Abstract: this article proposed a methodology for computer
numerical control (CNC) machine scoring. The case study company
is a manufacturer of hard disk drive parts in Thailand. In this
company, sample of parts manufactured from CNC machine are
usually taken randomly for quality inspection. These inspection data
were used to make a decision to shut down the machine if it has
tendency to produce parts that are out of specification. Large amount
of data are produced in this process and data mining could be very
useful technique in analyzing them. In this research, data mining
techniques were used to construct a machine scoring model called
'machine priority assessment model (MPAM)'. This model helps to
ensure that the machine with higher risk of producing defective parts
be inspected before those with lower risk. If the defective prone
machine is identified sooner, defective part and rework could be
reduced hence improving the overall productivity. The results
showed that the proposed method can be successfully implemented
and approximately 351,000 baht of opportunity cost could have
saved in the case study company.
Abstract: In this work we present the modelling of the induction
machine, taking into consideration the stator defects of the induction
machine. It is based on the theory of electromagnetic coupling of
electrical circuits. In fact, for the modelling of stationary defects such
as short circuit between turns in the same phase, we introduce only
in the matrix the coefficients of resistance and inductance of stator
and in the mutual inductance stator-rotor. These coefficients take
account the number of turns in short-circuit deducted from the total
number of turns in the same phase; in this way we obtain the number
of useful turns. In addition, all these faults involved, will be used for
the creation of the database that will be used to develop an automated
system failures of the induction machine.
Abstract: This paper presents a digital engineering library – the
Digital Mechanism and Gear Library, DMG-Lib – providing a multimedia collection of e-books, pictures, videos and animations in the domain of mechanisms and machines. The specific characteristic
about DMG-Lib is the enrichment and cross-linking of the different
sources. DMG-Lib e-books not only present pages as pixel images
but also selected figures augmented with interactive animations. The
presentation of animations in e-books increases the clearness of the
information.
To present the multimedia e-books and make them available in the
DMG-Lib internet portal a special e-book reader called StreamBook
was developed for optimal presentation of digitized books and to
enable reading the e-books as well as working efficiently and individually with the enriched information. The objective is to support different user tasks ranging from information retrieval to
development and design of mechanisms.
Abstract: A compact 1x3 power splitter based on Photonic
Crystal Waveguides (PCW) with flexible power splitting ratio is
presented in this paper. Multimode interference coupler (MMI) is
integrated with PCW. The device size reduction compared with the
conventional MMI power splitter is attributed to the large dispersion
of the PCW. Band Solve tool is used to calculate the band structure of
PCW. Finite Difference Time Domain (FDTD) method is adopted to
simulate the relevant structure at 1550nm wavelength. The device is
polarization insensitive and allows the control of output (o/p) powers
within certain percentage points for both polarizations.
Abstract: The minimal condition for symmetry breaking in morphogenesis of cellular population was investigated using cellular automata based on reaction-diffusion dynamics. In particular, the study looked for the possibility of the emergence of branching structures due to mechanical interactions. The model used two types of cells an external gradient. The results showed that the external gradient influenced movement of cell type-I, also revealed that clusters formed by cells type-II worked as barrier to movement of cells type-I.
Abstract: We introduce a logic-based framework for database
updating under constraints. In our framework, the constraints are
represented as an instantiated extended logic program. When performing
an update, database consistency may be violated. We provide
an approach of maintaining database consistency, and study the
conditions under which the maintenance process is deterministic. We
show that the complexity of the computations and decision problems
presented in our framework is in each case polynomial time.
Abstract: High Strength Concrete (HSC) is defined as concrete
that meets special combination of performance and uniformity
requirements that cannot be achieved routinely using conventional
constituents and normal mixing, placing, and curing procedures. It is
a highly complex material, which makes modeling its behavior a very
difficult task. This paper aimed to show possible applicability of
Neural Networks (NN) to predict the slump in High Strength
Concrete (HSC). Neural Network models is constructed, trained and
tested using the available test data of 349 different concrete mix
designs of High Strength Concrete (HSC) gathered from a particular
Ready Mix Concrete (RMC) batching plant. The most versatile
Neural Network model is selected to predict the slump in concrete.
The data used in the Neural Network models are arranged in a format
of eight input parameters that cover the Cement, Fly Ash, Sand,
Coarse Aggregate (10 mm), Coarse Aggregate (20 mm), Water,
Super-Plasticizer and Water/Binder ratio. Furthermore, to test the
accuracy for predicting slump in concrete, the final selected model is
further used to test the data of 40 different concrete mix designs of
High Strength Concrete (HSC) taken from the other batching plant.
The results are compared on the basis of error function (or
performance function).
Abstract: This case study investigates the effects of reactive
focus on form through negotiation on the linguistic development of
an adult EFL learner in an exclusive private EFL classroom. The
findings revealed that in this classroom negotiated feedback occurred
significantly more often than non-negotiated feedback. However, it
was also found that in the long run the learner was significantly more
successful in correcting his own errors when he had received nonnegotiated
feedback than negotiated feedback. This study, therefore,
argues that although negotiated feedback seems to be effective for
some learners in the short run, it is non-negotiated feedback which
seems to be more effective in the long run. This long lasting effect
might be attributed to the impact of schooling system which is itself
indicative of the dominant culture, or to the absence of other
interlocutors in the course of interaction.
Abstract: This paper presents a procedure for estimating VAR
using Sequential Discounting VAR (SDVAR) algorithm for online
model learning to detect fraudulent acts using the telecommunications
call detailed records (CDR). The volatility of the VAR is observed
allowing for non-linearity, outliers and change points based on the
works of [1]. This paper extends their procedure from univariate
to multivariate time series. A simulation and a case study for
detecting telecommunications fraud using CDR illustrate the use of
the algorithm in the bivariate setting.
Abstract: A model of user behaviour based automated planning
is introduced in this work. The behaviour of users of web interactive
systems can be described in term of a planning domain encapsulating
the timed actions patterns representing the intended user profile. The
user behaviour recognition is then posed as a planning problem
where the goal is to parse a given sequence of user logs of the
observed activities while reaching a final state.
A general technique for transforming a timed finite state automata
description of the behaviour into a numerical parameter planning
model is introduced.
Experimental results show that the performance of a planning
based behaviour model is effective and scalable for real world
applications. A major advantage of the planning based approach is to
represent in a single automated reasoning framework problems of
plan recognitions, plan synthesis and plan optimisation.
Abstract: With the advancement of wireless sensor network technology,
its practical utilization is becoming an important challange.
This paper overviews my past environmental monitoring project,
and discusses the process of starting the monitoring by classifying
it into four steps. The steps to start environmental monitoring can
be complicated, but not well discussed by researchers of wireless
sensor network technology. This paper demonstrates our activity and
challenges in each of the four steps to ease the process, and argues
future challenges to enable quick start of environmental monitoring.
Abstract: In this paper, we evaluate the performance of the
Hybrid-MIMO Receiver Scheme (HMRS) in Cognitive Radio
network (CR-network). We investigate the efficiency of the proposed
scheme which the energy level and user number of primary user are
varied according to the characteristic of CR-network. HMRS can
allow users to transmit either Space-Time Block Code (STBC) or
Spatial-Multiplexing (SM) streams simultaneously by using
Successive Interference Cancellation (SIC) and Maximum Likelihood
Detection (MLD). From simulation, the results indicate that the
interference level effects to the performance of HMRS. Moreover,
the exact closed-form capacity of the proposed scheme is derived and
compared with STBC scheme.
Abstract: The present study addresses problems and solutions
related to new functional food production. Wheat (Triticum aestivum
L) bran obtained from industrial mill company “Dobeles
dzirnavieks”, was used to investigate them as raw material like
nutrients for Bifidobacterium lactis Bb-12. Enzymatic hydrolysis of
wheat bran starch was carried out by α-amylase from Bacillus
amyloliquefaciens (Sigma Aldrich). The Viscozyme L purchased
from (Sigma Aldrich) were used for reducing released sugar.
Bifidibacterium lactis Bb-12 purchased from (Probio-Tec® CHR
Hansen) was cultivated in enzymatically hydrolysed wheat bran
mash. All procedures ensured the number of active Bifidobacterium
lactis Bb-12 in the final product reached 105 CFUg-1. After enzymatic
and bacterial fermentations sample were freeze dried for analysis of
chemical compounds. All experiments were performed at Faculty of
Food Technology of Latvia University of Agriculture in January-
March 2013. The obtained results show that both types of wheat bran
(enzymatically treated and non-treated) influenced the fermentative
activity and number of Bifidibacterium lactis Bb-12 viable in wheat
bran mash. Amount of acidity strongly increase during the wheat
bran mash fermentation. The main objective of this work was to
create low-energy functional enzymatically and bacterially treated
food from wheat bran using enzymatic hydrolysis of carbohydrates
and following cultivation of Bifidobacterium lactis Bb-12.
Abstract: In this paper, we propose a robust disease detection
method, called adaptive orientation code matching (Adaptive OCM),
which is developed from a robust image registration algorithm:
orientation code matching (OCM), to achieve continuous and
site-specific detection of changes in plant disease. We use two-stage
framework for realizing our research purpose; in the first stage,
adaptive OCM was employed which could not only realize the
continuous and site-specific observation of disease development, but
also shows its excellent robustness for non-rigid plant object searching
in scene illumination, translation, small rotation and occlusion changes
and then in the second stage, a machine learning method of support
vector machine (SVM) based on a feature of two dimensional (2D)
xy-color histogram is further utilized for pixel-wise disease
classification and quantification. The indoor experiment results
demonstrate the feasibility and potential of our proposed algorithm,
which could be implemented in real field situation for better
observation of plant disease development.
Abstract: In this work, simulation algorithms for contact drying
of agitated particulate materials under vacuum and at atmospheric
pressure were developed. The implementation of algorithms gives a
predictive estimation of drying rate curves and bulk bed temperature
during contact drying. The calculations are based on the penetration
model to describe the drying process, where all process parameters
such as heat and mass transfer coefficients, effective bed properties,
gas and liquid phase properties are estimated with proper
correlations. Simulation results were compared with experimental
data from the literature. In both cases, simulation results were in good
agreement with experimental data. Few deviations were identified
and the limitations of the predictive capabilities of the models are
discussed. The programs give a good insight of the drying behaviour
of the analysed powders.
Abstract: This paper focuses on the development of bond graph
dynamic model of the mechanical dynamics of an excavating mechanism
previously designed to be used with small tractors, which are
fabricated in the Engineering Workshops of Jomo Kenyatta University
of Agriculture and Technology. To develop a mechanical dynamics
model of the manipulator, forward recursive equations similar to
those applied in iterative Newton-Euler method were used to obtain
kinematic relationships between the time rates of joint variables
and the generalized cartesian velocities for the centroids of the
links. Representing the obtained kinematic relationships in bondgraphic
form, while considering the link weights and momenta as
the elements led to a detailed bond graph model of the manipulator.
The bond graph method was found to reduce significantly the number
of recursive computations performed on a 3 DOF manipulator for a
mechanical dynamic model to result, hence indicating that bond graph
method is more computationally efficient than the Newton-Euler
method in developing dynamic models of 3 DOF planar manipulators.
The model was verified by comparing the joint torque expressions
of a two link planar manipulator to those obtained using Newton-
Euler and Lagrangian methods as analyzed in robotic textbooks. The
expressions were found to agree indicating that the model captures
the aspects of rigid body dynamics of the manipulator. Based on
the model developed, actuator sizing and valve sizing methodologies
were developed and used to obtain the optimal sizes of the pistons
and spool valve ports respectively. It was found that using the pump
with the sized flow rate capacity, the engine of the tractor is able to
power the excavating mechanism in digging a sandy-loom soil.
Abstract: The study of the fouling deposition of pink guava
juice (PGJ) is relatively new research compared to milk fouling
deposit. In this work, a new experimental set-up was developed to
imitate the fouling formation in heat exchanger, namely a continuous
flow experimental set-up heat exchanger. The new experimental setup
was operated under industrial pasteurization temperature of PGJ,
which was at 93°C. While the flow rate and pasteurization period
were based on the experimental capacity, which were 0.5 and 1
liter/min for the flow rate and the pasteurization period was set for 1
hour. Characterization of the fouling deposit was determined by
using various methods. Microstructure of the deposits was carried
out using ESEM. Proximate analyses were performed to determine
the composition of moisture, fat, protein, fiber, ash and carbohydrate
content. A study on the hardness and stickiness of the fouling deposit
was done using a texture analyzer. The presence of seedstone in pink
guava juice was also analyzed using a particle analyzer. The findings
shown that seedstone from pink guava juice ranging from 168 to
200μm and carbohydrate was found to be a major composition
(47.7% of fouling deposit consists of carbohydrate). Comparison
between the hardness and stickiness of the deposits at two different
flow rates showed that fouling deposits were harder and denser at
higher flow rate. Findings from this work provide basis knowledge
for further study on fouling and cleaning of PGJ.
Abstract: This paper discusses the utilization of marine biomass as an energy resource in Japan. A marine biomass energy system in Japan was proposed consisting of seaweed cultivation (Laminaria japonica) at offshore marine farms, biogas production via methane fermentation of the seaweeds, and fuel cell power generation driven by the generated biogas. We estimated energy output, energy supply potential, and CO2 mitigation in Japan on the basis of the proposed system. As a result, annual energy production was estimated to be 1.02-109 kWh/yr at nine available sites. Total CO2 mitigation was estimated to be 1.04-106 tonnes per annum at the nine sites. However, the CO2 emission for the construction of relevant facilities is not taken into account in this paper. The estimated CO2 mitigation is equivalent to about 0.9% of the required CO2 mitigation for Japan per annum under the Kyoto Protocol framework.
Abstract: The purpose of this study is to suggest direction for
future study of the energy-IT industry that will be used for framework to increase IT utilization in the energy industry. Recently, Green IT is a becoming global issue because of global environmental pollution.
Also, IT roles in energy industry are becoming more important.
However, the related studies were IT industry oriented that is not sufficient to make plan for Green energy. Therefore, after analyzing
existing studies related to Green energy and Green IT,
re-categorization for Green energy-IT industry was suggested. Direction of framework is based on energy industry that enable to link between energy and IT. The results of this study suggest comprehensive insight to Green energy-IT industry. Thus it is able to
provide useful implications and guidelines to increase IT utilization in the energy industry.
Abstract: RFID tag is a small and inexpensive microchip which is
capable of transmitting unique identifier through wireless network in a
short distance. If a group of RFID tags can be scanned simultaneously
by one reader, RFID Group proof could be generated. Group proof can
be used in various applications, such as good management which is
usually achieved using barcode system. A lot of RFID group proof
schemes have been proposed by many researchers. In this paper, we
introduce some existing group proof schemes and then analyze their
vulnerabilities to the privacy. Moreover, we propose a new attack
model, which threats the privacy of user by tracking tags in a group.