From e-Manufacturing to M-Manufacturing

Bouchoul, Faiza; Mostefai, Mohamed
April 2008
International Arab Journal of Information Technology (IAJIT);Apr2008, Vol. 5 Issue 2, p140
Academic Journal
This paper studies the impact of wireless technologies on enterprises. A multitude of new paradigms and new software technologies have emerged from the web. E-business and e-manufacturing have really transformed concepts and practices in enterprises. Wireless technologies added new possibilities for these technologies, by this work we propose m- manufacturing as a component of e-manufacturing when practiced in mobile environment, then compare e-manufacturing to m-manufacturing. We applied our proposed approach to model m-maintenance of spare parts. Combination of mobile agent technology and fault-tolerant principles has given an appropriate global solution torn m-maintenance issues.


Related Articles

  • A great way to monitor your WLAN. Henderson, Tom // Network World;6/21/2004, Vol. 21 Issue 25, p88 

    This article seeks to report the release of AirMagnet Distributed Version 4.0, the wireless LAN analyzer that uses a combination of proprietary access points and notebook-based sensors to help assess an 802.11 a, b, or g area. AirMagnet Distributed includes four components: a management server...

  • LAN Operates Over Existing Power Lines. Bak, David J. // Design News;1/23/89, Vol. 45 Issue 2, p166 

    This article discusses the functioning of Local Area Networks (LAN) over power lines. Linking intelligent devices in an industrial environment can be challenging particularly in automated storage/retrieval systems (AS/RS) where mobile stacking cranes may travel 500 ft/ min. A ''cableless" LAN...

  • Running Your Office With A Computer: An Overview. Huxford, David // Journal of Financial Planning;Jul88, Vol. 1 Issue 1, p6 

    The purpose of this article is to help one be aware of what you can do with technology to make one's operation more effective. It intends to cover all technology from computers to FAX machines to telephone headsets to any other machine, service or concept that can help one improve one's...

  • Taking a crack at backup. Mello, John P. // Software Magazine;Oct96, Vol. 16 Issue 10, p85 

    Focuses on how to preserve data as it moves to local area networks (LAN), which is a result of client/server computing. Reasons for the concern with preserving information; Comments from Larry Sherman, director of Stratus Computer in Marlborough, Massachusetts; Increase in the movement of...

  • Bringing LAN-like file delivery to WANs.  // Network World;8/8/2005, Vol. 22 Issue 31, p22 

    This article focuses on the development of the increasingly popular technology called WAFS (wide-area file services) which are designed to provide LAN (local area network)-like file delivery across WAN (wide-area networks). WAFS works by reducing the 'chattiness' of Microsoft Corp.'s Common...

  • A Detailed Study of Resource Scheduling and Fault Tolerance in Grid. Radha; Sumathy, V. // International Journal of Computer Science Issues (IJCSI);Nov2011, Vol. 8 Issue 6, p357 

    The grid computing enables the users to share the heterogeneous resources which are distributed geographically. The main advantage of grid is to utilize the unused resources in other words an effective utilization of resources. When considering about the resource utilization the focus is on the...

  • Start-up targets network access. Messmer, Ellen // Network World;7/24/2006, Vol. 23 Issue 28, p21 

    The article reports on the launch of Identity Managed Access Gateway (IMAG), a local area network-based access-control appliance, by Apere Inc. in the U.S. It is stated that this appliance inspected traffic with a speed of 600 megabytes per second to check either user is authorized or not....

  • Compendium. Gaffin, Adam // Network World;5/17/2004, Vol. 21 Issue 20, p77 

    This column reports on developments regarding computer networks. Feeds is the new RSS aggregator and search engine of "NetworkWorld" magazine. Over the past month or so, it has grabbed roughly 150 enterprise-specific RSS sources to build a database of enterprise-related news items and comments....

  • A Fault-Tolerant Token-Based Atomic Broadcast Algorithm. Ekwall, Richard; Schiper, Andre // IEEE Transactions on Dependable & Secure Computing;Sep/Oct2011, Vol. 8 Issue 5, p625 

    Many atomic broadcast algorithms have been published in the last 20 years. Token-based algorithms represent a large class of these algorithms. Interestingly, all the token-based atomic broadcast algorithms rely on a group membership service and none of them uses unreliable failure detectors...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics