scholarly journals Architectural Holarchy of the Next Generation Manufacturing System

Author(s):  
Gabriel Frumuşanu ◽  
Alexandru Epureanu

Nowadays, the global energy network can generate and transmit, between any two points belonging to it, high quantity of energy. During recent years, a global information network, able to process, store, and transmit huge amounts of information, has been developed as well. These networks entirely cover the industrial space, already giving the opportunity to make permanently available, in any of its points, at any time, as much as needed, both energy and information. On the other hand, the mass customization trend has led to the pronounced increase of “manufacturing to order” (MTO) production, taking place in a higher and higher number of small & medium enterprises. At this level, a given manufacturing system cannot be quickly and appropriately configured to a given product, due to production high variability in range. As consequence, the manufacturing system is, quite always, more or less unadjusted to the manufactured product, its performance being significantly affected. Starting from here, the challenge is to make a conceptual rebuilding of the manufacturing system, aiming to increase its degree of appropriateness to products, by taking advantage from the opportunities brought by the existence of global energy & information networks. This paper approach is to see the next generation manufacturing system as holonic modular cyber-physical system. System architecture permanently accords to the manufactured product requirements. The function, procedure, topology and holarchy model of the system are presented. The main features of the system are also revealed.

Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


2011 ◽  
Vol 110-116 ◽  
pp. 3997-4003 ◽  
Author(s):  
Jirapat Wanitwattanakosol ◽  
Apichat Sopadang

—In this paper, a conceptual framework to apply many techniques for implementing lean in the high-variety low-volume (HVLV) environment is presented. Lean production has increasingly being implemented as a potential solution for many organizations. Anyway, the lean formula is applicable directly only to the make-to-stock business, but the make-to-order (MTO) product environment has to adapt lean manufacturing principle. The method of this paper has a two-phase quantitative framework to transform small and medium enterprises (SMEs) to be lean. Phase 1 has three interrelated components: (1) re-engineering an organization by using the power of computer simulation combined with business process. (2) Value stream mapping (VSM) is used to create a map of both value and waste in a given process. This tool has also a main drawback for job shop facility because many value streams are composed of hundreds of industrial parts and products. (3) Integrative supplier relationship is one of the most critical factors to maintain an advantage in the increasing levels of competition. Phase 2 performs a just in time production schedule by using ant colony optimization technique combines with a simulation tool. The aims of this paper are to develop a suitable lean manufacturing system for SMEs and to study the performance of the system for improving effectiveness. The result shows how to combine lean concept with simulation optimization, the step of this framework to obtain the optimization solution.


2020 ◽  
Vol 4 (2) ◽  
pp. 279
Author(s):  
Evie Ariadne Shinta Dewi ◽  
Nindi Aristi ◽  
Rachmaniar Rachmaniar

This article is based on the results of research which the aim is to find out how is mapping of the education information dissemination network in the community of Cintaratu village, Pangandaran district. The reason for choosing the topic was that Padjadjaran University (Unpad) campus is in the village and it is assumed that the presence of the university in the village could improve the quality of education of its people. To confirm this assumption, it is necessary to map the education sector information network. We use qualitative methods which approach is a descriptive study, the researchers conducted a mapping of educational information dissemination. The main informants of this study are the community and village officials. Data were collected through in-depth interviews, passive participatory observation, and literature studies. The finding of the research are as follows, 1) the initial mapping of educational information dissemination to the community was carried out through direct communication, namely through two major activities - recitation and celebration; 2) recitation and celebration are two activities that are susceptible to physical noise-causing information related to education not conveyed properly to the public. Effective communication does not occur in these two activities. 


2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Indra Yustian ◽  
Arum Setiawan ◽  
Doni Setiawan ◽  
Laila Hanum ◽  
Zulkifli Dahlan

Despite high attention and commitment of Indonesia in biodiversity conservation and its habitat, however, loss of biodiversity and habitat deforestation is also still high. Deforestation rate in Indonesia between period of 2000-2012 reach up 6.02 million ha, and approximately onethird of which is in Sumatra Island. As the fulfillment of CBD and Aichi targets, and in line with the mandate of the Law on the Conservation of Natural Resources and Ecosystems and IBSAP (Indonesian Biodiversity Strategy & Action Plan 2015-2020), we try to support the requires data as well as information on the current state of biodiversity. The aims are to develop an inventory system of biodiversity needed to establish baseline data on biodiversity including its conservation status in South Sumatra, develop a biodiversity monitoring system with qualitative parameters that can be used in the determination and monitoring of degradation rates of biodiversity, and the establishment of data management system and information network of fauna biodiversity in South Sumatera so that it can be utilized in monitoring and reporting of biodiversity at regional, national and international level at the international level. We conduct a comprehensive review of methods and techniques of inventory and monitoring of fauna biodiversity, especially those that have been done in the area of South Sumatra Province. We also analysis of data needs and information network of fauna biodiversity in South Sumatra. The results is shows in the web-application database, called the South Sumatran Biodiversity Information Networks, or SSBIN, and could preview at http://ssbin.unsri.ac.id/.Keywords: south sumatra, biodiversity, information, networks, SSBIN.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 293
Author(s):  
Sadhana Kodali ◽  
Madhavi Dabbiru ◽  
B Thirumala Rao

An Information Network is the network formed by the interconnectivity of the objects formed due to the interaction between them. In our day-to-day life we can find these information networks like the social media network, the network formed by the interaction of web objects etc. This paper presents a survey of various Data Mining techniques that can be applicable to information networks. The Data Mining techniques of both homogeneous and heterogeneous information networks are discussed in detail and a comparative study on each problem category is showcased.


Sign in / Sign up

Export Citation Format

Share Document