44,685 research outputs found

    Towards the integration of enterprise software: The business manufacturing intelligence

    Get PDF
    Nowadays, the Information Communication Technology has pervaded literally the companies. In the company circulates an huge amount of information but too much information doesn’t provide any added value. The overload of information exceeds individual processing capacity and slowdowns decision making operations. We must transform the enormous quantity of information in useful knowledge taking in consideration that information becomes obsolete quickly in condition of dynamic market. Companies process this information by specific software for managing, efficiently and effectively, the business processes. In this paper we analyse the myriad of acronyms of software that is used in enterprises with the changes that occurred over the time, from production to decision making until to convergence in an intelligent modular enterprise software, that we named Business Manufacturing Intelligence (BMI), that will manage and support the enterprise in the futurebusiness manufacturing intelligence, enterprise resource planning; business intelligence; management software; automation software; decision making software

    An improved approach for automatic process plan generation of complex borings

    Get PDF
    The authors are grateful for funding provided to this project by the French Ministry of Industry, Dassault Aviation, Dassault Systemes, and F. Vernadat for his review and recommendations.The research concerns automated generation of process plans using knowledge formalization and capitalization. Tools allowing designers to deal with issues and specifications of the machining domain are taken into account. The main objective of the current work is to prevent designers from designing solutions that would be expensive and difficult to machine. Among all available solutions to achieve this goal, two are distinguished: the generative approach and the analogy approach. The generative approach is more adapted to generate the machining plans of parts composed of numerous boring operations in interaction. However, generative systems have two major problems: proposed solutions are often too numerous and are only geometrically but not technologically relevant. In order to overcome these drawbacks, two new concepts of feature and three control algorithms are developed. The paper presents the two new features: the Machining Enabled Geometrical Feature (MEGF) and the Machinable Features (MbF). This development is the result of the separation of the geometrical and the technological data contained in one machining feature. The second objective of the paper is to improve the current Process Ascending Generation (PAG) system with control algorithms in order to limit the combinatorial explosion and disable the generation of unusable or not machinable solutions

    Forest resource information system

    Get PDF
    There are no author-identified significant results in this report

    Survey on Additive Manufacturing, Cloud 3D Printing and Services

    Full text link
    Cloud Manufacturing (CM) is the concept of using manufacturing resources in a service oriented way over the Internet. Recent developments in Additive Manufacturing (AM) are making it possible to utilise resources ad-hoc as replacement for traditional manufacturing resources in case of spontaneous problems in the established manufacturing processes. In order to be of use in these scenarios the AM resources must adhere to a strict principle of transparency and service composition in adherence to the Cloud Computing (CC) paradigm. With this review we provide an overview over CM, AM and relevant domains as well as present the historical development of scientific research in these fields, starting from 2002. Part of this work is also a meta-review on the domain to further detail its development and structure

    Implementation and Evaluation of a Cooperative Vehicle-to-Pedestrian Safety Application

    Full text link
    While the development of Vehicle-to-Vehicle (V2V) safety applications based on Dedicated Short-Range Communications (DSRC) has been extensively undergoing standardization for more than a decade, such applications are extremely missing for Vulnerable Road Users (VRUs). Nonexistence of collaborative systems between VRUs and vehicles was the main reason for this lack of attention. Recent developments in Wi-Fi Direct and DSRC-enabled smartphones are changing this perspective. Leveraging the existing V2V platforms, we propose a new framework using a DSRC-enabled smartphone to extend safety benefits to VRUs. The interoperability of applications between vehicles and portable DSRC enabled devices is achieved through the SAE J2735 Personal Safety Message (PSM). However, considering the fact that VRU movement dynamics, response times, and crash scenarios are fundamentally different from vehicles, a specific framework should be designed for VRU safety applications to study their performance. In this article, we first propose an end-to-end Vehicle-to-Pedestrian (V2P) framework to provide situational awareness and hazard detection based on the most common and injury-prone crash scenarios. The details of our VRU safety module, including target classification and collision detection algorithms, are explained next. Furthermore, we propose and evaluate a mitigating solution for congestion and power consumption issues in such systems. Finally, the whole system is implemented and analyzed for realistic crash scenarios

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    The design co-ordination framework : key elements for effective product development

    Get PDF
    This paper proposes a Design Co-ordination Framework (DCF) i.e. a concept for an ideal DC system with the abilities to support co-ordination of various complex aspects of product development. A set of frames, modelling key elements of co-ordination, which reflect the states of design, plans, organisation, allocations, tasks etc. during the design process, has been identified. Each frame is explained and the co-ordination, i.e. the management of the links between these frames, is presented, based upon characteristic DC situations in industry. It is concluded that while the DCF provides a basis for our research efforts into enhancing the product development process there is still considerable work and development required before it can adequately reflect and support Design Co-ordination
    corecore