• Title/Summary/Keyword: 정보 퍼지 네트워크

Search Result 169, Processing Time 0.032 seconds

Identification of Fuzzy-Radial Basis Function Neural Network Based on Mountain Clustering (Mountain Clustering 기반 퍼지 RBF 뉴럴네트워크의 동정)

  • Choi, Jeoung-Nae;Oh, Sung-Kwun;Kim, Hyun-Ki
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • This paper concerns Fuzzy Radial Basis Function Neural Network (FRBFNN) and automatic rule generation of extraction of the FRBFNN by means of mountain clustering. In the proposed network, the membership functions of the premise part of fuzzy rules do not assume any explicit functional forms such as Gaussian, ellipsoidal, triangular, etc., so its resulting fitness values (degree of membership) directly rely on the computation of the relevant distance between data points. Also, we consider high-order polynomial as the consequent part of fuzzy rules which represent input-output characteristic of sup-space. The number of clusters and the centers of clusters are automatically generated by using mountain clustering method based on the density of data. The centers of cluster which are obtained by using mountain clustering are used to determine a degree of membership and weighted least square estimator (WLSE) is adopted to estimate the coefficients of the consequent polynomial of fuzzy rules. The effectiveness of the proposed model have been investigated and analyzed in detail for the representative nonlinear function.

  • PDF

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

Design of Incremental Model by Linear Regression and Local RBFNs (선형회귀와 국부적인 RBFN에 의한 점진적인 모델의 설계)

  • Lee, Myung-Won;Kwak, Keun-Chang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.471-473
    • /
    • 2010
  • 본 논문은 선형회귀(LR: Linear Regression)와 국부적인 방사기저함수 네트워크(RBFN: Radial Basis Function Networks)를 결합한 점진적인 모델(incremental model)의 설계와 관련되어진다. 전형적인 RBFN에 의한 모델링과는 달리, 제안된 방법의 근본적인 원리는 두 단계에 의해 고려되어진다. 첫째, 전체 모델의 설계과정에서 전역적인 모델로써 선형회귀에 의해 데이터의 선형부분을 구축한다. 다음으로, 모델링 오차는 오차가 존재하는 국부적인 공간에서 RBFN에 의해 보상되어진다. 여기서, 오차의 분포로부터 RBFN을 설계하기 위해 컨텍스트 기반 퍼지 클러스터링(CFC: Context-based Fuzzy Clustering)를 통해 정보입자의 형태로 구축되어진다. 실험은 자동차 mpg 연료소비량 예측과 부동산 가격예측문제를 통해 제안된 방법의 우수성을 증명한다.

Discriminating a User Indirect Trust Considering Connection Relationship and Influence of Users in Social Networks (소셜 네트워크에서 연결 관계와 영향력을 고려한 사용자 간접 신뢰도 판별)

  • Seo, Indeok;Song, Heesub;Jeong, Jaeyun;Park, Jaeyeol;Kim, Minyoung;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.280-291
    • /
    • 2018
  • Recently, various interactions have been actively conducted through sharing and expressing opinions among users in social networks. In this process, since malicious users and fault information spread misinformation, trust is reduced irrespective of their will. To solve this problem, studies have been conducted to determine the trust of a user through direct-connected users. In this paper, we propose a enhanced user indirect trust discrimination scheme considering the connection relation and influence of users. The proposed indirect trust computation scheme derives the user's area of interest through user interaction and reconstructs the existing network considering the user connection relationship. The final indirect trust is also detected by determining whether the user is a malicious user through the influence of the user. Through various performance evaluations, we show that the proposed scheme achieves better performance than the existing method.

Classificatin of Normal and Abnormal Heart Sounds Using Neural Network (뉴럴네트워크를 이용한 심음의 정상 비정상 분류)

  • Yoon, Hee-jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.131-135
    • /
    • 2018
  • The heart disease taking the second place of the cause of the death of modern people is a terrible disease that makes sudden death without noticing. To judge the aortic valve disease of heart diseases a name of disease was diagnosed using psychological data provided from physioNet. Aortic valve is a valve of the area that blood is spilled from left ventricle to aorta. Aortic stenosis of heart troubles is a disease when the valve does not open appropriately in contracting the left ventricle to aorta due to narrowed aortic valve. In this paper, 3126 samples of cardiac sound data were used as an experiment data composed of 180 characteristics including normal people and aortic valve stenosis patients. To diagnose normal and aortic valve stenosis patients, NEWFM was utilized. By using an average method of weight as an feature selection method of NEWFM, the result shows 91.0871% accuracy.

Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic (무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법)

  • Han, Man-Ho;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System (동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법)

  • Lee, Sang-Jin;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

Control of Ubiquitous Environment using Sensors Module (센서모듈을 이용한 유비쿼터스 환경의 제어)

  • Jeong, Tae-Min;Choe, U-Gyeong;Kim, Seong-Ju;Kim, Seong-Hyeon;Jeon, Hong-Tae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.101-104
    • /
    • 2006
  • 유비쿼터스 시대가 다가오면서 앞으로 가정 및 회사 등 인간이 거주하며 생활하는 공간에서의 좀 더 편리하고 효율적인 다양한 정보를 인간에게 인지시켜 줄 수 있는 환경이 구축되어야한다. 이를 기반으로 유비쿼터스 주변장치들의 네트워크와 인간에게 많은 정보와 편리성이 좀 더 효율적으로 이루어져야 할 것이다. 이를 위해 본 논문에서는 센서모듈에서 추출되는 데이터를 신경망과 퍼지 알고리즘을 사용해 동작인식의 패턴을 분류하여 인간의 사고를 움직임 파악한다. 이러한 패턴의 분류를 통해 홈네트워크 시스템과의 센서모듈의 통신제어가 가능하게 된다 이를 바탕으로 패턴이 분류된 행동들의 명령으로 미리 지정된 간단한 손동작으로 여러 가전기기라든지 홈네트워크 시스템의 제어방식을 더욱 간단히 제어하며, 인간의 건강상태를 파악함으로써 인간행동과 상태에 따른 유비쿼터스 환경의 제어가 이루어 질 수 있는 시스템을 제안한다.

  • PDF

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

A Detection Mechanism of Portscan Attacks based on Fuzzy Logic for an Abnormal Traffic Control Framework (비정상 트래픽 제어 프레임워크를 위한 퍼지로직 기반의 포트스캔 공격 탐지기법)

  • Kim, Jae-Kwang;Kim, Ka-Eul;Ko, Kwang-Sun;Kang, Yong-Hyeog;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1185-1188
    • /
    • 2005
  • 비정상 행위에 대한 true/false 방식의 공격 탐지 및 대응방법은 높은 오탐지율(false-positive)을 나타내기 때문에 이를 대체할 새로운 공격 탐지방법과 공격 대응방법이 연구되고 있다. 대표적인 연구로는 트래픽 제어 기술을 이용한 단계적 대응방법으로, 이 기술은 비정상 트래픽에 대해 단계적으로 대응함으로써 공격의 오탐지로 인하여 정상 서비스를 이용하는 트래픽이 차단되지 않도록 하는 기술이다. 비정상 트래픽 중 포트스캔 공격은 네트워크 기반 공격을 위해 공격대상 호스트의 서비스 포트를 찾아내는 공격으로 이 공격을 탐지하기 위해서는 일정 시간동안 특정 호스트의 특정 포트에 보내지는 패킷 수를 모니터링 하여 임계치와 비교하는 방식의 true/false 방식의 공격 탐지방법이 주로 사용되었다. 비정상 트래픽 제어 프레임워크(Abnormal Traffic Control Framework)는 true/false 방식의 공격 탐지방법을 이용하여 공격이 탐지되었을 때, 처음에는 트래픽 제어로 대응하고 같은 공격이 재차 탐지되었을때, 차단하여 기존의 true-false 방식의 공격 탐지 및 대응방법이 가지는 높은 오탐지율을 낮춘다. 하지만 포트스캔 공격의 특성상, 공격이 탐지된 후 바로 차단하지 못하였을 경우, 이미 공격자가 원하는 모든 정보를 유출하게 되는 문제가 있다. 본 논문에서는 기존의 True/False 방식의 포트스캔 공격 탐지방법에 퍼지 로직 개념을 추가하여 공격 탐지의 정확성을 높이고 기존의 탐지방법을 이용하였을 때보다 신속한 트래픽 제어 및 차단을 할 수 있는 방법을 제안한다.

  • PDF