.html
[55] B. Miller, “IEEE 802.11 and Bluetooth wireless technology”, available from http://www-106.ibm.com/developerworks/wireless/library/wi-phone/
[56] J. Walker, “Unsafe at any key size; An analysis of the WEP encapsulation”, available from http://grouper.ieee.org/groups/802/11/Documents/DocumentHolder/0-362.zip
[57] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11”, available from http://www.issac.sc.berkley.edu/issac/wep-faq.html
[58] W. Arbaugh, N. Shankar, Y.C.J. Wan, “Your 802.11 Wireless Network has No Clothes”, available from http://www.cs.umd.edu/~waa/wireless.pdf
[59] M. Jakobsson and S. Wetzel, “Security Weaknesses in Bluetooth”, available from http://www.rsasecurity.com/rsalabs/staff/bios/mjakobsson/bluetooth/bluetooth.pdf
[60] S. Fluhrer and S. Lucks, “Analysis of the E0 Encryption System”, available from S. Lucks’ web site at http://th.informatik.uni-mannheim.de/People/Lucks/papers/e0.ps.gz
[61] Bluetooth SIG, Specification of the Bluetooth system, Profiles,Version 1.1, 1, February 22, 2001, available at http://www.bluetooth.com/
[62] Bluetooth SIG, Specification of the Bluetooth system, Core “,Version 1.1, 1 February 22, 2001, available at http://www.bluetooth.com/
[63] Y.-C. Su, M.-H. Hung, F.-T. Cheng, and T.-P. Lee, " Development of a Data Pre-processing Scheme and Pluggable Application Modules for an Intelligent Equipment Prognostics System," in Proc. the 3rd International IEEE Conference on Industrial Informatics – INDIN’05, Perth, Western Australia, August 2005. (NSC-92-2212-E006-098, NSC-93-2622-E-006-005)