74 research outputs found
Fuzzy expert systems in civil engineering
Imperial Users onl
Recommended from our members
Modelling the behaviour of a process control operator under stress
In this study, a framework to model the effects of stress on a process control operator is proposed. There exists many cognitive models, each of which attempts to model a specific class of human behaviour. One major effect of stress is the cause of errors, both physical and cognitive. In order to model the effects of stress, two cognitive models, a cognitive model of human errors and a cognitive model of process control operators are examined in detail.
In this thesis, the basic functions of the human cognitive system, its organization and a cognitive model of error commission are first examined. The behaviour of a process control operator and a cognitive model of the behaviour of the operator are then discussed.
The known effects of stress on the process control operator's behaviour are described and a framework for modelling the behaviour of process control operators under stress is proposed. The inadequacies associated with existing cognitive models for process control operators are explained and a modified cognitive model is proposed, which takes into account the cognitive model of error.
Finally, an architecture design for the implementation of the cognitive model is provided and suggestions for the next step forward are proposed
A blackboard-based system for learning to identify images from feature data
A blackboard-based system which learns recognition rules for
objects from a set of training examples, and then identifies and locates
these objects in test images, is presented. The system is designed to use
data from a feature matcher developed at R.S.R.E. Malvern which finds the
best matches for a set of feature patterns in an image. The feature
patterns are selected to correspond to typical object parts which occur
with relatively consistent spatial relationships and are sufficient to
distinguish the objects to be identified from one another.
The learning element of the system develops two separate sets of
rules, one to identify possible object instances and the other to attach
probabilities to them. The search for possible object instances is
exhaustive; its scale is not great enough for pruning to be necessary.
Separate probabilities are established empirically for all combinations
of features which could represent object instances. As accurate
probabilities cannot be obtained from a set of preselected training
examples, they are updated by feedback from the recognition process.
The incorporation of rule induction and feedback into the blackboard
system is achieved by treating the induced rules as data to be held on a
secondary blackboard. The single recognition knowledge source
effectively contains empty rules which this data can be slotted into,
allowing it to be used to recognise any number of objects - there is no
need to develop a separate knowledge source for each object. Additional
object-specific background information to aid identification can be added
by the user in the form of background checks to be carried out on
candidate objects.
The system has been tested using synthetic data, and successfully
identified combinations of geometric shapes (squares, triangles etc.).
Limited tests on photographs of vehicles travelling along a main road
were also performed successfully
Two formalisms of extended possibilistic logic programming with context-dependent fuzzy unification A comparative description
AbstractPossibilistic logic is a logic of uncertainty where a certainty degree between 0 and 1, interpreted as a lower bound of a necessity measure, is attached to each classical formula. In this paper we present a comparative description of two models extending first order possibilistic logic so as to allow for fuzzy unification. The first formalism, called PLFC, is a general extension that allows clauses with fuzzy constants and fuzzily restricted quantifiers. The second formalism is an implication-based extension defined on top of Gödel infinitely-valued logic, capable of dealing with fuzzy constants. In this paper we compare these approaches, mainly their Horn-clause fragments, discussing their basic differences, specially in what regards their unification and automated deduction mechanisms
The posterity of Zadeh's 50-year-old paper: A retrospective in 101 Easy Pieces – and a Few More
International audienceThis article was commissioned by the 22nd IEEE International Conference of Fuzzy Systems (FUZZ-IEEE) to celebrate the 50th Anniversary of Lotfi Zadeh's seminal 1965 paper on fuzzy sets. In addition to Lotfi's original paper, this note itemizes 100 citations of books and papers deemed “important (significant, seminal, etc.)” by 20 of the 21 living IEEE CIS Fuzzy Systems pioneers. Each of the 20 contributors supplied 5 citations, and Lotfi's paper makes the overall list a tidy 101, as in “Fuzzy Sets 101”. This note is not a survey in any real sense of the word, but the contributors did offer short remarks to indicate the reason for inclusion (e.g., historical, topical, seminal, etc.) of each citation. Citation statistics are easy to find and notoriously erroneous, so we refrain from reporting them - almost. The exception is that according to Google scholar on April 9, 2015, Lotfi's 1965 paper has been cited 55,479 times
A New Prototype for Intelligent Visual Fraud Detection in Agent-Based Auditing Framework
While US. Sarbanes Oxley act has been viewed by most as an onerous and expensive requirement; it is having a positive impact on driving appropriate levels of investment in IT security, controls, and transactional systems. This paper introduces a new secure solution for auditing and accounting based on artificial intelligence technology. These days, security is a big issue among regulatory firms. Big companies are concerned about their data to be disseminated to their competitors; this high risk prevents them to provide full information to the regulatory firms. This solution not only significantly reduces the risk of unauthorized access to the company’s information but also facilitate a framework for controlling the flow of disseminating information in a risk free method. Managing security is performed by a network of mobile agents in a pyramid structure among regulatory organization like securities and exchanges commissions, stock exchanges in top of this pyramid to the companies in the button. Because of security considerations, our strategy is to delegate all fraud detection algorithms to Intelligent Mobile Auditing Agent and web service undertake all inter communicational activity. Web services can follow auditing actives in predefined framework and they can act based on permitted security allowance to auditors. The current solution is designed based on Java-based mobile agents. Such design reaps strong mobility and security benefits. This new prototyped solution could be a framework for strengthening security for future development in this area. An insider trading case study is used to demonstrate and evaluate the approach
- …