SUMMARY Quality and reliability are two important factors in manufacturing-system design. However, the analysis and optimization of manufacturing-system reliability and product quality are normally conducted separately in practice. There is no general framework to integrate these two important factors, quantitatively analyze the interactions between them,… (More)
High performance computing (HPC) has crossed the Petaflop mark and is reaching the Exaflop range quickly. The exascale system is projected to have millions of nodes, with thousands of cores for each node. At such an extreme scale, the substantial amount of concurrency can cause a critical contention issue for I/O system. The contention can destroy the… (More)
This paper presents a new approach for tele-fabrication where a physical object is scanned in one location and fabricated in another location. This approach integrates three-dimensional (3D) scanning, geometric processing of scanned data, and additive manufacturing technologies. In this paper, we focus on a set of direct geometric processing techniques that… (More)
Recommended Citation Hosseini, Rahilsadat. "Wastewater's total influent estimation and performance modeling: a data driven approach.
In this paper, we described a project on the use of Virtual Reality Continuum (VRC) technology for cultural heritage application. Haw Par Villa, a local heritage in Singapore, was selected to demonstrate the entire process of VRC enhanced digitization from laser scanning to 3D mapping to 3D prototyping. In particular, we presented with an example of Sumo to… (More)
A simulation study of predictive maintenance policies and how they impact manufacturing systems." MS
Binary tree classification has been useful for classifying the whole population based on the levels of outcome variable that is associated with chosen predictors. Often we start a classification with a large number of candidate predictors, and each predictor takes a number of different cutoff values. Because of these types of multiplicity, binary tree… (More)
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have identified diverse… (More)