8,495 research outputs found

    Gaming techniques and the product development process : commonalities and cross-applications

    Get PDF
    The use of computer-based tools is now firmly embedded within the product development process, providing a wide range of uses from visualisation to analysis. However, the specialisation required to make effective use of these tools has led to the compartmentalisation of expertise in design teams, resulting in communication problems between individual members. This paper therefore considers how computer gaming techniques and strategies could be used to enhance communication and group design activities throughout the product design process

    Survey on Additive Manufacturing, Cloud 3D Printing and Services

    Full text link
    Cloud Manufacturing (CM) is the concept of using manufacturing resources in a service oriented way over the Internet. Recent developments in Additive Manufacturing (AM) are making it possible to utilise resources ad-hoc as replacement for traditional manufacturing resources in case of spontaneous problems in the established manufacturing processes. In order to be of use in these scenarios the AM resources must adhere to a strict principle of transparency and service composition in adherence to the Cloud Computing (CC) paradigm. With this review we provide an overview over CM, AM and relevant domains as well as present the historical development of scientific research in these fields, starting from 2002. Part of this work is also a meta-review on the domain to further detail its development and structure

    Outils pour l’identification des paramùtres de raideur des robots à l’aide d’un logiciel de CAO

    Get PDF
    This report proposes a CAD-based approach for identification of the elasto-static parameters of the robotic manipulators. The main contributions are in the areas of virtual experiment planning and algorithmic data processing, which allows to obtain the stiffness matrix with required accuracy. In contrast to previous works, the developed technique operates with the deflection field produced by virtual experiments in a CAD environment. The proposed approach provides high identification accuracy (about 0.1% for the stiffness matrix element) and is able to take into account the real shape of the link, coupling between rotational/translational deflections and joint particularities. To compute the stiffness matrix, the numerical technique has been developed, and some recommendations for optimal settings of the virtual experiments are given. In order to minimize the identification errors, the statistical data processing technique was applied. The advantages of the developed approach have been confirmed by case studies dealing with the links of parallel manipulator of the Orthoglide family, for which the identification errors have been reduced to 0.1%ANR COROUSS

    The review of heterogeneous design frameworks/Platforms for digital systems embedded in FPGAs and SoCs

    Get PDF
    Systems-on-a-chip integrate specialized modules to provide well-defined functionality. In order to guarantee its efficiency, designersare careful to choose high-level electronic components. In particular,FPGAs (field-programmable gate array) have demonstrated theirability to meet the requirements of emerging technology. However,traditional design methods cannot keep up with the speed andefficiency imposed by the embedded systems industry, so severalframeworks have been developed to simplify the design process of anelectronic system, from its modeling to its physical implementation.This paper illustrates some of them and presents a comparative studybetween them. Indeed, we have selected design methods of SoC(ESP4ML and HLS4ML, OpenESP, LiteX, RubyRTL, PyMTL,SysPy, PyRTL, DSSoC) and NoC networks on OCN chip (PyOCN)and in general on FPGA (PRGA, OpenFPGA, AnyHLS, PYNQ, andPyLog).The objective of this article is to analyze each tool at several levelsand to discuss the benefit of each in the scientific community. Wewill analyze several aspects constituting the architecture and thestructure of the platforms to make a comparative study of thehardware and software design flows of digital systems.

    Critical appraisal of product development expertise in Irish SMEs

    Get PDF
    The focus of this research was on the product development expertise of Irish SMEs. In particular, SMEs developing physical products (a physical product is defined as an electronic, medical device, plastic or general engineering product). A survey of Irish SMEs was conducted across industry sectors developing physical products with the objective of understanding how indigenous SMEs and therefore Ireland is progressing towards becoming a knowledge economy. SME characteristics (customers and markets, organisational structures, systems, processes and procedures, human and financial resources, culture and behaviour) were researched and used to understand the issues SMEs have with product development (PD research is mostly considered from the perspective of large companies). In relation to product development: strategy, innovation and learning, strategic techniques, organisational structure, product development process design, types of product development processes, tools and methodologies, technology, intellectual property, change management, marketing and branding and performance measurement were all examined. Survey items (variables) were identified from the literature review and used to create a survey designed based on ‘best practice’ PD and SME characteristics. This survey was conducted based on identified survey best practice in order to increase response rate and went through two pre-tests and a pilot before the final study. Descriptive analysis, reliability/consistency analysis and regression analysis were conducted on the constructs of product development. Specific relationships identified in the literature review were examined. The results of this analysis revealed that Irish SMEs are operating in a ‘Knowledge Based Development’ or learning environment. They carry out many of the techniques associated with various tools and methodologies but reported no use of these T&M which could aid their approach. There is a high use of technology, especially CAD and technology is mostly developed within the product development process. There was a high use of Cross Functional Teams and in general strategy and fuzzy front end/voice of the customer usage was carried out well. There were no issues with change management and in relation to intellectual property the use of an IP policy, strategy and portfolios was low. Generally, Irish SMEs are ready to reach the next stage of company evolution by linking ‘organisational (innovation) processes’

    Intrusion Detection for Cyber-Physical Attacks in Cyber-Manufacturing System

    Get PDF
    In the vision of Cyber-Manufacturing System (CMS) , the physical components such as products, machines, and tools are connected, identifiable and can communicate via the industrial network and the Internet. This integration of connectivity enables manufacturing systems access to computational resources, such as cloud computing, digital twin, and blockchain. The connected manufacturing systems are expected to be more efficient, sustainable and cost-effective. However, the extensive connectivity also increases the vulnerability of physical components. The attack surface of a connected manufacturing environment is greatly enlarged. Machines, products and tools could be targeted by cyber-physical attacks via the network. Among many emerging security concerns, this research focuses on the intrusion detection of cyber-physical attacks. The Intrusion Detection System (IDS) is used to monitor cyber-attacks in the computer security domain. For cyber-physical attacks, however, there is limited work. Currently, the IDS cannot effectively address cyber-physical attacks in manufacturing system: (i) the IDS takes time to reveal true alarms, sometimes over months; (ii) manufacturing production life-cycle is shorter than the detection period, which can cause physical consequences such as defective products and equipment damage; (iii) the increasing complexity of network will also make the detection period even longer. This gap leaves the cyber-physical attacks in manufacturing to cause issues like over-wearing, breakage, defects or any other changes that the original design didn’t intend. A review on the history of cyber-physical attacks, and available detection methods are presented. The detection methods are reviewed in terms of intrusion detection algorithms, and alert correlation methods. The attacks are further broken down into a taxonomy covering four dimensions with over thirty attack scenarios to comprehensively study and simulate cyber-physical attacks. A new intrusion detection and correlation method was proposed to address the cyber-physical attacks in CMS. The detection method incorporates IDS software in cyber domain and machine learning analysis in physical domain. The correlation relies on a new similarity-based cyber-physical alert correlation method. Four experimental case studies were used to validate the proposed method. Each case study focused on different aspects of correlation method performance. The experiments were conducted on a security-oriented manufacturing testbed established for this research at Syracuse University. The results showed the proposed intrusion detection and alert correlation method can effectively disclose unknown attack, known attack and attack interference that causes false alarms. In case study one, the alarm reduction rate reached 99.1%, with improvement of detection accuracy from 49.6% to 100%. The case studies also proved the proposed method can mitigate false alarms, detect attacks on multiple machines, and attacks from the supply chain. This work contributes to the security domain in cyber-physical manufacturing systems, with the focus on intrusion detection. The dataset collected during the experiments has been shared with the research community. The alert correlation methodology also contributes to cyber-physical systems, such as smart grid and connected vehicles, which requires enhanced security protection in today’s connected world
    • 

    corecore