Advertisement

Manufacturing Informatics in Digital Manufacturing Science

  • Zude Zhou
  • Shane (Shengquan) Xie
  • Dejun Chen
Chapter
Part of the Springer Series in Advanced Manufacturing book series (SSAM)

Abstract

The high speed development of computer networks and information technology has enabled manufacturing enterprises to enter the Information Age. To adapt to such competition, we should rethink the information science problems in manufacturing, which give rise to the technology and techniques of manufacturing informatics. Manufacturing informatics is a new interdisciplinary area, which synthesizes manufacturing science, information science, system science, control science and management science. It mainly researches the logical expression of information, optimal distribution, and the effective operation of manufacturing processes and manufacturing systems. The digitization of manufacturing information makes manufacturing processes and manufacturing decisions controllable and visible. Moreover, since the digitized manufacturing information can be transmitted through a wide area network (WAN) with a certain series of protocols, the manufacturing information can usually be shared and collaborative. Digital manufacturing is driven by information, and manufacturing informatics is the core and basic theory of digital manufacturing science.

Keywords

Access Control Manufacturing System Information Integration Digital Watermark Evidence Theory 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Zhang BP (2002) Manufacturing informatics. Tsinghua University Press, BeijingGoogle Scholar
  2. 2.
    Akerlof GA (1970) The market for “lemons”: quality uncertainty and the market mechanism. Q J Econ 84(3):488–500CrossRefGoogle Scholar
  3. 3.
    Arrow K (1984) Economics of information. Basil Blackwell, OxfordGoogle Scholar
  4. 4.
    Yovits MC (1960) Self organization systems. Pergamon Press, LondonGoogle Scholar
  5. 5.
    Zhang BP (2002) The application of manufacturing informatics–investigation on the self-organization of machining accuracy. China Mech Eng 13(4):344–347Google Scholar
  6. 6.
    Dempster AP (1968) A generalization of Bayesian inference. J Roy Stat Soc 30:205–247MathSciNetGoogle Scholar
  7. 7.
    Rao YQ, Efstathiou J (2006) Entropy-based measurement of manufacturing system complexity and its application in scheduling. Chin J Mech Eng 42(7):8–13CrossRefGoogle Scholar
  8. 8.
    Deshmukh AV, Talavage JJ, Barash MM (1998) Complexity in manufacturing systems, part 1: analysis of static complexity. IIE Trans 30:645–655Google Scholar
  9. 9.
    Frizelle G, Woodcock E (1995) Measuring complexity as an aid to developing operational strategy. Int J Oper Prod Manag 15(5):26–39CrossRefGoogle Scholar
  10. 10.
    Zhong YX (2002) Principle of information science, 3rd edn. Beijing University of Posts and Telecommunications Press, BeijingGoogle Scholar
  11. 11.
    Li YF, Liu ZG (2005) Information entropy-based viewpoint planning for 3-D object reconstruction. IEEE Trans Robot 21(3):324–337CrossRefGoogle Scholar
  12. 12.
    Shafer G (1976) A mathematical theory of evidence. Princeton University Press, PrincetonzbMATHGoogle Scholar
  13. 13.
    Ma WF (2002) Integration of digital resources. J Libr Sci China 28(4):64–67Google Scholar
  14. 14.
    Liu WA, Qiao LH (2005) Integration of product and process information based on product data management system. Mech Sci Technol 24(1):1–5MathSciNetGoogle Scholar
  15. 15.
    Zhu B, Mao GB, He T, Wang YX (2003) Study on information integration technology of application. Mech Eng 12:31–33CrossRefGoogle Scholar
  16. 16.
    Conklin WA, White GB, Cothren C et al. (2004) Principles of computer security: security+TM and beyond. McGraw-Hill, New YorkGoogle Scholar
  17. 17.
    Abrams M, LaPadula L, Eggers K et al. (1990) A generalized framework for access control: an informal description. In: Proceedings of the 13th National Computer Security Conference, Taiwan, pp 134–143Google Scholar
  18. 18.
    Bishop M (2005) Introduction to computer security. Pearson Education, BostonGoogle Scholar
  19. 19.
    Liu Q (2004) Research on several foundational theories and key technologies of copyright protection and information security based on network manufacture environment. PhD Thesis, Wuhan University of Technology, ChinaGoogle Scholar
  20. 20.
    Liu Q, Jiang XM (2007) Hierarchical semi-fragile digital watermarking algorithm for image tamper localization and recovery. J Commun 28(7):104–110Google Scholar
  21. 21.
    Ai QS, Zhou ZD, Liu Q (2007) SVD-based digital watermarking algorithm for 3D mesh models. J Comput Appl 27(12):2931–2933Google Scholar
  22. 22.
    Liu Q, Zhang XM (2007) Secure 3D watermarking algorithm based on point set projection. In: SPIE Fifth International Symposium on Multispectral Image Processing and Pattern Recognition (MIPPR’2007), vol 6790, pp 67904R-1-8Google Scholar
  23. 23.
    Zhang XM, Liu Q (2007) Geometric feature based digital watermarking algorithm for 3D models. J Wuhan Univ Technol 29(12):123–126Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Hubei Digital Manufacturing Key LabWuhan University of TechnologyWuhan HubeiPeople’s Republic of China
  2. 2.Department of Mechanical EngineeringUniversity of AucklandAucklandNew Zealand
  3. 3.School of Information EngineeringWuhan University of TechnologyWuhan HubeiPeople’s Republic of China

Personalised recommendations