Optimising operational costs using Soft Computing techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimising operational costs using Soft Computing techniques

A Manufacturing Execution System (MES) consists of high-cost, large-scale, multi-task software systems. Companies and factories apply these complex applications for the purposes of production management to monitor and track all aspects of factory-based manufacturing processes. Nevertheless, companies seek to control the production process with even greater rigour. Improvements associated with a...

متن کامل

Investigating electrochemical drilling (ECD) using statistical and soft computing techniques

In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...

متن کامل

investigating electrochemical drilling (ecd) using statistical and soft computing techniques

in the present study, five modeling approaches of ra, mlp, mnn, gff, and canfis were applied so as to estimate the radial overcut values in electrochemical drilling process. for these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. the developed models were evaluated in terms of their prediction capability with m...

متن کامل

Damage identification by using soft-computing techniques

This paper describes a soft computing approach to solve the damage identification problem using Case-Based Reasoning (CBR) to obtain an initial diagnostic exploiting the outcomes given in known structure models simulations and the data acquired by the sensors in operating conditions once the system has started. It creates an incremental database (since a new experience is retained each time a p...

متن کامل

Intrusion Detection Using Soft Computing Techniques

As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Integrated Computer-Aided Engineering

سال: 2011

ISSN: 1875-8835,1069-2509

DOI: 10.3233/ica-2011-0379