3,317 research outputs found

    Server-Based Desktop Virtualization

    Get PDF
    Virtualization can be accomplished at different layers in the computational stack and with different goals (servers, desktops, applications, storage and network). This research focuses on server-based desktop virtualization. According to the Gartner group, the main business drivers for adopting desktop virtualization are: application compatibility, business continuity, security and compliance, mobility and improved productivity [15]. Despite these business drivers, desktop virtualization has not been widely adopted. According to a survey conducted by Matrix42, only 5% of desktop computers are virtualized [37]. The research deals with the challenges preventing the wider adoption of server-based desktop virtualization while focusing on two of the main virtualization architectures: session-based desktop virtualization (SBDV) and virtual desktop infrastructure (VDI). The first chapter introduces some of the challenges faced by large organizations in their efforts to create a cost effective and manageable desktop computing environment. The second chapter discusses two of the main server-based desktop virtualizations (VDI and SBDV), illustrating some of the advantages and disadvantages in these different architectures. The third chapter focuses on some of the technical challenges and provides recommendations regarding server-based desktop virtualization. In the fourth chapter, measurements are conducted for the utilization and performance of SBDV on different 3 user profiles (light, heavy and multimedia). Data and results collected from desktop assessment and lab are used to formulate baselines and metrics for capacity planning. According to the conducted measurements, it is concluded that light and heavy profiles can be virtualized using SBDV, while for multimedia profiles, additional capacity planning and resource allocation are required. Multimedia profiles can be virtualized with VDI considering client-side rendering to avoid network bandwidth congestion. While the research focuses on VDI and SBDV, it highlights few points related to client access devices (CADs). CADs are one of the main components in the desktop virtualization stack (OS virtualization, session virtualization, application virtualization, connection broker, CADs and user data and profiles). The latter chapter of the research focuses on conclusions and future work toward greater levels of adoption of VDI and SBDV

    Design methodology for production systems retrofit in SMEs

    Get PDF
    Investment in the productive systems of small and medium-sized enterprises (SMEs) in the manufacturing sector is usually quite limited. For this reason, normal practice is to apply minor developments internally or upgrade equipment as it becomes obsolete to increase their productive capacity and competitiveness at a lower cost. However, the work team, mostly made up of engineers, does not usually have experience in the use of design methodologies but also they are often familiar with the functioning of various design and quality-management tools. This paper presents a clear and simple design methodology that facilitates the development of adaptations to items of equipment that might be considered one-off products. It includes a selection of design tools that are, according to the literature on the subject, the most common and best-known among engineers, and which are also best-suited to the environment of an SME. The design methodology was validated experimentally with the upgrading of a gear-rolling tester installed on the premises of an SME in the sector. The recommended techniques and tools were satisfactory applied opening the possibilities for further application of the methodology in similar machine''s upgrades in the future

    Top-Down & Bottom-Up Approaches to Robot Design

    Get PDF
    This thesis presents a study of different engineering design methodologies and demonstrates their effectiveness and limitations in actual robot designs. Some of these methods were blended together with focus on providing an easily interpreted project design flow while implementing more bottom-up, or feedback, elements into the design methodology. Typically design methods are learned through experience, and design taught in academia aims to shape and formalize previous experience. Usually, inexperienced engineers are taught approaches resembling the Verein Deutscher Ingenieure (VDI) 2221 process. This method presented by the Association of German Engineers in 2006 is regarded as the general system design process. This introductory process is largely left open to interpretation, and it is often unclear when to implement feedback in the design process. The objective of this thesis is to investigate the roles of top-down and bottom-up processes, and how to integrate them in the robot design methodology. The proposed approach utilizes several components from existing design methods. There are three main conditional loops within the proposed approach. The first loop focuses on defining the problem in a top-down manner through logical decomposition, defining technical requirements, researching solutions, and conducting a trade study. These four steps are done iteratively until reaching the bottom of the system, the most primitive components. This is followed by a modeling and analysis loop. This works from the bottom to the top of the design in preparation for manufacturing and validation. The final loop of the proposed approach focuses on validation and verification. The testing and manufacturing involved allows for alterations to the design to fulfill the original technical requirements. These three loops occur until a proof of concept is achieved. The proposed method is intended to be applied iteratively. The first pass of the method results in a proof of concept, while the second results in a preproduction prototype, and the third in a production model. This assembly of design elements provides a project flow that leaves little to be interpreted and is suitable for small design teams while still flexible enough to be applied to diverse robotics projects. This thesis provides three case studies analyzing the application of the hybrid design approach mentioned above to robotic system development. The first study showcases a complicated system design with a small development team. The second case is of simpler construction with a smaller developer team. This simpler case better demonstrates the benefits of this hybrid approach in robotic system development due to the comparatively higher speed at which the system matures. The third case study shows how this same proposed approach can be applied to the design of a bottom-up controlled swarm. These case studies are for future designers to reference as examples of the hybrid design methodology in application, and what can happen when there is a lack of feedback in design. This proposed hybrid design method can encourage design practices in new engineers that translate better to industrial applications, and therefore encourage faster integration of new engineers into established design engineering practices

    Improving The Planning Quality Through Model-Based Factory Planning In BIM

    Get PDF
    In recent years, Building Information Modelling (BIM), which originated in the construction industry, is increasingly finding its way into the planning of factories and production environments. In the scientific assessment of this change and possible future scenarios regarding BIM, the research mostly focuses on the planning process and the influence that the use of BIM has on it. However, improving the outcome of a factory planning project enjoys priority over optimizing the planning process itself regardless of whether BIM is being used or not. This paper therefore aims to build a bridge from a process-side view to the planning result. The concept of BIM is to be explained from a technical point of view establishing a reference to the concept of synergetic factory planning. For this purpose, the process view and the spatial view will be examined and the BIM model will be characterized with regard to different levels of development in the planning process. The goal is to show how the use of BIM in factory planning can ultimately improve the planning result. For this purpose, the factory targets are considered and their optimizability through the use of BIM is investigated

    Optimal allocation of battery energy storage systems to enhance system performance and reliability in unbalanced distribution networks

    Get PDF
    The continuously increasing renewable distributed generation (DG) penetration rate significantly reduces environmental pollution and power generation cost and satisfies society’s rapid growth in electricity demand. Nevertheless, high penetration of renewable DGs, such as wind power and photovoltaics (PV), might deteriorate the system’s efficiency and reliability due to its intermittent and stochastic natures. Introducing battery energy storage systems (BESSs) to the distribution system provides a practical method to compensate for the above deficiency since it can deliver and absorb power when needed. Hence, it is important to determine the optimal allocation of BESS to achieve maximum assistance in the grid. This study proposes an optimal BESS allocation methodology to improve reliability and economics in unbalanced distribution systems. The optimal BESS allocation problem is solved by simultaneously minimizing the cost of energy interruption, expected energy not supplied, power loss, line loading, voltage deviation, and BESS cost. The proposed technique is implemented and analyzed on a high renewable DG penetrated unbalanced IEEE-33 bus network using DIgSILENT PowerFactory software (version 2020 SP2A). An enhanced grey wolf optimization (EGWO) algorithm is developed to optimize BESS location and size according to the selected objective function. The simulation results show that the proposed optimal BESS optimization technique significantly improves the economics and reliability in unbalanced distribution systems and the EGWO outperforms the gray wolf optimization (GWO) and particle swarm optimization (PSO) algorithms

    Strategically Addressing the Latest Challenges of Workplace Mobility to Meet the Increasing Mobile Usage Demands

    Get PDF
    During this post-PC era, many organizations are embracing the concept of IT consumerization/ Bring-Your-Own Device (BYOD) in their workplace. BYOD is a strategy that enables employees to utilize their personally-owned mobile devices, such as smart phones, tablets, laptops, and netbooks, to connect to the corporate network and access enterprise data. It is estimated that employees will bring two to four Internet-capable devices to work for personal and professional activities. From increased employee satisfaction and productivity to lower IT equipment and operational expenditures, companies have recognized that mobile devices are reasonably essential to their own success. However, many organizations are facing significant challenges with the explosion of mobile devices being used today along with provisioning the appropriate supporting infrastructure due to the unprecedented demands on the wireless and network infrastructures. For example, there is not only a growth in the number of wirelessly connected devices but the amount of bandwidth being consumed on the enterprise networks as well which is furthermore driven by increased usage of video and enterprise applications. Managing mobility and storage along with securing corporate assets have become difficult tasks for IT professionals as many organizations underestimate the potential security and privacy risks of using wireless devices to access organizational resources and data. Therefore, to address the needs and requirements of a new mobile workforce, organizations must involve key members from the Information Technology (IT), Human Resources (HR) and various business units to evaluate the existing and emerging issues and risks posed by BYOD. Then a mobile strategy should be developed by taking into consideration the enterprise objectives to ensure it aligns with the overall organizational strategy. There are various solutions available to address the needs and demands of an organization, such as Distributed Intelligence Architecture, network optimization, monitoring tools, unified management and security platforms, and other security measures. By implementing a suitable mobile strategy, organizations can ensure their particular enterprise network and wireless architecture is designed for highly scalability, performance and reliability. They must also evaluate their existing policies and procedures to ensure appropriate security and privacy measures are in place to address the increasing mobile usage demands and potential liability risks. By taking these factors into consideration, our team has analyzed the current BYOD issues for Educational Testing Service (ETS), which is a non-profit organization based in Princeton, New Jersey. Our findings have revealed a few major technical concerns relating to inadequate network and wireless infrastructure and the lack of a unified management and security platform. Thus, the team has recommended for ETS to implement Distributed Intelligence Architecture, network optimization and Enterprise Mobility Management (EMM) to address and resolve their current issues and risks. In conclusion, companies are beginning to seize this transition in order to become competitive and productive in the workplace; however the unprecedented demands on the corporate network and risk to data security are critical aspects that need to be evaluated on an on-going basis. With this analysis, organizations can review, evaluate and implement the proposed solutions and best practices to address the most common BYOD-related issues that companies are facing these days. However, organizations should continually research the latest technologies that may be available and implement solutions that specifically meet their issues
    corecore