2021
DOI: 10.1016/j.rser.2020.110223
|View full text |Cite
|
Sign up to set email alerts
|

A review of industry 4.0 revolution potential in a sustainable and renewable palm oil industry: HAZOP approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
92
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 76 publications
(92 citation statements)
references
References 86 publications
0
92
0
Order By: Relevance
“…Malware is intended to cause damage, steal or modify information in a target computer. This type of attack can be presented in many shapes or forms, such as a virus [ 103 , 129 ], which is a stealth piece of code made to be executed on a victim computer, replicate and propagate into other victims. Worms [ 63 , 75 , 103 , 129 ] are also malicious code made to propagate in a network or through emails with the intent of gaining access to the victim computer.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Malware is intended to cause damage, steal or modify information in a target computer. This type of attack can be presented in many shapes or forms, such as a virus [ 103 , 129 ], which is a stealth piece of code made to be executed on a victim computer, replicate and propagate into other victims. Worms [ 63 , 75 , 103 , 129 ] are also malicious code made to propagate in a network or through emails with the intent of gaining access to the victim computer.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
“…This type of attack can be presented in many shapes or forms, such as a virus [ 103 , 129 ], which is a stealth piece of code made to be executed on a victim computer, replicate and propagate into other victims. Worms [ 63 , 75 , 103 , 129 ] are also malicious code made to propagate in a network or through emails with the intent of gaining access to the victim computer. Trojan horses [ 103 , 129 ] are another type of malware, designed not to be suspicious when executing, generally disguised as legitimate software.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…1 A proposed framework to address supply issues in biomass supply chains collection and analysis. In other words, the process operation and control of the biomass conversion facilities can now be monitored, accessed, and controlled remotely (Lim et al 2021). This is attractive for efficient management, especially in a pandemic situation that encourages minimal human intervention.…”
Section: Digitalization and Automationmentioning
confidence: 99%
“…This is attractive for efficient management, especially in a pandemic situation that encourages minimal human intervention. Aside from process monitoring and control, the collected data can also be used as a reference for storage management and scheduling (e.g., based on biomass or product storage time and material properties) (Jeong et al 2019;Lim et al 2021). Finally, other data-driven techniques can be useful for the synthesis of a resilient biomass supply chain.…”
Section: Digitalization and Automationmentioning
confidence: 99%