40,572 research outputs found

    Deriving a systematic approach to changeable manufacturing system design

    Get PDF
    It has long been argued that Factories are long life and complex products. The complexity of designing factories, and their underlying manufacturing systems, is further amplified when dealing with continuously changing customer demands. At the same time, due to research fragmentation, little if any scientific explanations are available supporting and exploiting the paradigm that "factories are products". In order to address this weakness, this paper presents research results arising from a comparative analysis of systematic "product design" and "manufacturing system design" approaches. The contribution emerging from this research is an integrated systematic design approach to changeable manufacturing systems, based on scientific concepts founded upon product design theories, and is explained through a case study in the paper. This research is part of collaboration between the CERU University of Malta and IAO Fraunhofer aimed at developing a digital decision support tool for planning changeable manufacturing systems.peer-reviewe

    Integrity protection for code-on-demand mobile agents in e-commerce

    Get PDF
    The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection

    A modern vision of simulation modelling in mining and near mining activity

    Get PDF
    The paper represents the creation of the software simulation system, which reproduce the basic processes of mining and near production. It presents the consideration of such systems for both traditional and non-traditional mineral extraction systems. The principles of using computer recognition of processes are also presented in other processes of carbon-containing raw materials transition, as well as power production and waste utilization of mining production. These systems considerably expand the manageability of a rather complicated mining enterprise. The main purpose of such research is the simulation reproduction of all technological processors associated with the activity of mining enterprises on the display of the dispatch center. For this purpose, is used so-called UML-diagrams, which allows to simulate mining and near mining processes. Results of this investigation were included to the Roman Dychkovskyi thesis of the scientific degree of the Doctor of the Technique Sciences “Scientific Principles of Technologies Combination for Coal Mining in Weakly Metamorphoses Rockmass”

    Video foreground detection based on symmetric alpha-stable mixture models.

    Get PDF
    Background subtraction (BS) is an efficient technique for detecting moving objects in video sequences. A simple BS process involves building a model of the background and extracting regions of the foreground (moving objects) with the assumptions that the camera remains stationary and there exist no movements in the background. These assumptions restrict the applicability of BS methods to real-time object detection in video. In this paper, we propose an extended cluster BS technique with a mixture of symmetric alpha stable (SS) distributions. An on-line self-adaptive mechanism is presented that allows automated estimation of the model parameters using the log moment method. Results over real video sequences from indoor and outdoor environments, with data from static and moving video cameras are presented. The SS mixture model is shown to improve the detection performance compared with a cluster BS method using a Gaussian mixture model and the method of Li et al. [11]

    Coordination Contracts as Connectors in Component-Based Development

    Get PDF
    Several proposals for component-based development methods have started to appear. However, the emphasis is still very much on the development of components as opposed to the development with components. The main focus is on how to generate ideal reusable components not on how to plug existing components and specify their interactions and connections. The concept of a coordination contract (Andrade and Fiadeiro 1999; Andrade and Fiadeiro 2001; Andrade, Fiadeiro et al. 2001) has been proposed to specify a mechanism of interaction between objects based on the separation between structure, what is stable, and interaction, what is changeable. This separation supports better any change of requirements, as contracts can be replaced, added or removed dynamically, i.e. in run-time, without having to interfere with the components that they coordinate. A coordination contract corresponds to an expressive architectural connector that can be used to plug existing components. In this paper we integrate the concept of a coordination contract with component-based development and show how coordination contracts can be used to specify the connectors between components
    corecore