• Title/Summary/Keyword: Rule based solution

Search Result 185, Processing Time 0.027 seconds

DNA Coding Method for Time Series Prediction (시계열 예측을 위한 DNA 코딩 방법)

  • 이기열;선상준;이동욱;심귀보
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.280-280
    • /
    • 2000
  • In this paper, we propose a method of constructing equation using bio-inspired emergent and evolutionary concepts. This method is algorithm that is based on the characteristics of the biological DNA and growth of plants. Here is. we propose a constructing method to make a DNA coding method for production rule of L-system. L-system is based on so-called the parallel rewriting mechanism. The DNA coding method has no limitation in expressing the production rule of L-system. Evolutionary algorithms motivated by Darwinian natural selection are population based searching methods and the high performance of which is highly dependent on the representation of solution space. In order to verify the effectiveness of our scheme, we apply it to one step ahead prediction of Mackey-Glass time series.

  • PDF

공정계획 전문가시스템의 개발-조선 블럭분할에의 응용

  • 박병태;이재원
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1993.04b
    • /
    • pp.370-374
    • /
    • 1993
  • This paper describes a study on the expert system based process planning of the block division process in shipbuilding. The prototype system developed deterines the block division line of the midship of crude-oil tanker. Case-based reasoning (CBR) approach relying on previous similar cases to solve the problem is applied instead of rule-based reasoning (RBR). Similar cases are retrieved from case base according to the similarity metrics between input problem and cases. The retrieved case with the highest priority is then adapted to fit to the input problem buy adaptation rules. The adapted solution is proposed as the division line for the input problem.

SOC Sustaining Strategy for HEV through State-machine Control (하이브리드 차량의 SOC 유지전략 방법)

  • Byun, Sang-Min;Kim, Beom-Soo;Cha, Suk-Won
    • New & Renewable Energy
    • /
    • v.4 no.4
    • /
    • pp.65-71
    • /
    • 2008
  • Considering the world's environmental problem, HEVs are projected as one of the solution. The keys of the HEV cruise control are expanding the use of electric motor and operating the internal combustion engine in the efficient region. This paper presents a new structure of SOC sustaining model where state-machine control is used. The proposed model defines battery charging and discharging as states and SOC of the battery as control variables. In this paper, we introduce various methods in deterministic rule-based control for HEV and describe a new SOC sustaining controller used by state-machine.

  • PDF

Intelligent consistency checking method for the use case model

  • Lee, Eun-young;Shim, Woo-gon;Paik, In-sup
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.50-56
    • /
    • 2003
  • In the development of complex software system, it is important to use hierarchical use case model due to the complex scope of development procedure. The use case model is core factor of the OMG (Object Management Group)'s UML (Unified Modeling Language) diagrams. In this paper, we propose a novel method to check syntactic consistency automatically in use case models at the different level of abstraction. This method is a rule-based approach which utilizes actor tree, use case tree and use case description. The proposed method is simulated on ITS (Intelligent Transportation System) architecture for the verification.

  • PDF

A Method to Minimize Classification Rules Based on Data Mining and Logic Synthesis

  • Kim, Jong-Wan
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1739-1748
    • /
    • 2008
  • When we conduct a data mining procedure on sample data sources, several rules are generated. But some rules are redundant or logically disjoint and therefore they can be removed. We suggest a new rule minimization algorithm inspired from logic synthesis to improve comprehensibility and eliminate redundant rules. The method can merge several relevant rules into one based on data mining and logic synthesis without high loss of accuracy. In case of two or more rules are candidates to be merged, we merge the rules with the attribute having the lowest information gain. To show the proposed method could be a reasonable solution, we applied the proposed approach to a problem domain constructing user preferred ontology in anti-spam systems.

  • PDF

The Protocol on WS-ECA Framework (WS-ECA 프레임워크 프로토콜)

  • Lee, Won-Suk;Park, Jong-Hun;Lee, Kyu-Chul
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.55-73
    • /
    • 2007
  • Importance of coordination among heterogeneous devices is significantly increasing to meet the challenges presented by the evolvement of the ubiquitous computing environment. The web services technology is going up as a promising solution to support the inter-operability between such heterogeneous devices via well-defined protocol. Currently, ECA(Event-Condition-Action) rule based framework for coordinating devices is proposed, it is called as WS-ECA(Web Services-ECA) framework. This framework was basically based on the web services and proposed the ECA based rule language, And this also proposed the framework that could enable the device coordination based on proposed rule language. In this paper, we propose the protocol among the components of WS-ECA framework to support dynamic feature for ubiquitous environment, and we also propose WSDL extension to support service and event descriptions these are provided in components of this framework.

  • PDF

Learning of Adaptive Behavior of artificial Ant Using Classifier System (분류자 시스템을 이용한 인공개미의 적응행동의 학습)

  • 정치선;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.10a
    • /
    • pp.361-367
    • /
    • 1998
  • The main two applications of the Genetic Algorithms(GA) are the optimization and the machine learning. Machine Learning has two objectives that make the complex system learn its environment and produce the proper output of a system. The machine learning using the Genetic Algorithms is called GA machine learning or genetic-based machine learning (GBML). The machine learning is different from the optimization problems in finding the rule set. In optimization problems, the population of GA should converge into the best individual because optimization problems, the population of GA should converge into the best individual because their objective is the production of the individual near the optimal solution. On the contrary, the machine learning systems need to find the set of cooperative rules. There are two methods in GBML, Michigan method and Pittsburgh method. The former is that each rule is expressed with a string, the latter is that the set of rules is coded into a string. Th classifier system of Holland is the representative model of the Michigan method. The classifier systems arrange the strength of classifiers of classifier list using the message list. In this method, the real time process and on-line learning is possible because a set of rule is adjusted on-line. A classifier system has three major components: Performance system, apportionment of credit system, rule discovery system. In this paper, we solve the food search problem with the learning and evolution of an artificial ant using the learning classifier system.

  • PDF

A Method for Reactive Scheduling using Rule-based Constraint Satisfaction Problem (규칙적인 논리프로그램밍을 이용한 탄력적 제약 만족문제 해법)

  • Kim, Chul-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3113-3118
    • /
    • 2000
  • A framework proposed in this paper includes representations of multi-objectives rule-basd constraint satisfaction problem(RCSP) and especially, flexible structure of RCSP which provides adequate solution sithin an expectation time and adaptively considers some change of constratraints on the RCSP. In this study, the power system implemented by above framework is entirely programmed by using a modeling system for the quantitative model and a rule-based constraint programming tool for the qualitative model. The results of an exemplary cse show how the structure that involves the problem representation gives the scheduler an effective decision and what are the advantages of the easy and diverse representation for considering the techmical characteristics of the units on the RCSP over the traditional problem.

  • PDF

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

A Study on the Information Exchange Technology Between IEDs Using SOAP in Network Based Substation Automation System (네트워크 기반 자동화 변전소에서 SOAP을 이용한 IED간 정보교환기술 연구)

  • Ko, Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.9
    • /
    • pp.376-383
    • /
    • 2006
  • In this paper, autonomous information exchange methodology is studied between IEDs using SOAP protocol based on XML and PtP communication to archive the safety and reliability of large-scale system operation. The SOAP protocol has the advantages in the independency Problem for operating systems, using language, platforms and the security problem because it is XML-based RPC protocol. Inference-based solution of the IED is designed as rule-based solution so that the IED internal status, the system status or the faulted zone can be inferred autonomously using the internal data as well as information data obtained from free information exchange among other IEDS, Also, it is designed so that the inference results and the operation information are transmitted to the above SCADA system, and determined autonomously whether the commands from the SCADA are executed or not. Finally, The inference-based solution of IED and information exchange system among IEDS is implemented using MS Visual C++ MFC, MS SOAP and MS XML. Availability and accuracy of the proposed methodology and the design is verified from diversity simulation reviews for typical distribution substation.