Difference between revisions of "Digital Twin"
From MgmtWiki
(→Solutions) |
(→Solutions) |
||
Line 9: | Line 9: | ||
* How [[Digital Twin]]s Could Protect Manufacturers from Cyberattacks<ref>NIST ''How Digital Twins Could Protect Manufacturers from Cyberattacks'' NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks</ref> | * How [[Digital Twin]]s Could Protect Manufacturers from Cyberattacks<ref>NIST ''How Digital Twins Could Protect Manufacturers from Cyberattacks'' NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks</ref> | ||
<blockquote>At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.</blockquote> | <blockquote>At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.</blockquote> | ||
− | * How | + | * How [[Digital Twin]]s can improve manufacturing productivity by 20-30%.<ref>Demitrious Georgakopoulos + 1, ''Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing'' '''CACM 66''' No. 7 (2023-07) p. 87ff </ref> |
==Reference== | ==Reference== | ||
[[Category: Glossary]] | [[Category: Glossary]] |
Revision as of 12:25, 27 July 2023
Full Title or Meme
A computer model of a real-world object for purposes of prediction or explaination of the actions of real-world object.
Context
- The concept of Digital Twin was created as an avatar that could be used as a model for one particular Entity’s behavior.
- It can also be used as an agent used to perform actions for a human operating independently in the digital regime.
Solutions
- How Digital Twins Could Protect Manufacturers from Cyberattacks[1]
At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.
- How Digital Twins can improve manufacturing productivity by 20-30%.[2]
Reference
- ↑ NIST How Digital Twins Could Protect Manufacturers from Cyberattacks NIST News (2023-02-23) https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks
- ↑ Demitrious Georgakopoulos + 1, Digital Twins and Dependency/Constraint-Aware SI for Digital Manufacturing CACM 66 No. 7 (2023-07) p. 87ff