1,022 Hits in 10.2 sec

Industry 4.0 smart reconfigurable manufacturing machines

Jeff Morgan, Mark Halton, Yuansong Qiao, John G. Breslin
2021 Journal of manufacturing systems  
A B S T R A C T This paper provides a fundamental research review of Reconfigurable Manufacturing Systems (RMS), which uniquely explores the state-of-the-art in distributed and decentralized machine control  ...  Key areas reviewed include: (a) RMSfundamentals, design rational, economic benefits, needs and challenges; (b) Machine Controlmodern operational technology, vertical and horizontal system integration,  ...  With special thanks to Sean Nolan from the Confirm Centre for his work in establishing the cross university collaboration which was pivotal to the creation of this paper.  ... 
doi:10.1016/j.jmsy.2021.03.001 fatcat:sv3e4hyiefbbvhqxttwo3n6vr4

Distributed Infrastructure for Multi-Energy-Systems Modelling and Co-simulation in Urban Districts

Lorenzo Bottaccioli, Edoardo Patti, Enrico Macii, Andrea Acquaviva
2018 Proceedings of the 7th International Conference on Smart Cities and Green ICT Systems  
Then, we propose MESsi, a novel distributed infrastructure for modelling and cosimulating Multi-Energy-Systems.  ...  This infrastructure is a framework suitable for general purpose energy simulations in cities. Finally, we introduce possible simulation scenarios that have different spatio-temporal resolutions.  ...  It exploit a cloud-based architecture to parallelize the computation of large scale models.  ... 
doi:10.5220/0006764502620269 dblp:conf/smartgreens/BottaccioliPMA18 fatcat:7vhh4tcrv5dh7kpakombtduv6m

The Impact of B2B Exchanges on Brick and Mortar Intermediaries: The ELEMICA Case

Ellen Christiaanse, Ruben Sinnecker, Marco Mossinkoff
2001 European Conference on Information Systems  
We conclude this paper with some fundamental implications of the emergence of electronic marketplaces for intermediaries in the chemical industry, which are applicable to more general settings as well.  ...  We argue that the emergence of electronic marketplaces both creates opportunities and threats for brick and mortar intermediaries.  ...  In our framework, information driven activities are integrated in physical functions.  ... 
dblp:conf/ecis/ChristiaanseSM01 fatcat:4dnvt7piwjcedcrulqcq4mwwcq

Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems

F. Fraile, T. Tagawa, R. Poler, A. Ortiz
2018 IEEE Internet of Things Journal  
The industrial Internet of Things (IIoT) is having a significant impact in the manufacturing industry, especially in the context of horizontal integration of operational systems in factories as part of  ...  Other significant contributions are: a description of the threat model for Device Drivers, a presentation of the security countermeasures implemented in the vf-OS system, the mapping of the vf-OS response  ...  In large scale horizontal integration scenarios, Device Drivers connect to physical devices using secured IIoT communication protocols.  ... 
doi:10.1109/jiot.2018.2832041 fatcat:ijd35ml4a5f7tlfalhozbtp56y

Federation of Internet of Things Testbeds for the Realization of a Semantically-Enabled Multi-Domain Data Marketplace

Luis Sánchez, Jorge Lanza, Juan Santana, Rachit Agarwal, Pierre Raverdy, Tarek Elsaleh, Yasmin Fathy, SeungMyeong Jeong, Aris Dadoukis, Thanasis Korakis, Stratos Keranidis, Philip O'Brien (+8 others)
2018 Sensors  
The Internet of Things (IoT) concept has attracted a lot of attention from the research and innovation community for a number of years already.  ...  One of the key drivers for this hype towards the IoT is its applicability to a plethora of different application domains.  ...  Conflicts of Interest: The authors declare no conflict of interest. Sensors 2018, 18, 3375  ... 
doi:10.3390/s18103375 pmid:30308942 pmcid:PMC6211132 fatcat:yo6ahe7ui5hldnkpxk5ny53quu


Dhandapani C, Sivaramakrishnan R
2019 Industrial Engineering Journal  
Aspiring, from this review, bare the novelty of technology revolutionizes besides on deals the commerce mind for a scene.  ...  Most of the industries, R & D centers, and universities reveal that IoT and automation technologies are the basis of business productions and a key driver for Industry 4.0.  ...  This work will largely be done over the network and permits for a lot of versatile and balanced work and private life distribution.  ... 
doi:10.26488/iej.12.10.1200 fatcat:53hw547xmjcnthwj3rubv2gaae

Interoperability in Smart Manufacturing: Research Challenges

Abe Zeid, Sarvesh Sundaram, Mohsen Moghaddam, Sagar Kamarthi, Tucker Marion
2019 Machines  
Recent advances in manufacturing technology, such as cyberphysical systems, industrial Internet, AI (Artificial Intelligence), and machine learning have driven the evolution of manufacturing architectures  ...  A review of research conducted in this area is provided in this article to gain perspective on the various dimensions and types of interoperability.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/machines7020021 fatcat:7k4nqoohmrc4ta5gwj3anfusbi

Beyond Physical Threats: Cyber-attacks on Critical Infrastructure as a Challenge of Changing Security Environment – Overview of Cyber-security legislation and implementation in SEE Countries

Ivana Cesarec
2020 Annals of Disaster Risk Sciences  
and Research Competence Centre; and Coordinated response to major cyber security incidents and crises (Blueprint) with aim to ensure a rapid and coordinated response to large-scale cyber attacks by setting  ...  Another most high profile example of a cyber-attack against critical infrastructure is the Stuxnet computer virus (first used on Iranian nuclear facility) which could be adapted to attack the SCADA systems  ...  For that purpose, large scale and sophisticated attacks can be simulated as well as failure modes for recognized vulnerabilities.  ... 
doi:10.51381/adrs.v3i1.45 fatcat:bv4tnoyjzbcqhodlmurqcnoh4i

Horizontal and Vertical Analysis of Privacy and Cyber-Security Markets

Nicola Jentzsch
2015 Social Science Research Network  
Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in der dort genannten  ...  The threats and vulnerabilities that emerge in the production and distribution of security and privacy products differ from threats to common goods in their speed, sophistication and potentially large-scale  ...  Markets for Personal Data Products and Services In the past 30 years advances in ICT deployment have led to a large-scale increase in the collection and processing of personal data. 20 This has led to  ... 
doi:10.2139/ssrn.2671296 fatcat:u7bpfpjqnffwrbh62hcuqgpui4


Michael Sony
2021 Zenodo  
DESIGN OF READINESS MODEL FOR INDUSTRY 4.0 IMPLEMENTATION IN INDIAN ENGINEERING INDUSTRIES: DSc Thesis  ...  In addition, the author thanks Mr Davis Thomas, independent quality consultant in shipping Industry for his analysis and insights.  ...  Acknowledgments We thank the reviewers for the constructive suggestion which improved the quality of the paper. The author also thanks Dr. Subhash Naik for his valuable insights on this paper.  ... 
doi:10.5281/zenodo.5148191 fatcat:tjqyh7rodzcdbljxr7xbve4ybu

Decentralized transactive energy community in edge grid with positive buildings and interactive electric vehicles

Ying Wu, Yanpeng Wu, Josep M. Guerrero, Juan C. Vasquez
2022 International Journal of Electrical Power & Energy Systems  
physical space, data cyber space, and human social space.  ...  Therefore, buildings and electric vehicles have great potentials in allowing the optimization and balance of supply and demand with their cross-sector transactive behaviors for full-scale flexibility.  ...  Especially for the mordent energy system, the penetration of large-scale intermittent distributed renewable energy resources and increasing uncoordinated EVs will cause significant power fluctuation in  ... 
doi:10.1016/j.ijepes.2021.107510 fatcat:4u65l6hyu5hnbgjnvfccr64xoa

Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge [article]

Marco Antonio Sotelo Monge, Jorge Maestre Vidal
2021 arXiv   pre-print
Although there is a plethora of well documented cases on strategic and operational interventions of cyber commands, the cyber tactical military edge is still a challenge, where cyber fires barely integrate  ...  In this context, it is expected that tactical clouds disruptively facilitate cyber operations at the edge while exposing the rest of the digital assets of the operation to them.  ...  Integrated support systems: Cyber fires and cyber ISR are commanded from the ally cyber command HQ.  ... 
arXiv:2101.08676v1 fatcat:y76tm3syjjgzrkmlhgdh6h3kre

Integrating Security Services in Cloud Service Stores [chapter]

Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
2015 IFIP Advances in Information and Communication Technology  
Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business  ...  In this paper we describe a novel Cloud-based security management solution that empowers Cloud consumers to protect their systems, applications and data in the Cloud, whilst also improving the control  ...  The main goals in offering "horizontal" security services in PaaS are: 1. To offer Cloud consumers a choice of which security capabilities to use for a system and on what Cloud environment. 2.  ... 
doi:10.1007/978-3-319-18491-3_19 fatcat:5upp7lt5pjbgxes5ya5hf5esjm

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  The approaches presented are holistic and include identification and authentication, data protection and prevention against cyber-attacks at the device and system levels.  ...  are a challenge for constrained IoT resources. • The large-scale, distributed and dynamic nature of IoT resources requires new methods for crawling, discovery, indexing, physical location identification  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq

A Primer on the Factories of the Future

Noble Anumbe, Clint Saidy, Ramy Harik
2022 Sensors  
Due to a lack of consensus on general nomenclature, the term Factory of the Future (or Future Factory) has been used in this paper as a collective euphemism for these paradigms.  ...  Three advanced communication technologies capable of advancing the goals of the Factory of the Future and rapidly scaling advancements in the field are discussed.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or the South  ... 
doi:10.3390/s22155834 pmid:35957390 pmcid:PMC9370931 fatcat:4gbvuy2yorddfp4j35okzvmlye
« Previous Showing results 1 — 15 out of 1,022 results