نتایج جستجو برای: machine work performance

تعداد نتایج: 2047820  

Journal: :AI Magazine 1997
Tom M. Mitchell

past decade, machine learning has evolved from a field of laboratory demonstrations to a field of significant commercial value. Machine-learning algorithms have now learned to detect credit card fraud by mining data on past transactions, learned to steer vehicles driving autonomously on public highways at 70 miles an hour, and learned the reading interests of many individuals to assemble person...

1986
Martin Kay

Large expenditures on fundamental scientific research are usually limited to the hard sciences. It is therefore entirely reasonable to suppose that, if large sums of money are spent on machine translations, it will be with the clear expectation that what is being purchased is principally development and engineering, and that the result will contribute substantially to the solution of some press...

Chandra Shekhar Madhu Jain Shalini Shukla

The present investigation deals with a machine repair problem consisting of cold and warm standby machines. The machines are subject to breakdown and are repaired by the permanent repairman operating under N-policy. There is provision of one additional removable repairman who is called upon when the work load of failed machines crosses a certain threshold level and is removed as soon as the wor...

A. Barzigar, D. Rezazadeh, M. Shahrouzi,

Opposition-based learning was first introduced as a solution for machine learning; however, it is being extended to other artificial intelligence and soft computing fields including meta-heuristic optimization. It not only utilizes an estimate of a solution but also enters its counter-part information into the search process. The present work applies such an approach to Colliding Bodies Optimiz...

J. M. Prajapati S. S. Patel

Wire electric discharge machine (WEDM) is spark erosion in unconventional machining technique to cut hard and the conductive material with a wire as an electrode. The blanking die material SKD 11 is a high carbon and high chromium tool steel with high hardness and high wearing resistance property. This tool steel has broad application in press tools and dies making industries. In this research ...

2008
Kalevi Tervo Lauri Palmroth Vesa Hölttä Aki Putkonen

The performance of a mobile working machine is subject to operating conditions, operator’s actions, and technical condition of the machine. The ability of the operator has proven to be a significant factor when considering productivity or fuel efficiency. If the machine is in good technical condition with controller parameters tuned properly, the only way to increase performance, that is, produ...

Today, due to the limited supply and rapid consumption of fossil fuels, transitioning towards renewable energy supplies has become more important than ever.. The purpose of this paper is to present a new linear permanent magnet vernier machine structure which is designed to capture wave energy and improve the performance of the prototype vernier machine. By halving the proposed vernier machine,...

2002
Wenyuh Jywe

The testing devices for performance testing on a CNC machine tool were developed. A small-radius contouring device was employed for checking the dynamic performance of a CNC machine tool. This device was composed of a laser diode and a quadrant sensor. For checking geometric error of a CNC machine tool, a long-radius contouring device was employed. The optic encoder contouring systems were also...

Journal: :ICGA Journal 1995
Bradley C. Kuszmaul

The StarTech massively parallel chess program, running on a 512-processor Connection Machine CM-5 supercomputer, tied for third place at the 1993 ACM International Computer Chess Championship. StarTech employs the Jamboree search algorithm, a natural extension of J. Pearl’s Scout search algorithm, to find parallelism in game-tree searches. StarTech’s work-stealing scheduler distributes the work...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید