• Title/Summary/Keyword: Fuzzy Rule-based Model

Search Result 188, Processing Time 0.026 seconds

Identification of Fuzzy-Radial Basis Function Neural Network Based on Mountain Clustering (Mountain Clustering 기반 퍼지 RBF 뉴럴네트워크의 동정)

  • Choi, Jeoung-Nae;Oh, Sung-Kwun;Kim, Hyun-Ki
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • This paper concerns Fuzzy Radial Basis Function Neural Network (FRBFNN) and automatic rule generation of extraction of the FRBFNN by means of mountain clustering. In the proposed network, the membership functions of the premise part of fuzzy rules do not assume any explicit functional forms such as Gaussian, ellipsoidal, triangular, etc., so its resulting fitness values (degree of membership) directly rely on the computation of the relevant distance between data points. Also, we consider high-order polynomial as the consequent part of fuzzy rules which represent input-output characteristic of sup-space. The number of clusters and the centers of clusters are automatically generated by using mountain clustering method based on the density of data. The centers of cluster which are obtained by using mountain clustering are used to determine a degree of membership and weighted least square estimator (WLSE) is adopted to estimate the coefficients of the consequent polynomial of fuzzy rules. The effectiveness of the proposed model have been investigated and analyzed in detail for the representative nonlinear function.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Estimation of Wind Turbine Power Generation using Cascade Architectures of Fuzzy-Neural Networks (종속형 퍼지-뉴럴 네트워크를 이용한 풍력발전기 출력 예측)

  • Kim, Seong-Min;Lee, Dong-Hoon;Jang, Jong-In;Won, Jung-Cheol;Kang, Tae-Ho;Yim, Yeong-Keun;Han, Chang-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1098_1099
    • /
    • 2009
  • In this paper, we present the estimation of wind turbine power generation using Cascade Architectures of Fuzzy Neural Networks(CAFNN). The proposed model uses the wind speed average, the standard deviation and the past output power as input data. The CAFNN identification process uses a 10-min average wind speed with its standard deviation. The method for rule-based fuzzy modeling uses Gaussian membership function. It has three fuzzy variables with three modifiable parameters. The CAFNN's configuration has three Logic Processors(LP) that are constructed cascade architecture and an effective optimization method uses two-level genetic algorithm. First, The CAFNN is trained with one-day average input variables. Once the CAFNN has been trained, test data are used without any update. The main advantage of using CAFNN is having simple structure of system with many input variables. Therefore, The proposed CAFNN technique is useful to predict the wind turbine(WT) power effectively and hence that information will be helpful to decide the control strategy for the WT system operation and application.

  • PDF

A Study on Fuzzy Wavelet LDA Mixed Model for an effective Face Expression Recognition (효과적인 얼굴 표정 인식을 위한 퍼지 웨이브렛 LDA융합 모델 연구)

  • Rho, Jong-Heun;Baek, Young-Hyun;Moon, Sung-Ryong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.759-765
    • /
    • 2006
  • In this paper, it is proposed an effective face expression recognition LDA mixed mode using a triangularity membership fuzzy function and wavelet basis. The proposal algorithm gets performs the optimal image, fuzzy wavelet algorithm and Expression recognition is consisted of face characteristic detection step and face Expression recognition step. This paper could applied to the PCA and LDA in using some simple strategies and also compares and analyzes the performance of the LDA mixed model which is combined and the facial expression recognition based on PCA and LDA. The LDA mixed model is represented by the PCA and the LDA approaches. And then we calculate the distance of vectors dPCA, dLDA from all fates in the database. Last, the two vectors are combined according to a given combination rule and the final decision is made by NNPC. In a result, we could showed the superior the LDA mixed model can be than the conventional algorithm.

Preference-based Supply Chain Partner Selection Using Fuzzy Ontology (퍼지 온톨로지를 이용한 선호도 기반 공급사슬 파트너 선정)

  • Lee, Hae-Kyung;Ko, Chang-Seong;Kim, Tai-Oun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.37-52
    • /
    • 2011
  • Supply chain management is a strategic thinking which enhances the value of supply chain and adapts more promptly for the changing environment. For the seamless partnership and value creation in supply chains, information and knowledge sharing and proper partner selection criteria must be applied. Thus, the partner selection criteria are critical to maintain product quality and reliability. Each part of a product is supplied by an appropriate supply partner. The criteria for selecting partners are technological capability, quality, price, consistency, etc. In reality, the criteria for partner selection may change according to the characteristics of the components. When the part is a core component, quality factor is the top priority compared to the price. For a standardized component, lower price has a higher priority. Sometimes, unexpected case occurs such as emergency order in which the preference may shift on the top. Thus, SCM partner selection criteria must be determined dynamically according to the characteristics of part and its context. The purpose of this research is to develop an OWL model for the supply chain partnership depending on its context and characteristics of the parts. The uncertainty of variable is tackled through fuzzy logic. The parts with preference of numerical value and context are represented using OWL. Part preference is converted into fuzzy membership function using fuzzy logic. For the ontology reasoning, SWRL (Semantic Web Rule Language) is applied. For the implementation of proposed model, starter motor of an automobile is adopted. After the fuzzy ontology is constructed, the process of selecting preference-based supply partner for each part is presented.

Image Analysis Fuzzy System

  • Abdelwahed Motwakel;Adnan Shaout;Anwer Mustafa Hilal;Manar Ahmed Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.163-177
    • /
    • 2024
  • The fingerprint image quality relies on the clearness of separated ridges by valleys and the uniformity of the separation. The condition of skin still dominate the overall quality of the fingerprint. However, the identification performance of such system is very sensitive to the quality of the captured fingerprint image. Fingerprint image quality analysis and enhancement are useful in improving the performance of fingerprint identification systems. A fuzzy technique is introduced in this paper for both fingerprint image quality analysis and enhancement. First, the quality analysis is performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thickness ratio (RVTR), and the Global Contrast Factor (GCF). A fuzzy logic technique that uses Mamdani fuzzy rule model is designed. The fuzzy inference system is able to analyse and determinate the fingerprint image type (oily, dry or neutral) based on the extracted feature values and the fuzzy inference rules. The percentages of the test fuzzy inference system for each type is as follow: For dry fingerprint the percentage is 81.33, for oily the percentage is 54.75, and for neutral the percentage is 68.48. Secondly, a fuzzy morphology is applied to enhance the dry and oily fingerprint images. The fuzzy morphology method improves the quality of a fingerprint image, thus improving the performance of the fingerprint identification system significantly. All experimental work which was done for both quality analysis and image enhancement was done using the DB_ITS_2009 database which is a private database collected by the department of electrical engineering, institute of technology Sepuluh Nopember Surabaya, Indonesia. The performance evaluation was done using the Feature Similarity index (FSIM). Where the FSIM is an image quality assessment (IQA) metric, which uses computational models to measure the image quality consistently with subjective evaluations. The new proposed system outperformed the classical system by 900% for the dry fingerprint images and 14% for the oily fingerprint images.

Implementation of an interval Based expert system for diagnoisis of Oriental Traditional Medicine

  • Phuong, Nguyen-Hoang;Duong, Uong-Huong;Kwak, Yun-Sik
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.486-495
    • /
    • 2001
  • This paper describes an implementation of the interval based expert system for syndrome differential diagnosis of Oriental Traditional Medicine (OTM). An approximate reasoning model using fuzzy logic for syndrome differential diagnosis is proposed. Based on this model, we implemented the system for diagnosing Eight rule diagnosis, organ diagnosis and then final differential syndrome of OTM. After carrying out inference process, the system will provide patient\`s syndromes differentiation diagnosis in the intervals and will give the explanation, which helps the user to understand the obtained conclusions.

  • PDF

Protectability: An Index to Indicate Protection Level of Primary Distribution Systems

  • Lee, Seung-Jae;Park, Myeon-Song;Kang, Sang-Hee;Kim, Sang-Tae
    • KIEE International Transactions on Power Engineering
    • /
    • v.3A no.1
    • /
    • pp.7-16
    • /
    • 2003
  • A new method to evaluate the protection capability of distribution systems is reported in this paper. This work describes the fuzzy evaluation attributes and aggregation method of evaluation results based on a hierarchical model and the modified combination rule. An evaluation grade index called "protectability" is proposed and is expected to be a very uscful tool in defining an optimal protection and realizing the adaptive protection.rotection.

Knowledge-Based Dynamic Structuring of Process Control Systems

  • de Silba, Clarence W.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1137-1140
    • /
    • 1993
  • A dynamic-structure system is one that has the flexibility to change the system configuration automatically so as to operate in an optimal manner. A conceptural model for a dynamic-structure system is presented in this paper. In this model, the interchangeable components of the overall system are grouped together. Their activity levels are evaluated by an intelligent preprocessor that is associated with the group. A knowledge-based task distribution system evaluates the activity levels and makes decisions as to how the components operating below capacity should be shared with workcells that have similar components that are overloaded. Associated decision making can be effected through fuzzy logic and particularly the compositional rule of inference. A simulation example is given to illustrate the application of dynamic structuring.

  • PDF

Automatic Control for Ship Automatic Collision Avoidance Support (선박자동충돌회피지원을 위한 자동제어)

  • 임남균
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.81-86
    • /
    • 2003
  • The studies on automatic ship collision avoidance system, which have been carried out last 10 years, are facing on new situation due to newly developed high technology such as computer and other information system. It was almost impossible to make it used in real navigation 3-4 years ago because of the absence of the tool to get other ship's information, however recently developed technology suggests new possibility. This study is carried out to develop the algorithm of automatic ship collision support system. The NOMOTO ship's mathematic model is adopted in simulation for its simplicity. The fuzzy reason rules are used for course-keeping system and for the calculation of Collision Risk using TCPA/DCPA. Moreover‘encounter type’ between two ships is analyzed based on Regulations for Preventing Collisions at Sea and collision avoidance action is suggested, Some situations are simulated to verity the developed algorithm and appropriate avoidance action is shown in the simulation.

  • PDF