Search results for " mining"
showing 10 items of 1548 documents
A proposed mapping method for aligning machine execution data to numerical control code
2019
The visions of the digital thread and smart manufacturing have boosted the potential of relating downstream data to upstream decisions in design. However, to date, the tools and methods to robustly map across the related data representations is significantly lacking. In response, we propose a mapping technique for standard manufacturing data representations. Specifically, we focus on relating controller data from machining tools in the form of MTConnect, an emerging standard that defines the vocabulary and semantics as well as communications protocols for execution data, and G-Code, the most widely used standard for numerical control (NC) instructions. We evaluate the efficacy of our mappin…
Adjusted bat algorithm for tuning of support vector machine parameters
2016
Support vector machines are powerful and often used technique of supervised learning applied to classification. Quality of the constructed classifier can be improved by appropriate selection of the learning parameters. These parameters are often tuned using grid search with relatively large step. This optimization process can be done computationally more efficiently and more precisely using stochastic search metaheuristics. In this paper we propose adjusted bat algorithm for support vector machines parameter optimization and show that compared to the grid search it leads to a better classifier. We tested our approach on standard set of benchmark data sets from UCI machine learning repositor…
Input Selection Methods for Soft Sensor Design: A Survey
2020
Soft Sensors (SSs) are inferential models used in many industrial fields. They allow for real-time estimation of hard-to-measure variables as a function of available data obtained from online sensors. SSs are generally built using industries historical databases through data-driven approaches. A critical issue in SS design concerns the selection of input variables, among those available in a candidate dataset. In the case of industrial processes, candidate inputs can reach great numbers, making the design computationally demanding and leading to poorly performing models. An input selection procedure is then necessary. Most used input selection approaches for SS design are addressed in this …
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Selection of time windows in the horizontal-to-vertical noise spectral ratio by means of cluster analysis
2016
The selection of the elementary analysis windows in continuous noise recordings for optimal estimation of the mean horizontal‐to‐vertical spectral ratio (HVSR) curve is generally performed by visual inspection of HVSR curves considered as functions of time. Starting from full‐length records, HVSR curves are determined in consecutive time windows of appropriate lengths. Time windows with HVSR curves that are anomalous on the basis of a simple visual inspection are generally ignored in the computation of the average HVSR curve. It is often very difficult to optimize the selection of time windows to be used for the calculation of the HVSR curve representative of a site. The use of nonobjective…
Reply to Saqibet al.
2016
Umbilical Cord Blood Transplantation in Children and Adults
2018
Umbilical cord blood transplantation (UCBT) from unrelated donors is a suitable option of HSCT for patients in whom it is indicated, and a suitable related or unrelated BM or PB donor is not available in due time.
Update on the management of intra-abdominal Candida infections.
2017
Implantation failure of endometrial origin: what is new?
2018
To review recent findings related to possible causes of recurrent implantation failure of endometrial origin in normal uterus.Recent evidences suggest that in apparently normal endometria, RIF may associate with molecular and functional changes in the uterus such as abnormal endometrial microbiota, including the presence of chronic endometritis, poor synchronization between the blastocyst and endometrium, and/or excessive uterine peristalsis. An altered endometrial microbiota detected by molecular techniques has been recently related to poorer embryo implantation, even in apparently normal endometria. The use of the endometrial receptivity analysis test to obtain an objective signature of e…
Assessment of tumor-infiltrating TCRV γ 9V δ 2 γδ lymphocyte abundance by deconvolution of human cancers microarrays
2017
Most human blood γδ cells are cytolytic TCRVγ9Vδ2+lymphocytes with antitumor activity. They are currently investigated in several clinical trials of cancer immunotherapy but so far, their tumor infiltration has not been systematically explored across human cancers. Novel algorithms allowing the deconvolution of bulk tumor transcriptomes to find the relative proportions of infiltrating leucocytes, such as CIBERSORT, should be appropriate for this aim but in practice they fail to accurately recognize γδ T lymphocytes. Here, by implementing machine learning from microarray data, we first improved the computational identification of blood-derived TCRVγ9Vδ2+γδ lymphocytes and then appl…