• Title/Summary/Keyword: Fuzzy module

Search Result 165, Processing Time 0.023 seconds

Improvement of Strategy Algorithm for Soccer Robot (축구 로봇의 전략 알고리즘 개선)

  • 김재현;이대훈;이성민;최환도;김중완
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.177-181
    • /
    • 2001
  • This paper presents an strategy algorithm of a soccer robot. We simply classified strategy of soccer robot as attack and defense. We use DC-motor in our Soccer Robot. We use the vision system made by MIRO team of Kaist and Soty team for image processing. Host computer is made by Pentium III. The RF module is used for the communication between each robot and the host computer. Fuzzy logic is applied to the path planning of our robot. We improve strategy algorithm of soccer robot. Here we explain improvement of strategy algorithm and fault of the our soccer robot system.

  • PDF

Development of On-line Performance Diagnostic Program of a Helicopter Turboshaft Engine

  • Kong, Chang-Duk;Koo, Young-Ju;Kho, Seong-Hee;Ryu, Hye-Ok
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.10 no.2
    • /
    • pp.34-42
    • /
    • 2009
  • Gas turbine performance diagnostics is a method for detecting, isolating and quantifying faults in gas turbine gas path components. On-line precise fault diagnosis can promote greatly reliability and availability of gas turbine in real time operation. This work proposes a GUI-type on-line diagnostic program using SIMULINK and Fuzzy-Neuro algorithms for a helicopter turboshaft engine. During development of the diagnostic program, a look-up table type base performance module are used for reducing computer calculating time and a signal generation module for simulating real time performance data. This program is composed of the on-line condition monitoring program to monitor on-line measuring performance condition, the fuzzy inference system to isolate the faults from measuring data and the neural network to quantify the isolated faults. Evaluation of the proposed on-line diagnostic program is performed through application to the helicopter engine health monitoring.

Analysis of Dynamic Model and Design of Optimized Fuzzy PID Controller for Constant Pressure Control (정압제어를 위한 동적모델 해석 및 최적 퍼지 PID 제어기설계)

  • Oh, Sung-Kwun;Cho, Se-Hee;Lee, Seung-Joo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.2
    • /
    • pp.303-311
    • /
    • 2012
  • In this study, we introduce a dynamic process model as well as the design methodology of optimized fuzzy controller for its efficient application to vacuum production system to produce a semiconductor, solar module and display and so on. In a vacuum control field, PID control method is widely used from the viewpoint of simple structure and preferred performance. But, PID control method is very sensitive to the change of environment of control system as well as the change of control parameters. Therefore, it's difficult to get a preferred performance results from target system which has a complicated structure and lots of nonlinear factors. To solve such problem, we propose the design methodology of an optimized fuzzy PID controller through a following series of steps. First a dynamic characteristic of the target system is analyzed through a series of experiments. Second the process model is built up and its characteristic is compared with real process. Third, the optimized fuzzy PID controller is designed using genetic algorithms. Finally, the fuzzy controller is applied to target system and then its performance is compared with that of other conventional controllers(PID, PI, and Fuzzy PI controller). The performance of the proposed fuzzy controller is evaluated in terms of auto-tuned control parameters and output responses considered by ITAE index, overshoot, rise time and steady state time.

Layout Optimization of FPSO Topside High Pressure Equipment Considering Fire Accidents with Wind Direction (풍향에 따른 화재영향을 고려한 FPSO 상부구조물 고압가스 모듈내부의 장비 최적배치 연구)

  • Bae, Jeong-Hoon;Jeong, Yeon-Uk;Shin, Sung-Chul;Kim, Soo-Young
    • Journal of Ocean Engineering and Technology
    • /
    • v.28 no.5
    • /
    • pp.404-410
    • /
    • 2014
  • The purpose of this study was to find the optimal arrangement of FPSO equipment in a module while considering the economic value and fire risk. We estimated the economic value using the pipe connections and pump installation cost in an HP (high pressure) gas compression module. The equipment risks were also analyzed using fire scenarios based on historical data. To consider the wind effect during a fire accident, fuzzy modeling was applied to improve the accuracy of the analysis. The objective functions consisted of the economic value and fire risk, and the constraints were the equipment maintenance and weight balance of the module. We generated a Pareto-optimal front group using a multi-objective GA (genetic algorithm) and suggested an equipment arrangement method that included the opinions of the designer.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Golf Swing Classification Using Fuzzy System (퍼지 시스템을 이용한 골프 스윙 분류)

  • Park, Junwook;Kwak, Sooyeong
    • Journal of Broadcast Engineering
    • /
    • v.18 no.3
    • /
    • pp.380-392
    • /
    • 2013
  • A method to classify a golf swing motion into 7 sections using a Kinect sensor and a fuzzy system is proposed. The inputs to the fuzzy logic are the positions of golf club and its head, which are extracted from the information of golfer's joint position and color information obtained by a Kinect sensor. The proposed method consists of three modules: one for extracting the joint's information, another for detecting and tracking of a golf club, and the other for classifying golf swing motions. The first module extracts the hand's position among the joint information provided by a Kinect sensor. The second module detects the golf club as well as its head with the Hough line transform based on the hand's coordinate. Using a fuzzy logic as a classification engine reduces recognition errors and, consequently, improves the performance of robust classification. From the experiments of real-time video clips, the proposed method shows the reliability of classification by 85.2%.

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Design Of Fuzzy Controller for the Steam Temperature Process in the Coal Fired Power Plant

  • Shin, Sang Doo;Kim, Yi-Gon;Lee, Bong Kuk;Bae, Young Chul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.187-192
    • /
    • 2004
  • In this paper, we proposed the method to design fuzzy controller using the experience of the operating expert and experimental numeric data for the robust control about the noise and disturbance instead of the traditional PID controller for the main steam temperature control of the thermal power plant. The temperature of main steam temperature process has to be controlled uniformly for the stable electric power output. The process has the problem of the hunting for the cases of various disturbances. In that case, the manual action of the operator happened to be introduced in some cases. We adopted the TSK (Takagi-Sugeno-Kang) model as the fuzzy controller and designed the fuzzy rules using the informations extracted directly from the real plant and various operating condition to solve the above problems and to apply practically. We implemented the real fuzzy controller as the Function Block module in the DCS(Distributed Control System) and evaluated the feasibility through the experimental results of the simulation.

A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack (서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구)

  • Lee, Se-Yul;Kim, Yong-Soo;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.148-153
    • /
    • 2003
  • A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.