• Title/Summary/Keyword: fuzzy Logic

Search Result 2,948, Processing Time 0.035 seconds

Networked Robots using ATLAS Service-Oriented Architecture in the Smart Spaces

  • Helal, Sumi;Bose, Raja;Lim, Shin-Young;Kim, Hyun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.288-298
    • /
    • 2008
  • We introduce new type of networked robot, Ubiquitous Robotic Companion (URC), embedded with ATLAS Service-oriented architecture for enhancing the space sensing capability. URC is a network-based robotic system developed by ETRI. For years of experience in deploying service with ATLAS sensor platform for elder and people with special needs in smart houses, we need networked robots to assist elder people in their successful daily living. Recently, pervasive computing technologies reveals possibilities of networked robots in smart spaces, consist of sensors, actuators and smart devices can collaborate with the other networked robot as a mobile sensing platform, a complex and sophisticated actuator and a human interface. This paper provides our experience in designing and implementing system architecture to integrate URC robots in pervasive computing environments using the University of Florida's ATLAS service-oriented architecture. In this paper, we focus on the integrated framework architecture of URC embedded with ATLAS platform. We show how the integrated URC system is enabled to provide better services which enhance the space sensing of URC in the smart space by applying service-oriented architecture characterized as flexibility in adding or deleting service components of Ubiquitous Robotic Companion.

The Design and Implementation of Anomaly Traffic Analysis System using Data Mining

  • Lee, Se-Yul;Cho, Sang-Yeop;Kim, Yong-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.316-321
    • /
    • 2008
  • Advanced computer network technology enables computers to be connected in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, which makes it vulnerable to previously unidentified attack patterns and variations in attack and increases false negatives. Intrusion detection and analysis technologies are thus required. This paper investigates the asymmetric costs of false errors to enhance the performances the detection systems. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors, this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of anomaly traffic detection is enhanced by considering the costs of false errors.

A Framework for Universal Cross Layer Networks

  • Khalid, Murad;Sankar, Ravi;Joo, Young-Hoon;Ra, In-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.239-247
    • /
    • 2008
  • In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.

Prediction Table for Marine Traffic for Vessel Traffic Service Based on Cognitive Work Analysis

  • Kim, Joo-Sung;Jeong, Jung Sik;Park, Gyei-Kark
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.315-323
    • /
    • 2013
  • Vessel Traffic Service (VTS) is being used at ports and in coastal areas of the world for preventing accidents and improving efficiency of the vessels at sea on the basis of "IMO RESOLUTION A.857 (20) on Guidelines for Vessel Traffic Services". Currently, VTS plays an important role in the prevention of maritime accidents, as ships are required to participate in the system. Ships are diversified and traffic situations in ports and coastal areas have become more complicated than before. The role of VTS operator (VTSO) has been enlarged because of these reasons, and VTSO is required to be clearly aware of maritime situations and take decisions in emergency situations. In this paper, we propose a prediction table to improve the work of VTSO through the Cognitive Work Analysis (CWA), which analyzes the VTS work very systematically. The required data were collected through interviews and observations of 14 VTSOs. The prediction tool supports decision-making in terms of a proactive measure for the prevention of maritime accidents.

The Development of Multi-Fault Restoration Algorithm for Distribution Network (배전계통 광역 정전복구 알고리즘 개발)

  • Jung, Jin-Soo;Lee, Seung-Jae;Jung, Jong-Wook;Lim, Young-Bae;Bae, Seok-Myung;Yi, Geon-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.3
    • /
    • pp.69-77
    • /
    • 2006
  • This paper presents the service restoration in electric power distribution systems. The aim of the service restoration is to control an emergency taken place in distribution systems and to restore out-of service areas as soon as possible when a fault occurs in distribution systems. For this reason, new service restoration strategies in multi-outage area are suggested in this paper. The suggested algorithm consist of two schemes. One is an individual restoration scheme, the other is an integrated restoration scheme. The former determines a restoration order of outage areas based on a restoration index. Unless the former scheme can generate a feasible restoration plan, the latter one will try to find out a new configuration without an overloaded section through tie exchange method.

A Complex Noise Suppression Algorithm for On-line Partial Discharge Diagnosis Systems (운전중 부분방전 진단시스템을 위한 복합 잡음제거 기법)

  • Yi, Sang-Hwa;Youn, Young-Woo;Choo, Young-Bae;Kang, Dong-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.2
    • /
    • pp.342-348
    • /
    • 2009
  • This paper introduces a novel denoising algorithm for the partial-discharge(PD) signals from power apparatuses. The developed algorithm includes three kinds of specific denoising sub-algorithms. The first sub-algorithm uses the fuzzy logic which classifies the noise types in the magnitude versus phase PD pattern. This sub-algorithm is especially effective in the rejection of the noise with high and constant magnitude. The second one is the method simply removing the pulses in the phase sections below the threshold count in the count versus phase pattern. This method is effective in removing the occasional high level noise pulses. The last denoising sub-algorithm uses the grouping characteristics of PD pulses in the 3D plot of the magnitude versus phase versus cycle. This special technique can remove the periodical noise pulses with varying magnitudes, which are very difficult to be removed by other denoising methods. Each of the sub-algorithm has different characteristic and shows different quality of the noise rejection. On that account, a parameter which numerically expresses the noise possessing degree of signal, is defined and evaluated. Using the parameter and above three sub-algorithms, an adaptive complex noise rejection algorithm for the on-line PD diagnosis system is developed. Proposed algorithm shows good performances in the various real PD signals measured from the power apparatuses in the Korean plants.

Error Analysis of a Sensorless Position Estimation Considering Noise for Switched Reluctance Motor (노이즈 성분을 고려한 SRM 센서리스 위치 추정의 오차 해석)

  • 김갑동;최재동;이학주;안재황;성세진
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.6 no.1
    • /
    • pp.74-81
    • /
    • 2001
  • The sensorless scheme for Switched Reluctance Motor(SRM) drives must have the robustness and reliability because the noise and error are sensitive. These elements make electrically noisy environments due to the proximity of high current power circuits with small signal electronic circuits when SRM drives. Also, due to the leakage inductances and finite coupling capacitances, these can cause the noise on any low voltage current and voltage measurement circuit. The position estimate error occurs because the current and voltage including the noise are sued as the inputs of sensorless algorithm. In this paper the high robustness and resistance of input noise re described. The fuzzy logic based rotor estimation algorithm and the observer model are used to reduce the tolerance of input data.

  • PDF

Iris Recognition Based on a Shift-Invariant Wavelet Transform

  • Cho, Seongwon;Kim, Jaemin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.322-326
    • /
    • 2004
  • This paper describes a new iris recognition method based on a shift-invariant wavelet sub-images. For the feature representation, we first preprocess an iris image for the compensation of the variation of the iris and for the easy implementation of the wavelet transform. Then, we decompose the preprocessed iris image into multiple subband images using a shift-invariant wavelet transform. For feature representation, we select a set of subband images, which have rich information for the classification of various iris patterns and robust to noises. In order to reduce the size of the feature vector, we quantize. each pixel of subband images using the Lloyd-Max quantization method Each feature element is represented by one of quantization levels, and a set of these feature element is the feature vector. When the quantization is very coarse, the quantized level does not have much information about the image pixel value. Therefore, we define a new similarity measure based on mutual information between two features. With this similarity measure, the size of the feature vector can be reduced without much degradation of performance. Experimentally, we show that the proposed method produced superb performance in iris recognition.

Learning of Emergent Behaviors in Collective Virtual Robots using ANN and Genetic Algorithm

  • Cho, Kyung-Dal
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.327-336
    • /
    • 2004
  • In distributed autonomous mobile robot system, each robot (predator or prey) must behave by itself according to its states and environments, and if necessary, must cooperate with other robots in order to carry out a given task. Therefore it is essential that each robot have both learning and evolution ability to adapt to dynamic environment. This paper proposes a pursuing system utilizing the artificial life concept where virtual robots emulate social behaviors of animals and insects and realize their group behaviors. Each robot contains sensors to perceive other robots in several directions and decides its behavior based on the information obtained by the sensors. In this paper, a neural network is used for behavior decision controller. The input of the neural network is decided by the existence of other robots and the distance to the other robots. The output determines the directions in which the robot moves. The connection weight values of this neural network are encoded as genes, and the fitness individuals are determined using a genetic algorithm. Here, the fitness values imply how much group behaviors fit adequately to the goal and can express group behaviors. The validity of the system is verified through simulation. Besides, in this paper, we could have observed the robots' emergent behaviors during simulation.

Datamining: Roadmap to Extract Inference Rules and Design Data Models from Process Data of Industrial Applications

  • Bae Hyeon;Kim Youn-Tae;Kim Sung-Shin;Vachtsevanos George J.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.200-205
    • /
    • 2005
  • The objectives of this study were to introduce the easiest and most proper applications of datamining in industrial processes. Applying datamining in manufacturing is very different from applying it in marketing. Misapplication of datamining in manufacturing system results in significant problems. Therefore, it is very important to determine the best procedure and technique in advance. In previous studies, related literature has been introduced, but there has not been much description of datamining applications. Research has not often referred to descriptions of particular examples dealing with application problems in manufacturing. In this study, a datamining roadmap was proposed to support datamining applications for industrial processes. The roadmap was classified into three stages, and each stage was categorized into reasonable classes according to the datamining purposed. Each category includes representative techniques for datamining that have been broadly applied over decades. Those techniques differ according to developers and application purposes; however, in this paper, exemplary methods are described. Based on the datamining roadmap, nonexperts can determine procedures and techniques for datamining in their applications.