Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberphysical systems and Internet of Things (IoT), artificial intelligence (AI), machine learning (ML) and big data, robots and drones, cloud computing, 5G and 6G networks, 3D printing, virtual and augmented reality, and blockchain technology. These technologies are based on a set of foundation technologies which include advances in computing, nanotechnology, biotechnology, materials, energy, and finally cube satellites. We illustrate the confluence of all these technologies in a single model factory. This new factory model succinctly demonstrates the advancements in manufacturing introduced by these modern technologies, which qualifies this as a seminal industrial revolutionary event in human history.
Abstract
The research aims at achieving a set of objectives, which is to study a vital variable in the organizations which is the talent management and its impact on encouraging and empowering employees to take part in making appropriate decisions with their heads in the Iraqi Cement State Company. The problem of this research is in finding solutions to the weaknesses that face the managers in attracting talented employees and keep them in the company, and this leads to a weak capacity of the company on authorizing talented employees and giving them the needed confidence to participate in decision making process. The research sample was included (45) managers in the researched company. Th
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreProduced water is accompanied with the production of oil and gas especially at the fields producing by water drive or water injection. The quantity of these waters is expected to be more complicated problem with an increasing in water cut which is expected to be 3-8 barrels water/produced barrel oil.Produced water may contain many constituents based on what is present in the subsurface at a particular location. Produced water contains dissolved solids and hydrocarbons (dissolved and suspended) and oxygen depletion. The most common dissolved solid is salt with concentrations range between a few parts per thousand to hundreds parts per thousand. In addition to salt, many produced waters also contain high levels of heavy metals like zinc, bari
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreImpact of buildings in Iraq and other countries on the environment is obvious; this problem began to take scientific and humanitarian dimensions in order to reduce and eliminate this problem. This impact can be seen through the energy, water and raw materials consumed for the establishment, operation and maintenance of these buildings, as well as the emissions of hazardous gases and generations of solid wastes.
This work was conducted to assess the current maintenance managerial practice for the governmental buildings to stand on the main obstacle and extrapolation of measures by means of interviews with experts to determine the effective factors and closed questionnaire to state the features and the need for new
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More