• Title/Summary/Keyword: Dempster-Shafer algorithm

Search Result 19, Processing Time 0.023 seconds

Development of Arousal Level Estimation Algorithm by Membership Function and Dempster-Shafer′s Rule of Combination in Evidence (소속함수와 Dempster-Shafer 증거합 법칙을 이용한 긴장도 평가 알고리즘 개발)

  • 정순철
    • Science of Emotion and Sensibility
    • /
    • v.5 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • This research was the first step to develop Expert System for Evaluation of Human Sensibility, where human sensibility can be inferred from objective physiological signals. The study aim was to develop an algorithm in which human arousal level can be judged using measured physiological signals. Fuzzy theory was applied for mathematical handling of the ambiguity related to evaluation of human sensibility, and the degree of belonging to a certain sensibility dimension was quantified by membership function through which the sensibility evaluation was able to be done. Determining membership function was achieved using results from a physiological signal database of arousal/relaxation that was generated from imagination. To induce one final result (arousal level) based on measuring the results of more than 2 physiological signals and the membership function of each physiological signal, Dempster-Shafer's Rule of Combination in Evidence was applied, through which the final arousal level was inferred.

  • PDF

Transformer Protective Relaying Algorithm Using A Dempster-Shafer'a Rule of Combination (Dempster-Shafer 룰 결합을 이용한 변압기 보호계전 알고리즘)

  • Kang, D.H.;Lee, S.J.;Kang, S.H.;Kim, S.T.;Kwon, T.W.;Kim, I.D.;Jang, B.T.;Lim, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1094-1096
    • /
    • 1998
  • An intelligent power transformer protective relaying algorithm based on fuzzy decision-making is proposed. To distinguish external faults with CT saturation, overexcitation and inrush conditions from internal faults, a newly designed fuzzy-rule base is used. The Dempster-Shafer's rule of combition is used for fuzzy inference. A series of the S/W and H/W tests show the proposed protection algorithm has practically sufficient sensitivity and selectivity.

  • PDF

An Improved Dempster-Shafer Algorithm Using a Partial Conflict Measurement

  • Odgerel, Bayanmunkh;Lee, Chang-Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.308-317
    • /
    • 2016
  • Multiple evidences based decision making is an important functionality for computers and robots. To combine multiple evidences, mathematical theory of evidence has been developed, and it involves the most vital part called Dempster's rule of combination. The rule is used for combining multiple evidences. However, the combined result gives a counterintuitive conclusion when highly conflicting evidences exist. In particular, when we obtain two different sources of evidence for a single hypothesis, only one of the sources may contain evidence. In this paper, we introduce a modified combination rule based on the partial conflict measurement by using an absolute difference between two evidences' basic probability numbers. The basic probability number is described in details in Section 2 "Mathematical Theory of Evidence". As a result, the proposed combination rule outperforms Dempster's rule of combination. More precisely, the modified combination rule provides a reasonable conclusion when combining highly conflicting evidences and shows similar results with Dempster's rule of combination in the case of the both sources of evidence are not conflicting. In addition, when obtained evidences contain multiple hypotheses, our proposed combination rule shows more logically acceptable results in compared with the results of Dempster's rule.

Development of an Automatic Expert System for Human Sensibility Evaluation based on Physiological Signal (생리신호를 기반으로 한 자동 감성 평가 전문가 시스템의 개발)

  • Jeong, Sun-Cheol;Lee, Bong-Su;Min, Byeong-Chan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.23 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • The purpose of this study was to develop an automatic expert system for the evaluation of human sensibility, where human sensibility can be inferred from objective physiological signals. The study aim was also to develop an algorithm in which human arousal and pleasant level can be judged by using measured physiological signals. Fuzzy theory was applied for mathematical handling of the ambiguity related to evaluation of human sensibility. and the degree of belonging to a certain sensibility dimension was quantified by membership function through which the sensibility evaluation was able to be done. Determining membership function was achieved using results from a physiological signal database of arousal/relaxation and pleasant/unpleasant that was generated from imagination. To induce one final result (arousal and pleasant level) based on measuring the results of more than 2 physiological signals and the membership function of each physiological signal. Dempster-Shafer's rule of combination in evidence was applied, through which the final arousal and pleasant level was inferred.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

An Efficient Dempster-Shafer Evidence Combination Scheme for Uncertainty Handling (불확실성 처리를 위한 효율적 뎀스터 쉐이퍼 증거병합 방법)

  • Lee, Gye-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.908-914
    • /
    • 1996
  • A number of techniques have been studied for handling uncertainty in the development of expert systems. One of techniques adopted in many expert systems is the Dumpster-Shafer Evidence combination scheme. This has been the main focus among others due to is favorable features and computational complexity. In this paper, we develop and algorithm to deal with the exponential complexity inherent in Dempster-Shafer evidence combination. In the evidence combination process, we divide the frame of discernment into two groups, one for those common in both belief functions and the other for the rest. A property is found that in computing new belief function for the latter group, the result of evidence combination show linear change. The irrelevancy factor is derived and used to compute the change. The main idea of the method is to reduce the size of the frame of discernment and thus exponential complexity.

  • PDF

Data Fusion Algorithm based on Inference for Anomaly Detection in the Next-Generation Intrusion Detection (차세대 침입탐지에서 이상탐지를 위한 추론 기반 데이터 융합 알고리즘)

  • Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.233-238
    • /
    • 2016
  • In this paper, we propose the algorithms of processing the uncertainty data using data fusion for the next generation intrusion detection. In the next generation intrusion detection, a lot of data are collected by many of network sensors to discover knowledge from generating information in cyber space. It is necessary the data fusion process to extract knowledge from collected sensors data. In this paper, we have proposed method to represent the uncertainty data, by classifying where is a confidence interval in interval of uncertainty data through feature analysis of different data using inference method with Dempster-Shafer Evidence Theory. In this paper, we have implemented a detection experiment that is classified by the confidence interval using IRIS plant Data Set for anomaly detection of uncertainty data. As a result, we found that it is possible to classify data by confidence interval.

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

  • Senthil, T.;Kannapiran, Dr.B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5437-5454
    • /
    • 2016
  • A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.

Belief Function Retraction and Tracing Algorithm for Rule Refinement

  • Lee, Gye Sung
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.94-101
    • /
    • 2019
  • Building a stable knowledge base is an important issue in the application of knowledge engineering. In this paper, we present an algorithm for detecting and locating discrepancies in the line of the reasoning process especially when discrepancies occur on belief values. This includes backtracking the rule firing from a goal node of the rule network. Retracting a belief function allows the current belief state to move back to another belief state without the rule firing. It also gives an estimate, called contribution measure, of how much the rule has an impact on the current belief state. Examining the measure leads the expert to locate the possible cause of problem in the rule. For non-monotonic reasoning, the belief retraction method moves the belief state back to the previous state. A tracing algorithm is presented to identify and locate the cause of problem. This also gives repair suggestions for rule refinement.

3 phase Power Transformer Protective Relaying Algorithm based on Fuzzy Inference (Fuzzy 추론을 이용한 3상 전력용 변압기 보호계전 알고리즘)

  • Kim, S.T.;Jin, B.G.;Chung, S.K.;Lee, S.J.;Kang, S.H.;Yoon, S.H.;Lee, S.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.197-199
    • /
    • 2000
  • The various criteria to identify the disturbances of the power transformer has been reported in this paper. They have been derived through EMTP simulations of internal faults, inrush and overexcitation for the model of 154/22.9[kV], 40[MVA], Y-Y three-phase power transformer. We also propose the algorithm which makes bpa Functions and infers the final decision from them based on Modfied Dempster-Shafer's rule of combination.

  • PDF