1. Trang chủ
  2. » Tất cả

A service oriented secure infrastructure for feature based data exchange in cloud based design and manufacture

6 3 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 6
Dung lượng 540,67 KB

Nội dung

A Service oriented Secure Infrastructure for Feature based Data Exchange in Cloud based Design and Manufacture Procedia CIRP 56 ( 2016 ) 55 – 60 Available online at www sciencedirect com 2212 8271 © 2[.]

Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 56 (2016) 55 – 60 9th International Conference on Digital Enterprise Technology- DET2016 – “Intelligent Manufacturing in the Knowledge Economy Era A Service-Oriented Secure Infrastructure for Feature-based Data Exchange in Cloud-based Design and Manufacture Yiqi Wua,b, Fazhi Hea,b,*, Yilin Chena,b a School of Computer,Wuhan University,No.299,Bayi Road,Wuchang,Wuhan,430072,China Suzhou Institute,Wuhan University,No.377,Linquan Street, Dushu Lake Higher Education Town,Suzhou, 215123,China b * Corresponding author E-mail address:fzhe@whu.edu.cn Abstract Under the impact of service-oriented architecture (SOA) and cloud computing, Cloud-Based Design and Manufacture (CBDM) has been a flexible and effective way for Collaborative Product Development (CPD) As a crucial issue in sharing CAD models for CPD, Feature-Based Data Exchange (FBDE) among heterogeneous CAD systems should be adapted in CBDM On the other hand, the sensitive information and intellectual property of CAD models should be protected in the process of FBDE and CBDM This paper presents a service-oriented architecture for secure FBDE in CBDM This architecture replaces traditional data exchange and secure process, which are based on client sides, with a service-oriented data exchange and secure process on clouds In this way, feature-based CAD models could be exchanged among collaborative designers with the sensitive information protected in CBDM The service-oriented infrastructure provides cost-effective, flexible and scalable solutions for secure FBDE The case study and experiments demonstrate the proposed idea and method © 2016 2016The TheAuthors Authors Published by Elsevier © Published by Elsevier B.V B.V This is an open access article under the CC BY-NC-ND license Peer-review under responsibility of the Scientific Committee of the “9th International Conference on Digital Enterprise Technology - DET (http://creativecommons.org/licenses/by-nc-nd/4.0/) 2016 Peer-review under responsibility of the scientific committee of the 5th CIRP Global Web Conference Research and Innovation for Future Production Keywords: Collaborative Product Development; Cloud-Based Design and Manufacture; Feature-Based Data Exchange; information security Introduction Nowadays, manufacture companies are confronting the challenge of the highly competitive global environment Collaborative Product Development (CPD) offers a rapid response to customer needs and technology changes at low prices, which makes it becomes the core of modern manufacturing industry[1] Along with this trend, the network-hosted collaborative design is considered as a character of next generation CAD systems[2] In CPD, designers and developers require massive data sharing and interoperate the design data among each other[3] Main stream modern CAD systems use parametric featurebased modeling paradigm Feature-based CAD model which contains the design intent, design history, parameters and constraints is the main carrier of the sharing design data So the feature-based data exchange (FBDE) is very significant for collaborative CAD On the other hand, how to protect intellectual property rights and sensitive information of CAD model becomes an emergency issue for collaborative design because of the interoperation and data sharing [4, 5] Inspired by the concept and technology of cloud computing and Service-Oriented Computing(SOC) /Service-Oriented Architecture(SOA) [6-8], the ideas and characteristics of “cloud” and “service” are being brought to CPD to form the Cloud-Based Design and Manufacturing (CBDM)[9] CBDMenabled CPD provides cost-effective, flexible and scalable solutions to collaborative partners by sharing the resources in the applications of design and manufacturing This paper focuses on the secure FBDE method with the consideration of sensitive information security in CBDM The rest of this paper is organized as follows: in section 2, the related work of collaborative design and CAD model security is briefly reviewed; the FBDE and model information security 2212-8271 © 2016 The Authors Published by Elsevier B.V This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/) Peer-review under responsibility of the scientific committee of the 5th CIRP Global Web Conference Research and Innovation for Future Production doi:10.1016/j.procir.2016.10.016 56 Yiqi Wu et al / Procedia CIRP 56 (2016) 55 – 60 method are introduced and the service-oriented secure FBDE architecture is proposed in section 3; section discusses the implementation case of the service-oriented secure FBDE; Finally, section summaries the contributions of the paper and indicates some future works services in cloud, designers could require the FBDE service to achieve the parametrical model sharing directly between heterogeneous CAD systems If the CAD model contains sensitive parts, user could require the security service to hide this information based on the model information hiding method introduced in this paper Related work SOA was first proposed in the middle of 1990s [7, 8] The use of Web Services [10, 11] became the main trend to achieve SOA After adopting the ideas of SOA and taking computing resources as services from cloud, cloud computing became a hot research area and was applied widely[12, 13].Using technology of SOA, Web Services and Cloud Computing, CBDM were proposed and applied as technologies and methodologies to enable CPD[14-16] In the CBDM, various CAD systems are used by different collaborative partners FBDE solution for heterogeneous CAD model is needed in CBDM He et al established a CSCW based CAD system for CPD to realize CAD data exchange[17, 18] Li et al proposed the concept of Dynamic Feature which are used as the basis for integrating machining, monitoring, and on-line inspection operations and establish a set of integrated information models to address the dynamics of machining conditions[19, 20] Zhang, He, Han and Li presents a new asymmetric strategy to enrich the theory of feature-based interoperability, particularly when addressing a singular feature or singular sketch [21] Our previous researches presented a procedure recovery approach, which extended the existing researches[22, 23] Later we present a service-oriented FBDE architecture for CBDM, in which FBDE was registered as service among heterogeneous CAD systems [24] While the network gives convenience to collaborative work, it also brings security risks to the private sensitive information of each collaborative partner The security risks has become a main obstacle of collaborative design implementation[25, 26] and these risks become more prominent in CBDM The sensitive model information hiding method for feature based CAD model is lacking, which increases the risk of sensitive information leakage while collaborative partners sharing information, such as doing FBDE Moreover, it is an emerging trend that users require resources as service from cloud in nowadays cloud-based CPD Under this impact, the function based FBDE and model information protection method should be transferred in to services-oriented Service-Oriented Secure FBDE In collaborative design, designers need to share parametrical models while protecting their own sensitive information To provide a secure FBDE schema and taking advantages of CBDM, this paper takes FBDE and a model information protection method as services from cloud Designers request the FBDE services to accomplish the model data exchange and require security service to hiding sensitive information of the model, as shown in Fig.1 When FBDE and model security method are developed as Fig.1 service oriented secure FBDE 3.1 Model information security method 3.2.1 Deformation based model information hiding The basic modeling process of common parametric CAD system is: first, create the sketch of the model based on sketch parameters; then select modeling features and adjust feature parameters to finish the modeling process[17] When creating a sketch, some points with geometry means can be retrieved by APIs of the CAD systems These points control the position and shape of sketch by their coordinates We name these points as the sketch control points For example, the center of the circular, control points of the spline, endpoints of the long/short axis and center of the ellipse When the parameters of the sketch control points are modified, the position and shape of the sketch are changed The position and shape of the feature are modified along with the deformation of the sketch Finally, the CAD model is deformed When the parameters of the sketch control points are modified back to original value, the model would be deformed to the original shape as shown in Fig.2 Fig.2 model shape affected by sketch control points: a original model; b partial model sketch; c modify parameters of sketch; d model deformation 3.2.2 FFD based model encryption Sederberg proposed free-form deformation (FFD) of solid geometric models [27-29].The main idea of the FFD is putting the geometry model into a uniform dissected parallelepiped lattice and the vertices of the lattice are seen as the control points of a trivariate tensor product Bézier body Then, by moving these control points, the vertices of the geometry model are moved and the model is deformed The FFD idea could be introduced into feature based CAD model We create the encryption control lattice for feature sketch and take the sketch control points as the internal vertices in the deformation lattice of the FFD as shown in Fig.3 (a) Then the FFD based encryption can be applied 57 Yiqi Wu et al / Procedia CIRP 56 (2016) 55 – 60 The encryption lattice should be created for every sketch of the features in the sensitive part of the model and it should contain every sketch control point inside of it It is a parallelepiped for 3D sketch and a rectangle for a 2D sketch Taking the 3D sketch control point encryption as an example, first create the local coordinate system in the parallelepiped Then a sketch control point C ( x, y, z,) has the parameter coordinate ( s, t, u) and it can be represented as: x  xL ,t xL max  xL s y  yL ,u yL max  yL z  z L z L max  z L (1) Use planes to dissect the parallelepiped uniformly in three directions of the coordinates and get lǃmǃn sections of the parallelepiped in each direction respectively The vertices of the parallelepiped and the intersection points between the parallelepiped dissection planes consist the encryption lattice control points, denoted as Pi , j ,k , in which i 0,1, , l; j 0,1, , m; k 0,1, , n The coordinate of Pi , j ,k is: Pi , j ,k i j ( xL  ( xL max  xL ), y L  ( y L max  y L ), l m k z L  (z L max  z L )) n (2) Thereby, the 3D encryption lattice is created According to the FFD, when the control point Pi , j ,k is moved to P 'i , j ,k , the coordinate of the sketch control point X is transformed and it can be denoted as X encryption The local parameter coordinates ( s, t , u) remains unchanged, so its transferred Cartesian coordinates can be calculated as: l X encryption 3D m n ¦¦¦ P ' Bi ,l ( s ) B j ,m (t ) Bk ,n (u ) i , j ,k (3) i j 0k Bi ,l ( s), B j ,m (t ), Bk ,n (u) are Bernstein polynomials of l, m and n degree By using this equation, when the coordinates of the encryption lattice control points are modified, the Cartesian coordinates of the sketch control points are changed which means they are encrypted as shown in Fig.3(b) The decryption can be achieved by using equation (4), which means when the encryption control lattice is deformed back to the original shape The encrypted model in it will be deformed to its initial shape as well l X decryption 3D m (7) The decryption calculation is: l X decryption D m ¦¦ P i, j Bi ,l ( s) B j ,m (t ) (8) The encryption and decryption key is shown as equation (9) and (10) respectively: Cencyption D ^P 'i , j | i  [1,2, , l ], j  [1,2, , m]` (9) Cdecyption D ^Pi , j ,k | i  [1,2, , l ], j  [1,2, , m]` (10) i j Fig.3 encryption of 3D sketch: (a) original sketch; (b) encrypted sketch 3.2 Peer to Peer FBDE The goal of FBDE is to ensure that the target CAD models obtained by exchange include design intent such as design history, design constraints, design parameters and features Hence, what we exchange is the feature modeling procedure In a certain collaborative design environment, co-designers use limited kinds of CAD systems, such as UG, Pro/E or Catia In this situation, a direct FBDE method from one kind of system to another is more purposeful and flexible than the traditional centralized FBDE methods which heavily rely on the neutral files If we look one kind of CAD system as a peer in collaborative design, the direct FBDE can be called as the peer to peer (P2P) FBDE The overview architecture of the P2P FBDE is shown in Fig.4 The method of service oriented P2P FBDE was proposed in our previous research [24] n ¦¦¦ P i , j ,k Bi ,l ( s ) B j ,m (t ) Bk ,n (u) (4) The encryption key of 3D sketch control points is the set of encryption lattice control points after the deformation: i j 0k Cencyption ^P i , j ,k ' | i  [1,2, , l ], j  [1,2, , m], k [1,2, , n]` (5) The decryption key is the set of encryption lattice control points with initial coordinates: Cdecyption ^P i , j ,k | i  [1,2, , l ], j  [1,2, , m], k  [1,2, , n]` (6) Likewise, the 2D sketch control points encryption can be implemented by using equation: l X encryption D m ¦¦ P ' i j i, j Bi ,l ( s) B j ,m (t ) Fig.4 architecture of P2P FBDE 58 Yiqi Wu et al / Procedia CIRP 56 (2016) 55 – 60 will not provide to users who not offer their user name/ID (do not log in) or whose user name/ID is not on the trusted list The second level of access control aims at the security service To prevent the sensitive model information leakage from cloud, the access of decryption service should not only based on legitimate users but also with the consideration of specific model file and validity period By using this mechanism, co-designers who needs and allowed to see or modified the original shape of the sensitive model part could decrypt the model while preventing others requiring the decryption service 3.5 Process of service oriented secure FBDE Fig.5 architecture of the service-oriented secure FBDE 3.3 Architecture for service-oriented secure FBDE The proposed architecture of the service-oriented secure FBDE is shown in Fig.5 The service-oriented secure FBDE is the combination of FBDE services and the security service An access control mechanism should be adopted to make sure the only the collaborative partners in cloud could require the FBDE or security services The security service contains an access control mechanism to authorize the service to legitimate users, the encryption and decryption service The model encryption and decryption method has been introduced in section 3.1 When designers need to protect the sensitive part of a sharing model, the security service is called to encrypt the model first Then the encrypted model will be sent to other designers for collaborative deign The decryption service is provided to decrypt the model for certain users The FBDE service is divided into Pre- and Post- FBDE service based on the function developed in source or target system The pre-P2P service deals with the FBDE procedure only related to the source CAD system and the post-P2P service deals with the procedure related to the target CAD system It makes the P2P FBDE more feasible and flexible for each FBDE service provider Because the pre- or post- service is related to one certain CAD system, it is more convenient and easy for providers to provide the service than to provide the whole procedure of a P2P FBDE service As described in the overview architecture, the service oriented secure FBDE is the combination of FBDE services and model encryption/decryption services When a designer needs to share a model, there are four situations: (1) the model contains sensitive information and is heterogeneous to the target system; (2) the model contains sensitive information and is homogeneous to the target system; (3) the model does not contain sensitive information and is heterogeneous to the target system;(4) the model does not contain sensitive information and is homogeneous to the target system So the process of the secure FBDE is shown in Fig.6 Fig.6 process of the secure FBDE 3.4 Access and privilege control mechanism To make sure the secure FBDE service is provided to trusted collaborative partners in CBDM and to guarantee the encryption and decryption of the sharing model is obtained by legitimate users according to the model owner’s willing, a two-level access control mechanism is adopted As shown in Fig.5, the first level of access control is to recognize the trusted collaborative partners who have the authority to require the related services The authorization is managed by cloud manager with a trust list of partners in cloud After the collaborative partners log in the cloud, the authorization can be achieved by distinguishing the trusted partners according to their user ID or user name The services According to the figure, the process can be described as following steps: (1) Estimate whether the source model contains sensitive information If does, go to step 2; if does not, go to step 3; (2) Require security service to encrypt the sensitive model; (3) Acquire the target system type If the source and target system is heterogeneous, go to step 4; else go to step (4) Require FBDE service to exchange the source model (5) Get the result model for secure information sharing Our model encryption and decryption methods are based on modifying sketch control points as introduced in section In different types of CAD systems, the sketch elements and sketch control points maybe different So, when the encrypted Yiqi Wu et al / Procedia CIRP 56 (2016) 55 – 60 model needs to be decrypted, it must be recovered to the original source model type For example, if a CATIA model is encrypted and exchanged to Solidworks model, when decrypt the Solidworks model, it should be exchanged back to a CATIA model to ensure the decryption correctness The decryption process is shown in Fig As shown in the figure, the decryption process contains following steps: (1) Acquire the source model type If the original source model and the encrypted model are heterogeneous, go to step 2; if they are homogeneous, go to step 3; (2) Require FBDE service to exchange the encrypted model to the source model type; (3) Require the security service to decrypt the model; (4) Acquire the system type of the target system (user who needs the decrypted model) If the target system and the decrypted are heterogeneous, go to step 5; if they are homogeneous, go to step 6; (5) Require FBDE service to exchange the decrypted model to the target system type; (6) Get the result decrypted model information, after using the secure FBDE services, the result model for homogeneous system is shown in Fig.8(c) and for heterogeneous systems is shown in Fig.8(d) Fig.8 A case study for the service-oriented secure FBDE infrastructure: a source model; b target model after FBDE; c encrypted model(homogenous); d encrypted model(heterogeneous) According to the case study, models after secure FBDE services remain their parametrical information, which means they are still feature-based CAD model after data exchange process, so they can be further edited or modified for other designers in CBDM 4.2 Analyses Fig.7 the decryption process Case Study and Analyses 4.1 Case study This section tests and demonstrates an experimental case study of service-oriented secure FBDE application As a case study, two typical and mainstream CAD systems: Catia V5R21 and SolidWorks 2014 are discussed We choose SolidWorks as the source system and implement the security service to encrypt the case study model and implement a set of FBDE services to exchange Solidworks models to Catia models The functions of FBDE and model encryption/ decryption are development by the APIs of CAD systems and the development environment is VS2008 The experiment is shown in Fig.8 Fig.8(a) shows a original source model and Fig.8(b) shows the result of data exchange to the target system by requiring the FBDE service Assuming the slot in the model contains sensitive design 4.2.1 Service oriented FBDE In the proposed FBDE architecture, the FBDE service in cloud is provided by different peers The FBDE service is robust and available even when some exceptions occur in some service providers The service-oriented FBDE services can be quickly deployed to share heterogeneous CAD models in CBDM because once a customized pair of FBDE service is provided, the FBDE for the two systems can be used by CBDM partners immediately Service-oriented collaborative applications provide cost-effective, flexible and scalable solutions for FBDE in CBDM 4.2.2 Model security method The sensitive part of the model is visibly deformed according to the case study, so the design parameters of the part are properly hidden by the secure FBDE service The decryption key is set of the lattice control points with initial coordinates They can be set in any place as long as the lattice contains all the sketch control points So the parameters space of the key is large enough to avoid the cracking What’s more, when using the proposed method, a wrong key can decrypt the model to a certain shape as well In this situation, intruders cannot find out if it is the correct model with the original shape Thereby the reliability of this security protection method is guaranteed The access control mechanism for the secure FBDE service guarantees the service could be only used by legitimate collaborative users 59 60 Yiqi Wu et al / Procedia CIRP 56 (2016) 55 – 60 Conclusion and Future Work The basic purpose of FBDE is offering a better way for information sharing in CBDM Meanwhile, during the information sharing, the risks of information leakage occur So the FBDE and model security issues should be taken as a whole As the first contribution of this paper, a secure FBDE solution in CBDM is proposed In the proposed method, feature-based model are exchanged directly from source system to the target one with parametrical features maintained A FFD-based model security method is used to deform the sensitive part of the model, so the sensitive design parameters could be hidden during the model sharing Traditional FBDE and model security process are mainly function-oriented, which is not suitable for CBDM The second contribution of this research is to present a serviceoriented secure infrastructure for CBDM In the infrastructure, FBDE and model security are registered as a whole set of services for collaborative designers which could provide costeffective, flexible and scalable solutions The access and privilege control mechanism is set to ensure the validated usage of the secure FBDE service In the future, the research will continue on the following directions but not limited: (1) to improve the service-oriented FBDE for CBDM; (2) to adopt better encryption calculation; (3) to consider the secure FBDE for assemblies Acknowledgements This paper is supported by the National Science Foundation of China (Grant No 61472289) and Hubei Province Science Foundation (Grant No 2015CFB254) References [1] G Büyüközkan and J Arsenyan, "Collaborative product development: a literature overview," Production Planning & Control, vol 23, pp 47-66, 2012 [2] Y Zeng and I Horváth, "Fundamentals of next generation CAD/E systems," Computer-Aided Design, vol 44, pp 875-878, 2012 [3] S Jing, F He, S Han, X Cai, and H Liu, "A method for topological entity correspondence in a replicated collaborative CAD system," Computers in Industry, vol 60, pp 467-475, 2009 [4] Y Zeng, L Wang, X Deng, X Cao, and N Khundker, "Secure collaboration in global design and supply chain environment: Problem analysis and literature review," Computers in Industry, vol 63, pp 545556, 2012 [5] X Cai, F He, W Li, X Li, and Y Wu, "Encryption based partial sharing of CAD models," Integrated Computer-Aided Engineering [6] M P Papazoglou, "Service-oriented computing: Concepts, characteristics and directions," in Web Information Systems Engineering, 2003 WISE 2003 Proceedings of the Fourth International Conference on, 2003, pp 312 [7] R W Schulte and Y V Natis, "’Service oriented’architectures, part 1," Gartner, SSA Research Note SPA-401-068, 1996 [8] R W Schulte and Y V Natis, "’Service oriented’architectures, part 2," Gartner, vol SSA Research Note SPA-401-069, 1996 [9] D Wu, D W Rosen, and D Schaefer, "Cloud-based design and manufacturing: status and promise," in Cloud-Based Design and Manufacturing (CBDM), ed: Springer, 2014, pp 1-24 [10] E Newcomer and G Lomow, Understanding SOA with Web services: Addison-Wesley, 2005 [11] M Endrei, J Ang, A Arsanjani, S Chua, P Comte, P Krogdahl, et al., Patterns: service-oriented architecture and web services: IBM Corporation, International Technical Support Organization, 2004 [12] D Bogatin, "Google CEO's new paradigm:'cloud computing and advertising go hand-in-hand'," ZDNet Aug, vol 23, 2006 [13] P Mell and T Grance, "Draft NIST working definition of cloud computing," Referenced on June 3rd, vol 15, 2009 [14] D Wu, M J Greer, D W Rosen, and D Schaefer, "Cloud manufacturing: Strategic vision and state-of-the-art," J Manuf Syst Available at: http://www sciencedirect com/science/article/pii S, 2013 [15] O F Valilai and M Houshmand, "A Manufacturing Ontology Model to Enable Data Integration Services in Cloud Manufacturing using Axiomatic Design Theory," in Cloud-Based Design and Manufacturing (CBDM), ed: Springer, 2014, pp 179-206 [16] J Lane Thames, "Distributed, Collaborative and Automated Cybersecurity Infrastructures for Cloud-Based Design and Manufacturing Systems," pp 207-229, 2014 [17] F He and S Han, "A method and tool for human–human interaction and instant collaboration in CSCW-based CAD," Computers in Industry, vol 57, pp 740-751, 2006 [18] Y Cheng, F Z He, and D J Zhang, "To Support Human-Human Interaction in Collaborative Feature-based CAD Systems," presented at the 2014 International Conference on Human-Centered Computing (HCC 2014), Cambodia, 2014 [19] Y Li, C Liu, J X Gao, and W Shen, "An integrated feature-based dynamic control system for on-line machining, inspection and monitoring," Integrated Computer-Aided Engineering, vol 22, pp 187200, 2015 [20] Y Li, X Liu, J X Gao, and P G Maropoulos, "A dynamic feature information model for integrated manufacturing planning and optimization," CIRP Annals-Manufacturing Technology, vol 61, pp 167170, 2012 [21] D Zhang, F He, S Han, and X Li, "Quantitative optimization of interoperability during feature-based data exchange," Integrated Computer-Aided Engineering, vol 23, pp 31-50, 2015 [22] X Li, F He, X Cai, and D Zhang, "CAD data exchange based on the recovery of feature modelling procedure," International Journal of Computer Integrated Manufacturing, vol 25, pp 874-887, 2012 [23] X Li, F He, X Cai, D Zhang, and Y Chen, "A method for topological entity matching in the integration of heterogeneous cad systems," Integrated Computer-Aided Engineering, vol 20, pp 15-30, 2013 [24] Y Wu, F He, D Zhang, and X Li, "Service-Oriented Feature-Based Data Exchange for Cloud-Based Design and Manufacturing." IEEE Transactions on Services Computing [J] In press, DOI: 10.1109/TSC.2015.2501981, 2015 [25] C XT, H FZ, L WD, and L XX, "Customized Encryption of CAD Models for Collaboration in Cloud Manufacturing Environment," ASME Transactions Journal of Manufacturing Science and Engineering, vol 137, pp 040905-1 -040905-10, 2015 [26] S Hauck and S Knol, "Data security for Web-based CAD," in Proceedings of the 35th annual design automation conference, 1998, pp 788-793 [27] Y Cui and J Feng, "GPU-based smooth free-form deformation with sharp feature awareness," Computer Aided Geometric Design, 2015 [28] Y Cui and J Feng, "Real-time B-spline Free-Form Deformation via GPU acceleration," Computers & Graphics, vol 37, pp 1-11, 2013 [29] T W Sederberg and S R Parry, "Free-form deformation of solid geometric models," in ACM SIGGRAPH computer graphics, 1986, pp 151-160 ... Houshmand, "A Manufacturing Ontology Model to Enable Data Integration Services in Cloud Manufacturing using Axiomatic Design Theory," in Cloud -Based Design and Manufacturing (CBDM), ed: Springer,... which are used as the basis for integrating machining, monitoring, and on-line inspection operations and establish a set of integrated information models to address the dynamics of machining conditions[19,... schema and taking advantages of CBDM, this paper takes FBDE and a model information protection method as services from cloud Designers request the FBDE services to accomplish the model data exchange

Ngày đăng: 19/11/2022, 11:38