What factors appear to be influential

Assignment Help Basic Computer Science
Reference no: EM131251515

Carbon anodes used in a smelting process are baked in a ring furnace. An experiment is run in the furnace to determine which factors influence the weight of packing material that is stuck to the anodes after baking. Six variables are of interest, each at two levels: A = pitch/fines ratio (0.45, 0.55), B = packing material type (1, 2), C = packing material temperature (ambient, 325°C), D = flue location (inside, outside), E = pit temperature (ambient, 195°C), and F = delay time before packing (zero, 24 hours). A 263 design is run, and three replicates are obtained at each of the design points. The weight of packing material stuck to the anodes is measured in grams. The data in run order are as follows: abd = (984, 826, 936); abcdef = (1275, 976, 1457); be = (1217, 1201, 890); af = (1474, 1164, 1541); def = (1320, 1156, 913); cd = (765, 705, 821); ace = (1338, 1254, 1294); and bcf = (1325, 1299, 1253). We wish to minimize the amount of stuck packing material.

(a) Verify that the eight runs correspond to a design. What is the alias structure?

(b) Use the average weight as a response. What factors appear to be influential?

(c) Use the range of the weights as a response. What factors appear to be influential?

(d) What recommendations would you make to the process engineers?

Reference no: EM131251515

Questions Cloud

What are the advantages for students : What are the advantages for students with and without disabilities and what are the disadvantages for students with and without disabilities?
What the company must do to perform successfully : Identify company strengths and weaknesses. Discuss success factors and what the company must do to perform successfully in the industry? Discuss what strategies would allow the company to capitalize on its major strengths.
Distributed random variables with the same mean : If all of the service times are independent exponentially distributed random variables with the same mean 1= , what is the probability that Naomi is still in the post office after the other two have left?
Calculate the players best response functions : Given p and t, calculate the players' best-response functions and the Nash equilibrium of the effort-selection subgame.
What factors appear to be influential : Verify that the eight runs correspond to a design. What is the alias structure?
Choice of hamburger or a veggie burger : A fast food chain offers a special menu for children for which there is a choice of hamburger or a veggie burger or chicken sandwich with either French fries or salad plus one of four beverages. how many special menu possibilities are there?
Analysis of an individual comic strip or political cartoon : Choose two political cartoons or comic strips created by the same person. Which techniques does the creator of the political cartoons use? How does the creator make his/her point in the political cartoons?
Functions to encode the categorical attribute values : Implement specific MATLAB functions to encode the categorical attribute values to numeric values. For example, column 1 consists of only categorical values "a" and "b", and so they can be encoded as "1" and "2" respectively. The function source co..
Mean height for the sample : The probability that the mean height for the sample is greater than 64inches is_______.(Round to four decimal places as needed.)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a video on how wireless attacks are conducted

Find a video on how wireless attacks are conducted. Summarize the video in your own words, and discuss why an investigator should care about this information. Include the link to the video.

  Prompt the user to enter a string

Prompt the user to enter a string, and using a loop, count and output the number of vowels, and consonants the string contains. (find methods from class Character to help you.)

  The security administrator of a major organization

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and ..

  Explain the difference between choosing four disjoint

Explain the difference between choosing four disjoint three-element sets from a twelve-element set and labelling a twelve-element set with three labels of type 1, three labels of type two, three labels of type 3, and three labels of type 4. How many ..

  How is this different from what jpeg does

Now modify your program so that it zeroes some of the higher-frequency components and see how the output image is affected. How is this different from what JPEG does?

  Sales representative at the local fitness center

You are a sales representative at the local fitness center health & fitness gym. Your manager expects each representative to track weekly new membership data so you create a spreadsheet to store data.

  Why is the pcm sampling time

Radio Antennas work best when the diameter of the antenna is equal to the wave length of the radio wave. Reasonable antennas range from 1 cm to 5 meters in diameter. What frequency range does this cover?

  Useful to use vpn for an organization

Provide a brief comparison of VPN Protocols, outlining the advantages and disadvantages of each. Provide a scenario where it might be useful to use VPN for an organization.

  How many different customers have ordered products

How many different customers have ordered products in each category? Two columns, categoryname and count of distinct customers. Make sure to include EVERY category.

  Design a database for an airline

Your design should include an E-R diagram, a set of relational schemas, and a list of constraints, including primary-key and foreign-key constraints.

  Relevance of data-driven decision making

Establish the relevance of data-driven decision making, preferably with examples from your work experience. However, you may also quote examples from other organisation. THe objective is to underline the importance of such style of decision making..

  Might limit the effectiveness of storage protection

Describe residual data and how it might limit the effectiveness of storage protection/encryption approaches.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd