This paper presents a fully autonomous assembly line for custom cubes with two sub-block options (plastic and aluminium). Users can design their cubes through an Android app or website interface. The system retrieves ...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
This paper presents a fully autonomous assembly line for custom cubes with two sub-block options (plastic and aluminium). Users can design their cubes through an Android app or website interface. The system retrieves orders, processes them based on deadlines, and dispenses the required sub-blocks. A quality inspection station with computer vision and machine learning ensures that defect-free parts are used. Cobots handle sub-block transportation and manipulation throughout the assembly process, with a dedicated station for inserting pins when necessary. A digital Shadow model facilitates performance analysis and optimization. Cloud-based platforms manage data, order processing, and remote access. Finally, an Automated Storage and Retrieval system (ASRS) manages cube storage and delivery. This research demonstrates the potential of combining automation, machine learning, and real-time monitoring for efficient custom product assembly. The approach offers applications in various industries and lays the groundwork for future research on expanding customization options and production flow optimization.
This paper presents a Java Graphical User Interface (GUI)-based password management systemdesigned to improve the security and complexity of user passwords. Traditional passwords include only 32 to 128 bits of the AS...
详细信息
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege leve...
详细信息
ISBN:
(纸本)9781665445078
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege levels for accessing shared resources, which must be regulated by an access controlsystem. AKER is a design and verification framework for SoC access control. AKER builds upon the Access control Wrapper (ACW) - a high performance and easy-to-integrate hardware module that dynamically manages access to shared resources. To build an SoC access controlsystem, AKER distributes the ACWs throughout the SoC, wrapping controller IP cores, and configuring the ACWs to perform local access control. To ensure the access controlsystem is functioning correctly and securely, AKER provides a property-driven security verification using MITRE common weakness enumerations. AKER verifies the SoC access control at the IP level to ensure the absence of bugs in the functionalities of the ACW module, at the firmware level to confirm the secure operation of the ACW when integrated with a hardware root-of-trust (HRoT), and at the system level to evaluate security threats due to the interactions among shared resources. The performance, resource usage, and security of access controlsystems implemented through AKER is experimentally evaluated on a Xilinx UltraScale+ programmable SoC, it is integrated with the OpenTitan hardware root-of-trust, and it is used to design an access controlsystem for the OpenPULP multicore architecture.
computeraided realization of Gesar cultural and creative product designsystem based on the interactive algorithm and cyclic graph theory model is studied in the paper. For the designed graph algorithm, an SGP proble...
详细信息
ISBN:
(数字)9781665408370
ISBN:
(纸本)9781665408387;9781665408370
computeraided realization of Gesar cultural and creative product designsystem based on the interactive algorithm and cyclic graph theory model is studied in the paper. For the designed graph algorithm, an SGP problem is constructed to obtain an improved non-inferior solution, and Lagrange multipliers are used to obtain the desired marginal rate of substitution between objective functions. The SGP algorithm can enable decision makers to have a deeper understanding of the decision-making system, ensuring that the solution after each iteration will be more satisfactory to the decision makers than the previous one, and the solution after each iteration is a non-inferior solution. Then, for the systematic optimization, the analysis tools of each discipline have different definition requirements for the design model. Therefore, the integration of analysis program code of each discipline under framework of MDO is still a major task of MDO. Through the experimental analysis, the comparison simulation is conducted to verify the model.
Due to the complexity of industrial site environments and the instability of networks, establishing a data exchange mode with high quality and low bandwidth requirements between on-site devices and the cloud has alway...
详细信息
Massive measurement data continuity and safety guarantee technology plays an important role in the normal development of power businesses. However, the power meter, acquisition terminal, concentrator, and other system...
详细信息
This paper explores the design intent and functional structure of the human resource management information system. Based on specific circumstances, it provides a comprehensive plan for the human resource management i...
详细信息
The proceedings contain 286 papers. The topics discussed include: research on multi beam sounding based on spatial position relationship and backtracking algorithm;a programmable packet scheduling method based on traf...
ISBN:
(纸本)9798350380958
The proceedings contain 286 papers. The topics discussed include: research on multi beam sounding based on spatial position relationship and backtracking algorithm;a programmable packet scheduling method based on traffic rate;method for recognizing intrapulse modulation types of radar signals;design and research of heat shrink tube expansion controlsystem based on PLC and touch screen;anchor-free ranking-based localization optimized Siamese RGB-T object tracking network;research on prediction and analysis of consumer behavior management based on deep learning;modelling and calculation of micro-resistance measurement;research on optimal water level of lakes based on PSO algorithm;research on PID control of BP neural networks based on PSO optimization;and Gray Wolf based algorithm applied to UAV route planning methodology.
In large scientific installations, there are various intelligent monitoring and control terminals, each using a different bus communication protocol. This project involves the system development of an embedded univers...
详细信息
In the context of today's digital production, the quality inspection of printed materials has become a key technology to improve printing efficiency and quality of finished products. Especially with the rapid deve...
详细信息
暂无评论