• Title/Summary/Keyword: Rule base system

Search Result 398, Processing Time 0.028 seconds

Design of Sliding Mode Fuzzy Controller for Vibration Reduction of Large Structures (대형구조물의 진동 감소를 위한 슬라이딩 모드 퍼지 제어기의 설계)

  • 윤정방;김상범
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.3 no.3
    • /
    • pp.63-74
    • /
    • 1999
  • A sliding mode fuzzy control (SMFC) algorithm is presented for vibration of large structures. Rule-base of the fuzzy inference engine is constructed based on the sliding mode control, which is one of the nonlinear control algorithms. Fuzziness of the controller makes the control system robust against the uncertainties in the system parameters and the input excitation. Non-linearity of the control rule makes the controller more effective than linear controllers. Design procedure based on the present fuzzy control is more convenient than those of the conventional algorithms based on complex mathematical analysis, such as linear quadratic regulator and sliding mode control(SMC). Robustness of presented controller is illustrated by examining the loop transfer function. For verification of the present algorithm, a numerical study is carried out on the benchmark problem initiated by the ASCE Committee on Structural Control. To achieve a high level of realism, various aspects are considered such as actuator-structure interaction, modeling error, sensor noise, actuator time delay, precision of the A/D and D/A converters, magnitude of control force, and order of control model. Performance of the SMFC is examined in comparison with those of other control algorithms such as $H_{mixed 2/{\infty}}$ optimal polynomial control, neural networks control, and SMC, which were reported by other researchers. The results indicate that the present SMFC is an efficient and attractive control method, since the vibration responses of the structure can be reduced very effectively and the design procedure is simple and convenient.

  • PDF

A Quantitative Risk Analysis of Related to Tower Crane Using the FMEA (타워크레인의 정량적 위험성 평가가법에 관한 연구(FMEA 기법 위주))

  • Shim, Kyu-Hyung;Rie, Dong-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.34-39
    • /
    • 2010
  • The purpose of this study is to suggest objective evaluation model as a plan to utilize as opportunity in establishing judgment standard of mutual inspection criteria and to upgrade inspection ability by reviewing and analyzing level of danger and importance in advance based on inspection results of inspection institutions regarding tower cranes used in construction fields. Tower crane is a mechanical device transporting construction supplies and heavy materials to places over 20~150M high from the ground for the period ranging from a short time of 2~3 months to two years after being installed in construction sites in vicinity of buildings or structures and is an important facility indispensable for construction sites. However, since use period after installation is short and professional technical ability of technicians working on-site about of tower crane is poor, systematic and quantitative safety management is not carried out As a part of researches on procedure of RBI(Risk Based Inspection) possible to apply to Knowledge Based System based on knowledge and experiences of experts as well as to tower cranes for solving these problems, quantitative RPN(Risk Priority Number) was applied to RPN utilizing technique of FMEA(Failure Mode and Effect Analyses). When general RBI 80/20 Rule was applied parts with high level of risks were found out as wire rope, hoist up/down safety device, reduction gear, and etc. However, since there are still many insufficient parts as risk analyses of tower crane were not established, it is necessary for experts with sufficient experiences and knowledge to supplement active RBI techniques and continuous researches on tower cranes by sharing and setting up data base of important information with this study as a starting point.

A Study on Construction of Domain Ontology in Third-party Logistics (제3자 물류 환경에서 도메인 온톨로지 구축)

  • Gao, Li;Koh, Jin-Gwang;Bae, Si-Yeong;Lee, Hyun-Chang;Choi, Hyun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.235-241
    • /
    • 2011
  • A large number of industry and trade circulation enterprises integrate logistics resource. They give links of product transport to some professional logistics enterprises in order to reduce costs. We call these professional logistics enterprises as the Third-party Logistics. As the development of the computer and internet, the suppliers, buyers and the Third-party Enterprises connect each other with internet. And different company use different management software, so heterogeneous data become a big problem of the information system for Third-party Enterprises. We built the logistics ontology with prot$\'{e}$g$\'{e}$, and translate it in OWL. We also built the rules for Logistics Ontology to improve the limitations of the OWL. Then we design the intelligent system for 3PL Enterprises Distribution Center based on Logistics Ontology and Logistics Rules. At final, we give an example to show the workflow visually.

A Study on the Prediction of the Nonlinear Chaotic Time Series Using Genetic Algorithm based Fuzzy Neural Network (유전 알고리즘을 이용한 퍼지신경망의 시계열 예측에 관한 연구)

  • Park, In-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.91-97
    • /
    • 2011
  • In this paper we present an approach to the structure identification based on genetic algorithm and to the parameter identification by hybrid learning method in neuro-fuzzy-genetic hybrid system in order to predicate the Mackey-Glass Chaotic time series. In this scheme the basic idea consists of two steps. One is the construction of a fuzzy rule base for the partitioned input space via genetic algorithm, the other is the corresponding parameters of the fuzzy control rules adapted by the backpropagation algorithm. In an attempt to test the performance the proposed system, three patterns, x(t-3), x(t-6) and x(t-9), was prepared according to time interval. It was through lots of simulation proved that the initial small error of learning owed to the good structural identification via genetic algorithm. The performance was showed in Table 2.

Evaluation of Arousal Level to Prevent Drowsy Driving by Fuzzy Inference (졸음운전 방지를 위한 fuzzy 추론에 의한 각성도의 평가)

  • Kim, Y. H.;Ko, H. W.;Lyou, J.
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.491-498
    • /
    • 1997
  • This paper describes the arousal measurement and control system using fuzzy logic to prevent drowsy driving. Sugeno's method was used for fuzzy inference in this study. Arousal evaluation and control criteria were modified from result of Nz-IRI analysis depending on arousal sate. Membership function and rule base of fuzzy inference were determined from the modified arousal level criteria When lRl (Inter-SIR Interval) was shorter than 60sec, outputs of both methods were changed from small to big, but output of three step warning method was same level until the next warning range. Since output of fuzzy inference tracked well the change of subject's arousal level, problems of three step warning method could be overcome by fuzzy inference method Furthermore, the output of the fuzzy inference was highly correlated with Nz(r = 0.99). Therefore, the fuzzy inference method for evaluation and the control of arousal will be more effective at real driving situation than three step warning method.

  • PDF

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.

Knowledge based Text to Facial Sequence Image System for Interaction of Lecturer and Learner in Cyber Universities (가상대학에서 교수자와 학습자간 상호작용을 위한 지식기반형 문자-얼굴동영상 변환 시스템)

  • Kim, Hyoung-Geun;Park, Chul-Ha
    • The KIPS Transactions:PartB
    • /
    • v.15B no.3
    • /
    • pp.179-188
    • /
    • 2008
  • In this paper, knowledge based text to facial sequence image system for interaction of lecturer and learner in cyber universities is studied. The system is defined by the synthesis of facial sequence image which is synchronized the lip according to the text information based on grammatical characteristic of hangul. For the implementation of the system, the transformation method that the text information is transformed into the phoneme code, the deformation rules of mouse shape which can be changed according to the code of phonemes, and the synthesis method of facial sequence image by using deformation rules of mouse shape are proposed. In the proposed method, all syllables of hangul are represented 10 principal mouse shape and 78 compound mouse shape according to the pronunciation characteristics of the basic consonants and vowels, and the characteristics of the articulation rules, respectively. To synthesize the real time facial sequence image able to realize the PC, the 88 mouth shape stored data base are used without the synthesis of mouse shape in each frame. To verify the validity of the proposed method the various synthesis of facial sequence image transformed from the text information is accomplished, and the system that can be applied the PC is implemented using the proposed method.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

A comparison study of the characteristics of private and public security service of Koryo dynasty and modern security service (고려시대 공적·사적경호의 특성과 현대경호와의 비교연구)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.417-442
    • /
    • 2013
  • This study considers the characteristics of the separation of public and private security service during Koryo dynasty, and compares it with the modern security service. Modern day security service's definition of private and public security service was used to distinguish them. Given the different historical settings, it's difficult to argue that the distinction between public and private service during Koryo dynasty was clear, but it can be said that public security service was centered around palace guard and concerns the activities of protest, and military made for the relationship, and private security service was centered around power of DoBang and includes the activities of malingering, and Byolchogun. During the early days of Koryo, protest, district military and soldiers who stay in the palace were all parts of a palace revolt and this institutional improvement of soldiers who stay in the palace was accomplished during King Seongjong's rule. The tradition of a palace revolt can find its roots in the middle military, and after the unification, a palace revolt was reformed into the king's palace revolt of second and the 6th along the course of establishing the nation's system. All of the changes stem from the reformation for consolidating the royal authority. Gyung Dae Seoung wanted to protect himself and he slept with his army night and days and because of that, group of soldiers was created and it was called DOBANG. Some members were from dobang gyeonryong, The forced were powerful because it was gathered with a warriors with extraordinaire martial arts and competent management. Most of the soldiers followed gyeong dae seung because they believed that he has a strong leadership and loves his people, and had a strong faith in him. However, the general gyeong jang had a belief that politics must be reverted to the previous so the relationships between jungbang wasn't smooth. Because of the economic operational problems, due to fraud committed by the mens under his command failed to maintain integrity and was criticised.The misconception also fed up with the emperor and the deepening relationships between the soldiers, his dobang was dismantled. After he took over the dobang, for his personal safety and to strengthen his position he compensated gyeon dae seong's dobang and developed the organization. In the process of extending the dobang Choi chung heon recruited many talented people to strengthen the military base, and also accepted the advice and expanded the power of Dobang. Choi Chung Heon thus consolidated his political gains by weakening the power of the king's army and adjusting the myth, which could've threatened his regime, and this was called Dobang number 6th. Dobang number six got even more powerful by his son named Choi woo, and after ruling, he expanded into a room, and a substantial reorganization of Dobang was developed. And then the creation of yabyeolcho also showed the effect to prevent the crisis. Although the palace guards who were public security service of Koryo Dynasty was still maintained during the military rule era when the royal authority was incapacitated, it was only maintained to have a symbolic meaning as the actual authority including military power was with Choi, the master of Dobang, private security service group. Likewise, during the rule of Choi, private securty service could reign over public security service, and the noteworthy characteristic of Dobang is that it assisted the private soldier groups to seize the military power by reorganizing and modifying military system. Although both differences and similarities can be found when comparing the guards of Koryo Dynasty with those of contemporary society, they have a similarity in terms of the essence of guards that they guarantee the safety of their clients. As for differences, the royalty of Koryo Dynasty and the pursuit of profit of contemporary society are in contrast, and contemporary guards can be seen as the fulfillment of responsibility and duty by free will, whereas guards of Koryo Dynasty were ruled with military coercion.

  • PDF

Enhanced Variable Structure Control With Fuzzy Logic System

  • Charnprecharut, Veeraphon;Phaitoonwattanakij, Kitti;Tiacharoen, Somporn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.999-1004
    • /
    • 2005
  • An algorithm for a hybrid controller consists of a sliding mode control part and a fuzzy logic part which ar purposely for nonlinear systems. The sliding mode part of the solution is based on "eigenvalue/vector"-type controller is used as the backstepping approach for tracking errors. The fuzzy logic part is a Mamdani fuzzy model. This is designed by applying sliding mode control (SMC) method to the dynamic model. The main objective is to keep the update dynamics in a stable region by used SMC. After that the plant behavior is presented to train procedure of adaptive neuro-fuzzy inference systems (ANFIS). ANFIS architecture is determined and the relevant formulation for the approach is given. Using the error (e) and rate of error (de), occur due to the difference between the desired output value (yd) and the actual output value (y) of the system. A dynamic adaptation law is proposed and proved the particularly chosen form of the adaptation strategy. Subsequently VSC creates a sliding mode in the plant behavior while the parameters of the controller are also in a sliding mode (stable trainer). This study considers the ANFIS structure with first order Sugeno model containing nine rules. Bell shaped membership functions with product inference rule are used at the fuzzification level. Finally the Mamdani fuzzy logic which is depends on adaptive neuro-fuzzy inference systems structure designed. At the transferable stage from ANFIS to Mamdani fuzzy model is adjusted for the membership function of the input value (e, de) and the actual output value (y) of the system could be changed to trapezoidal and triangular functions through tuning the parameters of the membership functions and rules base. These help adjust the contributions of both fuzzy control and variable structure control to the entire control value. The application example, control of a mass-damper system is considered. The simulation has been done using MATLAB. Three cases of the controller will be considered: for backstepping sliding-mode controller, for hybrid controller, and for adaptive backstepping sliding-mode controller. A numerical example is simulated to verify the performances of the proposed control strategy, and the simulation results show that the controller designed is more effective than the adaptive backstepping sliding mode controller.

  • PDF