Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform...Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.展开更多
In July 2014,《International Financial Reporting Standard 9:Financial Instruments》(Referred to IFRS 9)was formally published. Compared to the former standard,《International Accounting Standard 39: Financial Instrume...In July 2014,《International Financial Reporting Standard 9:Financial Instruments》(Referred to IFRS 9)was formally published. Compared to the former standard,《International Accounting Standard 39: Financial Instruments》(Referred to IAS 39), rules of two main aspects, the classification and measurement of financial assets and the impairment model of financial assets have been changed in IFRS 9. Taking ICBC as an example, this paper studies the impact of changes in financial instruments on commercial banks. The study shows three impacts on commercial banks’ financial report. Firstly, the changes of the classification and measurement of financial assets will have limited impacts on commercial banks. Secondly, the expected-loss model will significantly increase the loan loss reserves under the new standard, thus reducing the net asset and net profit. Thirdly, the change in the measurement way of the equity instruments of available-for-sale securities will increase the fluctuation of the net profit. This study shows investors and regulators the impact of the new standard of financial instruments on commercial banks.展开更多
Industrial big data integration and sharing(IBDIS)is of great significance in managing and providing data for big data analysis in manufacturing systems.A novel fog-computing-based IBDIS approach called Fog-IBDIS is p...Industrial big data integration and sharing(IBDIS)is of great significance in managing and providing data for big data analysis in manufacturing systems.A novel fog-computing-based IBDIS approach called Fog-IBDIS is proposed in order to integrate and share industrial big data with high raw data security and low network traffic loads by moving the integration task from the cloud to the edge of networks.First,a task flow graph(TFG)is designed to model the data analysis process.The TFG is composed of several tasks,which are executed by the data owners through the Fog-IBDIS platform in order to protect raw data privacy.Second,the function of Fog-IBDIS to enable data integration and sharing is presented in five modules:TFG management,compilation and running control,the data integration model,the basic algorithm library,and the management component.Finally,a case study is presented to illustrate the implementation of Fog-IBDIS,which ensures raw data security by deploying the analysis tasks executed by the data generators,and eases the network traffic load by greatly reducing the volume of transmitted data.展开更多
Aero-engine hollow turbine blades are work under prolonged high temperature,requiring high dimensional accuracy.Blade profile and wall thickness are important parameters to ensure the comprehensive performance of blad...Aero-engine hollow turbine blades are work under prolonged high temperature,requiring high dimensional accuracy.Blade profile and wall thickness are important parameters to ensure the comprehensive performance of blades,which need to be measured accurately during manufacturing process.In this study,a high accuracy industrial computed tomography(ICT)measuring method was developed based on standard cylindrical pin and ring workpieces of different sizes.Combining ICT with cubic spline interpolation,a sub-pixel accuracy was achieved in measuring the dimension of component.Compared with the traditional and whole-pixel level image measurement method,the cubic spline interpolation algorithm has the advantages of high accuracy in image edge detection and thus high accuracy of dimensional measurement.Further,the technique was employed to measure the profile and wall thickness of a typical aerospace engine turbine blade,and an accuracy higher than 0.015 mm was obtained.展开更多
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en...Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.展开更多
Global population aging trends are intensifying,presenting multifaceted economic and social challenges for countries worldwide.As the world’s largest developing country,China has entered a phase of extreme demographi...Global population aging trends are intensifying,presenting multifaceted economic and social challenges for countries worldwide.As the world’s largest developing country,China has entered a phase of extreme demographic aging,posing significant questions about its impact on the ongoing upgrading of industrial structures.How does this demographic shift influence the upgrading of industrial structures,and does technological innovation mitigate or exacerbate this impact?The empirical results indicate that population aging impedes upgrading the industrial structure,while technological innovation positively affects the relationship between the two.Moreover,using technological innovation as a threshold variable,the impact of population aging on industrial structure upgrading evolves in a“gradient”manner from“impediment”to“insignificant”to“promotion”as the technological innovation levels increase.These findings offer practical guidance for tailoring industrial policies to different stages of technological advancement.展开更多
With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we p...With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%.展开更多
With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the i...With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy.展开更多
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde...Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskdelay and cost while ensuring the data security and reliable communicationof edge computing remains a challenge. To solve this problem, this paperestablishes a task scheduling model with joint blockchain and task cachingin the industrial internet and designs a novel blockchain-assisted cachingmechanism to enhance system security. In this paper, the task schedulingproblem, which couples the task scheduling decision, task caching decision,and blockchain reward, is formulated as the minimum weighted cost problemunder delay constraints. This is a mixed integer nonlinear problem, which isproved to be nonconvex and NP-hard. To solve the optimal solution, thispaper proposes a task scheduling strategy algorithm based on an improvedgenetic algorithm (IGA-TSPA) by improving the genetic algorithm initializationand mutation operations to reduce the size of the initial solutionspace and enhance the optimal solution convergence speed. In addition,an Improved Least Frequently Used algorithm is proposed to improve thecontent hit rate. Simulation results show that IGA-TSPA has a faster optimalsolution-solving ability and shorter running time compared with the existingedge computing scheduling algorithms. The established task scheduling modelnot only saves 62.19% of system overhead consumption in comparison withlocal computing but also has great significance in protecting data security,reducing task processing delay, and reducing system cost.展开更多
The recent increasing use of γ-rays industrial computed tomography(γ-rays ICT) in various fields has induced greater attention to its performance as well as to considerations of radiation safety. It is understood th...The recent increasing use of γ-rays industrial computed tomography(γ-rays ICT) in various fields has induced greater attention to its performance as well as to considerations of radiation safety. It is understood that radiation protection planning cannot be sacrificed for the sake of CT image quality during the design, manufacture,and layout of γ-rays ICT systems. In the present work, we describe a typical γ-rays ICT system in brief, and, based on experience and pertinent examples, we propose design requirements for ensuring the radiation safety of the sealed radioactive source, source container, and workspace. The design examples and dose rate measurement results illustrate that the proposed design standards are reasonable,feasible, and safe, and are therefore meaningful for the design, manufacture, and layout of γ-rays ICT systems. This paper discussed the predominant measures associated with the radiation protection of γ-rays ICT systems in accordance with the pertinent Chinese standards. In addition, based on experience and pertinent examples, the design requirements for ensuring the radiation safety of a sealed radioactive source, source container, and workspace were defined in detail. The design examples and dose rate measurements conducted in conjunction with a γ-rays ICT system and workspace employing the proposed design standards have illustrated that the proposals provided in this paper are reasonable, feasible, and safe, and are therefore meaningful for the design, manufacture, and layout of γ-rays ICT systems.展开更多
The development of measurement geometry for medical X-ray computed tomography (CT) scanners was carried out from the first to the fourth-generation. This concept has also been applied for imaging of industrial proce...The development of measurement geometry for medical X-ray computed tomography (CT) scanners was carried out from the first to the fourth-generation. This concept has also been applied for imaging of industrial processes such as pipe flows or for improving design, operation, optimization and troubleshooting. Nowadays, gamma CT permits to visualize failure equipment points in three-dimensional analysis and in sections of chemical and petrochemical industries. The aim of this work is the development of the mechanical system on a third-generation industrial CT scanner to analyze laboratorial process columns which perform highly efficient separation, turning the ^6oCo, ^75Se, ^137Cs and/or ^192Ir sealed gamma-ray source(s) and the NaI(Tl) multidetector array. It also has a translation movement along the column axis to obtain as many slices of the process flow as needed. The mechanical assembly for this third-generation industrial CT scanner is comprised by strength and rigidity structural frame in stainless and carbon steels, rotating table, source shield and collimator with pneumatic exposure system, spur gear system, translator, rotary stage, drives and stepper motors. The use of suitable spur gears has given a good repeatability and high accuracy in the degree of veracity. The data acquisition boards, mechanical control interfaces, software for movement control and image reconstruction were specially development. A multiphase phantom capable to be setting with solid, liquid and gas was testing. The scanner was setting for 90 views and 19 projections for each detector totalizing 11,970 projections. Experiments to determine the linear attenuation coefficients of the phantom were carried out which applied the Lambert-Beer principle. Results showed that it was possible to distinguish between the phases even the polymethylmethacrylate and the water have very similar density and linear attenuation coefficients. It was established that the newly developed third-generation fan-beam arrangement gamma scanner unit has a good spatial resolution acceptable given the size of the used phantom in this study. The tomografic reconstruction algorithm in used 60 ~ 60 pixels images was the Alternative Minimization (AM) technique and was implemented in MATLAB and VB platforms. The mechanical system presented a good performance in terms of strength, rigidity, accuracy and repeatability with great potential to be used for education or program which dedicated to training chemical and petrochemical industry professionals and for industrial process optimization in Brazil.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
The Industrial Internet is a promising technology combining industrial systems with Internet connectivity to significantly improve the product efficiency and reduce production cost by cooperating with intelligent devi...The Industrial Internet is a promising technology combining industrial systems with Internet connectivity to significantly improve the product efficiency and reduce production cost by cooperating with intelligent devices,in which the advanced computing,big data analysis and intelligent perception techniques have been involved.This paper comprehensively surveys the recent advances of the Industrial Internet,including reference architectures,key technologies,relative applications and future challenges.Reference architectures which have been proposed for different application scenarios and their corresponding characteristics are summarized.Key technologies,such as cloud computing,mobile edge computing,fog computing,which are classified according to different layers in the architecture,are presented to support a variety of applications in the Industrial Internet.Meanwhile,future challenges and research trends are discussed as well to promote further research of the Industrial Internet.展开更多
For industrial computed tomography systems, generation II scan mode has a large field of view but time consuming and generation III has a small field of view but fast. In order to realize the rapid ICT test of large ...For industrial computed tomography systems, generation II scan mode has a large field of view but time consuming and generation III has a small field of view but fast. In order to realize the rapid ICT test of large objects, a scan mode based on generation III called large field of view scan was discussed and its reconstruction algorithm based on FBP was deduced. The validity of the algorithm was verified by the results of computer simulation and experiments. Analysis showed that the effective scan field of view could be improved by more than 90% compared with that of generation III.展开更多
The exothermic efficiency of microwave heating an electrolyte/water solution is remarkably high due to the dielectric heating by orientation polarization of water and resistance heating by the Joule process occurred s...The exothermic efficiency of microwave heating an electrolyte/water solution is remarkably high due to the dielectric heating by orientation polarization of water and resistance heating by the Joule process occurred simultaneously compared with pure water.A three-dimensional finite element numerical model of multi-feed microwave heating industrial liquids continuously flowing in a meter-scale circular tube is presented.The temperature field inside the applicator tube in the cavity is solved by COMSOL Multiphysics and professional programming to describe the momentum,energy and Maxwell's equations.The evaluations of the electromagnetic field,the temperature distribution and the velocity field are simulated for the fluids dynamically heated by singleand multi-feed microwave system,respectively.Both the pilot experimental investigations and numerical results of microwave with single-feed heating for fluids with different effective permittivity and flow rates show that the presented numerical modeling makes it possible to analyze dynamic process of multi-feed microwave heating the industrial liquid.The study aids in enhancing the understanding and optimizing of dynamic process in the use of multi-feed microwave heating industrial continuous flow for a variety of material properties and technical parameters.展开更多
In order to solve the problem of internal defect detection in industry, an intelligent detection method for workpiece defect based on industrial computed tomography (CT) images is proposed. The industrial CT slice ima...In order to solve the problem of internal defect detection in industry, an intelligent detection method for workpiece defect based on industrial computed tomography (CT) images is proposed. The industrial CT slice image is preprocessed first with the combination of adaptive median filtering and adaptive weighted average filtering by analyzing the characteristics of the industrial CT slice images. Then an image segmentation algorithm based on gray change rate is used to segment low contrast information in industrial CT images, and the feature of workpiece defect is extracted by using Hu invariant moment. On this basis, the radial basis function (RBF) neural network model is established and the firefly algorithm is used for optimization, and the intelligent identification of the internal defects of the workpiece is completed. Simulation results show that this method can effectively improve the accuracy of defect identification and provide a theoretical basis for the detection of internal defects in industry.展开更多
The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0...The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0,intelligent transformation is taking place in the industrial field.As a new concept,an industrial IoT system has also attracted the attention of industry and academia.In an actual industrial scenario,a large number of devices will generate numerous industrial datasets.The computing efficiency of an industrial IoT system is greatly improved with the help of using either cloud computing or edge computing.However,privacy issues may seriously harmed interests of users.In this article,we summarize privacy issues in a cloud-or an edge-based industrial IoT system.The privacy analysis includes data privacy,location privacy,query and identity privacy.In addition,we also review privacy solutions when applying software defined network and blockchain under the above two systems.Next,we analyze the computational complexity and privacy protection performance of these solutions.Finally,we discuss open issues to facilitate further studies.展开更多
Industry 4.0 has become a reality by fusing the Industrial Internet of Things(IIoT)and Artificial Intelligence(AI),providing huge opportunities in the way manufacturing companies operate.However,the adoption of this p...Industry 4.0 has become a reality by fusing the Industrial Internet of Things(IIoT)and Artificial Intelligence(AI),providing huge opportunities in the way manufacturing companies operate.However,the adoption of this paradigm shift,particularly in the field of smart factories and production,is still in its infancy,suffering from various issues,such as the lack of high-quality data,data with high-class imbalance,or poor diversity leading to inaccurate AI models.However,data is severely fragmented across different silos owned by several parties for a range of reasons,such as compliance and legal concerns,preventing discovery and insight-driven IIoT innovation.Notably,valuable and even vital information often remains unutilized as the rise and adoption of AI and IoT in parallel with the concerns and challenges associated with privacy and security.This adversely influences interand intra-organization collaborative use of IIoT data.To tackle these challenges,this article leverages emerging multi-party technologies,privacy-enhancing techniques(e.g.,Federated Learning),and AI approaches to present a holistic,decentralized architecture to form a foundation and cradle for a cross-company collaboration platform and a federated data space to tackle the creeping fragmented data landscape.Moreover,to evaluate the efficiency of the proposed reference model,a collaborative predictive diagnostics and maintenance case study is mapped to an edge-enabled IIoT architecture.Experimental results show the potential advantages of using the proposed approach for multi-party applications accelerating sovereign data sharing through Findable,Accessible,Interoperable,and Reusable(FAIR)principles.展开更多
The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the...The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.展开更多
基金supported by the Natural Science Foundation of China (No.62171051)。
文摘Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.
文摘In July 2014,《International Financial Reporting Standard 9:Financial Instruments》(Referred to IFRS 9)was formally published. Compared to the former standard,《International Accounting Standard 39: Financial Instruments》(Referred to IAS 39), rules of two main aspects, the classification and measurement of financial assets and the impairment model of financial assets have been changed in IFRS 9. Taking ICBC as an example, this paper studies the impact of changes in financial instruments on commercial banks. The study shows three impacts on commercial banks’ financial report. Firstly, the changes of the classification and measurement of financial assets will have limited impacts on commercial banks. Secondly, the expected-loss model will significantly increase the loan loss reserves under the new standard, thus reducing the net asset and net profit. Thirdly, the change in the measurement way of the equity instruments of available-for-sale securities will increase the fluctuation of the net profit. This study shows investors and regulators the impact of the new standard of financial instruments on commercial banks.
基金This work was supported in part by the National Natural Science Foundation of China(51435009)Shanghai Sailing Program(19YF1401500)the Fundamental Research Funds for the Central Universities(2232019D3-34).
文摘Industrial big data integration and sharing(IBDIS)is of great significance in managing and providing data for big data analysis in manufacturing systems.A novel fog-computing-based IBDIS approach called Fog-IBDIS is proposed in order to integrate and share industrial big data with high raw data security and low network traffic loads by moving the integration task from the cloud to the edge of networks.First,a task flow graph(TFG)is designed to model the data analysis process.The TFG is composed of several tasks,which are executed by the data owners through the Fog-IBDIS platform in order to protect raw data privacy.Second,the function of Fog-IBDIS to enable data integration and sharing is presented in five modules:TFG management,compilation and running control,the data integration model,the basic algorithm library,and the management component.Finally,a case study is presented to illustrate the implementation of Fog-IBDIS,which ensures raw data security by deploying the analysis tasks executed by the data generators,and eases the network traffic load by greatly reducing the volume of transmitted data.
基金financially supported by the National Science and Technology Major Project "Aero Engine and Gas Turbine"(No.2017-Ⅶ-0008-0102)National Nature Science Foundation of China (No.51701112 and No.51690162)+1 种基金Shanghai Rising-Star Program (No.20QA1403800 and No.21QC1401500)Shanghai Science and Technology Committee (No.21511103600)
文摘Aero-engine hollow turbine blades are work under prolonged high temperature,requiring high dimensional accuracy.Blade profile and wall thickness are important parameters to ensure the comprehensive performance of blades,which need to be measured accurately during manufacturing process.In this study,a high accuracy industrial computed tomography(ICT)measuring method was developed based on standard cylindrical pin and ring workpieces of different sizes.Combining ICT with cubic spline interpolation,a sub-pixel accuracy was achieved in measuring the dimension of component.Compared with the traditional and whole-pixel level image measurement method,the cubic spline interpolation algorithm has the advantages of high accuracy in image edge detection and thus high accuracy of dimensional measurement.Further,the technique was employed to measure the profile and wall thickness of a typical aerospace engine turbine blade,and an accuracy higher than 0.015 mm was obtained.
基金supported by the Key-Area Research and Development Program of Guangdong Province(Grant No.2021B0909060002)National Natural Science Foundation of China(Grant Nos.62204219,62204140)+1 种基金Major Program of Natural Science Foundation of Zhejiang Province(Grant No.LDT23F0401)Thanks to Professor Zhang Yishu from Zhejiang University,Professor Gao Xu from Soochow University,and Professor Zhong Shuai from Guangdong Institute of Intelligence Science and Technology for their support。
文摘Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.
基金supported by the Research Center for Aging Career and Industrial Development,Sichuan Key Research Base of Social Sciences[Grant No.XJLL2022009].
文摘Global population aging trends are intensifying,presenting multifaceted economic and social challenges for countries worldwide.As the world’s largest developing country,China has entered a phase of extreme demographic aging,posing significant questions about its impact on the ongoing upgrading of industrial structures.How does this demographic shift influence the upgrading of industrial structures,and does technological innovation mitigate or exacerbate this impact?The empirical results indicate that population aging impedes upgrading the industrial structure,while technological innovation positively affects the relationship between the two.Moreover,using technological innovation as a threshold variable,the impact of population aging on industrial structure upgrading evolves in a“gradient”manner from“impediment”to“insignificant”to“promotion”as the technological innovation levels increase.These findings offer practical guidance for tailoring industrial policies to different stages of technological advancement.
基金supported by the National Natural Science Foundation of China(No.62171051)。
文摘With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%.
基金supported in part by the National Natural Science Foundation of China under Grant No. 62172445in part by the Young Talents Plan of Hunan Province,China
文摘With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy.
基金supported by theCommunication Soft Science Program of Ministry of Industry and Information Technology of China (No.2022-R-43)the Natural Science Basic Research Program of Shaanxi (No.2021JQ-719)Graduate Innovation Fund of Xi’an University of Posts and Telecommunications (No.CXJJZL2021014).
文摘Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskdelay and cost while ensuring the data security and reliable communicationof edge computing remains a challenge. To solve this problem, this paperestablishes a task scheduling model with joint blockchain and task cachingin the industrial internet and designs a novel blockchain-assisted cachingmechanism to enhance system security. In this paper, the task schedulingproblem, which couples the task scheduling decision, task caching decision,and blockchain reward, is formulated as the minimum weighted cost problemunder delay constraints. This is a mixed integer nonlinear problem, which isproved to be nonconvex and NP-hard. To solve the optimal solution, thispaper proposes a task scheduling strategy algorithm based on an improvedgenetic algorithm (IGA-TSPA) by improving the genetic algorithm initializationand mutation operations to reduce the size of the initial solutionspace and enhance the optimal solution convergence speed. In addition,an Improved Least Frequently Used algorithm is proposed to improve thecontent hit rate. Simulation results show that IGA-TSPA has a faster optimalsolution-solving ability and shorter running time compared with the existingedge computing scheduling algorithms. The established task scheduling modelnot only saves 62.19% of system overhead consumption in comparison withlocal computing but also has great significance in protecting data security,reducing task processing delay, and reducing system cost.
文摘The recent increasing use of γ-rays industrial computed tomography(γ-rays ICT) in various fields has induced greater attention to its performance as well as to considerations of radiation safety. It is understood that radiation protection planning cannot be sacrificed for the sake of CT image quality during the design, manufacture,and layout of γ-rays ICT systems. In the present work, we describe a typical γ-rays ICT system in brief, and, based on experience and pertinent examples, we propose design requirements for ensuring the radiation safety of the sealed radioactive source, source container, and workspace. The design examples and dose rate measurement results illustrate that the proposed design standards are reasonable,feasible, and safe, and are therefore meaningful for the design, manufacture, and layout of γ-rays ICT systems. This paper discussed the predominant measures associated with the radiation protection of γ-rays ICT systems in accordance with the pertinent Chinese standards. In addition, based on experience and pertinent examples, the design requirements for ensuring the radiation safety of a sealed radioactive source, source container, and workspace were defined in detail. The design examples and dose rate measurements conducted in conjunction with a γ-rays ICT system and workspace employing the proposed design standards have illustrated that the proposals provided in this paper are reasonable, feasible, and safe, and are therefore meaningful for the design, manufacture, and layout of γ-rays ICT systems.
文摘The development of measurement geometry for medical X-ray computed tomography (CT) scanners was carried out from the first to the fourth-generation. This concept has also been applied for imaging of industrial processes such as pipe flows or for improving design, operation, optimization and troubleshooting. Nowadays, gamma CT permits to visualize failure equipment points in three-dimensional analysis and in sections of chemical and petrochemical industries. The aim of this work is the development of the mechanical system on a third-generation industrial CT scanner to analyze laboratorial process columns which perform highly efficient separation, turning the ^6oCo, ^75Se, ^137Cs and/or ^192Ir sealed gamma-ray source(s) and the NaI(Tl) multidetector array. It also has a translation movement along the column axis to obtain as many slices of the process flow as needed. The mechanical assembly for this third-generation industrial CT scanner is comprised by strength and rigidity structural frame in stainless and carbon steels, rotating table, source shield and collimator with pneumatic exposure system, spur gear system, translator, rotary stage, drives and stepper motors. The use of suitable spur gears has given a good repeatability and high accuracy in the degree of veracity. The data acquisition boards, mechanical control interfaces, software for movement control and image reconstruction were specially development. A multiphase phantom capable to be setting with solid, liquid and gas was testing. The scanner was setting for 90 views and 19 projections for each detector totalizing 11,970 projections. Experiments to determine the linear attenuation coefficients of the phantom were carried out which applied the Lambert-Beer principle. Results showed that it was possible to distinguish between the phases even the polymethylmethacrylate and the water have very similar density and linear attenuation coefficients. It was established that the newly developed third-generation fan-beam arrangement gamma scanner unit has a good spatial resolution acceptable given the size of the used phantom in this study. The tomografic reconstruction algorithm in used 60 ~ 60 pixels images was the Alternative Minimization (AM) technique and was implemented in MATLAB and VB platforms. The mechanical system presented a good performance in terms of strength, rigidity, accuracy and repeatability with great potential to be used for education or program which dedicated to training chemical and petrochemical industry professionals and for industrial process optimization in Brazil.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
基金the State Major Science and Technology Special Projects(Grant 2018ZX03001023-005)the National Natural Science Foundation of China under Grant No.61831002,61728101,and 61671074the Beijing Natural Science Foundation under Grant No.JQ18016.
文摘The Industrial Internet is a promising technology combining industrial systems with Internet connectivity to significantly improve the product efficiency and reduce production cost by cooperating with intelligent devices,in which the advanced computing,big data analysis and intelligent perception techniques have been involved.This paper comprehensively surveys the recent advances of the Industrial Internet,including reference architectures,key technologies,relative applications and future challenges.Reference architectures which have been proposed for different application scenarios and their corresponding characteristics are summarized.Key technologies,such as cloud computing,mobile edge computing,fog computing,which are classified according to different layers in the architecture,are presented to support a variety of applications in the Industrial Internet.Meanwhile,future challenges and research trends are discussed as well to promote further research of the Industrial Internet.
文摘For industrial computed tomography systems, generation II scan mode has a large field of view but time consuming and generation III has a small field of view but fast. In order to realize the rapid ICT test of large objects, a scan mode based on generation III called large field of view scan was discussed and its reconstruction algorithm based on FBP was deduced. The validity of the algorithm was verified by the results of computer simulation and experiments. Analysis showed that the effective scan field of view could be improved by more than 90% compared with that of generation III.
基金Project(KKSY201503006)supported by Scientific Research Foundation of Kunming University of Science and Technology,ChinaProject(2014FD009)supported by the Applied Basic Research Foundation(Youth Program)of ChinaProject(51090385)supported by the National Natural Science Foundation of China
文摘The exothermic efficiency of microwave heating an electrolyte/water solution is remarkably high due to the dielectric heating by orientation polarization of water and resistance heating by the Joule process occurred simultaneously compared with pure water.A three-dimensional finite element numerical model of multi-feed microwave heating industrial liquids continuously flowing in a meter-scale circular tube is presented.The temperature field inside the applicator tube in the cavity is solved by COMSOL Multiphysics and professional programming to describe the momentum,energy and Maxwell's equations.The evaluations of the electromagnetic field,the temperature distribution and the velocity field are simulated for the fluids dynamically heated by singleand multi-feed microwave system,respectively.Both the pilot experimental investigations and numerical results of microwave with single-feed heating for fluids with different effective permittivity and flow rates show that the presented numerical modeling makes it possible to analyze dynamic process of multi-feed microwave heating the industrial liquid.The study aids in enhancing the understanding and optimizing of dynamic process in the use of multi-feed microwave heating industrial continuous flow for a variety of material properties and technical parameters.
基金Science and Technology Plan Project of Lanzhou City(No.2014-2-7)
文摘In order to solve the problem of internal defect detection in industry, an intelligent detection method for workpiece defect based on industrial computed tomography (CT) images is proposed. The industrial CT slice image is preprocessed first with the combination of adaptive median filtering and adaptive weighted average filtering by analyzing the characteristics of the industrial CT slice images. Then an image segmentation algorithm based on gray change rate is used to segment low contrast information in industrial CT images, and the feature of workpiece defect is extracted by using Hu invariant moment. On this basis, the radial basis function (RBF) neural network model is established and the firefly algorithm is used for optimization, and the intelligent identification of the internal defects of the workpiece is completed. Simulation results show that this method can effectively improve the accuracy of defect identification and provide a theoretical basis for the detection of internal defects in industry.
基金the National Natural Science Foundation of China(Grant No.61871023 and 61931001)Beijing Natural Science Foundation(Grant No.4202054).
文摘The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0,intelligent transformation is taking place in the industrial field.As a new concept,an industrial IoT system has also attracted the attention of industry and academia.In an actual industrial scenario,a large number of devices will generate numerous industrial datasets.The computing efficiency of an industrial IoT system is greatly improved with the help of using either cloud computing or edge computing.However,privacy issues may seriously harmed interests of users.In this article,we summarize privacy issues in a cloud-or an edge-based industrial IoT system.The privacy analysis includes data privacy,location privacy,query and identity privacy.In addition,we also review privacy solutions when applying software defined network and blockchain under the above two systems.Next,we analyze the computational complexity and privacy protection performance of these solutions.Finally,we discuss open issues to facilitate further studies.
文摘Industry 4.0 has become a reality by fusing the Industrial Internet of Things(IIoT)and Artificial Intelligence(AI),providing huge opportunities in the way manufacturing companies operate.However,the adoption of this paradigm shift,particularly in the field of smart factories and production,is still in its infancy,suffering from various issues,such as the lack of high-quality data,data with high-class imbalance,or poor diversity leading to inaccurate AI models.However,data is severely fragmented across different silos owned by several parties for a range of reasons,such as compliance and legal concerns,preventing discovery and insight-driven IIoT innovation.Notably,valuable and even vital information often remains unutilized as the rise and adoption of AI and IoT in parallel with the concerns and challenges associated with privacy and security.This adversely influences interand intra-organization collaborative use of IIoT data.To tackle these challenges,this article leverages emerging multi-party technologies,privacy-enhancing techniques(e.g.,Federated Learning),and AI approaches to present a holistic,decentralized architecture to form a foundation and cradle for a cross-company collaboration platform and a federated data space to tackle the creeping fragmented data landscape.Moreover,to evaluate the efficiency of the proposed reference model,a collaborative predictive diagnostics and maintenance case study is mapped to an edge-enabled IIoT architecture.Experimental results show the potential advantages of using the proposed approach for multi-party applications accelerating sovereign data sharing through Findable,Accessible,Interoperable,and Reusable(FAIR)principles.
文摘The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.