Spelling suggestions: "subject:"inference system"" "subject:"lnference system""
1 |
SENS-IT: Semantic Notification of Sensory IoT Data Framework for Smart EnvironmentsAlowaidi, Majed 12 December 2018 (has links)
Internet of Things (IoT) is becoming commonplace in people's daily life. Even, many governments' authorities have already deployed a very large number of IoT sensors toward their smart city initiative and development road-map. However, lack of semantics in the presentation of IoT-based sensory data represents the perception complexity by general people. Adding semantics to the IoT sensory data remains a challenge for smart cities and environments. In this thesis proposal, we present an implementation that provides a meaningful IoT sensory data notifications approach about indoor and outdoor environment status for people and authorities. The approach is based on analyzing spatio-temporal thresholds that compose of multiple IoT sensors readings. Our developed IoT sensory data analytics adds real-time semantics to the received sensory raw data stream by converting the IoT sensory data into meaningful and descriptive notifications about the environment status such as green locations, emergency zone, crowded places, green paths, polluted locations, etc. Our adopted IoT messaging protocol can handle a very large number of dynamically added static and dynamic IoT sensors publication and subscription processes. People can customize the notifications based on their preference or can subscribe to existing semantic notifications in order to be acknowledged of any concerned environmental condition. The thesis is supposed to come up with three contributions. The first, an IoT approach of a three-layer architecture that extracts raw sensory data measurements and converts it to a contextual-aware format that can be perceived by people. The second, an ontology that infers a semantic notification of multiple sensory data according to the appropriate spatio-temporal reasoning and description mechanism. We used a tool called Protégé to model our ontology as a common IDE to build semantic knowledge. We built our ontology through extending a well-known web ontology called Semantic Sensor Network (SSN). We built the extension from which six classes were adopted to derive our SENS-IT ontology and fulfill our objectives. The third, a fuzzy system approach is proposed to make our system much generic of providing broader semantic notifications, so it can be agile enough to accept more measurements of multiple sensory sources.
|
2 |
A Hybrid-Genetic Algorithm for Training a Sugeno-Type Fuzzy Inference System with a Mutable Rule BaseCoy, Christopher G. January 2010 (has links)
No description available.
|
3 |
Development of a Performance Index for Stormwater Pipe Infrastructure using Fuzzy Inference MethodVelayutham Kandasamy, Vivek Prasad 30 June 2017 (has links)
Stormwater pipe infrastructure collects and conveys surface runoff resulting from rainfall or snowmelt to nearby streams. Traditionally, stormwater pipe systems were integrated with wastewater infrastructure through a combined sewer system. Many of these systems are being separated due to the impact of environmental laws and regulations; and the same factors have led to the creation of stormwater utilities. However, in the current ASCE Infrastructure Report Card, stormwater infrastructure is considered a sub-category of wastewater infrastructure. Stormwater infrastructure has always lacked attention compared to water and wastewater infrastructure. However, this notion has begun to shift, as aging stormwater pipes coupled with changes in climatic patterns and urban landscapes makes stormwater infrastructure more complex to manage. These changes and lack of needed maintenance has resulted in increased rates of deterioration and capacity. Stormwater utility managers have limited resources and funds to manage their pipe system. To effectively make decisions on allocating limited resources and funds, a utility should be able to understand and assess the performance of its pipe system. There is no standard rating system or comprehensive list of performance parameters for stormwater pipe infrastructure. Previous research has identified performance parameters affecting stormwater pipes and developed a performance index using a weighted factor method. However, the weighted performance index model does not capture interdependencies between performance parameters. This research developed a comprehensive list of parameters affecting stormwater pipe performance. This research also developed a performance index using fuzzy inference method to capture interdependencies among parameters. The performance index was evaluated and validated with the pipe ratings provided by one stormwater utility to document its effectiveness in real world conditions. / Master of Science / Stormwater pipe infrastructure collects and conveys the surface water resulting from rainfall or snowmelt to nearby streams. Traditionally, stormwater pipe system was integrated with wastewater infrastructure by combined sewer system. Environmental regulations forced creation of stormwater utilities and separate stormwater system, however, according to ASCE infrastructure report, stormwater infrastructure has been considered a sub-category of wastewater infrastructure. Stormwater infrastructure has always lacked attention compared to water and wastewater infrastructure. However, this notion has to shift, as aging stormwater pipes coupled with changes in climatic patterns and urban landscapes makes stormwater infrastructure complex to manage resulting in increased rate of deterioration and design capacity. Stormwater utility managers have limited resources and funds to manage their pipe system. To effectively make decisions on allocating limited resources and funds, a utility should be able to understand and assess the performance of its pipe system. There is no standard rating system for assessing the condition of stormwater pipe infrastructure. This research developed an index using fuzzy inference method to capture the interdependencies. Fuzzy inference method basically captures the interdependencies between parameters using if-then rule statements. Parameters are individual elements affecting the performance of stormwater pipes. The performance index was evaluated and validated with the pipe ratings provided by one stormwater utility to document its effectiveness in real world conditions.
|
4 |
Faster Adaptive Network Based Fuzzy Inference SystemWeeraprajak, Issarest January 2007 (has links)
It has been shown by Roger Jang in his paper titled "Adaptive-network-based fuzzy inference systems" that the Adaptive Network based Fuzzy Inference System can model nonlinear functions, identify nonlinear components in a control system, and predict a chaotic time series. The system use hybrid-learning procedure which employs the back-propagation-type gradient descent algorithm and the least squares estimator to estimate parameters of the model. However the learning procedure has several shortcomings due to the fact that * There is a harmful and unforeseeable influence of the size of the partial derivative on the weight step in the back-propagation-type gradient descent algorithm. *In some cases the matrices in the least square estimator can be ill-conditioned. *Several estimators are known which dominate, or outperform, the least square estimator. Therefore this thesis develops a new system that overcomes the above problems, which is called the "Faster Adaptive Network Fuzzy Inference System" (FANFIS). The new system in this thesis is shown to significantly out perform the existing method in predicting a chaotic time series , modelling a three-input nonlinear function and identifying dynamical systems. We also use FANFIS to predict five major stock closing prices in New Zealand namely Air New Zealand "A" Ltd., Brierley Investments Ltd., Carter Holt Harvey Ltd., Lion Nathan Ltd. and Telecom Corporation of New Zealand Ltd. The result shows that the new system out performed other competing models and by using simple trading strategy, profitable forecasting is possible.
|
5 |
Feasibility Study in Development of a Wearable Device to Enable Emotion Regulation in Children with Autism Spectrum DisorderHora, Manpreet Kaur 17 September 2014 (has links)
Autism spectrum disorder (ASD) is a group of developmental disabilities characterized by impairments in social interaction and communication and by difficulties in emotion recognition and regulation. There is currently no cure for autism but psychosocial interventions and medical treatments exist. However, very few of them have been trialed on young children and others pose limitations. Strengthening young children's capacity to manage their emotions is important for academic success. Thus it becomes important to design and test the feasibility of an appropriate methodology that can teach emotion regulation to young children (age 3-6 years) with ASD. This thesis addresses the problem by proposing a novel framework that integrates physiology with Cognitive Behavior Theory to enable emotion regulation in the target population by exposing them to real-time stressful situations. The framework uses a feedback loop that measures the participant's physiology, estimates the level of stress being experienced and provides an audio feedback. The feasibility of the individual building blocks of the framework was tested by conducting pilot studies on nine typically developing children (age 3-6 years). The attention capturing capacity of different audio representations was tested, and a stress profile generating system was designed and developed to map the measured physiology of the participant on to a relative stress level. 33 out of 43 instances of audio representations proved to be successful in capturing the participants' attention and the stress profiles were found to be capable of distinguishing between stressed and relaxed state of the participants with an average accuracy of 83%. / Master of Science
|
6 |
Energy And Power Systems Simulated Attack Algorithm For Defense Testbed And AnalysisRuttle, Zachary Andrew 31 May 2023 (has links)
The power grid has evolved over the course of many decades with the usage of cyber systems and communications such as Supervisory Control And Data Acquisition (SCADA); however, due to their connectivity to the internet, the cyber-power system can be infiltrated by malicious attackers. Encryption is not a singular solution. Currently, there are several cyber security measures in development, including those based on artificial intelligence. However, there is a need for a varying but consistent attack algorithm to serve as a testbed for these AI or other practices to be trained and tested. This is important because in the event of a real attacker, it is not possible to know exactly where they will attack and in what order. Therefore, the proposed method in this thesis is to use criminology concepts and fuzzy logic inference to create this algorithm and determine its effectiveness in making decisions on a cyber-physical system model. The method takes various characteristics of the attacker as an input, builds their ideal target node, and then compares the nodes to the high-impact target and chooses one as the goal. Based on that target and their knowledge, the attackers will attack nodes if they have resources. The results show that the proposed method can be used to create a variety of attacks with varying damaging effects, and one other set of tests shows the possibility for multiple attacks, such as denial of service and false data injection. The proposed method has been validated using an extended cyber-physical IEEE 13-node distribution system and sensitivity tests to ensure that the ruleset created would take each of the inputs well. / Master of Science / For the last decades, information and communications technology has become more commonplace for electric power and energy systems around the world. As a result, it has attracted hackers to take advantage of the cyber vulnerabilities to attack critical systems and cause damage, e.g., the critical infrastructure for electric energy. The power grid is a wide-area, distributed infrastructure with numerous power plants, substations, transmission and distribution lines as well as customer facilities. For operation and control, the power grid needs to acquire measurements from substations and send control commands from the control center to substations. The cyber-physical system has its vulnerabilities that can be deployed by hackers to launch falsified measurements or commands. Much research is concerned with how to detect and mitigate cyber threats. These methods are used to determine if an attack is occurring, and, if so, what to do about it. However, for these techniques to work properly, there must be a way to test how the defense will understand the purpose and target of an actual attack, which is where the proposed modeling and simulation method for an attacker comes in. Using a set of values for their resources, motivation and other characteristics, the defense algorithm determines what the attacker's best target would be, and then finds the closest point on the power grid that they can attack. While there are still resources remaining based on the initial value, the attacker will keep choosing places and then execute the attack. From the results, these input characteristic values for the attacker can affect the decisions the attacker makes, and the damage to the system is reflected by the values too. This is tested by looking at the results for the high-impact nodes for each input value, and seeing what came out of it. This shows that it is possible to model an attacker for testing purposes on a simulation.
|
7 |
A QoE Model to Evaluate Semi-Transparent Augmented-Reality SystemZhang, Longyu 21 February 2019 (has links)
With the development of three-dimensional (3D) technologies, the demand for high-quality 3D content, 3D visualization, and flexible and natural interactions are increasing. As a result, semi-transparent Augmented-Reality (AR) systems are emerging and evolving rapidly. Since there are currently no well-recognized models to evaluate the performance of these systems, we proposed a Quality-of-Experience (QoE) taxonomy for semi-transparent AR systems containing three levels of influential QoE parameters, through analyzing existing QoE models in other related areas and integrating the feedbacks received from our user study. We designed a user study to collect training and testing data for our QoE model, and built a Fuzzy-Inference-System (FIS) model to estimate the QoE evaluation and validate the proposed taxonomy. A case study was also conducted to further explore the relationships between QoE parameters and technical QoS parameters with functional components of Microsoft HoloLens AR system. In this work, we illustrate the experiments in detail and thoroughly explain the results obtained. We also present the conclusion and future work.
|
8 |
Novel methods for biological network inference : an application to circadian Ca2+ signaling networkJin, Junyang January 2018 (has links)
Biological processes involve complex biochemical interactions among a large number of species like cells, RNA, proteins and metabolites. Learning these interactions is essential to interfering artificially with biological processes in order to, for example, improve crop yield, develop new therapies, and predict new cell or organism behaviors to genetic or environmental perturbations. For a biological process, two pieces of information are of most interest. For a particular species, the first step is to learn which other species are regulating it. This reveals topology and causality. The second step involves learning the precise mechanisms of how this regulation occurs. This step reveals the dynamics of the system. Applying this process to all species leads to the complete dynamical network. Systems biology is making considerable efforts to learn biological networks at low experimental costs. The main goal of this thesis is to develop advanced methods to build models for biological networks, taking the circadian system of Arabidopsis thaliana as a case study. A variety of network inference approaches have been proposed in the literature to study dynamic biological networks. However, many successful methods either require prior knowledge of the system or focus more on topology. This thesis presents novel methods that identify both network topology and dynamics, and do not depend on prior knowledge. Hence, the proposed methods are applicable to general biological networks. These methods are initially developed for linear systems, and, at the cost of higher computational complexity, can also be applied to nonlinear systems. Overall, we propose four methods with increasing computational complexity: one-to-one, combined group and element sparse Bayesian learning (GESBL), the kernel method and reversible jump Markov chain Monte Carlo method (RJMCMC). All methods are tested with challenging dynamical network simulations (including feedback, random networks, different levels of noise and number of samples), and realistic models of circadian system of Arabidopsis thaliana. These simulations show that, while the one-to-one method scales to the whole genome, the kernel method and RJMCMC method are superior for smaller networks. They are robust to tuning variables and able to provide stable performance. The simulations also imply the advantage of GESBL and RJMCMC over the state-of-the-art method. We envision that the estimated models can benefit a wide range of research. For example, they can locate biological compounds responsible for human disease through mathematical analysis and help predict the effectiveness of new treatments.
|
9 |
A Fuzzy Logic Based Controller to Provide End-To-End Congestion Control for Streaming Media ApplicationsPavlick, Bay 05 July 2005 (has links)
The stability of the Internet is at risk if the amount of voice and video traffic continues to increase at the current pace. While current transport layer protocols do work well for most applications, they still present some problems. TCP is reliable, tracks the state of some network conditions and reacts drastically to an indication of congestion. TCP serves data-oriented applications very well but it can lead to unacceptably low quality for streaming applications by multiplicatively reducing the congestion window upon a sign of congestion. The other main transport layer protocol, UDP, provides good service for streaming applications but is not friendly to TCP and can cause the well-known existing congestion collapse problem in the Internet.
This thesis proposes a new protocol to provide a good service for voice and video applications while being friendly to TCP and solving the congestion collapse problem. The protocol utilizes a fuzzy logic controller that considers network related information to govern the applications sending rate while satisfying the users needs. Using network information such as the available bandwidth, Packet Loss Rates (PLR), and Round Trip Times (RTT) a fuzzy inference system optimizes the applications send rate to meet the requested rate in a smooth manner without wasting network resources unnecessarily.
The fuzzy logic controller is designed and its performance evaluated using MATLAB model simulations. The results indicate that the fuzzy controller solves the congestion collapse problem by reducing the number of undelivered packets into the network by nearly 100%. It provides smooth transition changes as demonstrated by the controlled UDP flow utilizing an estimated 44% more of the available bandwidth to smooth the send rate than the TCP flow in a highly varying bandwidth environment. The controller also remains friendly with TCP which was demonstrated to share the bandwidth at nearly 50% with one other competing controlled UDP flow.
|
10 |
Comparison of Topographic Surveying Techniques in StreamsBangen, Sara G. 01 May 2013 (has links)
Fine-scale resolution digital elevation models (DEMs) created from data collected using high precision instruments have become ubiquitous in fluvial geomorphology. They permit a diverse range of spatially explicit analyses including hydraulic modeling, habitat modeling and geomorphic change detection. Yet, the intercomparison of survey technologies across a diverse range of wadeable stream habitats has not yet been examined. Additionally, we lack an understanding regarding the precision of DEMs derived from ground-based surveys conducted by different, and inherently subjective, observers. This thesis addresses current knowledge gaps with the objectives i) to intercompare survey techniques for characterizing instream topography, and ii) to characterize observer variability in instream topographic surveys. To address objective i, we used total station (TS), real-time kinematic (rtk) GPS, terrestrial laser scanner (TLS), and infrared airborne laser scanning (ALS) topographic data from six sites of varying complexity in the Lemhi River Basin, Idaho. The accuracy of derived bare earth DEMs was evaluated relative to higher precision TS point data. Significant DEM discrepancies between pairwise techniques were calculated using propagated DEM errors thresholded at a 95% confidence interval. Mean discrepancies between TS and rtkGPS DEMs were relatively low (≤ 0.05 m), yet TS data collection time was up to 2.4 times longer than rtkGPS. ALS DEMs had lower accuracy than TS or rtkGPS DEMs, but ALS aerial coverage and floodplain topographic representation was superior to all other techniques. The TLS bare earth DEM accuracy and precision were lower than other techniques as a result of vegetation returns misinterpreted as ground returns. To address objective ii, we used a case study where seven field crews surveyed the same six sites to quantify the magnitude and effect of observer variability on DEMs interpolated from the survey data. We modeled two geomorphic change scenarios and calculated net erosion and deposition volumes at a 95% confidence interval. We observed several large magnitude elevation discrepancies across crews, however many of these i) tended to be highly localized, ii) were due to systematic errors, iii) did not significantly affect DEM-derived metric precision, and iv) can be corrected post-hoc.
|
Page generated in 0.0747 seconds