332 resultados para decomposition techniques
Resumo:
Rolling Element Bearings (REBs) are vital components in rotating machineries for providing rotating motion. In slow speed rotating machines, bearings are normally subjected to heavy static loads and a catastrophic failure can cause enormous disruption to production and human safety. Due to its low operating speed the impact energy generated by the rotating elements on the defective components is not sufficient to produce a detectable vibration response. This is further aggravated by the inability of general measuring instruments to detect and process the weak signals at the initiation of the defect accurately. Furthermore, the weak signals are often corrupted by background noise. This is a serious problem faced by maintenance engineers today and the inability to detect an incipient failure of the machine can significantly increases the risk of functional failure and costly downtime. This paper presents the application of noise removal techniques for enhancing the detection capability for slow speed REB condition monitoring. Blind deconvolution (BD) and adaptive line enhancer (ALE) are compared to evaluate their performance in enhancing the source signal with consequential removal of background noise. In the experimental study, incipient defects were seeded on a number of roller bearings and the signals were acquired using acoustic emission (AE) sensor. Kurtosis and modified peak ratio (mPR) were used to determine the detectability of signal corrupted by noise.
Resumo:
Process models define allowed process execution scenarios. The models are usually depicted as directed graphs, with gateway nodes regulating the control flow routing logic and with edges specifying the execution order constraints between tasks. While arbitrarily structured control flow patterns in process models complicate model analysis, they also permit creativity and full expressiveness when capturing non-trivial process scenarios. This paper gives a classification of arbitrarily structured process models based on the hierarchical process model decomposition technique. We identify a structural class of models consisting of block structured patterns which, when combined, define complex execution scenarios spanning across the individual patterns. We show that complex behavior can be localized by examining structural relations of loops in hidden unstructured regions of control flow. The correctness of the behavior of process models within these regions can be validated in linear time. These observations allow us to suggest techniques for transforming hidden unstructured regions into block-structured ones.
Resumo:
Real world business process models may consist of hundreds of elements and have sophisticated structure. Although there are tasks where such models are valuable and appreciated, in general complexity has a negative influence on model comprehension and analysis. Thus, means for managing the complexity of process models are needed. One approach is abstraction of business process models-creation of a process model which preserves the main features of the initial elaborate process model, but leaves out insignificant details. In this paper we study the structural aspects of process model abstraction and introduce an abstraction approach based on process structure trees (PST). The developed approach assures that the abstracted process model preserves the ordering constraints of the initial model. It surpasses pattern-based process model abstraction approaches, allowing to handle graph-structured process models of arbitrary structure. We also provide an evaluation of the proposed approach.
Resumo:
This qualitative study explores the methods that chefs use to create innovative marketable product and compares these findings to other design tools. This study is based on a series of interviews with locally recognised chefs in Minnesota and observations of them in their kitchens in order to understand the details of how they conceive and develop dishes from preliminary concept to final plating and user consumption. This paper focuses on idea generation and discusses two key findings: first, the variety of idea generation techniques presented by the chefs can be classified into the creativity tool SCAMPER (substitute, combine, adapt, modify/magnify, put to other use, eliminate, reverse/rearrange); second, chefs evoke the theory of MAYA or Most Advanced Yet Acceptable when innovating new dishes, which implies making novel changes while remaining relatable to the consumer. Other reoccurring topics in the interview discussion of food innovation include play, surprise, and humour.
Resumo:
Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from two case studies of stakeholder-involvement in early design where non-formal techniques supported strong collaboration resulting in deep understanding of requirements and of the feasibility of solutions.
Resumo:
This paper presents a novel framework to further advance the recent trend of using query decomposition and high-order term relationships in query language modeling, which takes into account terms implicitly associated with different subsets of query terms. Existing approaches, most remarkably the language model based on the Information Flow method are however unable to capture multiple levels of associations and also suffer from a high computational overhead. In this paper, we propose to compute association rules from pseudo feedback documents that are segmented into variable length chunks via multiple sliding windows of different sizes. Extensive experiments have been conducted on various TREC collections and our approach significantly outperforms a baseline Query Likelihood language model, the Relevance Model and the Information Flow model.
Resumo:
Alkyl hydroperoxides (ROOH) are attributed a key role in the biochemical oxidation of lipids during oxidative stress.1 In this chemistry ROOH compounds, where the R groups are unsaturated fatty acids, are viewed as transient ntermediates which are readily degraded, due to the lability of the RO-OH bond, to yield potentially genotoxic aldehydes and ketones.2 Generally, the decomposition of alkyl hydroperoxides is thought to be mediated by radical abstraction or electron transfer processes usually involving enzymes, transition metals, or recently, Vitamin C.3 In this paper we present the first unambiguous experimental and computational evidence for base-mediated heterolytic decomposition of simple alkyl hydroperoxides by the mechanism outlined in Scheme 1.
Resumo:
The E-CO(2) elimination reactions of alkyl hydroperoxides proceed via abstraction of an (x-hydrogen by a base: X- + (RRHCOOH)-R-1-H-2 -> HX + (RRC)-R-1-C-2=O + HO-. Efficiencies and product distributions for the reactions of the hydroxide anion with methyl, ethyl, and tert-butyl hydroperoxides are studied in the gas phase. On the basis of experiments using three isotopic analogues, HO- + CH3OOH, HO- + CD3OOH, and H18O- + CH3OOH. the overall intrinsic reaction efficiency is determined to be 80% or greater. The E(CO)2 decomposition is facile for these methylperoxide reactions, and predominates over competing proton transfer at the hydroperoxide moiety. The CH3CH2OOH reaction displays a similar E(CO)2 reactivity, whereas proton transfer and the formation of HOO- are the exclusive pathways observed for (CH3)(3)COOH, which has no (x-hydrogen. All results are consistent with the E-CO(2) mechanism, transition state structure, and reaction energy diagrams calculated using the hybrid density functional B3LYP approach. Isotope labeling for HO- + CH3OOH also reveals some interaction between H2O and HO- within the E(CO)2 product complex [H2O center dot center dot center dot CH2=O center dot center dot center dot HO-]. There is little evidence, however. for the formation of the most exothermic products H2O + CH2(OH)O-, which would arise from nuclephilic condensation of CH2=O and HO-. The results suggest that the product dynamics are not totally statistical but are rather direct after the E-CO(2) transition state. The larger HO- + CH3CH2OOH system displays more statistical behavior during complex dissociation.
Resumo:
Bauxite refinery residues are derived from the Bayer process by the digestion of crushed bauxite in concentrated caustic at elevated temperatures. Chemically, it comprises, in varying amounts (depending upon the composition of the starting bauxite), oxides of iron and titanium, residual alumina, sodalite, silica, and minor quantities of other metal oxides. Bauxite residues are being neutralised by seawater in recent years to reduce the alkalinity in bauxite residue, through the precipitation of hydrotalcite-like compounds and some other Mg, Ca, and Al hydroxide and carbonate minerals. A combination of X-ray diffraction (XRD) and vibrational spectroscopy techniques, including mid-infrared (IR), Raman, near-infrared (NIR), and UV-Visible, have been used to characterise bauxite residue and seawater neutralised bauxite residue. Both the ferrous (Fe2+) and ferric (Fe3+) ions within bauxite residue can be identified by their characteristic NIR bands, where ferrous ions produce a strong absorption band at around 9000 cm-1, while ferric ions produce two strong bands at 25000 and 14300 cm-1. The presence of adsorbed carbonate and hydroxide anions can be identified at around 5200 and 7000 cm-1, respectively, attributed to the 2nd overtone of the 1st fundamental overtones observed in the mid-IR spectra. The complex bands in the Raman and mid-IR spectra around 3500 cm-1 are assigned to the OH stretching vibrations of the various oxides present in bauxite residue, and water. The combination of carbonate and hydroxyl units and their fundamental overtones give rise to many of the features of the NIR spectra.
Resumo:
The use of Wireless Sensor Networks (WSNs) for vibration-based Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data asynchronicity and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. Based on a brief review, this paper first reveals that Data Synchronization Error (DSE) is the most inherent factor amongst uncertainties of SHM-oriented WSNs. Effects of this factor are then investigated on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when merging data from multiple sensor setups. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as benchmark data after being added with a certain level of noise to account for the higher presence of this factor in SHM-oriented WSNs. From this source, a large number of simulations have been made to generate multiple DSE-corrupted datasets to facilitate statistical analyses. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with DSE at a relaxed level. Finally, the combination of preferred OMA techniques and the use of the channel projection for the time-domain OMA technique to cope with DSE are recommended.
Resumo:
Recurrence relations in mathematics form a very powerful and compact way of looking at a wide range of relationships. Traditionally, the concept of recurrence has often been a difficult one for the secondary teacher to convey to students. Closely related to the powerful proof technique of mathematical induction, recurrences are able to capture many relationships in formulas much simpler than so-called direct or closed formulas. In computer science, recursive coding often has a similar compactness property, and, perhaps not surprisingly, suffers from similar problems in the classroom as recurrences: the students often find both the basic concepts and practicalities elusive. Using models designed to illuminate the relevant principles for the students, we offer a range of examples which use the modern spreadsheet environment to powerfully illustrate the great expressive and computational power of recurrences.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
With nine examples, we seek to illustrate the utility of the Renormalization Group approach as a unification of other asymptotic and perturbation methods.
Resumo:
The objective of this chapter is to provide an overview of traffic data collection that can and should be used for the calibration and validation of traffic simulation models. There are big differences in availability of data from different sources. Some types of data such as loop detector data are widely available and used. Some can be measured with additional effort, for example, travel time data from GPS probe vehicles. Some types such as trajectory data are available only in rare situations such as research projects.
Resumo:
For the renewable energy sources whose outputs vary continuously, a Z-source current-type inverter has been proposed as a possible buck-boost alternative for grid-interfacing. With a unique X-shaped LC network connected between its dc power source and inverter topology, Z-source current-type inverter is however expected to suffer from compounded resonant complications in addition to those associated with its second-order output filter. To improve its damping performance, this paper proposes the careful integration of Posicast or three-step compensators before the inverter pulse-width modulator for damping triggered resonant oscillations. In total, two compensators are needed for wave-shaping the inverter boost factor and modulation ratio, and they can conveniently be implemented using first-in first-out stacks and embedded timers of modern digital signal processors widely used in motion control applications. Both techniques are found to damp resonance of ac filter well, but for cases of transiting from current-buck to boost state, three-step technique is less effective due to the sudden intermediate discharging interval introduced by its non-monotonic stepping (unlike the monotonic stepping of Posicast damping). These findings have been confirmed both in simulations and experiments using an implemented laboratory prototype.