• Title/Summary/Keyword: fuzzy 추론

Search Result 861, Processing Time 0.025 seconds

Design of Multi-FPNN Model Using Clustering and Genetic Algorithms and Its Application to Nonlinear Process Systems (HCM 클러스처링과 유전자 알고리즘을 이용한 다중 FPNN 모델 설계와 비선형 공정으로의 응용)

  • 박호성;오성권;안태천
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.4
    • /
    • pp.343-350
    • /
    • 2000
  • In this paper, we propose the Multi-FPNN(Fuzzy Polynomial Neural Networks) model based on FNN and PNN(Polyomial Neural Networks) for optimal system identifacation. Here FNN structure is designed using fuzzy input space divided by each separated input variable, and urilized both in order to get better output performace. Each node of PNN structure based on GMDH(Group Method of Data handing) method uses two types of high-order polynomials such as linearane and quadratic, and the input of that node uses three kinds of multi-variable inputs such as linear and quadratic, and the input of that node and Genetic Algorithms(GAs) to identify both the structure and the prepocessing of parameters of a Multi-FPNN model. Here, HCM clustering method, which is carried out for data preproessing of process system, is utilized to determine the structure method, which is carried out for data preprocessing of process system, is utilized to determance index with a weighting factor is used to according to the divisions of input-output space. A aggregate performance inddex with a wegihting factor is used to achieve a sound balance between approximation and generalization abilities of the model. According to the selection and adjustment of a weighting factor of this aggregate abjective function which it is acailable and effective to design to design and optimal Multi-FPNN model. The study is illustrated with the aid of two representative numerical examples and the aggregate performance index related to the approximation and generalization abilities of the model is evaluated and discussed.

  • PDF

Design of Optimized pRBFNNs-based Face Recognition Algorithm Using Two-dimensional Image and ASM Algorithm (최적 pRBFNNs 패턴분류기 기반 2차원 영상과 ASM 알고리즘을 이용한 얼굴인식 알고리즘 설계)

  • Oh, Sung-Kwun;Ma, Chang-Min;Yoo, Sung-Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.749-754
    • /
    • 2011
  • In this study, we propose the design of optimized pRBFNNs-based face recognition system using two-dimensional Image and ASM algorithm. usually the existing 2 dimensional face recognition methods have the effects of the scale change of the image, position variation or the backgrounds of an image. In this paper, the face region information obtained from the detected face region is used for the compensation of these defects. In this paper, we use a CCD camera to obtain a picture frame directly. By using histogram equalization method, we can partially enhance the distorted image influenced by natural as well as artificial illumination. AdaBoost algorithm is used for the detection of face image between face and non-face image area. We can butt up personal profile by extracting the both face contour and shape using ASM(Active Shape Model) and then reduce dimension of image data using PCA. The proposed pRBFNNs consists of three functional modules such as the condition part, the conclusion part, and the inference part. In the condition part of fuzzy rules, input space is partitioned with Fuzzy C-Means clustering. In the conclusion part of rules, the connection weight of RBFNNs is represented as three kinds of polynomials such as constant, linear, and quadratic. The essential design parameters (including learning rate, momentum coefficient and fuzzification coefficient) of the networks are optimized by means of Differential Evolution. The proposed pRBFNNs are applied to real-time face image database and then demonstrated from viewpoint of the output performance and recognition rate.

Automatic Defect Inspection with Adaptive Binarization and Bresenham's Algorithm for Spectacle Lens Products (적응적 이진화 기법과 Bresenham's algorithm을 이용한 안경 렌즈 제품의 자동 흠집 검출)

  • Kim, Kwang Baek;Song, Dong Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1429-1434
    • /
    • 2017
  • In automatic defect detection problem for spectacle lenses, it is important to extract lens area accurately. Many existing detection methods fail to do it due to insufficient minute noise removal. In this paper, we propose an automatic defect detection method using Bresenham algorithm and adaptive binarization strategy. After usual average binarization, we apply Bresenham algorithm that has the power in extracting ellipse shape from image. Then, adaptive binarization strategy is applied to the critical minute noise removal inside the lens area. After noise removal, We can also compute the influence factor of the defect based on the fuzzy logic with two membership functions such as the size of the defect and the distance of the defect from the center of the lens. In experiment, our method successfully extracts defects in 10 out of 12 example images that include CHEMI, MID, HL, HM type lenses.

A Study on the Development of an Operation Risk Analysis Model in BTL Projects (BTL사업 운영리스크 분석 모형 개발에 관한 연구)

  • Lee, Jeong-Sun;Lee, Jeong-Hun;Oh, Se-Wook;Yoo, Hyun-Seok;Kim, Young-Suk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.475-480
    • /
    • 2008
  • In BTL project, the operation cost covering upcoming 20 years is usually alloted more than construction cost although its plan is made in short time. Therefore, it is a key issue to forecast and to analyze operation risks in the process of making contract in order to successfully finish the BTL project and to ensure the profitability of business. However, only a few domestic professional management companies are capable to carry out funding and facility management. To manage the potential risks efficiently in BLT project, it's essential to prioritize the risk factors by means of considering economical risk level, non-economical risk level and occurrence frequency. Thus, this study suggests risk analysis model for improving efficiency of BTL project from operation company's perspective by means of survey. The suggested risk analysis model is expected to establish a risk management strategy which can improve the efficiency of management affairs in BTL project.

  • PDF

A Study on Random Forest-based Estimation Model for Changing the Automatic Walking Mode of Above Knee Prosthesis (대퇴의족의 자동 보행 모드 변경을 위한 랜덤 포레스트 기반 추정 모델 개발에 관한 연구)

  • Na, Sun-Jong;Shin, Jin-Woo;Eom, Su-Hong;Lee, Eung-Hyuk
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.9-18
    • /
    • 2020
  • The pattern recognition or fuzzy inference, which is mainly used for the development of the automatic walking mode change of the above knee prosthesis, has a disadvantage in that it is difficult to estimate with the immediate change of the walking environment. In order to solve a disadvantage, this paper developed an algorithm that automatically converts the walking mode of the next step by estimating the walking environment at a specific gait phase. Since the proposed algorithm should be implanted and operated in the microcontroller, it is developed using the random forest base in consideration of calculation amount and estimated time. The developed random forest based gait and environmental estimation model were implanted in the microcontroller and evaluated for validity.

Fingerprint Identification Algorithm using Pixel Direction Factor in Blocks (블록별 화소방향성분을 이용한 지문의 동일성 판별 알고리즘)

  • Cho Nam-Hyung;Lee Joo-Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.123-130
    • /
    • 2005
  • In this paper, fingerprint identification algorithm using pixel direction factor in blocks is proposed to minimize false acceptance ratio and to apply security system. The proposed algorithm is that a fingerprint image is divided by 16 blocks, then feature parameters which have direct factors of $0^{\circ},\;45^{\circ},\;90^{\circ}\;and\;135^{\circ}$ is extracted for each block. Membership function of a reference fingerprint and an input fingerprint for the extracted parameters is calculated, then identification of two fingerprint is distinguished using fuzzy inference. False acceptance ratio is evaluated about different fingerprints of In kinds regardless of sex and shape which are obtained from adults, and false rejection ratio is evaluated about fingerprints which are obtained by adding fingerprints of 10 kinds on different fingerprints of 100 kinds. The experiment results is that false acceptance ratio is average $0.34\%$ about experiment of 4,950 times, and false rejection ratio is average $3.7\%$ about experiment of 1,000 times. The proposed algerian is excellent for recognition rate and security.

Intelligent Navigation Safety Information System using Blackboard (블랙보드를 이용한 지능형 항행 안전 정보 시스템)

  • Kim, Do-Yeon;Yi, Mi-Ra
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.3
    • /
    • pp.307-316
    • /
    • 2011
  • The majority of maritime accidents happened by human factor. For that reason, navigation experts want to an intelligent support system for navigation safety, without officer involvement. The expert system which is one of artificial intelligence skills for navigation support is an important tool that a machine can substitute for an expert through the design of a knowledge base and inference engine using the experience or knowledge of an expert. Further, in the real world, a complex situation requires synthetic estimation with the input of experts in various fields for the correct estimation of the situation, not any one expert. In particular, synthetic estimation is more important for navigation situations than in other cases, because of diverse potential threats. This paper presents the method of knowledge fusion pertaining to navigation safety knowledge from various expert systems, using a blackboard system. Then we will show the validity of the method via a design and implementation of test system effort.

Web access prediction based on parallel deep learning

  • Togtokh, Gantur;Kim, Kyung-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.51-59
    • /
    • 2019
  • Due to the exponential growth of access information on the web, the need for predicting web users' next access has increased. Various models such as markov models, deep neural networks, support vector machines, and fuzzy inference models were proposed to handle web access prediction. For deep learning based on neural network models, training time on large-scale web usage data is very huge. To address this problem, deep neural network models are trained on cluster of computers in parallel. In this paper, we investigated impact of several important spark parameters related to data partitions, shuffling, compression, and locality (basic spark parameters) for training Multi-Layer Perceptron model on Spark standalone cluster. Then based on the investigation, we tuned basic spark parameters for training Multi-Layer Perceptron model and used it for tuning Spark when training Multi-Layer Perceptron model for web access prediction. Through experiments, we showed the accuracy of web access prediction based on our proposed web access prediction model. In addition, we also showed performance improvement in training time based on our spark basic parameters tuning for training Multi-Layer Perceptron model over default spark parameters configuration.

Failure Restoration of Mobility Databases by Learning and Prediction of User Mobility in Mobile Communication System (이동 통신 시스템에서 사용자 이동성의 학습과 예측에 의한 이동성 데이타베이스의 실채 회복)

  • Gil, Joon-Min;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.412-427
    • /
    • 2002
  • This paper proposes a restoration scheme based on mobility learning and prediction in the presence of the failure of mobility databases in mobile communication systems. In mobile communication systems, mobility databases must maintain the current location information of users to provide a fast connection for them. However, the failure of mobility databases may cause some location information to be lost. As a result, without an explicit restoration procedure, incoming calls to users may be rejected. Therefore, an explicit restoration scheme against the failure of mobility databases is needed to guarantee continuous service availability to users. Introducing mobility learning and prediction into the restoration process allows systems to locate users after a failure of mobility databases. In failure-free operations, the movement patterns of users are learned by a Neuro-Fuzzy Inference System (NFIS). After a failure, an inference process of the NFIS is initiated and the users' future location is predicted. This is used to locate lost users after a failure. This proposal differs from previous approaches using checkpoint because it does not need a backup process nor additional storage space to store checkpoint information. In addition, simulations show that our proposal can reduce the cost needed to restore the location records of lost users after a failure when compared to the checkpointing scheme

An Implementation of Lighting Control System using Interpretation of Context Conflict based on Priority (우선순위 기반의 상황충돌 해석 조명제어시스템 구현)

  • Seo, Won-Il;Kwon, Sook-Youn;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.23-33
    • /
    • 2016
  • The current smart lighting is shaped to offer the lighting environment suitable for current context, after identifying user's action and location through a sensor. The sensor-based context awareness technology just considers a single user, and the studies to interpret many users' various context occurrences and conflicts lack. In existing studies, a fuzzy theory and algorithm including ReBa have been used as the methodology to solve context conflict. The fuzzy theory and algorithm including ReBa just avoid an opportunity of context conflict that may occur by providing services by each area, after the spaces where users are located are classified into many areas. Therefore, they actually cannot be regarded as customized service type that can offer personal preference-based context conflict. This paper proposes a priority-based LED lighting control system interpreting multiple context conflicts, which decides services, based on the granted priority according to context type, when service conflict is faced with, due to simultaneous occurrence of various contexts to many users. This study classifies the residential environment into such five areas as living room, 'bed room, study room, kitchen and bath room, and the contexts that may occur within each area are defined as 20 contexts such as exercising, doing makeup, reading, dining and entering, targeting several users. The proposed system defines various contexts of users using an ontology-based model and gives service of user oriented lighting environment through rule based on standard and context reasoning engine. To solve the issue of various context conflicts among users in the same space and at the same time point, the context in which user concentration is required is set in the highest priority. Also, visual comfort is offered as the best alternative priority in the case of the same priority. In this manner, they are utilized as the criteria for service selection upon conflict occurrence.