• Title/Summary/Keyword: 정보 퍼지 네트워크

Search Result 169, Processing Time 0.035 seconds

Evaluation of Interpretability for Generated Rules from ANFIS (ANFIS에서 생성된 규칙의 해석용이성 평가)

  • Song, Hee-Seok;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.123-140
    • /
    • 2009
  • Fuzzy neural network is an integrated model of artificial neural network and fuzzy system and it has been successfully applied in control and forecasting area. Recently ANFIS(Adaptive Network-based Fuzzy Inference System) has been noticed widely among various fuzzy neural network models because of outstanding performance of control and forecasting accuracy. ANFIS has capability to refine its fuzzy rules interactively with human expert. In particular, when we use initial rule structure for machine learning which is generated from human expert, it is highly probable to reach global optimum solution as well as shorten time to convergence. We propose metrics to evaluate interpretability of generated rules as a means of acquiring domain knowledge and compare level of interpretability of ANFIS fuzzy rules to those of C5.0 classification rules. The proposed metrics also can be used to evaluate capability of rule generation for the various machine learning methods.

  • PDF

Fuzzy Controller Design for Selecting the Agent of Contract Net Protocol (계약망 프로토콜의 에이전트 선택을 위한 퍼지 컨트롤러 설계)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.251-260
    • /
    • 2004
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. We construct the integrated security simulation environment that can be used by some security system model. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. We compare the selection algorithm in the CPN with the Fuzzy Controller for the effective method to select the agents.

  • PDF

Control of Ubiquitous Environment using Sensors Module (센서모듈을 이용한 유비쿼터스 환경의 제어)

  • Jung, Tae-Min;Choi, Woo-Kyung;Kim, Seong-Joo;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.190-195
    • /
    • 2007
  • As Ubiquitous era comes, it became necessary to construct environment which can provide more useful information to human in the spaces where people live like homes or offices. On this account, network of the peripheral devices of Ubiquitous should constitute efficiently. For it, this paper researched human pattern by classified motion recognition using sensors module data. (This data processing by Neural network and fuzzy algorithm.) This pattern classification can help control home network system communication. I suggest the system which can control home network system more easily through patterned movement, and control Ubiquitous environment by grasp human's movement and condition.

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.

Multi-Modal Scheme for Music Mood Classification (멀티 모달 음악 무드 분류 기법)

  • Choi, Hong-Gu;Jun, Sang-Hoon;Hwang, Een-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.259-262
    • /
    • 2011
  • 최근 들어 소리의 세기나 하모니, 템포, 리듬 등의 다양한 음악 신호 특성을 기반으로 한 음악 무드 분류에 대한 연구가 활발하게 진행되고 있다. 본 논문에서는 음악 무드 분류의 정확도를 높이기 위하여 음악 신호 특성과 더불어 노래 가사와 소셜 네트워크 상에서의 사용자 평가 등을 함께 고려하는 멀티 모달 음악 무드 분류 기법을 제안한다. 이를 위해, 우선 음악 신호 특성에 대해 퍼지 추론 기반의 음악 무드 추출 기법을 적용하여 다수의 가능한 음악 무드를 추출한다. 다음으로 음악 가사에 대해 TF-IDF 기법을 적용하여 대표 감정 키워드를 추출하고 학습시킨 가사 무드 분류기를 사용하여 가사 음악 무드를 추출한다. 마지막으로 소셜 네트워크 상에서의 사용자 태그 등 사용자 피드백을 통한 음악 무드를 추출한다. 특정 음악에 대해 이러한 다양한 경로를 통한 음악 무드를 교차 분석하여 최종적으로 음악 무드를 결정한다. 음악 분류를 기반한 자동 음악 추천을 수행하는 사용자 만족도 평가 실험을 통해서 제안하는 기법의 효율성을 검증한다.

An Efficiency Handover Decision Algorithm in Wireless Multi-hop Network (무선 멀티 홉 네트워크에서의 효율적인 핸드오버 결정 알고리즘)

  • Pyun, Do-Hyun;Hyun, Do-Won;Jang, Ju-wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1065-1068
    • /
    • 2007
  • 본 논문에서는 무선 멀티 홉 네트워크에서 시스템 성능을 높이기 위한 효율적인 핸드오버 결정 알고리즘을 제안한다. 기존의 핸드오버 결정에 대한 연구들은 대부분 싱글 홉 환경에서 이루어졌고, 802.16 환경에서 중요한 이슈가 되는 사용자의 QoS 요구를 고려하지 않고 있다. 제안하는 알고리즘은 기지국(BS)으로의 전송 시간을 기준으로 하는 경로 결정 방법과 전송 시간, 사용자의 QoS 요구, 기지국의 트래픽 로드를 입력 값으로 하는 퍼지 로직 기반(Fuzzy Logic based)의 핸드오버 알고리즘을 포함한다. 제안하는 핸드오버 결정 알고리즘은 802.16j 환경의 특성을 고려하였으며, 기존의 SINR 기반의 방식에 비해 전송 시간, 세션 당 핸드오버 횟수, 전송 끊김 횟수가 5%~30% 향상되는 결과를 가진다.

Automatic Weblog Generation from Mobile Context using Bayesian Network and Petri Net (베이지안 네트워크와 페트리넷을 이용한 모바일 상황정보로부터의 블로그 자동 생성)

  • Lee, Young-Seol;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.467-471
    • /
    • 2010
  • Weblog is one of the most spread web services. The content of the weblog includes daily events and emotions. If we collect personal information using mobile devices and create a weblog, user can create their own weblog easily. Some researchers already developed systems that created weblog in mobile environment. In this paper, user's activity is inferred from personal information in mobile device. The inferred activities and story generation engine are used to generate text for creating a weblog. Finally, the text, photographs and user's movement in Google Map are integrated into a weblog.

Development of Fuzzy-based Trust Measuring Framework for Blog Contents Using Social Networking Services (소셜 네트워킹 서비스를 활용한 블로그 컨텐츠의 퍼지 기반 신뢰도 측정 방법론 개발)

  • Yang, Kun-Woo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.33-44
    • /
    • 2014
  • Recently, blogs have attracted much attention as personal media. The power of blogs as a way to provide valuable resources on Internet is so tremendous because of the high speed of information dissemination and the huge influence of the circulated information on Internet users even when the information itself is not true. Especially, contents on blogs that attract a lot of public attention are sometimes reproduced or magnified in an inappropriate way. In this paper, a method to measure the trust level of contents posted on personal blogs is proposed to reduce the damage of wrong information circulated along with blog networks. Trust variables such as relationship data in SNS are used to measure the comparative trust level of blog contents. The structure of the prototype system is also designed to apply this framework to blogsphere.

Controller Design of Takagi-Sugeno Fuzzy Model-Based Multi-Agent Systems for State Consensus (타카기-수게노 퍼지모델 기반 다개체 시스템의 상태일치를 위한 제어기 설계)

  • Moon, Ji Hyun;Lee, Ho Jae;Kim, Do Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.2
    • /
    • pp.133-138
    • /
    • 2013
  • This paper addresses a state consensus controller design technique of Takagi-Sugeno fuzzy model-based multi-agent systems in a continuous-time domain. We express the interconnection topology among the agents through graph theory. The design condition is represented in terms of linear matrix inequalities. Numerical example is provided to demonstrate the effectiveness of the proposed method.

Fuzzy Domain Ontology-based Opinion Mining for Transportation Network Monitoring and City Features Map (교통망 관찰과 도시 특징지도를 위한 퍼지영역 온톨로지 기반 오피니언 마이닝)

  • Ali, Farman;Kwak, Daehan;Islam, SM Riazul;Kim, Kye Hyun;Kwak, Kyung Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.1
    • /
    • pp.109-118
    • /
    • 2016
  • Traffic congestions are rapidly increasing in urban areas. In order to reduce these problems, it needs real-time data and intelligent techniques to quickly identify traffic activities with useful information. This paper proposes a Fuzzy Domain Ontology(FDO)-based opinion mining system to monitor the transportation network in real-time as well to make a city polarity map for travelers. The proposed system retrieves tweets and reviews related to transportation activities and a city. The feature opinions are extracted from these tweets and reviews and then used FDO to identify transportation and city features polarity. This FDO and intelligent prototype are developed using $Prot{\acute{e}}g{\acute{e}}$ OWL (Web Ontology Language) and JAVA, respectively. The experimental result shows satisfactory improvement in tweets and review's analyzing and opinion mining.