You are on page 1of 8

Homework 6

P H AN TH I L A N H U ON G
ST U D E NT I D : 1 0 8 4 2 66 02
I N ST RU CTOR: P ROF ESSO R. C H IN T E L I N
1- Industrial Internet Of Things (IIOT)

 A modern factory need IIOT to solve the big data problem,


implement the combination of several machine in the
factory in the smart way, that help increase the benefit of
business model when saving resources.
 This connectivity allows for data collection, exchange, and
analysis, potentially facilitating improvements in
productivity and efficiency as well as other economic
benefits.
 The IIoT is an evolution of a distributed control system (DCS)
that allows for a higher degree of automation by using cloud
computing to refine and optimize the process controls.
Source:
https://en.wikipedia.org/wiki/Industrial_internet_of_things#:~:text=The%20industrial%20internet%20of%20things,including%
20manufacturing%20and%20energy%20management.
1- Industrial Internet Of Things (IIOT)

 It can apply to many majors and places such as


transportation, smart factory, management, health,…
 Due to specific duty, people can use the Internet Of
Thing in a such way. For example, a manager use for
tracking or managing progress, a technician use for
design a production line or a specific product, a
customer can use to get the information,…
 Because IIOT relatives with all special place, so it is put
as a general factor for all location

Source:
https://en.wikipedia.org/wiki/Industrial_internet_of_things#:~:text=The%20industrial%20internet%20of%20things,including%
20manufacturing%20and%20energy%20management.
https://www.tibco.com/reference-center/what-is-iiot
2- Cyber Security (DATA)
 Cyber security is a set of applying security preventions to
provide confidentiality, integrity, and availability of data.
 Factory need cyber security to prevent data-attack or cyber-
attack. Cyber Security arms to restrict disclosures and to
grant access of information to only authorized people.
 The important goals of cybersecurity are: 1) securely obtain
and share information for accurate decision-making, 2) find
and deal with vulnerabilities within applications, 3) prevent
unauthorized access and 4) protect confidential information
 It can be applied to Web application attack, Cloud Security,
HTTP attack, ….

Source:
• Sumeet Dua, Xian Du, “Data Mining and Machine Learning in Cybersecurity”, 2016
• 978-1-4799-1288-9/13/$31.00 ©2013 IEEE
• Iqbal H. Sarker, Cybersecurity data science: an overview from machine learning perspective
3- Augmented Reality
 Augmented Reality (AR) as a real-time direct or indirect view of a physical real world environment that has
been enhanced / augmented by adding virtual computer generated information to it. AR is both
interactive and registered in 3D as well as combines real and virtual objects.
 AR is used to substitute paper manuals with digital instructions which are overlaid on the manufacturing
operator's field of view, reducing mental effort required to operate.
 AR makes machine maintenance efficient, help manufacturers adapt to rapidly-changing product
designs, increase operator safety by removing the need for operators to look at a screen or manual away
from the working area.
 It can apply for autonomous driving (so put in transportation area), smart manufacturing, education,
health ,….
 Research and development product department, doctor, gamer,…. can use it.
 Augmented reality works with placing a virtual reality world over a real-world environment to deliver a
single reality.
Source:
https://en.wikipedia.org/wiki/Augmented_reality#Technology
https://fullscale.io/blog/how-does-augmented-reality-work/
4- Machine to machine communication
 Machine to machine (M2M) is direct communication between devices
using any communications channel, including wired and wireless
 Allow machine communication quicker and easier while using less power.
 A factory uses Machine to machine serve to improve the production and
efficiency of machines, to enhance the reliability and safety of complex
systems, and to promote the life-cycle management for key assets and
products.
 It can be applied for smart factory, where use many continuous machines
in production line.
 In machine-to-machine communications, a remote sensor gathers data
and sends it wirelessly to a network, where it's next routed, often through
the Internet, to a server such as a personal computer. At that point, the
data is analyzed and acted upon, according to the software in place.
Source:
https://en.wikipedia.org/wiki/Machine_to_machine
https://computer.howstuffworks.com/m2m-communication.htm#:~:text=In%20machine%2Dto%2Dmachine%20communications,to%20the%20software%20in%20place.
5 - Cyber-Physical System
 A cyber-physical system (CPS) is a computer system in which a
mechanism is controlled or monitored by computer-based
algorithms.
 CPS is also similar to the Internet of Things (IoT), sharing the
same basic architecture; nevertheless, CPS presents a higher
combination and coordination between physical and
computational elements.
 It can be use for smart grid, autonomous automobile systems,
medical monitoring, industrial control systems, robotics systems,
and automatic pilot avionics

Source:
https://en.wikipedia.org/wiki/Cyber-physical_system
https://ptolemy.berkeley.edu/projects/cps/CPSConceptMap.pdf

You might also like