2018
DOI: 10.7763/ijmo.2018.v8.667
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Asset Management as a Flow Machine

Abstract: Enterprise Asset Management (EAM) is a broad term for software that provides a way to view company-owned assets holistically, where the goal is to control and proactively optimize operations for quality and efficiency. According to some published literature, knowledge is currently lacking regarding how to model EAM processes so they can be made ready for computerized deployment. This paper applies a new modeling technique built on systems of things that flow, to model EAM processes systematically. This flow-ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Currently, no formal proof exists that the five TM stages are sufficient to describe all behavior processes. The TM model has been applied to many real systems, such as in phone communication [29], physical security [17], vehicle tracking [19], intelligent monitoring [32], asset management [20], information leakage [22], engineering plants [23], inventory management processes [24], procurement processes [26], public key infrastructure network architecture [26], bank check processing [35], waste water treatment [39], computer attacks [26], provenance [42], services in banking industry architecture network [31], and digital circuits [37]. Additionally, we will expend extensive effort to partially substantiate the claim of the genericity of the TM stages in different fields.…”
Section: Tm Substantiationmentioning
confidence: 99%
“…Currently, no formal proof exists that the five TM stages are sufficient to describe all behavior processes. The TM model has been applied to many real systems, such as in phone communication [29], physical security [17], vehicle tracking [19], intelligent monitoring [32], asset management [20], information leakage [22], engineering plants [23], inventory management processes [24], procurement processes [26], public key infrastructure network architecture [26], bank check processing [35], waste water treatment [39], computer attacks [26], provenance [42], services in banking industry architecture network [31], and digital circuits [37]. Additionally, we will expend extensive effort to partially substantiate the claim of the genericity of the TM stages in different fields.…”
Section: Tm Substantiationmentioning
confidence: 99%
“…The task then flows (9) to the technician, who later examines the task to decide on the following: 1) Given that it is possible to call the user and solve the problem by phone (10), the technician places a phone call (11) to the user and guide the user step by step to solve the problem through the phone (12).…”
Section: B Request For Repairmentioning
confidence: 99%
“…This paper promotes conceptual modeling that is based on the Heideggerian [7] notion of thinging as a framework for computational thinking. Heideggerian thinging is generalized as an abstract thinging machine (TM) [8][9][10][11][12][13].…”
mentioning
confidence: 99%
“…papers(Al-Fedaghi & Atiyah, 2018;Al-Fedaghi & Al-Huwais, 2018);Al-Fedaghi & AlQallaf, 2018;Al-Fedaghi&Alnasser,2018;Al-Fedaghi,2013,6(3),59-70;Al-Fedaghi,2013,4(3),30; Al-Fedaghi,2008,Al-Fedaghi,2006,tobeusedasathinkingstyleandasavehicleforbuildinga networkarchitecturediagram.…”
mentioning
confidence: 99%