correct processing
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 11)

H-INDEX

11
(FIVE YEARS 1)

2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Marek KĘSEK

This article describes the benefits offered by the analysis of data from production processes. With the correct processing, such dataallows issues to be identified both within the analysed process and in the ways machines are used. The paper presents an initialanalysis of data from the fragmentation process in a hard coal mine using longwall shearers. The analysis is described using Rprogramming language functions.


2021 ◽  
Author(s):  
Ram Sunder Kalyanraman ◽  
Xiaoli Chen ◽  
Po-Yen Wu ◽  
Kevin Constable ◽  
Amit Govil ◽  
...  

Abstract Ultrasonic and sonic logs are increasingly used to evaluate the quality of cement placement in the annulus behind the pipe and its potential to perform as a barrier. Wireline logs are carried out in widely varying conditions and attempt to evaluate a variety of cement formulations in the annulus. The annulus geometry is complex due to pipe standoff and often affects the behavior (properties) of the cement. The transformation of ultrasonic data to meaningful cement evaluation is also a complex task and requires expertise to ensure the processing is correctly carried out as well interpreted correctly. Cement formulations can vary from heavy weight cement to ultralight foamed cements. The ultrasonic log-based evaluation, using legacy practices, works well for cements that are well behaved and well bonded to casing. In such cases, a lightweight cement and heavyweight cement, when bonded, can be easily discriminated from gas or liquid (mud) through simple quantitative thresholds resulting in a Solid(S) - Liquid(L) - Gas(G) map. However, ultralight and foamed cements may overlap with mud in quantitative terms. Cements may debond from casing with a gap (that is either wet or dry), resulting in a very complex log response that may not be amenable to simple threshold-based discrimination of S-L-G. Cement sheath evaluation and the inference of the cement sheath to serve as a barrier is complex. It is therefore imperative that adequate processes mitigate errors in processing and interpretation and bring in reliability and consistency. Processing inconsistencies are caused when we are unable to correctly characterize the borehole properties either due to suboptimal measurements or assumptions of the borehole environment. Experts can and do recognize inconsistencies in processing and can advise appropriate resolution to ensure correct processing. The same decision-making criteria that experts follow can be implemented through autonomous workflows. The ability for software to autocorrect is not only possible but significantly enables the reliability of the product for wellsite decisions. In complex situations of debonded cements and ultralight cements, we may need to approach the interpretation from a data behavior-based approach, which can be explained by physics and modeling or through observations in the field by experts. This leads a novel seven-class annulus characterization [5S-L-G] which we expect will bring improved clarity on the annulus behavior. We explain the rationale for such an approach by providing a catalog of log response for the seven classes. In addition, we introduce the ability to carry out such analysis autonomously though machine learning. Such machine learning algorithms are best carried out after ensuring the data is correctly processed. We demonstrate the capability through a few field examples. The ability to emulate an "expert" through software can lead to an ability to autonomously correct processing inconsistencies prior to an autonomous interpretation, thereby significantly enhancing the reliability and consistency of cement evaluation, ruling out issues related to subjectivity, training, and competency.


2021 ◽  
Author(s):  
Natália Kundráthová ◽  
◽  
Karol Lysina

The article is focused on modern threats in the department of security. The urge to address this issue is due to growing occurrence of unmanned aerial vehicles (UAV) all around the world. The operation of these vehicles is also closely linked to incidents that threaten security, but the most serious are increasing numbers of incidents connected to operation of UAV. For correct processing, it is very important to define the basic concepts and facts related to the topic of UAV. Safety and security in general, are inseparable parts of air transport. Taking into account the constant development of aviation technology, especially in the department of UAV, it is necessary to know the emerging threats and pitfalls associated with the operation of UAV. The following chapters define in more detail the causes of incidents. Later on, we get to know various methods of detection and protection connected to operation of UAV using the comparative method. Key part of our paper is being formed by the analysis of current regulatory framework at European and national level. The result is a proposal for new legislation that could and also should be implemented in national regulations. All things considered, such legislation must meet all attributes necessary for the safe operation of UAV and protection against their illegal use.


2020 ◽  
Vol 4 (2) ◽  
pp. 712-721
Author(s):  
Jamilu Awwalu ◽  
Saleh El-Yakub Abdullahi ◽  
Abraham Eseoghene Evwiekpaefe

Technology advances by the day and computers can be considered as valuable to almost every learned person. One of the most uses of computers nowadays is for internet surfing and social networking. Computers in this context are not restricted to desktop or laptop computers only. Internet surfing and social networking has made interactions between people and computers very easy, where people can communicate using their languages thus making processing of these languages a useful task for the computers to interpret. The correct processing of these languages on the computer relies on the correct identification of parts of speech (POS) in sentences which has been an active area of research for a long time. This paper presents a review parts of speech tagging, comparison of different tagging techniques, their characteristics, difficulties, limitation, and Multilingual Parts of Speech (POS) tagging approaches.


Author(s):  
M. Lazareva

The paper analyzes the process of transformation of the domestic educational sector under the influence of the latest computer and information technologies. Considered the features of instant access to the Internet and its databases, formats of presented information and the related modification of the user's attitude to traditional education in the classroom. It is emphasized that such easiness of obtaining knowledge can be accompanied by the formation in the person's consciousness of an irresponsible attitude to learning, responsibilities, time allocation, inability to analyze information, degeneration of originality, desire to think and personal development. In this regard, considered the main drawbacks of the Ukrainian educational sphere and also indicated that the profession of a teacher requires rethinking, because it seems that in the near future, the teacher's task will not be to transfer knowledge, but to instill skills to correct processing of information.


Author(s):  
C. López-Martínez ◽  
E. Pottier

AbstractThis chapter critically summarizes the main theoretical aspects necessary for a correct processing and interpretation of the polarimetric information towards the development of applications of synthetic aperture radar (SAR) polarimetry. First of all, the basic principles of wave polarimetry (which deals with the representation and the understanding of the polarization state of an electromagnetic wave) and scattering polarimetry (which concerns inferring the properties of a target given the incident and the scattered polarized electromagnetic waves) are given. Then, concepts regarding the description of polarimetric data are reviewed, covering statistical and scattering aspects, the latter in terms of coherent and incoherent decomposition techniques. Finally, polarimetric SAR interferometry and tomography, two acquisition modes that enable the extraction of the 3-D scatterer position and separation, respectively, and their polarimetric characterization, are described.


2020 ◽  
Vol 2 (1) ◽  
pp. 85-97
Author(s):  
Zelafehad Mega Naskay ◽  
Agustinus Fritz Wijaya

The information system used must be balanced with the correct processing to support business processes and become an operational supporter of the organization. In caryyng out business process there are several factors that must be considered by the company, not only focusing on the use of information technology that supports business processes, but the company must be able to focus on maintenance, monitoring and management. Therefore, researchers use the Monitor, Evaluate and Assess domains. The purpose of this study is to measure the level of information technology maturity at Dinas Kependudukan dan Catatan Sipil Kota Salatiga. The research methodology is a qualitative method, by collecting data and interviews with informants. The results of this study are to determine the level of maturity of Dinas Kependudukan dan Catatan Sipil Kota Salatiga and provide recommendations, so that the application of information technology can be better.


2020 ◽  
Vol 1 (1) ◽  
pp. 24-31
Author(s):  
Rahayu Erita Putry ◽  
Karjuni Dt.Maani

Meeting the needs of food for the community in connection with increasing population and decreasing the number of agricultural areas. resulting in serious problems because the amount of food available is deficient. Based on this, a strategy that needs to be followed up to overcome the food crisis going forward. One of the efforts carried out by the government so far is to optimize the use of community houses as a source of family food. Food is a basic need for human survival, so everyone needs to be guaranteed to get quality and safe food. Food that is not produced properly and can be a source of microorganisms and chemical contaminants that can be dangerous and cause disease to humans. Cases of food poisoning should not need to occur if food products are processed with the correct processing procedures (Badan POM, 2007). Conditions for the fulfillment of food for the state up to individuals, as reflected in the availability of sufficient food, both in quantity and quality, safe, diverse, nutritious, equitable and affordable and not contrary to religion, beliefs, and culture of the community, to be able to live healthy, active, and productive in a sustainable manner (Law No. 18/2012).


Author(s):  
Anatoly Komendantov ◽  
Alexander Matveev ◽  
Andrey Svetlov

The paper provides the description of the add-on to the stemming tool MyStem by I. Segalovich. We designe the application to add the MyStem a convenient graphical interface that is easy to learn and intuitive for users who do not specialize in information technology. It turned out that MyStem correctly processes outdated vocabulary if it is passed into the program using modern Cyrillic. In addition to the convenient interface, our program has the option to work with the outdated Cyrillic alphabet, when turned on, for instance, the letters zelo and omega are being replaced by «ks» and «o» respectively, and only then the text is transferring for analysis to MyStem, and then the characters are being replaced back in the processed document. So our add-on intercepts the output of the MyStem tool, reformatts and analyzes it in a special way. In addition, the application has functionality for removing homonyms manually if the program was not correct with automatic tagging the morphological characteristics of a word. The main purpose of this application is to prepare the morphological tagging of documents of the archival fund «Mikhailovsky Stanichny Ataman» to create a linguistic corpus. During the work on the application, we solved the problem with the correct processing of texts containing outdated Cyrillic characters. To implement the functional and user-friendly graphical interface, we use the JavaFX platform (OpenJFX).


Author(s):  
Ivonizete Pires Ribeiro ◽  
Daiane Monique de Sá Martins ◽  
Maria Alires Vieira de Morais ◽  
Mitra Mobin ◽  
Iraci De Melo Salmito Noleto

Objective: To identify the use of biosafety measures in the processing of dental and hospital articles by dental academics. Method: A descriptive study carried out at a Higher Education Institution from February to March of the year 2018. Data collection was done using an observation instrument and a questionnaire, and for the analyzes, descriptive statistics and the Subject's Discourse Collective. Opinion nº 137012. Results: 46 students participated in the study. The importance of correct processing is knowledge of academics and they see the processing of items such as an action of great significance in patient safety, professional and the institution involved in the teaching of care for oral health, and a procedure to reduce cases of infections. Conclusion: The measures are related to the use of personal protective equipment and to the processing of articles (cleaning and disinfection) based on institutional manuals.


Sign in / Sign up

Export Citation Format

Share Document