Loading...
Search for: logic-programming
0.008 seconds

    Evolving fuzzy classifiers using a symbiotic approach

    , Article 2007 IEEE Congress on Evolutionary Computation, CEC 2007; Singapore, 25 September 2007 through 28 September 2007 ; 2007 , Pages 1601-1607 ; 1424413400 (ISBN); 9781424413409 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Halavati, R ; Lucas, C ; Sharif University of Technology
    2007
    Abstract
    Fuzzy rule-based classifiers are one of the famous forms of the classification systems particularly in the data mining field. Genetic algorithm is a useful technique for discovering this kind of classifiers and it has been used for this purpose in some studies. In this paper, we propose a new symbiotic evolutionary approach to find desired fuzzy rulebased classifiers. For this purpose, a symbiotic combination operator has been designed as an alternative to the recombination operator (crossover) in the genetic algorithms. In the proposed approach, the evolution starts from simple chromosomes and the structure of chromosomes gets complex gradually during the evolutionary process. Experimental... 

    Presenting a rule based loan evaluation expert system

    , Article 4th International Conference on Information Technology-New Generations, ITNG 2007, Las Vegas, NV, 2 April 2007 through 4 April 2007 ; 2007 , Pages 495-502 ; 0769527760 (ISBN) ; 9780769527765 (ISBN) Houshmand, M ; Daneshvar Kakhki, M ; Sharif University of Technology
    2007
    Abstract
    A core process in investment banks is evaluation of loan requests. In this paper we have presented the development of a rule based expert system for evaluation of loan request. The purpose of system is to evaluate the loan request and do some sensitivity analyses on the evaluation result to find the critical criteria. To achieve this purpose, Inference engine works both forward (evaluation) and backward chaining (sensitivity analysis). This system is designed for the Iranian bank of Industry and Mine. © 2007 IEEE  

    Optimum placement of gas detectors considering voting strategy with different detection set points

    , Article Journal of Loss Prevention in the Process Industries ; Volume 55 , 2018 , Pages 53-60 ; 09504230 (ISSN) Rad, A ; Rashtchian, D ; Eghbal Ahmadi, M. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Voting logic or k out of p redundancy is widely used in safety systems to meet two key objectives: enhancing reliability and reducing spurious performance. Even so, in designing gas detector systems especially of flammable gas type, it is a common engineering practice to consider at least two different detection levels in addition to normal voting. Under such circumstances, the presence of gas is confirmed if sensed by two detectors at two different concentrations: one at a low level and another one in the same voting network at a high level. Existing formulations for optimal placement of gas detectors do not consider this type of voting. In this study, first the general form of multi-level... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    Non-monotonocity in OrBAC through default and exception policy rules

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 87-94 ; 9781467323864 (ISBN) Javadi, S. A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware access control model defined by first-order logic. However, due to the monotonicity nature of the first-order logic, OrBAC suffers from the incapability of making decision based on incomplete context information as well as the definition of default and exception policy rules. This paper proposes augmenting non-monotonicity features to OrBAC using MKNF+ logic, which is a combination of Description Logic (DL) and Answer Set Programming (ASP). Along with the use of DL to define ontology for main entities and context information in OrBAC;... 

    SYNCOP: An evolutionary multi-objective placement of SDN controllers for optimizing cost and network performance in WSNs

    , Article Computer Networks ; Volume 185 , 2021 ; 13891286 (ISSN) Tahmasebi, S ; Rasouli, N ; Kashefi, A. H ; Rezabeyk, E ; Faragardi, H. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Due to the highly dynamic nature of Wireless Sensor Networks (WSN), Software-Defined Network (SDN) is a promising technology to ease network management by providing a logically centralized control plane. It is a common approach to employ multiple SDN controllers to form a physically distributed SDN to achieve better fault tolerance, boost scalability, and enhance performance. Despite physical distribution, since the notion behind SDN is to logically centralize network management, it is essential to provide a consistent view of the network's state for all controllers. Deploying multiple controllers result in higher synchronization and deployment cost. Since network performance and...