Loading...
Search for: fuzzy-rules
0.005 seconds
Total 54 records

    Irfum: Image retrieval via fuzzy modeling

    , Article Computing and Informatics ; Volume 30, Issue 5 , 2011 , Pages 913-941 ; 13359150 (ISSN) Ajorloo, H ; Lakdashti, A ; Sharif University of Technology
    2011
    Abstract
    To reduce the semantic gap in the content based image retrieval (CBIR) systems we propose a fuzzy rule base approach. By submitting a query to the proposed system, it first extracts its low-level features and then checks its rule base for determining the proper weight vector for its distance measure. It then uses this weight vector to determine what images are more similar to the query image. For the training purpose, an algorithm is provided by which the system adjusts its fuzzy rules' parameters by gathering the trainers' opinions on which and how much the image pairs are relevant. For further improving the performance of the system, a feature space dimensionality reduction method is also... 

    A hybrid particle swarm optimization and fuzzy rule-based system for breast cancer diagnosis

    , Article International Journal of Soft Computing ; Volume 8, Issue 2 , 2013 , Pages 126-133 ; 18169503 (ISSN) Alikar, N ; Abdullah, S ; Mousavi, S. M ; Akhavan Niaki, S. T ; Sharif University of Technology
    2013
    Abstract
    A hybrid algorithm of a particle swarm optimization and a fuzzy rule-based classification system is proposed in this study to diagnose breast cancer. Two orthogonal and triangular types of fuzzy sets are applied to represent the input variables. In additional, different input membership functions are considered to increase the classification accuracy. The performance of the proposed hybrid algorithm is studied using a classification accuracy measure on the Wisconsin breast cancer dataset. The results of the comparison using different training data sets show the higher performance of the proposed methodology  

    Constructing interpretable genetic fuzzy rule-based system for breast cancer diagnostic

    , Article Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009, 19 May 2009 through 21 May 2009, Xiamen ; Volume 1 , 2009 , Pages 441-446 ; 9780769535715 (ISBN) Sedighiani, K ; HashemiKhabir, S ; Sharif University of Technology
    2009
    Abstract
    This paper shows how a subset of features can be selected for designing interpretable fuzzy rule-based system. This method consists of two phases: feature subset selection based on Michigan Learning approach and Training fuzzy rule-based system using the selected subset from the first phase. First, a number of independent fuzzy rule-based systems are trained using genetic operations, and then the dominated rules of each trained system with the highest fitness values are selected. From the selected rules, a pre-specified number of features are chosen with the highest frequency. In the second phase, a fuzzy rule-based system is trained based on the selected features from the previous phase.... 

    A novel noise immune, Fuzzy approach to speaker independent, isolated word speech recognition

    , Article 2006 World Automation Congress, WAC'06, Budapest, 24 June 2006 through 26 June 2006 ; 2006 ; 1889335339 (ISBN); 9781889335339 (ISBN) Halavati, R ; Shouraki, S. B ; Razaghpour, M ; Tajik, H ; Cholakian, A ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    This paper presents a novel approach to isolated word speech recognition using fuzzy modeling which is specifically designed to ignore noise. The task is based on conversion of speech spectrogram into a linguistic fuzzy description and comparison of this representation with fuzzy linguistic descriptions of words. The method is tested on single speaker and multiple speaker tests and the results are compared with a widely used speech recognition approach, showing much higher noise resistance. Copyright - World Automation Congress (WAC) 2006  

    Intrusion detection in computer networks using tabu search based Fuzzy system

    , Article 2008 7th IEEE International Conference on Cybernetic Intelligent Systems, CIS 2008, London, 9 September 2008 through 10 September 2008 ; March , 2008 ; 9781424429141 (ISBN) Mohamadi, H ; Habibi, J ; Saadi, H ; Sharif University of Technology
    2008
    Abstract
    The process of scanning the events occurring in a computer system or network and analyzing them for warning of intrusions is known as intrusion detection system (IDS). This paper presents a new intrusion detection system based on tabu search based fuzzy system. Here, we use tabu search algorithm to effectively explore and exploit the large state space associated with intrusion detection as a complicated classification problem. Experiments were performed on KDD-Cup99 data set which has information about intrusive and normal behaviors on computer networks. Results show that the proposed method obtains notable accuracy and lower cost in comparison with several renowned algorithms  

    Fuzzy nash equilibrium in fuzzy games using ranking fuzzy numbers

    , Article 2010 IEEE World Congress on Computational Intelligence, WCCI 2010, 18 July 2010 through 23 July 2010 ; July , 2010 ; 9781424469208 (ISBN) Chakeri, A ; Sadati, N ; Sharifian, S ; Sharif University of Technology
    2010
    Abstract
    In traditional game theory, the players play with policy of maximizing their payoffs. In real world, there are many situations where payoffs have uncertainty and are fuzzy in nature. In this paper, a new method for finding pure strategy Nash equilibriums, to realistically analyze the games with fuzzy payoffs is investigated. Using ranking fuzzy numbers, a fuzzy preference relation is constructed over payoffs. The priorities of payoffs are considered as the degree of being Nash equilibriums  

    Weighted order statistic and fuzzy rules CFAR detector for Weibull clutter

    , Article Signal Processing ; Volume 88, Issue 3 , 2008 , Pages 558-570 ; 01651684 (ISSN) Zaimbashi, A ; Taban, M. R ; Nayebi, M. M ; Norouzi, Y ; Sharif University of Technology
    2008
    Abstract
    Order statistic (OS) CFAR processor is a powerful detector, but similar to many other CFAR detectors, suffers from clutter edge as well as interfering targets. To overcome these problems, two derivations of this detector have been developed. These are order statistic greatest of (OSGO) and order statistic smallest of (OSSO) CFAR processors. The cost, paid for this improvement, is a considerable decrease in detection probability for homogenous Weibull clutter. Furthermore, a substantial performance degradation of OSGO in interfering target (high target masking effect) and an excessive false alarm of OSSO in clutter edge, also, occur. This behavior is a result of non-soft rules used in these... 

    Data mining with a simulated annealing based fuzzy classification system

    , Article Pattern Recognition ; Volume 41, Issue 5 , 2008 , Pages 1824-1833 ; 00313203 (ISSN) Mohamadi, H ; Habibi, J ; Saniee Abadeh, M ; Saadi, H ; Sharif University of Technology
    Elsevier Ltd  2008
    Abstract
    In this paper, the use of simulated annealing (SA) metaheuristic for constructing a fuzzy classification system is presented. In several previous investigations, the capability of fuzzy systems to solve different kinds of problems has been demonstrated. Simulated annealing based fuzzy classification system (SAFCS), hybridizes the learning capability of SA metaheuristic with the approximate reasoning method of fuzzy systems. The objective of this paper is to illustrate the ability of SA to develop an accurate fuzzy classifier. The use of SA in classification is an attempt to effectively explore and exploit the large search space usually associated with classification problems, and find the... 

    Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems

    , Article 2007 IEEE Congress on Evolutionary Computation, CEC 2007; Singapour 25 September 2007 through 28 September 2007 ; 2007 , Pages 3547-3553 ; 1424413400 (ISBN); 9781424413409 (ISBN) Saneei Abadeh, M ; Habibi, J ; Daneshi, M ; Jalali, M ; Khezrzadeh, M ; Sharif University of Technology
    2007
    Abstract
    This paper presents a novel hybrid approach for intrusion detection in computer networks. The proposed approach combines an evolutionary based fuzzy system with an artificial immune system to generate high quality fuzzy classification rules. The performance of final fuzzy classification system has been investigated using the KDD-Cup99 benchmark dataset. The results indicate that in comparison to several traditional techniques, such as C4.5, Naïve Bayes, k-NN and SVM, the proposed hybrid approach achieves better classification accuracies for most of the classes of the intrusion detection classification problem. Therefore, the resulted fuzzy classification rules can be used to produce a... 

    Fuzzy motion interpolation for mesh-based motion estimation

    , Article 2007 IEEE Symposium on Computational Intelligence in Image and Signal Processing, CIISP 2007, Honolulu, HI, 1 April 2007 through 5 April 2007 ; 2007 , Pages 101-106 ; 1424407079 (ISBN); 9781424407071 (ISBN) Eslami, A ; Sadati, N ; Jahed, M ; Sharif University of Technology
    2007
    Abstract
    Mesh-based motion estimation is an important tool for video coding especially with low bit rate. In this paper, a new method for interpolating pixel motion from adjacent mesh nodes with the ability of omitting independent nodes is proposed. By exploiting fuzzy rules to determine the association of pixel and neighboring nodes, the proposed interpolation can detach pixels from some nodes. Consequently, it can deal with those critical patches on objects boundary which their nodes do not belong to one object. Updating the membership functions of each rule with specified strategy makes the interpolation adaptive with non-stationary conditions of image sequences and decreases sensitivity to... 

    Fuzzy wavelet and contourlet based contrast enhancement

    , Article 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'06, New York, NY, 30 August 2006 through 3 September 2006 ; 2006 , Pages 6635-6638 ; 05891019 (ISSN); 1424400325 (ISBN); 9781424400324 (ISBN) Nezhadarya, E ; Shamsollahi, M. B ; Sayadi, O ; Sharif University of Technology
    2006
    Abstract
    This paper presents a fuzzy approach for contrast enhancement, based on two multi-scale transforms, namely wavelet and contourlet transforms. Separability and nondirectionality of conventional 2D wavelet transform, makes it unsuitable for sparsely representation of curve or line shaped image objects. On the other hand, the contourlet transform is a good alternative for this purpose. In this paper, coefficient enhancement, both in wavelet and contourlet spaces, is carried out by making use of simple fuzzy rules. These rules make the enhancement procedure more understandable and flexible. With this method, the knowledge and experience of the expert from the distribution of the coefficients can... 

    Fuzzy rule extraction using hybrid evolutionary models for data mining systems

    , Article IEEE International Conference on Electro Information Technology, 15 May 2011 through 17 May 2011, Mankato, MN ; 2011 ; 21540357 (ISSN) Edalat, I ; Abadeh, M. S ; Nayyerirad, A ; Sharif University of Technology
    2011
    Abstract
    Data mining is a very popular technique which is successfully used in many areas. The aim of this paper is to present a data mining system for extracting knowledge from input datasets. We use the hybrid ant colony and simulated annealing algorithms to optimize extracted fuzzy rule set. The proposed method has the main feature of data mining techniques which is high accuracy. The proposed method is then implemented on UCI datasets. The results are compared with those of well-known methods, and show the competitive systems efficiency  

    Fuzzy rule extraction using hybrid evolutionary models for data mining systems

    , Article 2011 International Symposium on Artificial Intelligence and Signal Processing, AISP 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 25-30 ; 9781424498345 (ISBN) Edalat, I ; Abadeh, M. S ; Teshnehlab, M ; Nayyerirad, A ; Sharif University of Technology
    2011
    Abstract
    Data mining is a very popular technique which is successfully used in many areas. The aim of this paper is to present a Hybrid model for data classification from input datasets. The proposed model extracts knowledge using fuzzy rule based systems and performs classification task by fuzzy if-then rules. The proposed method performs the classification task and extracts required knowledge using fuzzy rule based systems which consists of fuzzy if-then rules. In order to do so the hybrid ant colony and simulated annealing algorithms have been used to optimize extracted fuzzy rule set. "ACSA", a self development data mining software system based on swarm intelligence, is applied to experiment on... 

    Design and analysis of genetic fuzzy systems for intrusion detection in computer networks

    , Article Expert Systems with Applications ; Volume 38, Issue 6 , June , 2011 , Pages 7067-7075 ; 09574174 (ISSN) Abadeh, M. S ; Mohamadi, H ; Habibi, J ; Sharif University of Technology
    2011
    Abstract
    The capability of fuzzy systems to solve different kinds of problems has been demonstrated in several previous investigations. Genetic fuzzy systems (GFSs) hybridize the approximate reasoning method of fuzzy systems with the learning capability of evolutionary algorithms. The objective of this paper is to design and analysis of various kinds of genetic fuzzy systems to deal with intrusion detection problem as a new real-world application area which is not previously tackled with GFSs. The resulted intrusion detection system would be capable of detecting normal and abnormal behaviors in computer networks. We have presented three kinds of genetic fuzzy systems based on Michigan, Pittsburgh and... 

    Computer intrusion detection using an iterative fuzzy rule learning approach

    , Article 2007 IEEE International Conference on Fuzzy Systems, FUZZY, London, 23 July 2007 through 26 July 2007 ; 2007 ; 10987584 (ISSN) ; 1424412102 (ISBN); 9781424412105 (ISBN) Saniee Abadeh, M ; Habibi, J ; Sharif University of Technology
    2007
    Abstract
    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). The objective of this paper is to extract fuzzy classification rules for intrusion detection in computer networks. The proposed method is based on the iterative rule learning approach (IRL) to fuzzy rule base system design. The fuzzy rule base is generated in an incremental fashion, in that the evolutionary algorithm optimizes one fuzzy classifier rule at a time. The performance of final fuzzy classification system has been investigated using intrusion detection problem as a high-dimensional classification problem. Results show... 

    An intelligent hybrid classification algorithm integrating fuzzy rule-based extraction and harmony search optimization: Medical diagnosis applications

    , Article Knowledge-Based Systems ; Volume 220 , 2021 ; 09507051 (ISSN) Mousavi, S. M ; Abdullah, S ; Akhavan Niaki, S. T ; Banihashemi, S ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Uncertainty is a critical factor in medical datasets needed to be overcome for increasing diagnosis efficiency. This paper proposes an intelligent classification algorithm comprising a fuzzy rule-based approach, a harmony search (HS) algorithm, and a heuristic algorithm to classify medical datasets intelligently. Two fuzzy approaches, as well as orthogonal and triangular fuzzy sets, are first utilized to define the attributes of data. Then, an HS algorithm is integrated with a heuristic to generate fuzzy rules to select the best rules in the fuzzy rule-based systems. Moreover, to improve the performance of the proposed classification approach, a three-phase parameter tuning approach is... 

    Fuzzy ANN Approach to Support Independent Failures of Rotary Equipment Based on Vibration, Temperature Parameters-Case Study: A Centrifugal Pump in offshore Industry

    , M.Sc. Thesis Sharif University of Technology Fouladi Vanda, Mohammad (Author) ; Ghaemi Osgouie, Kambiz (Supervisor) ; Ebrahimi Pour, Vahid (Co-Advisor)
    Abstract
    Pump operating problems may be either hydraulic or mechanical and there is interdependence between the failure diagnoses of these two categories. Consequently, a correct diagnosis of a pump failure needs to consider many symptoms including hydraulic or mechanical causes. Nonlinear, time-varying behavior, and imprecise measurement information of the systems makes it difficult to deal with pump failures with precise mathematical equations, while human operators with the aid of their practical experience can handle these complex situations, with only a set of imprecise linguistic if-then rules and imprecise system states, but this procedure is time consuming and needs the knowledge of human... 

    A genetic algorithm for solving fuzzy shortest path problems with mixed fuzzy arc lengths

    , Article Mathematical and Computer Modelling ; Volume 57, Issue 1-2 , January , 2013 , Pages 84-99 ; 08957177 (ISSN) Hassanzadeh, R ; Mahdavi, I ; Mahdavi Amiri, N ; Tajdin, A ; Sharif University of Technology
    2013
    Abstract
    We are concerned with the design of a model and an algorithm for computing the shortest path in a network having various types of fuzzy arc lengths. First, a new technique is devised for the addition of various fuzzy numbers in a path using α-cuts by proposing a least squares model to obtain membership functions for the considered additions. Due to the complexity of the addition of various fuzzy numbers for larger problems, a genetic algorithm is presented for finding the shortest path in the network. For this, we apply a recently proposed distance function for comparison of fuzzy numbers. Examples are worked out to illustrate the applicability of the proposed approach  

    Analyzing factors effective on the development of relationship commitment

    , Article Proceedings of the 2012 International Conference on Artificial Intelligence, ICAI 2012, 16 July 2012 through 19 July 2012 ; Volume 1 , July , 2012 , Pages 398-404 ; 1601322186 (ISBN) ; 9781601322180 (ISBN) Dehdashti, Y ; Lotfi, N ; Karami, N ; Sharif University of Technology
    2012
    Abstract
    Due to the important role of commitment and trust in the relationship marketing, the factors which can directly result in a committed relationship along with the factors which can influence the commitment through influencing trust, according to the model of commitment and trust by (Morgan & Hunt, 1994) have been introduced and their level of importance has been investigated here. The article uses fuzzy cognitive maps (FCMs) in the proposed model to find the most important paths leading to relationship commitment. The FCM analyzes the responses of a group of 30 people including general practitioners in dentistry, managers of dental departments in some of the public clinics and hospitals who... 

    A parallel genetic local search algorithm for intrusion detection in computer networks

    , Article Engineering Applications of Artificial Intelligence ; Volume 20, Issue 8 , December , 2007 , Pages 1058-1069 ; 09521976 (ISSN) Saniee Abadeh, M ; Habibi, J ; Barzegar, Z ; Sergi, M ; Sharif University of Technology
    2007
    Abstract
    The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, as the boundaries cannot be well defined. One of the difficulties in such a prediction process is the generation of false alarms in many anomaly based intrusion detection systems. However, fuzzy logic is an important solution to reduce the false alarm rate in determining intrusive activities. This paper proposes a parallel genetic local search algorithm (PAGELS) to generate fuzzy rules capable of detecting intrusive behaviors in computer networks. The system uses the Michigan's approach,...