首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The high-end equipment intelligent manufacturing (HEIM) industry is of strategic importance to national and economic security. Engineering management (EM) for HEIM is a complex, innovative process that integrates natural science, technology, management science, social science, and the human spirit. New-generation information technology (IT), including the internet, cloud computing, big data, and artificial intelligence, have made a remarkable influence on HEIM and its engineering management activities, such as product system construction, product life cycle management, manufacturing resources organization, manufacturing model innovation, and reconstruction of the enterprise ecosystem. Engineering management for HEIM is a key topic at the frontier of international academic research. This study systematically reviews the current research on issues pertaining to engineering management for HEIM under the new-generation IT environment. These issues include cross-lifecycle management, network collaboration management, task integration management of innovative development, operation optimization of smart factories, quality and reliability management, information management, and intelligent decision making. The challenges presented by these issues and potential research opportunities are also summarized and discussed.  相似文献   

2.
Intelligent construction technology has been widely used in the field of railway engineering. This work first analyzes the connotation, function, and characteristics of intelligent construction of railway engineering (ICRE) and establishes its system structure from three dimensions, namely, life cycle, layers of management, and intelligent function, to deeply understand the development situation of intelligent railway construction in China. Second, seven key technical support systems of ICRE, which include building information modeling (BIM) standard system for China’s railway sector, technology management platform and life cycle management based on BIM+GIS (geography information system), ubiquitous intelligent perception system, intelligent Internet-of-Things (IoT) commu-nication system based on mobile interconnection, construction management platform based on cloud computing and big data, unmanned operation system based on artificial intelligence, intelligent machinery and robot, and intelligent operation and maintenance system based on BIM and PHM (prediction and health management), are established. Third, ICRE is divided into three development stages: primary (perception), intermediate (substitution), and advanced (intelligence). The evaluation index system of each stage is provided from the aspects of technology and function. Finally, this work summarizes and analyzes the application situation of ICRE in the entire railway sector of China, represented by Beijing–Zhangjiakou and Beijing–Xiong’an high-speed railways. Result shows that the technical support systems of the ICRE have emerged in China and are still in the process of deepening basic technology research and preliminary application. In the future, the ICRE of China’s railway sector will develop toward a higher stage.  相似文献   

3.
Chemical processes are complex dynamic systems. With the chemical industry under pressure to introduce improvements through the greater use of automation and intelligence, the need for comprehensive reliability evaluation has become more urgent both theoretically and practically. The employment of intelligent algorithms based on factory data has been the recent research hotspots. But for complex systems with available data on a smaller scale, reliability evaluation models have suffered on such problems as a result of instability and over‐fitting, which have to be resolved. The GRA–GA–BP–MCRC hybrid algorithm was proposed. It combined the two‐step genetic algorithm (GA)–back propagation (BP) and grey relational analysis (GRA) with Markov chain residual correction (MCRC). Based on the technical characteristics and the management demands, 46 influential factors of process reliability were introduced, which covered man, machine, material, method, and environment. For model convergence to be assured, GRA and attribute reduction rule were introduced. Meanwhile, based on the correlation of the factors, the two‐step GA–BP was proposed to resolve the over‐fitting problem of artificial neural network with complex input parameters. As well, MCRC was applied to modify the GA–BP error. The resulting average relative error of the hybrid algorithm was 2.36%, while the conventional algorithm was 10.28%. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

4.
The rapid evolution of ICT devices, together with an increasingly wide spread of the Internet and features such as social networks, results in a tremendous increase in the number of discarded cell phones. While the number of cell phone users is increasing very fast in Indonesia, the fate of phones once they are not used anymore is largely unclear. This study aimed at obtaining an overview of E-waste management in Indonesia using a critical case study approach, assessing the cell phone life cycle. The study was carried out in Manado, a medium-sized provincial capital in Indonesia, which has received government awards for its waste management. Yet, the study found indications that E-waste is ending up in landfills, and that dedicated legislation and monitoring systems for E-waste were lacking. As a result, there was little take-back action by producers, consequently leading to a lack of user awareness regarding E-waste disposal. The problems the Indonesian government is facing are twofold: first, E-waste is smuggled into the country in the form of used devices; second, a large number of second-hand devices with unknown sources are circulating within the country uncontrolled. From the current number of subscribers, it is estimated that more than 9.500 tons of waste are produced annually in Indonesia from cell phones alone, and the amount is steadily increasing. While the current study focused on the life cycle of cell phones, the situation for other electronic devices is likely to be very similar. Sustainable management of E-waste generated from the use of cell phones as well as other ICT devices is required not only to provide economic benefits from recycling of the valuable substances they contain, but most importantly for environmental protection. The results of this study indicate that an incentive system should play a key role in any take-back system for cell phones.  相似文献   

5.
Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to identify malicious devices and routes in the deployed network. The feasibility of the proposed model is validated in the simulation environment, where OMNeT++ was used as a simulation tool. We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection, communication cost, latency, computational cost, and throughput. The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7 %.  相似文献   

6.
We introduce the concept of artificial intelligence and its possible contribution towards the human-robot interface by considering the conceptual support such an idealized interface might provide. In following this argument we see that integration of the various aspects of a product's life cycle is a convenient way of introducing the information and knowledge required for an artificially intelligent interface. The information is produced as a result of the earlier processes and lost in most conventional systems. We conclude that the knowledge of the task the robot is to perform is available not as an afterthought which would require manual input to the robot after the product has been designed but as part of a factory-wide integrated system concerned with the whole product life cycle.  相似文献   

7.
为提高停车场电子计时收费装置的检定效率和解决其在技术监督管理现状中存在的问题,提出运用现代云计算理念和大数据技术,建立以在线监测和校准系统为核心应用的停车场智能管理系统公共监管和服务云平台。在可行性研究的基础上,提出该系统的设计架构;在需求分析的基础上,提出智慧停车场客户端单元、在线检测单元、信息发布单元和行政管理单元等功能模块的概要设计方案;详细描述云平台的核心应用——在线计量检测的实现原理与过程。该系统用互联网技术来实现停车场计时收费系统的在线计量检定,经实践证明其改变传统停车场电子计时收费系统的计量检测模式,根据云端虚拟服务器的网络并发响应能力,检测效率理论上可以提高数千倍;实现停车信息、安全、检测和监督等综合服务集成到平台上,最大限度为管理部门和公众提供多个层面的信息服务。  相似文献   

8.
随着互联网应用的迅速发展,各种网络安全威胁不断出现。本文介绍了网络安全所呈现的特点以及目前所面临的形势。攻击方法的更新、攻击技术的提升以及攻击范围的扩大给应急工作带来了考验。应急工作的管理现状存在一定的问题,在核心技术、安全保障方面都比较落后。借鉴传统领域的应急体系,改善当前应急技术措施成为网络安全工作的重要部分。针对新时期的网络安全应急工作环境,提出了调动体系力量,多方联动的消除方法,从体制和机制等方面来进行保证,以防止网络威胁产生的巨大影响。  相似文献   

9.
为准确评价继电保护设备健康状态,提升继电保护设备管理工作水平,提出一种基于多源信息融合技术的继电保护状态评价方法,该方法充分考虑了继电保护的技术特点;建立继电保护状态评价体系和评价指标,解决了多源信息融合技术在继电保护状态评价中的关键技术问题;建立继电保护状态评价及其在设备全寿命周期管理应用的功能模型和结构模型,确定了继电保护状态评价方法。结合目前继电保护设备全寿命周期管理的现状,有针对性地提出继电保护状态评价结果在设备全寿命周期管理过程中应用的解决思路,并开发完成基于多源信息融合技术的继电保护状态检修系统,应用于多家调度单位,验证了所提方法的正确性和实用性。  相似文献   

10.
A. Sengupta  C. Mazumdar  M. S. Barik 《Sadhana》2005,30(2-3):119-140
The rapid evolution of computing and communication technologies and their standardizations have made the boom in e-commerce possible. Lowering of the cost of operation, increase in the speed of transactions, and easy global reach to customers and vendors have been the reasons for the overwhelming popularity of this new way of commerce. This article examines the issues related to the security of the assets and transactions in the e-commerce components and activities. Since large public money is involved in the transactions, the role of information security and privacy is not exaggerated in this kind of business. After examining the technologies used in e-commerce, the article goes on to identify the security requirement of e-commerce systems from perceived threats and vulnerabilities. Then e-commerce security is viewed as an engineering management problem and a life cycle approach is put forward. How the e-commerce systems can be made secure using the life cycle approach is outlined. The relevant standards and laws are also discussed in the perspective of e-commerce. The article closes with some future research directions and conclusions.  相似文献   

11.
基于社会经济发展、环境保护需求、产业政策引导等多方因素,智慧能源将为传统能源结构带来新一轮的巨变。现代信息通信技术(information communications technology,ICT)的飞速发展,为传统能源向智慧能源转型升级提供了强有力的技术支撑。整个智慧能源体系将以创新型的场景需求为导向,以跨界科技力量的深度加持为支撑,驱动整个能源及相关产业链的结构性升级。结合云计算、大数据、物联网(internet of things,IoT)、移动通信、人工智能、区块链等新兴技术,赋能传统能源体系,提出一种适用于智慧能源应用场景下的能源体系ICT构架,贯通能源体系的底层至顶层,实现智慧能源体系能量流、信息流和价值流的全面融合。  相似文献   

12.
Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine, then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense. In attack prediction, cyber threat intelligence is used as an important basis for potential threat analysis. Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method, and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening. If there is no applicable cyber threat intelligence, using the Nash equilibrium to make predictions for the attack behavior. The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior.  相似文献   

13.
兰玉琪  刘松洋  王婧 《包装工程》2019,40(16):14-21
目的 通过对人工智能技术体系的认知与研究,了解人工智能技术在产品交互设计中的应用现状,发现人工智能给产品交互设计带来的革新、产生的新交互方式,以及未来人工智能技术在产品交互设计领域中的发展趋势。方法 以AI净饮机为主,小米智能家居和“小飞鱼”驾驶助手等设计案例为辅,全面剖析在整个设计过程中的应用思考与表现。深入分析人工智能在产品交互设计中的实际应用。结论 根据目前人工智能应用在各行各业中的现状,经过调研及分析其应用的技术手段,总结出人工智能如何驱动产品交互设计的发展。另外,在产品交互设计流程和方法中,通过人工智能的介入,可以提高产品交互设计的效率与用户体验。最终提出对传统产品交互设计的方式、方法、界面及信息构架等多维度的产品设计概念的重新定义,对未来的发展方向进行了设想。  相似文献   

14.
Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the information security theory and subdivides the trustworthiness into the authenticity, integrity, usability, and reliability of electronic records in cloud storage. Moreover, this paper proposes the technology framework of preservation for trusted electronic records. Also, the technology of blockchain, proofs of retrievability, the open archival information system model and erasure code are adopted to protect these four security attributes, to guarantee the credibility of the electronic record.  相似文献   

15.
We apply game theory, optimization, and reliability analysis to identify optimal defenses against intentional threats to system reliability. The goals are to identify optimal strategies for allocating resources among possible defensive investments, and to develop qualitative guidelines that reflect those strategies. The novel feature of the approach is the use of reliability analysis together with game theory and optimization to study optimal management of intentional threats to system reliability. Thus, this work extends and adapts the existing body of game-theoretic work on security to systems with series or parallel structures. The results yield insights into the nature of optimal defensive investments that yield the best tradeoff between investment cost and security. In particular, the results illustrate how the optimal allocation of defensive investments depends on the structure of the system, the cost-effectiveness of infrastructure protection investments, and the adversary's goals and constraints.  相似文献   

16.
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.  相似文献   

17.
Wearables as medical technologies are becoming an integral part of personal analytics, measuring physical status, recording physiological parameters, or informing schedule for medication. These continuously evolving technology platforms do not only promise to help people pursue a healthier life style, but also provide continuous medical data for actively tracking metabolic status, diagnosis, and treatment. Advances in the miniaturization of flexible electronics, electrochemical biosensors, microfluidics, and artificial intelligence algorithms have led to wearable devices that can generate real‐time medical data within the Internet of things. These flexible devices can be configured to make conformal contact with epidermal, ocular, intracochlear, and dental interfaces to collect biochemical or electrophysiological signals. This article discusses consumer trends in wearable electronics, commercial and emerging devices, and fabrication methods. It also reviews real‐time monitoring of vital signs using biosensors, stimuli‐responsive materials for drug delivery, and closed‐loop theranostic systems. It covers future challenges in augmented, virtual, and mixed reality, communication modes, energy management, displays, conformity, and data safety. The development of patient‐oriented wearable technologies and their incorporation in randomized clinical trials will facilitate the design of safe and effective approaches.  相似文献   

18.
Kubernetes is an open-source container management tool which automates container deployment, container load balancing and container(de)scaling, including Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA). HPA enables flawless operation, interactively scaling the number of resource units, or pods, without downtime. Default Resource Metrics, such as CPU and memory use of host machines and pods, are monitored by Kubernetes. Cloud Computing has emerged as a platform for individuals beside the corporate sector. It provides cost-effective infrastructure, platform and software services in a shared environment. On the other hand, the emergence of industry 4.0 brought new challenges for the adaptability and infusion of cloud computing. As the global work environment is adapting constituents of industry 4.0 in terms of robotics, artificial intelligence and IoT devices, it is becoming eminent that one emerging challenge is collaborative schematics. Provision of such autonomous mechanism that can develop, manage and operationalize digital resources like CoBots to perform tasks in a distributed and collaborative cloud environment for optimized utilization of resources, ensuring schedule completion. Collaborative schematics are also linked with Bigdata management produced by large scale industry 4.0 setups. Different use cases and simulation results showed a significant improvement in Pod CPU utilization, latency, and throughput over Kubernetes environment.  相似文献   

19.
Smart cities have rapidly developed in the context of the integration of new digital technologies such as big data, Internet of Things, artificial intelligence, blockchains, and virtual reality. These cities have conducted practical innovations and typical cases in many sectors, such as in government, transportation, environmental protection, energy, medical care, and logistics, and have produced many social, economic, and ecological benefits. However, there are still some problems that continue to hinder the construction of smart cities. This paper examines such problems in depth and proposes some relevant countermeasures and suggestions.  相似文献   

20.
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号