scholarly journals Ensuring reliable operation and efficient service of heading and winning machines for potash ore extraction

2020 ◽  
Vol 7 (7) ◽  
pp. 103-109
Author(s):  
Dmitrii I. Shishliannikov ◽  

Introduction. The article considers the organization of heading and winning machines’ maintenance in the mines of the Upper Kama potash salt deposit highlighting the potential of maintenance and repair according to the actual health of mining machines. Research methodology. The methodological foundations are presented of collecting and processing the data on Ural heading and winning machines failure statistics in the Upper Kama potash salt deposit. It is indicated that monitoring systems implemented in mining machine since 2013 made it possible to quickly track and record data on operating modes and downtime causes. Results. Research revealed that the greatest number of Ural heading and winning machines emergency failures is due to mining technology violation, as well as untimely or poor quality repairs. Breakdowns of swing and distributing reduction gears of planetary actuators, reduction gears of berm bodies and hydraulic systems units are most common. Ural mining machines’ repair cycle is presented. Even complex current and overhauls of heading and winning machines are often carried out by miners who directly operate the machines. Summary. Statistical data storage on failures and corresponding diagnostic parameters limit of heading and winning machines makes it possible to predict the time of equipment failure with a high degree of probability. The more standardized the potash mining machine operation and repair conditions are, the more accurate the remaining life forecast of the residual resource is.

2014 ◽  
Vol 14 (1) ◽  
pp. 351
Author(s):  
Jennifer Martínez Ferrero ◽  
Beatriz Cuadrado Ballesteros ◽  
Marco Antonio Figueiredo Milani Filho

<p>According to Dechow and Dichev (2002) and Lin and Wu (2014), a high degree of earnings management (EM) is associated with a poor quality of information. In this sense, it is possible to assume that the financial data of companies that manage earnings can present different patterns from those with low degree of EM. The aim of this exploratory study is to test whether a financial data set (operating expenses) of companies with high degree of EM presents bias. For this analysis, we used the model of Kothari and the modified model of Jones (“Dechow model” hereafter) to estimate the degree of EM, and we used the logarithmic distribution of data predicted by the Benford’s Law to detect abnormal patterns of digits in number sets. The sample was composed of 845 international listed non-financial companies for the year 2010. To analyze the discrepancies between the actual and expected frequencies of the significant-digit, two statistics were calculated: Z-test and Pearson’s chi-square test. The results show that, with a confidence level of 90%, the companies with a high degree of EM according to the Kothari model presented similar distribution to that one predicted by the Benford’s Law, suggesting that, in a preliminary analysis, their financial data are free from bias. On the other hand, the data set of the organizations that manage earnings according to the Dechow model presented abnormal patterns. The Benford´s Law has been implemented to successfully detect manipulated data. These results offer insights into the interactions between EM and patterns of financial data, and stimulate new comparative studies about the accuracy of models to estimate EM.</p><p>Keywords:<strong> </strong>Earnings management (EM). Financial Reporting Quality (FRQ). Benford’s Law.</p>


Author(s):  
Brian A. Polin ◽  
Marvin D. Troutt ◽  
William Acar

We review the evolving literature on globalization with three aims in mind. First, we introduce the concept of globalization within the context of supply chain management. Second, with an eye toward information that may be useful for supply chain planners, we detail the motivation for global integration of the supply chain. Our third aim is to address global supply-chain issues that may be at odds with cost-minimizing strategies. Specifically, in this time of political debate regarding trade legislation, these issues involve the consideration of country of origin when sourcing, and the disparate demands of customers when marketing. A country offering inexpensive components may be associated with poor quality. Thus, despite inexpensive inputs, the overall profitability of the supply chain may suffer as perceived quality deteriorates. Similarly, a largely standardized product across multiple markets may present the lowest cost alternative from a production standpoint, but a high degree of standardization may reduce the attractiveness of the product in the eyes of the end consumer, and reduce overall profitability.


Author(s):  
Sasikala Chinthakunta ◽  
Shoba Bindu Chigarapalle ◽  
Sudheer Kumar E.

Typically, the analysis of the industrial big data is done at the cloud. If the technology of IIoT is relying on cloud, data from the billions of internet-connected devices are voluminous and demand to be processed within the cloud DCs. Most of the IoT infrastructures—smart driving and car parking systems, smart vehicular traffic management systems, and smart grids—are observed to demand low-latency, real-time services from the service providers. Since cloud includes data storage, processing, and computation only within DCs, huge data traffic generated from the IoT devices probably experience a network bottleneck, high service latency, and poor quality of service (QoS). Hence, the placement of an intermediary node that can perform tasks efficiently and effectively is an unavoidable requirement of IIoT. Fog can be such an intermediary node because of its ability and location to perform tasks at the premise of an industry in a timely manner. This chapter discusses challenges, need, and framework of fog computing, security issues, and solutions of fog computing for IIoT.


Author(s):  
Milos Vukovic ◽  
Sebastian Sgro ◽  
Hubertus Murrenhoff

In recent years, research institutions worldwide have developed a number of new mobile hydraulic systems. Despite their improved energy efficiency, these systems have yet to gain market acceptance due to their related increase in component costs and decrease in robustness. At the Institute for Fluid Power Drives and Controls in Aachen, a new system for mobile machines, named STEAM (Steigerung der Energieeffizienz in der Arbeitshydraulik mobiler Arbeitsmaschinen), is being developed using inexpensive off-the-shelf components. The aim is to improve the total system efficiency by considering all the subsystems in the machine. This is done by integrating the internal combustion engine (ICE) into the hydraulic design process. By using a constant pressure system in combination with a low-cost fixed displacement pump the hydraulic system is designed to ensure the ICE experiences a constantly high load in a region of high efficiency, so-called point operation. To decrease the hydraulic losses incurred when supplying the linear actuators with flow, an additional intermediate pressure rail with independent metering edges is used. This enables various energy efficient discrete operating modes, including energy regeneration and recuperation.


2013 ◽  
Vol 49 (6) ◽  
pp. 902-907 ◽  
Author(s):  
I. A. Sanfirov ◽  
Yu. I. Stepanov ◽  
K. B. Fat’kin ◽  
I. Yu. Gerasimova ◽  
A. I. Nikiforova

2019 ◽  
Vol 29 (4) ◽  
pp. 465-481
Author(s):  
Ivan Trofimov ◽  
Leonid Trofimov ◽  
Sergei Podkovalnikov ◽  
Lyudmila Chudinova ◽  
Lev Belyaev ◽  
...  

The paper describes the software tool implemented by Melentiev Energy Systems Institute SB RAS, aimed to solve wide range of energy issues. In this article, the Computing and Information System (CIS) means a software tool that provides collection, transfer, processing, storage, geo-visualization, and output of digital technical and economic data of different energy/power entities. Besides, this tool is incorporated within a mathematical model for optimization of expansion and operating modes of power systems. The paper discusses the example of how data storage and data representation in object-oriented database assist to improve efficiency of research prospective electric power systems expansion and operation.


Author(s):  
Eric Duviella ◽  
Pascale Chiron ◽  
Philippe Charbonnaud

The Hybrid Control Accommodation (HCA) strategy was proposed to improve the water-asset management of hydraulic systems by resource allocation and setpoint assignment. Hydraulic system dynamics are taken into account during the setpoint assignment step which consists in controlling gates for large operating conditions. For hydraulic systems subjected to strong disturbances, transfer delays are variable, thus different operating modes must be considered. A multimodelling method, associated to a selection technique of transfer delay, allowing for the determination of the number of models, is proposed. The simulation results on the first reach of the Neste canal show the effectiveness of the HCA strategy.


Dependability ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 18-23 ◽  
Author(s):  
I. V. Gadoiina ◽  
P. A. Pobegayio ◽  
D. Yu. Kritsky ◽  
L. Papić

The existence of humankind on Earth largely depends on the energy at its disposal. It is mostly generated by processing minerals extracted from the Earth’s crust by open-cut mining. The quality and low cost of extraction are largely defined by the dependability of employed machines and mechanisms, plants and process engineering solutions. Various types of excavators are the backbone of a mining machine fleet. Their parts that principally interact with the environment (rock) are components of implements, i.e. primarily the buckets and components of bucket(s). It must be noted that in the process of interaction with the environment (rock) the excavator implements and their components are exposed to so-called abrasive wear. Since abrasive wear of implement components (most frequently excavator bucket teeth) causes their recurrent replacement, this inevitably affects the performance of the excavator as a whole and those process flows it is part of. Occasional interruptions of operation and repairs reduce the availability factor, the most important complex indicator of equipment dependability. Given the above, the aim of this paper is to refine the previously known formula proposed more than thirty years ago in VNIISDM (Reysh A.K.) for evaluation of the rate of abrasive wear of excavator bucket teeth. For the first time, with a sufficient accuracy we examined the multitude of operating modes of mining equipment, i.e. operation of excavators in various conditions, e.g. on different soils. Additionally, we extended Reysh’s approach from single-bucket machines to continuous operation multi-bucket ones. For that purpose, the authors used a method of data integration from known sources, method of full-scale experiment under the operating conditions of a specific excavator and method of mathematical simulation (a form of the Monte Carlo method). All of that allowed revising the values of the parameters in the Reysh formula. The refined formula that we obtained can now be used for the dependability evaluation of machines operating under varying conditions, as well as for the purpose of appointing the time of preventive inspections.


2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Jonathan Ullman ◽  
Lars Vilhuber

Differential privacy is a promising approach to privacy-preserving data analysis that provides strong worst-case guarantees about the harm that a user could suffer from contributing their data, but is also flexible enough to allow for a wide variety of data analyses to be performed with a high degree of utility. Researchers in differential privacy span many distinct research communities, including algorithms, computer security, cryptography, databases, data mining, machine learning, statistics, programming languages, social sciences, and law. Two articles in this issue describe applications of differentially private, or nearly differentially private, algorithms to data from the U.S. Census Bureau. A  third article highlights a thorny issue that applies to all implementations of differential privacy: how to choose the key privacy parameter ε, This special issue also includes selected contributions from the 3rd Workshop on Theory and Practice of Differential Privacy, which was held in Dallas, TX on October 30, 2017 as part of the ACM Conference on Computer Security (CCS).


Sign in / Sign up

Export Citation Format

Share Document