Abstract: Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). Classically it is believed that IS strives to discriminate between self and non-self. Most of the existing AIS research is based on this approach. Danger Theory (DT) argues this approach and proposes that IS fights against danger producing elements and tolerates others. We, the computational researchers, are not concerned with the arguments among immunologists but try to extract from it novel abstractions for intelligent computation. This paper aims to follow DT inspiration for intelligent data processing. The approach may introduce new avenue in intelligent processing. The data used is system calls data that is potentially significant in intrusion detection applications.
Abstract: The dynamics of the Autonomous Underwater
Vehicles (AUVs) are highly nonlinear and time varying and the hydrodynamic coefficients of vehicles are difficult to estimate
accurately because of the variations of these coefficients with
different navigation conditions and external disturbances. This study presents the on-line system identification of AUV dynamics to obtain
the coupled nonlinear dynamic model of AUV as a black box. This black box has an input-output relationship based upon on-line
adaptive fuzzy model and adaptive neural fuzzy network (ANFN)
model techniques to overcome the uncertain external disturbance and
the difficulties of modelling the hydrodynamic forces of the AUVs instead of using the mathematical model with hydrodynamic parameters estimation. The models- parameters are adapted according
to the back propagation algorithm based upon the error between the
identified model and the actual output of the plant. The proposed
ANFN model adopts a functional link neural network (FLNN) as the
consequent part of the fuzzy rules. Thus, the consequent part of the
ANFN model is a nonlinear combination of input variables. Fuzzy
control system is applied to guide and control the AUV using both
adaptive models and mathematical model. Simulation results show
the superiority of the proposed adaptive neural fuzzy network
(ANFN) model in tracking of the behavior of the AUV accurately
even in the presence of noise and disturbance.
Abstract: This paper presents an adaptive nonlinear position
controller with velocity constraint, capable of combining the
input-output linearization technique and Lyapunov stability theory.
Based on the Lyapunov stability theory, the adaptation law of the
proposed controller is derived along with the verification of the overall
system-s stability. Computer simulation results demonstrate that the
proposed controller is robust and it can ensure transient stability of
BLDCM, under the occurrence of a large sudden fault.
Abstract: In this paper, a new model order reduction
phenomenon is introduced at the design stage of linear phase digital
IIR filter. The complexity of a system can be reduced by adopting the
model order reduction method in their design. In this paper a mixed
method of model order reduction is proposed for linear IIR filter. The
proposed method employs the advantages of factor division technique
to derive the reduced order denominator polynomial and the reduced
order numerator is obtained based on the resultant denominator
polynomial. The order reduction technique is used to reduce the delay
units at the design stage of IIR filter. The validity of the proposed
method is illustrated with design example in frequency domain and
stability is also examined with help of nyquist plot.
Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: Ranking of fuzzy numbers play an important role in
decision making, optimization, forecasting etc. Fuzzy numbers must
be ranked before an action is taken by a decision maker. In this
paper, with the help of several counter examples it is proved that
ranking method proposed by Chen and Chen (Expert Systems with
Applications 36 (2009) 6833-6842) is incorrect. The main aim of this
paper is to propose a new approach for the ranking of generalized
trapezoidal fuzzy numbers. The main advantage of the proposed
approach is that the proposed approach provide the correct ordering
of generalized and normal trapezoidal fuzzy numbers and also the
proposed approach is very simple and easy to apply in the real life
problems. It is shown that proposed ranking function satisfies all
the reasonable properties of fuzzy quantities proposed by Wang and
Kerre (Fuzzy Sets and Systems 118 (2001) 375-385).
Abstract: People usually have a telephone voice, which means
they adjust their speech to fit particular situations and to blend in with
other interlocutors. The question is: Do we speak differently to
different people? This possibility has been suggested by social
psychologists within Accommodation Theory [1]. Converging toward
the speech of another person can be regarded as a polite speech
strategy while choosing a language not used by the other interlocutor
can be considered as the clearest example of speech divergence [2].
The present study sets out to investigate such processes in the course
of everyday telephone conversations. Using Joos-s [3] model of
formality in spoken English, the researchers try to explore
convergence to or divergence from the addressee. The results
propound the actuality that lexical choice, and subsequently, patterns
of style vary intriguingly in concordance with the person being
addressed.
Abstract: This paper introduces the effective speckle reduction of
synthetic aperture radar (SAR) images using inner product spaces in
undecimated wavelet domain. There are two major areas in projection
onto span algorithm where improvement can be made. First is the use
of undecimated wavelet transformation instead of discrete wavelet
transformation. And second area is the use of smoothing filter namely
directional smoothing filter which is an additional step. Proposed
method does not need any noise estimation and thresholding
technique. More over proposed method gives good results on both
single polarimetric and fully polarimetric SAR images.
Abstract: The steady state response of bond graphs representing
passive and active suspension is presented. A bond graph with
preferred derivative causality assignment to get the steady state
is proposed. A general junction structure of this bond graph
is proposed. The proposed methodology to passive and active
suspensions is applied.
Abstract: In this paper, solution of fuzzy differential equation
under general differentiability is obtained by simulink. The simulink
solution is equivalent or very close to the exact solution of the
problem. Accuracy of the simulink solution to this problem is
qualitatively better. An illustrative numerical example is presented
for the proposed method.
Abstract: Using a set of confidence intervals, we develop a
common approach, to construct a fuzzy set as an estimator for
unknown parameters in statistical models. We investigate a method
to derive the explicit and unique membership function of such fuzzy
estimators. The proposed method has been used to derive the fuzzy
estimators of the parameters of a Normal distribution and some
functions of parameters of two Normal distributions, as well as the
parameters of the Exponential and Poisson distributions.
Abstract: The hybridization of artificial immune system with
cellular automata (CA-AIS) is a novel method. In this hybrid model,
the cellular automaton within each cell deploys the artificial immune
system algorithm under optimization context in order to increase its
fitness by using its neighbor-s efforts. The hybrid model CA-AIS is
introduced to fix the standard artificial immune system-s weaknesses.
The credibility of the proposed approach is evaluated by simulations
and it shows that the proposed approach achieves better results
compared to standard artificial immune system.
Abstract: The efficient knowledge management system (KMS)
is one of the important strategies to help firms to achieve sustainable
competitive advantages, but little research has been conducted to
understand what contributes to the KMS success. This study thus set
to investigate the determinants of KMS success in the context of Thai
banking industry. A questionnaire survey was conducted in four
major Thai Banks to test the proposed KMS Success model.
The result of this study shows that KMS use and user satisfaction
relate significantly to the success of KMS, and knowledge quality,
service quality and trust lead to system use, and knowledge quality,
system quality and trust lead to user satisfaction. However, this
research focuses only on system and user-related factors. Future
research thus can extend to study factors such as management support
and organization readiness.
Abstract: The growing outsourcing of logistics services
resulting from the ongoing current in firms of costs
reduction/increased efficiency means that it is becoming more and
more important for the companies doing the outsourcing to carry out
a proper evaluation.
The multiple definitions and measures of logistics service
performance found in research on the topic create a certain degree of
confusion and do not clear the way towards the proper measurement
of their performance. Do a model and a specific set of indicators exist
that can be considered appropriate for measuring the performance of
logistics services outsourcing in industrial environments? Are said
indicators in keeping with the objectives pursued by outsourcing? We
aim to answer these and other research questions in the study we have
initiated in the field within the framework of the international High
Performance Manufacturing (HPM) project of which this paper
forms part.
As the first stage of this research, this paper reviews articles
dealing with the topic published in the last 15 years with the aim of
detecting the models most used to make this measurement and
determining which performance indicators are proposed as part of
said models and which are most used. The first steps are also taken in
determining whether these indicators, financial and operational, cover
the aims that are being pursued when outsourcing logistics services.
The findings show there is a wide variety of both models and
indicators used. This would seem to testify to the need to continue
with our research in order to try to propose a model and a set of
indicators for measuring the performance of logistics services
outsourcing in industrial environments.
Abstract: A novel method of learning complex fuzzy decision regions in the n-dimensional feature space is proposed. Through the fuzzy decision regions, a given pattern's class membership value of every class is determined instead of the conventional crisp class the pattern belongs to. The n-dimensional fuzzy decision region is approximated by union of hyperellipsoids. By explicitly parameterizing these hyperellipsoids, the decision regions are determined by estimating the parameters of each hyperellipsoid.Genetic Algorithm is applied to estimate the parameters of each region component. With the global optimization ability of GA, the learned decision region can be arbitrarily complex.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: This paper presents a simple approach for load
flow analysis of a radial distribution network. The proposed
approach utilizes forward and backward sweep algorithm
based on Kirchoff-s current law (KCL) and Kirchoff-s voltage
law (KVL) for evaluating the node voltages iteratively. In this
approach, computation of branch current depends only on the
current injected at the neighbouring node and the current in
the adjacent branch. This approach starts from the end nodes
of sub lateral line, lateral line and main line and moves
towards the root node during branch current computation. The
node voltage evaluation begins from the root node and moves
towards the nodes located at the far end of the main, lateral
and sub lateral lines. The proposed approach has been tested
using four radial distribution systems of different size and
configuration and found to be computationally efficient.
Abstract: In this paper, an Arabic letter recognition system based on Artificial Neural Networks (ANNs) and statistical analysis for feature extraction is presented. The ANN is trained using the Least Mean Squares (LMS) algorithm. In the proposed system, each typed Arabic letter is represented by a matrix of binary numbers that are used as input to a simple feature extraction system whose output, in addition to the input matrix, are fed to an ANN. Simulation results are provided and show that the proposed system always produces a lower Mean Squared Error (MSE) and higher success rates than the current ANN solutions.
Abstract: Application of neural networks in execution of
programmed pulse width modulation (PPWM) of a voltage source
inverter (VSI) is studied in this paper. Using the proposed method it is
possible to cancel out the desired harmonics in output of VSI in
addition to control the magnitude of fundamental harmonic,
contineously. By checking the non-trained values and a performance
index, the most appropriate neural network is proposed. It is shown
that neural networks may solve the custom difficulties of practical
utilization of PPWM such as large size of memory, complex digital
circuits and controlling the magnitude of output voltage in a discrete
manner.
Abstract: A new class of fuzzy closed sets, namely fuzzy weakly closed set in a fuzzy topological space is introduced and it is established that this class of fuzzy closed sets lies between fuzzy closed sets and fuzzy generalized closed sets. Alongwith the study of fundamental results of such closed sets, we define and characterize fuzzy weakly compact space and fuzzy weakly closed space.