• Title/Summary/Keyword: Fuzzy Information System

Search Result 1,657, Processing Time 0.035 seconds

Recognition of Tactilie Image Dependent on Imposed Force Using Fuzzy Fusion Algorithm (접촉력에 따라 변하는 Tactile 영상의 퍼지 융합을 통한 인식기법)

  • 고동환;한헌수
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.3
    • /
    • pp.95-103
    • /
    • 1998
  • This paper deals with a problem occuring in recognition of tactile images due to the effects of imposed force at a me urement moment. Tactile image of a contact surface, used for recognition of the surface type, varies depending on the forces imposed so that a false recognition may result in. This paper fuzzifies two parameters of the contour of a tactile image with the membership function formed by considering the imposed force. Two fuzzifed paramenters are fused by the average Minkowski's dist; lnce. The proposed algorithm was implemented on the multisensor system cnmposed of an optical tact le sensor and a 6 axes forceltorque sensor. By the experiments, the proposed algorithm has shown average recognition ratio greater than 869% over all imposed force ranges and object models which is about 14% enhancement comparing to the case where only the contour information is used. The pro- ~oseda lgorithm can be used for end-effectors manipulating a deformable or fragile objects or for recognition of 3D objects by implementing on multi-fingered robot hand.

  • PDF

A Study on the Effective Selection of Tunnel Reinforcement Methods using Decision Tree Technique (의사결정트리 기법을 이용한 터널 보조공법 선정방안 연구)

  • Kim, Jong-Gyu;Sagong, Myung;Lee, Jun S.;Lee, Yong-Joo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4C
    • /
    • pp.255-264
    • /
    • 2006
  • The auxiliary reinforcement method is normally applied to prevent a possible collapse of the tunnel face where the ground condition is not favorable or geologic information is not sufficient. Recently, several engineering approaches have been made to choose the effective reinforcement methods using expert system such as neural network and fuzzy theory field, among others. Even if the expert system has offered many decision aid tools to properly select the reinforcement method, the quantitative assessment items are not easy to estimate and this is why the data mining technique, widely used in the field of social science, medical treatment, banking and agriculture, is introduced in this study. Using decision tree together with PDA, the decision aids for reinforcement method based on field construction data are created to derive the field rules and future study will be concentrated on the application of the proposed methods in a variety of underground development cases.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

The Analysis and Design of Advanced Neurofuzzy Polynomial Networks (고급 뉴로퍼지 다항식 네트워크의 해석과 설계)

  • Park, Byeong-Jun;O, Seong-Gwon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.3
    • /
    • pp.18-31
    • /
    • 2002
  • In this study, we introduce a concept of advanced neurofuzzy polynomial networks(ANFPN), a hybrid modeling architecture combining neurofuzzy networks(NFN) and polynomial neural networks(PNN). These networks are highly nonlinear rule-based models. The development of the ANFPN dwells on the technologies of Computational Intelligence(Cl), namely fuzzy sets, neural networks and genetic algorithms. NFN contributes to the formation of the premise part of the rule-based structure of the ANFPN. The consequence part of the ANFPN is designed using PNN. At the premise part of the ANFPN, NFN uses both the simplified fuzzy inference and error back-propagation learning rule. The parameters of the membership functions, learning rates and momentum coefficients are adjusted with the use of genetic optimization. As the consequence structure of ANFPN, PNN is a flexible network architecture whose structure(topology) is developed through learning. In particular, the number of layers and nodes of the PNN are not fixed in advance but is generated in a dynamic way. In this study, we introduce two kinds of ANFPN architectures, namely the basic and the modified one. Here the basic and the modified architecture depend on the number of input variables and the order of polynomial in each layer of PNN structure. Owing to the specific features of two combined architectures, it is possible to consider the nonlinear characteristics of process system and to obtain the better output performance with superb predictive ability. The availability and feasibility of the ANFPN are discussed and illustrated with the aid of two representative numerical examples. The results show that the proposed ANFPN can produce the model with higher accuracy and predictive ability than any other method presented previously.

Goral(Nemorhaedus caudatus) Habitat Suitability Model based on GIS and Fuzzy set at Soraksan National Park. (GIS와 퍼지집합을 이용한 산양(Nemorhaedus caudatus)의 서식지적합성모형 개발: 설악산 국립공원을 대상으로)

  • 최태영;양병이;박종화;서창완
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.04a
    • /
    • pp.472-477
    • /
    • 2003
  • 멸종위기종의 서식지를 효율적으로 관리하기 위해서는 해당 종의 서식 가능한 지역의 분포를 알아야 한다. 본 연구의 목적은 GIS와 퍼지집합을 이용하여 산양(Nemorhaedus caudatus)의 서식지적합성모형을 개발하여 멸종 위기종의 서식지를 관리하기 위한 정보를 제공하는 것이다. 산양의 서식지적합성모형 개발을 위한 본 연구의 주요내용은 다음과 같다. 첫째, 산양 서식지 이용에 관한 기존 연구를 바탕으로 산양의 잠재적 서식지 환경변수를 분류하였으며, 분석 대상지의 산양 흔적 조사를 통해 서식지 환경변수의 재분류 및 x²검정(Chi-square test)을 통한 변수들의 유용성을 파악하고, 쌍체비교를 통한 환경변수별 가중치를 계산하였다. 둘째, 기존 부울논리(boolean logic)의 단점을 보완하기 위해 현장 조사의 결과를 바탕으로 퍼지논리(fuzzy logic)에 의한 산양 서식지의 각 환경변수별 주제도를 작성하고, 주제도들의 상관관계를 분석하여 상호 관련성이 높은 변수들의 중복을 피하였다. 셋째, 환경변수별 주제도와 변수별 가중치를 바탕으로 다기준평가기법(MCE, Multi-Criteria Evaluation)을 이용하여 분석대상지의 산양 서식지적합성모형을 개발하였다. 마지막으로, 개발된 서식지적합성모형의 타당성을 검증하기 위해 분석대상지 외부 지역을 대상으로 검증을 실시하였다. 분석 결과 분석대상지의 분류정확도는 서식가능성 0.5를 기준으로 93.94%의 매우 높은 분류정확도를 나타내었으며, 검증대상지에서는 95.74%의 분류정확도를 나타내어 본 모형의 분류정확도는 일관성이 높은 것으로 판단되었다. 또한 전체 공원구역에서 서식가능성 0.5이상의 면적은 59%를 차지하였다.퇴적이 우세한 것으로 관측되었다.보체계의 구축사업의 시각이 행정정보화, 생활정보화, 산업정보화 등 다양한 분야와 결합하여 보다 큰 시너지 효과와 사용자 중심의 서비스 개선을 창출할 수 있는 기반을 제공할 것을 기대해 본다.. 이상의 결과를 종합해볼 때, ${\beta}$-glucan은 고용량일 때 직접적으로 또는 $IFN-{\gamma}$ 존재시에는 저용량에서도 복강 큰 포식세로를 활성화시킬 뿐 아니라, 탐식효율도 높임으로써 면역기능을 증진 시키는 것으로 나타났고, 그 효과는 crude ${\beta}$-glucan의 추출조건에 따라 달라지는 것을 알 수 있었다.eveloped. Design concepts and control methods of a new crane will be introduced in this paper.and momentum balance was applied to the fluid field of bundle. while the movement of′ individual material was taken into account. The constitutive model relating the surface force and the deformation of bundle was introduced by considering a representative prodedure that stands for the bundle movement. Then a fundamental equations system could be simplified considering a steady state of the process. O

  • PDF

A Study on 3D RTLS at Port Container Yards Using the Extended Kalman Filter

  • Kim, Joeng-Hoon;Lee, Hyun-Woo;Kwon, Soon-Ryang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.228-235
    • /
    • 2007
  • The main purpose of this paper is to manage the container property effectively at the container yard by applying the RTLS technology to the field of port logistics. Yet, many kinds of noises happen to be inputted with the distance value(between the reader and the tag) which is to be inputted into the location identification algorithm, which makes the distance value jumped due to the system noise of the ultrasonic sensor module and the measurement noise. The Kalman Filter is widely used to prevent this jump occurrence; the noises are eliminated by using the EKF(Extended Kalman Filter) while considering that the distance information of the ultrasonic sensor is non-linear. Also, the 3D RTLS system at the port container yard suggested in this research is designed not to be interrupted for its ultrasonic transmission by positioning the antenna at the front of each sector of the container where the active tags are installed. We positioned the readers, which function as antennas for location identification, to four places randomly in the absolute coordinate and let the positions of the active tags identified by using the distance data delivered from the active tags. For the location identification algorithm used in this paper, the triangulation measurement that is most used in general is applied and newly reorganized to calculate the position of the container. In the first experiment, we dealt with the error resulting in the angle and the distance of the ultrasonic sensor module, which is the most important in the hardware performance; in the second, we evaluated the performance of the location identification algorithm, which is the most important in the software performance, and tested the noise cancellation effects for the EKF. According to the experiment result, the ultrasonic sensor showed an average of 3 to 5cm error up to $45^{\circ}$ in case of $60^{\circ}$ or more, non-reliable linear distances were obtained. In addition, the evaluation of the algorithm performance showed an average of $4^{\circ}{\sim}5^{\circ}$ error due to the error of the linear distance-this error is negligible for most container location identifications. Lastly, the experiment results of noise cancellation and jump preservation by using the EKF showed that noises were removed in the distance information which was entered from the input of the ultrasonic sensor and as a result, only signal was extracted; thus, jumps were able to be removed and the exact distance information between the ultrasonic sensors could be obtained.

An Automated Planning Method for Autonomous Behaviors of Computer Generated Forces in War games (워게임에서 가상군의 자율적 행위를 위한 자동계획 기법)

  • Choi, Dae-Hoe;Cho, Jun-Ho;Kim, Ik-Hyun;Park, Jung-Chan;Jung, Sung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.11-18
    • /
    • 2011
  • This paper proposes a novel planning method for computer generated forces (CGFs) in war games that plans the behaviors of CGFs according to a given mission and situations. CGFs which are received their missions first plan their tasks for accomplishing the mission and then plan their behaviors for accomplishing each task. After that, they execute their planned behaviors considering the conditions of environments (in other words situations). The tasks and behaviors are hierarchically composed and include start conditions for beginning those and termination conditions for stopping those. CGFs first check whether the start condition of the planned behavior for accomplishing a task is satisfied or not in some degree and perform the behavior if satisfied continuously until the termination condition of the behavior will be met. If the termination condition is satisfied, then they check the start condition of the next planned behavior. This process will be repeated for accomplishing the mission. If the situations of CGFs are different by changing the environments from those of planning time, it may cause the start condition of the planned behavior to be dissatisfied. In this case, CGFs can decide a new behavior using fuzzy rule base. We realized our planning system and tested CGFs with a scenario. Experimental results showed that our system worked well and actively coped with situation changes. It will be possible to make CGFs that can do more autonomous behaviors if we continually develop our method.

Development of Attack Intention Extractor for Soccer Robot system (축구 로봇의 공격 의도 추출기 설계)

  • 박해리;정진우;변증남
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.4
    • /
    • pp.193-205
    • /
    • 2003
  • There has been so many research activities about robot soccer system in the many research fields, for example, intelligent control, communication, computer technology, sensor technology, image processing, mechatronics. Especially researchers research strategy for attacking in the field of strategy, and develop intelligent strategy. Then, soccer robots cannot defense completely and efficiently by using simple defense strategy. Therefore, intention extraction of attacker is needed for efficient defense. In this thesis, intention extractor of soccer robots is designed and developed based on FMMNN(Fuzzy Min-Max Neural networks ). First, intention for soccer robot system is defined, and intention extraction for soccer robot system is explained.. Next, FMMNN based intention extractor for soccer robot system is determined. FMMNN is one of the pattern classification method and have several advantages: on-line adaptation, short training time, soft decision. Therefore, FMMNN is suitable for soccer robot system having dynamic environment. Observer extracts attack intention of opponents by using this intention exactor, and this intention extractor is also used for analyzing strategy of opponent team. The capability of developed intention extractor is verified by simulation of 3 vs. 3 robot succor simulator. It was confirmed that the rates of intention extraction each experiment increase.

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

An Implementation of Lighting Control System using Interpretation of Context Conflict based on Priority (우선순위 기반의 상황충돌 해석 조명제어시스템 구현)

  • Seo, Won-Il;Kwon, Sook-Youn;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.23-33
    • /
    • 2016
  • The current smart lighting is shaped to offer the lighting environment suitable for current context, after identifying user's action and location through a sensor. The sensor-based context awareness technology just considers a single user, and the studies to interpret many users' various context occurrences and conflicts lack. In existing studies, a fuzzy theory and algorithm including ReBa have been used as the methodology to solve context conflict. The fuzzy theory and algorithm including ReBa just avoid an opportunity of context conflict that may occur by providing services by each area, after the spaces where users are located are classified into many areas. Therefore, they actually cannot be regarded as customized service type that can offer personal preference-based context conflict. This paper proposes a priority-based LED lighting control system interpreting multiple context conflicts, which decides services, based on the granted priority according to context type, when service conflict is faced with, due to simultaneous occurrence of various contexts to many users. This study classifies the residential environment into such five areas as living room, 'bed room, study room, kitchen and bath room, and the contexts that may occur within each area are defined as 20 contexts such as exercising, doing makeup, reading, dining and entering, targeting several users. The proposed system defines various contexts of users using an ontology-based model and gives service of user oriented lighting environment through rule based on standard and context reasoning engine. To solve the issue of various context conflicts among users in the same space and at the same time point, the context in which user concentration is required is set in the highest priority. Also, visual comfort is offered as the best alternative priority in the case of the same priority. In this manner, they are utilized as the criteria for service selection upon conflict occurrence.