To see the other types of publications on this topic, follow the link: Software TPM.

Journal articles on the topic 'Software TPM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software TPM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

GU, Liang, Yao GUO, Hua WANG, Yan-Zhen ZOU, Bing XIE, and Wei-Zhong SHAO. "Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM." Journal of Software 21, no. 2 (2010): 373–87. http://dx.doi.org/10.3724/sp.j.1001.2010.03789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andriyono, Dimas Irwan Aji, Ahmad Fitriansyah, and Eka Satryawati. "Rancang Bangun Aplikasi Total Productive Maintenance (TPM) Berbasis Android." Jurnal Teknologi Informatika dan Komputer 6, no. 2 (2020): 112–22. http://dx.doi.org/10.37012/jtik.v6i2.235.

Full text
Abstract:
Dalam era revolusi industri 4.0, perusahaan terus dituntut untuk melakukan inovasi dengan memberi kesempatan kepada seluruh karyawannya untuk turut serta membangun dan membuat ide-ide baru di perusahaan. Salah satunya adalah inovasi dalam kegiatan Total Productive Maintenance (TPM). Inovasi ini diharapkan membantu meningkatkan performa mesin – mesin produksi yang ada di perusahaan. Kendala yang dihadapi adalah minimnya pengolahan data administrasi total productive maintenance yang kurang detail menjadi salah satu masalah dalam mengembangkan inovasi di TPM. Penelitian ini akan ikut membantu menyelesaikan permasalah tersebut dengan membangun aplikasi yang dapat mengolah data TPM secara sistematis dan informatif. Penelitian ini menggunakan metode analisis software development life cycle (SDLC) untuk menganalisa sistem yang dibutuhkan mulai dari perencanaan, analisis, perancangan, penerapan, dan pemeliharaan. Sistem yang dibangun menggunakan Bahasa pemrograman Java dan SQLlite untuk databasenya, Android studio versi 3.5 untuk desain dan unified modelling language (UML) untuk pemodelan sistemnya. Hasil penelitian ini berupa aplikasi B7TPM berbasis android yang hanya bisa di akses secara internal di lingkungan perusahaan
APA, Harvard, Vancouver, ISO, and other styles
3

ZhenLong Du, XiaoLi Li, YanWen Guo, and Kangkang Shen. "Ensemble of Trusted Firmware Services based on TPM." International Journal of Digital Content Technology and its Applications 5, no. 3 (2011): 175–84. http://dx.doi.org/10.4156/jdcta.vol5.issue3.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chamtitigul, Nattaya, and Weining Li. "How the Team Norm of Information Exchange and Team Information Processing Affects Team Performance in Software Development Projects?" Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, no. 5 (2021): 95–102. http://dx.doi.org/10.47405/mjssh.v6i5.792.

Full text
Abstract:
This study examines how the team norm of information exchange and team information processing affects team performance. Data were collected from 354 project teams from software development companies in Thailand. Structural Equation Modelling (SEM) was conducted to test the proposed hypotheses. The results of the study revealed that team norms of information exchange (TNM) has a significant relationship with team information processing (PRO). Team information processing positively influences team performance (TPM). Software development organisations could adopt such norms and this team process to improve software development projects performance and recognise team processes, which is essential for long-term sustainability and competitiveness.
APA, Harvard, Vancouver, ISO, and other styles
5

DeFranco, Joanna F., and Phillip Laplante. "A software engineering team research mapping study." Team Performance Management: An International Journal 24, no. 3/4 (2018): 203–48. http://dx.doi.org/10.1108/tpm-08-2017-0040.

Full text
Abstract:
Purpose The purpose of this mapping study has been performed to identify, critically analyze and synthesize research performed in the area of software engineering teams. Teams, in a general sense, have been studied extensively. But the distinctive processes that need to be executed effectively and efficiently in software engineering require a better understanding of current software engineering team research. Design/methodology/approach In this work, software engineering team publications were analyzed and the key findings of each paper that met our search inclusion criteria were synthesized. In addition, a keyword content analysis was performed to create a taxonomy to categorize each paper and evaluate the state of software engineering team research. Findings In software engineering team research, the resulting areas that are the most active are teamwork/collaboration, process/design and coordination. Clear themes of analysis have been determined to help understand how team members collaborate, factors affecting their success and interactions among all project stakeholders. In addition, themes related to tools to support team collaboration, improve the effectiveness of software engineering processes and support team coordination have been found. However, the research gaps determined from the content analysis point toward a need for more research in the area of communication and tools. Originality/value The goal of this work is to define the span of previous research in this area, create a taxonomy to categorize such research and identify open research areas to provide a clear road map for future research in the area of software engineering teams. These results, along with the key finding themes presented, will help guide future research in an area that touches all parts of the software engineering and development processes.
APA, Harvard, Vancouver, ISO, and other styles
6

KAKEI, Shohei, Masami MOHRI, Yoshiaki SHIRAISHI, and Masakatu MORII. "SSL Client Authentication with TPM." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 1052–61. http://dx.doi.org/10.1587/transinf.2015cyp0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jen-Liang, Cheng, Chen Wei-Yu, Wu Dai-Ye, Chen Kuang-Chi, and Zhang Hong-Wei. "EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 9, no. 3 (2020): 1–11. https://doi.org/10.5281/zenodo.4013110.

Full text
Abstract:
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from storage of itself and other victim computers. By adopting trusted computing technology a computer’s former health status cannot be forged. Computers can thus detect the change of health status of a hijacked computer and prevent the leakage of the secrets. As Trusted Computing Group (TCG) proposed Trusted Platform Module (TPM) specification, IBM implemented software TPM (sTPM) and utilities for engineer who wants to learn the operating principle of TPM. Meanwhile, the blooming of tiny size, but powerful, computers, e.g. Raspberry Pi 2 (Rpi2), attract ones to develop some dedicated applications on the computers. In this article, we report the verified steps for installing new sTPM version on RPi2. After the installation, we also test the functionality and evaluate the performance of the sTPM with some major TPM Commands. The real behaviour of and the traffic between the host computer and the emulated TPM can thus be learned easily.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Shakir-Ullah, Jamil Ahmad, and Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol." International Arab Journal of Information Technology 17, no. 4 (2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.

Full text
Abstract:
Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: 1) fully inter-operable compliance to the Foundation for Intelligent Physical Agents (FIPA) and 2) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and 7Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases
APA, Harvard, Vancouver, ISO, and other styles
9

Oroye, Olufemi Adebayo, Bamisaye Olufemi Sylvester, and Peter Kayode Farayibi. "Total productive maintenance and companies performance: a case study of fast moving consumer goods companies." Jurnal Sistem dan Manajemen Industri 6, no. 1 (2022): 23–32. http://dx.doi.org/10.30656/jsmi.v6i1.4185.

Full text
Abstract:
TPM implementation by FMCG firms in Ado/Ota industrial hub of Ogun State Nigeria was investigated, and its influence on the firm's performance was analyzed. Primary data were collected through the administration of an online questionnaire. A total number of 98 respondents participated in this research. The analysis was conducted through descriptive analysis and structural equation model (SEM) using a smart partial least square (PLS) software. It was observed that TPM implementation had a positive influence on firms' performance. The descriptive analysis. It noted that most firms explored in this study had implemented TPM. It implies that above ninety percent of companies in the industrial hub are practicing TPM. The data employed in this research are limited to those obtained from FMCG firms in Ado/Ota in Ogun State, Nigeria. However, this study's findings can represent other firms in other locations where TPM is practiced. This research will be helpful for FMCG firms in Nigeria, especially those in Ogun State. TPM was measured using the following indicators: 5S, Autonomous Maintenance, Kobetsu Kaizen, Planned Maintenance, Quality, Education and Training, Office TPM, and Health, Safety and Environment. Eight indicators measure The company's performance: Product Quality, Cost, Inventory, Lead Time, Processing Cycle Time, Customer Complaints, Equipment Efficiency and Overall Productivity. The research review shows that the TPM implementation significantly affects firms' sustainable performance. In addition, the result shows that local firms in the survey area are yet to key into implementing TPM practices fully.
APA, Harvard, Vancouver, ISO, and other styles
10

McNamara, Thomas P., and Christopher F. Blanford. "A sensitivity metric and software to guide the analysis of soft films measured by a quartz crystal microbalance." Analyst 141, no. 10 (2016): 2911–19. http://dx.doi.org/10.1039/c6an00143b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wickramasinghe, GLD, and Asanka Perera. "Effect of total productive maintenance practices on manufacturing performance." Journal of Manufacturing Technology Management 27, no. 5 (2016): 713–29. http://dx.doi.org/10.1108/jmtm-09-2015-0074.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate the effect of total productive maintenance (TPM) practices on manufacturing performance of textile and apparel manufacturing firms. Design/methodology/approach – A self-administered survey questionnaire was used for data collection. A total of 236 usable responses resulted in a 78 percent response rate from 30 textile and apparel firms. Correlation and regression analysis was performed using SPSS software to identify the effect of TPM on manufacturing performance. Findings – The results show that all the TPM practices have positive and significant relationship with manufacturing performance and significantly improve cost effectiveness, product quality, on-time delivery and volume flexibility. Practical implications – The study presented in this paper offers academics and practitioners a better understanding of the relationship and impact of the TPM practices on the manufacturing performances. Thus practitioners will be able to make better and more effective decisions about the implementation of TPM practices. Originality/value – The understanding of the effect of TPM practices on manufacturing performance is timely for labor intensive manufacturing industries such as textile and apparel since it has not been researched adequately. Therefore, findings will impact the global textile and apparel industry positively.
APA, Harvard, Vancouver, ISO, and other styles
12

Tian, Jun Feng, and Ye Zhu. "Trusted Software Construction Model Based on Trust Shell." Advanced Materials Research 186 (January 2011): 251–55. http://dx.doi.org/10.4028/www.scientific.net/amr.186.251.

Full text
Abstract:
Due to not considering the guaranty of trustiness, traditional software development methods and techniques lack effective measures for ensuring trustiness. Combining agent technique with trusted computing provided by TPM, a trusted software construction model based on Trust Shell (TSCMTS) is demonstrated in this paper, where Trust Shell is responsible for ensuring the trustiness of software logically. In particular, for the purpose of improving the accuracy of trustiness constraints, a strategy of determining multiple attributes’ weights by information entropy for check point is proposed. Both simulation experiment results and practical application indicate that the TSCMTS is of effective trustiness and reasonable performance overhead.
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Youze, Yuehui Chen, Yuanyuan Zhao, Shuang Zhou, Guangyi Fu, and Yu Zhong. "Synthesis and characterization of thiol-polystyrene microsphere and its adsorption properties of thallium." E3S Web of Conferences 237 (2021): 01001. http://dx.doi.org/10.1051/e3sconf/202123701001.

Full text
Abstract:
Thallium (Tl) is highly toxic in the environment. In order to solve the harm of Tl pollution to the environment, thiol-polystyrene microsphere (TPM) with good adsorption properties for Tl were prepared in this paper. The GAUSSIAN software was used to calculate the adsorption performance of the TPM on Tl+, and the adsorption mechanism was discussed. The thermogravimetric analysis show that the TPM prepared with chloromethyl polystyrene microspheres (CPM) and thiourea as the main raw materials has good chemical thermal stability. In the Tl+ solution of 1mg/L, the adsorption and removal rate of the TPMs in was 99%, with a significant adsorption of Tl+ properties. When the dosage of TPM is 0.4L/g, pH is 6-10, temperature is 5-20 °C, and adsorption time reaches 640min, thallium-containing water with Tl+ concentration of 5mg/L can be treated to within the national discharge standard (5μg/L). The analytical effect of 0.5mol/L dilute sulfuric acid on TPM can reach 99.96%, and the adsorption capacity of TPM on Tl+ is reduced by only 0.1% after repeated use 4 times, which has good regeneration performance. The modified polystyrene microspheres were characterized by EDS, FT-IR, Raman spectra and XPS, and it was proved that the TPM were ligated with Tl+ through the grafted mercapto group, so as to adsorb and remove Tl+ from the solution. According to the isotherm and kinetic model of TPM adsorption Tl+, the maximum saturated adsorption amount of TPM to Tl+ can reach 3.47mg/g, mainly chemical adsorption, and the membrane diffusion stage is the main control step of TPM adsorption Tl+. The results showed that the TPM could be a promising adsorbent with good adsorption capacity and reusability for Tl+ removal from wastewater
APA, Harvard, Vancouver, ISO, and other styles
14

Zaluzec, Nestor J. "Tele-Presence Microscopy: A Progress Report." Microscopy and Microanalysis 4, S2 (1998): 18–19. http://dx.doi.org/10.1017/s1431927600020213.

Full text
Abstract:
In 1995, we presented the initial design and demonstrated operation of the Tele-Presence Microscopy (TPM) Collaboratory at ANL. At that time the primary interaction mode for the Collaboratory was passive operation where the user was given a fixed interaction space with the system. Since then a number of changes have been implemented in both the system and its configuration. While the TPM Site is still accessed using browser based technology (URL = http://tpm.amc.anl.gov) the decisions which have been made at ANL since then, have necessitated that restrictions to the nature of the client browser software. Due to the requirement that TPM provide both a platform independent persistent electronic space as well as real time imaging, we have chosen to implement server push technology. This means that only those browsers which are fully compliant with Netscape Version 2.0 or greater now have full access to the TPM Site (MS Internet Explorer is not compatible with this technology).
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Penglin, Limin Tao, and Haitao Wang. "RTTV: a dynamic CFI measurement tool based on TPM." IET Information Security 12, no. 5 (2018): 438–44. http://dx.doi.org/10.1049/iet-ifs.2017.0459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sabry Shaaban, Mohamed, and Ali H. Awni. "Critical success factors for total productive manufacturing (TPM) deployment at Egyptian FMCG companies." Journal of Manufacturing Technology Management 25, no. 3 (2014): 393–414. http://dx.doi.org/10.1108/jmtm-09-2012-0088.

Full text
Abstract:
Purpose – In this paper, the authors study the critical success factors for deploying total productive manufacturing (TPM) programs in the Egyptian fast moving consumer goods (FMCG) companies. The paper aims to discuss these issues. Design/methodology/approach – The authors study five Egyptian FMCG companies that have deployed TPM. Data were collected through interviewing group of middle managers in each company in addition to the TPM manager. Site visits were conducted for the purpose of data verification. Findings – The research identified nine factors affecting the success of TPM deployment. The importance of each of those factors depends on the stage of the TPM deployment maturity at the company. Originality/value – The main practical implication of this finding is to guide companies undergoing a deployment of TPM, particularly in developing countries, to focus on the factors that are most pertaining to the level of their deployment maturity.
APA, Harvard, Vancouver, ISO, and other styles
17

Peng, Jinlong, Tao Wang, Weiyao Lin, et al. "TPM: Multiple object tracking with tracklet-plane matching." Pattern Recognition 107 (November 2020): 107480. http://dx.doi.org/10.1016/j.patcog.2020.107480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Danguche, Issa, and Ismail Taifa. "Factors Influencing Total Productive Maintenance Implementation for Thermal Generation Plants." Tanzania Journal of Engineering and Technology 42, no. 1 (2023): 97–112. http://dx.doi.org/10.52339/tjet.v42i1.892.

Full text
Abstract:
This study accepts that the technical and administrative factors can amplify effective total productive maintenance (TPM) implementation at thermal generation plants. It is noted that there is a limited number of studies that have attempted to understand the subject of TPM implementation in the energy sector. Noting this shortcoming, the authors thought it crucial to generate empirical evidence on the factors influencing effective TPM implementation for thermal generation plants, with evidence from gas-fired plants. A sample of 88 respondents was selected and consulted. Data were collected through questionnaires and analyzed quantitatively by inferential statistics and qualitatively through thematic analysis using SPSS version 20.0. Confirmatory factor analysis (CFA) was performed through LISREL software version 8.0. On inferential analysis, correlation, regression and ANOVA were performed. Multiple regression analysis results indicate that administrative factors, including management support, TPM awareness, employee participation and strategic planning, positively and significantly influence TPM implementation. Also, technical factors comprising planned maintenance, autonomous maintenance, quality maintenance and early equipment management positively influence TPM implementation at thermal generation plants. The correlation coefficient for all factors was at least 0.6, and the p-value was less than 0.05, suggesting that the study’s independent variables reliably predict the dependent variable. The additional factors influencing TPM implementation include training and education, organization of the workplace, root cause analysis and continuous improvement. From this juncture, the study concludes that effective TPM implementation in the energy sector, especially at thermal generation plants, can be accomplished if many administrative and technical factors are considered. These factors comprise management support, TPM awareness, strategic planning, employee participation, workplace organization, training and education, planned maintenance, autonomous maintenance, quality maintenance, early equipment management, continuous improvement and root cause analysis.
APA, Harvard, Vancouver, ISO, and other styles
19

Sun, Haonan, Rongyu He, Yong Zhang, Ruiyun Wang, Wai Hung Ip, and Kai Leung Yung. "eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology." Sensors 18, no. 11 (2018): 3807. http://dx.doi.org/10.3390/s18113807.

Full text
Abstract:
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering. Utilizing trusted computing technology to enhance the security mechanism, defined as trusted cloud, has become a hot research topic in cloud security. Currently, virtual TPM (vTPM) is commonly used in a trusted cloud to protect the integrity of the cloud environment. However, the existing vTPM scheme lacks protections of vTPM itself at a runtime environment. This paper proposed a novel scheme, which designed a new trusted cloud platform security component, ‘enclave TPM (eTPM)’ to protect cloud and employed Intel SGX to enhance the security of eTPM. The eTPM is a software component that emulates TPM functions which build trust and security in cloud and runs in ‘enclave’, an isolation memory zone introduced by SGX. eTPM can ensure its security at runtime, and protect the integrity of Virtual Machines (VM) according to user-specific policies. Finally, a prototype for the eTPM scheme was implemented, and experiment manifested its effectiveness, security, and availability.
APA, Harvard, Vancouver, ISO, and other styles
20

Gross, Mathieu, Konrad Hohentanner, Stefan Wiehler, and Georg Sigl. "Enhancing the Security of FPGA-SoCs via the Usage of ARM TrustZone and a Hybrid-TPM." ACM Transactions on Reconfigurable Technology and Systems 15, no. 1 (2022): 1–26. http://dx.doi.org/10.1145/3472959.

Full text
Abstract:
Isolated execution is a concept commonly used for increasing the security of a computer system. In the embedded world, ARM TrustZone technology enables this goal and is currently used on mobile devices for applications such as secure payment or biometric authentication. In this work, we investigate the security benefits achievable through the usage of ARM TrustZone on FPGA-SoCs. We first adapt Microsoft’s implementation of a firmware Trusted Platform Module (fTPM) running inside ARM TrustZone for the Zynq UltraScale+ platform. This adaptation consists in integrating hardware accelerators available on the device to fTPM’s implementation and to enhance fTPM with an entropy source derived from on-chip SRAM start-up patterns. With our approach, we transform a software implementation of a TPM into a hybrid hardware/software design that could address some of the security drawbacks of the original implementation while keeping its flexibility. To demonstrate the security gains obtained via the usage of ARM TrustZone and our hybrid-TPM on FPGA-SoCs, we propose a framework that combines them for enabling a secure remote bitstream loading. The approach consists in preventing the insecure usages of a bitstream reconfiguration interface that are made possible by the manufacturer and to integrate the interface inside a Trusted Execution Environment.
APA, Harvard, Vancouver, ISO, and other styles
21

Jing, LENG, and HE Fan. "A Design of Trusted Computing Supporting Software based on Security Function." MATEC Web of Conferences 173 (2018): 03087. http://dx.doi.org/10.1051/matecconf/201817303087.

Full text
Abstract:
Most of existing TCSS have defined the functional interface of software in accordance with TCG specification. However, there is no clear definition of the security functional requirements and security targets that TCSS needs to meet in TCG specification. An implementation scheme for TCSS was proposed, and a TCSS prototype on the basis of Common Criteria (CC), combining with TCSS security function division and practical application demands was implemented. The experimental results show that the proposed software prototype can support the interface call of the TPM 2.0 and the SM4 cipher algorithm of China.
APA, Harvard, Vancouver, ISO, and other styles
22

Sahoo, Saumyaranjan. "An empirical exploration of TQM, TPM and their integration from Indian manufacturing industry." Journal of Manufacturing Technology Management 29, no. 7 (2018): 1188–210. http://dx.doi.org/10.1108/jmtm-03-2018-0075.

Full text
Abstract:
Purpose The purpose of this paper is to comparatively assess the contributions of total quality management (TQM) and total productive maintenance (TPM) practices, exclusively and collectively, on manufacturing business performance. Design/methodology/approach Responses to survey questionnaires were collected using multiple modes of data collection. A total of 269 filled responses were collected and analyzed to ascertain the contribution made by exclusive and collective implementation of TQM and TPM practices on business performance. The respondent firms were grouped into three clusters based on early, in-transition and advanced stages of implementation of either or both TQM and TPM manufacturing practices. Comparative assessment of the impact of standalone TQM, standalone TPM and combined TQM–TPM manufacturing methods on business performance parameters have been evaluated using statistical tools within each cluster. Findings Evidences were found to support the supposition that integrated implementation of both TQM and TPM practices over a reasonable period of time contributes in delivering better business performance as compared to the standalone implementation strategy. Research limitations/implications The study has its own limitations because of its chosen research approach. As the data in this study were collected from production management personnel on the basis of their subjective evaluations, more comprehensive objective performance indicators shall be employed for comparative assessment of manufacturing practices in future studies. In-depth case studies are needed to further validate the findings of the research study. Practical implications The analytical results reveal that an integrated TQM–TPM strategic implementation can systematically contribute toward realization of significant improvement in manufacturing business performance parameters. The results of this study are vital for production managers and senior management personnel of manufacturing firms that have implemented TQM and are considering introducing TPM in their organization (or vice-versa). Originality/value This empirical study signifies the need for strategically aligning and managing various production improvement ideologies for realization of an organization’s growth and sustainability in a long run. In particular, this paper invigorates the discussion about improving the synergy between maintenance and quality functions in the organization for meeting the challenges of highly competitive market environment.
APA, Harvard, Vancouver, ISO, and other styles
23

Chamtitigul, Nattaya, and Weining Li. "The influence of ethical leadership and team learning on team performance in software development projects." Team Performance Management: An International Journal 27, no. 3/4 (2021): 240–59. http://dx.doi.org/10.1108/tpm-02-2020-0014.

Full text
Abstract:
Purpose The purpose of this paper is to examine the effect of team learning processes (information acquisition, information processing and information storage and retrieval) on team performance in software development projects and to assess the effect of ethical leadership and its influence on these processes. Design/methodology/approach The authors examined 354 software development project teams in Thailand. A quantitative study was conducted through a Web-based survey, with structural equation modelling used to test the hypotheses. Findings The results of this study revealed that ethical leadership is positively correlated with the team learning processes of information acquisition, information processing and information storage and retrieval. However, only information processing and information storage and retrieval are positively related to team performance. The results indicate that ethical leadership has a positive direct effect on team performance. The results also show that the positive relationship between ethical leadership and team performance is partially mediated by team learning processes, namely, information processing and information storage and retrieval. Research limitations/implications This study highlights the importance of ethical leadership and guides managers towards considering the characteristics of both ethical leadership and team learning processes for enhancing team performance in software development projects. Originality/value This is the first study to the best of authors’ knowledge to examine the role of team learning processes in mediating the relationship between ethical leadership and team performance, particularly concerning software development projects. The present research contributes to the literature on team performance management, emphasising the manner in which ethical leadership can result in team learning and team performance. The findings of this study can be used to encourage organisations to develop ethical leadership behaviours and team learning processes in software development projects.
APA, Harvard, Vancouver, ISO, and other styles
24

Sharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices." Information 14, no. 9 (2023): 491. http://dx.doi.org/10.3390/info14090491.

Full text
Abstract:
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to various attacks that could risk grid failure. The proposed Fortified-Grid security primitive provides an innovative solution, leveraging the TPM for attestation coupled with standard X.509 certificates. This methodology serves a dual purpose, ensuring the authenticity of IoT devices and upholding software integrity, an indispensable foundation for any resilient smart grid security system. TPM is a hardware security module that can generate keys and store them with encryption so they cannot be compromised. Formal security verification has been performed using the random or real Oracle (ROR) model and widely accepted AVISPA simulation tool, while informal security verification uses the DY and CK adversary model. Fortified-Grid helps to validate the attested state of IoT devices with a minimal network overhead of 1984 bits.
APA, Harvard, Vancouver, ISO, and other styles
25

Quested, Tom, Mischa Crumbach, and Richard Hamerton. "Industrial Application of Through-Process Modelling I: Microstructural Descriptors Required from the Casting Model for Downstream Process Stages." Materials Science Forum 519-521 (July 2006): 1783–88. http://dx.doi.org/10.4028/www.scientific.net/msf.519-521.1783.

Full text
Abstract:
This paper contains a review of microstructural through-process modelling (TPM) and the particular role of ingot metallurgy from an industrial perspective, focusing on recent advances in solidification theory, solidification and homogenisation software, and software environments that allow models to interface. To illustrate how as-cast microstructure can impact on downstream processing steps, a sensitivity analysis has been performed on an AA1xxx alloy using an in-house homogenisation model. Thus, knowledge gaps in theory and model application are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
26

Tratter, Valaenthin, Mudassar Aslam, and Shahid Raza. "Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility." Journal of Advanced Transportation 2021 (June 22, 2021): 1–18. http://dx.doi.org/10.1155/2021/5569331.

Full text
Abstract:
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicle is owned and driven by one or only a few other persons, and towards shared-mobility concepts. That means that many different people use and have access to the same vehicle. An attacker disguised as a regular short-time user can use the additional attack vectors (s)he gets by having physical access to tamper the vehicle’s software. The software takes a continuously more crucial role in cars for autonomous driving, and manipulations can have catastrophic consequences for the persons on board. Currently, there is no mechanism available to the vehicle owner to detect such manipulations in the vehicle done by the attacker (short-time user). In this work, a novel vehicle attestation scheme called Vehicular Soft Integrity Preservation Scheme (VeSIPreS) is proposed to detect tampering in the software stack of a vehicle and guarantee the upcoming driver that the previous user has not changed the software of the vehicle. The solution consists of a software module in the vehicle and a mobile-based user application for the vehicle owner to monitor the vehicle’s soft integrity. Inside the vehicle, the software module is implemented in the central gateway, which acts as the primary security component. VeSIPreS uses Trusted Platform Module (TPM) in the central gateway, which anchors trust in our proposed solution. This paper also provides a proof-of-concept implementation with a TPM, demonstrating its application and deployment feasibility and presentig a security analysis to show the security of VeSIPreS.
APA, Harvard, Vancouver, ISO, and other styles
27

Sharp, J. M., Z. Irani, K. Kutucuoglu, and F. Erzincanli. "Integrating TQM and TPM into a management information system." International Journal of Information Technology and Management 1, no. 2/3 (2002): 242. http://dx.doi.org/10.1504/ijitm.2002.001199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Aspinwall, Elaine, and Maged Elgharib. "TPM implementation in large and medium size organisations." Journal of Manufacturing Technology Management 24, no. 5 (2013): 688–710. http://dx.doi.org/10.1108/17410381311327972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Danner, Peter, and Daniel Hein. "A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices." JUCS - Journal of Universal Computer Science 16, no. (9) (2010): 1139–51. https://doi.org/10.3217/jucs-016-09-1139.

Full text
Abstract:
The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario it is necessary to establish an initial trust relationship between the emergency infrastructure providers and a user, her devices, and the software running on those devices. Currently, this requires physical presence of the involved entities. In this paper we propose a remote protocol that employs electronic identity facilities and Trusted Computing to aggregate the identity of a user, the identity of her devices and a set of trusted software states as well as the users facilities and skills. Such a protocol alleviates the need for physical presence. Thus, the protocol facilitates deployment of new electronic emergency equipment, while maintaining a high level of security. We belief that such a protocol is an important step in the process of introducing new capabilities for disaster response.
APA, Harvard, Vancouver, ISO, and other styles
30

Oliveira, Davi de, and Sandro Santos. "Maturidade sexual morfológica de Aegla platensis (Crustacea, Decapoda, Anomura) no Lajeado Bonito, norte do estado do Rio Grande do Sul, Brasil." Iheringia. Série Zoologia 101, no. 1-2 (2011): 127–30. http://dx.doi.org/10.1590/s0073-47212011000100018.

Full text
Abstract:
O tamanho da primeira maturação sexual (TPM) em Aegla platensis Schmitt, 1942 foi estimado através das mudanças nas proporções de dimensões corporais dos animais. Para isso, foram realizadas coletas mensais, de julho de 2007 a junho de 2008 no Lajeado Bonito (27º25'27''S, 53º24'39''W), um tributário de primeira ordem do Rio da Várzea, município de Frederico Westphalen, Rio Grande do Sul. Foram utilizados 437 machos com comprimento de cefalotórax (CC) variando de 6,00 mm a 31,75 mm e 368 fêmeas, com tamanhos entre 6,08 mm e 27,92 mm de CC. As seguintes dimensões corporais foram mensuradas em todos os indivíduos coletados: comprimento do cefalotórax (CC), largura do abdome (LA), comprimento do própodo do quelípodo direito (CPD) e comprimento do própodo do quelípodo esquerdo (CPE). Após o registro dessas medidas, os animais foram devolvidos ao mesmo local de captura. As análises de maturidade sexual morfológica foram realizadas com auxílio do software Mature 2, nas quais foram utilizadas as medidas de CC, considerada como variável independente e relacionada com as demais dimensões. As relações que melhor se ajustaram para estas análises, em machos, foram CPD x CC (TPM: CC=18,2 mm) e CPE x CC (TPM: CC=20,1 mm) e LA x CC (TPM: CC=16,5 mm) nas fêmeas.
APA, Harvard, Vancouver, ISO, and other styles
31

Svenda, Petr, Antonin Dufka, Milan Broz, et al. "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 714–34. http://dx.doi.org/10.46586/tches.v2024.i2.714-734.

Full text
Abstract:
The Trusted Platform Module (TPM) is a widely deployed computer component that provides increased protection of key material during cryptographic operations, secure storage, and support for a secure boot with a remotely attestable state of the target machine. A systematic study of the TPM ecosystem, its cryptographic properties, and the orderliness of vulnerability mitigation is missing despite its pervasive deployment – likely due to the black-box nature of the implementations. We collected metadata, RSA and ECC cryptographic keys, and performance characteristics from 78 different TPM versions manufactured by 6 vendors, including recent Pluton-based iTPMs, to systematically analyze TPM implementations.Surprisingly, a high rate of changes with a detectable impact on generated secrets, the timing of cryptographic operations, and frequent off-chip generation of Endorsement Keys were observed. Our analysis of public artifacts for TPM-related products certified under Common Criteria (CC) and FIPS 140 showed relatively high popularity of TPMs but without explanation for these changes in cryptographic implementations. Despite TPMs being commonly certified to CC EAL4+, serious vulnerabilities like ROCA or TPM-Fail were discovered in the past. We found a range of additional unreported nonce leakages in ECDSA, ECSCHNORR, and ECDAA algorithms in dTPMs and fTPMs of three vendors. The most serious discovered leakage allows extraction of the private key of certain Intel’s fTPM versions using only nine signatures with no need for any side-channel information, making the vulnerability retrospectively exploitable despite a subsequent firmware update. Unreported timing leakages were discovered in the implementations of ECC algorithms on multiple Nuvoton TPMs, and other previously reported leakages were confirmed. The analysis also unveiled incompleteness of vulnerability reporting and subsequent mitigation with missing clear information about the affected versions and inconsistent fixes.
APA, Harvard, Vancouver, ISO, and other styles
32

Slavina, Tomislav, and Nedeljko Štefanić. "Facing Challenges of Implementing Total Productive Management and Lean Tools in Manufacturing Enterprises." Systems 12, no. 2 (2024): 52. http://dx.doi.org/10.3390/systems12020052.

Full text
Abstract:
Manufacturing companies are always looking for ways to outperform their competitors. They are constantly trying to improve their efficiency and reduce costs. One method that improves efficiency and maximises the availability of production equipment is total productive maintenance (TPM), which is a lean optimisation philosophy tool that focuses on the optimisation of maintenance. Although TPM is known for improving maintenance, there are many obstacles to its successful implementation. Failure to properly implement TPM can result in additional costs and lost time, and it can have a negative impact on employees. For these reasons, a survey was prepared and conducted among several companies, each involved in a different field of work and having a different number of employees. The main findings of this research are the key factors that can negatively impact the implementation of TPM and lean tools in general, as well as suggestions for improvements that can ensure their successful implementation and sustainability. An analysis was conducted based on the size of each company as well as the job roles within them. The study covers issues that may arise during the implementation of TPM and other lean tools at all levels of the hierarchy in an enterprise and provides guidance on how to manage situations that may prevent the successful application of TPM.
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, Haranich, Frolov Ya, Grydin O, Voswinkel D, Andreiev A, and Remez O. "Failure mode of reinforcing steel mesh in aluminum roll bonded composite material." Theory and practice of metallurgy 1, no. 1 (2019): 29–34. http://dx.doi.org/10.34185/tpm.1.2019.03.

Full text
Abstract:
Flat roll-bonded aluminum 6060 composite materials with reinforcing steel inlets made of woven wire mesh (AISI 321) and expanded mesh (AISI 304) have been produced at 20 % and 30 % reduction. The roll bonding process has been performed at 400 and 500℃. After the process the composites were peeled and their interfaces were subsequently studied via SEM microscopy. In all cases the fracture of mesh inlets has been observed. The analysis of the failure mode has shown that the fracture of woven wire mesh corresponds to that described by other researchers. At the same time, the failure mode of expanded mesh inlet was presented in this study is characterized by a significant amount of brittle fracture at the region between strands and knuckles of expanded mesh. In order to analyze a stress state in these regions, the simulation using the finite element method (FEM) was set up by means of QForm software. The thermal and deformational conditions corresponded to experimental ones. It was shown that the von Mises stress reaches a significant magnitude up to the strength of austenitic steel. At the same time, a study of initial micro hardness of expanded mesh was conducted. The study revealed a significant work-hardening in the region of knuckles due to manufacturing procedure of expanded mesh and this seems to be the most important cause of destruction. In order to avoid such fracture, the annealing of expanded mesh was proposed. Presented results show a significant decrease of hardness and therefore an opportunity plastic deformation of expanded steel mesh.
APA, Harvard, Vancouver, ISO, and other styles
34

Assiddiqi, Dimas Ruri, Rufi'i Rufi'i, and Suhari Suhari. "PENGEMBANGAN E-MODUL PEMBELAJARAN CNC MILLING DENGAN SOFTWARE MASTERCAM 2018." EDUTECH 24, no. 1 (2025): 194–207. https://doi.org/10.17509/e.v24i1.76776.

Full text
Abstract:
One way to enhance the quality of student learning is to include E-Modules into the learning process. The goals of this development study were to identify the steps involved in creating learning E-modules, to assess the modules' practicability, to collect feedback from students and teachers, and to identify the learning outcomes for students based on the generated E-modules. The study methodology employs RD with module development following Thiagarajan's 4-D paradigm, which consists of four steps: definition, design, development, and distribution. A total of thirty-five students from Grade 12 at TPM 1, SMK 1, PGRI 1, and Gresik participated in the research. A highly feasible score of 94.30% was achieved by the E-Modules when evaluating their content, language, and medium feasibility. There were three categories into which students' comments were subdivided: advantages, material presentation, and appearance. An excellent, or very good, average value of 86.74% was achieved. The average response from CNC subject instructors was 90.50 percent good. The N-Gain test revealed an improvement in student learning outcomes that falls into the moderate range, with a result of 0.62. This study's findings support the viability of incorporating the E-Module CNC milling with Mastercam 2018 software into CNC course curriculum in machining engineering. Salah satu cara untuk meningkatkan kualitas pembelajaran siswa adalah dengan memasukkan E-Modul ke dalam proses pembelajaran. Tujuan dari penelitian pengembangan ini adalah untuk mengidentifikasi langkah-langkah yang terlibat dalam pembuatan E-Modul pembelajaran, menilai kepraktisan modul, mengumpulkan umpan balik dari siswa dan guru, dan mengidentifikasi hasil belajar siswa berdasarkan E-Modul yang dihasilkan. Metodologi penelitian ini menggunakan metode penelitian dan pengembangan (RD) dengan pengembangan modul mengikuti paradigma 4-D dari Thiagarajan, yang terdiri dari empat langkah yaitu pendefinisian, perancangan, pengembangan, dan penyebaran. Sebanyak tiga puluh lima siswa dari kelas 12 di TPM 1, SMK 1, PGRI 1, dan Gresik berpartisipasi dalam penelitian ini. Nilai sangat layak sebesar 94,30% dicapai oleh E-Modul ketika mengevaluasi konten, bahasa, dan kelayakan media. Ada tiga kategori yang dibagi menjadi komentar siswa: kelebihan, penyajian materi, dan penampilan. Nilai rata-rata yang sangat baik, atau sangat baik, sebesar 86,74% tercapai. Rata-rata tanggapan dari instruktur mata pelajaran CNC adalah 90,50% baik. Uji N-Gain menunjukkan adanya peningkatan hasil belajar siswa yang termasuk dalam kategori sedang, dengan hasil 0,62. Temuan penelitian ini mendukung kelayakan penggunaan E-Modul CNC milling dengan perangkat lunak Mastercam 2018 ke dalam kurikulum mata kuliah CNC di jurusan teknik pemesinan.
APA, Harvard, Vancouver, ISO, and other styles
35

Srivastava, Pallavi, and Shilpi Jain. "A leadership framework for distributed self-organized scrum teams." Team Performance Management: An International Journal 23, no. 5/6 (2017): 293–314. http://dx.doi.org/10.1108/tpm-06-2016-0033.

Full text
Abstract:
Purpose Scrum, an agile software development method, has gained major interest among software development organizations. The scrum master should be well equipped with specific leadership traits and exhibit leadership behavior to effectively manage his/her team. However, in a distributed team, which is spread across geographies, having scrum master to lead the project team at each location is not viable. Therefore, every member in the team is expected to have the capability to become one. This paper aims to explore the leadership mechanisms desired for effective functioning of distributed self-organized scrum team members, leading to project success and overall customer satisfaction. Design/methodology/approach A qualitative research methodology with an open-ended questionnaire is followed by semi-structured in-depth interviews. The unit of analysis is a scrum master. Findings The qualitative findings unearth the kind of leadership mechanisms required for scrum masters and the team members in a self-organizing scrum team, leading to their project success and customer satisfaction. It includes a set of leadership approaches and behaviors explicitly related to the role of scrum masters. Both inductive and deductive approaches are used to develop a leadership framework applicable for distributed self-organized scrum teams. Research limitations/implications The proposed framework can be empirically tested with a large number of teams and more software organizations. Practical implications Organizations can use these identified specific leadership approaches and behaviors as parameters for identifying and selecting the potential scrum masters. They can be further trained on them to be an effective scrum master. Originality/value There is scant literature on the leadership mechanisms necessary for distributed scrum teams and their impact on project performance. This paper addresses this gap.
APA, Harvard, Vancouver, ISO, and other styles
36

Rostislav, Liutyi. "Analytical method of calculation of thermal fields of cast parts during crystallization." Theory and practice of metallurgy 1,2021, no. 1,2021(126) (2021): 5–13. http://dx.doi.org/10.34185/tpm.1.2021.01.

Full text
Abstract:
The aim of the work is to create a mathematical method that allows to calculate the distribution of thermal fields in cast parts during crystallization using a system of analytical formulas. During the calculations, a combination of known analytical formulas GF was used. Balandin, AY Weinik, S. Schwartz with their own original mathematical solutions created on the basis of the analysis of thermophysical processes in castings in the process of their crystallization. Computer simulation of thermal fields using the LVMFlow program was used to compare the results. According to the created mathematical method, examples of calculation of thermal fields for two castings made of steel 25L of hollow cylindrical shape, the wall thickness of which is 100 mm and 4 mm, respectively, are given. Calculations were performed for the conditions of crystallization of castings in a single sand form. The comparison of results of calculations by the developed method and with use of the existing software is presented. For the first time, based on our own mathematical and thermophysical developments, a comprehensive calculation method for determining the thermal field of the casting during crystallization and cooling was developed. casting. The technique is expressed in a number of analytical formulas, each of which describes a specific thermal process that occurs in the casting. This takes into account the features of the casting configuration. The created complex method of calculation of thermal fields of cast parts is a mathematical basis for determining the thermal fields of molds and rods, which allows to predict their properties and select the optimal molding materials. The created technique can also be offered as a mathematical basis for refining applied computer programs for foundry production. CASTING, TEMPERATURE, THERMAL FIELD, COOLING DYNAMICS, COOLING DURATION, MATHEMATICAL LAW, COLORING FRONT, CALCULATION
APA, Harvard, Vancouver, ISO, and other styles
37

R, Liutyi. "Analytical method of calculation of thermal fields of foundry cores." Theory and practice of metallurgy, no. 3, 2021 (April 1, 2021): 56–68. http://dx.doi.org/10.34185/tpm.3.2021.08.

Full text
Abstract:
The aim of the work is to create on the basis of the analysis of thermophysical parameters and regularities of mathematical methods, which allows to calculate the distribution of thermal fields in molds and rods using a system of analytical formulas. The method of calculating thermal fields in foundry molds and rods developed and presented in this publication is based on the finite difference method. Much attention is paid to the calculations of the dynamics of changes in the surface temperatures of the casting rod and its center. The article shows that the basis for the correct calculation of the thermal field of the rod is to establish the change in surface temperature in the first few seconds after the start of contact with the melt. All currently available methods do not take into account this change in temperature. A new concept is introduced - the period of thermal inertia of the rod. This is the period of time during which its surface temperature rises from the initial value (ambient temperature) to a value corresponding to the surface temperature of the casting. The period of thermal inertia depends exclusively on the thermophysical properties of the rod. To calculate the temperature change in the center of the casting rod, a modified method of S. Schwartz was used: instead of the constant contact temperature of the "casting-rod" in the formula takes into account the previously estab- ?ished dynamics of changes in this temperature. The thermal fields of cylindrical foundry rods with diameters of 50 mm and 16 mm were calculated according to the created mathematical method. A comparison of the results of calculations according to the developed method and with the use of existing software is presented. The difference in design temperatures is 100 oC and more. The difference in determining the thermal fields of a smaller diameter rod is particularly noticeable, which is due to the rapid dynamics of changes in the surface temperature of the casting, which is currently not taken into account by current methods. The developed mathematical technique can be offered as a theoretical basis for refining applied computer programs for foundry production.
APA, Harvard, Vancouver, ISO, and other styles
38

Gaur, Kuntal, Umashankar Rawat, Saket Acharya, Pradeep Kumar, and Anshuman Kalla. "Novel framework for enhancing security of SDN based VPLS architecture." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): 1331–43. http://dx.doi.org/10.47974/jdmsc-1986.

Full text
Abstract:
Software-Defined Networking (SDN) is an emerging technology that enables the extension of a single Ethernet broadcast domain over a wide area network. However, there are still several major network security threats that could lead to network and resource unavailability, man-in-the-middle attacks, cryptographic flaws, and other vulnerabilities. This paper presents a method that proposes the use of Trusted Platform Module (TPM)-based SDN Virtual Private LAN Services (VPLS), which is intended to provide a secure solution that can help mitigate various network attacks. Open VSwitch (OVS) is a virtual switch that can be used to implement SDN-based VPLS networks. Direct Anonymous Attestation (DAA) is used to verify the authenticity of hardware devices without revealing any identifying information about the devices. The proposed architecture is implemented in a testbed to analyze the performance. The results show that TPM can be utilized in an SDN network to enhance security by securely storing encryption keys and certificates.
APA, Harvard, Vancouver, ISO, and other styles
39

Anjos, Rogerio Cabral dos, Ana Caroline Dzulinski, and Lucas Schmidt Goecks. "Performance indicators and maintenance management: scientific mapping." Scientia cum Industria 14, no. 1 (2025): e251401. https://doi.org/10.18226/23185279.e251401.

Full text
Abstract:
The versatility of Industrial Engineering means that professionals face productivity and efficiency challenges in different types and sizes of organizations. To deal with these challenges, practical tools for process optimization are needed, such as Overall Equipment Effectiveness (OEE) and Total Productive Maintenance (TPM), which are highly relevant due to their versatility. In this context, this work aims to research, organize, quantify, and discuss scientific articles in a theoretical review covering the topics of OEE and TPM, considering the large volume of scientific production on these topics. The research was conducted through a Systematic Literature Review that involved searching scientific databases and using the Bibliometrix software and its Biblioshiny extension to construct a scientific mapping. Additionally, a qualitative analysis of the article data was carried out to understand, discuss, and relate the data with scientific mapping, obtaining results on the main keywords, the leading countries with scientific production, the highlighted journals, the impact factor, and correlations between them.
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Guobin, Oluwole Adetifa, Jianzhou Mao, Eric Sakk, and Shuangbao Wang. "Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security." Future Internet 17, no. 5 (2025): 193. https://doi.org/10.3390/fi17050193.

Full text
Abstract:
Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic protocols. Quantum computing introduces significant risks to traditional encryption methods. To address these challenges, we propose investigating a quantum-safe solution for IoT-trusted computing. Specifically, we implement the first lightweight, practical integration of a quantum random number generator (QRNG) with a software-based trusted platform module (TPM) to create a deployable quantum trusted platform module (QTPM) prototype for IoT systems to improve cryptographic capabilities. The proposed quantum entropy as a service (QEaaS) framework further extends quantum entropy access to legacy and resource-constrained devices. Through the evaluation, we compare the performance of QRNG with traditional Pseudo-random Number Generators (PRNGs), demonstrating the effectiveness of the quantum TPM. Our paper highlights the transformative potential of integrating quantum technology to bolster IoT security.
APA, Harvard, Vancouver, ISO, and other styles
41

Tortorella, Guilherme, Tarcisio Abreu Saurin, Flavio Sanson Fogliatto, et al. "The impact of Industry 4.0 on the relationship between TPM and maintenance performance." Journal of Manufacturing Technology Management 33, no. 3 (2022): 489–520. http://dx.doi.org/10.1108/jmtm-10-2021-0399.

Full text
Abstract:
PurposeIn this paper, the authors examine the impact of Industry 4.0 (I4.0) technologies on the relationship between total productive maintenance (TPM) practices and maintenance performance.Design/methodology/approachData collection was carried out through a multinational survey with 318 respondents from different manufacturing companies located in 15 countries. Multivariate data techniques were applied to analyze the collected data. Diffusion of innovations theory (DIT) was the adopted theoretical lens for our research.FindingsThe authors’ findings indicate that I4.0 technologies that aim to process information to support decision-making and action-taking directly affect maintenance performance. Technologies oriented to sensing and communicating data among machines, people, and products seem to moderate the relationship between TPM practices and maintenance performance. However, the extent of such moderation varies according to the practices involved, sometimes leading to negative effects.Originality/valueWith the advances of I4.0, there is an expectation that several maintenance practices and performance may be affected. Our study provides empirical evidence of these relationships, unveiling the role of I4.0 for maintenance performance improvement.
APA, Harvard, Vancouver, ISO, and other styles
42

Roque, Waldir L., and Dionísio Doering. "Trajectory planning for lab robots based on global vision and Voronoi roadmaps." Robotica 23, no. 4 (2005): 467–77. http://dx.doi.org/10.1017/s0263574704001183.

Full text
Abstract:
This paper discusses the techniques and their applications in the development of a path planning system composed of three modules, namely: global vision (GVM), trajectory planning (TPM) and navigation control (NCM). The GVM captures and processes the workspace image to identify the obstacle and the robot configurations. These configurations are used by the TPM to generate the Voronoi roadmap, to compute the maximal clearance shortest feasible path and the visibility pathway between two configurations. The NCM controls the robot functionalities and navigation. To validate the path planning system, three sets of experiments have been conducted using the Lab robot Khepera, which have shown very good results.
APA, Harvard, Vancouver, ISO, and other styles
43

Maier, Torsten, Joanna DeFranco, and Christopher Mccomb. "An analysis of design process and performance in distributed data science teams." Team Performance Management: An International Journal 25, no. 7/8 (2019): 419–39. http://dx.doi.org/10.1108/tpm-03-2019-0024.

Full text
Abstract:
PurposeOften, it is assumed that teams are better at solving problems than individuals working independently. However, recent work in engineering, design and psychology contradicts this assumption. This study aims to examine the behavior of teams engaged in data science competitions. Crowdsourced competitions have seen increased use for software development and data science, and platforms often encourage teamwork between participants.Design/methodology/approachWe specifically examine the teams participating in data science competitions hosted by Kaggle. We analyze the data provided by Kaggle to compare the effect of team size and interaction frequency on team performance. We also contextualize these results through a semantic analysis.FindingsThis work demonstrates that groups of individuals working independently may outperform interacting teams on average, but that small, interacting teams are more likely to win competitions. The semantic analysis revealed differences in forum participation, verb usage and pronoun usage when comparing top- and bottom-performing teams.Research limitations/implicationsThese results reveal a perplexing tension that must be explored further: true teams may experience better performance with higher cohesion, but nominal teams may perform even better on average with essentially no cohesion. Limitations of this research include not factoring in team member experience level and reliance on extant data.Originality/valueThese results are potentially of use to designers of crowdsourced data science competitions as well as managers and contributors to distributed software development projects.
APA, Harvard, Vancouver, ISO, and other styles
44

Ariadi, Gede, Antonius Surjo Abdi, and Christina Ari Pramono Putri. "Analysis of Water Meter Application with Approach of Overall Equipment Effectiveness in Municipal Waterworks Bali." Kumpulan Artikel Mahasiswa Pendidikan Teknik Informatika (KARMAPATI) 12, no. 3 (2023): 118–24. https://doi.org/10.23887/karmapati.v12i3.67047.

Full text
Abstract:
Companies in this globalization era face many problems. One of them is productivity, performance, and customer service. The companies must try to keep the quality. The Total Productive Maintenance (TPM) strategy is a system used to improve equipment quality based on a maintenanceapproach, which can be an effective solution. However, problems were occurring in the Municipal Waterworks business system due to Overall Equipment Effectiveness (OEE) which was not optimal. The solution must be to have an application system that can be used to measure and monitor the performance of water meter readers. This study used data focused on OEE, which began with TPM, which aimed to discover the problems in the maintenance of the municipal waterworks company. SPSS is software used to analyze data collection. SPSS data showed that the highest score is87.61 and 84.21 based on descriptive statistics for the maximum and average scores. This data indicates that OEE is an application vital to the company’s quality. Pearson correlation showed that the availability aspect gave more significant results than the performance and quality aspects.OEE provides benefits in developing equipment performance by analyzing equipment performance and effectively and efficiently checking six big losses. Therefore, the implementation of strategy production with TPM is a combination that provides benefits in a more flexible water meter system and customers who are satisfied with the service from company.
APA, Harvard, Vancouver, ISO, and other styles
45

Medyński, Daniel, Piotr Bonarski, Piotr Motyka, et al. "Digital Standardization of Lean Manufacturing Tools According to Industry 4.0 Concept." Applied Sciences 13, no. 10 (2023): 6259. http://dx.doi.org/10.3390/app13106259.

Full text
Abstract:
Standardization is a key element in the effective use of lean manufacturing methodologies and tools for achieving process sustainability. Their combination is conducive to eliminating waste and improving the efficiency of production processes and guarantees the company that employees use the most efficient tools and do not waste time on unnecessary activities. These activities can be further improved by using digital solutions, in accordance with the concept of Industry 4.0. Therefore, the authors have developed the e-Lean system, whose task is to digitize selected lean manufacturing tools. The subject of this work is analysis of the functionality and effectiveness of the essential part of the e-Lean system in the form of specialized TPM (Total Productive Maintenance) software as an application. During implementation in a construction production company, the TPM application was tested by lean manufacturing and maintenance specialists. The research consisted of assessing the functionality and efficiency of processes in relation to conventional TPM solutions. Additional functionalities of the e-Lean system have been confirmed, such as systemic approval of machinery inspection, which requires passing all necessary steps at individual inspection points, direct access for supervisors to the results of inspection activities and their status, direct and easy access to photographic documentation of machines added during inspection both in optimization of working time and its course (e.g., the optimal number of steps taken by the employee during the inspection), as well as an efficient system of motivating employees (collecting points). The improvement in the effectiveness of processes was determined by measuring the control times for three control points (polymerization furnace, packing area, and defibering machines). The average control time was reduced from 16,200 to 13,923 s. Thus, thanks to the use of the application, it was found that the efficiency of using the TPM tool was increased by approx. 15% compared to previously used non-digital solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Ke, Yongzhen, and Yiping Cui. "Multiple Fusion Strategies in Localization of Local Deformation Tampering." International Journal of Digital Crime and Forensics 13, no. 2 (2021): 103–14. http://dx.doi.org/10.4018/ijdcf.2021030107.

Full text
Abstract:
Tampering with images may involve the field of crime and also bring problems such as incorrect values to the public. Image local deformation is one of the most common image tampering methods, where the original texture features and the correlation between the pixels of an image are changed. Multiple fusion strategies based on first-order difference images and their texture feature is proposed to locate the tamper in local deformation image. Firstly, texture features using overlapping blocks on one color channel are extracted and fed into fuzzy c-means clustering method to generate a tamper probability map (TPM), and then several TPMs with different block sizes are fused in the first fusion. Secondly, different TPMs with different color channels and different texture features are respectively fused in the second and third fusion. The experimental results show that the proposed method can accurately detect the location of the local deformation of an image.
APA, Harvard, Vancouver, ISO, and other styles
47

Ruiz-Torres, M. F., E. Castillo-Castaneda, and J. A. Briones-Leon. "Design and analysis of CICABOT: a novel translational parallel manipulator based on two 5-bar mechanisms." Robotica 30, no. 3 (2011): 449–56. http://dx.doi.org/10.1017/s0263574711000646.

Full text
Abstract:
SUMMARYThis work presents the CICABOT, a novel 3-DOF translational parallel manipulator (TPM) with large workspace. The manipulator consists of two 5-bar mechanisms connected by two prismatic joints; the moving platform is on the union of these prismatic joints; each 5-bar mechanism has two legs. The mobility of the proposed mechanism, based on Gogu approach, is also presented. The inverse and direct kinematics are solved from geometric analysis. The manipulator's Jacobian is developed from the vector equation of the robot legs; the singularities can be easily derived from Jacobian matrix. The manipulator workspace is determined from analysis of a 5-bar mechanism; the resulting workspace is the intersection of two hollow cylinders that is much larger than other TPM with similar dimensions.
APA, Harvard, Vancouver, ISO, and other styles
48

V, Bochka, Tarakanov A, Sova A, Boyko M, Yaholnyk M, and Dvoiehlazova A. "Improving the technology production of quality agglomerate." Theory and practice of metallurgy 1, no. 1 (2019): 5–14. http://dx.doi.org/10.34185/tpm.1.2019.01.

Full text
Abstract:
Purpose. The existing technological scheme of agglomeration does not allow obtaining a amount of agglomerate stabilized by size and strength with a small amount of trifle. The aim of the work is theoretical substantiation and development of measures to improve agglomerate production technology in modern conditions on the basis of the results of the study of effective methods of separate preparation of the charge before sintering, as well as methods of mechanical processing of sintered agglomerate in devices of special construction. Methodology. The analysis of the basic thermodynamic parameters and phase composition for the components of the sinter charge was carried out using the software complex HSC Chemistry 5.11. Investigation of the effect of separate preparation of the charge with the use of pre-prepared composites on the parameters of sintering and the quality of agglomerate was carried out in the laboratory of the department metallurgy of cast iron NMetAU at the aggregate for sintering. The determination of the effectiveness of the proposed measures was carried out by mechanical processing of agglomerates obtained after the classical and proposed scheme of preparation of the charge. The quality of the obtained agglomerate was estimated using indicators: uniformity of the granulometric composition, content of trifles, strength indicators after discharge to the steel plate [DSTU 3199-95], coefficient of shape of pieces of different sizes, chemical composition. Findings. It has been determined that the use of separate preparation of the charge has a positive effect: significantly decreases the amount of fraction 0-1 mm and increases the equivalent diameter of the granules; diminishes the mean square deviation and variation coefficient, indicating a more homogeneous granulometric composition of raw granules. The efficiency of separate preparation of a charge with the use of composite with the basicity of 0.9-1.0 is confirmed from a concentrate (size 0-0.1 mm), iron ore (0-3 mm), lime (0-3 mm) and limestone (0-3 mm) and residual blend with the basicity of 1.6-1.8 from iron ore (3-10 mm), sinter return (0-10 mm) and limestone (0-3 mm). Originality. The idea of interaction of different components of agglomeration charge during the separate processes of humidification and laceration is developed. The possibility of forming more homogeneous in size and composition of granules is substantiated, by their separate origin not only around large pieces of backs and ores, but also due to the separate interaction of small components with active surface properties, and subsequent joint granulation of the embryos of granules with the residual charge. It is shown that depending on the given conditions, at the stage of separate preparation of the charge, a binder part is formed predominantly of iron-calcium olivines and calcium ferrites. Practical value. Technological recommendations for increasing the efficiency of preparation of sinter charge to sintering and practical recomendations for the design and technological parameters of the drum-stabilizer work, which ensures the stabilization of agglomerate.
APA, Harvard, Vancouver, ISO, and other styles
49

David, Safford, Wiseman Monty, and Dave Avani. "SEDAT: Security Enhanced Device Attestation with TPM2.0." Journal of Scientific and Engineering Research 6, no. 10 (2019): 298–309. https://doi.org/10.5281/zenodo.13348541.

Full text
Abstract:
Remote attestation is one of the ways to verify the state of an untrusted device. Earlier research has attempted remote verification of a device’s state using hardware, software, or hybrid approaches. Majority of them have used Attestation Key as a hardware root of trust, which does not detect hardware modification or couterfiet issues. In addition, they do not have a secure communication channel between verifier and prover, which makes them susceptible to mordern security attacks. This paper presents SEDAT, a novel methodology for remote attesta- tion of the device via a security enhanced communication channel. SEDAT performs hardware, firmware, and software attestation. SEDAT enhances the communication protocol security between verifier and prover by using the Single Packet Authorization (SPA) technique, which provides replay and Denial of Service (DoS) protection. SEDAT provides a way for verifier to get on- demand device integrity and authenticity status via a secure chan- nel. It also enables the verifier to detect counterfeit hardware, change in firmware, and software code on the device. SEDAT validates the manufacturer’s root CA certificate, platform cer- tificate, endorsement certificate (EK), and attributes certificates to perform platform hardware attestation. SEDAT is the first known tool that represents firmware, and Integrity Measurement Authority (IMA) event logs in the Canonical Event Logs (CEL) format (recommended by Trusted Computing Group). SEDAT is the first implementation, to the best of our knowledge, that showcases end to end hardware, firmware, and software remote attestation using Trusted Platform Module (TPM2.0) which is resilient to DoS and replay attacks. SEDAT is the first remote verifier that is capable of retrieving a TPM2.0 quote from prover and validate it after regeneration, using a software TPM2.0 quote check. All source code, tools, and kernel patches are open-sourced via BSD 2-Clause License.
APA, Harvard, Vancouver, ISO, and other styles
50

Utami, Fathya Suci, Delima Yanti Sari, Purwantono Purwantono, and Junil Adri. "Pembuatan Perangkat Pembelajaran Berbasis Modul pada Mata Pembelajaran Gambar Teknik Manufaktur Kelas XI TPM." MASALIQ 3, no. 6 (2023): 1334–46. http://dx.doi.org/10.58578/masaliq.v3i6.2082.

Full text
Abstract:
Learning in several vocational schools uses Autodesk software which has many features and is also widely used in industry. The change in the use of the 2013 curriculum at SMK N 5 Padang will certainly change the learning concept which originally used the 2013 curriculum to become an independent curriculum. Curriculum changes require teachers to prepare new media or teaching materials in accordance with the established curriculum. The aim to be achieved in the research is to develop a PJBL (Project Based Learning) based learning tool for the Manufacturing Engineering Drawing subject with the hope that this module can be used in schools as a learning medium. This research uses the R&D method with the ADDIE development model. Material expert validation was carried out by 3 experts in the field of production materials. The percentage of presentation aspects is 1.0 and the percentage of content aspects is 0.97. The percentage of validation results for all aspects is 0.98 in the very valid category. Validation of media experts and models was carried out by 3 experts in the media field. The percentage of the visual appearance aspect is 0.96, the physical criteria aspect is 0.93 and the convenience aspect is 1.0. The percentage of media expert validation results from all aspects is 0.96, very valid research category. Language expert validation was carried out by 1 expert in the field, consisting of 8 items. The percentage of language expert validation is 0.87 in the very valid category, so this teaching module is said to be very good for use in the learning process by future researchers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!