• 제목/요약/키워드: fuzzy inference

검색결과 1,294건 처리시간 0.029초

발전용 최적 Soot Blowing 시스템 개발 (The Development of Optimal Soot Blowing System for Power Plant)

  • 김성호;정해원;육심균
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2001년도 추계학술대회논문집B
    • /
    • pp.897-902
    • /
    • 2001
  • SBOS(Soot blower Optimum System) analyzes the accumulated fouling rate of a coal-fired boiler plant at short intervals, compares it with a reference data, and determines the optimal time of soot blowing. In this paper, ANFIS algorithm which is an optimal algorithm to detect variation of boiler performance with time, updating the reference data and to eliminate the effects of noise in field signal is used to clean heating surface and to reduce steam needed to blow the soot.

  • PDF

ADEX 개발에 관한 연구 (A study on the development of ADEX)

  • 오재응;신준;한창수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1992년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 19-21 Oct. 1992
    • /
    • pp.453-456
    • /
    • 1992
  • Diagnostic prototype expert system was developed by analyzing the measured acoustical data of automobile. For the utilities of this system, 1/3 octave filter(band-pass filter) and A/D converter were used for data acquisition and then information was analyzed using signal processing technique and pattern recognition by Hamming network algorithm. In order to raise the reliability of the diagnostic results, fuzzy inference technique was applied and, the results were displayed as graphical method to help the novice in diagnostic field. The validation of this diagnostic system was checked through experiments and it showed and acceptable performance for diagnostic process.

  • PDF

Hidden Markov Model을 이용한 필기체 한글 및 영.숫자 오프라인 인식 (Off-line recognition of handwritten korean and alphanumeric characters using hidden markov models)

  • 김우성;박래홍
    • 전자공학회논문지B
    • /
    • 제31B권9호
    • /
    • pp.85-100
    • /
    • 1994
  • This paper proposes a recognition system of constrained handwritten Hangul and alphanumeric characters using discrete hidden Markov models (HMM). HMM process encodes the distortion and similarity among patterns of a class through a doubly stochastic approach. Characterizing the statistical properties of characters using selected features, a recognition system can be implemented by absorbing possible variations in the form. Hangul shapes are classified into six types by fuzzy inference, and their recognition is performed based on quantized features by optimally ordering features according to their effectiveness in each class. The constrained alphanumerics recognition is also performed using the same features used in Hangul recognition. The forward-backward, Viterbi, and Baum-Welch reestimation algorithms are used for training and recognition of handwritten Hangul and alphanumeric characters. Simulation result shows that the proposed method recognizes handwritten Korean characters and alphanumerics effectively.

  • PDF

Application of the auxiliary tunnel reinforcement design using the decision making tools based on expert system integrated fuzzy inference rule

  • Kim Changyong;Hong Sungwan;Bae Gyujin;Kim Kwangyeom
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 한국지구물리탐사학회 2003년도 Proceedings of the international symposium on the fusion technology
    • /
    • pp.262-271
    • /
    • 2003
  • Specification of reinforcement method was suggested according to the ground condition and tunnelling environment such as adjacent building and surface settlement. Tunnel database consists of 8 different groups of data according to the tunnel construction situations and major problems of ground. A tunnel countermeasure expert system based on client/server system was developed with on-line. The expert system provides proper solution to the each construction sites backing up the information of the tunnelling and ground information through Internet. The effective factors of tunnel construction were shown by the analyzing relationship and partial relationship between face stability and RMR factors. This study will be very helpful to make the most of in-situ data and suggest proper applicability of tunnel reinforcement system escaping from the dependence of some experienced experts for the absent of guide.

  • PDF

공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구 (A Study on Improvement Stability of Cloud Service using Attack Information Collection)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권2호
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

자율이동로봇의 안전주행을 위한 주행성 맵 작성 (Development of a Traversability Map for Safe Navigation of Autonomous Mobile Robots)

  • 진강규
    • 제어로봇시스템학회논문지
    • /
    • 제20권4호
    • /
    • pp.449-455
    • /
    • 2014
  • This paper presents a method for developing a TM (Traversability Map) from a DTM (Digital Terrain Model) collected by remote sensors of autonomous mobile robots. Such a map can be used to plan traversable paths and estimate navigation speed quantitatively in real time for robots capable of performing autonomous tasks over rough terrain environments. The proposed method consists of three parts: a DTM partition module which divides the DTM into equally spaced patches, a terrain information module which extracts the slope and roughness of the partitioned patches using the curve fitting and the fractal-based triangular prism method, and a traversability analysis module which assesses traversability incorporating with extracted terrain information and fuzzy inference to construct a TM. The potential of the proposed method is validated via simulation works over a set of fractal DTMs.

음성인식과 웨어러블 모듈을 이용한 이동로봇 제어 (Control of Mobile Robot Using Voice Recognition and Wearable Module)

  • 정성호;서재용;김용민;전홍태
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(3)
    • /
    • pp.37-40
    • /
    • 2002
  • Intelligent Wearable Module is intelligent system that arises when a human is part of the feedback loop of a computational process like a certain control system. Applied system is mobile robot. This paper represents the mobile robot control system remote controlled by Intelligent Wearable Module. So far, owing to the development of internet technologies, lots of remote control methods through internet have been proposed. To control a mobile robot through internet and guide it under unknown environment, We propose a control method activated by Intelligent Wearable Module. In a proposed system, PDA acts as a user interface to communicate with notebook as a controller of the mobile robot system using TCP/IP protocol, and the notebook controls the mobile robot system. Tlle information about the direction and velocity of the mobile robot feedbacks to the PDA and the PDA send new control method produced from the fuzzy inference engine.

  • PDF

MPEG 도메인상에서 카메라 움직임 정보 추출 방법 (An Extraction Method of Camera Operations In MPEG Domain)

  • 강명규;박성한
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅳ
    • /
    • pp.2084-2087
    • /
    • 2003
  • 본 논문에서는 MPEG 압축 도메인 상에서 카메라 움직임 정보를 추출하는 효과적인 방법을 제안한다. 카메라 움직임 정보는 동영상에서의 주요 장면과 프레임간의 관계를 기술할 수 있는 실마리를 제공한다. 본 논문에서는 MPEG Video의 모션벡터를 이용하여 카메라 움직임 정보를 추출한다. 카메라 움직임에 따라 모션벡터는 특징적으로 분포하는 특성이 있다. 본 논문에서는 이러한 특징들을 이용하여 MPEG 모션벡터의 방향성과 크기를 이용하여 각 모션벡터끼리 교차점과 평행성분을 구한다. 그리고 이것을 이용하여 같은 교차점과 평행성분끼리 모션벡터 Clustering 을 수행한다 본 논문에서는 클러스터링 된 모션벡터를 Fuzzy inference rule을 이용하여 카메라 움직임이 Zoom, Pan, Tilt 인지 여부를 판단한다. 실험은 전통적인 방법 중에 하나인 Affine Model 방법과 비교하며 본 논문의 방법이 어느정도 우수함을 입증한다.

  • PDF

지중송전계통 보호용 거리계전 알고리즘 테스트 및 하드웨어 구축 (Distance Relay Algorithm and Hardware Test for Protection of Underground Power Cable Systems)

  • 정채균;이종범;이재규;오성권;이원교;이동일;황갑철
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.428-429
    • /
    • 2008
  • In a previous paper, the distance relay algorithm for protecting of the underground power cable system was introduced. It effectively advance the errors using ACI(Advanced Computing Intelligence) technique. In this algorithm, the optimization was performed by fuzzy inference system and genetic algorithm. In this paper, hardware system based on ACI technique is introduced and tested by hardware test.

  • PDF

퍼지추론 기반 Polynomial RBF Neural Network 설계와 얼굴 인식으로의 적용 (The Design of Polynomial RBF Neural Network based on Fuzzy Inference and Its application to Face Recognition)

  • 김길성;이경희;오성권
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.1889-1890
    • /
    • 2008
  • 본 연구에서는 퍼지 추론 메커니즘에 기반 한 Polynomial RBF Neural Network(p-RBFNN)를 설계하고 얼굴인식 문제로 적용하여 분류기로서의 성능을 분석한다. 제안된 p-RBFNN 구조는 FCM 클러스터링에 기반 한 분할 함수를 활성 함수로 사용하며, 다항식 함수로 구성된 연결가중치를 사용함으로서 기존 신경회로망 분류기의 선형적인 특성을 개선한다. p-RBFNN 구조는 언어적 해석관점에서 "If-then"의 퍼지 규칙으로 표현되며 퍼지 추론 메커니즘에 의해 구동된다. 즉 조건부, 결론부, 추론부 세 가지의 기능적 모듈로 나뉘어 네트워크 구조가 형성된다. 조건부는 FCM 클러스터링을 사용하여 입력 공간을 분할하고, 결론부는 분할된 로컬 영역을 다항식 함수로 표현한다. 마지막으로, 네트워크의 최종출력은 추론부의 퍼지추론에 의한다. 또한 제안된 p-RBFNN을 얼굴인식 문제로 적용하여 성능을 분석한다.

  • PDF