164 research outputs found

    Reference Models for Digital Manufacturing Platforms

    Full text link
    [EN] This paper presents an integrated reference model for digital manufacturing platforms, based on cutting edge reference models for the Industrial Internet of Things (IIoT) systems. Digital manufacturing platforms use IIoT systems in combination with other added-value services to support manufacturing processes at different levels (e.g., design, engineering, operations planning, and execution). Digital manufacturing platforms form complex multi-sided ecosystems, involving different stakeholders ranging from supply chain collaborators to Information Technology (IT) providers. This research analyses prominent reference models for IIoT systems to align the definitions they contain and determine to what extent they are complementary and applicable to digital manufacturing platforms. Based on this analysis, the Industrial Internet Integrated Reference Model (I3RM) for digital manufacturing platforms is presented, together with general recommendations that can be applied to the architectural definition of any digital manufacturing platform.This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 825631 and from the Operational Program of the European Regional Development Fund (ERDF) of the Valencian Community 2014-2020 IDIFEDER/2018/025.Fraile Gil, F.; Sanchis, R.; Poler, R.; Ortiz Bas, Á. (2019). Reference Models for Digital Manufacturing Platforms. Applied Sciences. 9(20):1-25. https://doi.org/10.3390/app9204433S125920Pedone, G., & Mezgár, I. (2018). Model similarity evidence and interoperability affinity in cloud-ready Industry 4.0 technologies. Computers in Industry, 100, 278-286. doi:10.1016/j.compind.2018.05.003Mehrpouya, M., Dehghanghadikolaei, A., Fotovvati, B., Vosooghnia, A., Emamian, S. S., & Gisario, A. (2019). The Potential of Additive Manufacturing in the Smart Factory Industrial 4.0: A Review. Applied Sciences, 9(18), 3865. doi:10.3390/app9183865Tran, Park, Nguyen, & Hoang. (2019). Development of a Smart Cyber-Physical Manufacturing System in the Industry 4.0 Context. Applied Sciences, 9(16), 3325. doi:10.3390/app9163325Fernandez-Carames, T. M., & Fraga-Lamas, P. (2019). A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories. IEEE Access, 7, 45201-45218. doi:10.1109/access.2019.2908780Moghaddam, M., Cadavid, M. N., Kenley, C. R., & Deshmukh, A. V. (2018). Reference architectures for smart manufacturing: A critical review. Journal of Manufacturing Systems, 49, 215-225. doi:10.1016/j.jmsy.2018.10.006Sutherland, W., & Jarrahi, M. H. (2018). The sharing economy and digital platforms: A review and research agenda. International Journal of Information Management, 43, 328-341. doi:10.1016/j.ijinfomgt.2018.07.004Corradi, A., Foschini, L., Giannelli, C., Lazzarini, R., Stefanelli, C., Tortonesi, M., & Virgilli, G. (2019). Smart Appliances and RAMI 4.0: Management and Servitization of Ice Cream Machines. IEEE Transactions on Industrial Informatics, 15(2), 1007-1016. doi:10.1109/tii.2018.2867643Gerrikagoitia, J. K., Unamuno, G., Urkia, E., & Serna, A. (2019). Digital Manufacturing Platforms in the Industry 4.0 from Private and Public Perspectives. Applied Sciences, 9(14), 2934. doi:10.3390/app9142934Digital Manufacturing Platforms, Factories 4.0 and beyondhttps://www.effra.eu/digital-manufacturing-platformsZero Defect Manufacturing Platform Project 2019https://www.zdmp.eu/Zezulka, F., Marcon, P., Vesely, I., & Sajdl, O. (2016). Industry 4.0 – An Introduction in the phenomenon. IFAC-PapersOnLine, 49(25), 8-12. doi:10.1016/j.ifacol.2016.12.002Announcing the IoT Industrie 4.0 Reference Architecturehttps://www.ibm.com/cloud/blog/announcements/iot-industrie-40-reference-architectureVelásquez, N., Estevez, E., & Pesado, P. (2018). Cloud Computing, Big Data and the Industry 4.0 Reference Architectures. Journal of Computer Science and Technology, 18(03), e29. doi:10.24215/16666038.18.e29Pisching, M. A., Pessoa, M. A. O., Junqueira, F., dos Santos Filho, D. J., & Miyagi, P. E. (2018). An architecture based on RAMI 4.0 to discover equipment to process operations required by products. Computers & Industrial Engineering, 125, 574-591. doi:10.1016/j.cie.2017.12.029Calvin, T. (1983). Quality Control Techniques for «Zero Defects». IEEE Transactions on Components, Hybrids, and Manufacturing Technology, 6(3), 323-328. doi:10.1109/tchmt.1983.113617

    Cross-Over between Discrete and Continuous Protein Structure Space: Insights into Automatic Classification and Networks of Protein Structures

    Get PDF
    Structural classifications of proteins assume the existence of the fold, which is an intrinsic equivalence class of protein domains. Here, we test in which conditions such an equivalence class is compatible with objective similarity measures. We base our analysis on the transitive property of the equivalence relationship, requiring that similarity of A with B and B with C implies that A and C are also similar. Divergent gene evolution leads us to expect that the transitive property should approximately hold. However, if protein domains are a combination of recurrent short polypeptide fragments, as proposed by several authors, then similarity of partial fragments may violate the transitive property, favouring the continuous view of the protein structure space. We propose a measure to quantify the violations of the transitive property when a clustering algorithm joins elements into clusters, and we find out that such violations present a well defined and detectable cross-over point, from an approximately transitive regime at high structure similarity to a regime with large transitivity violations and large differences in length at low similarity. We argue that protein structure space is discrete and hierarchic classification is justified up to this cross-over point, whereas at lower similarities the structure space is continuous and it should be represented as a network. We have tested the qualitative behaviour of this measure, varying all the choices involved in the automatic classification procedure, i.e., domain decomposition, alignment algorithm, similarity score, and clustering algorithm, and we have found out that this behaviour is quite robust. The final classification depends on the chosen algorithms. We used the values of the clustering coefficient and the transitivity violations to select the optimal choices among those that we tested. Interestingly, this criterion also favours the agreement between automatic and expert classifications. As a domain set, we have selected a consensus set of 2,890 domains decomposed very similarly in SCOP and CATH. As an alignment algorithm, we used a global version of MAMMOTH developed in our group, which is both rapid and accurate. As a similarity measure, we used the size-normalized contact overlap, and as a clustering algorithm, we used average linkage. The resulting automatic classification at the cross-over point was more consistent than expert ones with respect to the structure similarity measure, with 86% of the clusters corresponding to subsets of either SCOP or CATH superfamilies and fewer than 5% containing domains in distinct folds according to both SCOP and CATH. Almost 15% of SCOP superfamilies and 10% of CATH superfamilies were split, consistent with the notion of fold change in protein evolution. These results were qualitatively robust for all choices that we tested, although we did not try to use alignment algorithms developed by other groups. Folds defined in SCOP and CATH would be completely joined in the regime of large transitivity violations where clustering is more arbitrary. Consistently, the agreement between SCOP and CATH at fold level was lower than their agreement with the automatic classification obtained using as a clustering algorithm, respectively, average linkage (for SCOP) or single linkage (for CATH). The networks representing significant evolutionary and structural relationships between clusters beyond the cross-over point may allow us to perform evolutionary, structural, or functional analyses beyond the limits of classification schemes. These networks and the underlying clusters are available at http://ub.cbm.uam.es/research/ProtNet.phpThis work was supported by the Ramon y Cajal program of the Spanish Science Ministry of Education and Science, Project ‘Centrosoma 3DBioinformatics’ of the program Consolider-Ingenio 2010 of the Spanish Ministry of Education and Science, Project BIO2005-0576 from the Spanish Ministry of Education and Science, Project 200520M157 from the Comunidad de Madrid, and Research Foundation ‘‘Ramon Areces’’.Peer reviewe

    An Approach to the Industrial Organization Engineering Background in Spain

    Full text link
    [EN] In this article we review the historic background of Spanish Industrial Engineering and briefly compare it with its equivalents in the USA and other countries, indicating similarities and differences. We present the actions taken in Spain that have consolidated Organizational Engineering. First, we describe the early history in the older Schools of Industrial Engineering. We follow reporting the new Industrial Organization speciality in the Degree in Industrial Engineering and the Second Cycle of Industrial Organization Engineering that extends until the end of the last century. We present the actual academic organization to adapt to the European Higher Education Area (EHEA) along with the impact that its adaptation has had on the new Degrees, Master Degrees and Postgraduate Courses. Finally, a short section deals with the Organizational Engineering Development Association (ADINGOR), given its importance for the visibility and consolidation of Spanish Organizational Engineering in Spain and elsewhere.Companys Pascual, R.; Lario Esteban, FC.; Vicens Salort, E.; Poler, R.; Ortiz Bas, Á. (2017). An Approach to the Industrial Organization Engineering Background in Spain. Lecture Notes in Management and Industrial Engineering. 11-23. doi:10.1007/978-3-319-55889-9_2S1123ADINGOR. (2008). Documento de Requisitos para la verificación del título de “Grado en Ingeniería de Organización Industrial”. Boletín de la Asociación para el Desarrollo de la Ingeniería de Organización.ANECA. (2006). Libro Blanco. Título de Grado en Ing: de Organización Industrial.Companys, R. (2001). La Organización Industrial en la ETSII. Sevilla: Congreso de Ingeniería de Organización.Fons Boronat, J. M. (2001). La Ingeniería de Organización: Una visión desde la Administració de Empresas. Sevilla: Congreso de Ingeniería de Organización.Mula, J., Díaz Madroñero, M., & Poler, R. (2012). Configuración del Grado en Ingeniería de Organización Industrial en las universidades españolas. Dirección y Organización, 47, 5–20

    In vivo assembling of bacterial ribosomal protein L11 into yeast ribosomes makes the particles sensitive to the prokaryotic specific antibiotic thiostrepton

    Get PDF
    Article available at http://dx.doi.org/10.1093/nar/gkm773Eukaryotic ribosomal stalk protein L12 and its bacterial orthologue L11 play a central role on ribosomal conformational changes during translocation. Deletion of the two genes encoding L12 in Saccharomyces cerevisiae resulted in a very slow-growth phenotype. Gene RPL12B, but not the RPL12A, cloned in centromeric plasmids fully restored control protein level and the growth rate when expressed in a L12-deprived strain. The same strain has been transformed to express Escherichia coli protein EcL11 under the control of yeast RPL12B promoter. The bacterial protein has been found in similar amounts in washed ribosomes from the transformed yeast strain and from control E. coli cells, however, EcL11 was unable to restore the defective acidic protein stalk composition caused by the absence of ScL12 in the yeast ribosome. Protein EcL11 induced a 10% increase in L12-defective cell growth rate, although the in vitro polymerizing capacity of the EcL11-containing ribosomes is restored in a higher proportion, and, moreover, the particles became partially sensitive to the prokaryotic specific antibiotic thiostrepton. Molecular dynamic simulations using modelled complexes support the correct assembly of bacterial L11 into the yeast ribosome and confirm its direct implication of its CTD in the binding of thiostrepton to ribosomesThis work was funded by Ministerio de Educación y Ciencia, Spain (BFU2006-00365 to J.P.G.B., GEN2003-206420-C09-08 and BIO2005-0576 to A.R.O.); Fundación Ramón Areces (institutional grant to CBMSO)Peer reviewe

    Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems

    Full text link
    [EN] The industrial Internet of Things (IIoT) is having a significant impact in the manufacturing industry, especially in the context of horizontal integration of operational systems in factories as part of information systems in supply chains. Manufacturing companies can use this technology to create data streams along the supply chain that monitor and control manufacturing and logistic processes, to in the end make these data streams interoperable with other software systems and to enable smart interactions among supply chain processes. However, the provision of these data streams may expose manufacturing operational systems to cyber-attacks. Therefore, cybersecurity is a critical aspect to design trustworthy gateways, which are system components that implement interoperability mechanisms between operational systems and information systems. Gateways must provide security mechanisms at different system layers to minimize threats. This paper presents the Device Drivers security architecture: trustworthy gateways between operational technology and information technology used in the virtual factory open operating system (vf-OS) platform, which is a multisided platform orientated to manufacturing and logistics companies to enable collaboration among supply chains in all sectors. The main contribution of this paper is the evaluation of fallback mechanisms to improve resilience. In situations when the system may be under attack, the proposed mechanisms provide means to quickly recover component availability, by applying alternative security measures to minimize the threat at the same time. Other significant contributions are: a description of the threat model for Device Drivers, a presentation of the security countermeasures implemented in the vf-OS system, the mapping of the vf-OS response objectives to the different characteristics of a trustworthy system: security, privacy, reliability, safety, and resilience and how the proposed countermeasures complement this response.This work was supported by the European Commission under the Grant 723710. (Corresponding author: Francisco Fraile.)Fraile Gil, F.; Tagawa, T.; Poler, R.; Ortiz Bas, Á. (2018). Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems. IEEE Internet of Things. 5(6):4506-4514. https://doi.org/10.1109/JIOT.2018.2832041S450645145

    Highly sensitive molecular diagnosis of prostate cancer using surplus material washed off from biopsy needles

    Get PDF
    INTRODUCTION: Currently, final diagnosis of prostate cancer (PCa) is based on histopathological analysis of needle biopsies, but this process often bears uncertainties due to small sample size, tumour focality and pathologist’s subjective assessment. METHODS: Prostate cancer diagnostic signatures were generated by applying linear discriminant analysis to microarray and real-time RT–PCR (qRT–PCR) data from normal and tumoural prostate tissue samples. Additionally, after removal of biopsy tissues, material washed off from transrectal biopsy needles was used for molecular profiling and discriminant analysis. RESULTS: Linear discriminant analysis applied to microarray data for a set of 318 genes differentially expressed between non-tumoural and tumoural prostate samples produced 26 gene signatures, which classified the 84 samples used with 100% accuracy. To identify signatures potentially useful for the diagnosis of prostate biopsies, surplus material washed off from routine biopsy needles from 53 patients was used to generate qRT–PCR data for a subset of 11 genes. This analysis identified a six-gene signature that correctly assigned the biopsies as benign or tumoural in 92.6% of the cases, with 88.8% sensitivity and 96.1% specificity. CONCLUSION: Surplus material from prostate needle biopsies can be used for minimal-size gene signature analysis for sensitive and accurate discrimination between non-tumoural and tumoural prostates, without interference with current diagnostic procedures. This approach could be a useful adjunct to current procedures in PCa diagnosis. British Journal of Cancer (2011) 105, 1600–1607. doi:10.1038/bjc.2011.435 www.bjcancer.com Published online 18 October 2011 & 2011 Cancer Research UKMinisterio de Ciencia e Innovacion (PI080274), Fundación Marato TV3, Ministerio de Educacio´n (GEN2001-4856- C13, GEN2001-4865-C13-10 and SAF2005-05109), Ministerio de Sanidad (PI020231), Red Temática de Cáncer of the Instituto Carlos III (ISCIII-RETIC RD06/0020), Xarxa de Bancs de Tumors de Catalunya-ICO (XBTC) and Fundación Ramón Areces.Peer Reviewe

    BRIEF UPDATE ON THE SATELLITE TAGGING OF ATLANTIC SWORDFISH

    Get PDF
    This paper provides a brief update of the study on habitat use for swordfish, developed within the working plan of the Swordfish Species Group of ICCAT. A total of 9 miniPAT tags have been deployed by observers on Portuguese and Spanish vessels and the Uruguayan research cruise in the North and South Atlantic. Data from eight tags/specimens are available, four specimens suffered from post-release mortality and one individual tag pop-up date has not occurred yet. These preliminary results showed swordfish moved in several directions, travelling considerable distances. Swordfish spent most of the daytime in deeper waters, being closer to the surface during night-time. The main plan for the next phase of the project is to continue the tag deployment during 2020 in several regions of the Atlantic Ocean and Mediterranean SeaEn prens

    Co-regulation analysis of closely linked genes identifies a highly recurrent gain on chromosome 17q25.3 in prostate cancer

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Transcriptional profiling of prostate cancer (PC) has unveiled new markers of neoplasia and allowed insights into mechanisms underlying this disease. Genomewide analyses have also identified new chromosomal abnormalities associated with PC. The combination of both classes of data for the same sample cohort might provide better criteria for identifying relevant factors involved in neoplasia. Here we describe transcriptional signatures identifying distinct normal and tumoral prostate tissue compartments, and the inference and demonstration of a new, highly recurrent copy number gain on chromosome 17q25.3.</p> <p>Methods</p> <p>We have applied transcriptional profiling to tumoral and non-tumoral prostate samples with relatively homogeneous epithelial representations as well as pure stromal tissue from peripheral prostate and cultured cell lines, followed by quantitative RT-PCR validations and immunohistochemical analysis. In addition, we have performed <it>in silico </it>colocalization analysis of co-regulated genes and validation by fluorescent in situ hybridization (FISH).</p> <p>Results</p> <p>The transcriptomic analysis has allowed us to identify signatures corresponding to non-tumoral luminal and tumoral epithelium, basal epithelial cells, and prostate stromal tissue. In addition, <it>in silico </it>analysis of co-regulated expression of physically linked genes has allowed us to predict the occurrence of a copy number gain at chromosomal region 17q25.3. This computational inference was validated by fluorescent <it>in situ </it>hybridization, which showed gains in this region in over 65% of primary and metastatic tumoral samples.</p> <p>Conclusion</p> <p>Our approach permits to directly link gene copy number variations with transcript co-regulation in association with neoplastic states. Therefore, transcriptomic studies of carefully selected samples can unveil new diagnostic markers and transcriptional signatures highly specific of PC, and lead to the discovery of novel genomic abnormalities that may provide additional insights into the causes and mechanisms of prostate cancer.</p

    Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems

    Full text link
    [EN] Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal. Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines. Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section. Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.This research has been partially funded by the European Commission, under Grant Agreement 723710.Tsuchiya, A.; Fraile Gil, F.; Koshijima, I.; Ortiz Bas, Á.; Poler, R. (2018). Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems. Journal of Industrial Engineering and Management. 11(2):318-332. https://doi.org/10.3926/jiem.2534S31833211
    corecore