229 research outputs found

    Challenges of cloud technology in manufacturing environment

    Get PDF
    The rapid growth Information systems and advanced network technologies have significant impact on enterprises around the world. Enterprises are trying to gain competitive advantage in open global markets by using the latest technologies, along with advanced networks, to create collaboration, reduce costs, and maximize productivity. The combination of latest technologies and advanced manufacturing networks technologies lead to growth of new manufacturing model named Cloud Manufacturing which can shift the manufacturing industry from product-oriented manufacturing to services-oriented manufacturing. This paper explores the literature about the current Manufacturing problems, understands the concept of Cloud Computing Technology, introduces Cloud Manufacturing and its role in the enterprise, and investigates the obstacles and challenges of adopting Cloud Manufacturing in enterprises

    Actor involvement in protected landscapes: evidence from the Peak District National Park, UK

    Full text link
    The English National Parks are designated to conserve, enhance and promote the natural beauty, wildlife and cultural heritage of areas of outstanding landscape value. The first national park to be designated was the Peak District National Park (PDNP) in 1951. The complexity of uses, involved interests and actors, and the external and internal pressures have increased significantly since then. The Peak District has been influenced and shaped by human habitation for thousands of years. The diversity of the present actors requires policies as (social) learning processes, and in order to be able to influence behaviour, governments and governance need to adapt to the motives and goals of the different actors. The role of coalitions and cooperation, as forms of interactive decision-making among actors, is crucial. Especially because the different actors have different interests and time horizons, and profess different discourses, such coalitions and cooperation must be attractive for all actors from every sector (state, economy and civil society). In this paper our research in the PDNP takes its inspiration from research by Thompson (2005) who adopted Foucault’s ‘governmentality’ approach and Clark & Clarke (2010) who used the concept of adaptive governance. We conclude that coalitions, cooperation and projects must be seen as a process, an immediate result is sometimes less important.Die englischen National Parks wurden ausgewiesen, um die natürliche Schönheit und das Natur- und Kulturerbe von Gebieten mit außergewöhnlichem landschaftlichem Wert zu erhalten, zu verbessern und zu fördern. Der erste Nationalpark, der ausgewiesen wurde, war der Peak District Nationalpark (PDNP) im Jahr 1951. Die Komplexität der Nutzungen, der beteiligten Interessen und der Akteure sowie der externe und interne Druck haben sich seither deutlich erhöht. Der Peak District wurde durch die menschliche Besiedlung seit Tausenden von Jahren beeinflusst und geformt. Die Vielfalt der heutigen Akteure erfordert eine Politik als (sozialen) Lernprozess und sie muss in der Lage sein, das Verhalten beeinflussen zu können; Government und Governance müssen sich an Motive und Ziele der verschiedenen Akteure anpassen. Die Rolle von Koalitionen und Kooperationen, als Formen der interaktiven Entscheidungsfindung zwischen den Akteuren ist entscheidend. Vor allem, weil die verschiedenen Akteure unterschiedliche Interessen und Zeithorizonte haben und zu verschiedenen Diskursen gehören, müssen solche Koalitionen und Kooperationen attraktiver für alle Akteure aus allen Bereichen (Staat, Wirtschaft und Zivilgesellschaft) werden. In diesem Beitrag stellen wir unsere Forschung im PDNP in Bezug zur Forschung von Thompson (2005), die Foucaults Gouvernementalitäts-Ansatz verwendete und Clark & Clarke (2010), die das Konzept der adaptiven Governance verwendeten. Wir schlussfolgern, dass Koalitionen, Kooperationen und Projekte als Prozesse gesehen werden müssen, ein sofortiges Ergebnis ist manchmal weniger wichtig

    Security aspects in cloud based condition monitoring of machine tools

    Get PDF
    In the modern competitive environments companies must have rapid production systems that are able to deliver parts that satisfy highest quality standards. Companies have also an increased need for advanced machines equipped with the latest technologies in maintenance to avoid any reduction or interruption of production. Eminent therefore is the need to monitor the health status of the manufacturing equipment in real time and thus try to develop diagnostic technologies for machine tools. This paper lays the foundation for the creation of a safe remote monitoring system for machine tools using a Cloud environment for communication between the customer and the maintenance service company. Cloud technology provides a convenient means for accessing maintenance data anywhere in the world accessible through simple devices such as PC, tablets or smartphones. In this context the safety aspects of a Cloud system for remote monitoring of machine tools becomes crucial and is, thus the focus of this pape

    Online on-board optimization of cutting parameter for energy efficient CNC milling

    Get PDF
    Energy efficiency is one of the main drivers for achieving sustainable manufacturing. Advances in machine tool design have reduced the energy consumption of such equipment, but still machine tools remain one of the most energy demanding equipment in a workshop. This study presents a novel approach aimed to improve the energy efficiency of machine tools through the online optimization of cutting conditions. The study is based on an industrial CNC controller with smart algorithms optimizing the cutting parameters to reduce the overall machining time while at the same time minimizing the peak energy consumption

    Overview of Remaining Useful Life prediction techniques in Through-life Engineering Services

    Get PDF
    Through-life Engineering Services (TES) are essential in the manufacture and servicing of complex engineering products. TES improves support services by providing prognosis of run-to-failure and time-to-failure on-demand data for better decision making. The concept of Remaining Useful Life (RUL) is utilised to predict life-span of components (of a service system) with the purpose of minimising catastrophic failure events in both manufacturing and service sectors. The purpose of this paper is to identify failure mechanisms and emphasise the failure events prediction approaches that can effectively reduce uncertainties. It will demonstrate the classification of techniques used in RUL prediction for optimisation of products’ future use based on current products in-service with regards to predictability, availability and reliability. It presents a mapping of degradation mechanisms against techniques for knowledge acquisition with the objective of presenting to designers and manufacturers ways to improve the life-span of components

    A Comparison of Point Data Selection Schemes for Evolutionary Surface Reconstructions

    Get PDF
    This article presents a study of the application of Computational Intelligence (CI) methods to the problem of optimal surface reconstruction using triangulations and NURBS (Non-Uniform Rational B-Splines) surface approximations on digitized point data. In mechanical engineering surface reconstructions are used to transform physical objects into mathematical representations for computer aided design purposes. In order to record the geometrical shape of the objects, tactile or optical sensors generate point sets with a huge number of sample points. The number and distribution of these points are decisive for the quality and computational efficiency of the numerical surface representations. Triangulations and NURBS are widely used in CAD/CAM-applications, because they belong to a class of very exible discrete interpolation and approximation methods. In order to verify the suitability of surface model independent point selection schemes and to find model dependent sampling point distributions, optimal surface reconstructions are used

    Development of an ontology for aerospace engine components degradation in service

    Get PDF
    This paper presents the development of an ontology for component service degradation. In this paper, degradation mechanisms in gas turbine metallic components are used for a case study to explain how a taxonomy within an ontology can be validated. The validation method used in this paper uses an iterative process and sanity checks. Data extracted from on-demand textual information are filtered and grouped into classes of degradation mechanisms. Various concepts are systematically and hierarchically arranged for use in the service maintenance ontology. The allocation of the mechanisms to the AS-IS ontology presents a robust data collection hub. Data integrity is guaranteed when the TO-BE ontology is introduced to analyse processes relative to various failure events. The initial evaluation reveals improvement in the performance of the TO-BE domain ontology based on iterations and updates with recognised mechanisms. The information extracted and collected is required to improve service k nowledge and performance feedback which are important for service engineers. Existing research areas such as natural language processing, knowledge management, and information extraction were also examined

    A Design Approach to IoT Endpoint Security for Production Machinery Monitoring

    Get PDF
    The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments
    • …
    corecore