Make link between chemical composition and sensory analysis

Assignment Help Computer Networking
Reference no: EM13332817

Today's customer has a wide variety of options regarding what he or she drinks. A drinker's choice depends on various factors, including mood, venue, and occasion. Coors' goal is to ensure that the customer chooses Coors brands no matter what the circumstances are.

According to Coors, creativity is the key to long-term success. To be the customer's choice brand, Coors needs to be creative and anticipate the customer's ever so rapidly changing moods. An important issue with beers is flavor; each beer has a distinctive flavor. These flavors are mostly determined through panel tests. However, such tests take time. If Coors could understand the beer flavor based solely on its chemical composition, it would open up new avenues to create beer that would suit customer expectations.

The relationship between chemical analysis and beer flavor is not clearly understood yet. Substantial data exist on the chemical composition of a beer and sensory analysis. Coors needed a mechanism to link those two together. Neural networks were applied to create the link between chemical composition and sensory analysis.

Over the years, Coors Brewers Ltd. Has accumulated a significant amount of data related to the final product analysis, which has been supplemented by sensory data provided by the trained in-house testing panel. Some of the analytical inputs and sensory outputs are shown in the following table:

Analytical Data: Inputs Sensory Data: Outputs
Alcohol Alcohol
Color Estery
Calculated bitterness Malty
Ethyl acetate Grainy
Isobutyl acetate Burnt
Ethyl butyrate Hoppy
Isoamyl acetate Toffee
Ethyl hexanoate Sweet

A single neural network, restricted to a single quality and flavor, was first used to model the relationship between the analytical and sensory data. The neural network was based on a package solution supplied by NeuroDimension,Inc. The neural network consisted of an MLP architecture with two hidden layers. Data were normalized within the network, thereby enabling comparison between the results for the various sensory outputs. The neural network was trained (to learn the relationship between inputs and outputs) through the presentation of many combinations of relevant input/output combinations. When there was no observed improvement in the network error in the last 100 epochs, training was automatically terminated. Training was carried out 50 times to ensure that a considerable mean network error could be calculated for comparison purposes. Prior to each training run, a different training and cross-validation dataset was presented by randomizing the source data records, thereby removing any bias.

This technique produced poor results, due to two major factors. First, concentrating on a single product's quality meant that the variation in the data was pretty low. The neural network could not extract useful relationships from the data. Second, it was probable that only one subset of the provided inputs would have an impact on the selected beer flavor. Performance of the neural network was affected by "noise" created by inputs that had no impact on flavor.

A more diverse product range was included in the training range to address the first factor. It was more challenging to identify the most important analytical inputs. This challenge was addressed by using a software switch that enabled the neural network to be trained on all possible combinations of inputs. The switch was not used to disable a significant input; if the significant input were disabled, we could expect the network error to increase. If the disabled input was insignificant, then the network error would either remain unchanged or be reduced due to the removal of noise. This approach is called an exhaustive search because all possible combinations are evaluated. The technique, although conceptually simple, was computationally impractical with the numerous inputs; the number of possible combinations was 16.7 million per flavor.

A more efficient method of searching for the relevant inputs was required. A genetic algorithm was the solution to the problem. A genetic algorithm was able to manipulate the different input switches in response to the error term from the neural network. The objective of the genetic algorithm was to minimize the network error term.

When this minimum was reached, the switch settings would identify the analytical inputs that were most likely to predict the flavor.

Reference no: EM13332817

Questions Cloud

Smaller meaningful pieces : Compare the 1st person singular and plural ("I" and "we") with the 2nd person singular and plural, "you (sg)" and you (PL)". can you divide any of these four forms into smaller meaningful pieces?
How much heat must be applied to a 18.3 g sample of iron : How much heat must be applied to a 18.3 g sample of iron (s=0.449J/(g x *C) in order to raise its temperature from 23.8*C to 356.6*C
How much weight does the other end bear : a crowbar is used to lift a weight. If a down ward force of 224 N is applied to the end of the bar, how much weight does the other end bear
Determine what is the projects average accounting return : You're trying to determine whether to expand your business by building a new manufacturing plant. The plant has an installation cost of $13.0 million, which will be depreciated straight-line to zero over its four-year life.
Make link between chemical composition and sensory analysis : Today's customer has a wide variety of options regarding what he or she drinks. A drinker's choice depends on various factors, including mood, venue, and occasion. Coors' goal is to ensure that the customer chooses Coors brands no matter what the ..
Describe how bridge translates between two segment types : Describe advantages of VLAN trunking. Describe a distance-vector routing protocol suited to WANs. Explain hybrid routing protocols. Describe an example. Describe how a bridge translates between two segment types.
Determine the angular velocity of the weather vane : A weather vane initially at rest has a moment of inertia of 0.110 kg · m2 about its axis of rotation. Find the angular velocity of the weather vane just after it is struck
Explain what happens to the ph when the buffer contains : What happens to the pH when the buffer contains more of the weak acid than the conjugate base. More of the conjugate base than the weak acid
How many shares of millers stock must sell to offset : Miller's has decided to add leverage to its financial operations by issuing $250,000 of debt at 8 percent interest. The debt will be used to repurchase shares of stock. You own 400 shares of Miller's stock.

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

  Develop a simple backbone and determine the total cost

Develop a simple backbone and determine the total cost (i.e., select the backbone technology and price it, select the cabling and price it.

  High-performance network

A company is interested in upgrading its current core infrastructure, which comprises 2 100mbps switches which connect to a utility room that houses 8 100mbps switches wired with Ethernet Category 5 that run to each client machines.

  Plan for the development of an addressing and naming model

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Maintaining list of bad public-key certificates

Assuming that it is possible to protect the repository from attack, what are the disadvantages of this approach?

  Explain how gossiping can help to find those nodes

When searching for files in an unstructured peer- to-peer system, it may help to restrict the search to nodes that have files similar to yours. Explain how gossiping can help to find those nodes.

  List possible ways to interconnect three computers

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  Create a domain local group

Create a domain local group, a global group, and make the global group a member of the domain local group.

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd