Cim and holonic manufacturing system, Computer Engineering

CIM and Holonic Manufacturing System

The improvement of computer integrated manufacturing has demonstrated that the automation has the same potential such that of computers in business administrations. Computer integrated manufacturing has developed from programmable logic control and individual machine controller to overall production control systems based upon information network. Latest developments are aiming at standardized communication channel and open system with the probability to transfer and process each kind of information on the shop floor. The process equipment's controls have access to all information in real time. They are not only capable to communicate along with central system but also along with each other. Overall, the major shortcoming is to overcome the complexities encountered to utilize these functionalities. In that observation Holonic manufacturing system is an execution strategy for the further development of computer integrated manufacturing. HMS can be considered like a software technology on the top level of communication infrastructure in networked manufacturing machines enabling the employ of large information resources for decentralized decision making. Thus, Holonic control systems are the origin for the effectual utilize of advanced Computer Integrated Manufacturing.      

 

Posted Date: 3/4/2013 7:22:44 AM | Location : United States







Related Discussions:- Cim and holonic manufacturing system, Assignment Help, Ask Question on Cim and holonic manufacturing system, Get Answer, Expert's Help, Cim and holonic manufacturing system Discussions

Write discussion on Cim and holonic manufacturing system
Your posts are moderated
Related Questions
The Environment variable SCRIPT_NAME in CGI script specifies? In CGI script gives the path of URL after server name.

Intentional hacking helps in maintaining better security Several companies employ professionals as security specialists whose basic job is to detect and cover loopholes in t

Q. Show the Noframes Tag? tag can be used for those browsers which aren't able to interpret tags. Even though most, if not all, of your visitors would

A distributed workstation cluster must be viewed like single computing resource and not as a group of particular workstations'.  Details of cluster were: 150MHz R4400 workstatio

Important points of simulations In this simulation it is essential to consider: (1)  What and how data is gathered (2)  How simulation is done (3)  How system would wo

representation of the adjacency matrix and adjacency list

Back propagation Learning Routine - Aartificial intelligence As with perceptrons, the information in the network is stored in the weights, so the learning problem comes down to

How many types of stages include in process of data mining? The process of data mining comprised three stages as given below: a) The initial exploration b) Model buildin

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

The EFI community has formed an open source shell environment. Rather than booting directly into a full OS, on some executions, the user can boot to the EFI shell. The shell is an