148,486 research outputs found
The implementation of uncertainty evaluation model in manufacturability analysis system for miniature machine tool
The development of Manufacturability Analysis System for micro-machining domain (MicroMAS) is intended to address the need of the 4-axis Miniature Machine Tool (MMT) that require such system to assist the user in generating micro-component through manufacturability evaluation. One of the manufacturability aspects being assessed is the impacts from Uncertainty Evaluation Model (UEM) analysis that analyse the influence of the errors stemmed from the MMT construction on the geometrical accuracy of the machined micro-parts. The model has allowed a methodology for the errors in a custom-made MMT to be predicted and to further understand the origin of the errors on the machined micro-part. This paper reports on the implementation of UEM in the development of MicroMAS. Therefore, the results from uncertainty evaluation towards the MMT were integrated in the database which are interactively searched based on IF-THEN clauses in order to determine which rules satisfy the requirements expressed via inputs
Recommended from our members
Classification of information systems research revisited: A keyword analysis approach
A number of studies have previously been conducted on keyword analysis in order to provide a comprehensive scheme to classify information systems (IS) research. However, these studies appeared prior to 1994, and IS research has clearly developed substantially since then with the emergence of areas such as electronic commerce, electronic government, electronic health and numerous others. Furthermore, the majority of European IS outlets - such as the European Journal of Information Systems and Information Systems Journal - were founded in the early 1990s, and keywords from these journals were not included in any previous work. Given that a number of studies have raised the issue of differences in European and North American IS research topics and approaches, it is arguable that any such analysis must consider sources from both locations to provide a representative and balanced view of IS classification. Moreover, it has also been argued that there is a need for further work in order to create a comprehensive keyword classification scheme reflecting the current state of the art. Consequently, the aim of this paper is to present the results of a keyword analysis utilizing keywords appearing in major peer-reviewed IS publications after the year 1990 through to 2007. This aim is realized by means of the two following objectives: (1) collect all keywords appearing in 24 peer reviewed IS journals after 1990; and (2) identify keywords not included in the previous IS keyword classification scheme. This paper also describes further research required in order to place new keywords in appropriate IS research categories. The paper makes an incremental contribution toward a contemporary means of classifying IS research. This work is important and useful for researchers in understanding the area and evolution of the IS field and also has implications for improving information search and retrieval activities
Detecting and Refactoring Operational Smells within the Domain Name System
The Domain Name System (DNS) is one of the most important components of the
Internet infrastructure. DNS relies on a delegation-based architecture, where
resolution of names to their IP addresses requires resolving the names of the
servers responsible for those names. The recursive structures of the inter
dependencies that exist between name servers associated with each zone are
called dependency graphs. System administrators' operational decisions have far
reaching effects on the DNSs qualities. They need to be soundly made to create
a balance between the availability, security and resilience of the system. We
utilize dependency graphs to identify, detect and catalogue operational bad
smells. Our method deals with smells on a high-level of abstraction using a
consistent taxonomy and reusable vocabulary, defined by a DNS Operational
Model. The method will be used to build a diagnostic advisory tool that will
detect configuration changes that might decrease the robustness or security
posture of domain names before they become into production.Comment: In Proceedings GaM 2015, arXiv:1504.0244
Above-well, Stark, and potential-barrier resonances of an open square well in a static external electric field
Besides the well known Stark resonances, which are localized in the potential
well and tunnel through the potential barrier created by the dc-field,
"strange" long and short-lived resonances are analytically obtained. These
resonances are not localized inside the potential well. We show that the narrow
ones are localized above the potential well. These narrow resonances give rise
to a {\it peak structure} in a 1D scattering experiment. We also show that the
broad overlapping resonances are associated with the static electric field
potential barrier. These "strange" overlapping resonances do not give rise to a
{\it peak structure} in a 1D scattering experiment. We propose a 2D
experimental set-up where in principle these short-lived states should be
observed as {\it peaks}. Broad overlapping resonances, associated only with the
static electric field potential barrier, could also have observable effects in
a array of quantum wells in the presence of a truncated static electric
field. This last problem is associated with the resonance tunnelling phenomena
which are used in the construction of resonance-tunnelling diodes and
transistors.Comment: submitted to Phys. Rev. A, April 08 200
Substantiating rational parameters of a method for shrinkage ore stoping while developing thin- vein steeply inclined deposits
Objective of the paper is to substantiate rational ore-stoping
technique while using small wells in the context of thin-vein steeply
inclined deposit mining. The technique is based upon the repeated field
studies and simulation of ore drawing processes for shrinkage ore stoping
in terms of the oriented drilling of periphery holes. A design of a blast-hole
charge with low-density porous intermediate layer has been proposed as a
result as well as a mechanism of shock-wave propagation within rock mass
in the process of thin steeply inclined vein stoping. Scientific novelty is
represented by means of analytical results of scientific sources, and
dependences of ore losses on the vein wall hypsometry resulting from
shrinkage stoping in the context of the technique being proposed. Practical
relevance is to substantiate rational parameters of the ore-stoping technique
being proposed. The technique involves designs of blast-hole charges with
low-density porous intermediate layer in stemming. Moreover, the
technique proposes to place the intermediate low-density stemming layer
right after a blast hole was charged with explosives and live primers were
inserted
Critical flow – towards a construction flow theory
This paper introduces the concept of Construction Physics as a more comprehensive way of understanding the construction process from a flow perspective. It establishes a preliminary definition of the term and investigates briefly the present knowledge, flow models and methods for their management. From this it argues that the state of the art does not fully cover the whole process and proposes a holistic view of the flow of all prerequisites feeding the process. It introduces the key term Critical Flow and concludes by recommending areas that should be investigated as a joint IGLC research, development and testing programme
- …