44,685 research outputs found
Towards the integration of enterprise software: The business manufacturing intelligence
Nowadays, the Information Communication Technology has pervaded literally the companies. In the company circulates an huge amount of information but too much information doesn’t provide any added value. The overload of information exceeds individual processing capacity and slowdowns decision making operations. We must transform the enormous quantity of information in useful knowledge taking in consideration that information becomes obsolete quickly in condition of dynamic market. Companies process this information by specific software for managing, efficiently and effectively, the business processes. In this paper we analyse the myriad of acronyms of software that is used in enterprises with the changes that occurred over the time, from production to decision making until to convergence in an intelligent modular enterprise software, that we named Business Manufacturing Intelligence (BMI), that will manage and support the enterprise in the futurebusiness manufacturing intelligence, enterprise resource planning; business intelligence; management software; automation software; decision making software
An improved approach for automatic process plan generation of complex borings
The authors are grateful for funding provided to this project by the French Ministry of Industry, Dassault Aviation, Dassault Systemes, and F. Vernadat for his review and recommendations.The research concerns automated generation of process plans using knowledge formalization and capitalization. Tools allowing designers to deal with issues and specifications of the machining domain are taken into account. The main objective of the current work is to prevent designers from designing solutions that would be expensive and difficult to machine. Among all available solutions to achieve this goal, two are distinguished: the generative approach and the analogy approach. The generative approach is more adapted to generate the machining plans of parts composed of numerous boring operations in interaction. However, generative systems have two major problems: proposed solutions are often too numerous and are only geometrically but not technologically relevant. In order to overcome these drawbacks, two new concepts of feature and three control algorithms are developed. The paper presents the two new features: the Machining Enabled Geometrical Feature (MEGF) and the Machinable Features (MbF). This development is the result of the separation of the geometrical and the technological data contained in one machining feature. The second objective of the paper is to improve the current Process Ascending Generation (PAG) system with control algorithms in order to limit the combinatorial explosion and disable the generation of unusable or not machinable solutions
Forest resource information system
There are no author-identified significant results in this report
Survey on Additive Manufacturing, Cloud 3D Printing and Services
Cloud Manufacturing (CM) is the concept of using manufacturing resources in a
service oriented way over the Internet. Recent developments in Additive
Manufacturing (AM) are making it possible to utilise resources ad-hoc as
replacement for traditional manufacturing resources in case of spontaneous
problems in the established manufacturing processes. In order to be of use in
these scenarios the AM resources must adhere to a strict principle of
transparency and service composition in adherence to the Cloud Computing (CC)
paradigm. With this review we provide an overview over CM, AM and relevant
domains as well as present the historical development of scientific research in
these fields, starting from 2002. Part of this work is also a meta-review on
the domain to further detail its development and structure
Implementation and Evaluation of a Cooperative Vehicle-to-Pedestrian Safety Application
While the development of Vehicle-to-Vehicle (V2V) safety applications based
on Dedicated Short-Range Communications (DSRC) has been extensively undergoing
standardization for more than a decade, such applications are extremely missing
for Vulnerable Road Users (VRUs). Nonexistence of collaborative systems between
VRUs and vehicles was the main reason for this lack of attention. Recent
developments in Wi-Fi Direct and DSRC-enabled smartphones are changing this
perspective. Leveraging the existing V2V platforms, we propose a new framework
using a DSRC-enabled smartphone to extend safety benefits to VRUs. The
interoperability of applications between vehicles and portable DSRC enabled
devices is achieved through the SAE J2735 Personal Safety Message (PSM).
However, considering the fact that VRU movement dynamics, response times, and
crash scenarios are fundamentally different from vehicles, a specific framework
should be designed for VRU safety applications to study their performance. In
this article, we first propose an end-to-end Vehicle-to-Pedestrian (V2P)
framework to provide situational awareness and hazard detection based on the
most common and injury-prone crash scenarios. The details of our VRU safety
module, including target classification and collision detection algorithms, are
explained next. Furthermore, we propose and evaluate a mitigating solution for
congestion and power consumption issues in such systems. Finally, the whole
system is implemented and analyzed for realistic crash scenarios
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
The design co-ordination framework : key elements for effective product development
This paper proposes a Design Co-ordination Framework (DCF) i.e. a concept for an ideal DC system with the abilities to support co-ordination of various complex aspects of product development. A set of frames, modelling key elements of co-ordination, which reflect the states of design, plans, organisation, allocations, tasks etc. during the design process, has been identified. Each frame is explained and the co-ordination, i.e. the management of the links between these frames, is presented, based upon characteristic DC situations in industry. It is concluded that while the DCF provides a basis for our research efforts into enhancing the product development process there is still considerable work and development required before it can adequately reflect and support Design Co-ordination
Recommended from our members
Use of computer-aided detection (CAD) tools in screening mammography: a multidisciplinary investigation
We summarise a set of analyses and studies conducted to assess the effects of the use of a computer-aided detection (CAD) tool in breast screening. We have used an interdisciplinary approach that combines: (a) statistical analyses inspired by reliability modelling in engineering; (b) experimental studies of decisions of mammography experts using the tool, interpreted in the light of human factors psychology; and (c) ethnographic observations of the use of the tool both in trial conditions and in everyday screening practice. Our investigations have shown patterns of human behaviour and effects of computer-based advice that would not have been revealed by a standard clinical trial approach. For example, we found that the negligible measured effect of CAD could be explained by a range of effects on experts' decisions, beneficial in some cases and detrimental in others. There is some evidence of the latter effects being due to the experts using the computer tool differently from the intentions of the developers. We integrate insights from the different pieces of evidence and highlight their implications for the design, evaluation and deployment of this sort of computer tool
- …