298,894 research outputs found

    PENDEKATAN GUGUS KENDALI MUTU DALAM PENGENDALIAN KUALITAS PRODUK PADA IKM “CENDERA MATA” MALANG

    Get PDF
    Quality control done by the company "Cindera Mata" are control solutions, ranging from control of raw materials to finished products are accepted by customers, supported by a workforce that is able to work individually with a simple method. However, it is not enough that it needs a systematic method to support quality control. Of the total production produced by the company for approximately 21% of product defects such as lack of basic glaze colors to give the effect of natural, color decorating often peeling, body color does not match. The company expects to reduce the number of defects that can reduce costs, time and effort. Quality control is an engineering and management activities that are used to measure traits - characteristics of product quality, by comparing the specifications or requirements and the actual actions to the standards set. Quality Controll Cyrcle (QCC) is a management system that involves employees from all levels through the application of the concept of quality control and statistical methods to the satisfaction of customers, employees and company. This research was conducted at the Company's “Cindera Mata” Dinoyo- Malang. This study aims to reduce the level of disability products knickknacks aroma therapy completeness of ceramics in the production process by using / implementing methods QCC system. In problem solving using map control X and R as well as a causal diagram. From the study it can be concluded that the implementation of the Quality Control process improvements through the work of a sample of 9000 pieces acquired defects before implemented Quality Controll Circles for 1890 pieces being implemented QCC after a decline of 850 pieces or 55%. Key words : Quality Controll, Dissability Product, Quality Controll Cyrcl

    Statistical pattern modeling in vision-based quality control systems

    Get PDF
    Machine vision technology improves productivity and quality management and provides a competitive advantage to industries that employ this technology. In this article, visual inspection and quality control theory are combined to develop a robust inspection system with manufacturing applications. The inspection process might be defined as the one used to determine if a given product fulfills a priori specifications, which are the quality standard. In the case of visual inspection, these specifications include the absence of defects, such as lack (or excess) of material, homogeneous visual aspect, required color, predetermined texture, etc. The characterization of the visual aspect of metallic surfaces is studied using quality control chars, which are a graphical technique used to compare on-line capabilities of a product with respect to these specifications. Original algorithms are proposed for implementation in automated visual inspection applications with on-line execution requirements. The proposed artificial vision method is a hybrid between the two usual methods of pattern comparison and theoretical decision. It incorporates quality control theory to statistically model the pattern for defect-free products. Specifically, individual control charts with 6-sigma limits are set so the inspection error is minimized. Experimental studies with metallic surfaces help demonstrate the efficacy and robustness of the proposed methodology.Publicad

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data

    Final report on the farmer's aid in plant disease diagnoses

    Get PDF
    This report is the final report on the FAD project. The FAD project was initiated in september 1985 to test the expert system shell Babylon by developing a prototype crop disease diagnosis system in it. A short overview of the history of the project and the main problems encountered is given in chapter 1. Chapter 2 describes the result of an attempt to integrate JSD with modelling techniques like generalisation and aggregation and chapter 3 concentrates on the method we used to elicit phytopathological knowledge from specialists. Chapter 4 gives the result of knowledge acquisition for the 10 wheat diseases most commonly occurring in the Netherlands. The user interface is described briefly in chapter 5 and chapter 6 gives an overview of the additions to the implementation we made to the version of FAD reported in our second report. Chapter 7, finally, summarises the conclusions of the project and gives recommendations for follow-up projects

    Slovenian Virtual Gallery on the Internet

    Get PDF
    The Slovenian Virtual Gallery (SVG) is a World Wide Web based multimedia collection of pictures, text, clickable-maps and video clips presenting Slovenian fine art from the gothic period up to the present days. Part of SVG is a virtual gallery space where pictures hang on the walls while another part is devoted to current exhibitions of selected Slovenian art galleries. The first version of this application was developed in the first half of 1995. It was based on a file system for storing all the data and custom developed software for search, automatic generation of HTML documents, scaling of pictures and remote management of the system. Due to the fast development of Web related tools a new version of SVG was developed in 1997 based on object-oriented relational database server technology. Both implementations are presented and compared in this article with issues related to the transion between the two versions. At the end, we will also discuss some extensions to SVG. We will present the GUI (Graphical User Interface) developed specially for presentation of current exhibitions over the Web which is based on GlobalView panoramic navigation extension to developed Internet Video Server (IVS). And since SVG operates with a lot of image data, we will confront with the problem of Image Content Retrieval

    MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface

    Full text link
    Application development for distributed computing "Grids" can benefit from tools that variously hide or enable application-level management of critical aspects of the heterogeneous environment. As part of an investigation of these issues, we have developed MPICH-G2, a Grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers, at the same or different sites, using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the Globus Toolkit for authentication, authorization, resource allocation, executable staging, and I/O, as well as for process creation, monitoring, and control. Various performance-critical operations, including startup and collective operations, are configured to exploit network topology information. The library also exploits MPI constructs for performance management; for example, the MPI communicator construct is used for application-level discovery of, and adaptation to, both network topology and network quality-of-service mechanisms. We describe the MPICH-G2 design and implementation, present performance results, and review application experiences, including record-setting distributed simulations.Comment: 20 pages, 8 figure

    Indian River Lagoon surface water improvement and management (SWIM) plan, 2002 update.

    Get PDF
    In recognition of the need to place additional emphasis on the restoration, protection, and management of the surface water resources of the state, the Florida Legislature, through the Surface Water Improvement and Management (SWIM) Act of 1987, directed the state’s water management districts to “design and implement plans and programs for the improvement and management of surface water” (Section 373.451, Florida Statutes [FS]). The SWIM legislation requires the water management districts to protect the ecological, aesthetic, recreational, and economic value of the state’s surface water bodies, keeping in mind that water quality degradation is frequently caused by point and nonpoint source pollution and that degraded water quality can cause both direct and indirect losses of aquatic habitats. This 2002 update is the second update of the Indian River Lagoon SWIM Plan. This 2002 plan update includes a status report on the state of the Lagoon, a summary of progress on projects undertaken since the last update, and recommendations for future projects and other actions over the next 5 years. (262pp.

    Family of 2-simplex cognitive tools and their application for decision-making and its justifications

    Get PDF
    Urgency of application and development of cognitive graphic tools for usage in intelligent systems of data analysis, decision making and its justifications is given. Cognitive graphic tool "2-simplex prism" and examples of its usage are presented. Specificity of program realization of cognitive graphics tools invariant to problem areas is described. Most significant results are given and discussed. Future investigations are connected with usage of new approach to rendering, cross-platform realization, cognitive features improving and expanding of n-simplex family.Comment: 14 pages, 6 figures, conferenc
    corecore