Summary of Chen et al.’s “Smart factory of industry 4.0: Key technologies, application case, and challenges”

TO: Professor Jason W. Ellis.

FROM: Motahear Hossain.

DATE: March 3, 2021

SUBJECT: 500-Word Summary of Article About Smart Factory.

This memo is a 500-word summary of the article, “Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges,” by Baotong Chen, Jiafu Wan, Lei Shu, Peng Li, Mithun Mukherjee, And Boxing Yin. This article discusses the latest of 4 distinct industrial revolutions that the world has or is currently experiencing.

According to the research, upgrading the manufacturing industry is a combination of advanced physical architecture and cyber technologies. Those technologies are constructed with three layers, including the physical resources layer, network layer, and data application layer. The researcher Chen et al. are examining those issues scientifically and try to find supplementary solutions with references. 

The traditional industry faces threats because of the rapid change in the technology sector. Currently, another advanced system is coming with integrations of computation, networking, and physical processes called the Cyber-Physical system. This system is capable of achieving advanced manufacturing systems with big data warehouses and cloud-based computing. Several studies (Benkamoun et al., 2014; Radziwon et al., 2014; Lin et al., 2016, p. 6506) found that to build a smart factory, manufacturing enterprises need to be more advanced in the production and marketing sector. It signifies a dive advancing from more outdated automation to a completely connected and flexible system. Research by Chen et al., suggests that there are still many technical problems that need to be solved in order to build a smart factory. An example of this would be the physical resources layer. The Modular Manufacturing Unit should be a self-reconfigurable robotic system with a configurable controller system, which will have the auto managing ability to take the action like extend, replace, and so on.

According to Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges (2018), “Morales-Velazquez et al. developed a new multi-agent distributed control system to meet the requirements of intelligent reconfigurable Computer Numerical Control (CNC)” (p. 6507). Which could utilize its system of control. Another important modular manufacturing unit is intelligent data acquisition. It includes data analysis, reporting, network connectivity, and a remote-control monitoring system. For using data acquisition, the most common wireless sensor network is RFID, ZigBee, and Bluetooth; However, Zhong et al. proposed an RFID-enabled real-time manufacturing execution system (Chen et al., 2018, p. 5608). According to researcher Zhong et al., this system is capable of making decisions and guarantee responses within specified time constraints. Also, the writer proposes to have a standard OPC UA-based interaction in multi-agent systems. With this system, multiple transport layers and a sophisticated information model allow the smallest dedicated controller to freely interact with complex, high-end server applications with real-time communication. 

Despite all of this, researcher Chen et al. has drawn attention to the fact that there are still some difficulties to build a smart factory. Like in order to have a self-reconfigurable robotic system, equipment must be smart manufacturing, and the industrial internet of things should be progressive.

Reference

CHEN, B., WAN J., SHU L., LI P., MUKHERJEE M., AND YIN B. (2018). Smart factory of industry 4.0: Key technologies, application case, and challenges. IEEE Access, 6, 6505-6516. https://doi.org/10.1109/ACCESS.2017.2783682

Summary of Martinez et al.’s “An agile-based integrated framework for mobile application development considering ilities”

TO: Prof. Ellis
FROM: Richard Rivera Urgiles
DATE: 03/03/2021
SUBJECT: 500-Word Summary of Article about Mobile Development Framework

The following is a 500-word summary of a peer-reviewed article about the considerations of frameworks and mobile ilities. The authors discuss how useful it is to consider using a framework and taking mobile ilities into account when developing an application. App developers start projects without having a blueprint therefore run into problems. There have been previous methods addressing these problems that were proposed but they have restrictions therefore it is not a complete solution. A solution was provided known as the ‘Integrated Framework for Mobile Application Development’ (IFMAD). This framework was introduced to a few students at a university which led to a good evaluation. The first stage of development is where if the app addresses the needs of customers and if the app is manifesting the product concept. The last stage is where the app should be ready to be launched on various platforms. There will be future updates to maintain the functionality of the app and to meet evolving customer needs. The most diverse attributes from previous evaluations/studies were taken into consideration to address common concerns within the development of an app and grouped them together to be now known as Mobile Ilities. The team of students decide to go for Scrum as the agile method to develop the app. This stage is where the team decides how the app will be designed and on what platform. The team must be wary and take into consideration the problems that may arise therefore they will have to choose the most relevant ilities that have to be addressed. More than one mobile ility can be considered from the development team so they do not limit themselves. IFMAD makes the process of meeting google play upload requirements easier. According to the authors, “The development tasks selected during the process demonstrated an understanding of the initial stage of product concept definition, with requirements and design activities, but without inclusion of such kind of activities during development sprints” which means the team had a waterfall life cycle mindset (Martinez et al., 2020, p. 72468). Data security can be hard to implement but using third party solutions such as Facebook and/or firebase can make it easier. Energy consumption and app optimization can become an issue due to a vast number of android devices in the market which release OS updates at different times. Flexibility is a big deal because it is a generic concept, but it can turn into a big deal depending on the context. Overall, the framework made a positive impact towards the app and the development team by having less errors than what you would normally have if not given a framework or mobile ilities to work with. The entire thing was a test for a university and may not apply to an actual developing team that has more experience in the real world.

Reference

Martinez, D., Ferre, X., Guerrero, G., & Juristo, N., (2020). An agile-based integrated framework for mobile application development considering ilities. IEEE Access, 8, 72461 – 72470. https://doi.org/10.1109/34.598236

Summary of Buono et al.’s “Towards the Detection of UX Smells: The Support of Visualizations”

TO: Prof. Ellis
FROM: Angela Hernandez
DATE: 3/3/2021
SUBJECT: 500-Word Summary of Article About Usability Smells

The following is a 500-word summary of a peer-reviewed article about the use of visualizations to detect usability smells.  The authors discuss the four methods of visualizations that they developed to identify usability smells in websites by conducting a study, collecting and evaluating the data.  According to the authors, “The proposed visualizations apply and customize existing visualization techniques, which are here used with the novel purpose of providing usability smells to evaluators” (Buono et al., 2020, p. 6902).  User satisfaction with software products is largely influenced by UX attributes.  Poorly designed usability can make it harder for users to navigate an interface.  Many methods can be used to evaluate systems but are rarely implemented by developers for a variety of reasons.  Research done on e-government websites has shown that developers need to be provided with the tools and methods to effectively evaluate and implement usability.  ‘Usability smells’ and ‘Code smells’ respectively indicate weaknesses in the design of an interface or code that can cause problems in the future.  The results reported by the study provide usability evaluators with the tools they need to detect usability smells.  There are two methods used for evaluating usability; User-based methods and analytical methods and several tools available to assist in the different stages of usability testing.  The tools available that provide visual representations help evaluators understand user behavior.  Graph-based structures are commonly used to visualize website navigation or general navigation paths.  The four graph-based structures that are used in this study are the following; Arc Diagram, Word tree, Sankey Diagram and Node-Link.  Each graph-based structure uses the same visual encoding, primarily nodes that are used to reveal usability smells.  In a study done in March 2019, 15 users were tasked with visiting a webpage.  In order to visit the specified webpage, users could take an optimal path to successfully complete the task but because the website has since been updated, the steps taken to accomplish the task might not be the same.  Scalability is not an issue when performing these tests because many of these tests involve a low number of participants executing simple tasks.  Participants were given a booklet composed of the four visualization techniques and tasks to be completed with each technique.  The facilitator introduces and explains the first visualization technique and the participant begins performing the tasks.  In order to check the overall research methodology, the procedure has been assessed by a pilot study.  Researchers created an excel file for each task performed in order to evaluate the support provided by the visualizations.  Two well-known questionnaires were used to evaluate satisfaction with each visualization technique and repeated measures are used to assess the significant differences in the four visualization techniques.  The data collected shows how well the visualization techniques provide support to the evaluators in identifying usability smells.  Despite there being some confusion about the paths certain visualization techniques provided, evaluators were able to detect the paths that led to task failure.  There were no differences between the four visualization techniques in terms of evaluator satisfaction.  

Reference

Buono, P., Caivano, D., Costabile, M. F., Desolda, G., & Lanzilotti, R. (2020). Towards the detection of ux smells: The support of visualizations. IEEE Access, 8, 6901-6914. https://doi.org/10.1109/ACCESS.2019.2961768

Summary of E Kritzinger et al.s “Home User Security- from Thick Security-oriented Home Users to Thin Security- oriented Home Users”

To: Prof. Ellis
From: Matthew Rupchand
Date: 2/10/2021
Subject: 500-Word Summary of Article About the Lack of Cyber Security

In the article “Home User Security- from Thick Security-oriented Home Users to Thin Security- oriented Home Users” by E Kritzinger and Basie von Solms, they bring up the issue of the lack of cybersecurity awareness with the growth of technology for everyday life.  According to Krizinger and Solms, the technology trend has moved towards mobile devices like smartphones and tablets. Krizinger and Solms studied how cybersecurity in growing digital areas such as Africa could affect users that are unaware of all the threats that the internet can put upon them. Krizinger describes the situation in Africa that has seen an increase in technology as he describes them as “Home Users”. “Home Users” aren’t aware of the risk involved with access to the internet. They describe “Home Users” as high-value targets for cybercrime because of the lack of knowledge they possess of cybersecurity that they can and should use to protect themselves. With the growing number of computers and smartphones in homes, Krizinger & Solms consider personal and home computers to be considered as “weaker links” rather than corporate use computers because of the lack of certain security protocols. An example of a cybersecurity breakdown is Africa  “Millions of Africans are using mobile phones to pay bills, move around cash and buy basic everyday items
 Africa has the fastest growing mobile phone arment in the world” (Kritzinger, 2013, pg. 340). In order to increase their security presence, we need to create computer networks that are “out of the box” says Krizinger. Citizens in Africa have skipped a generation of technology which results in them not having the knowledge to become aware of the risk that comes with technology. Krizinger states in the article that “Home users” are only aware of technical issues such as connection to the internet not issues with information being leaked. The article goes into depth about a three-step approach that can help users protect themselves from threats. Regular house computers security is at the hands of their user which Krizinger describes them as “thick security oriented users”(Kritzinger, 2013, pg. 342). The prone problems that these users are exposed to which are forgotten to download patches/updates, do not set up security settings correctly, do not keep up to date with new security risk, allow software licenses to expire, incorrect security protection, lack of cybersecurity awareness, weak passwords, and do not update their anti-virus program regularly. Lack of cybersecurity by home users can also create problems for their government. Krizinger states “Their computers can be used as platforms to launch an attack on a country’s critical information structures, a situation that could prove strategically damaging to any country”(Kritzinger, 2013, pg. 342). So to prevent this and maintain a well-balanced cybersecurity system for home users would be to dedicate the responsibility to third-party companies that will create a secure connection between the home user and the internet. Also, initiatives such as using the Australian ISP to help create more security for users will benefit them however for more extensive security coverage like malware, virus identification, and breaches the ISPs will require the ISP to take more responsibility. Another step that users could take to improve their security and connection is learning and implementing strategies that the ISP will use to help protect them and how it does it. It does work by updating anti-virus software, updating new software patches, scanning computers for viruses frequently, and stopping spam. ISPs can also assist in cybersecurity by referring users to portals that can help increase knowledge of how to use these security programs. However, the user must always keep up their knowledge of cybersecurity to ensure the most out of their security programs and protocols. Although ISPs can help increase cybersecurity in your home it will all depend on the user and how they go on with the information they receive. Simon Hackett (manager of Adelaide ISP) states “ISPs are not the gatekeepers and are not in a position legally or ethically to make decisions for users”(Hackett, 2013, pg. 343). This means that even though the ISPs can help influence decisions upon user they are not legally available to take the full decisions for them. ISPs are not able to control your desire to protect your internet activities and how much users are willing to pay for their security software. The article brings together ways that can help users improve cybersecurity for uses as they referred to it as “intermediate security-oriented home user”(Kritzinger, 2013, pg. 343) that will help users to protect their connection to the internet. The main point of this article is to bring to light how home user security can affect them with security protocols in place with initiatives and strategies to provide guidelines for services to assist in cybersecurity. 

Reference
E Kritzinger., & Basie von Solms. (2013). IEEE Xplore: Home User Security- from Thick Security-oriented Home Users to Thin Security- oriented Home Users, pp. 340-345. https://ieeexplore-ieee-org.citytech.ezproxy.cuny.edu/document/6661760

Outline for Expanded Definition Project, Week 4

During this week’s lecture, I discussed the following outline as a good model for you to follow while creating your own Expanded Definition essay. A good rule of thumb for your quoted material would be at least 2 cited definitions and 3 cited contextual sentences, but you might find having more definitions and more contextual sentences strengthen your essay. Remember to discuss, explain, and compare/contrast the quotes that you find to help your reader understand how these all relate to one another before endeavoring to write your working definition at the end of your essay.

Your Name's Expanded Definition of YOUR TERM

TO: Prof. Jason Ellis
FROM: Your Name
DATE: Due Date
SUBJECT: Expanded Definition of YOUR TERM

Introduction [Heading Level 2]
What is the purpose of this document? What term are you defining? How are you discussing the way it is defined and the way it is used in context? Describe a road map for what follows (definitions and context). This content should be published as paragraphs, unlike the heading for this section, which is a level 2 heading.

Definitions [Heading Level 2]
Quote several definitions of the term that you selected. Provide quotes and parenthetical citations for each definition, and include your sources in the References section at the end of the document. Each definition that you include deserves discussion in your words about what it means and how it relates to the other definitions that you include. Consider how they are alike, how are they different, who might use one versus another, etc.

Context [Heading Level 2]
Quote several sentences from a variety of sources that use the term in context. A range of sources would provide the best source material for your discussion of how the term is used in these contexts. For example, a quote from an academic journal or two, a quote from a newspaper or magazine, a quote from a blog, and a quote from social media would give you a range of uses that might have different audiences. For each quote, you should devote at least as much space as the quote discussing what it means in that context and how it relates to the other quotes in context. Each quote should be in quotes, have a parenthetical citation, and a bibliographic entry in your references at the end of your document.

Working Definition [Heading Level 2]
Based on the definitions that you quoted and discussed, and the contextual uses of the term that you quoted and discussed, write a working definition of the term that's relevant to your career field or major, which you will need to identify (this is the specific context for your working definition).

References [Heading Level 2]
Order your APA-formatted bibliographic references by the author's last name, alphabetically. In your posted version, they do not need a hanging indent. And, they should not be in a bulleted list.

Weekly Writing Assignment, Week 4

For this week’s Weekly Writing Assignment, compose a short memo (remember the memo header of TO, FROM, DATE, and SUBJECT) to Prof. Ellis with the subject, “Expanded Definition Research.” In the body of your memo, write and reflect on how and where you are finding sources for your Expanded Definition project. What databases and research websites are you using? Are you using The New York Times (signup for a free pass here) and Archive.org? No more than 250 words are needed. The main thing is to communicate to me that you are performing your due diligence to find useful definitions and contextual quotes of the term that you selected. Write your memo in your preferred word processor and then copy-and-paste your memo into a comment added to this post.

How to Submit Your 500-Word Summary, Week 4

Refer to this week’s lecture for more details on how to post your 500-Word Summary project to our OpenLab Course Site.

Below, I am including some screenshots to guide you through the process of creating a post for your 500-Word Summary.

To begin your own Post, login to OpenLab, navigate to our Course Site, mouseover the "+" icon, and click "Post."

To begin your own Post, login to OpenLab, navigate to our Course Site, mouseover the “+” icon, and click “Post.”

Before typing anything, look under Categories on the right and add a check next to "500-Word Summary."

Before typing anything, look under Categories on the right and add a check next to “500-Word Summary.”

Click in the "Add Title" section to enter your title (e.g., Summary of Lin's "3D Layering of Integrated Circuits"). Then, click in the "Start Writing" area and copy-and-paste your 500-Word Summary memo from your word processor into this area.

Click in the “Add Title” section to enter your title (e.g., Summary of Lin’s “3D Layering of Integrated Circuits”). Then, click in the “Start Writing” area and copy-and-paste your 500-Word Summary memo from your word processor into this area.

After copyediting your work to ensure everything is as you want it to be, click on "Publish" and then click "Publish" on the next screen. Verify that your post is live on the site by clicking on "ENG2575 Technical Writing" at the top center to return to our Course Site.

After copyediting your work to ensure everything is as you want it to be, click on “Publish” and then click “Publish” on the next screen. Verify that your post is live on the site by clicking on “ENG2575 Technical Writing” at the top center to return to our Course Site and then click on the down arrow next to Student Projects in the left menu and 500-Word Summary beneath it to see your project posted.

Lecture, Week 3

In Week 3’s lecture, we cover: Announcements/Housekeeping, Peer Review for the 500-Word Summary, the 750-1000-Word Expanded Definition Project, and this week’s homework (peer review) and Weekly Writing Assignment (beginning research for the Expanded Definition Project). Remember to watch the entire lecture and make notes before responding to Peer Review or the Weekly Writing Assignment. Also, office hours on Wednesday from 3:00-5:00pm via the link on the syllabus, or you can email me at jellis at citytech.cuny.edu with your questions.

Weekly Writing Assignment, Week 3

After watching this week’s lecture above, use this week’s Weekly Writing Assignment to begin your initial research on the next project: 750-1000-Word Expanded Definition Project. This is the second individually-based project in the class. The goal is to write 750-1000 words that provide an extended definition of a term relevant to your field of studies and/or future career. Below is the synopsis of the assignment from the syllabus:

Individual: 750-1000-Word Expanded Definition, 15%

Individually, you will write a 750-1000 word expanded definition of a technical or scientific term, with cover memo, which demonstrates: 1. correct memorandum format. 2. knowledge of the etymology and historical development of the term. 3. examples of the term’s use in various written contexts. 4. ability to compare and contrast various uses of the term. 5. use and citation of sources with proper attribution. 6. awareness of audience. At least three library-sourced citations are required and should be cited following APA format.

As detailed and explained in this week’s lecture, your Weekly Writing Assignment this week is an opportunity to begin your research, settle on a term to focus on, and find three quotes that you might use in your project. With that in mind, add a comment to this post with the following before next week:

  • Begin with a short paragraph that begins with a statement about three possible terms that you considered and performed cursory research on for your project and concludes with the one term out of the three candidates that you ultimately decided to focus your expanded definition project on.
  • After using the library’s databases and reference guide shown in this week’s lecture, perform more focused research on the single term that you selected and copy-and-paste three quotes–each quote must come from a different source (e.g., one from a dictionary, one from an encyclopedia, and one from an ebook, or all three from different dictionaries, or all three from three different encyclopedias, or all three from journal articles, etc. All combinations will yield quotes that you might use in your expanded definition essay).
  • After each quote, write an APA bibliographic reference for your selection.
  • As always, write your Weekly Writing Assignment in a word processor, save your work, and then copy-and-paste it into a comment added to this post.
  • Remember to rely on the Purdue Owl APA Guide (and its sections listed on the left menu), and the APA Style Guide’s Dictionary References Guide.