• Title/Summary/Keyword: imprecise data

Search Result 74, Processing Time 0.023 seconds

A Study on The Determination of Target Value in Quality Function Deployment (품질기능전개에서의 목표값 결정에 관한 연구)

  • 장현수
    • Journal of the Korea Safety Management & Science
    • /
    • v.1 no.1
    • /
    • pp.101-110
    • /
    • 1999
  • QFD is a market driven design and development methodology for products and services to meet or exceed customer's needs and expectations, This method enables to specify clearly the customer's needs and then evaluate the product capability in terms of its impact on meeting those needs. Process of satisfying customers begins with effectively soliciting their different needs and wants which may be non-technical and imprecise in nature. Although the HoQ is a comprehensive tool for showing the relationships between attributes, it lacks the flexibility to deal with the inherent inexactness and vagueness in the voice of customer. In this paper, fuzzy theory is introduced to overcome this limitation. Qualitative customer requirements are interpreted quantitative data through fuzzy inference procedure, and then target value is determined.

  • PDF

The accuracy of the depth perception of 3-dimensional images (이안식 입체영상에서 심도지각의 정확성에 관한 연구)

  • Cho, Am
    • Proceedings of the ESK Conference
    • /
    • 1994.04a
    • /
    • pp.19-31
    • /
    • 1994
  • The accurate error size and discrimination region in the perception of depth amount from 3- dimensional images by the human visual system will be the basic data for the utilization and application of the binocular 3 - Dimensional image system. This paper is focused on studying the accuracy of the depth amount perceived from 3-dimensional images by the human visual system. From the performed experiment, the following results have been obtained: (1) The depth amount perceived from the binocular 3-dimensional images has been displayed by a proper scale of distance, and found to be imprecise and also have a large variance. (2) In utilizing the binocular 3-dimensional image system, it seems more appropriate to make the images viewed outward rather than inward from the screen in the regard of error and variance. (3) The binocular 3- dimensional image system can be effectively applied to displaying unreal space, for example, the layout of room in design, from the viewpoint of perception characteristics of depth amount.

  • PDF

A methodology for Internet Customer segmentation using Decision Trees

  • Cho, Y.B.;Kim, S.H.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2003.05a
    • /
    • pp.206-213
    • /
    • 2003
  • Application of existing decision tree algorithms for Internet retail customer classification is apt to construct a bushy tree due to imprecise source data. Even excessive analysis may not guarantee the effectiveness of the business although the results are derived from fully detailed segments. Thus, it is necessary to determine the appropriate number of segments with a certain level of abstraction. In this study, we developed a stopping rule that considers the total amount of information gained while generating a rule tree. In addition to forwarding from root to intermediate nodes with a certain level of abstraction, the decision tree is investigated by the backtracking pruning method with misclassification loss information.

  • PDF

Expert Opinion Elicitation Process Using a Fuzzy Probability

  • Yu, Donghan
    • Nuclear Engineering and Technology
    • /
    • v.29 no.1
    • /
    • pp.25-34
    • /
    • 1997
  • This study presents a new approach for expert opinion elicitation process to assess an uncertainty inherent in accident management. The need to work with rare event and limited data in accident management leads analysis to use expert opinions extensively. Unlike the conventional approach using point-valued probabilities, the study proposes the concept of fuzzy probability to represent expert opinion. The use of fuzzy probability has an advantage over the conventional approach when an expert's judgment is used under limited dat3 and imprecise knowledge. The study demonstrates a method of combining and propagating fuzzy probabilities. finally, the proposed methodology is applied to the evaluation of the probability of a bottom head failure for the flooded case in the Peach Bottom BWR nuclear power plant.

  • PDF

On Mathematical Representation and Integration Theory for GIS Application of Remote Sensing and Geological Data

  • Moon, Woo-Il M.
    • Korean Journal of Remote Sensing
    • /
    • v.10 no.2
    • /
    • pp.37-48
    • /
    • 1994
  • In spatial information processing, particularly in non-renewable resource exploration, the spatial data sets, including remote sensing, geophysical and geochemical data, have to be geocoded onto a reference map and integrated for the final analysis and interpretation. Application of a computer based GIS(Geographical Information System of Geological Information System) at some point of the spatial data integration/fusion processing is now a logical and essential step. It should, however, be pointed out that the basic concepts of the GIS based spatial data fusion were developed with insufficient mathematical understanding of spatial characteristics or quantitative modeling framwork of the data. Furthermore many remote sensing and geological data sets, available for many exploration projects, are spatially incomplete in coverage and interduce spatially uneven information distribution. In addition, spectral information of many spatial data sets is often imprecise due to digital rescaling. Direct applications of GIS systems to spatial data fusion can therefore result in seriously erroneous final results. To resolve this problem, some of the important mathematical information representation techniques are briefly reviewed and discussed in this paper with condideration of spatial and spectral characteristics of the common remote sensing and exploration data. They include the basic probabilistic approach, the evidential belief function approach (Dempster-Shafer method) and the fuzzy logic approach. Even though the basic concepts of these three approaches are different, proper application of the techniques and careful interpretation of the final results are expected to yield acceptable conclusions in cach case. Actual tests with real data (Moon, 1990a; An etal., 1991, 1992, 1993) have shown that implementation and application of the methods discussed in this paper consistently provide more accurate final results than most direct applications of GIS techniques.

Systematic Elicitation of Proximity for Context Management

  • Kim Chang-Suk;Lee Sang-Yong;Son Dong-Cheul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.2
    • /
    • pp.167-172
    • /
    • 2006
  • As ubiquitous devices are fast spreading, the communication problem between humans and these devices is on the rise. The use of context is important in interactive application such as handhold and ubiquitous computing. Context is not crisp data, so it is necessary to introduce the fuzzy concept. The proxity relation is represented by the degree of closeness or similarity between data objects of a scalar domain. A context manager of context-awareness system evaluates imprecise queries with the proximity relations. in this paper, a systematic proximity elicitation method are proposed. The proposed generation method is simple and systematic. It is based on the well-known fuzzy set theory and applicable to the real world applications because it has tuning parameter and weighting factor. The proposed representations of proximity relation is more efficient than the ordinary matrix representation since it reflects some properties of a proximity relation to save space. We show an experiments of quantitative calculate for the proximity relation. And we analyze the time complexity and the space occupancy of the proposed representation method.

Fuzzy Structured Query Language (FSQL) for Relational Database Systems (관계형 데이터베이스 시스템을 위한 퍼지 질의어 (FSQL))

  • Jung Eun-Young;Park Soon Cheol;Lee Sang Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.3
    • /
    • pp.265-269
    • /
    • 2005
  • A fuzzy query language, called FSQL, in the relational databases is introduced in this paper. In general, database systems have query systems which are able to retrieve and manipulate precise data. However, such queries are hard to operate on the real world applications since their queries are often imprecise or incomplete. Recently, considerable attention has been given to research dealing with vagueness of the query in relational database systems. In this paper we have suggested an effective method of accepting vagueness of the query in data processing. The syntax of FSQL is formally defined with EBNF, and an interpreter of FSQL has been implemented as a prototype.

  • PDF

On relationship among h value, membership function, and spread in fuzzy linear regression using shape-preserving operations

  • Hong, Dug-Hun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.306-310
    • /
    • 2008
  • Fuzzy regression, a nonparametric method, can be quite useful in estimating the relationships among variables where the available data are very limited and imprecise. It can also serve as a sound methodology that can be applied to a variety of management and engineering problems where variables are interacting in an uncertain, qualitative, and fuzzy way. A close examination of the fuzzy regression algorithm reveals that the resulting possibility distribution of fuzzy parameters, which makes this technique attractive in a fuzzy environment, is dependent upon an h parameter value. The h value, which is between 0 and 1, is referred to as the degree of fit of the estimated fuzzy linear model to the given data, and is subjectively selected by a decision maker (DM) as an input to the model. The selection of a proper value of h is important in fuzzy regression, because it determines the range of the posibility ditributions of the fuzzy parameters. In this paper, we discuss the interdependent relationship among the h value, membership function shape, and the spreads of fuzzy parameters in fuzzy linear regression with fuzzy input-output using shape-preserving operations.

  • PDF

Relationship Among h Value, Membership Function, and Spread in Fuzzy Linear Regression using Shape-preserving Operations

  • Hong, Dug-Hun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.306-311
    • /
    • 2008
  • Fuzzy regression, a nonparametric method, can be quite useful in estimating the relationships among variables where the available data are very limited and imprecise. It can also serve as a sound methodology that can be applied to a variety of management and engineering problems where variables are interacting in an uncertain, qualitative, and fuzzy way. A close examination of the fuzzy regression algorithm reveals that the resulting possibility distribution of fuzzy parameters, which makes this technique attractive in a fuzzy environment, is dependent upon an h parameter value. The h value, which is between 0 and 1, is referred to as the degree of fit of the estimated fuzzy linear model to the given data, and is subjectively selected by a decision maker (DM) as an input to the model. The selection of a proper value of h is important in fuzzy regression, because it determines the range of the posibility ditributions of the fuzzy parameters. In this paper, we discuss the interdependent relationship among the h value, membership function shape, and the spreads of fuzzy parameters in fuzzy linear regression with fuzzy input-output using shape-preserving operations.

A Study on The Prediction of Security Threat using Open Vulnerability List (오픈 취약성 목록을 이용한 보안 위협 예측에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.3-10
    • /
    • 2011
  • Recently, due to a series of DDoS attacks, government agencies have enhanced security measures and business-related legislation. However, service attack and large network violations or accidents are most likely to occur repeatedly in the near future. In order to prevent this problem, researches must be conducted to predict the vulnerability in advance. The existing research methods do not state the specific data used for the base of the prediction, making the method more complex and imprecise. Therefore this study was conducted using the vulnerability data used for the basis of machine learning technology prediction, which were retrieved from a reputable organization. Also, the study suggested ways to predict the future vulnerabilities based on the weaknesses found in prior methods, and certified the efficiency using experiments.