Development of a virtual manufacturing framework: from end-user performance requirements to robot competitions

2008 ◽  
Author(s):  
Stephen Balakirsky ◽  
Raj Madhavan ◽  
Christopher Scrapper
IEEE Micro ◽  
1993 ◽  
Vol 13 (5) ◽  
pp. 79-89 ◽  
Author(s):  
S.W. White ◽  
P.D. Hester ◽  
J.W. Kemp ◽  
G.J. McWilliams

2017 ◽  
Vol 17 (2) ◽  
pp. 185-196
Author(s):  
Mario Scalas ◽  
Palmalisa Marra ◽  
Luca Tedesco ◽  
Raffaele Quarta ◽  
Emanuele Cantoro ◽  
...  

Abstract. This article describes the architecture of sea situational awareness (SSA) platform, a major asset within TESSA, an industrial research project funded by the Italian Ministry of Education and Research. The main aim of the platform is to collect, transform and provide forecast and observational data as information suitable for delivery across a variety of channels, like web and mobile; specifically, the ability to produce and provide forecast information suitable for creating SSA-enabled applications has been a critical driving factor when designing and evolving the whole architecture. Thus, starting from functional and performance requirements, the platform architecture is described in terms of its main building blocks and flows among them: front-end components that support end-user applications and map and data analysis components that allow for serving maps and querying data. Focus is directed to key aspects and decisions about the main issues faced, like interoperability, scalability, efficiency and adaptability, but it also considers insights about future works in this and similarly related subjects. Some analysis results are also provided in order to better characterize critical issues and related solutions.


IEEE Micro ◽  
1993 ◽  
Vol 13 (4) ◽  
pp. 8-16 ◽  
Author(s):  
S.W. White ◽  
P.D. Hester ◽  
J.W. Kemp ◽  
G.J. McWilliams

Author(s):  
Saba Al-Rubaye ◽  
John Cosmas

This chapter studies the application of femtocells as part of the future cognitive 4G networks. It starts with a demonstration for the evolution of cellular and wireless networks. The developing technology that leads towards a converged LTE-Femtocell wireless environment is described in detail. The chapter presents the key challenges of deploying cognitive femtocell in the macrocell networks. As spectrum utilisation management is the main concern in the future network, the main models for spectrum allocation used to provide enough bandwidth to the femtocell in coexistence with the LTE systems are incorporated for further investigation. In addition, the Quality of Service (QoS) provisioning and the main approaches for measuring end user performance are given as function small range transmission domains. The requirement of an effective mobility management solution in such systems is analysed for future development. The chapter is concluded with a summary.


2021 ◽  
Author(s):  
Jasmina McMenamy ◽  
Thomas Haustein ◽  
Irene Macaluso

Integrated access and bachhaul (IAB), introduced in 3GPP Release 16, is expected to be one of the main enablers for dense deployments in mmWave spectrum. The IAB architecture brings in topology changes, which impact network-related aspects, such as ensuring robust routing of traffic and load-balancing. While an IAB network should be transparent to the UE, its topology design may affect the end-user performance. Of particular importance in these first releases, hence, is to determine and evaluate optimal IAB topologies. This paper addresses optimal organisation of IAB nodes by considering a number of inter-connected aspects, including maximum number of hops, path-length, load balancing between the IAB-donors and traffic demand in the access network. In that, we focus on one of the parameters most sensitive to the architectural changes in the network - delay. Our analysis relies on the connectivity graph obtained by considering some practical aspects of sectorised beamforming using real mmWave antenna patterns.


1992 ◽  
Vol 3 (4) ◽  
pp. 4-16 ◽  
Author(s):  
Prashant Palvia ◽  
Chechen Liao ◽  
Pui-Lai To

2008 ◽  
pp. 2266-2273
Author(s):  
I. M. Jawahar

Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Sign in / Sign up

Export Citation Format

Share Document