• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 459
  • 456
  • 128
  • 44
  • 39
  • 20
  • 11
  • 8
  • 6
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • Tagged with
  • 1407
  • 1407
  • 350
  • 235
  • 227
  • 214
  • 206
  • 187
  • 156
  • 148
  • 137
  • 129
  • 125
  • 123
  • 117
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Aplicações de redes neurais e neuro fuzzy em engenharia biomédica e agronomia /

Silva, Inara Aparecida Ferrer. January 2014 (has links)
Orientador: Marcelo Carvalho Minhoto Teixeira / Banca: Edvaldo Assunção / Banca: Aparecido Augusto de Carvalho / Banca: Cristiano Quevedo Andrea / Banca: Valtemir Emerencio do Nascimento / Resumo: Os sistemas fuzzy e neuro fuzzy têm sido usados com sucesso para resolver problemas em diversas áreas, como medicina, indústria, controle, agronomia e aplicações acadêmicas. Nas últimas décadas, as redes neurais têm sido utilizadas para identificação, avaliação e previsão e dados na medicina e na agronomia. Nesta tese, realizou-se um novo estudo comparativo entre as redes neuro fuzzy (ANFIS), rede perceptron multicamadas (MLP), rede função de base radial (RBF) e regressão generalizada (GRNN) na área de engenharia biomédica. Na engenharia biomédica as redes neurais e neuro fuzzy foram treinadas e validadas com dados de pacientes hígidos e hemiplégicos (pacientes com sequela motora após acidente vascular cerebral no hemicorpo direito ou esquerdo do cérebro) coletados por meio de um baropodômetro eletrônico (91 indivíduos, sendo 81 hígidos e 10 hemiplégicos). A rede GRNN apresentou o menor erro RMSE (Raiz Quadrada do Erro Médio Quadrático), porém a rede MLP conseguiu identificar um caso de hemiplegia. Na área de agricultura foi proposto um novo estudo comparativo utilizando redes neurais para previsão de produção de trigo (Triticum aestivum). Para este estudo utilizou-se uma base de dados experimental de trigo avaliada no período dois anos na região de Selvíria-MS. A validação foi realizada comparando-se a produção estimada pelas redes neurais MLP, GRNN e RBF com a curva de regressão quadrática, comumente utilizada para este fim, e com a rede neuro fuzzy ANFIS. O erro RMSE calculado com as redes neurais GRNN e RBF foi menor do que o obtido com a regressão quadrática e com o ANFIS utilizando o treinamento (híbrido). Para validação dos resultados obtidos em hemiplegia utilizou-se o RMSE, a matriz de confusão, a sensitividade, a especificidade e a acurácia. Os resultados mostraram que a utilização das redes neurais e redes neuro fuzzy, na engenharia biomédica, pode ser uma alternativa viável para ... / Abstract: The fuzzy and neuro fuzzy systems have been successfully used to solve problems in various fields such as medicine, manufacturing, control, agriculture and academic applications. In recent decades, neural networks have been used to the identification, assessment and diagnosis of diseases. In this thesis we performed a comparative study among fuzzy neural networks (ANFIS), multilayer perceptron neural networks (MLP), radial basis function network (RBF) and generalized regression (GRNN) in the area of biomedical engineering and agronomy. In biomedical engineering neural networks and neuro fuzzy were trained and validated with data set from patients (91 subjects, 81 healthy and 10 hemiplegic). The GRNN network had the lowest Root Mean Square Error (RMSE), but the MLP network was able to identify a case of hemiplegia. In the area of agriculture a comparative study to estimate the wheat (Triticum aestivum) productivity was proposed using neural networks. For this study it was used data from an experimental database of wheat cultivars evaluated during two years in the region of Selvíria - MS. The validation was performed by comparing the estimated productivity through the quadratic regression curve and the output of the ANFIS with the neural networks. The RMSE error calculated with the GRNN and RBF neural networks was lower than that obtained with the quadratic regression and the ANFIS. The results obtained in the study of hemiplegia were validated using the RMSE, the confusion matrix, the sensitivity, the specificity and the error accuracy. The results showed that the use of neural networks and fuzzy neural networks, in biomedical engineering, can be a viable for monitoring the progress of patients and discovery new information through a combination of parameters. In agriculture this methodology can bring benefits in combining several evaluation parameters of production to optimize production while minimize financial costs in new plantations / Doutor
222

Lógica nebulosa (\'fuzzy\') aplicada na determinação dos parâmetros de trabalho de fornos industriais de têmpera contínua para o aço CK 75. / Fuzzy logic applied in the determination of the parameters of work of industrial furnace of continuos tempering of the steel CK75.

José Barbosa Junior 22 November 2006 (has links)
Este trabalho apresenta o projeto de um sistema gerador de \"set-point\" (GSP), utiliza-do na determinação dos parâmetros de trabalho de fornos industriais de têmpera contínua de aços ao carbono, cuja modelagem é baseada na lógica \"fuzzy\". O trabalho é constituído de três etapas básicas: primeiro, estudou-se os princípios metalúrgicos do aço e do processo de têmpera, necessários para o entendimento do problema, tendo como foco no aço CK75 de grande aplicação industrial. Segundo, estudou-se a funcionalidade de todas as partes constitu-intes do forno e seu modo de operação. Na terceira etapa, baseado em entrevistas com os ope-radores e técnicos em metalurgia, considerados especialistas no processo de têmpera, reali-zou-se a modelagem \"fuzzy\". Constatou-se de que forma as partes do forno afetam a trans-formação do aço, as variáveis de entrada e saída relevantes para o GSP e finalmente realizou-se o GSP com o MATLAB®. O modelo foi exaustivamente testado na produção de aço tem-perado, em um dos fornos da empresa Mangels, o que possibilitou sua validação de forma incontestável. / This work presents the project of a generating system of \"set-point\" (GSP), used in the determination of the parameters of work of a process of continuous tempering of carbon steels, whose modeling is based on the \"fuzzy\" logic. The work is made of three basic stages. First of all the principles of metallurgy for the steel and temper process, which are necessary for the understanding of the problem are studied. It is focused in the steel CK75 of great in-dustrial application. In the second stage, the functionality of all parts of the furnace and its operation way is studied. In the last stage a \"fuzzy\" modeling is accomplished, based on inter-views with the operators and technicians in metallurgy, who are considered specialists in the temper process. It is identified how the parts of the oven affect the transformation of the steel, variable input and output relevant to GSP. Finally will use the GSP with MATLAB® is car-ried out. The model was tested in exhaustive way in one of the furnace of the company Man-gels what made its incontrovertible validation possible.
223

Aplicação das metodologias FMEA-FUZZY para a gestão de riscos na cadeia de suprimentos em empresas do APL de confecções do agreste pernambucano

PALMEIRA, Juliana Nobrega Barbosa 15 July 2016 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2017-05-08T14:11:44Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Juliana - Recife.pdf: 2167559 bytes, checksum: 718c7b81e2f397f19d86ebe1685f56df (MD5) / Made available in DSpace on 2017-05-08T14:11:44Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Juliana - Recife.pdf: 2167559 bytes, checksum: 718c7b81e2f397f19d86ebe1685f56df (MD5) Previous issue date: 2016-07-15 / FACEPE / A Cadeia de Suprimentos é uma forma organizacional eficaz que se constitui como componente-chave da competitividade e da efetividade organizacional. Porém, há a probabilidade de as empresas não atingirem o desempenho esperado, com Cadeias de Suprimentos cada vez mais complexas, principalmente devido aos riscos de falhas nas diversas etapas executadas. Nesse sentido, o gerenciamento de riscos na Cadeia de Suprimentos se torna essencial, para que se possam definir as estratégias corretas, buscando diminuir a força desses riscos para que não afetem a continuidade dos negócios. O presente trabalho tem como objetivo avaliar qual é o comportamento de vinte e seis empresas que fazem parte do Arranjo Produtivo Local – APL de Pernambuco diante dos riscos das Cadeias de Suprimentos nas quais elas estão inseridas, com base em entrevistas e aplicações de questionários. Esta pesquisa fez uso da metodologia Failure Mode and Effects Analysis - FMEA associada à lógica Fuzzy para realização de um estudo de caso, priorizando ações de melhoria. Utilizando a FMEA, foi possível caracterizar os modos de falha em ordem de severidade, ocorrência e detecção. Já com a utilização da lógica Fuzzy foi possível reduzir as fragilidades ajudando na tomada de decisão caracterizada por informações e julgamentos imprecisos, o que contribuiu de forma satisfatória para o gerenciamento dos riscos. Os resultados da pesquisa mostraram que, no geral, há ausência de práticas de gerenciamento de riscos nas empresas, porém, com as propostas e ações de melhorias, foi possível identificar ajustes aos processos e avaliar a eficácia das soluções propostas, prevenindo os riscos e aplicando ações preventivas ou corretivas para diminuir ou até mesmo eliminar os efeitos de falhas sobre os processos. / The supply chain management is an effective organizational form that constitutes as a keycomponent of the competitiveness and organizational effectiveness. However, there is the probability that the enterprises do not have the expected performance, with increasingly complex supply chains, mainly due to the failure risks in the various steps performed. In this way, the risk management in the Supply Chain becomes essential for them to be able to define the correct strategies seeking to minimize the risks so the business continuity is not affected. This paper aims to evaluate what is the behavior of the twenty-six enterprises in Local Productive Arrangement (LPA) from Pernambuco in Brazil regarding to the Supply Chain Management risks in which they are inserted, based on interviews and questionnaires applications. This research used the Failure Mode and Effects Analysis - FMEA methodology associated with the fuzzy logic to perform a case study, prioritizing improvement actions. By using FMEA it was possible to characterize the failure modes in severity, occurrence and detection sequence and by using the fuzzy logic it was possible to reduce the fragilities, contributing to the decision making characterized by information and non-precise judgments, which contributed satisfactorily for the risk management. The research results have shown that there is absence of risk management practices in the enterprises. However, with the proposals and improvement actions, it was possible to identify adjustments to the processes and evaluate the efficacy of the proposed solutions, preventing the risks and applying preventive or corrective actions to diminish or even eliminate the failure effects over the processes.
224

Simulações de modelos epidemiologicos utilizando os sistemas p-fuzzi / Epidemiological models simulation using p-fuzzy systems

Barros, Antonio Magno 15 August 2018 (has links)
Orientador: João de Deus Mendes da Silva / Dissertação (mestrado profissional) - Universidade Estadual de Campinas, Instituto de Matematica, Estatistica e Computação Cientifica / Made available in DSpace on 2018-08-15T01:57:01Z (GMT). No. of bitstreams: 1 Barros_AntonioMagno_M.pdf: 1363614 bytes, checksum: d02b8dd0f8f8eafcf19aab637ef36f26 (MD5) Previous issue date: 2009 / Resumo: Os fenômenos epidemiológicos apresentam vários tipos de subjetividades, nas quais, em muitas ocasiões, são tratadas de maneira eficiente pelos modelos clássicos. Entretanto, a lógica fuzzy se apresenta de maneira adequada para tratar tais subjetividades. Neste trabalho, realizamos um estudo sobre os modelos epidemiológicos do tipo SI, SIS e SIR. Em seguida apresentamos os principais conceitos da teoria dos conjuntos fuzzy, controladores fuzzy e sistemas dinâmicos p-fuzzy. Fazemos, também um estudo dos modelos epidemiológicos fuzzy onde utilizamos o valor esperado fuzzy como defuzificador. Por fim, propomos uma comparação entre os modelos clássicos, p-fuzzy e valor esperado fuzzy. / Abstract: The epidemiological phenomena have several types of subjectivities, in which, on many occasions, are handled efficiently by classical models. However, fuzzy logic is presented properly to treat such subjectivities. We carried out a study on the epidemiological models of type SI, SIS and SIR. The following are the main concepts of the theory of fuzzy sets, fuzzy controllers and p-fuzzy dynamic systems. We are also a study of epidemiological models where we use the fuzzy expected value as fuzzy defuzificador. Finally, we propose a comparison between the classical models, p-fuzzy and fuzzy expected value. / Mestrado / Biomatematica / Mestre em Matemática
225

A AvaliaÃÃo da Aprendizagem: aplicaÃÃo de um Modelo Fuzzy para se obter notas mais justas na disciplina de LÃngua Portuguesa. / The Learning Assessment: the application of fuzzy model to obtain fair grades in Portuguese.

Ana Paula de Medeiros Ribeiro 02 March 2007 (has links)
CoordenaÃÃo de AperfeiÃoamento de Pessoal de NÃvel Superior / nÃo hà / A presente dissertaÃÃo envolve um dos temas mais relevantes na Ãrea educacional: a avaliaÃÃo da aprendizagem. De tudo o que sobre ela se discute atualmente, hà algo que està sempre em evidÃncia: a proposta de cunho predominantemente qualitativo que se defende para o processo de avaliaÃÃo. Nesse sentido, buscou-se compreender o seu significado a partir da visÃo das professoras do Ensino Fundamental de uma escola da rede municipal de Fortaleza, a fim de ser evidenciado o sentido da avaliaÃÃo dado pelas professoras, bem como as dificuldades que encontram durante o processo avaliativo. Para a interpretaÃÃo das falas dos sujeitos, utilizou-se a teoria hermenÃutica na versÃo contemporÃnea de Martin Heidegger e Hans-Georg Gadamer. Entretanto, a pesquisa nÃo teve intenÃÃes de se limitar à simples identificaÃÃo e descriÃÃo do sentido da avaliaÃÃo, pretendeu, sobretudo, desenvolver um aplicativo baseado em lÃgica fuzzy, levando em consideraÃÃo as informaÃÃes obtidas atravÃs do instrumental metodolÃgico aplicado. O software desenvolvido tem como principal objetivo apoiar as professoras durante a tarefa de avaliar seus alunos, sobretudo, no que diz respeito à fase de notaÃÃo numÃrica. A lÃgica fuzzy se aplica coerentemente nessa situaÃÃo, uma vez que tem o poder de manipular dados qualitativos que, para efeito deste estudo, sÃo os conceitos, e convertÃ-los em quantitativos, ou seja, as notas numÃricas. A versÃo preliminar do software foi testada pela pesquisadora atravÃs de um estudo comparativo entre os conceitos mÃdios e notas inferidas pelas professoras durante avaliaÃÃes reais e os conceitos mÃdios e notas geradas pelo sistema fuzzy. Os resultados mostraram um grau de confiabilidade do sistema em torno de 93%. Isso demonstra que esta poderà ser uma Ãtil ferramenta no cotidiano de professores durante a difÃcil tarefa de avaliar seus alunos. / This study involves one of the most important themes in the educational field: the learning assessment. From everything that is discussed about it, there is something that is always in evidence: the qualitative proposal that is recommended to the assessment process. So, the aim of this study was to comprehend its meaning from the vision of the elementary school teachers from one municipal school of Fortaleza, in order to be defined the meaning the teachers give to it, as well as the difficulties found during the assessment process. The interpretation of the teachersâ speeches was done by using the hermeneutic theory in the modern version of Martin Heidegger and Hans-Georg Gadamer. Therefore, this study was not limited to identify and describe the assessment meaning, it intended to develop a software based in the fuzzy sets theory, considering the information obtained from the application of the methodological instruments. The software intends to support the teachers during the assessment process, specially in the numerical grades conversion. The fuzzy logic has a coherent application in this situation because it has the power of manipulate qualitative data which are, in this study, the concepts, into quantitative data, the numerical grades. The software preliminary version was tested by the author through a comparative study between the concepts and numerical grades given by the teachers and the ones given by the fuzzy system. The results showed a confidence degree of 93%. It demonstrates that it might be a useful instrument to teachers during the hard work of evaluating their students.
226

'n Wasige beheerder vir 'n elektriese hooflynlokomotief

Mors, Winfried 16 August 2012 (has links)
M.Ing. / The principal reasons for the development of a prototype improved control system are the high maintenance costs and unreliability of Spoomet's fleet of class 6E/6E1 resistor technology electric main line locomotives. These factors may largely be attributed to two fundamental shortcomings of the existing locomotive control systems, namely the lack of inherent feedback and application of inconsequent control practices during acceleration from standstill. The improved control system features the application of a rule based fuzzy controller, implementing human skill and experience to control tractive effort of a resistor technology main line locomotive. The aim of the fuzzy controller is to accelerate the train from standstill to approximately 35 km/h, smoothly and safely. The prototype fuzzy controller was implemented with a personal computer using an advanced fuzzy logic development system. A simulation model was developed for the locomotive and the load. This model was used to first test the structure of the controller and the initial rule blocks. Following the verification of the fuzzy rules on the simulation model, a relay interface was developed to implement the operation of the control system in coupled mode with the existing control system on a locomotive. The interactive fine-tuning and evaluation of the fuzzy rules were performed during this phase of the development. The test results include the successful evaluation of the prototype fuzzy controller under a variety of typical and "worst case" operating conditions, as well as under conditions of wheel slip. The industrialisation and long term considerations for continued development of the fuzzy logic controller are described in the conclusion.
227

Trusted cloud computing modelling with distributed end-user attestable multilayer security

Sule, Mary-Jane January 2016 (has links)
As cloud computing continues to gain popularity and its economies of scale continue to improve, stakeholders want to minimise the security risk, protect their data and other resources while maximising the gains of using any cloud resources and its application. It is predicted that by the end of 2017, bulk of spending on any IT infrastructure would be on cloud infrastructure and services as many critical applications – power, medical, finance among others continue to be migrated onto cloud platforms. For these sectors, the security challenges of cloud adoption continue to be of a great concern even with its benefits. The ability to trust and measure security levels of any cloud platform is paramount in the complete adoption and use of cloud computing in many mission critical sectors. In-depth study and analysis of the trustworthiness of various cloud based platforms/systems are often limited by the complex and dynamic nature of cloud and often do not correctly foresee or practically determine the varying trust relationship between and across the cloud layers, components (schedulers), algorithms and applications especially at a large scale. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform is limited. Most of the current simulation tools do not cater for modelling of Trust on scalable multi-layer cloud deployments (including workflow and infrastructure).Even as these tools continue to be implemented none has been used to cater for all the layers of the cloud platform. This research presents a deployment of trusted computing applied in cloud computing suited for mission critical applications. It attempts to simplify the integration of trusted platform module based integrity measurement into cloud infrastructure. Using Eucalyptus cloud software on server-grade hardware, a trusted community cloud platform was deployed on the Brunel Network as presented in Chapter 3. Security is enhanced by the integration of an end-user accessible TPM integrity measurement and verification process; this guarantees trusted ownership and integrity of the uploaded data and provides additional level of trust for the cloud platform. This research further presents a technique which allows data owners to first secure their data offline by inserting colour drops into the data using steganography. The colour drops are used to detect unauthorised modifications, verify data owner in the event the copyright of the data is in dispute and identify the path through which it was tampered with. This process ensures integrity and confidentiality of the resources. This thesis also presents a trust model using fuzzy logic which was simulated using Simulink in Matlab and subsequently evaluated on an experimental platform deployed on the Brunel network. Using this model, end-users can determine the trust values for a cloud platform or service, as well as, classify and compare various cloud platforms. The results obtained suggest that the outputs of this research work can improve end-user confidence when selecting or consuming cloud resources with enhanced data integrity and protection.
228

NeGPAIM : a model for the proactive detection of information security intrusions, utilizing fuzzy logic and neural network techniques

Botha, Martin January 2003 (has links)
“Information is the lifeblood of any organisation and everything an organisation does involves using information in some way” (Peppard, 1993, p.5). Therefore, it can be argued that information is an organisation’s most precious asset and as with all other assets, like equipment, money, personnel, and so on, this asset needs to be protected properly at all times (Whitman & Mattord, 2003, pp.1-14). The introduction of modern technologies, such as e-commerce, will not only increase the value of information, but will also increase security requirements of those organizations that are intending to utilize such technologies. Evidence of these requirements can be observed in the 2001 CSI/FBI Computer Crime and Security Survey (Power, 2001). According to this source, the annual financial losses caused through security breaches in 2001 have increased by 277% when compared to the results from 1997. The 2002 and 2003 Computer Crime and Security Survey confirms this by stating that the threat of computer crime and other related information security breaches continues unabated and that the financial toll is mounting (Richardson, 2003). Information is normally protected by means of a process of identifying, implementing, managing and maintaining a set of information security controls, countermeasures or safeguards (GMITS, 1998). In the rest of this thesis, the term security controls will be utilized when referring to information protection mechanisms or procedures. These security controls can be of a physical (for example, door locks), a technical (for example, passwords) and/or a procedural nature (for example, to make back-up copies of critical files)(Pfleeger, 2003, pp.22-23; Stallings, 1995, p.1). The effective identification, implementation, management and maintenance of this set of security controls are usually integrated into an Information Security Management Program, the objective of which is to ensure an acceptable level of information confidentiality, integrity and availability within the organisation at all times (Pfleeger, 2003, pp.10-12; Whitman & Mattord, 2003, pp.1-14; Von Solms, 1993). Once the most effective security controls have been identified and implemented, it is important that this level of security be maintained through a process of continued control. For this reason, it is important that proper change management, measurement, audit, monitoring and detection be implemented (Bruce & Dempsey, 1997). Monitoring and detection are important functions and refer to the ability to identify and detect situations where information security policies have been compromised and/or breached or security violations have taken place (BS 7799, 1999; GMITS, 1998; Von Solms, 1993). The Information Security Officer is usually the person responsible for most of the operational tasks in the control process within an Information Security Management Program (Von Solms, 1993). In practice, these tasks could also be performed by a system administrator, network administrator, etc. In the rest of the thesis the person responsible for these tasks will be referred to as system administrator. These tasks have proved to be very challenging and demanding. The main reason for this is the rapid advancement of technology in the discipline of Information Technology, for example, the modern distributed computing environment, the Internet, the “freedom” of end-users, the introduction of e-commerce, and etc. (Whitman & Mattord, 2003, p.9; Sundaram, 2000, p.1; Moses, 2001, p.6; Allen, 2001, p.1). As a result of the importance of this control process, and especially the monitoring and detection tasks, it is vital that the system administrator has proper tools at his/her disposal to perform this task effectively. Many of the tools that are currently available to the system administrator, utilize technical controls, such as, audit logs and user profiles. Audit logs are normally used to record all events executed on a system. These logs are simply files that record security and non-security related events that take place on a computer system within an organisation. For this reason, these logs can be used by these tools to gain valuable information on security violations, such as intrusions and, therefore, are able to monitor the current actions of each user (Microsoft, 2002; Smith, 1989, pp. 116-117). User profiles are files that contain information about users` desktop operating environments and are used by the operating system to structure each user environment so that it is the same each time a user logs onto the system (Microsoft, 2002; Block, 1994, p.54). Thus, a user profile is used to indicate which actions the user is allowed to perform on the system. Both technical controls (audit logs and user profiles) are frequently available in most computer environments (such as, UNIX, Firewalls, Windows, etc.) (Cooper et al, 1995, p.129). Therefore, seeing that the audit logs record most events taking place on an information system and the user profile indicates the authorized actions of each user, the system administrator could most probably utilise these controls in a more proactive manner.
229

Aplikace fuzzy logiky pro výběr dodavatelů / The Application of Fuzzy Logic for the Choice of Suppliers

Procházka, Tomáš January 2013 (has links)
This diploma thesis deals with the selection of suppliers operating memory for the company Hon Hai Precision Industry Co., Ltd. (registered in the Czech Republic under the trade name Foxconn) using fuzzy logic.
230

The development of a multi-input-single-output fuzzy logic greenhouse controller

Schepers, Gideon Gustaf 10 September 2012 (has links)
M.Ing. / Fuzzy controllers are increasingly being accepted by engineers and scientists alike as a viable alternative for classical controllers. The processes involved in fuzzy controllers closely imitate human control processes. Human responses to stimuli are not governed by transfer functions and neither are those from fuzzy controllers. The fuzzy approach is of course not the answer to all problems, but it can clearly be very successful, and can also be helpful to anyone involved in developing control systems. This study however is devoted to the environmental control task within greenhouses and the fuzzy approach is proposed in order to fulfil this task. To create near optimal conditions within a greenhouse for plant growth two environmental factors are proposed to be controlled namely the temperature and relative humidity. These factors are interdependent and they make the environmental control within a greenhouse a multi-variable control problem. Furthermore, the non-linear physical phenomena governing the dynamics of temperature and relative humidity in such a process makes it very difficult to model and to control using traditional techniques. Thus, it can be said that the environmental control in greenhouses is an art, that only expert growers bring to near perfection. The central theme of this study is the development of a multi-input-single-output heuristic rule-based fuzzy logic control algorithm, for environmental control within a greenhouse. This study is intended to improve existing environmental control systems by implementing this control technique. The control algorithm is tested in an experimental greenhouse and the results obtained indicate that fuzzy logic control is viable for environmental control within greenhouses.

Page generated in 0.0432 seconds