Maintenance Simulation and Maintainability Design Based on Virtual Reality

2011 ◽  
Vol 467-469 ◽  
pp. 457-461 ◽  
Author(s):  
Dong Zhou ◽  
Mei Hui Wang ◽  
Zhi Qi Guo ◽  
Chuan Lv

Virtual maintenance technology based on the concept of concurrent engineering can change the traditional maintainability "serial" design approach which cause the cycle is long, costly and difficult to change the design defects and shortcomings, and also meet the timing and economics of product development needs. However, the theory of virtual maintenance is not fully studied and researches are deficiency in the field of virtual maintenance modeling and simulation. So this article discusses the concept and connotation of virtual maintenance, and virtual maintenance model and simulation control method are studied in the paper. The model of maintenance task simulation called MTN (Maintenance Task Net) is present, and the factors including State, Action and Condition that are defined in MTN are demonstrated. In addition, the paper constructs the fire rules and the control mechanism of virtual maintenance simulation which is driven by MTN. Finally, a case study of the LRU repair of an aircraft is conducted, and the result confirms the validation and feasibility of all the studies, which can become a new technique means for maintainability design and analysis.

2010 ◽  
Vol 44-47 ◽  
pp. 527-531 ◽  
Author(s):  
Dong Zhou ◽  
Mei Hui Wang ◽  
Lin Huo ◽  
Chuan Lv

Virtual maintenance technique brings new mode for system maintainability design and analysis, however, the theory of virtual maintenance is not fully studied and researches are deficiency in the key field of virtual maintenance modeling and simulation. So virtual maintenance model and simulation control method are studied in the paper. Virtual maintenance model is based on Petri Net and can describe the relations of maintenance resources, and the model structure, formal definition, maintenance object, resource state and model operation are given. In addition, virtual maintenance simulation rules and simulation scheduling method are built in the paper. Simulation scheduling objective, flow and conflict features of maintenance process simulation are analyzed, and conflict strategies are addressed subsequently. Finally, a case study of the LRU repair of an aircraft is conducted, and the result confirms the validation and feasibility of all the studies, which can become a new technique means for maintainability engineering.


2010 ◽  
Vol 26-28 ◽  
pp. 714-719 ◽  
Author(s):  
Dong Zhou ◽  
Jian Ming Shi ◽  
Jie Geng ◽  
Chuan Lv

The paper first demonstrates some relevant concepts with virtual maintenance, and further discusses the concepts and connotations of virtual maintenance. As the key techniques, virtual maintenance model and simulation method are studied in the paper. Virtual maintenance model (VMM) is present, and the model is based on Petri Net and can describe the relations of maintenance resources. In addition, virtual maintenance simulation rules are built in the paper. Finally, a case study of the LRU repair of an aircraft is conducted, and the result confirms the validation and feasibility of all the studies, which can become a new technique means for maintainability engineering.


2013 ◽  
Vol 703 ◽  
pp. 227-230 ◽  
Author(s):  
Ao Lin Huang ◽  
Qing Min Li ◽  
Tie Bing Li

This paper considers on-condition maintenance of a continuously degrading information system, in which the inter-maintenance time and the maintenance time depend on the condition of the system at which maintenance is carried out. The durations of preventive maintenance activities are supposed to be exponentially distributed. Assuming deterioration of the system follows a gamma process, models are established to maximize the system average availability when the effectiveness of the preventive maintenance activity becomes weaker and weaker. Optimal solutions on the condition of the system at which maintenance should be performed and the number of times of maintenance action to be carried out are obtained based on Monte-Carlo simulation. A case study is given to show the procedure of the maintenance model and simulation.


Author(s):  
Guillaume Celi ◽  
Sylvain Dudit ◽  
Thierry Parrassin ◽  
Philippe Perdu ◽  
Antoine Reverdy ◽  
...  

Abstract For Very Deep submicron Technologies, techniques based on the analysis of reflected laser beam properties are widely used. The Laser Voltage Imaging (LVI) technique, introduced in 2009, allows mapping frequencies through the backside of integrated circuit. In this paper, we propose a new technique based on the LVI technique to debug a scan chain related issue. We describe the method to use LVI, usually dedicated to frequency mapping of digital active parts, in a way that enables localization of resistive leakage. Origin of this signal is investigated on a 40nm case study. This signal can be properly understood when two different effects, charge carrier density variations (LVI) and thermo reflectance effect (Thermal Frequency Imaging, TFI), are taken into account.


2021 ◽  
pp. 263145412098771
Author(s):  
Biju Dominic ◽  
Reshmi

This case study is about misselling of insurance policies and associated ethical challenges in a leading insurance company. Pro-organisational ethical violations mostly remain unnoticed and are often protected by implausible explanations. In the long run, persistent rationalisation makes malpractices a norm. The present work describes the interventions applied by a consulting firm to bring behavioural integrity. The consulting firm found that socialisation, rationalisation and institutionalisation considerably influenced people’s behaviour at the workplace and normalised unethical behaviour of insurance agents. It architected the behaviour of salespeople by specifically designed interventions through self-control mechanism and nudges. These interventions developed integrity in employees and reduced the number of cautions, warnings and terminations.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Shah Nazir ◽  
Sara Shahzad ◽  
Sher Afzal Khan ◽  
Norma Binti Alias ◽  
Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark.


Robotica ◽  
1988 ◽  
Vol 6 (2) ◽  
pp. 131-139 ◽  
Author(s):  
Yoshitaka Suzuki ◽  
Sigeru Niinomi ◽  
Yoshiyuki Saitoh ◽  
Takuroh Hatakeyama ◽  
Kazuo Tsuchiya

SUMMARYThis report deals with the development of new control vehicles for the bedridden, physically handicapped person who needs a help-system for carrying things to the bedside from the stock in the room. This new control method is characterized by a unit loop system on the drive track. This unit loop system was constructed to execute three actions: stop, backward and right forward movement, under the control of a on-board microcomputer.This control method is used in small rooms. It also enables one to increase the driving area of a vehicle without reprogramming and adjusting the control mechanism.


2021 ◽  
Vol 11 (22) ◽  
pp. 10744
Author(s):  
Changliang Han ◽  
Houqiang Yang ◽  
Nong Zhang ◽  
Rijian Deng ◽  
Yuxin Guo

The gob-side roadway in an isolated island working face is a typical representative of a strong mining roadway, which seriously restricts the efficient and safe production of underground coal mines. With the engineering background of the main transportation roadway 1513 (MTR 1513) of the Xinyi Coal Mine, this paper introduces the engineering case of gob-side roadway driving with small coal-pillar facing mining in an isolated island working face under the alternate mining of wide and narrow working faces. Through comprehensive research methods, we studied zoning disturbance deformation characteristics and stress evolution law of gob-side roadway driving under face mining. Based on the characteristics of zoning disturbance, MTR 1513 is divided into three zones, which are the heading face mining zone, the mining influenced zone, and the mining stability zone. A collaborative control technology using pressure relief and anchoring is proposed, and the differentiated control method is formed for the three zones. For the heading face mining zone, the control method of anchoring first and then pressure relief is adopted; for the mining influenced zone, the control idea of synchronous coordination of pressure relief and anchorage is adopted; for the mining stability zone, the control method of anchoring without pressure relief is adopted. Engineering practices show that the disturbance influence distance of working face 1511 on MTR 1513 changes from 110 m advanced to 175 m delay. At this time, the surrounding rock deformation is effectively controlled, which verified the rationality of the division and the feasibility of three zoning control technology. The research results can provide reference for gob-side roadway driving with small coal pillar facing mining in a special isolated island working face.


2021 ◽  
Author(s):  
◽  
Evan Kerrane ◽  

A debate between liberal and realist international relations theories centres on the influence of trade interdependence on state action. While liberal theorists tend to see interdependence as only a mechanism for peace, realists view trade dependency as a potential for state vulnerability. Dale Copeland’s trade expectations theory offers a bridge to this divide by arguing perception of future trade accounts for whether states perceive trade as a vulnerability or mechanism for cooperation. Copeland’s novel theory argues when states possess a positive expectation of future trade, they will continue to pursue trading relationships, as argued in liberal theory. However, once these expectations turn negative, states may face a trade-security crisis stemming from the trade vulnerabilities. This thesis applies Copeland’s theory the Russian experience leading up to the 2013 – 2014 Ukraine Crisis. The application of the theory addresses two key criticisms of trade expectations theory: first, the question of what constitutes “reasonableness” within the expectations of trade, and second, grounding the theory within the broader international relations literature. Copeland’s reliance on a “reasonable man” test of trade expectations lacks a nuanced understanding of what a reasonable perception of a state is. Through the addition of militarism as a state bias and belief, this thesis shows the theory’s logic developing within a defensive realist framework. The thesis applies the case study to a two-level security dilemma, grounding the theory’s core contribution, the trade-security dilemma, within defensive realism. Placing Copeland’s theory within this framework reveals trade expectations to be an intervening variable within a balance of power competition. Finally, the application of trade expectations theory to Russia and the Ukraine Crisis gives greater depth in understanding Moscow’s dilemma. Framing a trade-security dilemma within the broader balance of power dynamic exposes the Russian trade crisis which occurred as Kyiv shifted towards the West.


Sign in / Sign up

Export Citation Format

Share Document