This paper presents a fully autonomous assembly line for custom cubes with two sub-block options (plastic and aluminium). Users can design their cubes through an Android app or website interface. The system retrieves ...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
This paper presents a fully autonomous assembly line for custom cubes with two sub-block options (plastic and aluminium). Users can design their cubes through an Android app or website interface. The system retrieves orders, processes them based on deadlines, and dispenses the required sub-blocks. A quality inspection station with computer vision and machine learning ensures that defect-free parts are used. Cobots handle sub-block transportation and manipulation throughout the assembly process, with a dedicated station for inserting pins when necessary. A digital Shadow model facilitates performance analysis and optimization. Cloud-based platforms manage data, order processing, and remote access. Finally, an Automated Storage and Retrieval system (ASRS) manages cube storage and delivery. This research demonstrates the potential of combining automation, machine learning, and real-time monitoring for efficient custom product assembly. The approach offers applications in various industries and lays the groundwork for future research on expanding customization options and production flow optimization.
Massive measurement data continuity and safety guarantee technology plays an important role in the normal development of power businesses. However, the power meter, acquisition terminal, concentrator, and other system...
详细信息
This work presents a study on the modelling and control of a flexible link rotary servo. The lab-scale apparatus, consisting of a flexible link attached to the Rotary Servo Work Station, is analyzed using mathematical...
详细信息
This paper presents a Java Graphical User Interface (GUI)-based password management systemdesigned to improve the security and complexity of user passwords. Traditional passwords include only 32 to 128 bits of the AS...
详细信息
computeraided realization of Gesar cultural and creative product designsystem based on the interactive algorithm and cyclic graph theory model is studied in the paper. For the designed graph algorithm, an SGP proble...
详细信息
ISBN:
(数字)9781665408370
ISBN:
(纸本)9781665408387;9781665408370
computeraided realization of Gesar cultural and creative product designsystem based on the interactive algorithm and cyclic graph theory model is studied in the paper. For the designed graph algorithm, an SGP problem is constructed to obtain an improved non-inferior solution, and Lagrange multipliers are used to obtain the desired marginal rate of substitution between objective functions. The SGP algorithm can enable decision makers to have a deeper understanding of the decision-making system, ensuring that the solution after each iteration will be more satisfactory to the decision makers than the previous one, and the solution after each iteration is a non-inferior solution. Then, for the systematic optimization, the analysis tools of each discipline have different definition requirements for the design model. Therefore, the integration of analysis program code of each discipline under framework of MDO is still a major task of MDO. Through the experimental analysis, the comparison simulation is conducted to verify the model.
Due to the complexity of industrial site environments and the instability of networks, establishing a data exchange mode with high quality and low bandwidth requirements between on-site devices and the cloud has alway...
详细信息
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege leve...
详细信息
ISBN:
(纸本)9781665445078
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege levels for accessing shared resources, which must be regulated by an access controlsystem. AKER is a design and verification framework for SoC access control. AKER builds upon the Access control Wrapper (ACW) - a high performance and easy-to-integrate hardware module that dynamically manages access to shared resources. To build an SoC access controlsystem, AKER distributes the ACWs throughout the SoC, wrapping controller IP cores, and configuring the ACWs to perform local access control. To ensure the access controlsystem is functioning correctly and securely, AKER provides a property-driven security verification using MITRE common weakness enumerations. AKER verifies the SoC access control at the IP level to ensure the absence of bugs in the functionalities of the ACW module, at the firmware level to confirm the secure operation of the ACW when integrated with a hardware root-of-trust (HRoT), and at the system level to evaluate security threats due to the interactions among shared resources. The performance, resource usage, and security of access controlsystems implemented through AKER is experimentally evaluated on a Xilinx UltraScale+ programmable SoC, it is integrated with the OpenTitan hardware root-of-trust, and it is used to design an access controlsystem for the OpenPULP multicore architecture.
Unmanned aerial vehicles (UAVs) are widely used as relay platforms to assist in maritime wireless communications. However, due to the open channel of UAV communications, security issue needs to be paid extra attention...
详细信息
This paper explores the design intent and functional structure of the human resource management information system. Based on specific circumstances, it provides a comprehensive plan for the human resource management i...
详细信息
Digital twins with a skill-based description are increasingly finding their way into industrial production. Their models link properties of a product with available process capabilities that are realized by resource s...
详细信息
暂无评论