Digital Twin Framework and Federated Learning for Multi-plant Knowledge Sharing in Decision Support for Electric Steelmaking and Beyond

La Metallurgia Italiana - International Journal of the Italian Association for Metallurgy
The processes of electric steelmaking are complex and difficult to control to achieve sustainable production. To strive towards competitiveness and green transformation, steelmakers apply the Electric Arc Furnace (EAF) to circulate scrap into new products.

Federated Learning: A decentralized approach to smarter, safer AI

Project blogpost
Federated Learning represents a transformative shift in how Artificial Intelligence (AI) models are developed and deployed.

Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities

EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.

Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities

EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.

Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks

EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.

Cybersecurity in the financial sector: knowing your enemy

The financial sector is one of the most critical and sensitive sectors. Cybercriminals look to exploit it for large amounts of money and financial information.