排序方式: 共有670条查询结果,搜索用时 15 毫秒
1.
A survey of inspection strategy and sensor distribution studies in discrete-part manufacturing processes 总被引:8,自引:0,他引:8
Methodologies, modeling approaches, and the interactions between various system elements involved in inspection-allocation and sensor-distribution problems, that influence operational quality decisions, are discussed. The surveyed papers fall into two broad categories: inspection-oriented quality-assurance strategies and diagnosis-oriented sensor-distribution strategies. Within each subarea, individual papers are further classified according to the system characteristics of the physical processes being investigated and the modeling characteristics of the approaches being used. As evident from nearly 100 journal articles published in the past four decades, these two problems have received considerable attention from researchers in quality engineering, management science, operations research as well as robotic vision arenas. We find that the inspection-allocation problem has been studied rather comprehensively whereas the relatively new sensor-distribution problem has plenty of opportunities for researchers. Discussions are also presented to summarize our observations based on the classifications along with some thoughts on future research. 相似文献
2.
This paper presents an online algorithm for adapting the kernel width that is a free parameter in information theoretic cost functions using Renyi's entropy. This kernel computes the interactions between the error samples and essentially controls the nature of the performance surface over which the parameters of the system adapt. Since the error in an adaptive system is non-stationary during training, a fixed value of the kernel width may affect the adaptation dynamics and even compromise the location of the global optimum in parameter space. The proposed online algorithm for adapting the kernel width is derived from first principles and minimizes the Kullback-Leibler divergence between the estimated error density and the true density. We characterize the performance of this novel approach with simulations of linear and nonlinear systems training, using the minimum error entropy criterion with the proposed adaptive kernel algorithm. We conclude that adapting the kernel width improves the rate of convergence of the parameters, and decouples the convergence rate and misadjustment of the filter weights. 相似文献
3.
Farooque Hassan Kumbhar Abhishek Roy Navrati Saxena 《Mobile Networks and Applications》2016,21(4):620-634
Introducing Machine-to-Machine (M2M) communications over traditional 4G cellular networks make the cellular random access channel more congested and collision-prone. In order to resolve this random access congestion, we propose RoBiN - Random access using Border router in M2M cellular Networks. RoBiN proposes an architectural modification of introducing small cells, called Border Routers (BR), in cellular networks, with complete frequency reuse capability. We formulate the aforementioned challenge in terms of collision probability and system capacity. Subsequently, we propose an efficient solution for M2M communications in cellular networks. Exhaustive mathematical analysis shows that RoBiN significantly improves the random access success probability, by 50 % over existing 4G cellular systems. Simulation results on typical 4G networks corroborate our mathematical analysis and demonstrate almost 15 dB increase in Signal-to-Interference-plus-Noise Ratio (SINR) and 3 times throughput improvements over legacy 4G cellular systems. Furthermore, RoBiN also achieves 50 %?80 % improvement in collision probability over existing time alignment matching work. 相似文献
4.
Arijit Sur Anand S. Nair Abhishek Kumar Apul Jain Sukumar Nandi 《Circuits, Systems, and Signal Processing》2013,32(3):1239-1256
Recently, data hiding by modifying network parameters like packet header, payload, and packet length has become popular among researchers. Different algorithms have been proposed during the last few years which have altered the network packets in different ways to embed the data bits. Some of these algorithms modify the network packet length for embedding. Although most of the packet length based embedding schemes try to imitate the normal network traffic distribution, they have altered the statistical distribution of network packet lengths during embedding. These statistical anomalies can be exploited to detect such schemes. In this paper, a second order detection scheme for packet length based steganography has been proposed. A comprehensive set of experiments have been carried out to show that the proposed detection scheme can detect network packet length based steganography with a considerably high accuracy. 相似文献
5.
A novel method for the extraction of (−)epigallocatechin gallate of high purity from green tea leaves is proposed in this study. The method comprised a two-stage water-based extraction followed by successive use of microfiltration and ultrafiltration. Microfiltration was used as a pretreatment to ultrafiltration. The best process conditions of each unit operation were estimated by performing well-planned experimentations. The clarified liquor was dried to powder by freeze drying. Chemical analyses revealed that the tea powder contained about 90% of polyphenols. The purity of (−)epigallocatechin gallate was found to be about 80%, while its average yield was 1.22 g/l. The method outlined in this study may have remarkable importance for the bulk production of high-purity (−)epigallocatechin gallate with potential application in pharmaceutical, cosmetic, and food-processing industries. Besides being a green process, this method can be easily scaled up for the commercial production of (−)epigallocatechin gallate. 相似文献
6.
7.
8.
Abhishek Gawasane Laura Bix Javier de la Fuente Raghav Prashant Sundar Timothy J. Smith 《Packaging Technology and Science》2012,25(7):385-396
The study consisted of three objectives: (a) to test the relative prominence and conspicuousness of a warning required by US law to be conspicuous; (b) to explore whether or not the conspicuousness of the said warning can be enhanced graphically; and (c) to develop preliminary data for power analysis that would guide decisions related to sample size in future studies. Seventeen subjects viewed four over‐the‐counter drug packages (each with a different style of warning) along with five other products while wearing an eye tracking device. Four styles of warning were used on the over‐the‐counter drug packages: no outline and no fill, outline and no fill, no outline and fill, and outline and fill. The surface area and the placement of the warnings were held constant across all four designs and were consistent with those on commercially available products. Collected data were broken into five zones: warning, brand name, strength, product benefit and net weight. Despite the fact that US law requires it to be conspicuous, the tested warning was significantly less noticeable than the brand name (objective one) for all dependent variables analyzed (α = 0.05). No significant difference was indicated for the varied warning designs (objective two). This could be because not much can be done to enhance prominence when constrained to the limited space that is typically used for such warnings or because of the limited sample size. Power calculations suggest that a sample size of nearly 200 subjects would be required to detect a 2.5 s mean difference at 80% confidence (objective three). Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
9.
Among the carbon allotropes, carbyne chains appear outstandingly accessible for sorption and very light. Hydrogen adsorption on calcium-decorated carbyne chain was studied using ab initio density functional calculations. The estimation of surface area of carbyne gives the value four times larger than that of graphene, which makes carbyne attractive as a storage scaffold medium. Furthermore, calculations show that a Ca-decorated carbyne can adsorb up to 6 H(2) molecules per Ca atom with a binding energy of ~0.2 eV, desirable for reversible storage, and the hydrogen storage capacity can exceed ~8 wt %. Unlike recently reported transition metal-decorated carbon nanostructures, which suffer from the metal clustering diminishing the storage capacity, the clustering of Ca atoms on carbyne is energetically unfavorable. Thermodynamics of adsorption of H(2) molecules on the Ca atom was also investigated using equilibrium grand partition function. 相似文献
10.
Silicon - In this paper, we have studied effect of localised charges on performance of UTBB FDSOI FET. Purpose behind this work is to understand the performance of UTBB FDSOI FET under the... 相似文献