678 resultados para logs steaming


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study evaluated the Eucalyptus grandis drying defects acting on boards diametrical position and on log steaming. Half of the logs, with diameter from 20 to <25, 25 to <30 and 30 to <35cm, were steamed during 20 hours at 90°C of temperature. Subsequently, the logs (control and steamed) were sawn. The boards were dried in the dry-kiln pilot and the resulting defects from the drying process were measured. The results indicate that: (1) the boards coming from control logs presented different magnitude defects in function of the diametrical position. The split and spring to increase in direction to pith, the bow to increase in direction to bark and cupping were bigger in intermediary boards; (2) the boards coming from steamed logs presented a reduction from drying defects in function of logs diameter and its more homogeneous index in the pith-bark direction.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Key message Log-end splitting is one of the single most important defects in veneer logs. We show that log-end splitting in the temperate plantation species Eucalyptus nitens varies across sites and within-tree log position and increases with time in storage. Context Log-end splitting is one of the single most important defects in veneer logs because it can substantially reduce the recovery of veneer sheets. Eucalyptus nitens can develop log-end splits, but factors affecting log-end splitting in this species are not well understood. Aims The present study aims to describe the effect of log storage and steaming on the development of log-end splitting in logs from different plantations and log positions within the tree. Methods The study was conducted on upper and lower logs from each of 41 trees from three 20–22-year-old Tasmanian E. nitens plantations. Log-end splitting was assessed immediately after felling, after transport and storage in a log-yard, and just before peeling. A pre-peeling steam treatment was applied to half the logs. Results Site had a significant effect on splitting, and upper logs split more than lower logs with storage. Splitting increased with tree diameter breast height (DBH), but this relationship varied with site. The most rapidly growing site had more splitting even after accounting for DBH. No significant effect of steaming was detected. Conclusion Log-end splitting varied across sites and within-tree log position and increased with time in storage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this study was evaluate the effect of the log steaming on the chemical properties and decay resistance of Eucalyptus grandis wood. Logs with diameter between 20 and 22 cm were studied. Half of logs were kept in its on original condition, and the other half was steamed at 90°C for 13 hours. The holocellulosc, Klason lignin, total extractives content and the weight loss caused by the decay fungus Pycnoporus sanguineous were characterized. The results showed that the log steaming of E. grandis wood cause: (l)a significantly decreased in holocellulose content; (2) an increase of 4.8% and 4.4% in total extractives and lignin content, respectively; and (3) a decrease in its durability against the decay fungus P. sanguineus in order of 13.03%. Copyright © (2012) by WCTE 2012 Committee.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Howard East rural area has experienced a rapid growth of small block subdivisions and horticulture over the last 40 years, which has been based on groundwater supply. Early bores in the area provide part of the water supply for Darwin City and are maintained and monitored by NT Power & Water Corporation. The Territory government (NRETAS) has established a monitoring network, and now 48 bores are monitored. However, in the area there are over 2700 private bores that are unregulated.Although NRETAS has both FDM and FEM simulations for the region, community support for potential regulation is sought. To improve stakeholder understanding of the resource QUT was retained by the TRaCKconsortium to develop a 3D visualisation of the groundwater system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the opportunities for transformational learning experienced by a group of pre-service teachers who were engaged in service-learning as a pedagogical process with a focus on reflection. Critical social theory informed the design of the reflection process as it enabled a move away from knowledge transmission toward knowledge transformation. The structured reflection log was designed to illustrate the critical social theory expectations of quality learning that teach students to think critically: ideology critique and utopian critique. Butin's lenses and a reflection framework informed by the work of Bain, Ballantyne, Mills and Lester were used in the design of the service-learning reflection log. Reported data provide evidence of transformational learning and highlight how the students critique their world and imagine how they could contribute to a better world in their work as a beginning teacher.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The work presented in this paper aims to provide an approach to classifying web logs by personal properties of users. Design/methodology/approach – The authors describe an iterative system that begins with a small set of manually labeled terms, which are used to label queries from the log. A set of background knowledge related to these labeled queries is acquired by combining web search results on these queries. This background set is used to obtain many terms that are related to the classification task. The system then ranks each of the related terms, choosing those that most fit the personal properties of the users. These terms are then used to begin the next iteration. Findings – The authors identify the difficulties of classifying web logs, by approaching this problem from a machine learning perspective. By applying the approach developed, the authors are able to show that many queries in a large query log can be classified. Research limitations/implications – Testing results in this type of classification work is difficult, as the true personal properties of web users are unknown. Evaluation of the classification results in terms of the comparison of classified queries to well known age-related sites is a direction that is currently being exploring. Practical implications – This research is background work that can be incorporated in search engines or other web-based applications, to help marketing companies and advertisers. Originality/value – This research enhances the current state of knowledge in short-text classification and query log learning. Classification schemes, Computer networks, Information retrieval, Man-machine systems, User interfaces

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from raw event logs is performed more or less on a case-by-case basis: there is still a lack of generalized systematic approach that captures this process. This paper proposes a systematic approach to enrich and transform event logs in order to obtain the required attributes for root cause analysis using classical data mining techniques, the classification techniques. This approach is formalized and its applicability has been validated using both self-generated and publicly-available logs.