최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회. 컴퓨팅의 실제 논문지 = KIISE transactions on computing practices, v.23 no.1, 2017년, pp.1 - 12
김도형 (경희대학교 컴퓨터공학과) , 강병호 , 이승룡 (경희대학교 컴퓨터공학과)
Preventive maintenance is required for best performance of facilities in large scale industry. Ultimately, the efficiency of production is maximized by preventing the failure of facilities in advance. Typically, regular maintenance is conducted manually; however, it is hard to prevent repeated failu...
Kang, B. H., Kim, Y. S., Chen, Z., and Kim, T.. "Detecting Significant Alarms using Outlier Detection Algorithms," Interdisciplinary Research Theory and Technology (IRRT 2013), 2013.
Orair, G. H., Teixeira, C. H., Meira Jr, W., Wang, Y., and Parthasarathy, S., "Distance-based outlier detection: consolidation and renewed bearing," Proceedings of the VLDB Endowment, Vol. 3, No. 1-2, pp. 1469-1480, 2010.
R. Langone, C. Alzate, A. Bey-Temsamani, and J. Suykens, "Alarm prediction in industrial machines using autoregressive LS-SVM models," Computational Intelligence and Data Mining (CIDM), 2014 IEEE Symposium on, pp. 359-364, 2014.
Oi. Foong, S. Sulaiman, D. Rambli, and N. Abdullah, "ALAP: Alarm prioritization system for oil refinery," the World Congress on Engineering and Computer Science, Vol. 2, 2009.
W. Zhao, X. Bai, W. Wang, and J. Ding, "A novel alarm processing and fault diagnosis expert system based on BNF rule," Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE/PES, pp. 1-6, 2005.
Cheng, Yue, Iman Izadi, and Tongwen Chen, "Optimal alarm signal processing: Filter design and performance analysis," IEEE Transactions on Automation Science and Engineering, Vol. 10, No. 2, pp. 446-451, 2013.
Ahmed, K., Izadi, I., Chen, T., Joe, D., and Burton, T., "Similarity analysis of industrial alarm flood data," IEEE Transactions on Automation Science and Engineering, Vol. 10, No. 2, pp. 452-457, 2013.
Izadi, I., Shah, S. L., Shook, D. S., Kondaveeti, S. R., and Chen, T., "A framework for optimal design of alarm systems," IFAC Proceedings Volumes, Vol. 42, No. 8, pp. 651-656, 2009.
Zhu, J., Shu, Y., Zhao, J, and Yang, F., "A dynamic alarm management strategy for chemical process transitions," Journal of Loss Prevention in the Process industries, Vol. 30, pp. 207-218, 2014.
Sawsaa, A., and Lu, J, "Extracting information science concepts based on jape regular expression," In In: WORLDCOMP'11 The 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 18-21, Jul. 2011.
Mohapatra, Hrushikesh, Siddhanth Jain, and Soumen Chakrabarti, "Joint Bootstrapping of Corpus Annotations and Entity Types," EMNLP, 2013.
Morwal, S., N. Jahan and D. Chopra, "Named entity recognition using hidden Markov model (HMM)," International Journal on Natural Language Computing (IJNLC), pp. 1.4: 15-23, 2012.
Ju, Z., J. Wang and F. Zhu, "Named entity recognition from biomedical text using SVM," Bioinformatics and Biomedical Engineering, (iCBBE) 2011 5th International Conference on, IEEE, 2011.
Santos, Igor, Javier Nieves, and Pablo G. Bringas, "Enhancing fault prediction on automatic foundry processes," World Automation Congress (WAC), 2010, IEEE, 2010.
Liu, Yutian, and Jingping Jiang, "Fault diagnosis and prediction of hybrid system based on particle filter algorithm," 2008 IEEE International Conference on Automation and Logistics, IEEE, 2008.
Chen, Bindi, Peter C. Matthews, and Peter J. Tavner, "Automated on-line fault prognosis for wind turbine pitch systems using supervisory control and data acquisition," IET Renewable Power Generation 9.5, pp. 503-513, 2015.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.