• Title/Summary/Keyword: Fuzzy control technique

Search Result 522, Processing Time 0.026 seconds

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Risk Critical Point (RCP): A Quantifying Safety-Based Method Developed to Screen Construction Safety Risks

  • Soltanmohammadi, Mehdi;Saberi, Morteza;Yoon, Jin Hee;Soltanmohammadi, Khatereh;Pazhoheshfar, Peiman
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.3
    • /
    • pp.221-235
    • /
    • 2015
  • Risk assessment is an important phase of risk management. It is the stage in which risk is measured thoroughly to achieve effective management. Some factors such as probability and impact of risk have been used in the literature related to construction projects. Because in high-rise projects safety issues are paramount, this study has tried to develop a quantifying technique that takes into account three factors: probability, impact and Safety Performance Index (SPI) where the SPI is defined as the capability of an appropriate response to reduce or limit the effect of an event after its occurrence with regard to safety pertaining to a project. Regarding risk-related literatures which cover an uncertain subject, the proposed method developed in this research is based on a fuzzy logic approach. This approach entails a questionnaire in which the subjectivity and vagueness of responses is dealt with by using triangular fuzzy numbers instead of linguistic terms. This method returns a Risk Critical Point (RCP) on a zoning chart that places risks under categories: critical, critical-probability, critical-impact, and non-critical. The high-rise project in the execution phase has been taken as a case study to confirm the applicability of the proposed method. The monitoring results showed that the RCP method has the inherent ability to be extended to subsequent applications in the phases of risk response and control.

Development of a Smart Oriental Medical System Using Security Functions

  • Hong, YouSik;Yoon, Eun-Jun;Heo, Nojeong;Kim, Eun-Ju;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.268-275
    • /
    • 2014
  • In future, hospitals are expected to automatically issue remote transcriptions. Many general hospitals are planning to encrypt their medical database to secure personal information as mandated by law. The electronic medical record system, picture archiving communication system, and the clinical data warehouse, amongst others, are the preferred targets for which stronger security is planned. In the near future, medical systems can be assumed to be automated and connected to remote locations, such as rural areas, and islands. Connecting patients who are in remote locations to medical complexes that are usually based in larger cities requires not only automatic processing, but also a certain amount of security in terms of medical data that is of a sensitive and critical nature. Unauthorized access to patients' transcription data could result in the data being modified, with possible lethal results. Hence, personal and sensitive data on telemedicine and medical information systems should be encrypted to protect patients from these risks. Login passwords, personal identification information, and biological information should similarly be protected in a systematic way. This paper proposes the use of electronic acupuncture with a built-in multi-pad, which has the advantage of being able to establish a patient's physical condition, while simultaneously treating the patient with acupuncture. This system implements a sensing pad, amplifier, a small signal drive circuit, and a digital signal processing system, while the use of a built-in fuzzy technique and a control algorithm have been proposed for performing analyses.

Using Bayesian network and Intuitionistic fuzzy Analytic Hierarchy Process to assess the risk of water inrush from fault in subsea tunnel

  • Song, Qian;Xue, Yiguo;Li, Guangkun;Su, Maoxin;Qiu, Daohong;Kong, Fanmeng;Zhou, Binghua
    • Geomechanics and Engineering
    • /
    • v.27 no.6
    • /
    • pp.605-614
    • /
    • 2021
  • Water inrush from fault is one of the most severe hazards during tunnel excavation. However, the traditional evaluation methods are deficient in both quantitative evaluation and uncertainty handling. In this paper, a comprehensive methodology method combined intuitionistic fuzzy AHP with a Bayesian network for the risk assessment of water inrush from fault in the subsea tunnel was proposed. Through the intuitionistic fuzzy analytic hierarchy process to replace the traditional expert scoring method to determine the prior probability of the node in the Bayesian network. After the field data is normalized, it is classified according to the data range. Then, using obtained results into the Bayesian network, conduct a risk assessment with field data which have processed of water inrush disaster on the tunnel. Simultaneously, a sensitivity analysis technique was utilized to investigate each factor's contribution rate to determine the most critical factor affecting tunnel water inrush risk. Taking Qingdao Kiaochow Bay Tunnel as an example, by predictive analysis of fifteen fault zones, thirteen of them are consistent with the actual situation which shows that the IFAHP-Bayesian Network method is feasible and applicable. Through sensitivity analysis, it is shown that the Fissure development and Apparent resistivity are more critical comparing than other factor especially the Permeability coefficient and Fault dip. The method can provide planners and engineers with adequate decision-making support, which is vital to prevent and control tunnel water inrush.

A Study on the Automatic Control for Collision Avoidance of the Ships (선박의 충돌회피를 위한 자동제어에 관한 기초적 연구)

  • Lee, Seung-Keon;Kwon, Bae-Jun
    • Journal of Navigation and Port Research
    • /
    • v.26 no.1
    • /
    • pp.8-14
    • /
    • 2002
  • The collisions of vessel at sea show high among the whole marine accidents. Especially, the accidents of fishing vessels take the largest portion of the collisions. Therefore, a technique to reduce these accidents should be developed. The automatic control for avoiding collision suggested in this study consists of two steps. The first is recognizing collision risk with fuzzy Theory and the other is maneuvering the model ship on the basis of collision risk calculated from the first step. The information form the position and estimated time of collision point(DCPA and TCPA) is used to assess the collision risk. To verify this system, a fishing vessel was simulated according to MMG mathematical model. The simulations result shows quite good application in avoiding the collision of ship.

A Modified Perturb and Observe Sliding Mode Maximum Power Point Tracking Method for Photovoltaic System uUnder Partially Shaded Conditions

  • Hahm, Jehun;Kim, Euntai;Lee, Heejin;Yoon, Changyong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.281-292
    • /
    • 2016
  • The proposed scheme is based on the modified perturb and observe (P&O) algorithm combined with the sliding mode technique. A modified P&O algorithm based sliding mode controller is developed to study the effects of partial shade, temperature, and insolation on the performance of maximum power point tracking (MPPT) used in photovoltaic (PV) systems. Under partially shaded conditions and temperature, the energy conversion efficiency of a PV array is very low, leading to significant power losses. Consequently, increasing efficiency by means of MPPT is particularly important. Conventional techniques are easy to implement but produce oscillations at MPP. The proposed method is applied to a model to simulate the performance of the PV system for solar energy usage, which is compared to the conventional methods under non-uniform insolation improving the PV system utilization efficiency and allowing optimization of the system performance. The modified perturb and observe sliding mode controller successfully overcomes the issues presented by non-uniform conditions and tracks the global MPP. Compared to MPPT techniques, the proposed technique is more efficient; it produces less oscillation at MPP in the steady state, and provides more precise tracking.

Implementation of Lighting Technique and Music Therapy for Improving Degree of Students Concentration During Lectures

  • Han, ChangPyoung;Hong, YouSik
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.116-124
    • /
    • 2020
  • The advantage of the distance learning universities based on the 4th Industrial Revolution is that anyone can conveniently take lectures anytime, anywhere on the web. In addition, research has been actively conducted on the effect of light color and temperature control upon student performance during online classes. However, research on how the conditions of subjects, lighting colors, and music selection improve the degree of a student's concentration during online lectures has not been completed. To solve these problems in this paper, we have developed automatic analysis system SW for the weak subjects of learners by applying intelligent analysis algorithm, have proposed and simulated music therapy and art therapy. Moreover, It proposed in this paper an algorithm for an automatic analysis system, which shows the weak subjects of learners by adopting intelligence analysis algorithms. We also have presented and simulated a music therapy and art therapy algorithms, based on the blended learning, in order to increase students concentration during lecture.

Measurement of DS-CDMA Propagation Distance in Underwater Acoustic Communication Considering Attenuation and Noise

  • Lee, Young-Pil;Moon, Yong Seon;Ko, Nak Yong;Choi, Hyun-Taek;Huang, Linyun;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.20-26
    • /
    • 2015
  • It is very difficult to design an underwater communication system because of multipath, Doppler effects, noise, and attenuation. These factors lead to errors in the communication performance and maximum propagation distance. In this study, we calculate the distance that can be realized using the direct-sequence code division multiple access (DS-CDMA) technique with direct-sequence spread spectrum (DSSS) in an underwater communication system considering only the attenuation and noise. We also compare the estimated and calculated propagation distances obtained for several different scenarios.

Observer-based sampled-data controller of linear system for the wave energy converter

  • Koo, Geun-Bum;Park, Jin-Bae;Joo, Young-Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.275-279
    • /
    • 2011
  • In this paper, an observer-based sampled-data controller of linear system is proposed for the wave energy converter. Based on the sampled-data observer, the controller is design. In the closed-loop system with controller, it obtains the norm inequality between the continuous-time state variable and the discrete-time one. Using the norm inequality, sufficient condition is derived for the asymptotic stability of the closed-loop system and formulated in terms of linear matrix inequality. Finally, the wave energy converter simulation is provided to verify the effectiveness of the proposed technique.

Human Adaptive Device Development based on TD method for Smart Home

  • Park, Chang-Hyun;Sim, Kwee-Bo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1072-1075
    • /
    • 2005
  • This paper presents that TD method is applied to the human adaptive devices for smart home with context awareness (or recognition) technique. For smart home, the very important problem is how the appliances (or devices) can adapt to user. Since there are many humans to manage home appliances (or devices), managing the appliances automatically is difficult. Moreover, making the users be satisfied by the automatically managed devices is much more difficult. In order to do so, we can use several methods, fuzzy controller, neural network, reinforcement learning, etc. Though the some methods could be used, in this case (in dynamic environment), reinforcement learning is appropriate. Among some reinforcement learning methods, we select the Temporal Difference learning method as a core algorithm for adapting the devices to user. Since this paper assumes the environment is a smart home, we simply explained about the context awareness. Also, we treated with the TD method briefly and implement an example by VC++. Thereafter, we dealt with how the devices can be applied to this problem.

  • PDF