Seyed Mohammad Karim Tabatabaei, Saeed Behbahani, and Clarence W. de Silva
[1] B.L. Juneja and G.S. Sekhon, Fundamentals of metal cutting and machine tools, 2nd ed. (New Delhi: New Age International, 2003). [2] H.E. Merrit, Theory of self-excited machine-tool chatter-contribution to machine tool chatter research, ASME Journal of Engineering for Industry, 87, 1965, 447–454. [3] G. Park, M.T. Bement, D.A. Hartman, R.E. Smith, andC.R. Farrar, The use of active materials for machiningprocesses: A review, International Journal of Machine Tools & Manufacture, 47, 2007, 2189–2206. [4] N.W. Hagood, W.H. Chung, and A. von Flotow, Modeling ofpiezoelectric actuator dynamics for active structural control, Journal of Intelligent Materials Systems and Structures, 1, 1990, 327–354. [5] T.A. Dow, M.H. Miller, and P.J. Falter, Application of a fast tool servo for diamond turning of non-rotationally symmetric surface, Precision Engineering, 13, 1991, 243–250. [6] B. Chen and Y. Chang, Robust PI controller design for aconstant turning force, International Journal of Machine Tools Manufacture, 31, 1991, 257–272. [7] H. Al-Wedyan, R. Bhat, and K. Demirli, Active control of whirling vibrations in boring trepanning association deep hole boring process using two electrodynamic shakers, Control and Intelligent Systems, 38(4), 2010, 224. [8] S.V. Bhaskara Reddy, M.S. Shunmugam, and T.T. Narendran, Optimal sub-division of the depth of cut to achieve minimum production cost in multi-pass turning using a genetic algorithm, Journal of Materials Processing Technology, 79(1–3), 1998, 101–108. [9] S. Behbahani, S.M.K. Tabatabaei, and D. Sajedipour, Controller design for chatter reduction using genetic algorithm method, IEEE Conf. on Control, ICCA China, 2010. [10] R. Fassen, Chatter prediction and control for high-speed milling: Modeling and experiments (Eindhoven: Eindhoven University of Technology Press, 2007). [11] D. Dasgupta and F. Gonzalez, An immunity-based technique to characterize intrusions in computer security networks, IEEE Transactions on Evolutionary Computation, 6, 2002, 281–291. [12] P.K. Harmer, P.D. Williams, G.H. Gunsch, and G.B. Lamont, An artificial immune system architecture for computer security applications, IEEE Transactions on Evolutionary Computation, 6, 2002, 252–280. [13] J.H. Carter, The immune system as a model for patternrecognition and classification, Journal of the American Medical Informatics Association, 7, 2000, 28–41. [14] M. Mori, M. Tsukiyama, and T. Fukada, Adaptive scheduling system inspired by immune system, Proc. of the IEEE Systems, Man and Cybernetics Conf., San Diego, CA, 1998, 1614–1619. [15] H. Bersini, Immune network and adaptive control, Proc. of the First European Conf. on Artificial Life, (United States of America: MIT Press, 1991), 217–226. [16] D.H. Kim and H. Lee, Intelligent control of nonlinear power plant using immune algorithm based multiobjective optimization, Proc. of the 2004 IEEE International Conf. on Networking, Sensing and Control, 2004, 1388–1393. [17] J. Timmis and T. Knight, Artificial immune systems: Using the immune system as inspiration for data mining, in H.A. Abbas, R.A. Sarker, C.S. Newton, (ed.), Data Mining, (London, United Kingdom: Idea Group Publishing, 2001), 209–230. [18] A. Carlos and N. Cruz, Solving multi-objective optimization problems using an artificial immune system, Genetic Programming and Evolvable Machines, 6, 2005, 163–190. [19] M.T. Al Muallim, R. El-Kouatly, and F. Drayee, Generalstructure of a new immune controller, Control and Intelligent Systems, 42(3), 2014, 231–237. [20] Y. Altintas, Manufacturing automation (New York: Cambridge University Press, 2001). [21] D. Dasgupta and L. Fernando Ni˜no, Immunological computations (Theory and applications) (Boca Raton: Taylor & Francis Group, 2009). [22] IEEE standard on piezoelectricity, IEEE Standards Board, 1987. [23] C.W. de Silva, Sensors and actuators – Engineering system instrumentation, 2nd ed. (Boca Raton: Taylor & Francis, 2015).
Important Links:
Go Back