40,572 research outputs found
Deriving a systematic approach to changeable manufacturing system design
It has long been argued that Factories are long life and complex products. The complexity of designing factories, and their underlying manufacturing systems, is further amplified when dealing with continuously changing customer demands. At the same time, due to research fragmentation, little if any scientific explanations are available supporting and exploiting the paradigm that "factories are products". In order to address this weakness, this paper presents research results arising from a comparative analysis of systematic "product design" and "manufacturing system design" approaches. The contribution emerging from this research is an integrated systematic design approach to changeable manufacturing systems, based on scientific concepts founded upon product design theories, and is explained through a case study in the paper. This research is part of collaboration between the CERU University of Malta and IAO Fraunhofer aimed at developing a digital decision support tool for planning changeable manufacturing systems.peer-reviewe
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
A modern vision of simulation modelling in mining and near mining activity
The paper represents the creation of the software simulation
system, which reproduce the basic processes of mining and near
production. It presents the consideration of such systems for both
traditional and non-traditional mineral extraction systems. The principles
of using computer recognition of processes are also presented in other
processes of carbon-containing raw materials transition, as well as power
production and waste utilization of mining production. These systems
considerably expand the manageability of a rather complicated mining
enterprise. The main purpose of such research is the simulation
reproduction of all technological processors associated with the activity of
mining enterprises on the display of the dispatch center. For this purpose,
is used so-called UML-diagrams, which allows to simulate mining and
near mining processes. Results of this investigation were included to the
Roman Dychkovskyi thesis of the scientific degree of the Doctor of the
Technique Sciences “Scientific Principles of Technologies Combination
for Coal Mining in Weakly Metamorphoses Rockmass”
Video foreground detection based on symmetric alpha-stable mixture models.
Background subtraction (BS) is an efficient technique for detecting moving objects in video sequences. A simple BS process involves building a model of the background and extracting regions of the foreground (moving objects) with the assumptions that the camera remains stationary and there exist no movements in the background. These assumptions restrict the applicability of BS methods to real-time object detection in video. In this paper, we propose an extended cluster BS technique with a mixture of symmetric alpha stable (SS) distributions. An on-line self-adaptive mechanism is presented that allows automated estimation of the model parameters using the log moment method. Results over real video sequences from indoor and outdoor environments, with data from static and moving video cameras are presented. The SS mixture model is shown to improve the detection performance compared with a cluster BS method using a Gaussian mixture model and the method of Li et al. [11]
Coordination Contracts as Connectors in Component-Based Development
Several proposals for component-based development
methods have started to appear. However, the emphasis is
still very much on the development of components as
opposed to the development with components. The main
focus is on how to generate ideal reusable components not
on how to plug existing components and specify their
interactions and connections.
The concept of a coordination contract (Andrade and
Fiadeiro 1999; Andrade and Fiadeiro 2001; Andrade,
Fiadeiro et al. 2001) has been proposed to specify a
mechanism of interaction between objects based on the
separation between structure, what is stable, and
interaction, what is changeable. This separation supports
better any change of requirements, as contracts can be
replaced, added or removed dynamically, i.e. in run-time,
without having to interfere with the components that they
coordinate. A coordination contract corresponds to an
expressive architectural connector that can be used to plug
existing components.
In this paper we integrate the concept of a coordination
contract with component-based development and show
how coordination contracts can be used to specify the
connectors between components
- …