2,442 research outputs found

    From TLS survey to 3d solid modeling for documentation of built heritage: The case study of porta savonarola in Padua

    Get PDF
    It is a matter of fact that 3D visualisation and proper documentation of cultural objects helps to preserve the history and memories of historic buildings, archaeological sites and cultural landscapes, and supports economic growth by stimulating cultural tourism. Preservation, visualisation and recreation of valuable historical and architectural objects and places has always been a serious challenge for specialists in the field. Today, the rapid developments in the fields of close-range photogrammetry, terrestrial laser scanning (TLS) and computer vision (CV) enable to carry out highly accurate 3D models so as to be extremely effective and intuitive for users who have stringent requirements and high expectations. In this note we present the results of the survey and 3D modeling of an ancient gate, Porta Savonarola, located within the remains of the medieval town walls surrounding the historical city center of Padua, Italy. The work has been undertaken within the framework of the project \u201cWalls Multimedia Museum\u201d (WMM) promoted by the local private association \u201cPadua Walls Committee\u201d. The goal of the project was to develop a prototype of an \u201cextended\u201d virtual museum, spreaded along most interesting locations of the town walls. The survey of the ancient gate was performed with a Leica C10 and P20 terrestrial laser scanners. Once the acquired scans were properly merged together, a solid model was generated from the global point cloud, and plans and elevations were extracted from it for restoration purposes. A short multimedia video was also created for the \u201cWalls Multimedia Museum\u201d, showing both the outer and inner part of the gate. In the paper we will discuss all the steps and challenges addressed to provide the 3D solid model of Porta Savonarola from the TLS data

    Digital methodologies for existing buildings emerging education and training for professionals

    Get PDF
    Processes such as Building Information Modeling and, more generally, those involving the digitization of the built environment whose BIM is one of the possible expressions, are becoming increasingly pervasive in many different practices, from the design activities to the building site and management. Professional skills and working experience have now to be fostered by specific training on new methodologies concerning virtual replicas of existing domains, to explore the possibilities offered by digital interactions with Smart Heritage artifacts. This paper delves into the outcomes from the BIM Master Program held at the University of Pisa since 2016, presenting the results of the application of novel teaching techniques and topics related to the digitization of the built historic environment for the design preservation of Cultural Heritage monuments or sites

    Security Implications of Fog Computing on the Internet of Things

    Full text link
    Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications.Comment: 5 pages, conference paper, to appear in Proceedings of the ICCE 2019, IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11- 13, 2019, Las Vegas, NV, US

    A Distributed-Ledger, Edge-Computing Architecture for Automation and Computer Integration in Semiconductor Manufacturing

    Get PDF
    Contemporary 300mm semiconductor manufacturing systems have highly automated and digitalized cyber-physical integration. They suffer from the profound problems of integrating large, centralized legacy systems with small islands of automation. With the recent advances in disruptive technologies, semiconductor manufacturing has faced dramatic pressures to reengineer its automation and computer integrated systems. This paper proposes a Distributed- Ledger, Edge-Computing Architecture (DLECA) for automation and computer integration in semiconductor manufacturing. Based on distributed ledger and edge computing technologies, DLECA establishes a decentralized software framework where manufacturing data are stored in distributed ledgers and processed locally by executing smart contracts at the edge nodes. We adopt an important topic of automation and computer integration for semiconductor research & development (R&D) operations as the study vehicle to illustrate the operational structure and functionality, applications, and feasibility of the proposed DLECA software framewor

    DIG-MAN: Integration of digital tools into product development and manufacturing education

    Get PDF
    General objectives of PRODEM education. Teaching of product development requires various digital tools. Nowadays, the digital tools usually use computers, which have become a standard element of manufacturing and teaching environments. In this context, an integration of computer-based technologies in manufacturing environments plays the crucial and main role, allowing to enrich, accelerate and integrate different production phases such as product development, design, manufacturing and inspection. Moreover, the digital tools play important role in management of production. According to Wdowik and Ratnayake (2019 paper: Open Access Digital Tool’s Application Potential in Technological Process Planning: SMMEs Perspective, https://doi.org/10.1007/978-3-030-29996-5_36), the digital tools can be divided into several main groups such as: machine tools and technological equipment (MTE), devices (D), internet(intranet)-based tools (I), software (S). The groups are presented in Fig. 1.1. Machine tools and technological equipment group contains all existing machines and devices which are commonly used in manufacturing and inspection phase. The group is used in physical shaping of manufactured products, measurement tasks regarding tools and products, etc. The next group of devices (D) is proposed to separate the newest trends of using mobile and computer-based technologies such as smartphones or tablets and indicate the necessity of increased mobility within production sites. The similar need of separation is in the case of internet(intranet)-based tools which indicate the growing interest in network-based solutions. Hence, D and I groups are proposed in order to underline the significance of mobility and networking. These two groups of the digital tools should also be supported in the nearest future by the use of 5G networks. The last group of software (S) concerns computer software produced for the aims of manufacturing environments. There is also a possibility to assign the defined solutions (e.g. computer programs) to more than one group (e.g. program can be assigned to software and internet-based tools). The main role of tools allocated inside separate groups is to support employees, managers and customers of manufacturing firms focused on abovementioned production phases. The digital tools are being developed in order to increase efficiency of production, quality of manufactured products and accelerate innovation process as well as comfort of work. Nowadays, digital also means mobile. Universities (especially technical), which are focused on higher education and research, have been continuously developing their teaching programmes since the beginning of industry 3.0 era. They need to prepare their alumni for changing environments of manufacturing enterprises and new challenges such as Industry 4.0 era, digitalization, networking, remote work, etc. Most of the teaching environments nowadays, especially those in manufacturing engineering area, are equipped with many digital tools and meet various challenges regarding an adaptation, a maintenance and a final usage of the digital tools. The application of these tools in teaching needs a space, staff and supporting infrastructures. Universities adapt their equipment and infrastructures to local or national needs of enterprises and the teaching content is usually focused on currently used technologies. Furthermore, research activities support teaching process by newly developed innovations. Figure 1.2 presents how different digital tools are used in teaching environments. Teaching environments are divided into four groups: lecture rooms, computer laboratories, manufacturing laboratories and industrial environments. The three groups are characteristic in the case of universities’ infrastructure whilst the fourth one is used for the aims of internships of students or researchers. Nowadays lecture rooms are mainly used for lectures and presentations which require the direct communication and interaction between teachers and students. However, such teaching method could also be replaced by the use of remote teaching (e.g. by the use of e-learning platforms or internet communicators). Unfortunately, remote teaching leads to limited interaction between people. Nonverbal communication is hence limited. Computer laboratories (CLs) usually gather students who solve different problems by the use of software. Most of the CLs enable teachers to display instructions by using projectors. Physical gathering in one room enables verbal and nonverbal communication between teachers and students. Manufacturing laboratories are usually used as the demonstrators of real industrial environments. They are also perfect places for performing of experiments and building the proficiency in using of infrastructure. The role of manufacturing labs can be divided as: • places which demonstrate the real industrial environments, • research sites where new ideas can be developed, improved and tested. Industrial environment has a crucial role in teaching. It enables an enriched student experience by providing real industrial challenges and problems

    A PBeL for training non-experts in mobile-based photogrammetry and accurate 3-D recording of small-size/non-complex objects

    Get PDF
    The high level of automation, user-friendliness and cost-effectiveness of photogrammetry have contributed significantly to its popularisation among amateur users in recent years. Paradoxically, this situation poses challenges when relying on the accuracy of the derived 3-D products requiring control procedures to be implemented. In this context, we present a case study of the D3Mobile project: a fully online competition for participants worldwide funded by the International Society of Photogrammetry and Remote Sensing (ISPRS). The aim is for participants to obtain reality-based 3-D models using their own mobile phones and to critically examine the metric accuracy that hides behind the beguiling realism of photogrammetry. The relative precision of the former participants’ models reached values around 1:2,000, proportionally to the object size. These results provide an idea of the current level of development of photogrammetry and the potential it offers for any kind of user after proper capacity building and trainingS

    D8.6 OPTIMAI commercialization and exploitation strategy

    Get PDF
    Deliverable D8.6 OPTIMAI commercialization and exploitation strategy 1 st version is the first version of the OPTIMAI Exploitation Plan. Exploitation aims at ensuring that OPTIMAI becomes sustainable well after the conclusion of the research project period so as to create impact. OPTIMAI intends to develop an industry environment that will optimize production, reducing production line scrap and production time, as well as improving the quality of the products through the use of a variety of technological solutions, such as Smart Instrumentation of sensors network at the shop floor, Metrology, Artificial Intelligence (AI), Digital Twins, Blockchain, and Decision Support via Augmented Reality (AR) interfaces. The innovative aspects: Decision Support Framework for Timely Notifications, Secure and adaptive multi-sensorial network and fog computing framework, Blockchain-enabled ecosystem for securing data exchange, Intelligent Marketplace for AI sharing and scrap re-use, Digital Twin for Simulation and Forecasting, Embedded Cybersecurity for IoT services, On-the-fly reconfiguration of production equipment allows businesses to reconsider quality management to eliminate faults, increase productivity, and reduce scrap. The OPTIMAI exploitation strategy has been drafted and it consists of three phases: Initial Phase, Mid Phase and Final Phase where different activities are carried out. The aim of the Initial phase (M1 to M12), reported in this deliverable, is to have an initial results' definition for OPTIMAI and the setup of the structures to be used during the project lifecycle. In this phase, also each partner's Individual Exploitation commitments and intentions are drafted, and a first analysis of the joint exploitation strategies is being presented. The next steps, leveraging on the outcomes of the preliminary market analysis, will be to update the Key Exploitable Results with a focus on their market value and business potential and to consolidate the IPR Assessment and set up a concrete Exploitation Plan. The result of the next period of activities will be reported in D8.7 OPTIMAI commercialization and exploitation strategy - 2nd version due at month 18 (June 2022

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields
    • …
    corecore