PLM and particularly the thoughts behind Closed-Loop PLM are a complex matter and almost every aspect of an industrial enterprise is affected by it. The real-world complexity and the role of PLM in a company are hard ...
详细信息
ISBN:
(纸本)9783319729053;9783319729046
PLM and particularly the thoughts behind Closed-Loop PLM are a complex matter and almost every aspect of an industrial enterprise is affected by it. The real-world complexity and the role of PLM in a company are hard to explain to students, particularly in an abstract university environment. In fact, only few students manage to build a link between the abstract theory and the daily challenges of companies. Linking the reality with commonly accepted theory and new aspects from research requires a model that can showcase how theory works in real world, but is simple enough to be explained in a reasonable amount of time. To achieve this goal in education, a scenario around a product in its eco-system has been created. Physically, it is built on very common and easy to use technologies (Lego, Arduino, 3D printed parts). Yet, all relevant organizational aspects, processes, and IT tools are present as in a modern, up-to-date company (ERP, PLM, Configurator, CAD, etc.). This allows to understand the different aspects of PLM based on a hands-on example. For instance, it is possible to explain and experience the impact of an assemble-to-order strategy on engineering, the sales department, service, and the assembly line, by actually doing it. This paper discusses a novel approach in the education of PLM that addresses students, but also people from industry. Eventually, the educational model also serves as a platform to discuss real world problems with industry and discuss and test new approaches (digitization, industry 4.0) and their impact along the lifecycle of their product.
The increasing use of sensors in manufacturing enterprises has led to the need for real-time data-driven information systems capable of processing huge amounts of data in order to provide meaningful insights about the...
详细信息
ISBN:
(纸本)9783319669236;9783319669229
The increasing use of sensors in manufacturing enterprises has led to the need for real-time data-driven information systems capable of processing huge amounts of data in order to provide meaningful insights about the actual and the predicted business performance. We propose a framework for real-time, event-driven proactive supplier selection driven by Condition Based Maintenance (CBM). The proposed framework was tested in a real in automotive lighting equipment scenario.
Energy efficiency is gaining increasingly attention from industries and from several other stakeholders since energy costs cover a significant share of the industrial total cost for manufacturing companies. The improv...
详细信息
ISBN:
(数字)9783319669267
ISBN:
(纸本)9783319669267;9783319669250
Energy efficiency is gaining increasingly attention from industries and from several other stakeholders since energy costs cover a significant share of the industrial total cost for manufacturing companies. The improvement of the performances and the consequent reduction of energy consumption lead to multiple extra benefits in addition to cost savings, for instance improved competitiveness, profitability and quality. For that reason, energy efficiency should be considered as a strategic advantage instead of a marginal issue. The relevance of this issue is particularly significant in energy intensive processes such as the metal industry (e.g. steel and aluminium producers), where usually high temperature processes present a remarkable opportunity to save energy through the excess heat recovery. The aim of the present work is to study a single-vendor single-buyer integrated production-inventory system with the opportunity to recover energy from the excess heat at the vendor production site. The chance to incur in larger savings thanks to a wider integrated network of heat exchanges across various actors along the supply chain (integrated heat recovery) is analysed.
Manufacturing companies are facing an increasingly turbulent market - a market defined by products growing in complexity and shrinking product life cycles. This leads to a boost in planning complexity accompanied by h...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Manufacturing companies are facing an increasingly turbulent market - a market defined by products growing in complexity and shrinking product life cycles. This leads to a boost in planning complexity accompanied by higher error sensitivity. In practice, IT systems and sensors integrated into the shop floor in the context of Industry 4.0 are used to deal with these challenges. However, while existing research provides solutions in the field of pattern recognition or recommended actions, a combination of the two approaches is neglected. This leads to an overwhelming amount of data without contributing to an improvement of processes. To address this problem, this study presents a new platform-based concept to collect and analyze the high-resolution data with the use of self-learning algorithms. Herby, patterns can be identified and reproduced, allowing an exact prediction of the future system behavior. Artificial intelligence maximizes the automation of the reduction and compensation of disruptive factors.
Transport Layer Security (TLS) is the fundament of today's web security, but the majority of deployments are misconfigured and left vulnerable to a phletora of attacks. This negatively affects the overall healthin...
详细信息
ISBN:
(数字)9783319584690
ISBN:
(纸本)9783319584690;9783319584683
Transport Layer Security (TLS) is the fundament of today's web security, but the majority of deployments are misconfigured and left vulnerable to a phletora of attacks. This negatively affects the overall healthiness of the TLS ecosystem, and as such all the protocols that build on top of it. Scanning a larger number of hosts or protocols such as the numerous IPv4-wide scans published recently for a list of known attacks in TLS is non-trivial. This is due to the design of the TLS handshake, where the server chooses the specific cipher suite to be used. Current scanning approaches have to establish an unnecessary large number of connections and amount of traffic. In this paper we present and implemented different optimized strategies for TLS cipher suite scanning that, compared to the current best practice, perform up to 3.2 times faster and with 94% less connections used while being able to do exhaustive scanning for many vulnerabilities at once. We thoroughly evaluated the algorithms using practical scans and an additional simulation for evaluating current cipher suite practices at scale. With this work full TLS cipher suite scans are brought to a new level, making them a practical tool for further empiric research.
Design of complex configurable products is a hard task. Testing of all variants is often impossible because the number of variants is orders of magnitude larger than the total life cycle production volume. Modular des...
详细信息
ISBN:
(纸本)9783319729053;9783319729046
Design of complex configurable products is a hard task. Testing of all variants is often impossible because the number of variants is orders of magnitude larger than the total life cycle production volume. Modular design is advocated as solution but cannot guarantee that if one variant works OK another will not cause errors. This paper proposes, based on a similar method for modular database system design, a theory for modular design of mechanical systems that poses the concept of module independence, to enable design and test of module families as a separate unit while offering formal conditions to assure that no variant of the module family will cause failures when integrated in the end-product. This allows system verification and testing to be done per module family with no need to test individual end product variants. The method is illustrated with a simple example of a mechanical design, but not yet applied in practice.
The article describes the missing link between the information type and quality required by the process of decision making and the knowledge provided using the recent developments of 'big data' technologies, w...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
The article describes the missing link between the information type and quality required by the process of decision making and the knowledge provided using the recent developments of 'big data' technologies, with emphasis on management and control in systems of systems and collaborative networks. Using known theories of decision making, the article exposes a gap in present technology arising from the disparity between the large amount of patterns that can be identified in available data using data analytics, and the lack of technology that is able to provide a narrative that is necessary for timely and effective decision making. The conclusion is that a second level of situated logic is necessary for the efficient use of data analytics, so as to effectively support the dynamic configuration and reconfiguration of systems of systems for resilience, efficiency and other desired systemic properties.
information has been an essential element in the development of collaborative and cooperative models, from decision making to the attainment of varying goals, people are adept at making judgment on the trustworthiness...
详细信息
ISBN:
(纸本)9783319591711;9783319591704
information has been an essential element in the development of collaborative and cooperative models, from decision making to the attainment of varying goals, people are adept at making judgment on the trustworthiness of information, based on knowledge and understanding of a normative model of information. Contemporary narrative especially in high-impact contexts like politics, health, business, government and technology, is eroding trust in information, its source, its value and the ability to objectively determine the trustworthiness of a piece of information, a situation made more complex by social networks, social media have made the spread of information easier and faster irrespective of their trustworthiness, hence the need for judgment on the trustworthiness of a piece of information based on social cognitive construct, a trust model for information.
This work is focused on the development of system able to keep tracking driver's behavior without a black box device mounted inside the car. Firstly, we intend to explore the data from GPS (Global Positioning Syst...
详细信息
ISBN:
(纸本)9783319560779
This work is focused on the development of system able to keep tracking driver's behavior without a black box device mounted inside the car. Firstly, we intend to explore the data from GPS (Global Positioning System), accelerometer, gyroscope and magnetometer for a full characterization of the vehicle dynamics. Secondly, we develop an event detector that determines and classifies distinct kind of maneuvers, like turns, lane change, U-turns, among others. Finally, we developed a simple aggressiveness classifier using fuzzy logic. Experiments have been conducted and the initial results of the system were found to be encouraging on the implementation of a non-intrusive system for driver analysis.
A proof-of-concept system for large scale surveillance, detection and alerts information management (SDAIM) is presented in this paper. Various aspects of building the SDAIM software system for large scale critical in...
详细信息
ISBN:
(纸本)9783319899350;9783319899343
A proof-of-concept system for large scale surveillance, detection and alerts information management (SDAIM) is presented in this paper. Various aspects of building the SDAIM software system for large scale critical infrastructure monitoring and decision support are described. The work is currently developped in the large collaborative ZONeSEC project (***). ZONeSEC specializes in the monitoring of so-called Wide-zones. These are large critical infrastructure which require 24/7 monitoring for safety and security. It involves integrated in situ and remote sensing together with large scale stationary sensor networks, that are supported by cross-border communication. In ZONeSEC, the specific deployed sensors around the critical infrastructure may include: Accelerometers that are mounted on perimeter fences;Underground acoustic sensors;Optical, thermal and hyperspectral video cameras or radar systems mounted on strategic areas or on airborne UAVs for mission exploration. The SDAIM system design supports the ingestion of the various types of sensors platform wide-zones' environmental observations and provide large scale distributed data fusion and reasoning with near-real-time messaging and alerts for critical decision-support. On a functional level, the system design is founded on the JDL/DFIG (Joint Directors of Laboratories/Data Fusion information Group) data and information fusion model. Further, it is technologically underpinned by proven Big Data technologies for distributed data storage and processing as well as on-demand access to intelligent data analytics modules. The SDAIM system development will be piloted and alidated at various selected ZONeSEC project wide-zones [1]. These include water, oil and transnational gas pipelines and motorway conveyed in six European countries.
暂无评论