Injection Molding (IM) is considered to be the most important process for mass-producing plastic products. One of the biggest challenges facing injection molders is to determine the best settings for the controllable ...
详细信息
ISBN:
(纸本)1887706372
Injection Molding (IM) is considered to be the most important process for mass-producing plastic products. One of the biggest challenges facing injection molders is to determine the best settings for the controllable process variables (CPVs). Selecting the proper settings is crucial because the behavior of the polymeric material during shaping is highly influenced by the process variables. The difficulty of optimizing an IM process is that the performance measures (PMs), such as surface quality or cycle time that characterize the adequacy of the part for its intended purpose usually show conflicting behavior. Furthermore, in actual molding, the CPVs will vary over some range during molding. This inconsistency of the process variables will lead to variability in the PMs. In high precision manufacturing, in particular for micro and nano scale components and devices, this variability needs to be minimized, and if possible eliminated. Thus, the variability in the PMs needs to be included in the optimization problem. The aim of this work is to demonstrate a method based on CAE, statistical testing, artificial neural networks (ANNs), and data envelopment analysis (DEA) to find the optimal compromises between multiple PMs and their variability to prescribe the values for the CPVs in IM. We present an example where the optimization is carried out in two phases. Phase one uses the PMs that are significantly affected by the injection gate location in order to prescribe two possible injection gates. Phase two of the optimization uses Data Envelopment Analysis (DEA) to find a PM-based efficient frontier for each injection gate considering process variability. These two efficient frontiers are then compared to select the best location. Other possible applications are discussed.
The National Geospatial-Intelligence Agency (NGA) has implemented an integrated facilities' managementprogram covering its many buildings, operations, and site locations. In conjunction with organizational struct...
详细信息
This paper provides a comprehensive analysis of the reengineering of legacy systems. Based upon a review of the literature, five legacy system characteristics are defined and four goals for a reengineering project are...
详细信息
ISBN:
(纸本)9781932415506
This paper provides a comprehensive analysis of the reengineering of legacy systems. Based upon a review of the literature, five legacy system characteristics are defined and four goals for a reengineering project are developed. The decision to reengineer a legacy system is generally based upon a desire to: re-align the information system(s) with the organization's business processes;improve technology;and reduce maintenance costs. While each of the factors is a desirable objective, individually they are not sufficient to initiate and maintain a reengineering project over time. To be successful, a reengineering project must satisfy four reengineering goals: (1) a fully, accurately documented system;(2) a flexible implementation, able to incorporate new or changing requirements;(3) alignment with the organization's business objectives and processes;and (4) a cost-effective maintenance program. This paper proposes that there are a number of essentials steps that must be completed in order to conduct a successful reengineering project.
Nyberg and Ruppel first proposed a signature scheme with message recovery based on DSA in 1993, and the authenticated encryption scheme is a special application of their scheme. Afterward, there are many papers propos...
详细信息
Nyberg and Ruppel first proposed a signature scheme with message recovery based on DSA in 1993, and the authenticated encryption scheme is a special application of their scheme. Afterward, there are many papers proposed about the authenticated encryption schemes. The signature scheme can reduce the transmitted cost, because the message has been contained in the signature of the message and the signer does not necessary to send the receiver the message and the signature. The scheme is very suitable for the key agreement application, because a key is a small amount of a message. In order to comprehend and interpret the authenticated encryption schemes overall, we discuss the evolution and the existed problems of authenticated encryption schemes.
This paper describes the development and growth of an innovative new program that is a synergistic combination of Florida Tech's technology commercialization-related course offerings in engineeringmanagement, its...
详细信息
This paper describes the development and growth of an innovative new program that is a synergistic combination of Florida Tech's technology commercialization-related course offerings in engineeringmanagement, its Senior Design course curriculum, and its new business accelerator, Florida TechStart. The program is designed for the subset of senior design course students who desire to leverage their design course experience by commercializing their innovative products and technologies and creating start-up companies. Florida Tech's engineeringmanagement curriculum offers innovative courses in technical marketing, high tech product strategy, fast cycle time product development & launch, and engineering entrepreneurship. In these case study courses, students develop real world marketing and business plans for commercializing innovative new products and technologies. Some of the innovative product development and technology commercialization ideas have won accolades at regional business idea pitching competitions. All students in the Florida Tech College of engineering must participate in a senior design program. The intensive undergraduateengineeringprograms at the university have resulted in a number of outstanding crossfunctional Senior Design Projects. The Senior Design program is highly coordinated across all the engineeringdepartments and structured for improved quality and effectiveness. There is a growing interest by teams in commercializing the project results. Florida TechStart is a business accelerator for high-tech ventures, and provides a networking forum for inventors, corporate sponsors, investors and business service providers. It is designed to facilitate the creation of start-up, technology-based, revenue generating ventures. The paper will explain the relevant operations of each of these entities and how they work closely together to the advantage of their student constituents. It will also provide an update on our current project pipeline.
ABET program criteria for industrial engineering require programs to demonstrate that "graduates have the ability to design, develop, implement, and improve integrated systems that include people, materials, info...
详细信息
ABET program criteria for industrial engineering require programs to demonstrate that "graduates have the ability to design, develop, implement, and improve integrated systems that include people, materials, information, equipment, and energy" and to include "in-depth instruction to accomplish the integration of systems using appropriate analytical, computational, and experimental practices." Faculty in the industrial engineeringprogram at Tennessee Technological University have developed an integrated junior-year curriculum supported by an Integrated systems Laboratory and related projects. The projects provide opportunities for students to apply their newly acquired tools in an integrated setting prior to enrolling in the capstone course. Project requirements can include work measurement, work design and ergonomics, engineering economics, simulation, statistical analysis and experimental design, project management, and technical communication. In addition to a description of the laboratory and projects, the rationale and a description of the curriculum is presented. Also included is a preliminary analysis of the impact of this approach on student learning.
Purpose - Unstructured knowledge management (UKM) becomes indispensable for the support of knowledge work. However, unstructured knowledge is inconvenient and difficult for sharing, organizing and acquisition. This pa...
详细信息
This paper deals with the bias corrections of two types of information criteria for selecting multivariate linear regression models in a general nonnormal case. One type is the AIC-type criterion and the other is the ...
详细信息
Time-critical jobs in many real-time applications have multiple feasible intervals. Such a job is constrained to execute from start to completion in one of its feasible intervals. A job fails if the job remains incomp...
详细信息
This paper presents the initial phase of a study to identify the desired characteristics of an undergraduate Industrial Engineer, and the emerging topic areas that should be incorporated into the reengineered curricul...
详细信息
This paper presents the initial phase of a study to identify the desired characteristics of an undergraduate Industrial Engineer, and the emerging topic areas that should be incorporated into the reengineered curriculum so that the curriculum evolves as the emerging topics emerge. A survey was delivered to faculty and industry professionals across the U.S. to understand the desired characteristics and the important emerging topic areas. The modified Delphi technique was applied to gain consensus and ranking of the emerging topics. Three rounds will be performed to identify the emerging topic areas, assign emerging topic importance, and eventually obtain consensus and ranking on the emerging topics. The research findings are discussed that identify the desired characteristics, and the most important emerging topics to be incorporated into the reengineered curriculum.
暂无评论