In this paper, an Internet-enabled system has been developed to support setup planning, based on some state-of-the-art Java and Web technologies. The utilizing of XML as a file format provides means for the transfer of information between various manufacturing systems. A fuzzy set theory based intelligent approach for setup planning is introduced. In this approach, the setups are automatically planned based on key factors of machining practice, tolerance requirement and manufacturing cost. Finally, a case study is presented to illustrate the proposed system and to show the effectiveness of the presented setup planning approach
{"title":"An Internet-Enabled Setup Planning System","authors":"Wen-jian Liu, Gaoliang Peng","doi":"10.1109/ICITA.2005.67","DOIUrl":"https://doi.org/10.1109/ICITA.2005.67","url":null,"abstract":"In this paper, an Internet-enabled system has been developed to support setup planning, based on some state-of-the-art Java and Web technologies. The utilizing of XML as a file format provides means for the transfer of information between various manufacturing systems. A fuzzy set theory based intelligent approach for setup planning is introduced. In this approach, the setups are automatically planned based on key factors of machining practice, tolerance requirement and manufacturing cost. Finally, a case study is presented to illustrate the proposed system and to show the effectiveness of the presented setup planning approach","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123237830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The intelligent turret assembly system (ITAS) is an agile assembly system that allows for a variety of configurations through modular units. This configurability makes it difficult to determine the optimum tool placement configuration. Experiment suggested that the distribution of production time in the ITAS occurs in steps and that the increase in the number of turrets leads to a reduction in the importance of waiting time. Simulated annealing was found to perform better than genetic algorithm and Tabu search. This is possibly due to the lack of domain specific knowledge on how Tabu searches may be directed and problems with the chromosome representation of the tool-station mapping in genetic algorithm.
{"title":"Algorithms for Intelligent Turret Assembly System","authors":"Hock-Woo Tan, K. Lee, L. Tay","doi":"10.1109/ICITA.2005.59","DOIUrl":"https://doi.org/10.1109/ICITA.2005.59","url":null,"abstract":"The intelligent turret assembly system (ITAS) is an agile assembly system that allows for a variety of configurations through modular units. This configurability makes it difficult to determine the optimum tool placement configuration. Experiment suggested that the distribution of production time in the ITAS occurs in steps and that the increase in the number of turrets leads to a reduction in the importance of waiting time. Simulated annealing was found to perform better than genetic algorithm and Tabu search. This is possibly due to the lack of domain specific knowledge on how Tabu searches may be directed and problems with the chromosome representation of the tool-station mapping in genetic algorithm.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115401473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The form keeping of the object is a problem that each field often faces; there are different kinds of the form keeping. Firstly, it is the form keeping of the rigidity object, secondly, it is the form keeping of plasticity object, and the third kind is the form keeping of the nonsolidifying object, i.e. the permafrost. This text discusses the form keeping of the nonsolidifying object from the transform of the condition based on the extension set and the method of the extension transformation, in order to solve the problem that the actual project faces. This text describes some concept of the form keeping, and gives some examples for relevant application.
{"title":"Extension Set and the Research of the Extension ADD Transformation","authors":"Qinhua Zhu, Yongquan Yu, Wen Cai","doi":"10.1109/ICITA.2005.142","DOIUrl":"https://doi.org/10.1109/ICITA.2005.142","url":null,"abstract":"The form keeping of the object is a problem that each field often faces; there are different kinds of the form keeping. Firstly, it is the form keeping of the rigidity object, secondly, it is the form keeping of plasticity object, and the third kind is the form keeping of the nonsolidifying object, i.e. the permafrost. This text discusses the form keeping of the nonsolidifying object from the transform of the condition based on the extension set and the method of the extension transformation, in order to solve the problem that the actual project faces. This text describes some concept of the form keeping, and gives some examples for relevant application.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We have proposed a new implementation of contourlet, namely, WDFB contourlet which is very efficient for image denoising. We also find two reliable methods for norm estimation, i.e. Monte-Carlo estimation and polyphase impulse reconstruction. The former is fast, simple yet reliable, while the latter can exactly reconstruct the contourlet basis, thus lead to precise results. Then shearing invariant (SI) is proposed as a novel tool for further denoising improvement, especially for multiscale directional transforms. Finally, numerical experiments are presented to support our conclusions.
{"title":"WDFB Contourlet and Shearing Invariant for Image Denoising","authors":"P. Zhang, Lin Ni","doi":"10.1109/ICITA.2005.309","DOIUrl":"https://doi.org/10.1109/ICITA.2005.309","url":null,"abstract":"We have proposed a new implementation of contourlet, namely, WDFB contourlet which is very efficient for image denoising. We also find two reliable methods for norm estimation, i.e. Monte-Carlo estimation and polyphase impulse reconstruction. The former is fast, simple yet reliable, while the latter can exactly reconstruct the contourlet basis, thus lead to precise results. Then shearing invariant (SI) is proposed as a novel tool for further denoising improvement, especially for multiscale directional transforms. Finally, numerical experiments are presented to support our conclusions.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A.hslrrrct-Though clcctronic air tickets have been used widely in airline companics, thcre are still vcry Iargc numbers of a,ir tickets need to process. 3lany Airline Companies have used Automatic Recognition System to process air tickets. In this kind of system, how to storagc such huge numbers of air tickets images efficicntly is an important part. Normal method is to compress each air ticket image individualfy with standard compression mcthods such as JPEG and JPEGZOOO o r spccial algorithm. In this papcr, we focus on how to eliminate intcrimage rcdundancies that are also v e r y important for totat compression ratio. and we produce an efiicicnt air tickets image compression scheme based on image segmentation and classification.
{"title":"An Efficient Image Compression Scheme for Air Tickets Storage","authors":"Shengke Wang, Zhiyan Wang, Dehua Zhou","doi":"10.1109/ICITA.2005.64","DOIUrl":"https://doi.org/10.1109/ICITA.2005.64","url":null,"abstract":"A.hslrrrct-Though clcctronic air tickets have been used widely in airline companics, thcre are still vcry Iargc numbers of a,ir tickets need to process. 3lany Airline Companies have used Automatic Recognition System to process air tickets. In this kind of system, how to storagc such huge numbers of air tickets images efficicntly is an important part. Normal method is to compress each air ticket image individualfy with standard compression mcthods such as JPEG and JPEGZOOO o r spccial algorithm. In this papcr, we focus on how to eliminate intcrimage rcdundancies that are also v e r y important for totat compression ratio. and we produce an efiicicnt air tickets image compression scheme based on image segmentation and classification.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130317638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Extenics is a theory probes into solving contradiction problems with computers. This article gives three restricting qualifications for matter-elements' extension. There was never a restricting qualification advanced to measure whether a contradiction problem should be solved in extenics method, so this article does great contribution to extenics theory.
{"title":"Extension Set and Restricting Qualifications of Matter-Elements' Extension","authors":"Yijing Ju, Yongquan Yu, Guangming Ju, Wen Cai","doi":"10.1109/ICITA.2005.141","DOIUrl":"https://doi.org/10.1109/ICITA.2005.141","url":null,"abstract":"Extenics is a theory probes into solving contradiction problems with computers. This article gives three restricting qualifications for matter-elements' extension. There was never a restricting qualification advanced to measure whether a contradiction problem should be solved in extenics method, so this article does great contribution to extenics theory.","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Extension data mining is a new method that is based on the extension analysis method of extenics. Extenics is a new disciplinary and a new branch of artificial intelligence. Data mining techniques have their origins in methods from statistics, pattern recognition, databases, artificial intelligence, high performance and parallel computing and visualization. This paper presents how to deal with multiple data formats and unify data representation based on extenics
{"title":"The Research of Data Mining Based on Extension Sets","authors":"Qing Lu, Yongquan Yu","doi":"10.1109/ICITA.2005.277","DOIUrl":"https://doi.org/10.1109/ICITA.2005.277","url":null,"abstract":"Extension data mining is a new method that is based on the extension analysis method of extenics. Extenics is a new disciplinary and a new branch of artificial intelligence. Data mining techniques have their origins in methods from statistics, pattern recognition, databases, artificial intelligence, high performance and parallel computing and visualization. This paper presents how to deal with multiple data formats and unify data representation based on extenics","PeriodicalId":388442,"journal":{"name":"International Conference in IT & Application","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}