925 resultados para Automation and robotics
Resumo:
Cover title.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
Column-based refolding of complex and highly disulfide-bonded proteins simplifies protein renaturation at both preparative and process scale by integrating and automating a number of operations commonly used in dilution refolding. Bovine serum albumin (BSA) was used as a model protein for refolding and oxido-shuffling on an ion-exchange column to give a refolding yield of 55 % after 40 Ih incubation. Successful on-column refolding was conducted at protein concentrations of up to 10 mg/ml and refolded protein, purified from misfolded forms, was eluted directly from the column at a concentration of 3 mg/ml. This technique integrates the dithiothreitol removal, refolding, concentration and purification steps, achieving a high level of process simplification and automation, and a significant saving in reagent costs when scaled. Importantly, the current result suggests that it is possible to controllably refold disulfide-bonded proteins using common and inexpensive matrices, and that it is not always necessary to control protein-surface interactions using affinity tags and expensive chromatographic matrices. Moreover, it is possible to strictly control the oxidative refolding environment once denatured protein is bound to the ion-exchange column, thus allowing precisely controlled oxido-shuffling. (c) 2005 Elsevier B.V. All rights reserved.
Resumo:
Deregulations and market practices in power industry have brought great challenges to the system planning area. In particular, they introduce a variety of uncertainties to system planning. New techniques are required to cope with such uncertainties. As a promising approach, probabilistic methods are attracting more and more attentions by system planners. In small signal stability analysis, generation control parameters play an important role in determining the stability margin. The objective of this paper is to investigate power system state matrix sensitivity characteristics with respect to system parameter uncertainties with analytical and numerical approaches and to identify those parameters have great impact on system eigenvalues, therefore, the system stability properties. Those identified parameter variations need to be investigated with priority. The results can be used to help Regional Transmission Organizations (RTOs) and Independent System Operators (ISOs) perform planning studies under the open access environment.
Resumo:
A complexidade do ambiente em que vivem as organizações nos dias de hoje exige Sistemas de Informações (SIs) eficientes, que sirvam como apoio à tomada de decisão por parte dos gestores, em especial no que diz respeito às questões ligadas à Tecnologia da Informação (TI) diante dos novos paradigmas de gestão enfrentados pelas Pequenas e Médias Empresas (PMEs). Este trabalho tem como objetivo geral a avaliação da percepção dos gestores das PMEs brasileiras, quanto ao impacto do uso da TI como elemento de melhoria dos processos financeiros das organizações. Para que tal objetivo fosse alcançado, foram desenvolvidos e estudados os seguintes objetivos específicos: verificar de que forma a TI é percebida como útil nas pequenas e médias empresas, em especial na automação de rotinas financeiras de tesouraria e fluxo de caixa; verificar se a automação de rotinas financeiras com a utilização da TI subsidia os processos de tomada de decisão em tais empresas e, ainda, verificar se sua utilização é vista como uma vantagem estratégica. Em seu levantamento bibliográfico, este trabalho apresenta conceitos relacionados a Competição, Pequena e Média Empresa, Estratégia e Gestão de Competência. Esses conceitos foram encontrados na literatura e em artigos na imprensa especializada. Na pesquisa empírica realizada, este trabalho procurou, através de estudos de casos múltiplos em 5 empresas, aprofundar as questões relativas à percepção dos gestores em relação à TI utilizada nos procedimentos financeiros implantados nas organizações que dirigem. O planejamento da amostra foi feito de maneira a permitir não só a análise individual de cada respondente como também a análise das organizações onde atuavam. As conclusões a que este estudo chegou são: a) os gestores têm a percepção de que a utilização de TI nas rotinas financeiras e de fluxo de caixa é imprescindível, pois a automação é necessária para a manutenção e a agilização dos processos de relacionamento com clientes e fornecedores; b) a TI pode subsidiar processos de tomada de decisão estruturada, especificamente as decisões que tratam de rotinas financeiras. Outro aspecto que fica claro na percepção dos gestores é que a dependência da empresa aos SIs aumenta com o crescimento da empresa e, conseqüentemente, com o volume de informações com que os gestores têm de lidar; c) na percepção dos gestores, a utilização de TI nos processos financeiros das PMEs é importante, mas eles não são os determinantes da vantagem estratégica da organização. Os estudos permitiram duas outras observações importantes: d) as estruturas organizacionais das empresas estudadas eram pertinentes aos itens de TI que possuíam; e) há diferença de visão entre gestores e subordinados. A conclusão deste estudo, que responde ao objetivo geral, é que, na percepção dos gestores, a TI tem um impacto positivo como elemento de melhoria dos processos financeiros das organizações, porém não é o fator que define a vantagem estratégica das organizações: há outros aspectos que devem ser avaliados, e a construção de sistemas complexos que abrangem outras áreas da organização é necessária.(AU)
Resumo:
The technology of precision bending of tubes has recently increased in importance and is widely demanded for many industrial applications. However, whilst attention has been concentrated on automation and increasing the production rate of the bending machines, it seems that with one exception very little work has been done in order to understand and therefore fundamentally improve the bending process. A new development for the process of draw-bending of tubes, in which the supporting mandrel is axially vibrated at an ultrasonic frequency, has been perfected. A research programme was undertaken to study the mechanics of tube• bending under both vibratory and non-vibratory conditions. For this purpose, a conventional tube-bending machine was modified and equipped with an oscillatory system. Thin-walled mild steel tubes of different diameter to thickness ratios were bent to mean bend radii having various values from 1.5 to 2.0 times the tube diameter. It was found that the application of ultrasonic vibration reduces the process forces and that the force reduction increases with increasing the vibration amplitude. A reduction in the bending torque of up to 30 per cent was recorded and a reduction in the maximum tube-wall thinning of about 15 per cent was observed. The friction vector reversal mechanism as well as a reduction in friction account for the changes of the forces and the strains. Monitoring the mandrel friction during bending showed, in some cases, that the axial vibration reverses the mandrel .mean force from tension to compression and, thus, the mandrel is assisting the tube motion instead of resisting it. A theory has been proposed to describe the mechanics of deformation during draw-bending of tubes, which embodies the conditions of both "with" and "without" mandrel axial vibration. A theoretical analysis, based on the equilibrium of forces approach, has been developed in which the basic process parameters were taken into consideration. The stresses, the strains and the bending torque were calculated utilising this new solution, and a specially written computer programme was used to perform the computations. It was shown that the theory is in good agreement with the measured values of the strains under vibratory and non-vibratory conditions. Also, the predicted bending 'torque showed a similar trend to that recorded experimentally.
Resumo:
This paper compares two methods to predict in°ation rates in Europe. One method uses a standard back propagation neural network and the other uses an evolutionary approach, where the network weights and the network architecture are evolved. Results indicate that back propagation produces superior results. However, the evolving network still produces reasonable results with the advantage that the experimental set-up is minimal. Also of interest is the fact that the Divisia measure of money is superior as a predictive tool over simple sum.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Successful introduction of information technology applications in various operations of hotel management is vital to most service firms. In recent decades, technologies of information, automation, and communication are increasingly recognized as essential components of a hotel company’s strategic plan. In this study, 62 super-deluxe hotels (5 star), deluxe hotels (4 star), and tourist hotels (3 star) in Korea are examined for differences in the impact of information technology services on guest’ satisfaction, guest convenience, and operational efficiency. The findings generally suggest that the impacts of information technology-enhanced services vary according to the category of hotels in Korea. The results of the study are expected to assist managers in the selections and implementation of information technology systems in their hotel.
Resumo:
There is a growing societal need to address the increasing prevalence of behavioral health issues, such as obesity, alcohol or drug use, and general lack of treatment adherence for a variety of health problems. The statistics, worldwide and in the USA, are daunting. Excessive alcohol use is the third leading preventable cause of death in the United States (with 79,000 deaths annually), and is responsible for a wide range of health and social problems. On the positive side though, these behavioral health issues (and associated possible diseases) can often be prevented with relatively simple lifestyle changes, such as losing weight with a diet and/or physical exercise, or learning how to reduce alcohol consumption. Medicine has therefore started to move toward finding ways of preventively promoting wellness, rather than solely treating already established illness. Evidence-based patient-centered Brief Motivational Interviewing (BMI) interven- tions have been found particularly effective in helping people find intrinsic motivation to change problem behaviors after short counseling sessions, and to maintain healthy lifestyles over the long-term. Lack of locally available personnel well-trained in BMI, however, often limits access to successful interventions for people in need. To fill this accessibility gap, Computer-Based Interventions (CBIs) have started to emerge. Success of the CBIs, however, critically relies on insuring engagement and retention of CBI users so that they remain motivated to use these systems and come back to use them over the long term as necessary. Because of their text-only interfaces, current CBIs can therefore only express limited empathy and rapport, which are the most important factors of health interventions. Fortunately, in the last decade, computer science research has progressed in the design of simulated human characters with anthropomorphic communicative abilities. Virtual characters interact using humans’ innate communication modalities, such as facial expressions, body language, speech, and natural language understanding. By advancing research in Artificial Intelligence (AI), we can improve the ability of artificial agents to help us solve CBI problems. To facilitate successful communication and social interaction between artificial agents and human partners, it is essential that aspects of human social behavior, especially empathy and rapport, be considered when designing human-computer interfaces. Hence, the goal of the present dissertation is to provide a computational model of rapport to enhance an artificial agent’s social behavior, and to provide an experimental tool for the psychological theories shaping the model. Parts of this thesis were already published in [LYL+12, AYL12, AL13, ALYR13, LAYR13, YALR13, ALY14].
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
The great amount of data generated as the result of the automation and process supervision in industry implies in two problems: a big demand of storage in discs and the difficulty in streaming this data through a telecommunications link. The lossy data compression algorithms were born in the 90’s with the goal of solving these problems and, by consequence, industries started to use those algorithms in industrial supervision systems to compress data in real time. These algorithms were projected to eliminate redundant and undesired information in a efficient and simple way. However, those algorithms parameters must be set for each process variable, becoming impracticable to configure this parameters for each variable in case of systems that monitor thousands of them. In that context, this paper propose the algorithm Adaptive Swinging Door Trending that consists in a adaptation of the Swinging Door Trending, as this main parameters are adjusted dynamically by the analysis of the signal tendencies in real time. It’s also proposed a comparative analysis of performance in lossy data compression algorithms applied on time series process variables and dynamometer cards. The algorithms used to compare were the piecewise linear and the transforms.
Resumo:
This research paper presents a five step algorithm to generate tool paths for machining Free form / Irregular Contoured Surface(s) (FICS) by adopting STEP-NC (AP-238) format. In the first step, a parametrized CAD model with FICS is created or imported in UG-NX6.0 CAD package. The second step recognizes the features and calculates a Closeness Index (CI) by comparing them with the B-Splines / Bezier surfaces. The third step utilizes the CI and extracts the necessary data to formulate the blending functions for identified features. In the fourth step Z-level 5 axis tool paths are generated by adopting flat and ball end mill cutters. Finally, in the fifth step, tool paths are integrated with STEP-NC format and validated. All these steps are discussed and explained through a validated industrial component.
Resumo:
This research paper presents the work on feature recognition, tool path data generation and integration with STEP-NC (AP-238 format) for features having Free form / Irregular Contoured Surface(s) (FICS). Initially, the FICS features are modelled / imported in UG CAD package and a closeness index is generated. This is done by comparing the FICS features with basic B-Splines / Bezier curves / surfaces. Then blending functions are caculated by adopting convolution theorem. Based on the blending functions, contour offsett tool paths are generated and simulated for 5 axis milling environment. Finally, the tool path (CL) data is integrated with STEP-NC (AP-238) format. The tool path algorithm and STEP- NC data is tested with various industrial parts through an automated UFUNC plugin.