• Title/Summary/Keyword: rule-base

Search Result 630, Processing Time 0.031 seconds

Fuzzy Rule Generation and Optimization for the Intelligent Diagnosis System of Diseases associated with Acute Abdominal Pain Based on Fuzzy Relational Products (급성복통과 관련된 지능형 질환 진단시스템을 위한 퍼지 규칙 생성과 이의 최적화)

  • Hyun Woo-Seok
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.855-860
    • /
    • 2004
  • This paper describes knowledge base optimization of an intelligent diagnosis system based on fuzzy relational products(IDS-DAAP) for the diseases with acute abdominal Pain. The knowledge base of IDS-DAAP is composed of the fuzzy rules and the fuzzy membership functions. The author here proposes an advanced intelligent diagnosis system (A-lDS-DAAP) in which the fuzzy rule generation algorithm is applied. Comparing with previous IDS-DAAP and IDS-DAAP-NN, a modified approach with A-IDS-DAAP shows that it improves the diagnosis rate and reduces the time to diagnose.

Reduction of Fuzzy Rules and Membership Functions and Its Application to Fuzzy PI and PD Type Controllers

  • Chopra Seema;Mitra Ranajit;Kumar Vijay
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.4
    • /
    • pp.438-447
    • /
    • 2006
  • Fuzzy controller's design depends mainly on the rule base and membership functions over the controller's input and output ranges. This paper presents two different approaches to deal with these design issues. A simple and efficient approach; namely, Fuzzy Subtractive Clustering is used to identify the rule base needed to realize Fuzzy PI and PD type controllers. This technique provides a mechanism to obtain the reduced rule set covering the whole input/output space as well as membership functions for each input variable. But it is found that some membership functions projected from different clusters have high degree of similarity. The number of membership functions of each input variable is then reduced using a similarity measure. In this paper, the fuzzy subtractive clustering approach is shown to reduce 49 rules to 8 rules and number of membership functions to 4 and 6 for input variables (error and change in error) maintaining almost the same level of performance. Simulation on a wide range of linear and nonlinear processes is carried out and results are compared with fuzzy PI and PD type controllers without clustering in terms of several performance measures such as peak overshoot, settling time, rise time, integral absolute error (IAE) and integral-of-time multiplied absolute error (ITAE) and in each case the proposed schemes shows an identical performance.

Design of Dynamic Time Warp Element for Speech Recognition (음성인식을 위한 Dynamic Time Warp 소자의 설계)

  • 최규훈;김종민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.3
    • /
    • pp.543-552
    • /
    • 1994
  • Dynamic Time Warp(DTW) needs for iterative calculations and the design of PE cell suitable for the operations is very important. Accordingly, this paper aims at real time recognition design enables large dictionary hardware realization using DTW algorithm. The DTW PE cell separated into three large blocks. "MIN" is the one block for counting accumulated minimum distance. "ADD" block calculates these minimum distances, and "ABS" seeks for the absolute values to the total sum of local distances. Circuit design and verification about the three block have been accomplished, and performed layout '||'&'||' DRC(design rule check) using 1.2 m CMOS N-Well rule base.CMOS N-Well rule base.

  • PDF

An Integrated MIN Circuit Design of DTW PE for Speech Recognition (음성인식용 DTW PE의 IC화를 위한 MIN회로의 설계)

  • 정광재;문홍진;최규훈;김종교
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.8
    • /
    • pp.639-647
    • /
    • 1990
  • Dynamic time warp(DTW) needs for interative calculations and the design of PE cell suitable for the operations is very important. Accordingly, this paper aims at the real time recognition design which enables large dictionary hardware realization using DTW algorithm. The DTW PE cell is seperated into three large blocks. "MIN" is the one block for counting accumulated minimum distance, "ADD" block calculates these minimum distances, and "ABS" seeks for the absolute values to the total sum of local distances. We have accomplisehd circuit design and verification for the MIN blocks, and performed MIN layout and DRC(design rule check) using 3um CMOS N-Well rule base.ing 3um CMOS N-Well rule base.

  • PDF

음성인식용 DTW PE의 IC화를 위한 ADD 및 ABS 회로의 설계

  • 정광재;문홍진;최규훈;김종교
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.8
    • /
    • pp.648-658
    • /
    • 1990
  • There are many methods for speed up counting in speech recongition. A multiple processing method is the one way to achieve the aim using systolic array. This arithmetic operation by the array is achieved pipelining skill. And the operation is multiprocessing by processing element(PE) that is incresing counting efficiencies. The DTW PE cell is seperated into three large blocks. "MIN" is the one block for counting accumulated minimum distance, "ADD" block calculated these minimum distances, and "ABS" seeks for the absolut values to the total sum of local distances. We have accomplished circuit design and verification about the "ADD" and "ABS" blocks, and performed total layout '||'&'||' DRC(design rule check) using 3um CMOS N-Well rule base.le check) using 3$\mu$m CMOS N-Well rule base.

  • PDF

Discrete event systems modeling and scheduling of flexible manufacturing systems

  • Tamura, Hiroyuki;Hatono, Itsuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1564-1569
    • /
    • 1991
  • In this paper we describe Flexible Manufacturing Systems (FMS) using Petri nets, since Petri nets provide a powerful tool for modeling dynamical behavior of discrete concurrent processes. We deal with off-Line and on-Line rule-based scheduling of FMS. The role of the rule-base is to generate appropriate priority rule for resolving conflicts, that is, for selecting one of enabled transitions to be fired in a conflict set of the Petri nets. This corresponds to select a part type to be processed in the FMS. Towards developing more Intelligent Manufacturing Systems (IMS) we propose a conceptual framework of a futuristic intelligent scheduling system.

  • PDF

A Study on Project Scheduling under Multiple Resource Constraints (다수 자원제약 하에서의 프로젝트 일정계획에 관한 연구)

  • Lee, Jeong-Hun;Kim, Pan-Sool;Moon, Il-Kyeong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.4
    • /
    • pp.219-229
    • /
    • 2010
  • The PERT/CPM are considered as the base procedures for the most successful project scheduling programs. Unfortunately, it is not easy to apply these procedures to real-life projects. This is due to the fact that PERT/CPM assume an infinite number of resources for each activity in project networks. Obviously, the completion time under no constraints is less than when constraints are imposed. One way of approaching this problem is to use heuristic solution techniques. In this paper, we present three heuristics; MRU (Maximum Resource Use) rule, STU (Shortest Time Use) rule, MRUP (Max Resource Use and Period) rule for allocating resources to activities of projects under multiple resource constraints. Comparisons of the project durations show that these heuristic rules are superior to AG3 rule that has been widely used in practice (Elsayed and Boucher, 1994).

A Study of Rule-based Fault Detection Algorithm in the HVAC System (규칙기반 고장진단 알고리즘의 실험적 연구)

  • Cho, Soo;Tae, Choon-Seob;Jang, Cheol-Yong;Yang, Hoon-Cheol
    • Proceedings of the SAREK Conference
    • /
    • 2005.11a
    • /
    • pp.241-246
    • /
    • 2005
  • The objective of this study is to develop a rule-based fault detection and diagnosis algorithm and an experimental verification using air handling unit. To develop an analytical algorithm which precisely detects a faulted component, energy equations at each control volume of AHU were applied. An experimental verification was conducted in the AHU at Green Building in KIER. In the experiment conducted in hot summer condition, the rule based FDD algorithm isolated a faulted sensor from HVAC components.

  • PDF

Development of Case-adaptation Algorithm using Genetic Algorithm and Artificial Neural Networks

  • Han, Sang-Min;Yang, Young-Soon
    • Journal of Ship and Ocean Technology
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2001
  • In this research, hybrid method with case-based reasoning and rule-based reasoning is applied. Using case-based reasoning, design experts'experience and know-how are effectively represented in order to obtain a proper configuration of midship section in the initial ship design stage. Since there is not sufficient domain knowledge available to us, traditional case-adaptation algorithms cannot be applied to our problem, i.e., creating the configuration of midship section. Thus, new case-adaptation algorithms not requiring any domain knowledge are developed antral applied to our problem. Using the knowledge representation of DnV rules, rule-based reasoning can perform deductive inference in order to obtain the scantling of midship section efficiently. The results from the case-based reasoning and the rule-based reasoning are examined by comparing the results with various conventional methods. And the reasonability of our results is verified by comparing the results wish actual values from parent ship.

  • PDF

A Design and Implement of Network Intrusion Protection System using Rule based DB and RBAC Policy (RBAC 정책기반의 Rule-DB를 이용한 네트워크 침입차단 시스템 설계 및 구현)

  • Park, Myung-Ho;Youck, Sang-Jo;Lee, Geuk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.745-747
    • /
    • 2003
  • RBAC(Role-Base Access Control)은 호스트상의 유저(User)들에게 Role을 적용하여 호스트를 분산 관리하는 방식이다. 본 논문에서는 RBAC방식을 응용하여 Role을 네트워크의 호스트에 적용해서 네트워크 자원 사용에 제한을 두는 침입차단 방식을 제안한다. 그리고 Rule의 적용을 메뉴화하여 선택함으로 Rule적용의 편이성에 기여하는 불법적이고 불필요한 사용을 방어할 수 있는 네트워크 침입차단 시스템을 설계 및 구현을 한다.

  • PDF