Make link between chemical composition and sensory analysis

Assignment Help Computer Networking
Reference no: EM13332817

Today's customer has a wide variety of options regarding what he or she drinks. A drinker's choice depends on various factors, including mood, venue, and occasion. Coors' goal is to ensure that the customer chooses Coors brands no matter what the circumstances are.

According to Coors, creativity is the key to long-term success. To be the customer's choice brand, Coors needs to be creative and anticipate the customer's ever so rapidly changing moods. An important issue with beers is flavor; each beer has a distinctive flavor. These flavors are mostly determined through panel tests. However, such tests take time. If Coors could understand the beer flavor based solely on its chemical composition, it would open up new avenues to create beer that would suit customer expectations.

The relationship between chemical analysis and beer flavor is not clearly understood yet. Substantial data exist on the chemical composition of a beer and sensory analysis. Coors needed a mechanism to link those two together. Neural networks were applied to create the link between chemical composition and sensory analysis.

Over the years, Coors Brewers Ltd. Has accumulated a significant amount of data related to the final product analysis, which has been supplemented by sensory data provided by the trained in-house testing panel. Some of the analytical inputs and sensory outputs are shown in the following table:

Analytical Data: Inputs Sensory Data: Outputs
Alcohol Alcohol
Color Estery
Calculated bitterness Malty
Ethyl acetate Grainy
Isobutyl acetate Burnt
Ethyl butyrate Hoppy
Isoamyl acetate Toffee
Ethyl hexanoate Sweet

A single neural network, restricted to a single quality and flavor, was first used to model the relationship between the analytical and sensory data. The neural network was based on a package solution supplied by NeuroDimension,Inc. The neural network consisted of an MLP architecture with two hidden layers. Data were normalized within the network, thereby enabling comparison between the results for the various sensory outputs. The neural network was trained (to learn the relationship between inputs and outputs) through the presentation of many combinations of relevant input/output combinations. When there was no observed improvement in the network error in the last 100 epochs, training was automatically terminated. Training was carried out 50 times to ensure that a considerable mean network error could be calculated for comparison purposes. Prior to each training run, a different training and cross-validation dataset was presented by randomizing the source data records, thereby removing any bias.

This technique produced poor results, due to two major factors. First, concentrating on a single product's quality meant that the variation in the data was pretty low. The neural network could not extract useful relationships from the data. Second, it was probable that only one subset of the provided inputs would have an impact on the selected beer flavor. Performance of the neural network was affected by "noise" created by inputs that had no impact on flavor.

A more diverse product range was included in the training range to address the first factor. It was more challenging to identify the most important analytical inputs. This challenge was addressed by using a software switch that enabled the neural network to be trained on all possible combinations of inputs. The switch was not used to disable a significant input; if the significant input were disabled, we could expect the network error to increase. If the disabled input was insignificant, then the network error would either remain unchanged or be reduced due to the removal of noise. This approach is called an exhaustive search because all possible combinations are evaluated. The technique, although conceptually simple, was computationally impractical with the numerous inputs; the number of possible combinations was 16.7 million per flavor.

A more efficient method of searching for the relevant inputs was required. A genetic algorithm was the solution to the problem. A genetic algorithm was able to manipulate the different input switches in response to the error term from the neural network. The objective of the genetic algorithm was to minimize the network error term.

When this minimum was reached, the switch settings would identify the analytical inputs that were most likely to predict the flavor.

Reference no: EM13332817

Questions Cloud

Smaller meaningful pieces : Compare the 1st person singular and plural ("I" and "we") with the 2nd person singular and plural, "you (sg)" and you (PL)". can you divide any of these four forms into smaller meaningful pieces?
How much heat must be applied to a 18.3 g sample of iron : How much heat must be applied to a 18.3 g sample of iron (s=0.449J/(g x *C) in order to raise its temperature from 23.8*C to 356.6*C
How much weight does the other end bear : a crowbar is used to lift a weight. If a down ward force of 224 N is applied to the end of the bar, how much weight does the other end bear
Determine what is the projects average accounting return : You're trying to determine whether to expand your business by building a new manufacturing plant. The plant has an installation cost of $13.0 million, which will be depreciated straight-line to zero over its four-year life.
Make link between chemical composition and sensory analysis : Today's customer has a wide variety of options regarding what he or she drinks. A drinker's choice depends on various factors, including mood, venue, and occasion. Coors' goal is to ensure that the customer chooses Coors brands no matter what the ..
Describe how bridge translates between two segment types : Describe advantages of VLAN trunking. Describe a distance-vector routing protocol suited to WANs. Explain hybrid routing protocols. Describe an example. Describe how a bridge translates between two segment types.
Determine the angular velocity of the weather vane : A weather vane initially at rest has a moment of inertia of 0.110 kg · m2 about its axis of rotation. Find the angular velocity of the weather vane just after it is struck
Explain what happens to the ph when the buffer contains : What happens to the pH when the buffer contains more of the weak acid than the conjugate base. More of the conjugate base than the weak acid
How many shares of millers stock must sell to offset : Miller's has decided to add leverage to its financial operations by issuing $250,000 of debt at 8 percent interest. The debt will be used to repurchase shares of stock. You own 400 shares of Miller's stock.

Reviews

Write a Review

Computer Networking Questions & Answers

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Maintaining list of bad public-key certificates

Assuming that it is possible to protect the repository from attack, what are the disadvantages of this approach?

  Find round-trip delay due-speed of light equal transmission

At what data rate does round-trip delay due to speed of light equal transmission delay for 1-KB packet? Suppose speed of light in fibre to be 2/3 speed of light in vacuum.

  Determine size of address block to request from isp

Determine size of address block must you request from your ISP? How many class C equivalent addresses would you require? How many subnets would you have left over from your allocation?

  How many addresses are left

An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

  Recognizing the malicious activity

What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities.

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Technology to internetwork the two buildings

Suppose you are working for a small business that has outgrown its existing building. What technology will you recommend to internetwork the two buildings?

  Explore ways to secure a wireless network

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  Describe different networks which you access average day

Describe at least three different networks (computer or data communications) which you access or interact with on an average day.

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd