Difference between revisions of "Digital Twin"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Solutions)
Line 9: Line 9:
 
* How [[Digital Twin]]s Could Protect Manufacturers from Cyberattacks<ref>NIST ''How Digital Twins Could Protect Manufacturers from Cyberattacks'' NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks</ref>
 
* How [[Digital Twin]]s Could Protect Manufacturers from Cyberattacks<ref>NIST ''How Digital Twins Could Protect Manufacturers from Cyberattacks'' NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks</ref>
 
<blockquote>At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.</blockquote>
 
<blockquote>At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.</blockquote>
* How ;;\\[[Digital Twin]]sand improve manufacturing productivity by 20-30%.<ref>Demitrious Georgakopoulos + 1, ''Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing''  '''CACM 66''' No. 7 (2023-07) p. 87ff </ref>
+
* How [[Digital Twin]]s can improve manufacturing productivity by 20-30%.<ref>Demitrious Georgakopoulos + 1, ''Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing''  '''CACM 66''' No. 7 (2023-07) p. 87ff </ref>
  
 
==Reference==
 
==Reference==
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 12:25, 27 July 2023

Full Title or Meme

A computer model of a real-world object for purposes of prediction or explaination of the actions of real-world object.

Context

  • The concept of Digital Twin was created as an avatar that could be used as a model for one particular Entity’s behavior.
  • It can also be used as an agent used to perform actions for a human operating independently in the digital regime.

Solutions

  • How Digital Twins Could Protect Manufacturers from Cyberattacks[1]
At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.
  • How Digital Twins can improve manufacturing productivity by 20-30%.[2]

Reference

  1. NIST How Digital Twins Could Protect Manufacturers from Cyberattacks NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks
  2. Demitrious Georgakopoulos + 1, Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing CACM 66 No. 7 (2023-07) p. 87ff