• Title/Summary/Keyword: rule generation

Search Result 377, Processing Time 0.025 seconds

A Study on the Determination for Stochastic Reservoir Capacity (추계학적 저수용량 결정에 관한 연구)

  • Choe, Han-Gyu;Choe, Yong-Park;Kim, Chi-Hong
    • Water for future
    • /
    • v.19 no.2
    • /
    • pp.149-156
    • /
    • 1986
  • The generated sequences of monthly flows were analyzed based on the range concept. With the optimum operation rule of the reservoirs as the one which maximizes the wateruse downstream the waterrelease from the reservoir was determined and with \ulcorner consideration to the mean inflows and the range of monthly flows the required reservoirs capacity was stochastically determind. It is suggested that the result obtained in this study would be applied to approximately estimate, in the stage of preliminary design, the required capacity of a reservoir in question with the limited information such as the mean monthly inflow and the period of reservoir operation. For the determination of a reservoir capacity Rippl's mass-curve method has been long used with the past river flow data assuming the same flow records will be repeated in the future. This study aims to find out a better method for determining the reservoir capacity by employing the analytical theory based on the stochastic process. For the present study the synthetic generation methods of Thomas-Fiering type was used to synthetically generate 50 years of monthly river inflows to three single-purpose reservoirs and three multi-purpose reservoirs.

  • PDF

Generation of Efficient Fuzzy Classification Rules for Intrusion Detection (침입 탐지를 위한 효율적인 퍼지 분류 규칙 생성)

  • Kim, Sung-Eun;Khil, A-Ra;Kim, Myung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.6
    • /
    • pp.519-529
    • /
    • 2007
  • In this paper, we investigate the use of fuzzy rules for efficient intrusion detection. We use evolutionary algorithm to optimize the set of fuzzy rules for intrusion detection by constructing fuzzy decision trees. For efficient execution of evolutionary algorithm we use supervised clustering to generate an initial set of membership functions for fuzzy rules. In our method both performance and complexity of fuzzy rules (or fuzzy decision trees) are taken into account in fitness evaluation. We also use evaluation with data partition, membership degree caching and zero-pruning to reduce time for construction and evaluation of fuzzy decision trees. For performance evaluation, we experimented with our method over the intrusion detection data of KDD'99 Cup, and confirmed that our method outperformed the existing methods. Compared with the KDD'99 Cup winner, the accuracy was increased by 1.54% while the cost was reduced by 20.8%.

An Automatic Schema Generation System based on the Contents for Integrating Web Information Sources (웹 정보원 통합을 위한 내용 기반의 스키마 자동생성시스템)

  • Kwak, Jun-Young;Bae, Jong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.77-86
    • /
    • 2008
  • The Web information sources can be regarded as the largest distributed database to the users. By virtually integrating the distributed information sources and regarding them as a single huge database, we can query the database to extract information. This capability is important to develop Web application programs. We have to infer a database schema from browsing-oriented Web documents in order to integrate databases. This paper presents a heuristic algorithm to infer the XML Schema fully automatically from semi-structured Web documents. The algorithm first extracts candidate pattern regions based on predefined structure-making tags, and determines a target pattern region using a few heuristic factors, and then derives XML Schema extraction rules from the target pattern region. The schema extraction rule is represented in XQuery, which makes development of various application systems possible using open standard XML tools. We also present the experimental results for several public web sources to show the effectiveness of the algorithm.

  • PDF

Nonlinear Inference Using Fuzzy Cluster (퍼지 클러스터를 이용한 비선형 추론)

  • Park, Keon-Jung;Lee, Dong-Yoon
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.203-209
    • /
    • 2016
  • In this paper, we introduce a fuzzy inference systems for nonlinear inference using fuzzy cluster. Typically, the generation of fuzzy rules for nonlinear inference causes the problem that the number of fuzzy rules increases exponentially if the input vectors increase. To handle this problem, the fuzzy rules of fuzzy model are designed by dividing the input vector space in the scatter form using fuzzy clustering algorithm which expresses fuzzy cluster. From this method, complex nonlinear process can be modeled. The premise part of the fuzzy rules is determined by means of FCM clustering algorithm with fuzzy clusters. The consequence part of the fuzzy rules have four kinds of polynomial functions and the coefficient parameters of each rule are estimated by using the standard least-squares method. And we use the data widely used in nonlinear process for the performance and the nonlinear characteristics of the nonlinear process. Experimental results show that the non-linear inference is possible.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Generation of Changeable Face Template by Combining Independent Component Analysis Coefficients (독립성분 분석 계수의 합성에 의한 가변 얼굴 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chel-Han;Choi, Jeung-Yoon;Kim, Jai--Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.16-23
    • /
    • 2007
  • Changeable biometrics has been developed as a solution to problem of enhancing security and privacy. The idea is to transform a biometric signal or feature into a new one for the purposes of enrollment and matching. In this paper, we propose a changeable biometric system that can be applied to appearance based face recognition system. In the first step when using feature extraction, ICA(Independent Component Analysis) coefficient vectors extracted from an input face image are replaced randomly using their mean and variation. The transformed vectors by replacement are scrambled randomly and a new transformed face coefficient vector (transformed template) is generated by combination of the two transformed vectors. When this transformed template is compromised, it is replaced with new random numbers and a new scrambling rule. Because e transformed template is generated by e addition of two vectors, e original ICA coefficients could not be easily recovered from the transformed coefficients.

Generation of Motor Velocity Profile for Walking-Assistance System Using Humanoid Robot Model (휴머노이드 로봇 모델을 이용한 보행재활 훈련장치의 견인모터 속도 파형 생성)

  • Choi, Young-Lim;Choi, Nak-Yoon;Park, Sang-Il;Kim, Jong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.5
    • /
    • pp.631-638
    • /
    • 2012
  • This work proposes a new method to generate velocity profile of a traction motor equipped in a rehabilitation system for knee joint patients through humanoid robot simulation. To this end, a three-dimensional full-body humanoid robot model is newly constructed, and natural human gait is simulated by applying to it reference joint angle trajectories already published. Linear velocity is derived from distance data calculated between the positions of a thigh band and its traction motor at every sampling instance, which is a novel idea of this paper. The projection rule is employed to kinematically describe the humanoid robot because of its high efficiency and accuracy, and measured joint trajectories are used in simulating human natural gait referring to Winter's book. The attained motor velocity profile for a certain position in human body will be applied to our walking-assistance system which is implemented with a treadmill system.

A Recommendation System of Exponentially Weighted Collaborative Filtering for Products in Electronic Commerce (지수적 가중치를 적용한 협력적 상품추천시스템)

  • Lee, Gyeong-Hui;Han, Jeong-Hye;Im, Chun-Seong
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.625-632
    • /
    • 2001
  • The electronic stores have realized that they need to understand their customers and to quickly response their wants and needs. To be successful in increasingly competitive Internet marketplace, recommender systems are adapting data mining techniques. One of most successful recommender technologies is collaborative filtering (CF) algorithm which recommends products to a target customer based on the information of other customers and employ statistical techniques to find a set of customers known as neighbors. However, the application of the systems, however, is not very suitable for seasonal products which are sensitive to time or season such as refrigerator or seasonal clothes. In this paper, we propose a new adjusted item-based recommendation generation algorithms called the exponentially weighted collaborative filtering recommendation (EWCFR) one that computes item-item similarities regarding seasonal products. Finally, we suggest the recommendation system with relatively high quality computing time on main memory database (MMDB) in XML since the collaborative filtering systems are needed that can quickly produce high quality recommendations with very large-scale problems.

  • PDF

A Development of a Framework for Building Knowledge based Augmented Reality System (지식기반 증강현실 시스템 구축을 위한 프레임워크 개발)

  • Woo, Chong-Woo;Lee, Doo-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.49-58
    • /
    • 2011
  • Augmented Reality(AR) assists human's cognitive ability through the information visualization by substantiating information about virtual situation. This technology is studied in a variety of ways including education, design, industry, and so on, by various supply of information devices equipped with cameras and display monitors. Since the most of the AR system depends on limited interaction that responds to the order from user, it can not reflect diverse real world situation. In this study, we suggest a knowledge based augmented reality system, which is composed of context awareness agent that provides recognized context information, along with knowledge based component that provides intelligent capability by utilizing domain knowledges. With this capability, the augmented object can generate dynamic model intelligently by reflecting context information, and can make the interaction possible among the multiple objects. We developed rule based context awareness system along with 3D model generation, and tested interaction among the augmented objects. And we suggest a framework that can provide a convenient way of developing augmented reality system for user.

Heuristics for Job Shop Scheduling Problems with Progressive Weighted Tardiness Penalties and Inter-machine Overlapping Sequence-dependent Setup Times

  • Mongkalig, Chatpon;Tabucanon, Mario T.;Hop, Nguyen Van
    • Industrial Engineering and Management Systems
    • /
    • v.4 no.1
    • /
    • pp.1-22
    • /
    • 2005
  • This paper presents new scheduling heuristics, namely Mean Progressive Weighted Tardiness Estimator (MPWT) Heuristic Method and modified priority rules with sequence-dependent setup times consideration. These are designed to solve job shop scheduling problems with new performance measures - progressive weighted tardiness penalties. More realistic constraints, which are inter-machine overlapping sequence-dependent setup times, are considered. In real production environments, inter-machine overlapping sequence-dependent setups are significant. Therefore, modified scheduling generation algorithms of active and nondelay schedules for job shop problems with inter-machine overlapping sequence-dependent setup times are proposed in this paper. In addition, new customer-based measures of performance, which are total earliness and progressive weighted tardiness, and total progressive weighted tardiness, are proposed. The objective of the first experiment is to compare the proposed priority rules with the consideration of sequence-dependent setup times and the standard priority rules without setup times consideration. The results indicate that the proposed priority rules with setup times consideration are superior to the standard priority rules without the consideration of setup times. From the second experiment and the third experiment to compare the proposed MPWT heuristic approach with the efficient priority rules with setup times consideration, the MPWT heuristic method is significantly superior to the Batched Apparent Tardiness Cost with Sequence-dependent Setups (BATCS) rule, and other priority rules based on total earliness and progressive weighted tardiness, and total earliness and tardiness.