首页 > 最新文献

Journal of Computing and Information Science in Engineering最新文献

英文 中文
Vector Field Based Volume Peeling for Multi-Axis Machining 基于矢量场的多轴加工体剥离
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-20 DOI: 10.1115/1.4063861
Neelotpal Dutta, Tianyu Zhang, Guoxin Fang, Ismail E. Yigit, Charlie C.L. Wang
Abstract This paper presents an easy-to-control volume peeling method for multi-axis machining based on the computation taken on vector fields. The current scalar field based methods are not flexible and the vector-field based methods do not guarantee the satisfaction of the constraints in the final results. We first conduct an optimization formulation to compute an initial vector field that is well aligned with those anchor vectors specified by users according to different manufacturing requirements. The vector field is further optimized to be an irrotational field so that it can be completely realized by a scalar field's gradients. Iso-surfaces of the scalar field will be employed as the layers of working surfaces for multi-axis volume peeling in the rough machining. Algorithms are also developed to remove and process singularities of the fields. Our method has been tested on a variety of models and verified by physical experimental machining.
摘要提出了一种基于向量场计算的易控制的多轴加工体积剥离方法。目前基于标量场的方法缺乏灵活性,基于向量场的方法不能保证最终结果满足约束条件。我们首先进行优化公式计算初始向量场,该初始向量场与用户根据不同制造要求指定的锚向量对齐良好。将矢量场进一步优化为无旋转场,完全可以通过标量场的梯度来实现。在粗加工中,将标量场的等曲面作为多轴体剥离的工作表面层。此外,还开发了去除和处理奇异场的算法。我们的方法已经在多种模型上进行了测试,并通过物理实验加工进行了验证。
{"title":"Vector Field Based Volume Peeling for Multi-Axis Machining","authors":"Neelotpal Dutta, Tianyu Zhang, Guoxin Fang, Ismail E. Yigit, Charlie C.L. Wang","doi":"10.1115/1.4063861","DOIUrl":"https://doi.org/10.1115/1.4063861","url":null,"abstract":"Abstract This paper presents an easy-to-control volume peeling method for multi-axis machining based on the computation taken on vector fields. The current scalar field based methods are not flexible and the vector-field based methods do not guarantee the satisfaction of the constraints in the final results. We first conduct an optimization formulation to compute an initial vector field that is well aligned with those anchor vectors specified by users according to different manufacturing requirements. The vector field is further optimized to be an irrotational field so that it can be completely realized by a scalar field's gradients. Iso-surfaces of the scalar field will be employed as the layers of working surfaces for multi-axis volume peeling in the rough machining. Algorithms are also developed to remove and process singularities of the fields. Our method has been tested on a variety of models and verified by physical experimental machining.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue: Challenges and Opportunities in Computing Research to Enable Next-Generation Engineering Applications 特刊:计算研究的挑战与机遇,以实现下一代工程应用
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-19 DOI: 10.1115/1.4063437
Janet K. Allen, Ehsan T Esfahani, Satyandra K. Gupta, Balan Gurumoorthy, Bin He, Ying Liu, John Michopoulos, Jitesh H. Panchal, Anurag Purwar, Kristina Wärmefjord
Recent advances in computing and information science such as artificial intelligence (AI), machine learning (ML), edge computing, cloud computing, metacomputing, and quantum computing are creating new computing paradigms. These advances are providing new opportunities for new research and application development. For instance, the adoption of Industry 4.0 enabled by AI/ML is fundamentally changing how products are designed, manufactured, maintained, and recycled. It enables consideration of all aspects of the product life cycle and realizing sustainable designs and helps us in achieving carbon neutrality. Intelligent machines such as robots and autonomous vehicles are revolutionizing human–machine interactions and increasing digitalization in the manufacturing and transportation industries. It is important for the Journal of Computing and Information Science in Engineering (JCISE) community to identify challenges and opportunities in these emerging areas and inspire new researchers to join the field and become a part of the community. This Special Issue consists of 19 position papers that span a wide variety of topics of interest to the JCISE community. These position papers identify challenges and opportunities, outline new areas of research, and point out new applications that will be enabled by advances in this field.
人工智能(AI)、机器学习(ML)、边缘计算、云计算、元计算和量子计算等计算和信息科学的最新进展正在创造新的计算范式。这些进步为新的研究和应用开发提供了新的机会。例如,由AI/ML实现的工业4.0的采用从根本上改变了产品的设计、制造、维护和回收方式。它可以考虑产品生命周期的各个方面,实现可持续设计,并帮助我们实现碳中和。机器人和自动驾驶汽车等智能机器正在彻底改变人机交互,并提高制造业和运输业的数字化程度。对于工程计算与信息科学杂志(JCISE)社区来说,识别这些新兴领域的挑战和机遇并激励新的研究人员加入该领域并成为社区的一部分是非常重要的。本期特刊由19篇立场论文组成,涵盖了jise社区感兴趣的各种主题。这些立场文件确定了挑战和机遇,概述了新的研究领域,并指出了该领域的进步将使新的应用成为可能。
{"title":"Special Issue: Challenges and Opportunities in Computing Research to Enable Next-Generation Engineering Applications","authors":"Janet K. Allen, Ehsan T Esfahani, Satyandra K. Gupta, Balan Gurumoorthy, Bin He, Ying Liu, John Michopoulos, Jitesh H. Panchal, Anurag Purwar, Kristina Wärmefjord","doi":"10.1115/1.4063437","DOIUrl":"https://doi.org/10.1115/1.4063437","url":null,"abstract":"Recent advances in computing and information science such as artificial intelligence (AI), machine learning (ML), edge computing, cloud computing, metacomputing, and quantum computing are creating new computing paradigms. These advances are providing new opportunities for new research and application development. For instance, the adoption of Industry 4.0 enabled by AI/ML is fundamentally changing how products are designed, manufactured, maintained, and recycled. It enables consideration of all aspects of the product life cycle and realizing sustainable designs and helps us in achieving carbon neutrality. Intelligent machines such as robots and autonomous vehicles are revolutionizing human–machine interactions and increasing digitalization in the manufacturing and transportation industries. It is important for the Journal of Computing and Information Science in Engineering (JCISE) community to identify challenges and opportunities in these emerging areas and inspire new researchers to join the field and become a part of the community. This Special Issue consists of 19 position papers that span a wide variety of topics of interest to the JCISE community. These position papers identify challenges and opportunities, outline new areas of research, and point out new applications that will be enabled by advances in this field.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135667429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ImpersonatAR: Using Embodied Authoring and Evaluation to Prototype Multi-Scenario Use cases for Augmented Reality Applications 使用嵌入创作和评估原型多场景用例增强现实应用
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-19 DOI: 10.1115/1.4063558
Meng-Han Wu, Ananya Ipsita, Gaoping Huang, Karthik Ramani, Alexander J Quinn
Abstract Prototyping use cases for augmented reality (AR) applications can be beneficial to elicit the functional requirements of the features early-on, to drive the subsequent development in a goal-oriented manner. Doing so would require designers to identify the goal-oriented interactions and map the associations between those interactions in a spatio-temporal context. Pertaining to the multiple scenarios that may result from the mapping, and the embodied nature of the interaction components, recent AR prototyping methods lack the support to adequately capture and communicate the intent of designers and stakeholders during this process. We present ImpersonatAR, a mobile-device-based prototyping tool that utilizes embodied demonstrations in the augmented environment to support prototyping and evaluation of multi-scenario AR use cases. The approach uses: (1) capturing events or steps in the form of embodied demonstrations using avatars and 3D animations, (2) organizing events and steps to compose multi-scenario experience, and finally (3) allowing stakeholders to explore the scenarios through interactive role-play with the prototypes. We conducted a user study with ten participants to prototype use cases using ImpersonatAR from two different AR application features. Results validated that ImpersonatAR promotes exploration and evaluation of diverse design possibilities of multi-scenario AR use cases through embodied representations of the different scenarios.
增强现实(AR)应用程序的原型化用例有助于在早期引出特性的功能需求,以面向目标的方式驱动后续开发。要做到这一点,设计师需要识别目标导向的交互,并在时空背景下绘制出这些交互之间的关联。与映射可能导致的多种场景有关,以及交互组件的具体化性质,最近的AR原型方法在此过程中缺乏对充分捕获和传达设计师和利益相关者意图的支持。我们介绍了ImpersonatAR,一个基于移动设备的原型工具,它利用增强环境中的具体化演示来支持多场景AR用例的原型和评估。该方法使用:(1)使用化身和3D动画以体现演示的形式捕获事件或步骤,(2)组织事件和步骤以组成多场景体验,最后(3)允许利益相关者通过与原型的交互式角色扮演来探索场景。我们对10名参与者进行了一项用户研究,使用来自两个不同AR应用程序特性的ImpersonatAR对用例进行原型化。结果证实,ImpersonatAR通过对不同场景的具体表示,促进了对多场景AR用例的各种设计可能性的探索和评估。
{"title":"ImpersonatAR: Using Embodied Authoring and Evaluation to Prototype Multi-Scenario Use cases for Augmented Reality Applications","authors":"Meng-Han Wu, Ananya Ipsita, Gaoping Huang, Karthik Ramani, Alexander J Quinn","doi":"10.1115/1.4063558","DOIUrl":"https://doi.org/10.1115/1.4063558","url":null,"abstract":"Abstract Prototyping use cases for augmented reality (AR) applications can be beneficial to elicit the functional requirements of the features early-on, to drive the subsequent development in a goal-oriented manner. Doing so would require designers to identify the goal-oriented interactions and map the associations between those interactions in a spatio-temporal context. Pertaining to the multiple scenarios that may result from the mapping, and the embodied nature of the interaction components, recent AR prototyping methods lack the support to adequately capture and communicate the intent of designers and stakeholders during this process. We present ImpersonatAR, a mobile-device-based prototyping tool that utilizes embodied demonstrations in the augmented environment to support prototyping and evaluation of multi-scenario AR use cases. The approach uses: (1) capturing events or steps in the form of embodied demonstrations using avatars and 3D animations, (2) organizing events and steps to compose multi-scenario experience, and finally (3) allowing stakeholders to explore the scenarios through interactive role-play with the prototypes. We conducted a user study with ten participants to prototype use cases using ImpersonatAR from two different AR application features. Results validated that ImpersonatAR promotes exploration and evaluation of diverse design possibilities of multi-scenario AR use cases through embodied representations of the different scenarios.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135667118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep convolutional neural network-based method for self-piercing rivet joint defect detection 基于深度卷积神经网络的自穿孔铆钉接头缺陷检测方法
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-12 DOI: 10.1115/1.4063748
Zhao Lun, Sen Lin, YunLong Pang, HaiBo Wang, Zeshan Abbas, ZiXin Guo, XiaoLe Huo, Seng Wang
Abstract The self-pierce riveting process for alloy materials has a wide range of applications in the automotive manufacturing industry. This will not only affect the operation performance, but also cause accidents in severe cases when there are defects in the riveted parts. A deep learning detection model is proposed that integrates atrous convolution and dynamic convolution to identify defects of self-piercing riveting parts efficiently to overcome the problem in quality inspection after the body self-piercing riveting process. Firstly, a backbone network for extracting riveting defect features is constructed based on the ResNet network. Secondly, the center area of each riveting defect is located preferentially by the center point detection algorithm. Finally, the bounding box of riveting defects is regressed to achieve defect detection based on this central region. Among them, atrous convolution is used in the external network to increase the receptive field of the model, which combined with an active convolution so that a dynamic atrous convolution module is designed. This module is used to enhance the correlation between feature points of individual pixel in the image, which helps to identify defects with incomplete image edges and suppress background interference. Ablation experiments show that the proposed method achieves the highest accuracy of 95.7%, which is 3.6% higher than the original method. It is found that the proposed method is less affected by the background interference from the qualitative comparison. Moreover, it can also effectively identify the riveting defects on the surface of each area.
合金材料的自刺铆接工艺在汽车制造业中有着广泛的应用。这不仅会影响操作性能,严重时铆接件存在缺陷时还会造成事故。针对车身自穿孔铆接后的质量检测问题,提出了一种融合了动态卷积和动态卷积的深度学习检测模型,有效地识别自穿孔铆接零件的缺陷。首先,基于ResNet网络构建铆接缺陷特征提取骨干网络;其次,利用中心点检测算法优先定位各铆接缺陷的中心区;最后,对铆接缺陷的边界框进行回归,实现基于该中心区域的缺陷检测。其中,在外网络中使用亚属性卷积来增加模型的接受野,并结合主动卷积设计了动态亚属性卷积模块。该模块用于增强图像中单个像素特征点之间的相关性,有助于识别图像边缘不完整的缺陷,抑制背景干扰。烧蚀实验表明,该方法达到了95.7%的最高精度,比原方法提高了3.6%。定性比较表明,该方法受背景干扰的影响较小。此外,它还可以有效地识别各个区域表面的铆接缺陷。
{"title":"A deep convolutional neural network-based method for self-piercing rivet joint defect detection","authors":"Zhao Lun, Sen Lin, YunLong Pang, HaiBo Wang, Zeshan Abbas, ZiXin Guo, XiaoLe Huo, Seng Wang","doi":"10.1115/1.4063748","DOIUrl":"https://doi.org/10.1115/1.4063748","url":null,"abstract":"Abstract The self-pierce riveting process for alloy materials has a wide range of applications in the automotive manufacturing industry. This will not only affect the operation performance, but also cause accidents in severe cases when there are defects in the riveted parts. A deep learning detection model is proposed that integrates atrous convolution and dynamic convolution to identify defects of self-piercing riveting parts efficiently to overcome the problem in quality inspection after the body self-piercing riveting process. Firstly, a backbone network for extracting riveting defect features is constructed based on the ResNet network. Secondly, the center area of each riveting defect is located preferentially by the center point detection algorithm. Finally, the bounding box of riveting defects is regressed to achieve defect detection based on this central region. Among them, atrous convolution is used in the external network to increase the receptive field of the model, which combined with an active convolution so that a dynamic atrous convolution module is designed. This module is used to enhance the correlation between feature points of individual pixel in the image, which helps to identify defects with incomplete image edges and suppress background interference. Ablation experiments show that the proposed method achieves the highest accuracy of 95.7%, which is 3.6% higher than the original method. It is found that the proposed method is less affected by the background interference from the qualitative comparison. Moreover, it can also effectively identify the riveting defects on the surface of each area.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135969737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving Neural Networks for Smart Manufacturing 面向智能制造的隐私保护神经网络
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.1115/1.4063728
Hankang Lee, Daniel Finke, Hui Yang
Abstract The rapid advance in sensing technology has expedited data-driven innovation in manufacturing by allowing the collection of large amounts of data from factories. Big data provides an unprecedented opportunity for smart decision-making in the manufacturing process. However, they also attract cyberattacks due to the value of sensitive information. A cyberattack on manufacturing big data can lead to a significant loss of profits and unprecedented business disruption. Moreover, the increasing use of artificial intelligence (AI) in smart factories means that manufacturing equipment is now vulnerable to cyberattacks, posing a critical threat to smart manufacturing systems. Therefore, there is an urgent need to develop AI models that incorporate privacy-preserving methods to protect sensitive information implicit in the models against model inversion attacks. Hence this paper presents the development of a new approach called Mosaic Neuron Perturbation (MNP) to preserve latent information in the framework of the AI model, ensuring differential privacy requirements while mitigating the risk of model inversion attacks. MNP is flexible to implement into AI models, enabling a trade-off between model performance and robustness against cyberattacks while being highly scalable for large-scale computing. Experimental results, based on real-world manufacturing data collected from the CNC turning process, demonstrate that the proposed method significantly improves the prevention of inversion attacks while maintaining high prediction performance. The MNP method shows strong potential for making manufacturing systems both smart and secure by addressing the risk of data breaches while preserving the quality of AI models.
传感技术的快速发展通过允许从工厂收集大量数据,加速了数据驱动的制造业创新。大数据为制造过程中的智能决策提供了前所未有的机会。然而,由于敏感信息的价值,它们也吸引了网络攻击。针对制造业大数据的网络攻击可能导致重大利润损失和前所未有的业务中断。此外,在智能工厂中越来越多地使用人工智能(AI)意味着制造设备现在容易受到网络攻击,对智能制造系统构成严重威胁。因此,迫切需要开发包含隐私保护方法的人工智能模型,以保护模型中隐含的敏感信息免受模型反转攻击。因此,本文提出了一种称为马赛克神经元摄动(MNP)的新方法,以在人工智能模型框架中保留潜在信息,确保不同的隐私要求,同时降低模型反演攻击的风险。MNP可以灵活地实现到人工智能模型中,在模型性能和抗网络攻击的鲁棒性之间实现权衡,同时在大规模计算中具有高度可扩展性。基于CNC车削过程的真实制造数据的实验结果表明,该方法在保持较高预测性能的同时,显著提高了对反转攻击的预防能力。MNP方法显示出强大的潜力,通过解决数据泄露的风险,同时保持人工智能模型的质量,使制造系统既智能又安全。
{"title":"Privacy-preserving Neural Networks for Smart Manufacturing","authors":"Hankang Lee, Daniel Finke, Hui Yang","doi":"10.1115/1.4063728","DOIUrl":"https://doi.org/10.1115/1.4063728","url":null,"abstract":"Abstract The rapid advance in sensing technology has expedited data-driven innovation in manufacturing by allowing the collection of large amounts of data from factories. Big data provides an unprecedented opportunity for smart decision-making in the manufacturing process. However, they also attract cyberattacks due to the value of sensitive information. A cyberattack on manufacturing big data can lead to a significant loss of profits and unprecedented business disruption. Moreover, the increasing use of artificial intelligence (AI) in smart factories means that manufacturing equipment is now vulnerable to cyberattacks, posing a critical threat to smart manufacturing systems. Therefore, there is an urgent need to develop AI models that incorporate privacy-preserving methods to protect sensitive information implicit in the models against model inversion attacks. Hence this paper presents the development of a new approach called Mosaic Neuron Perturbation (MNP) to preserve latent information in the framework of the AI model, ensuring differential privacy requirements while mitigating the risk of model inversion attacks. MNP is flexible to implement into AI models, enabling a trade-off between model performance and robustness against cyberattacks while being highly scalable for large-scale computing. Experimental results, based on real-world manufacturing data collected from the CNC turning process, demonstrate that the proposed method significantly improves the prevention of inversion attacks while maintaining high prediction performance. The MNP method shows strong potential for making manufacturing systems both smart and secure by addressing the risk of data breaches while preserving the quality of AI models.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136296155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Behavioral Modeling of Collaborative Problem Solving in Multiplayer Virtual Reality Manufacturing Simulation Games 多人虚拟现实制造仿真游戏中协同问题解决的行为建模
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.1115/1.4063089
Haedong Kim, Tyler Hartleb, Khalid Bello, Faisal Aqlan, Richard Zhao, Hui Yang
Abstract Engineering is an inherently creative and collaborative endeavor to solve real-world problems, in which collaborative problem solving (CPS) is considered one of the most critical professional skills. Hands-on practices and assessment methods are essential to promote deeper learning and foster the development of professional skills. However, most existing approaches are based on out-of-process procedures such as surveys, tests, or interviews that measure the effectiveness of learning activity in an aggregated way. It is desirable to quantify CPS dynamics during the learning process. Advancements in virtual reality (VR) provide great opportunities to realize digital learning environments to facilitate a learning-by-doing curriculum. In addition, sensors in VR systems allow us to collect in-process user behavioral data. This paper presents a multiplayer VR manufacturing simulation game for virtual hands-on learning experiences, as well as a behavioral modeling method for monitoring the CPS skills of participants. First, we developed the Virtual Learning Factory, where users play simulation games of various manufacturing paradigms. Second, we collected action logs from a sample of participants and used the same pattern to generate more data. Third, the behavioral data are modeled as dynamic networks for each player. Last, network features are calculated, and a CPS scoring method is driven from them. Experimental results show that the proposed behavioral modeling successfully captures different patterns of CPS dynamics according to manufacturing paradigms and individuals. This detailed assessment contributes to the development of appropriate student-specific interventions to improve learning outcomes.
工程本质上是一门创造性和协作性的学科,旨在解决现实世界中的问题,协作解决问题(CPS)被认为是最关键的专业技能之一。动手实践和评估方法对于促进深入学习和促进专业技能的发展至关重要。然而,大多数现有的方法都是基于进程外的过程,如调查、测试或访谈,这些过程以聚合的方式衡量学习活动的有效性。在学习过程中量化CPS动态是可取的。虚拟现实(VR)的进步为实现数字化学习环境提供了巨大的机会,以促进边做边学的课程。此外,VR系统中的传感器允许我们收集进程中的用户行为数据。本文提出了一种多人虚拟现实制造模拟游戏,用于虚拟动手学习体验,以及一种用于监测参与者CPS技能的行为建模方法。首先,我们开发了虚拟学习工厂,用户可以在其中玩各种制造范式的模拟游戏。其次,我们从参与者样本中收集操作日志,并使用相同的模式生成更多数据。第三,将行为数据建模为每个玩家的动态网络。最后,计算网络特征,并以此驱动CPS评分方法。实验结果表明,所提出的行为模型成功地捕获了不同制造范式和个体的CPS动态模式。这种详细的评估有助于制定适当的针对学生的干预措施,以改善学习成果。
{"title":"Behavioral Modeling of Collaborative Problem Solving in Multiplayer Virtual Reality Manufacturing Simulation Games","authors":"Haedong Kim, Tyler Hartleb, Khalid Bello, Faisal Aqlan, Richard Zhao, Hui Yang","doi":"10.1115/1.4063089","DOIUrl":"https://doi.org/10.1115/1.4063089","url":null,"abstract":"Abstract Engineering is an inherently creative and collaborative endeavor to solve real-world problems, in which collaborative problem solving (CPS) is considered one of the most critical professional skills. Hands-on practices and assessment methods are essential to promote deeper learning and foster the development of professional skills. However, most existing approaches are based on out-of-process procedures such as surveys, tests, or interviews that measure the effectiveness of learning activity in an aggregated way. It is desirable to quantify CPS dynamics during the learning process. Advancements in virtual reality (VR) provide great opportunities to realize digital learning environments to facilitate a learning-by-doing curriculum. In addition, sensors in VR systems allow us to collect in-process user behavioral data. This paper presents a multiplayer VR manufacturing simulation game for virtual hands-on learning experiences, as well as a behavioral modeling method for monitoring the CPS skills of participants. First, we developed the Virtual Learning Factory, where users play simulation games of various manufacturing paradigms. Second, we collected action logs from a sample of participants and used the same pattern to generate more data. Third, the behavioral data are modeled as dynamic networks for each player. Last, network features are calculated, and a CPS scoring method is driven from them. Experimental results show that the proposed behavioral modeling successfully captures different patterns of CPS dynamics according to manufacturing paradigms and individuals. This detailed assessment contributes to the development of appropriate student-specific interventions to improve learning outcomes.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136254878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic Printability Maps for Laser Powder Bed Fusion via Functional Calibration and Uncertainty Propagation 基于功能校准和不确定性传播的激光粉末床熔化概率打印性图
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.1115/1.4063727
Nicholas Wu, Brendan Whalen, Ji Ma, Prasanna V. Balachandran
Abstract In this work, we develop an efficient computational framework for process space exploration in laser powder bed fusion (LPBF) based additive manufacturing technology. This framework aims to find suitable processing conditions by characterizing the probability of encountering common build defects. We employ a Bayesian approach towards inferring a functional relationship between LPBF processing conditions and the unobserved parameters of laser energy absorption and powder bed porosity. The relationship between processing conditions and inferred laser energy absorption is found to have good correspondence to literature measurements of powder bed energy absorption using calorimetric methods. The Bayesian approach naturally enables uncertainty quantification and we demonstrate its utility by performing efficient forward propagation of uncertainties through the modified Eagar-Tsai model to obtain estimates of melt pool geometries, which we validate using out-of-sample experimental data from the literature. These melt pool predictions are then used to compute the probability of occurrence of keyhole and lack-of-fusion based defects using geometry-based criteria. This information is summarized in a probabilistic printability map. We find that the probabilistic printability map can describe the keyhole and lack of fusion behavior in experimental data used for calibration, and is capable of generalizing to wider regions of processing space. This analysis is conducted for SS316L, IN718, IN625, and Ti6Al4V using melt pool measurement data retrieved from the literature.
在这项工作中,我们开发了一个高效的计算框架,用于基于激光粉末床融合(LPBF)的增材制造技术的工艺空间探索。该框架旨在通过描述遇到常见构建缺陷的概率来找到合适的处理条件。我们采用贝叶斯方法来推断LPBF加工条件与激光能量吸收和粉末床孔隙率等未观测参数之间的函数关系。发现加工条件与推断的激光能量吸收之间的关系与文献中使用量热法测量的粉末床能量吸收有很好的对应关系。贝叶斯方法自然地实现了不确定性量化,我们通过改进的Eagar-Tsai模型对不确定性进行有效的前向传播,以获得熔池几何形状的估计,从而证明了它的实用性,我们使用文献中的样本外实验数据验证了这一点。然后使用这些熔池预测来使用基于几何的标准计算钥匙孔和缺乏熔合缺陷发生的概率。这些信息汇总在一个概率印刷性图中。我们发现概率打印性图可以描述用于校准的实验数据中的锁孔和缺乏融合行为,并且能够推广到更广泛的处理空间区域。使用从文献中检索的熔池测量数据,对SS316L、IN718、IN625和Ti6Al4V进行了分析。
{"title":"Probabilistic Printability Maps for Laser Powder Bed Fusion via Functional Calibration and Uncertainty Propagation","authors":"Nicholas Wu, Brendan Whalen, Ji Ma, Prasanna V. Balachandran","doi":"10.1115/1.4063727","DOIUrl":"https://doi.org/10.1115/1.4063727","url":null,"abstract":"Abstract In this work, we develop an efficient computational framework for process space exploration in laser powder bed fusion (LPBF) based additive manufacturing technology. This framework aims to find suitable processing conditions by characterizing the probability of encountering common build defects. We employ a Bayesian approach towards inferring a functional relationship between LPBF processing conditions and the unobserved parameters of laser energy absorption and powder bed porosity. The relationship between processing conditions and inferred laser energy absorption is found to have good correspondence to literature measurements of powder bed energy absorption using calorimetric methods. The Bayesian approach naturally enables uncertainty quantification and we demonstrate its utility by performing efficient forward propagation of uncertainties through the modified Eagar-Tsai model to obtain estimates of melt pool geometries, which we validate using out-of-sample experimental data from the literature. These melt pool predictions are then used to compute the probability of occurrence of keyhole and lack-of-fusion based defects using geometry-based criteria. This information is summarized in a probabilistic printability map. We find that the probabilistic printability map can describe the keyhole and lack of fusion behavior in experimental data used for calibration, and is capable of generalizing to wider regions of processing space. This analysis is conducted for SS316L, IN718, IN625, and Ti6Al4V using melt pool measurement data retrieved from the literature.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136296040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxonomy-Driven Graph-Theoretic Framework for Manufacturing Cybersecurity Risk Modeling and Assessment 制造业网络安全风险建模与评估的分类驱动图论框架
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.1115/1.4063729
Md Habibor Rahman, Erfan Yazdandoost Hamedani, Young-Jun Son, Mohammed Shafae
Abstract Identifying, analyzing, and evaluating cybersecurity risks is essential to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. However, a manufacturing-specific quantitative approach to effectively model threat events and evaluate the unique cybersecurity risks in discrete manufacturing systems is lacking. In response, this paper introduces the first taxonomy-driven graph-theoretic model and framework to formally represent this unique cybersecurity threat landscape and identify vulnerable manufacturing assets requiring prioritized control. First, the proposed framework characterizes threat actors' techniques, tactics, and procedures using taxonomical classifications of manufacturing-specific threat attributes and integrates these attributes into cybersecurity risk modeling. This facilitates systematic generation of comprehensive and generalizable cyber-physical attack graphs for discrete manufacturing systems. Second, using the attack graph formalism, the proposed framework enables concurrent modeling and analysis of a wide variety of cybersecurity threats comprising varying attack vectors, locations, vulnerabilities, and consequences. The risk model captures the cascading attack impact of varying attack methods through different cyber and physical entities in manufacturing systems, leading to specific consequences. Then, the constructed cyber-physical attack graphs are analyzed to comprehend threat propagation through the discrete manufacturing value chain and identify potential attack paths. Third, a quantitative risk assessment approach is presented to evaluate the cybersecurity risk associated with potential attack paths. It also identifies the attack path with the maximum likelihood of success, pointing out critical manufacturing assets requiring prioritized control. Finally, the proposed risk modeling and assessment framework is demonstrated using an illustrative example.
识别、分析和评估网络安全风险对于制定有效的决策策略以保护关键制造业免受潜在的网络攻击至关重要。然而,目前还缺乏一种针对制造业的定量方法来有效地模拟威胁事件并评估离散制造系统中独特的网络安全风险。作为回应,本文引入了第一个分类驱动的图论模型和框架,以正式表示这种独特的网络安全威胁景观,并识别需要优先控制的易受攻击的制造资产。首先,提出的框架使用制造特定威胁属性的分类分类来描述威胁行为者的技术、策略和程序,并将这些属性集成到网络安全风险建模中。这有助于系统地为离散制造系统生成全面和通用的网络物理攻击图。其次,使用攻击图形式化,所提出的框架可以对各种网络安全威胁进行并发建模和分析,包括不同的攻击向量、位置、漏洞和后果。风险模型捕获了通过制造系统中的不同网络和物理实体的不同攻击方法的级联攻击影响,从而导致特定的后果。然后,对构建的网络物理攻击图进行分析,以了解威胁在离散制造价值链中的传播,并识别潜在的攻击路径。第三,提出了一种定量风险评估方法来评估与潜在攻击路径相关的网络安全风险。它还能识别出成功可能性最大的攻击路径,指出需要优先控制的关键制造资产。最后,通过一个实例对所提出的风险建模与评估框架进行了论证。
{"title":"Taxonomy-Driven Graph-Theoretic Framework for Manufacturing Cybersecurity Risk Modeling and Assessment","authors":"Md Habibor Rahman, Erfan Yazdandoost Hamedani, Young-Jun Son, Mohammed Shafae","doi":"10.1115/1.4063729","DOIUrl":"https://doi.org/10.1115/1.4063729","url":null,"abstract":"Abstract Identifying, analyzing, and evaluating cybersecurity risks is essential to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. However, a manufacturing-specific quantitative approach to effectively model threat events and evaluate the unique cybersecurity risks in discrete manufacturing systems is lacking. In response, this paper introduces the first taxonomy-driven graph-theoretic model and framework to formally represent this unique cybersecurity threat landscape and identify vulnerable manufacturing assets requiring prioritized control. First, the proposed framework characterizes threat actors' techniques, tactics, and procedures using taxonomical classifications of manufacturing-specific threat attributes and integrates these attributes into cybersecurity risk modeling. This facilitates systematic generation of comprehensive and generalizable cyber-physical attack graphs for discrete manufacturing systems. Second, using the attack graph formalism, the proposed framework enables concurrent modeling and analysis of a wide variety of cybersecurity threats comprising varying attack vectors, locations, vulnerabilities, and consequences. The risk model captures the cascading attack impact of varying attack methods through different cyber and physical entities in manufacturing systems, leading to specific consequences. Then, the constructed cyber-physical attack graphs are analyzed to comprehend threat propagation through the discrete manufacturing value chain and identify potential attack paths. Third, a quantitative risk assessment approach is presented to evaluate the cybersecurity risk associated with potential attack paths. It also identifies the attack path with the maximum likelihood of success, pointing out critical manufacturing assets requiring prioritized control. Finally, the proposed risk modeling and assessment framework is demonstrated using an illustrative example.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Singularity structure optimization for hexahedral mesh via dual operations 基于二元运算的六面体网格奇异结构优化
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.1115/1.4063402
Chun Shen, Rui Wang
Abstract This paper presents an improved method for optimizing the singularity structure of hexahedral meshes using various dual operations. Our approach aims at reducing element distortion by decomposing complex singular nodes into singular curves using high-quality sheet insertion at proper locations. Then, singular curves that meet the topological parallel requirements are paired to perform the semantic column operation, which eliminates the singular curves. Finally, the topological structure is further optimized by collapsing sheets, resulting in a valid hex mesh with a simpler structure. Compared to existing hexahedral mesh simplification methods, our approach can generate higher quality meshes. Experimental results demonstrate the effectiveness of the proposed method.
提出了一种利用各种对偶运算优化六面体网格奇异结构的改进方法。我们的方法旨在通过在适当的位置使用高质量的片插入将复杂的奇异节点分解成奇异曲线来减少元素畸变。然后,将满足拓扑并行要求的奇异曲线配对,进行语义列运算,消除奇异曲线;最后,通过折叠片进一步优化拓扑结构,得到结构更简单的有效十六进制网格。与现有的六面体网格简化方法相比,我们的方法可以生成更高质量的网格。实验结果证明了该方法的有效性。
{"title":"Singularity structure optimization for hexahedral mesh via dual operations","authors":"Chun Shen, Rui Wang","doi":"10.1115/1.4063402","DOIUrl":"https://doi.org/10.1115/1.4063402","url":null,"abstract":"Abstract This paper presents an improved method for optimizing the singularity structure of hexahedral meshes using various dual operations. Our approach aims at reducing element distortion by decomposing complex singular nodes into singular curves using high-quality sheet insertion at proper locations. Then, singular curves that meet the topological parallel requirements are paired to perform the semantic column operation, which eliminates the singular curves. Finally, the topological structure is further optimized by collapsing sheets, resulting in a valid hex mesh with a simpler structure. Compared to existing hexahedral mesh simplification methods, our approach can generate higher quality meshes. Experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136254743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Invariant Representation of Coupler Curves using a Variational AutoEncoder: Application to Path Synthesis of Four-Bar Mechanisms 用变分自编码器表示耦合器曲线的不变形式:在四杆机构轨迹综合中的应用
3区 工程技术 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-09 DOI: 10.1115/1.4063726
Anar Nurizada, Anurag Purwar
Abstract This paper focuses on the representation and synthesis of coupler curves of planar mechanisms using a deep neural network. While the path synthesis of planar mechanisms is not a new problem, the effective representation of coupler curves in the context of neural networks has not been fully explored. This study compares four commonly used features or representations of four-bar coupler curves: Fourier descriptors, wavelets, point coordinates, and images. The results demonstrate that these diverse representations can be unified using a generative AI framework called Variational Autoencoder (VAE). This study shows that a VAE can provide a standalone representation of a coupler curve, regardless of the input representation, and that the compact latent dimensions of the VAE can be used to describe coupler curves of four-bar linkages. Additionally, a new approach that utilizes a VAE in conjunction with a fully connected neural network to generate dimensional parameters of four-bar linkage mechanisms is proposed. This research presents a novel opportunity for automated conceptual design of mechanisms for robots and machines.
摘要本文研究了基于深度神经网络的平面机构耦合器曲线的表示与综合。虽然平面机构的路径综合并不是一个新问题,但在神经网络环境下耦合器曲线的有效表示尚未得到充分的探索。本研究比较了四小节耦合器曲线的四种常用特征或表示:傅立叶描述子、小波、点坐标和图像。结果表明,这些不同的表示可以使用一种称为变分自编码器(VAE)的生成式人工智能框架进行统一。该研究表明,无论输入表示如何,VAE都可以提供耦合器曲线的独立表示,并且VAE的紧凑潜在维数可用于描述四杆机构的耦合器曲线。此外,提出了一种利用VAE结合全连接神经网络生成四杆机构尺寸参数的新方法。本研究为机器人和机器机构的自动化概念设计提供了一个新的机会。
{"title":"An Invariant Representation of Coupler Curves using a Variational AutoEncoder: Application to Path Synthesis of Four-Bar Mechanisms","authors":"Anar Nurizada, Anurag Purwar","doi":"10.1115/1.4063726","DOIUrl":"https://doi.org/10.1115/1.4063726","url":null,"abstract":"Abstract This paper focuses on the representation and synthesis of coupler curves of planar mechanisms using a deep neural network. While the path synthesis of planar mechanisms is not a new problem, the effective representation of coupler curves in the context of neural networks has not been fully explored. This study compares four commonly used features or representations of four-bar coupler curves: Fourier descriptors, wavelets, point coordinates, and images. The results demonstrate that these diverse representations can be unified using a generative AI framework called Variational Autoencoder (VAE). This study shows that a VAE can provide a standalone representation of a coupler curve, regardless of the input representation, and that the compact latent dimensions of the VAE can be used to describe coupler curves of four-bar linkages. Additionally, a new approach that utilizes a VAE in conjunction with a fully connected neural network to generate dimensional parameters of four-bar linkage mechanisms is proposed. This research presents a novel opportunity for automated conceptual design of mechanisms for robots and machines.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135095618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computing and Information Science in Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1