Fuzzy attributed graph (FAG) is not only widely used in the fields of image understanding and pattern recognition, but is useful to fuzzy graph matching problem. One of the applications of fuzzy graph matching is the ...
详细信息
Fuzzy attributed graph (FAG) is not only widely used in the fields of image understanding and pattern recognition, but is useful to fuzzy graph matching problem. One of the applications of fuzzy graph matching is the subcircuit extraction problem. Subcircuit extraction problem is very important for VLSI testing, layout versus schematic (LVS) check, and circuit partition, etc. In this paper, fuzzy attributed graph (FAG) is first effectively applied to the subgraph isomorphism problem. And then we provide an efficient fuzzy attributed graph algorithm based on the solution to subgraph isomorphism for the subcircuit extraction problem. Similarity measurement makes a significant contribution to both the subgraph isomorphism problem and the subcircuit extraction problem.
One important application of mobile robots is searching a geographical region to locate the origin of a specific sensible phenomenon. We first propose a fuzzy logic approach using a decision table. A novel fuzzy rule ...
详细信息
One important application of mobile robots is searching a geographical region to locate the origin of a specific sensible phenomenon. We first propose a fuzzy logic approach using a decision table. A novel fuzzy rule based was designed. And then a fuzzy search strategy is adopted by utilizing the three tier centers of mass coordination. Experimental results show that fuzzy logic algorithm is an efficient approach for the collective robots to locate the target source. In addition, noise and the position of the target affect the searching result.
Optimizing the membership functions of a fuzzy system can be viewed as a system identification problem for a nonlinear dynamic system. Basically, we can view the optimization of fuzzy membership functions as a weighte...
详细信息
Optimizing the membership functions of a fuzzy system can be viewed as a system identification problem for a nonlinear dynamic system. Basically, we can view the optimization of fuzzy membership functions as a weighted least-squares minimization problem, where the error vector is the difference between the fuzzy system outputs and the target values for those outputs. The extended Kalman filter algorithm is a good choice to solve this system identification problem, not only because it is a derivative-based algorithm that is suitable to solve the weighted least-squares minimization problem, but also because of its appealing predictor-corrector feature for nonlinear system model. In this paper, we present an extended Kalman filter approach to optimize the membership functions of the inputs and outputs of the fuzzy controller. The effect of the measurement noise covariance R on the convergence of the fuzzy controller is also investigated. Experimental results show that the optimized fuzzy controller achieves significant improvement on performance. In addition, the smaller the measurement noise covariance R is, the faster the optimized fuzzy controller would converge.
Over the past few years, security has been an increasing concern, with the growth of network and technological development. An intrusion detection system is a critical component for secure information management. Unfo...
详细信息
Over the past few years, security has been an increasing concern, with the growth of network and technological development. An intrusion detection system is a critical component for secure information management. Unfortunately, present IDS's falls short of providing protection required for growing concern. Creation of an IDS to detect anomaly intrusions, in a timely and accurate manner, has been an elusive goal for researchers. This paper describes a host-based IDS model, utilizing a Radial Basis Function neural network. It functions as a combined anomaly/misuse detector that helps to overcome most of the limitations in existing models. Rather than creating user profiles or behavioral characteristics, we trained our network using session data in the identification and tested experimentally on different attack/normal sessions. These results suggest that training the IDS on session data is not only effective in detecting intrusions, but also accurate and timely.
With the emergence and rapid advancement of DNA microarray technologies, construction of gene expression profiles for different cancer types has already become a promising means for cancer diagnosis and treatment. Mos...
详细信息
With the emergence and rapid advancement of DNA microarray technologies, construction of gene expression profiles for different cancer types has already become a promising means for cancer diagnosis and treatment. Most previous research has focused on binary classification. Here, we use a probabilistic neural network (PNN) for multi-classification of cancer data. The experimental results demonstrate the effectiveness of the PNN in addressing gene expression data.
An important application of mobile robots is searching a region to locate the origin of a specific phenomenon. A variety of optimization algorithms can be employed to locate the target source, which has the maximum in...
详细信息
An important application of mobile robots is searching a region to locate the origin of a specific phenomenon. A variety of optimization algorithms can be employed to locate the target source, which has the maximum intensity of the distribution of some detected function. We propose two neural network algorithms: stochastic optimization algorithm and dual heuristic programming (DHP) to solve the collective robotic search problem. Experiments were carried out to investigate the effect of noise and the number of robots on the task performance, as well as the expenses. The experimental results showed that the performance of the dual heuristic programming (DHP) is better than the stochastic optimization method.
Data extrapolation in FDTD simulations using feedforward multilayer Perceptron (MLP) showed promising results in a previous study. This work studies two different aspects of the problem: First is the learning aspect, ...
详细信息
This paper presents two algorithms to aid the supervised learning of feedforward neural networks. Specifically, an initialization and a learning algorithm are presented. The proposed methods are based on the independe...
详细信息
Strain prediction at various locations on a smart composite wing can provide useful information on its aerodynamic condition. The smart wing consisted of a glass/epoxy composite beam with three extrinsic Fabry-Perot i...
详细信息
Strain prediction at various locations on a smart composite wing can provide useful information on its aerodynamic condition. The smart wing consisted of a glass/epoxy composite beam with three extrinsic Fabry-Perot interferometric (EFPI) sensors mounted at three different locations near the wing root. Strain acting on the three sensors at different air speeds and angles-of-attack were experimentally obtained in a closed circuit wind tunnel under normal conditions of operation. A function mapping the angle of attack and air speed to the strains on the three sensors was simulated using feedforward neural networks trained using a backpropagation training algorithm. This mapping provides a method to predict the stall condition by comparing the strain available in real time and the predicted strain by the trained neural network.
暂无评论