• Title/Summary/Keyword: rule language

Search Result 399, Processing Time 0.028 seconds

Minimization of Membership Function with Fuzzy Control (펴지 제어기의 소속함수 최소화에 관한 연구)

  • Joo, Han-Jo;Park, Seung-Hun;Hong, Dea-Sung;Yim, Wha-Yoeng
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.968-970
    • /
    • 2003
  • Fuzzy Controller is a system that displays a person's thoughts using membership function and IF-THEN rules. With the help of specialists' knowledge, rule bases can be explained in easy language. Furthermore Fuzzy Controller has strong resistance against turbulence. Its performance is especially prominent when targets cannot be measured in mathematic methods because the fuzzy controller can measure the output using only the relations between the input and output. But Fuzzy System has a problem that is calculation speed. I suggest you a theory to solve it. I applied a theory to inverted pendulum. Because it is represent of nonlinear system.

  • PDF

The Ontology Modeling for Situation-Awareness Framework in Ubiquitous Environment (유비쿼터스 환경의 상황인식 프레임워크를 위한 온톨로지 모델링)

  • Lee, Gi-Cheol;Lee, Ji-Hyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.224-227
    • /
    • 2006
  • 온톨로지는 뛰어난 확장성과 다양한 표현력 등 많은 장점을 갖고 있기 때문에 이를 이용한 유비쿼터스 환경 구축이 최근 제기되고 있고 이러한 유비쿼터스 환경에서의 다양한 정보(컨텍스트)들을 수집하고 분석하기 위해서 상황인식 시스템의 필요성이 제기되고 있다. 이러한 이유로 몇몇 프로젝트에서 온톨로지를 이용하여 상황인식 미들웨어를 제작하였지만 이러한 기존 미들웨어의 온톨로지 모델은 추론과 학습 서비스에 대한 고려가 부족하였고 또한 W3C에서 최근 제안한 SWRL(Semantic Web Rule Language)[1]이 고려되지 않았다. 그러므로 본 논문에서는 유비쿼터스 환경에서의 상황인식 프레임워크의 학습 및 추론서비스 향상을 위해 컨텍스트의 타입을 정의하였고 또한 SWRL을 이용하여 규칙을 표현할 수 있도록 온톨로지를 모델링 하였다.

  • PDF

Study on Chinese Character Borrowing in Korean Language (우리말 중 한자차용 실태 고찰 - 중국어의 한자차용 사례와의 비교를 중심으로)

  • PARK, SEOK HONG
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.359-384
    • /
    • 2013
  • There is linguistic phenomenon that Korean syllable, morpheme and word are substituted with Chinese Character. These phenomenon is called Chinese Character Borrowing, the Chinese character used here is called Borrowed Chinese Character. Whereas borrowing Chinese character in Chinese is used for borrowing only sound for different word, borrowing Chinese character in Korean is used for assigning new meaning. Hence, by borrowing Chinese character in Korean, a syllable which had no meaning originally get new meaning, morpheme and word meaning has changed. At advertisement and campaign, Chinese Character Borrowing has lots of linguistical advantage such as visual immediacy, effectiveness of meaning expression. However, there are number of cases found that violate grammar rule and word constitution practice by Chinese Character Borrowing. For this reason, Chinese Character Borrowing has the problem polluting Korean along with another foreign words. Thus, this paper focus on study Chinese Character Borrowing phenomenon in Korean, and analysis its effectiveness and impact in Korean. In addition, analysis the problem of Borrowed chinese Character, and suggestion several alternative for right use of Korean is followed.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (익명 통신로를 이용한 Escrow 전자화폐)

  • 김춘수;박춘식;전희종
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.29-46
    • /
    • 1999
  • Most of the previous researches for the electronic cash system guarantee unconditional untraceability for the purpose of individual privacy. Such untraceable electronic cash system that only focuses on untraceability, however, has side effect such as money laundering, criminal activities. We present a escrow cash model using anonymous channel that supports not only untaceability but also crime prevention, and prove the efficiency of our scheme relative to previous escrow cash systems.

A Study on Trends for Reforming the Rule of Warranty in English Insurance Contract Law (영국 보험계약법 상 담보법원칙의 개혁동향에 관한 연구)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.55
    • /
    • pp.209-240
    • /
    • 2012
  • Since the age of Lord Mansfield, who laid the foundation of the modern English insurance contract law in the second part of the 18th century, English insurance law has developed a unique rule of warranty. Lord Mansfield adopted very different approach and afforded such a strict legal character to insurance warranty, because the promise, given by the insured, played an important role for the insurer to assess the scope of the risk insured at that time. It is still important that the insured keep his promises strictly to the insurer under the insurance contract, but legal environments have changed dramatically since the times of Lord Mansfield. English Law Commission proposed some proposals for reforming the warranty regime to reflect the changes of legal environment in CP 2007. This article is, therefore, designed to examine the proposals and consider their legal and practical implications. The proposals of Law Commission is summarized as following. First, in CP 2007, Law Commission made two principal proposals for reform of the law on warranty. The first is that the insurer should not be entitled to rely on a breach of warranty unless the insured has been provided with a witten statement of what they have undertaken under warranty. The second is that the insurer should not be entitled to reject a claim on the ground that the insured has breached a warranty unless there was a causal connection between the breach and the loss. Secondly, for consumer insurance, the rule requiring a causal connection would be mandatory, whereas for business insurance, it would be possible for the parties to agree on the effect a breach of warranty should have, provided they use clear language to express their intentions. Thirdly, where the insured contracted on the insurer's written standard terms of business, some statutory controls would be afforded to the contract to ensure that the cover was not substantially different from what the insured reasonably expected. Finally, Law Commission propose that a breach of warranty give the insurer the right to terminate the contract, rather than automatically discharging it from liability, but (unless otherwise agreed) only if the breach has sufficiently serious consequences to justify termination under the general law of contract. Having evaluated the proposals of the Law Commission and considered their legal and practical implications, it is quite clear that the proposed rule interfere with freedom of contract and create legal uncertainty. But change can not made without any victims, so Law Commission's attempt to change severe and injust aspects of the warranty regime would be very welcomed and respected.

  • PDF

Building a Korean Sentiment Lexicon Using Collective Intelligence (집단지성을 이용한 한글 감성어 사전 구축)

  • An, Jungkook;Kim, Hee-Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.49-67
    • /
    • 2015
  • Recently, emerging the notion of big data and social media has led us to enter data's big bang. Social networking services are widely used by people around the world, and they have become a part of major communication tools for all ages. Over the last decade, as online social networking sites become increasingly popular, companies tend to focus on advanced social media analysis for their marketing strategies. In addition to social media analysis, companies are mainly concerned about propagating of negative opinions on social networking sites such as Facebook and Twitter, as well as e-commerce sites. The effect of online word of mouth (WOM) such as product rating, product review, and product recommendations is very influential, and negative opinions have significant impact on product sales. This trend has increased researchers' attention to a natural language processing, such as a sentiment analysis. A sentiment analysis, also refers to as an opinion mining, is a process of identifying the polarity of subjective information and has been applied to various research and practical fields. However, there are obstacles lies when Korean language (Hangul) is used in a natural language processing because it is an agglutinative language with rich morphology pose problems. Therefore, there is a lack of Korean natural language processing resources such as a sentiment lexicon, and this has resulted in significant limitations for researchers and practitioners who are considering sentiment analysis. Our study builds a Korean sentiment lexicon with collective intelligence, and provides API (Application Programming Interface) service to open and share a sentiment lexicon data with the public (www.openhangul.com). For the pre-processing, we have created a Korean lexicon database with over 517,178 words and classified them into sentiment and non-sentiment words. In order to classify them, we first identified stop words which often quite likely to play a negative role in sentiment analysis and excluded them from our sentiment scoring. In general, sentiment words are nouns, adjectives, verbs, adverbs as they have sentimental expressions such as positive, neutral, and negative. On the other hands, non-sentiment words are interjection, determiner, numeral, postposition, etc. as they generally have no sentimental expressions. To build a reliable sentiment lexicon, we have adopted a concept of collective intelligence as a model for crowdsourcing. In addition, a concept of folksonomy has been implemented in the process of taxonomy to help collective intelligence. In order to make up for an inherent weakness of folksonomy, we have adopted a majority rule by building a voting system. Participants, as voters were offered three voting options to choose from positivity, negativity, and neutrality, and the voting have been conducted on one of the largest social networking sites for college students in Korea. More than 35,000 votes have been made by college students in Korea, and we keep this voting system open by maintaining the project as a perpetual study. Besides, any change in the sentiment score of words can be an important observation because it enables us to keep track of temporal changes in Korean language as a natural language. Lastly, our study offers a RESTful, JSON based API service through a web platform to make easier support for users such as researchers, companies, and developers. Finally, our study makes important contributions to both research and practice. In terms of research, our Korean sentiment lexicon plays an important role as a resource for Korean natural language processing. In terms of practice, practitioners such as managers and marketers can implement sentiment analysis effectively by using Korean sentiment lexicon we built. Moreover, our study sheds new light on the value of folksonomy by combining collective intelligence, and we also expect to give a new direction and a new start to the development of Korean natural language processing.

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

Parametric modeling and shape optimization design of five extended cylindrical reticulated shells

  • Wu, J.;Lu, X.Y.;Li, S.C.;Xu, Z.H.;Wang, Z.D.;Li, L.P.;Xue, Y.G.
    • Steel and Composite Structures
    • /
    • v.21 no.1
    • /
    • pp.217-247
    • /
    • 2016
  • Five extended cylindrical reticulated shells are proposed by changing distribution rule of diagonal rods based on three fundamental types. Modeling programs for fundamental types and extended types of cylindrical reticulated shell are compiled by using the ANSYS Parametric Design Language (APDL). On this basis, conditional formulas are derived when the grid shape of cylindrical reticulated shells is equilateral triangle. Internal force analysis of cylindrical reticulated shells is carried out. The variation and distribution regularities of maximum displacement and stress are studied. A shape optimization program is proposed by adopting the sequence two-stage algorithm (RDQA) in FORTRAN environment based on the characteristics of cylindrical reticulated shells and the ideas of discrete variable optimization design. Shape optimization is achieved by considering the objective function of the minimum total steel consumption, global and locality constraints. The shape optimization for three fundamental types and five extended types is calculated with the span of 30 m~80 m and rise-span ratio of 1/7~1/3. The variations of the total steel consumption along with the span and rise-span ratio are analyzed with contrast to the results of shape optimization. The optimal combination of main design parameters for five extended cylindrical reticulated shells is investigated. The total steel consumption affected by distribution rule of diagonal rods is discussed. The results show that: (1) Parametric modeling method is simple, efficient and practical, which can quickly generate different types of cylindrical reticulated shells. (2) The mechanical properties of five extended cylindrical reticulated shells are better than their fundamental types. (3) The total steel consumption of cylindrical reticulated shells is optimized to be the least when rise-span ratio is 1/6. (4) The extended type of three-way grid cylindrical reticulated shell should be preferentially adopted in practical engineering. (5) The grid shape of reticulated shells should be designed to equilateral triangle as much as possible because of its reasonable stress and the lowest total steel consumption.

A Conversion from HTML5 to OWL Ontology (HTML5 문서로부터 OWL 온톨로지 구축 기법)

  • Sun, Taimao;Yoon, Yiyeon;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.143-158
    • /
    • 2013
  • HTML5, new standard for web language, is being standardized corresponding to the development of web. Since several new semantic elements have been added into HTML5 standard, current Web Environment is becoming more and more semantic. In order to provide better user experience by using information extraction from HTML5 page, new HTML5 Elements should be mapped to a corresponding Ontology. In this research, we will focus on new semantic elements to build Ontology from HTML5 document. For this purpose, we will propose a methodology of Schema level mapping rule and instance mapping rule.

On the Pinocchio Paradox (피노키오 역설에 대하여)

  • Song, Hasuk
    • Korean Journal of Logic
    • /
    • v.17 no.2
    • /
    • pp.233-253
    • /
    • 2014
  • The Pinocchio paradox that Eldridge-Smith suggested is a version of the semantic paradox. But it is unique in the sense that this paradox does not contain a semantic predicate. Tarski's solution which appeals to the hierarchy of language and Kripke's para-completeness which accepts the third truth value cannot solve the Pinocchio paradox. This paper argues that Eldridge-Smith's trial to criticize semantical dialetheism is not successful and that the paradox implies the rule of the truth predicate is inconsistent. That is, the proper diagnosis to this paradox is that the Pinocchio principle should be considered to be potentially inconsistent, which suggests that semantic paradoxes such as the liar paradox arise because the rule of the truth-predicate is inconsistent. The Pinocchio paradox teaches us that consistent view of truth cannot be successful to solve the semantic paradoxes and that we should accept the inconsistent view of truth.

  • PDF