195,562 Hits in 7.5 sec

3268 Computer aided operation planning for an actual machine tool based on updatable machining database and database oriented planning algorithm

Shinji IGARI, Fumiki TANAKA, Masahiko ONOSATO
2011 Proceedings of International Conference on Leading Edge Manufacturing in 21st century LEM21  
In this paper, a method to update a machining database from NC data is proposed. The database is updated by adding machining information extracted from NC data based on tool path analysis.  ...  To generate optimal machining information, a machining database and operation planning algorithm have to be customized for an actual machine tool based on knowledge of a skilled planner.  ...  Acknowledgement This work was supported in part by the Global COE Program's "Center for Next-Generation Information Technology based on Knowledge Discovery and Knowledge Federation," MEXT, Japan.  ... 
doi:10.1299/jsmelem.2011.6._3268-1_ fatcat:dlxd5q3ah5fdfle2l2wilhkhdi

Customization of a Micro Process Planning System for an Actual Machine Tool based on Updating a Machining Database and Generating a Database-Oriented Planning Algorithm

Shinji Igari, Fumiki Tanaka, Masahiko Onosato
2013 Transactions of the Institute of Systems Control and Information Engineers  
A machining database is updated based on analyzing NC data that are adaptively generated for an actual machine tool by skilled process planners.  ...  From the updated machining database, a database-oriented micro process planning algorithm is generated by a decision tree and a regression tree.  ...  Acknowledgements This work was supported by the Machine Tool Engineering Foundation, Japan.  ... 
doi:10.5687/iscie.26.87 fatcat:u2r47gribvazleymnnjrcinxsm

Analysis of ISO 6983 NC Data Based on ISO 14649 CNC Data Model

Hiroshi Yamada, Fumiki Tanaka, Masahiko Onosato
2006 2006 SICE-ICASE International Joint Conference  
Retaining technical information is an important element for performing high quality machining.  ...  In this research, for obtaining technical information, NC data are analyzed based on a next-generation CNC control language (ISO 14649) which contains technical information explicitly.  ...  Data analysis example for slot, round hole, and closed pocket feature Figure 2 . 2 Procedure of analysis based on ISO 14649 Figure 3 . 3 Generating machining feature from Bounded tool path Figure 4  ... 
doi:10.1109/sice.2006.315043 fatcat:ptcmw4oty5ccxgsanmmnotupu4

[Dedicated to Prof. T. Okada and Prof. T. Nishioka: data science in chemistry]Visualizing Individual and Region-specific Microbial–metabolite Relations by Important Variable Selection Using Machine Learning Approaches

Satoshi Tsutsui, Yasuhiro Date, Jun Kikuchi
2017 Journal of Computer Aided Chemistry  
This analytical strategy promises a versatile and useful approach for big data analyses in various fields of science.  ...  To this end, metabolic profiles of human sweats were characterized via multiple NMR spectra, followed by an advanced analytical strategy based on data-driven and machine learning approaches.  ...  This research was supported in part by a Grant-in-Aid for Scientific Research (to J.K.). The authors would like to thank Enago ( for the English language review.  ... 
doi:10.2751/jcac.18.31 fatcat:biptcb7q4bhgdeiyd4pibdnnru

Image retrieval techniques: a survey

Aman Dureja, Payal Pahwa
2017 International Journal of Engineering & Technology  
There are several different areas in which image retrieval plays a crucial role like Medical systems, Forensic Labs, Tourism Promotion, etc. Thus retrieval of similar images is a challenge.  ...  retrieval of images from the large databases.  ...  In the present a very long time there have been made critical headways in machine learning strategies and profound Learning which is the subset of machine learning is an essential come-through system that  ... 
doi:10.14419/ijet.v7i1.2.9231 fatcat:j4yryzx6v5b5lipct7rphizbte

Basic Approaches Of Development Of Data Center Protection Systems
Базові підходи розвитку систем захисту центру центру обробки даних

A. V. Kropachev, Bell Integrator USA Automation Solution Department Manager USA, Colorado, D. O. Zuev, Independent Consultant Lead Arcitect, Network and Cloud USA, Colorado
2018 Naukovì dopovìdì Nacìonalʹnogo unìversitetu bìoresursiv ì prirodokoristuvannâ Ukraïni  
Specifically detection strategy based classification which includes cyberattack signatures analysis, anomalies analysis, hybrid strategy, detection system behavior based classification which includes active  ...  It was shown that procedures to be done by Data Center cyber-protection system are identification of the event, signatures database management and denial management.  ...  It consists from objects of analysis, procedures and evaluation indicators.  ... 
doi:10.31548/dopovidi2018.02.025 fatcat:pqtzjtqlnrbvzjkl6byf6k6fqa

Different Classification Technique for Data mining in Insurance Industry using weka

Mohd Ahtesham Farooqui, Dr. Jitendra Sheetlani
2017 IOSR Journal of Computer Engineering  
this paper addresses the issues and techniques for Property/Casualty actuaries applying data mining methods. Data mining means the effective unknown pattern discovery from a large amount database.  ...  It is an interactive knowledge discovery procedure which is includes data acquisition, data integration, data exploration, model building, and model validation.  ...  Weka is a machine learning algorithms set for explaining true information mining issue. It is composed in Java and keeps running on any platform.  ... 
doi:10.9790/0661-1901011118 fatcat:4tmjtotxffc6nciswfri4z3trm

Decision Support System for Designing Effective Noise Hazard Prevention Strategies

Krisada Asawarungsaengkul, Suebsak Nanthavanij, Junalux Chalidabhongse
2007 International Journal of Occupational Safety and Ergonomics  
A decision support system for designing effective noise hazard prevention (NHP) strategies is proposed. NHP consists of four modules: (a) database, (b) input, (c) algorithms, and (d) solution.  ...  If the budget is insufficient, NHP is able to search for a feasible noise hazard strategy that requires a minimum NC budget. decision support system noise hazard prevention genetic algorithms noise control  ...  Sutton [19] has presented a procedure to identify possible methods of noise reduction and to select the best method using a cost/benefit analysis.  ... 
doi:10.1080/10803548.2007.11105103 pmid:18082028 fatcat:7sh43lsyibgmpnmsc2ewpbce2i

ESEDA: A Tool for Enhanced Speech Emotion Detection and Analysis

Julia Sidorova, Toni Badia
2008 2008 International Conference on Automated Solutions for Cross Media Content and Multi-Channel Distribution  
Palabras clave: reconocimiento de emociones en el habla, paralingüística Abstract: This demo paper presents a speech emotion recognition tool, based on standard supervised machine learning methods and  ...  enhanced with an additional block of classification error analysis and fixing.  ...  The standard way to do SER is through a supervised machine learning procedure.  ... 
doi:10.1109/axmedis.2008.39 fatcat:es2y4pw3wnaknfokrcxfkgfpdy

Techniques of Data Mining and Machine Learning for Cyber Security Interruption Detection System

Arsh Kumar
2021 International Journal for Research in Applied Science and Engineering Technology  
This research paper is a well-written analysis of machine learning and knowledge mining techniques for automated investigation and interruption detection.  ...  , as well as a set of recommendations for the best strategies to use based on the characteristics of the digital issue to be addressed.  ...  Information mining is a critical advancement of learning disclosure in databases (KDD), which is an iterative procedure of data cleaning, coordination, information selection, design acknowledgment, and  ... 
doi:10.22214/ijraset.2021.34111 fatcat:bt7lcu6cpbd5bd2m6gvgewojuq

Performance, scalability and reliability issues in web applications

Lakshmi S. Iyer, Babita Gupta, Nakul Johri
2005 Industrial management & data systems  
Purpose -The primary purpose of this paper is to present a comprehensive strategy for performance, reliability and scalability (PSR) testing of multi-tier web applications.  ...  Originality/value -This paper provides a comprehensive strategy and the suggested steps for managers and technical personnel to ensure that the multi-tier, web-based applications are effective, scalable  ...  For example, database machine needs to have more memory, number of processors and hard disk space.  ... 
doi:10.1108/02635570510599959 fatcat:xbdl4agmqbegrpfnnqhvuaxuyu

A cross-validation scheme for machine learning algorithms in shotgun proteomics

Viktor Granholm, William Noble, Lukas Käll
2012 BMC Bioinformatics  
Here, we discuss how the target-decoy method is employed in machine learning for shotgun proteomics, focusing on how the results can be validated by cross-validation, a frequently used validation scheme  ...  As for all machine learning algorithms, however, the results must be validated to avoid issues such as overfitting or biased learning, which would produce unreliable peptide identifications.  ...  Acknowledgements This work was supported by grants from the Swedish Research Council, The Swedish Foundation for Strategic Research, the Lawski Foundation, and NIH awards R01 GM096306 and P41 GM103533.  ... 
doi:10.1186/1471-2105-13-s16-s3 pmid:23176259 pmcid:PMC3489528 fatcat:ohqvuwz4abe2vdem6kotmprooq

Current state of science in machine learning methods for automatic infant pain evaluation using facial expression information: study protocol of a systematic review and meta-analysis

Dan Cheng, Dianbo Liu, Lisa Liang Philpotts, Dana P Turner, Timothy T Houle, Lucy Chen, Miaomiao Zhang, Jianjun Yang, Wei Zhang, Hao Deng
2019 BMJ Open  
For years, computer scientists have developed many different facial expression-centred machine learning (ML) methods for automatic infant pain assessment.  ...  All extracted outcome data will be imported into RevMan V.5.2.1 software and R V3.3.2 for analysis.  ...  expression databases collected in realworld clinical environments or controlled trials available for modelling research. ► Many of these machine learning prediction studies will use the same database  ... 
doi:10.1136/bmjopen-2019-030482 pmid:31831532 pmcid:PMC6924806 fatcat:wjz572psjvbwjmy37lop7uthvi

A Novel Method for Identification of Cardio Vascular Disease using KELM Optimized by Grey Wolf Algorithm

Classifying data is a customary duty of machine learning.  ...  Data mining in health care is a forthcoming arena that attains huge importance for delivering prognosis and a profound realization of medical data.  ...  A famous machine learning strategy which finds its application in various areas is Extreme learning machine [16] .  ... 
doi:10.35940/ijitee.i9006.078919 fatcat:guhoqsgoabbublaisdq5vdxo3a

Data-Mining for Processes in Chemistry, Materials, and Engineering

Hao Li, Zhien Zhang, Zhe-Ze Zhao
2019 Processes  
We then propose a generalized strategy based on the philosophy of data-mining, which should be applicable for the design and optimization targets for processes in various fields with both scientific and  ...  With the rapid development of machine learning techniques, data-mining for processes in chemistry, materials, and engineering has been widely reported in recent years.  ...  Acknowledgments: We are grateful for all the editorial works from the Processes editorial office. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/pr7030151 fatcat:rpscyfecpfdapid3624d42wv74
« Previous Showing results 1 — 15 out of 195,562 results