| Foreword |
|
xvii | |
|
|
| Acknowledgments |
|
xix | |
| About the Author |
|
xxi | |
| About the Contributors |
|
xxiii | |
| Introduction |
|
xxvii | |
|
|
|
Chapter 1 Introduction to Industry 4.0 and Smart Manufacturing |
|
|
1 | (20) |
|
|
|
|
|
1 | (2) |
|
The First Industrial Revolution |
|
|
3 | (1) |
|
The Second Industrial Revolution |
|
|
4 | (2) |
|
The Third Industrial Revolution |
|
|
6 | (1) |
|
The Fourth Industrial Revolution |
|
|
7 | (1) |
|
The Major Components of Smart Manufacturing |
|
|
8 | (8) |
|
Lean and Six Sigma in the Age of Smart Manufacturing |
|
|
9 | (1) |
|
Improving Cybersecurity Using Smart Technology |
|
|
10 | (1) |
|
|
|
11 | (1) |
|
Big Data for Small, Midsize, and Large Enterprises |
|
|
11 | (1) |
|
|
|
11 | (1) |
|
Artificial Intelligence Machine Learning and Computer Vision |
|
|
12 | (1) |
|
Networking for Mobile-Edge Computing |
|
|
13 | (1) |
|
Additive Manufacturing and 3D Printing |
|
|
14 | (1) |
|
|
|
15 | (1) |
|
Smart Technology to Improve Life on the Factory Floor |
|
|
16 | (1) |
|
Summary: The Advantages of Smart Manufacturing |
|
|
16 | (1) |
|
Improved Quality and Safety |
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
17 | (1) |
|
High Efficiency with Well-Defined Smart Factory Processes |
|
|
17 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (3) |
|
Chapter 2 Lean Six Sigma in the Age of Smart Manufacturing |
|
|
21 | (22) |
|
|
|
|
|
21 | (1) |
|
The History of Lean -- American Assembly Lines |
|
|
22 | (1) |
|
The History of Lean -- Toyota Embraces Deming and Piggly Wiggly |
|
|
23 | (1) |
|
The Toyota Production System: The Birthplace of Lean |
|
|
24 | (4) |
|
Lean Empowers Employees, Treating Them with Respect |
|
|
28 | (1) |
|
Resilient Supply Chain Management: How Toyota Fared During the COVID-19 Pandemic |
|
|
28 | (1) |
|
The History of Six Sigma: Bill Smith and Jack Welch |
|
|
29 | (1) |
|
Six Sigma's DMAIC Framework to Fix an Existing Process |
|
|
30 | (1) |
|
The DMAIC Framework Using Smart Technologies |
|
|
30 | (1) |
|
Six Sigma's DMADV Framework to Design a New Process |
|
|
31 | (1) |
|
The Statistics Behind Six Sigma |
|
|
32 | (3) |
|
Six Sigma Professionals in the Age of Smart Manufacturing |
|
|
35 | (1) |
|
Six Sigma Project Charters and SMART Goals |
|
|
36 | (2) |
|
Lean and Six Sigma Uses of the Scientific Method |
|
|
38 | (1) |
|
Summary: Six Sigma's Marriage to Lean |
|
|
38 | (1) |
|
|
|
39 | (2) |
|
|
|
41 | (2) |
|
Chapter 3 Continuous Improvement Tools for Smart Manufacturing |
|
|
43 | (66) |
|
|
|
|
|
43 | (1) |
|
Voice of the Customer in the Age of Smart Manufacturing |
|
|
44 | (2) |
|
Voice of the Customer Using Net Promoter Score |
|
|
46 | (2) |
|
Voice of the Customer Using the Delphi Technique |
|
|
48 | (2) |
|
Voice of the Customer Using the Kano Model |
|
|
50 | (2) |
|
Affinity Diagrams to Organize Many Ideas into Common Themes |
|
|
52 | (3) |
|
Critical to Quality to Convert the VOC to Measurable Objectives |
|
|
55 | (1) |
|
|
|
56 | (1) |
|
|
|
57 | (2) |
|
|
|
59 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (1) |
|
Process Maps with Decision Points |
|
|
62 | (1) |
|
Process Maps with Swim Lanes |
|
|
62 | (1) |
|
Limited Data Collection and the Hawthorne Effect Impacting Process Mapping |
|
|
63 | (2) |
|
Value Stream Maps to Eliminate Waste |
|
|
65 | (1) |
|
Value-Added Activity versus Non-Value-Added Activity |
|
|
66 | (1) |
|
Root Cause Analysis Using a Fishbone Diagram and Risk Matrix |
|
|
67 | (2) |
|
Root Cause Analysis Using the Five Whys |
|
|
69 | (2) |
|
Changes Coming to Root Cause Analysis with Smart Technologies |
|
|
71 | (1) |
|
|
|
71 | (3) |
|
|
|
74 | (2) |
|
Poka-Yoke to Error-Proof Processes and Products |
|
|
76 | (1) |
|
|
|
77 | (3) |
|
|
|
80 | (1) |
|
|
|
81 | (3) |
|
|
|
84 | (1) |
|
Setup Time Reduction Using Single Minute Exchange of Dies |
|
|
85 | (2) |
|
Gage Repeatability and Reproducibility (Gage R&R) |
|
|
87 | (2) |
|
Failure Modes and Effects Analysis (FMEA) to Solve Complex Problems |
|
|
89 | (3) |
|
Pugh Matrix to Design New Processes and Products |
|
|
92 | (4) |
|
Quality Function Deployment (House of Quality) |
|
|
96 | (1) |
|
|
|
96 | (1) |
|
Structure of the House of Quality Used in QFD |
|
|
96 | (2) |
|
Building a House of Quality |
|
|
98 | (3) |
|
|
|
101 | (1) |
|
Using QFD in Combination with the Pugh Matrix |
|
|
102 | (1) |
|
Smart Technologies to Automate QFD |
|
|
103 | (1) |
|
|
|
103 | (1) |
|
|
|
104 | (1) |
|
|
|
105 | (4) |
|
Chapter 4 Improving Supply Chain Resiliency Using Smart Technologies |
|
|
109 | (22) |
|
|
|
|
|
109 | (1) |
|
|
|
110 | (2) |
|
Supply Chain Risk Heat Maps |
|
|
112 | (1) |
|
Supply Chain Mapping at a Macro and Micro Level |
|
|
113 | (4) |
|
Preferred Supplier Programs |
|
|
117 | (1) |
|
Bill of Material Risk Grading Tools |
|
|
117 | (2) |
|
Environmental Risk Solutions |
|
|
119 | (1) |
|
The Global Driver Shortage and Poor Utilization |
|
|
120 | (1) |
|
|
|
121 | (1) |
|
Computer Vision Systems Using Smart Cameras |
|
|
121 | (1) |
|
|
|
122 | (1) |
|
Supply Chain Resilency in a Post-COVID World |
|
|
123 | (1) |
|
Criticism and Defense of Lean Inventory Management |
|
|
124 | (1) |
|
|
|
125 | (1) |
|
Supply Chain Stress Testing |
|
|
125 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (2) |
|
|
|
128 | (3) |
|
Chapter 5 Improving Cybersecurity Using Smart Technology |
|
|
131 | (18) |
|
|
|
|
|
131 | (1) |
|
Trends Increasing the Risk of Manufacturing and Supply Chain Cyberattacks |
|
|
132 | (2) |
|
Globalization and Specialization |
|
|
132 | (1) |
|
Improved Security Within the Corporate Network |
|
|
133 | (1) |
|
Artificial Intelligence and the Internet of Things |
|
|
133 | (1) |
|
Software Supply Chain Compromises |
|
|
133 | (1) |
|
The Emergence of Cloud Computing and the Public Cloud |
|
|
133 | (1) |
|
Targeting Small Companies |
|
|
134 | (1) |
|
So Why Is Manufacturing and the Supply Chain an Attractive Target? |
|
|
134 | (1) |
|
Primary Motives Behind Manufacturing and Supply Chain Attacks |
|
|
135 | (2) |
|
Stealing Proprietary Information and Intellectual Property |
|
|
135 | (1) |
|
Financial Gain from Ransomware |
|
|
136 | (1) |
|
|
|
136 | (1) |
|
|
|
137 | (1) |
|
Methods Used to Breach Target Systems |
|
|
137 | (1) |
|
Using a Third-Party Connection as a Means to Get to Your Network |
|
|
137 | (1) |
|
Using a Third-Party Connection as a Means to Get to Your Customers' Information |
|
|
137 | (1) |
|
Tampering with Components or Products in the Manufacturing Process |
|
|
138 | (1) |
|
Tampering with Manufacturing Process Equipment |
|
|
138 | (1) |
|
What Are the Potential Costs of a Cyberattack? |
|
|
138 | (1) |
|
Protecting Against Cyberattacks |
|
|
139 | (6) |
|
Approaches to Mitigating Risk |
|
|
140 | (2) |
|
Developing Internal Processes and Controls |
|
|
142 | (1) |
|
Developing Secure Third-Party Relationships |
|
|
143 | (2) |
|
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
147 | (2) |
|
Chapter 6 Improving Logistics Using Smart Technology |
|
|
149 | (18) |
|
|
|
Introduction: Why Logistics? |
|
|
149 | (1) |
|
Megatrends in Logistics That Impact Brands/Manufacturers |
|
|
150 | (1) |
|
The Different Expectation of Your Customer-by-Customer Type |
|
|
151 | (1) |
|
The Cost of Not Paying Attention to Logistics |
|
|
152 | (1) |
|
The Benefits of Making Logistics a Strategic Competency |
|
|
152 | (1) |
|
Steps to Make Logistics Your Competitive Advantage |
|
|
153 | (1) |
|
Why Technology Is So Important to Logistics |
|
|
154 | (1) |
|
Area 1 Insight/Planning/Monitoring |
|
|
155 | (2) |
|
Area 1, Use Case 1 Logistics Insight via Data Analytics |
|
|
155 | (1) |
|
Area 1, Use Case 2 Advanced Forecasting via Machine Learning and AI-Based Prediction |
|
|
156 | (1) |
|
Area 1, Use Case 3 Dynamic Decision-Making via Machine Learning and AI-Based Prediction with Real-Time Data and Blockchain |
|
|
156 | (1) |
|
|
|
157 | (2) |
|
Area 2, Use Case 1 Automation for Information Processing via Robotics Process Automation |
|
|
157 | (1) |
|
Area 2, Use Case 2 Automation for Physical Tasks via Robotics |
|
|
158 | (1) |
|
Area 2, Use Case 3 Autonomous Transportation via Autonomous Technologies |
|
|
158 | (1) |
|
Area 3 Exchanges and Collaborations |
|
|
159 | (2) |
|
Area 3, Use Case 1 Digital Freight Brokerage via Cloud Technologies |
|
|
159 | (1) |
|
Area 3, Use Case 2 Supply Chain Collaboration via Cloud Technologies |
|
|
160 | (1) |
|
Area 4 Safety, Security, and Compliance |
|
|
161 | (1) |
|
Area 4, Use Case 1 Global Trade Compliance via Cloud Technologies |
|
|
161 | (1) |
|
|
|
162 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (3) |
|
Chapter 7 Big Data for Small, Midsize, and Large Operations |
|
|
167 | (18) |
|
|
|
|
|
|
|
167 | (1) |
|
Structured Data and Relational Databases |
|
|
168 | (1) |
|
|
|
169 | (1) |
|
Why Manufacturing Needs Big Data Analytics |
|
|
170 | (1) |
|
The Four Levels of Data Analytics |
|
|
170 | (1) |
|
Descriptive Analytics -- What Happened? |
|
|
171 | (1) |
|
The Five Phases of Descriptive Analytics |
|
|
171 | (1) |
|
The Value of Descriptive Analytics |
|
|
172 | (1) |
|
Diagnostic Analytics -- Why Did It Happen? |
|
|
172 | (1) |
|
Predictive Analytics -- What May Have Happened? |
|
|
173 | (1) |
|
Prescriptive Analytics -- What Is the Best Next Step? |
|
|
174 | (1) |
|
Future of Big Data Analytics |
|
|
174 | (2) |
|
|
|
176 | (1) |
|
|
|
177 | (1) |
|
|
|
177 | (1) |
|
The Benefits of Big Data for SMEs |
|
|
178 | (1) |
|
|
|
179 | (1) |
|
Problems SMEs Face in Adopting Big Data Analytics |
|
|
180 | (1) |
|
Best Practices in Data Analytics for SMEs |
|
|
180 | (1) |
|
|
|
181 | (1) |
|
|
|
181 | (2) |
|
|
|
183 | (2) |
|
Chapter 8 Industrial Internet of Things (IIoT) Sensors |
|
|
185 | (20) |
|
|
|
|
|
|
|
185 | (1) |
|
|
|
186 | (2) |
|
|
|
188 | (1) |
|
|
|
188 | (1) |
|
|
|
188 | (2) |
|
IIoT-Enabling Technologies |
|
|
190 | (2) |
|
IIoT Platform Building Blocks |
|
|
192 | (1) |
|
|
|
192 | (6) |
|
Application Areas for IIoT |
|
|
198 | (1) |
|
Industries Where IIoT Can and Does Play a Role |
|
|
199 | (2) |
|
|
|
201 | (1) |
|
|
|
202 | (1) |
|
|
|
202 | (1) |
|
|
|
203 | (2) |
|
Chapter 9 Artificial Intelligence, Machine Learning, and Computer Vision |
|
|
205 | (14) |
|
|
|
|
|
205 | (2) |
|
History of AI and Computer Vision |
|
|
207 | (1) |
|
Understanding Machine Learning and Computer Vision |
|
|
208 | (5) |
|
Types of Machine Learning |
|
|
208 | (1) |
|
Common Computer Vision Tasks |
|
|
209 | (2) |
|
|
|
211 | (2) |
|
Machine Learning Pipelines |
|
|
213 | (1) |
|
Issues with Artificial Intelligence |
|
|
213 | (2) |
|
|
|
215 | (1) |
|
|
|
215 | (1) |
|
|
|
216 | (3) |
|
Chapter 10 Networking for Mobile Edge Computing |
|
|
219 | (34) |
|
|
|
|
|
219 | (1) |
|
Brief History of Networking |
|
|
219 | (2) |
|
Basic Networking Concepts, Architecture, and Capabilities |
|
|
221 | (9) |
|
Network Address Management |
|
|
227 | (3) |
|
|
|
230 | (7) |
|
Network Address Translation |
|
|
230 | (2) |
|
|
|
232 | (1) |
|
Autoconfiguration of Networks |
|
|
233 | (1) |
|
|
|
234 | (1) |
|
Introduction to the OSI Model |
|
|
235 | (2) |
|
Basic Wi-Fi Concepts, Architecture, and Capabilities |
|
|
237 | (3) |
|
Mobile Cell Phone Concepts, Architecture, and Capabilities |
|
|
240 | (4) |
|
|
|
240 | (1) |
|
Cell Architectural Concepts |
|
|
241 | (1) |
|
Mobile Networking Security and Reliability |
|
|
242 | (2) |
|
Future Evolution of Mobile Networking |
|
|
244 | (1) |
|
IT and Telecommunications Networking Convergence |
|
|
244 | (2) |
|
Convergence of the Internet and Telephony |
|
|
244 | (1) |
|
Capabilities and Benefits of Mobile Edge Networking |
|
|
245 | (1) |
|
|
|
246 | (1) |
|
|
|
246 | (2) |
|
|
|
248 | (1) |
|
Popular Acronyms Used in Networking and Mobile Computing |
|
|
249 | (3) |
|
|
|
252 | (1) |
|
Chapter 11 Edge Computing |
|
|
253 | (14) |
|
|
|
|
|
Introduction: What Is Edge Computing? |
|
|
253 | (1) |
|
Benefits of Edge Computing |
|
|
254 | (1) |
|
Top Use Cases for the Edge in Smart Manufacturing |
|
|
255 | (1) |
|
|
|
255 | (1) |
|
|
|
256 | (1) |
|
Solving Deployment Challenges with an Edge Computing Platform |
|
|
257 | (2) |
|
The Edge Computing Platform Landscape |
|
|
259 | (1) |
|
|
|
259 | (3) |
|
How a Successful Edge Computing Rollout Works |
|
|
262 | (2) |
|
|
|
263 | (1) |
|
|
|
263 | (1) |
|
|
|
264 | (1) |
|
|
|
264 | (1) |
|
|
|
264 | (1) |
|
|
|
264 | (2) |
|
|
|
266 | (1) |
|
Chapter 12 3D Printing and Additive Manufacturing |
|
|
267 | (44) |
|
Bahareh Tavousi Tabatabaei |
|
|
|
|
|
|
|
|
267 | (3) |
|
|
|
270 | (5) |
|
Early Stages of Additive Manufacturing |
|
|
270 | (2) |
|
1980s -- The Emergence of the First AM Technologies |
|
|
272 | (1) |
|
1990s -- Process and Innovation |
|
|
273 | (1) |
|
2000s -- Development of New Applications |
|
|
273 | (1) |
|
|
|
274 | (1) |
|
Additive Manufacturing Process |
|
|
275 | (16) |
|
|
|
275 | (3) |
|
|
|
278 | (2) |
|
|
|
280 | (3) |
|
|
|
283 | (3) |
|
|
|
286 | (3) |
|
|
|
289 | (1) |
|
Directed Energy Deposition |
|
|
290 | (1) |
|
|
|
291 | (8) |
|
3D-Printed Electronic Devices |
|
|
291 | (2) |
|
3D Printing in Construction |
|
|
293 | (1) |
|
|
|
294 | (2) |
|
|
|
296 | (3) |
|
|
|
299 | (1) |
|
|
|
300 | (1) |
|
|
|
301 | (10) |
|
|
|
311 | (20) |
|
|
|
|
|
311 | (1) |
|
|
|
311 | (1) |
|
|
|
312 | (1) |
|
|
|
313 | (1) |
|
|
|
314 | (1) |
|
|
|
315 | (1) |
|
|
|
315 | (2) |
|
Robotics Timeline: 1961 to 2011 |
|
|
317 | (6) |
|
|
|
323 | (3) |
|
|
|
326 | (1) |
|
|
|
327 | (1) |
|
|
|
328 | (1) |
|
|
|
329 | (2) |
|
Chapter 14 Improving Life on the Factory Floor with Smart Technology |
|
|
331 | (14) |
|
|
|
|
|
|
|
331 | (1) |
|
Life on the Factory Floor from 1700 to Today |
|
|
331 | (3) |
|
The Smart Manufacturing Factory Floor |
|
|
334 | (1) |
|
How AI Is Powering Smart Manufacturing |
|
|
334 | (1) |
|
Smart Manufacturing Is Optimizing Factory Processes |
|
|
335 | (1) |
|
Hurdles Faced in Implementing Smart Technologies |
|
|
336 | (1) |
|
Three Essential Job Types in Smart Manufacturing |
|
|
337 | (3) |
|
|
|
337 | (2) |
|
|
|
339 | (1) |
|
|
|
340 | (1) |
|
Three Types of Tools Needed in Smart Manufacturing |
|
|
340 | (2) |
|
Smart Manufacturing Design Choices |
|
|
342 | (1) |
|
|
|
342 | (1) |
|
|
|
343 | (1) |
|
|
|
344 | (1) |
|
Chapter 15 Growing the Roles for Women in Smart Manufacturing |
|
|
345 | (20) |
|
|
|
|
|
|
|
346 | (1) |
|
|
|
347 | (1) |
|
Women Hold the Answers (Skills Where Women Excel) |
|
|
348 | (2) |
|
|
|
350 | (1) |
|
Barrier One Building a Math Identity |
|
|
350 | (1) |
|
Barrier Two The Question of Race and Class |
|
|
350 | (1) |
|
Barrier Three It's Not Just Content; It's Context, Too |
|
|
351 | (1) |
|
Companies Working to Overcome Barriers to Women's Entry |
|
|
351 | (1) |
|
Programs to Develop STEM Skills for Women |
|
|
352 | (2) |
|
Growing the Role of Women in Smart Manufacturing |
|
|
354 | (1) |
|
|
|
354 | (1) |
|
|
|
355 | (1) |
|
|
|
355 | (3) |
|
How I Got into Manufacturing |
|
|
355 | (2) |
|
|
|
357 | (1) |
|
WET's Use of Smart Technologies |
|
|
357 | (1) |
|
|
|
358 | (1) |
|
|
|
359 | (1) |
|
|
|
360 | (1) |
|
|
|
361 | (4) |
|
|
|
|
Case Study 1 Automating Visual Inspection Using Computer Vision |
|
|
365 | (8) |
|
Case Study 2 Bar Coding, the Most Ubiquitous and Most Critical IIoT Technology |
|
|
373 | (6) |
|
Case Study 3 Improving Safety with Computer Vision |
|
|
379 | (6) |
|
Case Study 4 COVID-19 Accelerates the Adoption of 3D Printing |
|
|
385 | (6) |
|
Case Study 5 How Mobile Apps Benefit Small to Midsize Enterprises |
|
|
391 | (14) |
|
Case Study 6 Using Factory-Floor Touch Screens to Improve Operations |
|
|
405 | (6) |
|
Case Study 7 Edge Computing to Improve Operations |
|
|
411 | (4) |
|
Case Study 8 Five Highly Dangerous Jobs That Robots Can Do Safely |
|
|
415 | (4) |
| Answers to Sample Questions |
|
419 | (2) |
| Links to Continuous Improvement Templates |
|
421 | (2) |
| Index |
|
423 | |