• Title/Summary/Keyword: Fuzzy Filtering

Search Result 149, Processing Time 0.03 seconds

Spring Flow Prediction affected by Hydro-power Station Discharge using the Dynamic Neuro-Fuzzy Local Modeling System

  • Hong, Timothy Yoon-Seok;White, Paul Albert.
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.58-66
    • /
    • 2007
  • This paper introduces the new generic dynamic neuro-fuzzy local modeling system (DNFLMS) that is based on a dynamic Takagi-Sugeno (TS) type fuzzy inference system for complex dynamic hydrological modeling tasks. The proposed DNFLMS applies a local generalization principle and an one-pass training procedure by using the evolving clustering method to create and update fuzzy local models dynamically and the extended Kalman filtering learning algorithm to optimize the parameters of the consequence part of fuzzy local models. The proposed DNFLMS is applied to develop the inference model to forecast the flow of Waikoropupu Springs, located in the Takaka Valley, South Island, New Zealand, and the influence of the operation of the 32 Megawatts Cobb hydropower station on springs flow. It is demonstrated that the proposed DNFLMS is superior in terms of model accuracy, model complexity, and computational efficiency when compared with a multi-layer perceptron trained with the back propagation learning algorithm and well-known adaptive neural-fuzzy inference system, both of which adopt global generalization.

  • PDF

Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

  • Sujendran, Revathi;Arunachalam, Malathi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.502-511
    • /
    • 2015
  • Intrusion detection plays a key role in detecting attacks over networks, and due to the increasing usage of Internet services, several security threats arise. Though an intrusion detection system (IDS) detects attacks efficiently, it also generates a large number of false alerts, which makes it difficult for a system administrator to identify attacks. This paper proposes automatic fuzzy rule generation combined with a Wiener filter to identify attacks. Further, to optimize the results, simplified swarm optimization is used. After training a large dataset, various fuzzy rules are generated automatically for testing, and a Wiener filter is used to filter out attacks that act as noisy data, which improves the accuracy of the detection. By combining automatic fuzzy rule generation with a Wiener filter, an IDS can handle intrusion detection more efficiently. Experimental results, which are based on collected live network data, are discussed and show that the proposed method provides a competitively high detection rate and a reduced false alarm rate in comparison with other existing machine learning techniques.

Design of Web Agents Module for Information Filtering Based on Rough Sets (러프셋에 기반한 정보필터링 웹에이전트 모듈 설계)

  • 김형수;이상부
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.552-556
    • /
    • 2004
  • This paper surveys the design of the adaptive information filtering agents to retrieve the useful information within a large scale database. As the information retrieval through the Internet is generalized, it is necessary to extract the useful information satisfied the user's request condition to reduce the seeking time. For the first, this module is designed by the Rough reduct to generate the reduced minimal knowledge database considered the users natural query language in a large scale knowledge database, and also it is executed the soft computing by the fuzzy composite processing to operate the uncertain value of the reduced schema domain.

  • PDF

A Hybrid Recommendation System based on Fuzzy C-Means Clustering and Supervised Learning

  • Duan, Li;Wang, Weiping;Han, Baijing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2399-2413
    • /
    • 2021
  • A recommendation system is an information filter tool, which uses the ratings and reviews of users to generate a personalized recommendation service for users. However, the cold-start problem of users and items is still a major research hotspot on service recommendations. To address this challenge, this paper proposes a high-efficient hybrid recommendation system based on Fuzzy C-Means (FCM) clustering and supervised learning models. The proposed recommendation method includes two aspects: on the one hand, FCM clustering technique has been applied to the item-based collaborative filtering framework to solve the cold start problem; on the other hand, the content information is integrated into the collaborative filtering. The algorithm constructs the user and item membership degree feature vector, and adopts the data representation form of the scoring matrix to the supervised learning algorithm, as well as by combining the subjective membership degree feature vector and the objective membership degree feature vector in a linear combination, the prediction accuracy is significantly improved on the public datasets with different sparsity. The efficiency of the proposed system is illustrated by conducting several experiments on MovieLens dataset.

Threshold-Based En-Route Filtering in Sensor Networks using Fuzzy Logic (퍼지 논리를 이용한 센서 네트워크에서의 임계값 기반 여과 기법)

  • Mun, Su-Yeong;Jo, Dae-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.308-311
    • /
    • 2007
  • 대부분의 센서 네트워크에서 센서 노드들은 열린 환경에서 독립적으로 동작하므로 보안 공격에 취약하다. 허위 보고서 삽입 공격에서 공격자는 허위 경보를 발생시키거나 혹은 네트워크 내 에너지의 고갈을 목적으로 포획된 노드들을 통해 허위 보고서를 네트워크에 삽입한다. 이러한 허위 보고서를 조기에 검출, 제거하기 위해 많은 여과 기법들이 제안되었다. 가환 암호 기반 여과 기법에서 각각의 중간 노드는 확률에 기반 하여 보고서 인증을 수행한다. 따라서 허위 보고서가 여과되지 않거나 정상 보고서가 여러 번 인증 받을 가능성이 있다. 또한 네트워크의 상태 변화에 적응하기 어렵다. 본 논문은 퍼지 논리를 이용한 무선 센서 네트워크에서의 임계값 기반 여과 기법을 제안한다.

  • PDF

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

A Covariance Analysis Using the Kalman Filterings for Interrelationships Research between Sensor Signals of the Real Time Simulator of Launch Control System in the NARO Space Center (나로우주센터 발사관제시스템 실시간 발사관제 모의장치의 센서 신호간 연관성 해석을 위한 퍼지-칼만필터 공분산 분석)

  • Hong Il-Hee;Department of Electrical Engineering Chungnam National University Yang-MoKim
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-34
    • /
    • 2005
  • We had research to conduct interrelationships between sensors using postprocessing analysis with the Fuzzy-Kalman Filtering Auto-Correlation about Real Time Simulator data of the NaroSC LCS in case of a fully blind situation scenario. The conducted interrelations are same harmony with relations in scenario. We had analyzed signals of sensors reverse-using a optimization character of Fuzzy-Kalman Filter. As our research conclusion, We had recognized possibilities of signal processing about the KSLV-1, on-board payloads, general equipments of ground support which apply to multi sensor systems.

A Particle Filtering Approach for On-Line Failure Prognosis in a Planetary Carrier Plate

  • Orchard, Marcos E.;Vachtsevanos, George J.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.221-227
    • /
    • 2007
  • This paper introduces an on-line particle-filtering-based framework for failure prognosis in nonlinear, non-Gaussian systems. This framework uses a nonlinear state-space model of the plant(with unknown time-varying parameters) and a particle filtering(PF) algorithm to estimate the probability density function(pdf) of the state in real-time. The state pdf estimate is then used to predict the evolution in time of the fault indicator, obtaining as a result the pdf of the remaining useful life(RUL) for the faulty subsystem. This approach provides information about the precision and accuracy of long-term predictions, RUL expectations, and 95% confidence intervals for the condition under study. Data from a seeded fault test for a UH-60 planetary carrier plate are used to validate the proposed methodology.

Analyzing the Effect of Lexical and Conceptual Information in Spam-mail Filtering System

  • Kang Sin-Jae;Kim Jong-Wan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.2
    • /
    • pp.105-109
    • /
    • 2006
  • In this paper, we constructed a two-phase spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the ham (non-spam) mail. The definite information is the mail sender's information, URL, a certain spam keyword list, and the less definite information is the word list and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning in the 2nd phase. According to our results the ham misclassification rate was reduced if more lexical information was used as features, and the spam misclassification rate was reduced when the concept codes were included in features as well.

Evolutionary Design of Morphology-Based Homomorphic Filter for Feature Enhancement of Medical Images

  • Hwang, Hee-Soo;Oh, Jin-Sung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.172-177
    • /
    • 2009
  • In this paper, a new morphology-based homomorphic filtering technique is presented to enhance features in medical images. The homomorphic filtering is performed based on the morphological sub-bands, in which an image is morphologically decomposed. An evolutionary design is carried to find an optimal gain and structuring element of each sub-band. As a search algorithm, Differential Evolution scheme is utilized. Simulations show that the proposed filter improves the contrast of the interest feature in medical images.