1,985 research outputs found

    Intelligent Association Exploration and Exploitation of Fuzzy Agents in Ambient Intelligent Environments

    Get PDF
    This paper presents a novel fuzzy-based intelligent architecture that aims to find relevant and important associations between embedded-agent based services that form Ambient Intelligent Environments (AIEs). The embedded agents are used in two ways; first they monitor the inhabitants of the AIE, learning their behaviours in an online, non-intrusive and life-long fashion with the aim of pre-emptively setting the environment to the users preferred state. Secondly, they evaluate the relevance and significance of the associations to various services with the aim of eliminating redundant associations in order to minimize the agent computational latency within the AIE. The embedded agents employ fuzzy-logic due to its robustness to the uncertainties, noise and imprecision encountered in AIEs. We describe unique real world experiments that were conducted in the Essex intelligent Dormitory (iDorm) to evaluate and validate the significance of the proposed architecture and methods

    A synthesis of fuzzy rule-based system verification.

    Get PDF
    The verification of fuzzy rule bases for anomalies has received increasing attention these last few years. Many different approaches have been suggested and many are still under investigation. In this paper, we give a synthesis of methods proposed in literature that try to extend the verification of clasical rule bases to the case of fuzzy knowledge modelling, without needing a set of representative input. Within this area of fyzzy V&V we identify two dual lines of thought respectively leading to what is identified as static and dynamic anomaly detection methods. Static anomaly detection essentially tries to use similarity, affinity or matching measures to identify anomalies wihin a fuzzy rule base. It is assumed that the detection methods can be the same as those used in a non-fuzzy environment, except that the formerly mentioned measures indicate the degree of matching of two fuzzy expressions. Dynamic anomaly detection starts from the basic idea that any anomaly within a knowledge representation formalism, i.c. fuzzy if-then rules, can be identified by performing a dynamic analysis of the knowledge system, even without providing special input to the system. By imposing a constraint on the results of inference for an anomaly not to occur, one creates definitions of the anomalies that can only be verified if the inference pocess, and thereby the fuzzy inference operator is involved in the analysis. The major outcome of the confrontation between both approaches is that their results, stated in terms of necessary and/or sufficient conditions for anomaly detection within a particular situation, are difficult to reconcile. The duality between approaces seems to have translated into a duality in results. This article addresses precisely this issue by presenting a theoretical framework which anables us to effectively evaluate the results of both static and dynamic verification theories.

    An advanced computational intelligent framework to predict shear sonic velocity with application to mechanical rock classification

    Get PDF
    Shear sonic wave velocity (Vs) has a wide variety of implications, from reservoir management and development to geomechanical and geophysical studies. In the current study, two approaches were adopted to predict shear sonic wave velocities (Vs) from several petrophysical well logs, including gamma ray (GR), density (RHOB), neutron (NPHI), and compressional sonic wave velocity (Vp). For this purpose, five intelligent models of random forest (RF), extra tree (ET), Gaussian process regression (GPR), and the integration of adaptive neuro fuzzy inference system (ANFIS) with differential evolution (DE) and imperialist competitive algorithm (ICA) optimizers were implemented. In the first approach, the target was estimated based only on Vp, and the second scenario predicted Vs from the integration of Vp, GR, RHOB, and NPHI inputs. In each scenario, 8061 data points belonging to an oilfield located in the southwest of Iran were investigated. The ET model showed a lower average absolute percent relative error (AAPRE) compared to other models for both approaches. Considering the first approach in which the Vp was the only input, the obtained AAPRE values for RF, ET, GPR, ANFIS + DE, and ANFIS + ICA models are 1.54%, 1.34%, 1.54%, 1.56%, and 1.57%, respectively. In the second scenario, the achieved AAPRE values for RF, ET, GPR, ANFIS + DE, and ANFIS + ICA models are 1.25%, 1.03%, 1.16%, 1.63%, and 1.49%, respectively. The Williams plot proved the validity of both one-input and four-inputs ET model. Regarding the ET model constructed based on only one variable,Williams plot interestingly showed that all 8061 data points are valid data. Also, the outcome of the Leverage approach for the ET model designed with four inputs highlighted that there are only 240 "out of leverage" data sets. In addition, only 169 data are suspected. Also, the sensitivity analysis results typified that the Vp has a higher effect on the target parameter (Vs) than other implemented inputs. Overall, the second scenario demonstrated more satisfactory Vs predictions due to the lower obtained errors of its developed models. Finally, the two ET models with the linear regression model, which is of high interest to the industry, were applied to diagnose candidate layers along the formation for hydraulic fracturing. While the linear regression model fails to accurately trace variations of rock properties, the intelligent models successfully detect brittle intervals consistent with field measurements

    Operational Risk Management using a Fuzzy Logic Inference System

    Get PDF
    Operational Risk (OR) results from endogenous and exogenous risk factors, as diverse and complex to assess as human resources and technology, which may not be properly measured using traditional quantitative approaches. Engineering has faced the same challenges when designing practical solutions to complex multifactor and non-linear systems where human reasoning, expert knowledge or imprecise information are valuable inputs. One of the solutions provided by engineering is a Fuzzy Logic Inference System (FLIS). Despite the goal of the FLIS model for OR is its assessment, it is not an end in itself. The choice of a FLIS results in a convenient and sound use of qualitative and quantitative inputs, capable of effectively articulating risk management's identification, assessment, monitoring and mitigation stages. Different from traditional approaches, the proposed model allows evaluating mitigation efforts ex-ante, thus avoiding concealed OR sources from system complexity build-up and optimizing risk management resources. Furthermore, because the model contrasts effective with expected OR data, it is able to constantly validate its outcome, recognize environment shifts and issue warning signals.Operational Risk, Fuzzy Logic, Risk Management Classification JEL:G32, C63, D80

    A graph oriented approach for network forensic analysis

    Get PDF
    Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex multi-stage intrusions. This dissertation presents a novel graph based network forensic analysis system. The evidence graph model provides an intuitive representation of collected evidence as well as the foundation for forensic analysis. Based on the evidence graph, we develop a set of analysis components in a hierarchical reasoning framework. Local reasoning utilizes fuzzy inference to infer the functional states of an host level entity from its local observations. Global reasoning performs graph structure analysis to identify the set of highly correlated hosts that belong to the coordinated attack scenario. In global reasoning, we apply spectral clustering and Pagerank methods for generic and targeted investigation respectively. An interactive hypothesis testing procedure is developed to identify hidden attackers from non-explicit-malicious evidence. Finally, we introduce the notion of target-oriented effective event sequence (TOEES) to semantically reconstruct stealthy attack scenarios with less dependency on ad-hoc expert knowledge. Well established computation methods used in our approach provide the scalability needed to perform post-incident analysis in large networks. We evaluate the techniques with a number of intrusion detection datasets and the experiment results show that our approach is effective in identifying complex multi-stage attacks

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC

    Get PDF
    Autoimmune diseases occur when an inappropriate immune response takes place and produces autoantibodies to fight against human antigens. In order to detect autoimmune disease, a test called indirect immunofluorescence (IIF) will be carried out to identify antinuclear autoantibodies (ANA) in the HEp-2 cell. The outcome of the test includes observing fluorescence intensity of the sample and classifying the staining pattern of the cell. Current method of analysing the results is limited to subjective factors such as experience and skill of the medical experts. The results obtained from the visual analysis are debatable as it is inconsistent. Thus, there is a need for an automated recognition system to reduce the variability and increase the reliability of the test results. Automated system also saves time and cost as the system is able to process large amount of image data at one time. This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. This method is applied to the data set of the ICPR 2012 contest in which each cell has been manually segmented and annotated by specialists. The textural features extracted are based on the first-order statistics and second-order statistics computed from grey level co-occurrence matrices (GLCM). The first-order statistics features are mean, standard deviation and entropy while the features extracted by GLCM are contrast, correlation, energy and homogeneity. The extracted features will then be used as an input parameter to classify the staining pattern of the HEp-2 cell images by using Fuzzy Logic. The staining patterns are divided into five categories; homogeneous, nucleolar, centromere, fine speckled and coarse speckled. A working classification algorithm is developed by using MATLAB and the Fuzzy Logic Toolbox to differentiate and classify the staining pattern of HEp-2 cell images. The algorithm gives a mean accuracy of 84% out of 125 test images

    A DESIGN STUDY OF HEAT EXCHANGER PROCESS CONTROL BETWEEN CONVENTIONAL AND MAMDANI'S FUZZY LOGIC CONTROLLERS

    Get PDF
    A heat exchanger is a piece of equipment that continually transfers heat from one medium to another in order to carry process energy. In order to ensure its smooth operation, modeling and simulation of the system can be made so that its performance can be analyzed and improved. The scope of this study is more on simulation and software implementation of the control system design by using MATLAB. The main issue tackle in this study is to improve the performance of the heat exchanger process control. In this study, the heat exchanger is modeled using an empirical model to simulate the heat exchanger temperature response. A controller is then designed for the process using two approaches, one using a conventional PI method and another based on a fuzzy logic controller employing Mamdani inference method as an alternative approach. From the results obtained, it has been proven that both controllers are proven stable with good output temperature response. The responses of both controllers are further scrutinized where the fuzzy logic controller is shown to have better control performance compared to the PI controller. As a conclusion, intelligent control is better than the conventional PID control
    • …
    corecore