WorldWideScience

Sample records for password hardened fuzzy

  1. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    OpenAIRE

    Meenakshi, V. S.; Padmavathi, G.

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function ...

  2. The Use of Fuzzy Systems for Forecasting the Hardenability of Steel

    Directory of Open Access Journals (Sweden)

    Sitek W.

    2016-06-01

    Full Text Available The goal of the research carried out was to develop the fuzzy systems, allowing the determination of the Jominy hardenability curve based on the chemical composition of structural steels for quenching and tempering. Fuzzy system was created to calculate hardness of the steel, based on the alloying elements concentrations, and to forecast the hardenability curves. This was done based on information from the PN-EN 10083-3: 2008. Examples of hardenability curves calculated for exemplar steels were presented. Results of the research confirmed that fuzzy systems are a useful tool in evaluation the effect of alloying elements on the properties of materials compared to conventional methods. It has been demonstrated the practical usefulness of the developed models which allows forecasting the steels’ Jominy hardenability curve.

  3. Password Authentication Scheme with Secured Login Interface

    Directory of Open Access Journals (Sweden)

    AKINWALE A. Taofiki

    2009-12-01

    Full Text Available This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his password, and then enter these code in place of his actual password characters. This approach does not require the input code to be hidden from anyone or converted to placeholder characters for security reasons. Our solution engine regenerates new code for each character each time the carriage return key is struck, producing a hardened password that is convincingly more secure than conventional password entry system against both online and offline attackers. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance.

  4. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  5. Fuzzy Commitment

    Science.gov (United States)

    Juels, Ari

    The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.

  6. Graphical passwords: a qualitative study of password patterns

    CSIR Research Space (South Africa)

    Vorster, J

    2015-03-01

    Full Text Available Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be stronger...

  7. Keystroke Dynamics-Based Credential Hardening Systems

    Science.gov (United States)

    Bartlow, Nick; Cukic, Bojan

    abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.

  8. Password Cracking Lab

    OpenAIRE

    2006-01-01

    quiz present Quiz Presentation Interactive Media Element In order for a user to authenticate themselves to a computer with a password, the computer must store some form of the user and rsquo;s password. Computer designers have developed a way of storing the password information in a one-way encrypted format that prevents attackers from taking the stored password information and decrypting it back into user password. The one-way encryption process if often called hashing. This t...

  9. Password Management Systems

    OpenAIRE

    Fiala, Lukáš

    2010-01-01

    The goal is to describe and compare password management utilities and applications for individuals or small teams. Examples of such applications are KeePass, Password Safe, CodeWallet Pro and eWallet. On-line password managers like LastPass or RoboForm are another group of applications. Support for synchronization, sharing passwords in a team or protection against keyloggers (when filling in automatically) may also be included in the criteria.

  10. Password Usage

    National Research Council Canada - National Science Library

    Burrows, James

    1995-01-01

    ...) personal identity authentication and (2) data access authorization. It establishes the basic criteria for the design, implementation and use of a password system in those systems where passwords are used...

  11. A Survey on Password Security Systems

    OpenAIRE

    Ms. A. G. Khairnar; Prof. N. L. Bhale

    2013-01-01

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc. This paper gives review on different methods which were introduced for protection of password on a network. This paper also includes work don...

  12. A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Lee, Wang

    2017-01-01

    Today’s computer users have to remember several passwords for each of their accounts. It is easily noticed that people may have difficulty in remembering multiple passwords, which result in a weak password selection. Previous studies have shown that recall success rates are not statistically...

  13. The Password Problem

    Energy Technology Data Exchange (ETDEWEB)

    Walkup, Elizabeth [Stanford Univ., CA (United States)

    2016-06-01

    Passwords are an ubiquitous, established part of the Internet today, but they are also a huge security headache. Single sign-on, OAuth, and password managers are some of the solutions to this problem. OAuth is a new, popular method that allows people to use large, common authentication providers for many web applications. However, it comes at the expense of some privacy: OAuth makes users easy to track across websites, applications, and devices. Password managers put the power in the hands of the users, but this vulnerability survey reveals that you have to be extremely careful which program you choose. All in all, password managers are the solution of choice for home users and small organizations, but large companies will probably want to invest in their own SSO solutions.

  14. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  15. Computer Security: CERN Secure Password Competition

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    It’s time for a spring clean at the CERN Single Sign-On portal. We will take this opportunity to review all 20,000+ passwords used with CERN primary, secondary and service accounts. This campaign has three purposes: to identify password duplicates, to extend the password history rule to all CERN accounts, and to reward the “best” passwords used at CERN.   The first aim, identifying password duplicates, involves finding different accounts using the same or similar passwords. As of 1 April, we will prevent the use of a password if it is already in use by someone else. We will notify the affected users well in advance and also provide them with the email addresses of peers using the same or similar passwords - this Facebook-like feature will allow users to form interest groups and share experiences of their password (usage).  In parallel, we will extend the password history rule to all CERN accounts. This history currently prevents you from reusing any pas...

  16. Analysis of the Perfect Table Fuzzy Rainbow Tradeoff

    Directory of Open Access Journals (Sweden)

    Byoung-Il Kim

    2014-01-01

    Full Text Available Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they are used in practice to recover passwords that restrict access to digital documents. This work provides an accurate complexity analysis of the perfect table fuzzy rainbow tradeoff algorithm. Based on the analysis results, we show that the lesser known fuzzy rainbow tradeoff performs better than the original rainbow tradeoff, which is widely believed to be the best tradeoff algorithm. The fuzzy rainbow tradeoff can attain higher online efficiency than the rainbow tradeoff and do so at a lower precomputation cost.

  17. Cloud Password Manager Using Privacy-preserved Biometrics

    OpenAIRE

    Chu, Huiguang

    2014-01-01

    Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts; while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience paradox by storing and retrieving multiple existing passwords using one master password. On the other hand, a password manager liberates human brain by enabling people to generate stro...

  18. Virtual Realization using 3D Password

    OpenAIRE

    A.B.Gadicha; V.B.Gadicha

    2012-01-01

    Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been pro...

  19. A study of perceptions of graphical passwords

    CSIR Research Space (South Africa)

    Vorster, JS

    2015-10-01

    Full Text Available Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for symbol...

  20. An Alternative Method for Understanding User-Chosen Passwords

    Directory of Open Access Journals (Sweden)

    Zhixiong Zheng

    2018-01-01

    Full Text Available We present in this paper an alternative method for understanding user-chosen passwords. In password research, much attention has been given to increasing the security and usability of individual passwords for common users. Few of them focus on the relationships between passwords; therefore we explore the relationships between passwords: modification-based, similarity-based, and probability-based. By regarding passwords as vertices, we shed light on how to transform a dataset of passwords into a password graph. Subsequently, we introduce some novel notions from graph theory and report on a number of inner properties of passwords from the perspective of graph. With the assistance of Python Graph-tool, we are able to visualize our password graph to deliver an intuitive grasp of user-chosen passwords. Five real-world password datasets are used in our experiments to fulfill our thorough experiments. We discover that (1 some passwords in a dataset are tightly connected with each other; (2 they have the tendency to gather together as a cluster like they are in a social network; (3 password graph has logarithmic distribution for its degrees. Top clusters in password graph could be exploited to obtain the effective mangling rules for cracking passwords. Also, password graph can be utilized for a new kind of password strength meter.

  1. Self-Service Password Reset

    CERN Multimedia

    IT department

    2011-01-01

    Forgotten your password? Throughout the year, one of the most common requests to the Service Desk concerns password resets.  This is especially the case now that we are at the end of the holiday season and many of us return after a long break. Currently, the only way to have your password reset is to call the Service Desk during the week and within the service hours (07:30 to 18:30). Not anymore!   The IT department is putting up a new service that will allow you to reset the password of your primary CERN account by yourself. Note, that you will still be able to request a password reset by calling the Service Desk as usual and that you will still have to do this if your account has been blocked for any reason.  However, the new service provides you with more flexibility and convenience when your memory has failed you. In order to take advantage of this new service, you must:   • Have a valid, active account   • Register in advance an external...

  2. Information security : an investigation into password habits

    OpenAIRE

    Richardson, Darren

    2015-01-01

    This thesis considers password security guidelines used in current environments and stipulates that password requirements force users to create and use passwords which are easy for computers to guess but hard for humans to remember. The thesis begins by exploring a number of the most prevalent methods of illicitly obtaining passwords in an attempt to design an experimental method to test the notion of weak password distribution. Password cracking techniques are discussed, as well as less ...

  3. Computer Security: pimp up your password

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    In the past, we have repeatedly stated the importance of a well-chosen, complex and unique password, for your account at CERN (see the article “Oops, there it goes…”), but also for your accounts on Facebook, Amazon and all other sites (see the article “The value of your password”). While this is all still valid, it might not be enough anymore…   Of course, making your password complex (with letters, symbols, numbers, using mathematical formulas, song titles or poems; see our recommendations) is still a must. It is still a necessity to avoid using the same password for several sites and essential not to share the password with anyone else (“your password is your toothbrush - you don’t share it and you change it regularly”). But this is not always sufficient. Passwords can be cracked not only through guessing or brute-force dictionary attacks (hence the requirement for a complex password not to be ...

  4. Computer Security: Don’t copy/paste passwords!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    What do umbrellas, hair, wars and passwords have in common? Over time, they all get lost.   While some losses are inevitable, we can at least help you reduce the impact. Millions of passwords are stolen or lost every year. Partly because of inattentive users falling for “Phishing” traps, where adversaries simply ask people for their passwords; partly due to compromised web sites having had their database of passwords stolen. For example, over the past few years, eBay recently asked their 145 million users to change their passwords, LinkedIn lost 6.5 million hashed* passwords, and the hacking of the CERN HyperNews service rendered 4745 password hashes public. Just recently, 860,000 usernames, e-mail addresses and hashed passwords were stolen from the MacRumors forum, and Adobe lost a record 150 million e-mail/password combinations. So far, not good. At CERN, 746 people were notified when their CERN e-mail address was found among these combination...

  5. 3-D Graphical Password Used For Authentication

    OpenAIRE

    Vidya Mhaske-Dhamdhere; Bhakti Pawar; Pallavi Ghodke; Pratibha Yadav

    2012-01-01

    In today’s world, security isimportant aspect in day to day life.So,everyone used various ways for securitypurpose. People use passwords for theirsecurity.Generally, everyone uses textualpassword. Textual password is combinationof alphabets and numbers. People keeptextual password as name of their favoritethings, actors or actress, dish andmeaningful word from dictionary. But theperson who is very close to that person caneasily guess the password.Graphical password is advancedversion of passw...

  6. 1000 passwords exposed, what about yours?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    In the last three issues of the Bulletin, we have stressed the importance of the secrecy of your password. Remember: Your password should be treated like a toothbrush: do not share it, and change it regularly! And this is not only valid for your CERN password, but also for any other password you use to log into your university or laboratory, Facebook or Twitter portals, or other web sites.   Unfortunately, recent security checks have revealed a huge area for improvement here. Within a period of only one week, more than 1000 different passwords passed through the CERN outer perimeter firewall in clear text. “Clear text” means that the password was readable to any adversary able to intercept the communication. Make sure your web connection is secure! This can easily be checked in the address bar of your web browser. If the address starts with “HTTPS”, everything is fine. If it is only “HTTP” (without “S&rd...

  7. Client-server password recovery

    NARCIS (Netherlands)

    Chmielewski, Ł.; Hoepman, J.H.; Rossum, P. van

    2009-01-01

    Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the

  8. Client-Server Password Recovery

    NARCIS (Netherlands)

    Chmielewski, L.; Hoepman, J.H.; Rossum, P. van

    2009-01-01

    Human memory is not perfect – people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the

  9. Holidays Come - Passwords Go

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The holiday season is approaching and with it, the best chance of losing your password!!   If you are keen to access your CERN mailbox or other computing facilities at CERN from the Internet café at your hotel, hold on and think twice. Is that local PC trustworthy? Most likely it is not. It might never have been patched, and, thus, has been infected by plenty of computer viruses long time ago. Worse, nasty people might have installed tools which aim at stealing your password once you type it. Therefore, it is better to use your own laptop or mobile phone for such activities. If you decided to connect to CERN from an untrustworthy computer and had typed in your CERN password there – please seriously consider changing your CERN password at http://cern.ch/account as soon as you have access to a trustworthy computer. However, also take care when using your own laptop or mobile device: wireless communication can be intercepted. Many wireless access points, e.g. at airports, do no...

  10. Afs password expiration starts Feb 2nd 2004

    CERN Multimedia

    2004-01-01

    Due to security reasons, and in agreement with CERN management, afs/lxplus passwords will fall into line with Nice/Mail passwords on February 2nd and expire annually. As of the above date afs account holders who have not changed their passwords for over a year will have a 60 day grace period to make a change. Following this date their passwords will become invalid. What does this mean to you? If you have changed your afs password in the past 10 months the only difference is that 60 days before expiration you will receive a warning message. Similar warnings will also appear nearer the time of expiration. If you have not changed your password for more than 10 months, then, as of February 2nd you will have 60 days to change it using the command ‘kpasswd'. Help to choose a good password can be found at: http://security.web.cern.ch/security/passwords/ If you have been given a temporary password at any time by the Helpdesk or registration team this will automatically fall into the expiration category ...

  11. Don’t let Chrome expose your passwords

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you still struggle with remembering your password? Is this despite our many attempts to help you: “Train your Brain: Don't put your password on paper!" (article here), “Creativity@CERN” (article here) and “Maths to the rescue!" (article here)? Then you might have considered the “save your password” features in Chrome, Firefox or Internet Explorer… these features remember your Facebook, CERN, Twitter, Amazon and ebay passwords. But be careful: it might be easy for someone to read them!   If enabled, Chrome, Firefox, Internet Explorer and others can remember the password of specific sites after you’ve logged in to those sites the first time. As the passwords are, however, stored in plain text, they can still be read out by anyone with access to that computer. In Chrome, just type “chrome://settings/passwords” and click the password you want to reveal. Or in F...

  12. Secure and Usable Bio-Passwords based on Confidence Interval

    OpenAIRE

    Aeyoung Kim; Geunshik Han; Seung-Hyun Seo

    2017-01-01

    The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor being something you have. However, a strong password policy and a multi-factor authentication system can make it harder for a user to remember the password and login in. In this paper a bio-password-based scheme is proposed as a unique authenticatio...

  13. Hacking of Passwords in Windows Environment

    OpenAIRE

    C.K. GOEL; GAURAV ARYA

    2012-01-01

    Hacking is so simple! Not only the operating system‟s loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper I present the various ways in which the passwords like user account‟s passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth resear...

  14. Remembering Multiple Passwords by Way of Minimal-Feedback Hints

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Passwords are a prominent mechanism for user authentication but entail a conflict between ease of use and security in that passwords must be both easy to remember for the password holder and difficult to guess for everybody else. To support users in remembering their passwords minimal-feedback...

  15. The pattern-richness of graphical passwords

    CSIR Research Space (South Africa)

    Vorster, JS

    2016-08-01

    Full Text Available . Jansen’s Picture Password scheme [11] is perhaps the most usable cue-recall based Fig. 1. Different graphical password schemes: (a: top-left) Blonder’s original patent image; (b: top-right) Draw-a-secret example; (c: bottom- left) Deja-vu; (d: bottom... theoretical limit on the number of different passwords per image. The initial idea from Blonder was soon followed by a variety of schemes that avoided the initial patent by using other mechanisms of schemes. Draw-a-Secret (DAS), abstractly proposed by Syukri...

  16. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  17. Change in the CERN account password reset procedure

    CERN Multimedia

    IT Department

    2008-01-01

    Since 19 August 2008, the security of the CERN account password reset procedure has been strengthened. As a result, users asking to have their password reset by the Computing Helpdesk will be asked to provide some personal information prior to resetting their CERN account password. Please note that all relevant information about CERN accounts and passwords can be found at http://cern.ch/it-dep/AccountsandpasswordsatCERN.htm Thank you in advance for your cooperation. IT Department

  18. Password Cracking on Graphics Processing Unit Based Systems

    OpenAIRE

    N. Gopalakrishna Kini; Ranjana Paleppady; Akshata K. Naik

    2015-01-01

    Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper proposes how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the ...

  19. General Framework for Evaluating Password Complexity and Strength

    OpenAIRE

    Sahin, Cem S.; Lychev, Robert; Wagner, Neal

    2015-01-01

    Although it is common for users to select bad passwords that can be easily cracked by attackers, password-based authentication remains the most widely-used method. To encourage users to select good passwords, enterprises often enforce policies. Such policies have been proven to be ineffectual in practice. Accurate assessment of a password's resistance to cracking attacks is still an unsolved problem, and our work addresses this challenge. Although the best way to determine how difficult it ma...

  20. Analysis Of Default Passwords In Routers Against Brute-Force Attack

    Directory of Open Access Journals (Sweden)

    Mohammed Farik

    2015-08-01

    Full Text Available Abstract Password authentication is the main means of access control on network routers and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password how widely the manufacturers themselves are adhering to the minimum standards and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default passwords have been analyzed and documented from such a large variety of router models to reveal password strengths or weaknesses against brute-force attacks. Firstly individual default router password of each model was collected tabulated and tested using password strength meter for entropy. Then descriptive statistical analysis was performed on the tabulated data. The analysis revealed quantitatively how strong or weak default passwords are against brute-force attacks. The results of this research give router security researchers router manufacturers router administrators a useful guide on the strengths and weaknesses of passwords that follow similar patterns.

  1. Change in the CERN account password reset procedure

    CERN Multimedia

    IT Department

    2008-01-01

    From Since 19 August 19th 2008, the security of the CERN account password reset procedure has been strengthened. As a result, users requesting to have their password reset by the Computing Helpdesk will be asked to provide some private personal information prior to resetting their CERN account password. Please note that all relevant information about the CERN account and password can be found at http://cern.ch/it-dep/AccountsandpasswordsatCERN.htm Thank you in advance for your cooperation. IT Department

  2. A probabilistic framework for improved password strength metrics

    OpenAIRE

    GALBALLY HERRERO JAVIER; COISEL IWEN; SANCHEZ MARTIN JOSE IGNACIO

    2014-01-01

    In spite of the growing adoption of two factor authentication systems, sometimes combined with hardware tokens and biometrics, the usage of passwords is still by far the most wide spread authentication method for both on-line systems and off-line applications. The password is in most of the cases chosen by the weakest link of the security chain, the user. For that reason, user passwords are audited and passwords policies are carefully created, in an attempt to maximize the security of t...

  3. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  4. Secure and Usable Bio-Passwords based on Confidence Interval

    Directory of Open Access Journals (Sweden)

    Aeyoung Kim

    2017-02-01

    Full Text Available The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor being something you have. However, a strong password policy and a multi-factor authentication system can make it harder for a user to remember the password and login in. In this paper a bio-password-based scheme is proposed as a unique authentication method, which uses biometrics and confidence interval sets to enhance the security of the log-in process and make it easier as well. The method offers a user-friendly solution for creating and registering strong passwords without the user having to memorize them. Here we also show the results of our experiments which demonstrate the efficiency of this method and how it can be used to protect against a variety of malicious attacks.

  5. The Characteristics of User-Generated Passwords

    Science.gov (United States)

    1990-03-01

    electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet

  6. Guidelines for ethical nudging in password authentication

    OpenAIRE

    Renaud, Karen; Zimmermann, Verena

    2018-01-01

    Nudging has been adopted by many disciplines in the last decade in order to achieve behavioural change. Information security is no exception. A number of attempts have been made to nudge end-users towards stronger passwords. Here we report on our deployment of an enriched nudge displayed to participants on the system enrolment page, when a password has to be chosen. The enriched nudge was successful in that participants chose significantly longer and stronger passwords. One thing that struck ...

  7. What do passwords and toothbrushes have in common?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Your password is your entry token into the digital world. eBay, Amazon, Facebook, Twitter, FNAL, DESY, and CERN - all ask you for a password to authenticate and prove that you are you. And vice versa. If I know your password, I can impersonate you and use your money to buy from eBay or Amazon, post nasty messages on your Twitter or Facebook profile, or misuse CERN's/DESY's/FNAL's computing facilities in your name!   CERN accounts have been compromised in the past and misused to send spam across the world. Are you keen to delete tens of thousands of return e-mails from your mailbox? It's no fun. Would you give me your UBS bankcard and its PIN number? Of course not! Please apply the same sensitivity to your digital credentials, i.e. passwords, SSH keys, certificates, CERN card, etc. Beware of attempts to "steal" your password. CERN's computing staff, including the Computer Security Team, will never ask for your password (nor will any other legitimate person at Facebook, FNAL, eBay...

  8. A Comparison of Password Techniques for Multilevel Authentication Mechanisms

    Science.gov (United States)

    1990-06-01

    a user may associative passwords profile around the Beatles . In this case, cues may include "abbey", "john", "yellow" and "george" and have responses...Provost The research summarized herein was accomplished with funding provided by the Research Council of the Naval Postgraduate School. Reproduction of...traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative pas-wods. While the mechanisms employed

  9. Provably Secure Password-based Authentication in TLS

    Energy Technology Data Exchange (ETDEWEB)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  10. Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing

    OpenAIRE

    Llewellyn-Jones, David; Rymer, Graham Matthew

    2017-01-01

    PwdHash is a widely-used tool for client-side password hashing. Originally released as a browser extension, it replaces the user’s password with a hash that combines both the password and the website’s domain. As a result, while the user only remembers a single secret, the passwords received are all unique for each site. We demonstrate how the hashcat password recovery tool can be extended to allow passwords generated using PwdHash to be identified and recovered, revealing the user’s master p...

  11. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  12. Statistical analysis of large passwords lists, used to optimize brute force attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2009-03-01

    Full Text Available , necessarily, right? 2.1 Locating Password lists Password lists were located through the Internet by two methods: • Internet search engines • Peer to Peer networks 2.1.1 Internet search engines The three most popular search engines are (Nielsen 2008... response to “password list”. Figure 3: MSN response to “password list”. Figure 4: Google response to “password list” with constraints. The most common password lists found using Internet search engines were default password lists. These lists...

  13. User Behaviours Associated with Password Security and Management

    Directory of Open Access Journals (Sweden)

    Kay Bryant

    2006-11-01

    Full Text Available Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to authorized users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, the literature shows that passwords are often compromised through the poor security and management practices of users. This paper examines user password composition and security practices for email accounts. The results of a survey that examines user practice in creating and using passwords are reported. The results show that many users know about the risks of hackers, viruses and so on and take preliminary steps to combat them such as having passwords longer than eight characters. However, this appears to be as far as many users are willing to accede to the probability that their information and computing resources can be compromised. This paper makes some recommendations for the education of users in creating and maintaining their passwords. The responsibility for these educational programs can be shared between governments, organisations, educational institutions at all levels, and software vendors.

  14. Multi-agent integrated password management (MIPM) application secured with encryption

    Science.gov (United States)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  15. Evaluation of Professional Cloud Password Management Tools

    DEFF Research Database (Denmark)

    Schougaard, Daniel; Dragoni, Nicola; Spognardi, Angelo

    2016-01-01

    , password managers have slowly been migrating into the cloud. In this paper we review and analyze current professional password managers in the cloud. We discuss several functional and nonfunctional requirements to evaluate existing solutions and we sum up their strengths and weaknesses. The main conclusion...

  16. Are Password Management Applications Viable? An Analysis of User Training and Reactions

    Science.gov (United States)

    Ciampa, Mark

    2011-01-01

    Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…

  17. Exploring Topsnut-Graphical Passwords by Twin Odd-elegant Trees

    Directory of Open Access Journals (Sweden)

    Wang Hong-yu

    2017-01-01

    Full Text Available Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, since it has been applied in mobile devices, electronic equipments with touch screen, and so on. QR codes can be considered as a type of graphical passwords. Topsnut-graphical password differs from the existing graphical passwords, and has been investigated and developed. In this article, a new type of Topsnut-graphical passwords has been designed by technique of graph theory, called twin odd-elegant labelling. We make the twin odd-elegant graphs for one-key vs two or more locks (conversely, one-lock vs two or more keys. These Topsnut-GPWs show perfect matching characteristics of locks (TOE-lock-models and keys (TOE-key-models. We show examples for testing our methods which can be easily transformed into effective algorithms.

  18. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  19. Analysis Of Default Passwords In Routers Against Brute-Force Attack

    OpenAIRE

    Mohammed Farik; ABM Shawkat Ali

    2015-01-01

    Abstract Password authentication is the main means of access control on network routers and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password how widely the manufacturers themselves are adhering to the minimum standards and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default...

  20. Survey on Password Quality and Confidentiality

    OpenAIRE

    Šolić, Krešimir; Očevčić, Hrvoje; Blažević, Damir

    2015-01-01

    In this paper are presented results of empirical survey on password quality self-assessment and several privacy issues regarding password manipulation among information systems' users. Data was collected by questioning 627 e-mail users that were adults, Croatian national and were using e-mail system on regular basis. Comparisons among different kind of users were done regarding age, gender, technical background knowledge, university degree and experience in usage. Results of statistical analy...

  1. New Algebraic Groups Produced By Graphical Passwords Based On Colorings And Labellings

    Directory of Open Access Journals (Sweden)

    Sun Hui

    2017-01-01

    Full Text Available Safety of plain text passwords has been questioned in current researching information passwords. Graphical passwords are another way for alternative text-based passwords and to improve the user account security. As we are constructing Topsnut-graphical passwords that can be traced to an idea of “Graph structure plus the number theory” proposed first by Hongyu Wang with her colleagues, we find that some of Topsnut-graphical passwords can be composed of algebraic groups under the principle of Abelian additive finite group. We apply the odd-elegant labelling of graph theory to produce Topsnut-graphical passwords, and verify our Topsnut-graphical passwords can form algebraic groups, called labelling graphical groups. Our results can provide those users who have business in two or more banks, and our methods are easily transformed into algorithms with polynomial times.

  2. What is a good Toothbrush, erm, Password?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Do you remember the answer to the question posed in the previous issue of the Bulletin? "Your password should be treated like a toothbrush: do not share it and change it regularly!" After our last article, we received a series of questions on how to choose a good password and remember it easily… Thus, here we go.   A good password is: • private: used and known by one person only; • secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the monitor; • easily remembered: so there is no need to write it down; • at least 8 characters long with a mixture of at least 3 of the following: upper case letters, lower case letters, digits and symbols; • not to be found in a dictionary of any major language nor guessable by any program in a reasonable time.   Here are some hints to help you choose good passwords: • Choose a line o...

  3. Distributed One Time Password Infrastructure for Linux Environments

    Directory of Open Access Journals (Sweden)

    Alberto Benito Peral

    2018-04-01

    Full Text Available Nowadays, there is a lot of critical information and services hosted on computer systems. The proper access control to these resources is essential to avoid malicious actions that could cause huge losses to home and professional users. The access control systems have evolved from the first password based systems to the modern mechanisms using smart cards, certificates, tokens, biometric systems, etc. However, when designing a system, it is necessary to take into account their particular limitations, such as connectivity, infrastructure or budget. In addition, one of the main objectives must be to ensure the system usability, but this property is usually orthogonal to the security. Thus, the use of password is still common. In this paper, we expose a new password based access control system that aims to improve password security with the minimum impact in the system usability.

  4. The password practices applied by South African online consumers: Perception versus reality

    Directory of Open Access Journals (Sweden)

    Rika Butler

    2015-07-01

    Full Text Available Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of computer security password breaches are the result of poor user security behaviour. The password creation and management practices that online consumers apply have a direct effect on the level of computer security and are often targeted in attacks. Objectives: The objective of this study was to investigate South African online consumers’ computer password security practices and to determine whether consumers’ perceptions regarding their password security ability is reflected in the password creation and management practices that they apply. Method: A Web-based survey was designed to (1 determine online consumers’ perceptions of their skills and competence in respect of computer password security and (2 determine the practices that South African online consumers apply when creating and managing passwords. The measures applied were then compared to (1 the users’ perceptions about their computer password security abilities and (2 the results of international studies to determine agreement and inconsistencies. Results: South African online consumers regard themselves as proficient password users. However, various instances of unsafe passwords practices were identified. The results of this South African study correspond with the results of various international studies confirming that challenges to ensure safe online transacting are in line with international challenges. Conclusion: There is a disparity between South African online consumers’ perceived ability regarding computer password security and the password creation and management practices that they apply.

  5. Science of Guessing Passwords

    Indian Academy of Sciences (India)

    First page Back Continue Last page Graphics. Science of Guessing Passwords. Joseph Bonneau. Ph.D. Thesis,. Univ. of Cambridge, 2012. Advisor: Ross Anderson, FRS. NSA AWARD FOR THE BEST SCIENTIFIC CYBERSECURITY PAPER.

  6. Voice Biometrics as a Way to Self-service Password Reset

    Science.gov (United States)

    Hohgräfe, Bernd; Jacobi, Sebastian

    Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.

  7. Password Cracking and Countermeasures in Computer Security: A Survey

    OpenAIRE

    Han, Aaron L. -F.; Wong, Derek F.; Chao, Lidia S.

    2014-01-01

    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we fi...

  8. New Algorithm of Automatic Complex Password Generator Employing Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Sura Jasim Mohammed

    2018-01-01

    Full Text Available Due to the occurred increasing in information sharing, internet popularization, E-commerce transactions, and data transferring, security and authenticity become an important and necessary subject. In this paper an automated schema was proposed to generate a strong and complex password which is based on entering initial data such as text (meaningful and simple information or not, with the concept of encoding it, then employing the Genetic Algorithm by using its operations crossover and mutation to generated different data from the entered one. The generated password is non-guessable and can be used in many and different applications and internet services like social networks, secured system, distributed systems, and online services. The proposed password generator achieved diffusion, randomness, and confusions, which are very necessary, required and targeted in the resulted password, in addition to the notice that the length of the generated password differs from the length of initial data, and any simple changing and modification in the initial data produces more and clear modification in the generated password. The proposed work was done using visual basic programing language.

  9. Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

    OpenAIRE

    Mohammed Farik; ABM Shawkat Ali

    2015-01-01

    Abstract Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

  10. Password Cracking Using Sony Playstations

    Science.gov (United States)

    Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet

    Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.

  11. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  12. Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

    Directory of Open Access Journals (Sweden)

    Mohammed Farik

    2015-08-01

    Full Text Available Abstract Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

  13. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  14. Improving computer security for authentication of users: influence of proactive password restrictions.

    Science.gov (United States)

    Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel

    2002-05-01

    Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.

  15. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  16. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  17. The Effect of Password Management Procedures on the Entropy of User Selected Passwords

    Science.gov (United States)

    Enamait, John D.

    2012-01-01

    Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…

  18. The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs

    Science.gov (United States)

    Laptyeva, T. V.; Flach, S.; Kladko, K.

    2011-09-01

    Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak-password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors, we design an algorithm that strengthens the security of passwords. The core idea of our simple method is to split a long and secure password into two components. The first component is memorized by the user. The second component is transformed into a CAPTCHA image and then protected using the evolution of a two-dimensional dynamical system close to a phase transition, in such a way that standard brute-force attacks become ineffective. We expect our approach to have wide applications for authentication and encryption technologies.

  19. Distributed password cracking

    OpenAIRE

    Crumpacker, John R.

    2009-01-01

    Approved for public release, distribution unlimited Password cracking requires significant processing power, which in today's world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structu...

  20. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  1. Computer Security: the value of your password

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Of course, your passwords have a value to you as they allow you to access your computer and your Facebook page, to buy on Amazon, to create a Twitter feed, and to use a multitude of computing services provided by CERN. But have you ever thought of their value to the malicious people of this world?    With your account password, I can take over your computer. I can install software allowing me to enable your microphone and listen to your communications and what is happening around you as long as your computer is turned on. I can take regular screenshots and monitor you while you work. With that, I can try to determine your working habits, your online behaviour, the way you write e-mails… Useful, if I want to impersonate you believably (e.g. to attack CERN and the systems you are working on at CERN). What’s more, with access to your computer, I can install a keylogger to record your every keystroke – including when you type all your other passwords: ...

  2. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  3. How secure is your information system? An investigation into actual healthcare worker password practices.

    Science.gov (United States)

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  4. Advanced Password Tips and Tricks

    Science.gov (United States)

    ... to store passwords online so that a online hacker can't get to them? Kind of defeats the purpose, though I do allow ... will quit browsing over internet. Its many years gone no real benefit I got from those years. I will be ...

  5. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  6. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  7. Optical image encryption using password key based on phase retrieval algorithm

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-04-01

    A novel optical image encryption system is proposed using password key based on phase retrieval algorithm (PRA). In the encryption process, a shared image is taken as a symmetric key and the plaintext is encoded into the phase-only mask based on the iterative PRA. The linear relationship between the plaintext and ciphertext is broken using the password key, which can resist the known plaintext attack. The symmetric key and the retrieved phase are imported into the input plane and Fourier plane of 4f system during the decryption, respectively, so as to obtain the plaintext on the CCD. Finally, we analyse the key space of the password key, and the results show that the proposed scheme can resist a brute force attack due to the flexibility of the password key.

  8. Fundamentals of sketch-based passwords a general framework

    CERN Document Server

    Riggan, Benjamin S; Wang, Cliff

    2015-01-01

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability analysis of the accumulative framework used for incorporating handwriting biometrics and a human computer-interaction performance analysis. The chapters offer new perspectives and experimental results regarding model uniqueness, recognition tolerance

  9. Threats of Password Pattern Leakage Using Smartwatch Motion Recognition Sensors

    Directory of Open Access Journals (Sweden)

    Jihun Kim

    2017-06-01

    Full Text Available Thanks to the development of Internet of Things (IoT technologies, wearable markets have been growing rapidly. Smartwatches can be said to be the most representative product in wearable markets, and involve various hardware technologies in order to overcome the limitations of small hardware. Motion recognition sensors are a representative example of those hardware technologies. However, smartwatches and motion recognition sensors that can be worn by users may pose security threats of password pattern leakage. In the present paper, passwords are inferred through experiments to obtain password patterns inputted by users using motion recognition sensors, and verification of the results and the accuracy of the results is shown.

  10. Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam For

    2017-01-01

    Graphical passwords (GPs) are recognised as one of the potential alternatives in addressing the limitations in conventional text-based password authentication. With the rapid development of mobile devices (i.e., the increase of computing power), GP-based systems have already been implemented...... and its impact on graphical password creation is an important topic in the literature. In this paper, our interest is to investigate the influence of multi-touch behaviours on users’ habit in creating graphical passwords, especially on click-draw based GPs (shortly CD-GPS) on mobile devices...

  11. DETEKSI KEDIPAN MATA DENGAN HAAR CASCADE CLASSIFIER DAN CONTOUR UNTUK PASSWORD LOGIN SISTEM

    Directory of Open Access Journals (Sweden)

    Muhammad Syarif

    2015-11-01

    Full Text Available Keamanan  merupakan menjadi prioritas utama dalam era teknologi informasi, yang meliputi keamanan data, hardware atau software. Untuk menjaga keamanan diperlukan data pribadi sebagai autentifikasi dan validasi pengguna yang sah. Password merupakan data pribadi yang dimasukan pengguna secara langsung melalui keyboard. Memasukan data password melalui keyboard mudah dicuri dengan aplikasi Keylogger. Tahun 2008, 78% terdapat ancaman pencurian informasi rahasia data pengguna, dan 76% menggunakan komponen keystroke logging untuk mencuri informasi seperti akun bank online. beberapa variasi password yang dapat meminimalisir interaksi langsung pengguna dengan keyboard adalah memanfaatkan kedipan mata menjadi password. Dalam paper ini akan di pakai teknik Haar Cascade Classifier sebagai metode deteksi bagian tubuh tertentu suatu obyek, dan metode Contour sebagai deteksi kontur pada object spesifik, teknik ini dapat mendeteksi mata dan indikasi adanya kedipan, berdasarkan jarak, posisi obyek dan posisi sumber cahaya tertentu.Hasil dari penelitian yang di lakukan dengan memanfaatkan template deteksi kontur mata sempurna sebagai acuan kedipan mata. Nilai threshold juga berpengaruh pada hasil kontur yang dihasilkan dari berbagai jenis mata baik bentuk maupun warnanya. Berdasarkan hasil pengujian terhadap 15 sampel password kedipan, didapatkan akurasi 71,43 %, dan pengujian keystroke dengan aplikasi keylogger, password kedipan tidak terekam dalam log file keylogger. Kata Kunci: Deteksi kedipan mata, Haar cascade Classifier, Contour, password, login sistem.

  12. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  13. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    Science.gov (United States)

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.

  14. All in a day's work: Password cracking for the rest of us

    OpenAIRE

    Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo

    2009-01-01

    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as Windows XP, Windows Vista and the upcoming Windows 7, still use ad-hoc constructed hash functions such as LM, while many Linux variants use the broken hash function MD5. This paper describes an experiment where we have tested the strengthof a selection of passwords when conver...

  15. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  16. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  17. FUZZY FUSION OF PCA, ICA AND ILDA FACE ALGORITHMS FOR ENHANCED USER AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    PRASHANT KUMAR JAIN

    2017-09-01

    Full Text Available Use of biometrics has increased over last few years due to its inherent advantages over customary identification tools such as token card and password, etc. In biometrics, after fingerprint, face recognition is second most preferred method with reasonably good accuracy. In some applications like CCTV cameras where face of a person is available for processing, face recognition techniques can to be very useful. In this paper, integration of face recognition techniques PCA, ICA and ILDA using fuzzy fusion method is detailed. The preliminary results clearly reveal that the fusion of methods improves the accuracy of the user identification.

  18. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality

    Directory of Open Access Journals (Sweden)

    Jie Zhang

    2016-01-01

    Full Text Available Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically implement WiPass, we are facing the difficult feature extraction and complex unlock passwords matching, making the analysis of the finger motions challenging. To conquer the challenges, we use DCASW to extract feature and hierarchical DTW to do unlock passwords matching. Besides, the combination of amplitude and phase information is used to accurately recognize the passwords/patterns. We implement a prototype of WiPass and evaluate its performance under various environments. The experimental results show that WiPass achieves the detection accuracy of 85.6% and 74.7% for passwords/patterns detection in LOS and in NLOS scenarios, respectively.

  19. Leakage resilient password systems

    CERN Document Server

    Li, Yingjiu; Deng, Robert H

    2015-01-01

    This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secur

  20. A Distributed Password Scheme for Network Operating Systems

    National Research Council Canada - National Science Library

    Roth, Christopher

    2002-01-01

    Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations...

  1. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  2. Decomposition of fuzzy continuity and fuzzy ideal continuity via fuzzy idealization

    International Nuclear Information System (INIS)

    Zahran, A.M.; Abbas, S.E.; Abd El-baki, S.A.; Saber, Y.M.

    2009-01-01

    Recently, El-Naschie has shown that the notion of fuzzy topology may be relevant to quantum paretical physics in connection with string theory and E-infinity space time theory. In this paper, we study the concepts of r-fuzzy semi-I-open, r-fuzzy pre-I-open, r-fuzzy α-I-open and r-fuzzy β-I-open sets, which is properly placed between r-fuzzy openness and r-fuzzy α-I-openness (r-fuzzy pre-I-openness) sets regardless the fuzzy ideal topological space in Sostak sense. Moreover, we give a decomposition of fuzzy continuity, fuzzy ideal continuity and fuzzy ideal α-continuity, and obtain several characterization and some properties of these functions. Also, we investigate their relationship with other types of function.

  3. Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!

    Science.gov (United States)

    2014-10-01

    have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security

  4. Password compliance for PACS work stations: Implications for ...

    African Journals Online (AJOL)

    2017-12-01

    Dec 1, 2017 ... this reason that the contributions of both human and technical factors in normative ... reflect on the research outcome of the first author's dissertation in .... section, accounting for the 78% use of shared departmental passwords.

  5. Improved chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  6. Backup key generation model for one-time password security protocol

    Science.gov (United States)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  7. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  8. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  9. The secondary hardening phenomenon in strain-hardened MP35N alloy

    International Nuclear Information System (INIS)

    Asgari, S.; El-Danaf, E.; Shaji, E.; Kalidindi, S.R.; Doherty, R.D.

    1998-01-01

    Mechanical testing and microscopy techniques were used to investigate the influence of aging on the structure and strengthening of MP35N alloy. It was confirmed that aging the deformed material at 600 C for 4 h provided additional strengthening, here referred to as secondary hardening, in addition to the primary strain hardening. The secondary hardening phenomenon was shown to be distinctly different from typical age hardening processes in that it only occurred in material deformed beyond a certain cold work level. At moderate strains, aging caused a shift in the entire stress-strain curve of the annealed material to higher stresses while at high strains, it produced shear localization and limited work softening. The secondary hardening increment was also found to be grain size dependent. The magnitude of the secondary hardening appeared to be controlled by the flow stress in the strain hardened material. A model is proposed to explain the observations and is supported by direct experimental evidence. The model is based on formation of h.c.p. nuclei through the Suzuki mechanism, that is segregation of solute atoms to stacking faults, on aging the strain hardened material. The h.c.p. precipitates appear to thicken only in the presence of high dislocation density produced by prior cold work

  10. A pedagogical example of second-order arithmetic sequences applied to the construction of computer passwords by upper elementary grade students

    Science.gov (United States)

    Coggins, Porter E.

    2015-04-01

    The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.

  11. Simultaneous surface engineering and bulk hardening of precipitation hardening stainless steel

    DEFF Research Database (Denmark)

    Frandsen, Rasmus Berg; Christiansen, Thomas; Somers, Marcel A. J.

    2006-01-01

    This article addresses simultaneous bulk precipitation hardening and low temperature surface engineering of two commercial precipitation hardening stainless steels: Sandvik Nanoflex® and Uddeholm Corrax®. Surface engineering comprised gaseous nitriding or gaseous carburising. Microstructural....... The duration and temperature of the nitriding/carburising surface hardening treatment can be chosen in agreement with the thermal treatment for obtaining optimal bulk hardness in the precipitation hardening stainless steel....... characterisation of the cases developed included X-ray diffraction analysis, reflected light microscopy and micro-hardness testing. It was found that the incorporation of nitrogen or carbon resulted in a hardened case consisting of a combination of (tetragonal) martensite and expanded (cubic) austenite...

  12. METODE RESET PASSWORD LEVEL ROOT PADA RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS MySQL

    Directory of Open Access Journals (Sweden)

    Taqwa Hariguna

    2011-08-01

    Full Text Available Database merupakan sebuah hal yang penting untuk menyimpan data, dengan database organisasi akan mendapatkan keuntungan dalam beberapa hal, seperti kecepatan akases dan mengurangi penggunaan kertas, namun dengan implementasi database tidak jarang administrator database lupa akan password yang digunakan, hal ini akan mempersulit dalam proses penangganan database. Penelitian ini bertujuan untuk menggali cara mereset password level root pada relational database management system MySQL.

  13. A hardenability test proposal

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, N.V.S.N. [Ingersoll-Rand (I) Ltd., Bangalore (India)

    1996-12-31

    A new approach for hardenability evaluation and its application to heat treatable steels will be discussed. This will include an overview and deficiencies of the current methods and discussion on the necessity for a new approach. Hardenability terminology will be expanded to avoid ambiguity and over-simplification as encountered with the current system. A new hardenability definition is proposed. Hardenability specification methods are simplified and rationalized. The new hardenability evaluation system proposed here utilizes a test specimen with varying diameter as an alternative to the cylindrical Jominy hardenability test specimen and is readily applicable to the evaluation of a wide variety of steels with different cross-section sizes.

  14. Comparison of Thermal Creep Strain Calculation Results Using Time Hardening and Strain Hardening Rules

    International Nuclear Information System (INIS)

    Kim, Junehyung; Cheon, Jinsik; Lee, Byoungoon; Lee, Chanbock

    2014-01-01

    One of the design criteria for the fuel rod in PGSFR is the thermal creep strain of the cladding, because the cladding is exposed to a high temperature for a long time during reactor operation period. In general, there are two kind of calculation scheme for thermal creep strain: time hardening and strain hardening rules. In this work, thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules are compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule are compared with those by using MACSIS. Thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules were compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule were compared with those by using MACSIS. Tertiary creep started earlier in time hardening rule than in strain hardening rule. Also, calculation results by MACSIS with strain hardening and those obtained by using LIFE-METAL were almost identical to each other

  15. Password compliance for PACS work stations: Implications for ...

    African Journals Online (AJOL)

    To reflect on the outcome of a dissertation which argues that the minimum standards of effective password use prescribed by the information security sector are not suitable to the emergency-driven medical environment, and that their application as required by law raises new and unforeseen ethical dilemmas. Method.

  16. Radiation-hardenable diluents for radiation-hardenable compositions

    International Nuclear Information System (INIS)

    Schuster, K.E.; Rosenkranz, H.J.; Furh, K.; Ruedolph, H.

    1979-01-01

    Radiation-crosslinkable diluents for radiation-hardenable compositions (binders) consisting of a mixture of triacrylates of a reaction product of trimethylol propane and ethylene oxide with an average degree of ethoxylation of from 2.5 to 4 are described. The ethoxylated trimethylol propane is substantially free from trimethylol propane and has the following distribution: 4 to 5% by weight of monoethoxylation product, 14 to 16% by weight of diethoxylation product, 20 to 30% by weight of triethoxylation product, 20 to 30% by weight of tetraethoxylation product, 16 to 18% by weight of pentaethoxylation product, and 6 to 8% by weight of hexaethoxylation product. The diluents effectively reduce the viscosity of radiation-hardenable compositions and do not have any adverse effect upon their reactivity or upon the properties of the resulting hardened products

  17. A Password System Based on Sketches

    Science.gov (United States)

    2016-07-12

    Cognometric—recognition-based methods (also referred to as search met- ric [10]) 3 3. Locimetric— cued - recall based methods. Drawmetric systems require users to...chosen, hence the term cued - recall . The most prominent cued - recall based method is PassPoints [6, 7, 8]. Pass- Points presents the user with a single...around for more than a decade. Graphical passwords belong to one of three groups (as proposed in [9]): 1. Drawmetric— recall -based methods60 2

  18. Influence of Cooling Condition on the Performance of Grinding Hardened Layer in Grind-hardening

    Science.gov (United States)

    Wang, G. C.; Chen, J.; Xu, G. Y.; Li, X.

    2018-02-01

    45# steel was grinded and hardened on a surface grinding machine to study the effect of three different cooling media, including emulsion, dry air and liquid nitrogen, on the microstructure and properties of the hardened layer. The results show that the microstructure of material surface hardened with emulsion is pearlite and no hardened layer. The surface roughness is small and the residual stress is compressive stress. With cooling condition of liquid nitrogen and dry air, the specimen surface are hardened, the organization is martensite, the surface roughness is also not changed, but high hardness of hardened layer and surface compressive stress were obtained when grinding using liquid nitrogen. The deeper hardened layer grinded with dry air was obtained and surface residual stress is tensile stress. This study provides an experimental basis for choosing the appropriate cooling mode to effectively control the performance of grinding hardened layer.

  19. Password-only authenticated three-party key exchange with provable security in the standard model.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  20. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Protocols for password-only authenticated key exchange (PAKE in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000, which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  1. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  2. Creating Clinical Fuzzy Automata with Fuzzy Arden Syntax.

    Science.gov (United States)

    de Bruin, Jeroen S; Steltzer, Heinz; Rappelsberger, Andrea; Adlassnig, Klaus-Peter

    2017-01-01

    Formal constructs for fuzzy sets and fuzzy logic are incorporated into Arden Syntax version 2.9 (Fuzzy Arden Syntax). With fuzzy sets, the relationships between measured or observed data and linguistic terms are expressed as degrees of compatibility that model the unsharpness of the boundaries of linguistic terms. Propositional uncertainty due to incomplete knowledge of relationships between clinical linguistic concepts is modeled with fuzzy logic. Fuzzy Arden Syntax also supports the construction of fuzzy state monitors. The latter are defined as monitors that employ fuzzy automata to observe gradual transitions between different stages of disease. As a use case, we re-implemented FuzzyARDS, a previously published clinical monitoring system for patients suffering from acute respiratory distress syndrome (ARDS). Using the re-implementation as an example, we show how key concepts of fuzzy automata, i.e., fuzzy states and parallel fuzzy state transitions, can be implemented in Fuzzy Arden Syntax. The results showed that fuzzy state monitors can be implemented in a straightforward manner.

  3. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  4. Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)

    Science.gov (United States)

    Koishibayev, Timur; Umarova, Zhanat

    2016-04-01

    This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.

  5. Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference

    Directory of Open Access Journals (Sweden)

    Benxiao Tang

    2018-01-01

    Full Text Available Digital password lock has been commonly used on mobile devices as the primary authentication method. Researches have demonstrated that sensors embedded on mobile devices can be employed to infer the password. However, existing works focus on either each single keystroke inference or entire password sequence inference, which are user-dependent and require huge efforts to collect the ground truth training data. In this paper, we design a novel side-channel attack system, called Niffler, which leverages the user-independent features of movements of tapping consecutive buttons to infer unlocking passwords on smartphones. We extract angle features to reflect the changing trends and build a multicategory classifier combining the dynamic time warping algorithm to infer the probability of each movement. We further use the Markov model to model the unlocking process and use the sequences with the highest probabilities as the attack candidates. Moreover, the sensor readings of successful attacks will be further fed back to continually improve the accuracy of the classifier. In our experiments, 100,000 samples collected from 25 participants are used to evaluate the performance of Niffler. The results show that Niffler achieves 70% and 85% accuracy with 10 attempts in user-independent and user-dependent environments with few training samples, respectively.

  6. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  7. Appraising the Strength of Users Passwords in Computing Systems ...

    African Journals Online (AJOL)

    Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims. To protect sensitive information, commercial and corporate sites extensively employ the use of textual passwords, which when used over an encrypted ...

  8. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    the password with password -based access control to generate a hardened password [4]. Here, we present a biometric -based active authentication...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF... biometrics , extracted from keystroke dynamics, as “something a user is” for active authentication. This scheme performs continual verification in the

  9. On Intuitionistic Fuzzy Filters of Intuitionistic Fuzzy Coframes

    Directory of Open Access Journals (Sweden)

    Rajesh K. Thumbakara

    2013-01-01

    Full Text Available Frame theory is the study of topology based on its open set lattice, and it was studied extensively by various authors. In this paper, we study quotients of intuitionistic fuzzy filters of an intuitionistic fuzzy coframe. The quotients of intuitionistic fuzzy filters are shown to be filters of the given intuitionistic fuzzy coframe. It is shown that the collection of all intuitionistic fuzzy filters of a coframe and the collection of all intutionistic fuzzy quotient filters of an intuitionistic fuzzy filter are coframes.

  10. Why fuzzy controllers should be fuzzy

    International Nuclear Information System (INIS)

    Nowe, A.

    1996-01-01

    Fuzzy controllers are usually looked at as crisp valued mappings especially when artificial intelligence learning techniques are used to build up the controller. By doing so the semantics of a fuzzy conclusion being a fuzzy restriction on the viable control actions is non-existing. In this paper the authors criticise from an approximation point of view using a fuzzy controller to express a crisp mapping does not seem the right way to go. Secondly it is illustrated that interesting information is contained in a fuzzy conclusion when indeed this conclusion is considered as a fuzzy restriction. This information turns out to be very valuable when viability problems are concerned, i.e. problems where the objective is to keep a system within predefined boundaries

  11. Radiation-hardened bulk CMOS technology

    International Nuclear Information System (INIS)

    Dawes, W.R. Jr.; Habing, D.H.

    1979-01-01

    The evolutionary development of a radiation-hardened bulk CMOS technology is reviewed. The metal gate hardened CMOS status is summarized, including both radiation and reliability data. The development of a radiation-hardened bulk silicon gate process which was successfully implemented to a commercial microprocessor family and applied to a new, radiation-hardened, LSI standard cell family is also discussed. The cell family is reviewed and preliminary characterization data is presented. Finally, a brief comparison of the various radiation-hardened technologies with regard to performance, reliability, and availability is made

  12. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Science.gov (United States)

    2010-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...

  13. Computer Security: Enter the Cloud, pay with your password

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Let me tell you a story that recently happened to a colleague of mine. She was looking for a nice e-mail client for her brand new Android smartphone. She found several apps suiting her needs, installed all of them on her phone, configured them with her CERN password so that they could access her CERN e-mails and tested them thoroughly. In the end, she was happy with one and deleted the other apps.   But she wasn’t happy for long: over the following days, she realized that many new e-mails in her CERN mailbox were mysteriously marked as “read” despite her never having accessed them. A dedicated analysis of the CERN e-mail logs showed that one of the e-mail app providers was still downloading her emails - even though she had uninstalled the corresponding app from her smartphone. In fact, her CERN password had ended up in the Cloud, continuing to allow access to her inbox (similar to what Google does when you let Gmail pull your e-mails from your CERN mailbox). Neit...

  14. A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs

    Directory of Open Access Journals (Sweden)

    Hongyu Wang

    2018-01-01

    Full Text Available Graphical password (GPW is one of various passwords used in information communication. The QR code, which is widely used in the current world, is one of GPWs. Topsnut-GPWs are new-type GPWs made by topological structures (also, called graphs and number theory, but the existing GPWs use pictures/images almost. We design new Topsnut-GPWs by means of a graph labelling, called odd-elegant labelling. The new Topsnut-GPWs will be constructed by Topsnut-GPWs having smaller vertex numbers; in other words, they are compound Topsnut-GPWs such that they are more robust to deciphering attacks. Furthermore, the new Topsnut-GPWs can induce some mathematical problems and conjectures.

  15. Countable Fuzzy Topological Space and Countable Fuzzy Topological Vector Space

    Directory of Open Access Journals (Sweden)

    Apu Kumar Saha

    2015-06-01

    Full Text Available This paper deals with countable fuzzy topological spaces, a generalization of the notion of fuzzy topological spaces. A collection of fuzzy sets F on a universe X forms a countable fuzzy topology if in the definition of a fuzzy topology, the condition of arbitrary supremum is relaxed to countable supremum. In this generalized fuzzy structure, the continuity of fuzzy functions and some other related properties are studied. Also the class of countable fuzzy topological vector spaces as a generalization of the class of fuzzy topological vector spaces has been introduced and investigated.

  16. Optimality Conditions for Fuzzy Number Quadratic Programming with Fuzzy Coefficients

    Directory of Open Access Journals (Sweden)

    Xue-Gang Zhou

    2014-01-01

    Full Text Available The purpose of the present paper is to investigate optimality conditions and duality theory in fuzzy number quadratic programming (FNQP in which the objective function is fuzzy quadratic function with fuzzy number coefficients and the constraint set is fuzzy linear functions with fuzzy number coefficients. Firstly, the equivalent quadratic programming of FNQP is presented by utilizing a linear ranking function and the dual of fuzzy number quadratic programming primal problems is introduced. Secondly, we present optimality conditions for fuzzy number quadratic programming. We then prove several duality results for fuzzy number quadratic programming problems with fuzzy coefficients.

  17. A non-linear kinematic hardening function

    International Nuclear Information System (INIS)

    Ottosen, N.S.

    1977-05-01

    Based on the classical theory of plasticity, and accepting the von Mises criterion as the initial yield criterion, a non-linear kinematic hardening function applicable both to Melan-Prager's and to Ziegler's hardening rule is proposed. This non-linear hardening function is determined by means of the uniaxial stress-strain curve, and any such curve is applicable. The proposed hardening function considers the problem of general reversed loading, and a smooth change in the behaviour from one plastic state to another nearlying plastic state is obtained. A review of both the kinematic hardening theory and the corresponding non-linear hardening assumptions is given, and it is shown that material behaviour is identical whether Melan-Prager's or Ziegler's hardening rule is applied, provided that the von Mises yield criterion is adopted. (author)

  18. Laser transformation hardening effect on hardening zone features and surface hardness of tool steel AISI D2

    Directory of Open Access Journals (Sweden)

    D. Lesyk

    2017-06-01

    Full Text Available The relationship of technological input regimes of the laser transformation hardening on change the hardening depth, hardening width, and hardening angle, as well as surface hardness of the tool steel AISI D2 using multifactor experiment with elements of the analysis of variance and regression equations was determined. The laser transformation hardening process implemented by controlling the heating temperature using Nd:YAG fiber laser with scanner, pyrometer and proportional-integral-differential controller. The linear and quadratic regression models are developed, as well as response surface to determine the effect of the heating temperature and feed rate of the treated surface on the energy density of the laser beam, hardening depths, hardening width, hardening angle, and surface hardness are designed. The main effect on the energy density of the laser beam has a velocity laser treatment, on the other hand, the main effect on the geometrical parameters of the laser hardened zone and surface hardness has temperature heating are shown. The optimum magnitudes of the heating temperature (1270 °C and feed rate of the treated surface (90 mm/min for laser transformation hardening of the tool steel AISI D2 using fiber laser with scanner were defined.

  19. Fuzzy Itand#244; Integral Driven by a Fuzzy Brownian Motion

    Directory of Open Access Journals (Sweden)

    Didier Kumwimba Seya

    2015-11-01

    Full Text Available In this paper we take into account the fuzzy stochastic integral driven by fuzzy Brownian motion. To define the metric between two fuzzy numbers and to take into account the limit of a sequence of fuzzy numbers, we invoke the Hausdorff metric. First this fuzzy stochastic integral is constructed for fuzzy simple stochastic functions, then the construction is done for fuzzy stochastic integrable functions.

  20. Solving fully fuzzy transportation problem using pentagonal fuzzy numbers

    Science.gov (United States)

    Maheswari, P. Uma; Ganesan, K.

    2018-04-01

    In this paper, we propose a simple approach for the solution of fuzzy transportation problem under fuzzy environment in which the transportation costs, supplies at sources and demands at destinations are represented by pentagonal fuzzy numbers. The fuzzy transportation problem is solved without converting to its equivalent crisp form using a robust ranking technique and a new fuzzy arithmetic on pentagonal fuzzy numbers. To illustrate the proposed approach a numerical example is provided.

  1. Train your brain: Don’t put your password on paper!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    I completely acknowledge that constructing a good password can be difficult. And remembering it for some time isn’t easy, either. However, noting it down on a sheet of paper and hiding it in a drawer in your office (or even attaching a sticky note to your monitor) isn’t a valid solution. It violates CERN Computing Rules.   You can do better! Train your brain! Here are some hints to help you choose good passwords: Choose a line or two from a song or poem, and use the first letter of each word. For example, "In Xanadu did Kubla Kahn a stately pleasure dome decree!" becomes "IXdKKaspdd!"; Use a long passphrase like the sentence "InXanaduDidKublaKahnAStatelyPleasureDomeDecree!" itself; Alternate between one consonant and one or two vowels with mixed upper/lower case. This provides nonsense words that are usually pronounceable, and thus easily remembered. For example: "Weze-Xupe" or "DediNida...

  2. Superheat effect on bainite steel hardenability

    International Nuclear Information System (INIS)

    Kubachek, V.V.; Sklyuev, P.V.

    1978-01-01

    The bainite hardenability of 34KhN1M and 35 KhN1M2Ph steels has been investigated by the end-face hardening technique. It is established that, as the temperature of austenitization rises from 900 to 1280 deg C, the temperature of bainite transformation increases and bainite hardenability of the steels falls off. A repeated slow heating to 900 deg C of previously overheated 34KhN1M steel breaks up grain, lowers the temperature of the bainite transformation and raises the hardenability to values obtained with ordinary hardening from 900 deg C. A similar heating of previously overheated 35KhN1M2Ph steel is accompanied by restoration of initial coarse grains and maintenance of both the elevated bainite transformation temperature and to lower hardenability corresponding to hardening from the temperature of previous overheating

  3. Diamond Fuzzy Number

    Directory of Open Access Journals (Sweden)

    T. Pathinathan

    2015-01-01

    Full Text Available In this paper we define diamond fuzzy number with the help of triangular fuzzy number. We include basic arithmetic operations like addition, subtraction of diamond fuzzy numbers with examples. We define diamond fuzzy matrix with some matrix properties. We have defined Nested diamond fuzzy number and Linked diamond fuzzy number. We have further classified Right Linked Diamond Fuzzy number and Left Linked Diamond Fuzzy number. Finally we have verified the arithmetic operations for the above mentioned types of Diamond Fuzzy Numbers.

  4. Fuzzy forecasting based on fuzzy-trend logical relationship groups.

    Science.gov (United States)

    Chen, Shyi-Ming; Wang, Nai-Yi

    2010-10-01

    In this paper, we present a new method to predict the Taiwan Stock Exchange Capitalization Weighted Stock Index (TAIEX) based on fuzzy-trend logical relationship groups (FTLRGs). The proposed method divides fuzzy logical relationships into FTLRGs based on the trend of adjacent fuzzy sets appearing in the antecedents of fuzzy logical relationships. First, we apply an automatic clustering algorithm to cluster the historical data into intervals of different lengths. Then, we define fuzzy sets based on these intervals of different lengths. Then, the historical data are fuzzified into fuzzy sets to derive fuzzy logical relationships. Then, we divide the fuzzy logical relationships into FTLRGs for forecasting the TAIEX. Moreover, we also apply the proposed method to forecast the enrollments and the inventory demand, respectively. The experimental results show that the proposed method gets higher average forecasting accuracy rates than the existing methods.

  5. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    Science.gov (United States)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  6. General Framework for Evaluating Password Complexity and Strength

    Science.gov (United States)

    2015-11-15

    MD5 or SHA-1. Finally, an adversary is represented 1. We will drop the subscript when it is clear which alphabet is being considered. 2. We use an...when information about protection function or attacker’s capabil- ities is not clear (the most typical scenario when users are asked to select a...stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New

  7. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  8. On the Fuzzy Convergence

    Directory of Open Access Journals (Sweden)

    Abdul Hameed Q. A. Al-Tai

    2011-01-01

    Full Text Available The aim of this paper is to introduce and study the fuzzy neighborhood, the limit fuzzy number, the convergent fuzzy sequence, the bounded fuzzy sequence, and the Cauchy fuzzy sequence on the base which is adopted by Abdul Hameed (every real number r is replaced by a fuzzy number r¯ (either triangular fuzzy number or singleton fuzzy set (fuzzy point. And then, we will consider that some results respect effect of the upper sequence on the convergent fuzzy sequence, the bounded fuzzy sequence, and the Cauchy fuzzy sequence.

  9. Stability Analysis of Interconnected Fuzzy Systems Using the Fuzzy Lyapunov Method

    Directory of Open Access Journals (Sweden)

    Ken Yeh

    2010-01-01

    Full Text Available The fuzzy Lyapunov method is investigated for use with a class of interconnected fuzzy systems. The interconnected fuzzy systems consist of J interconnected fuzzy subsystems, and the stability analysis is based on Lyapunov functions. Based on traditional Lyapunov stability theory, we further propose a fuzzy Lyapunov method for the stability analysis of interconnected fuzzy systems. The fuzzy Lyapunov function is defined in fuzzy blending quadratic Lyapunov functions. Some stability conditions are derived through the use of fuzzy Lyapunov functions to ensure that the interconnected fuzzy systems are asymptotically stable. Common solutions can be obtained by solving a set of linear matrix inequalities (LMIs that are numerically feasible. Finally, simulations are performed in order to verify the effectiveness of the proposed stability conditions in this paper.

  10. Stochastic Optimal Estimation with Fuzzy Random Variables and Fuzzy Kalman Filtering

    Institute of Scientific and Technical Information of China (English)

    FENG Yu-hu

    2005-01-01

    By constructing a mean-square performance index in the case of fuzzy random variable, the optimal estimation theorem for unknown fuzzy state using the fuzzy observation data are given. The state and output of linear discrete-time dynamic fuzzy system with Gaussian noise are Gaussian fuzzy random variable sequences. An approach to fuzzy Kalman filtering is discussed. Fuzzy Kalman filtering contains two parts: a real-valued non-random recurrence equation and the standard Kalman filtering.

  11. A neural fuzzy controller learning by fuzzy error propagation

    Science.gov (United States)

    Nauck, Detlef; Kruse, Rudolf

    1992-01-01

    In this paper, we describe a procedure to integrate techniques for the adaptation of membership functions in a linguistic variable based fuzzy control environment by using neural network learning principles. This is an extension to our work. We solve this problem by defining a fuzzy error that is propagated back through the architecture of our fuzzy controller. According to this fuzzy error and the strength of its antecedent each fuzzy rule determines its amount of error. Depending on the current state of the controlled system and the control action derived from the conclusion, each rule tunes the membership functions of its antecedent and its conclusion. By this we get an unsupervised learning technique that enables a fuzzy controller to adapt to a control task by knowing just about the global state and the fuzzy error.

  12. Complex Fuzzy Set-Valued Complex Fuzzy Measures and Their Properties

    Science.gov (United States)

    Ma, Shengquan; Li, Shenggang

    2014-01-01

    Let F*(K) be the set of all fuzzy complex numbers. In this paper some classical and measure-theoretical notions are extended to the case of complex fuzzy sets. They are fuzzy complex number-valued distance on F*(K), fuzzy complex number-valued measure on F*(K), and some related notions, such as null-additivity, pseudo-null-additivity, null-subtraction, pseudo-null-subtraction, autocontionuous from above, autocontionuous from below, and autocontinuity of the defined fuzzy complex number-valued measures. Properties of fuzzy complex number-valued measures are studied in detail. PMID:25093202

  13. Hierarchical type-2 fuzzy aggregation of fuzzy controllers

    CERN Document Server

    Cervantes, Leticia

    2016-01-01

    This book focuses on the fields of fuzzy logic, granular computing and also considering the control area. These areas can work together to solve various control problems, the idea is that this combination of areas would enable even more complex problem solving and better results. In this book we test the proposed method using two benchmark problems: the total flight control and the problem of water level control for a 3 tank system. When fuzzy logic is used it make it easy to performed the simulations, these fuzzy systems help to model the behavior of a real systems, using the fuzzy systems fuzzy rules are generated and with this can generate the behavior of any variable depending on the inputs and linguistic value. For this reason this work considers the proposed architecture using fuzzy systems and with this improve the behavior of the complex control problems.

  14. Fuzzy portfolio model with fuzzy-input return rates and fuzzy-output proportions

    Science.gov (United States)

    Tsaur, Ruey-Chyn

    2015-02-01

    In the finance market, a short-term investment strategy is usually applied in portfolio selection in order to reduce investment risk; however, the economy is uncertain and the investment period is short. Further, an investor has incomplete information for selecting a portfolio with crisp proportions for each chosen security. In this paper we present a new method of constructing fuzzy portfolio model for the parameters of fuzzy-input return rates and fuzzy-output proportions, based on possibilistic mean-standard deviation models. Furthermore, we consider both excess or shortage of investment in different economic periods by using fuzzy constraint for the sum of the fuzzy proportions, and we also refer to risks of securities investment and vagueness of incomplete information during the period of depression economics for the portfolio selection. Finally, we present a numerical example of a portfolio selection problem to illustrate the proposed model and a sensitivity analysis is realised based on the results.

  15. Combining fuzzy mathematics with fuzzy logic to solve business management problems

    Science.gov (United States)

    Vrba, Joseph A.

    1993-12-01

    Fuzzy logic technology has been applied to control problems with great success. Because of this, many observers fell that fuzzy logic is applicable only in the control arena. However, business management problems almost never deal with crisp values. Fuzzy systems technology--a combination of fuzzy logic, fuzzy mathematics and a graphical user interface--is a natural fit for developing software to assist in typical business activities such as planning, modeling and estimating. This presentation discusses how fuzzy logic systems can be extended through the application of fuzzy mathematics and the use of a graphical user interface to make the information contained in fuzzy numbers accessible to business managers. As demonstrated through examples from actual deployed systems, this fuzzy systems technology has been employed successfully to provide solutions to the complex real-world problems found in the business environment.

  16. Fuzzy Languages

    Science.gov (United States)

    Rahonis, George

    The theory of fuzzy recognizable languages over bounded distributive lattices is presented as a paradigm of recognizable formal power series. Due to the idempotency properties of bounded distributive lattices, the equality of fuzzy recognizable languages is decidable, the determinization of multi-valued automata is effective, and a pumping lemma exists. Fuzzy recognizable languages over finite and infinite words are expressively equivalent to sentences of the multi-valued monadic second-order logic. Fuzzy recognizability over bounded ℓ-monoids and residuated lattices is briefly reported. The chapter concludes with two applications of fuzzy recognizable languages to real world problems in medicine.

  17. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  18. Relational Demonic Fuzzy Refinement

    Directory of Open Access Journals (Sweden)

    Fairouz Tchier

    2014-01-01

    Full Text Available We use relational algebra to define a refinement fuzzy order called demonic fuzzy refinement and also the associated fuzzy operators which are fuzzy demonic join (⊔fuz, fuzzy demonic meet (⊓fuz, and fuzzy demonic composition (□fuz. Our definitions and properties are illustrated by some examples using mathematica software (fuzzy logic.

  19. Fuzzy logic

    CERN Document Server

    Smets, P

    1995-01-01

    We start by describing the nature of imperfect data, and giving an overview of the various models that have been proposed. Fuzzy sets theory is shown to be an extension of classical set theory, and as such has a proeminent role or modelling imperfect data. The mathematic of fuzzy sets theory is detailled, in particular the role of the triangular norms. The use of fuzzy sets theory in fuzzy logic and possibility theory,the nature of the generalized modus ponens and of the implication operator for approximate reasoning are analysed. The use of fuzzy logic is detailled for application oriented towards process control and database problems.

  20. Radiation hardening of integrated circuits technologies

    International Nuclear Information System (INIS)

    Auberton-Herve, A.J.; Leray, J.L.

    1991-01-01

    The radiation hardening studies started in the mid decade -1960-1970. To survive the different military or space radiative environment, a new engineering science borned, to understand the degradation of electronics components. The different solutions to improve the electronic behavior in such environment, have been named radiation hardening of the technologies. Improvement of existing technologies, and qualification method have been widely studied. However, at the other hand, specific technologies was developped : The Silicon On Insulator technologies for CMOS or Bipolar. The HSOI3HD technology (supported by DGA-CEA DAM and LETI with THOMSON TMS) offers today the highest hardening level for the integration density of hundreds of thousand transistors on the same silicon. Full complex systems would be realized on a single die with a technological radiation hardening and no more system hardening

  1. Working hardening modelization in zirconium alloys

    International Nuclear Information System (INIS)

    Sanchez, P.; Pochettino, Alberto A.

    1999-01-01

    Working hardening effects on mechanical properties and crystallographic textures formation in Zr-based alloys are studied. The hardening mechanisms for different grain deformations and topological conditions of simple crystal yield are considered. Results obtained show that the differences in the cold rolling textures (L and T textures) can be related with hardening microstructural parameters. (author)

  2. Practical aspects of systems hardening

    International Nuclear Information System (INIS)

    Shepherd, W.J.

    1989-01-01

    Applications of hardening technology in a practical system require a balance between the factors governing affordability, producibility, and survivability of the finished design. Without careful consideration of the top-level system operating constraints, a design engineer may find himself with a survivable but overweight, unproductive, expensive design. This paper explores some lessons learned in applying hardening techniques to several laser communications programs and is intended as an introductory guide to novice designers faced with the task of hardening a space system

  3. Fuzzy Neuroidal Nets and Recurrent Fuzzy Computations

    Czech Academy of Sciences Publication Activity Database

    Wiedermann, Jiří

    2001-01-01

    Roč. 11, č. 6 (2001), s. 675-686 ISSN 1210-0552. [SOFSEM 2001 Workshop on Soft Computing. Piešťany, 29.11.2001-30.11.2001] R&D Projects: GA ČR GA201/00/1489; GA AV ČR KSK1019101 Institutional research plan: AV0Z1030915 Keywords : fuzzy computing * fuzzy neural nets * fuzzy Turing machines * non-uniform computational complexity Subject RIV: BA - General Mathematics

  4. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  5. Neuro-fuzzy system modeling based on automatic fuzzy clustering

    Institute of Scientific and Technical Information of China (English)

    Yuangang TANG; Fuchun SUN; Zengqi SUN

    2005-01-01

    A neuro-fuzzy system model based on automatic fuzzy clustering is proposed.A hybrid model identification algorithm is also developed to decide the model structure and model parameters.The algorithm mainly includes three parts:1) Automatic fuzzy C-means (AFCM),which is applied to generate fuzzy rules automatically,and then fix on the size of the neuro-fuzzy network,by which the complexity of system design is reducesd greatly at the price of the fitting capability;2) Recursive least square estimation (RLSE).It is used to update the parameters of Takagi-Sugeno model,which is employed to describe the behavior of the system;3) Gradient descent algorithm is also proposed for the fuzzy values according to the back propagation algorithm of neural network.Finally,modeling the dynamical equation of the two-link manipulator with the proposed approach is illustrated to validate the feasibility of the method.

  6. Combinational Reasoning of Quantitative Fuzzy Topological Relations for Simple Fuzzy Regions

    Science.gov (United States)

    Liu, Bo; Li, Dajun; Xia, Yuanping; Ruan, Jian; Xu, Lili; Wu, Huanyi

    2015-01-01

    In recent years, formalization and reasoning of topological relations have become a hot topic as a means to generate knowledge about the relations between spatial objects at the conceptual and geometrical levels. These mechanisms have been widely used in spatial data query, spatial data mining, evaluation of equivalence and similarity in a spatial scene, as well as for consistency assessment of the topological relations of multi-resolution spatial databases. The concept of computational fuzzy topological space is applied to simple fuzzy regions to efficiently and more accurately solve fuzzy topological relations. Thus, extending the existing research and improving upon the previous work, this paper presents a new method to describe fuzzy topological relations between simple spatial regions in Geographic Information Sciences (GIS) and Artificial Intelligence (AI). Firstly, we propose a new definition for simple fuzzy line segments and simple fuzzy regions based on the computational fuzzy topology. And then, based on the new definitions, we also propose a new combinational reasoning method to compute the topological relations between simple fuzzy regions, moreover, this study has discovered that there are (1) 23 different topological relations between a simple crisp region and a simple fuzzy region; (2) 152 different topological relations between two simple fuzzy regions. In the end, we have discussed some examples to demonstrate the validity of the new method, through comparisons with existing fuzzy models, we showed that the proposed method can compute more than the existing models, as it is more expressive than the existing fuzzy models. PMID:25775452

  7. FUZZY RINGS AND ITS PROPERTIES

    Directory of Open Access Journals (Sweden)

    Karyati Karyati

    2017-01-01

      One of algebraic structure that involves a binary operation is a group that is defined  an un empty set (classical with an associative binary operation, it has identity elements and each element has an inverse. In the structure of the group known as the term subgroup, normal subgroup, subgroup and factor group homomorphism and its properties. Classical algebraic structure is developed to algebraic structure fuzzy by the researchers as an example semi group fuzzy and fuzzy group after fuzzy sets is introduced by L. A. Zadeh at 1965. It is inspired of writing about semi group fuzzy and group of fuzzy, a research on the algebraic structure of the ring is held with reviewing ring fuzzy, ideal ring fuzzy, homomorphism ring fuzzy and quotient ring fuzzy with its properties. The results of this study are obtained fuzzy properties of the ring, ring ideal properties fuzzy, properties of fuzzy ring homomorphism and properties of fuzzy quotient ring by utilizing a subset of a subset level  and strong level  as well as image and pre-image homomorphism fuzzy ring.   Keywords: fuzzy ring, subset level, homomorphism fuzzy ring, fuzzy quotient ring

  8. On fuzzy quasi continuity and an application of fuzzy set theory

    CERN Document Server

    Mahmoud, R A

    2003-01-01

    Where as classical topology has been developed closely connected with classical analysis describing topological phenomena in analysis, fuzzy topology with its important application in quantum gravity indicated by Witten and Elnaschie, has only been introduced as an analogue of the classical topology. The development of fuzzy topology without close relations to analytical problems did not give the possibility of testing successfully the applicability of the new notions and results. Till now this situation did not change, essentially. Although, many types of fuzzy sets and fuzzy functions having the quasi-property in both of weak and strong than openness and continuity, respectively, have been studied in detail. Many properties on fuzzy topological spaces such as compactness are discussed via fuzzy notion. While others are far from being completely devoted in its foundation. So, this paper is devoted to present a new class of fuzzy quasi-continuous functions via fuzzy compactness has been defined. Some characte...

  9. Solution hardening and strain hardening at elevated temperatures

    International Nuclear Information System (INIS)

    Kocks, U.F.

    1982-10-01

    Solutes can significantly increase the rate of strain hardening; as a consequence, the saturation stress, at which strain hardening tends to cease for a given temperature and strain rate, is increased more than the yield stress: this is the major effect of solutes on strength at elevated temperatures, especially in the regime where dynamic strain-aging occurs. It is shown that local solute mobility can affect both the rate of dynamic recovery and the dislocation/dislocation interaction strength. The latter effect leads to multiplicative solution strengthening. It is explained by a new model based on repeated dislocation unlocking, in a high-temperature limit, which also rationalizes the stress dependence of static and dynamic strain-aging, and may help explain the plateau of the yield stress at elevated temperatures. 15 figures

  10. Improvement of Fuzzy Image Contrast Enhancement Using Simulated Ergodic Fuzzy Markov Chains

    Directory of Open Access Journals (Sweden)

    Behrouz Fathi-Vajargah

    2014-01-01

    Full Text Available This paper presents a novel fuzzy enhancement technique using simulated ergodic fuzzy Markov chains for low contrast brain magnetic resonance imaging (MRI. The fuzzy image contrast enhancement is proposed by weighted fuzzy expected value. The membership values are then modified to enhance the image using ergodic fuzzy Markov chains. The qualitative performance of the proposed method is compared to another method in which ergodic fuzzy Markov chains are not considered. The proposed method produces better quality image.

  11. Fuzzy control. Fundamentals, stability and design of fuzzy controllers

    Energy Technology Data Exchange (ETDEWEB)

    Michels, K. [Fichtner GmbH und Co. KG, Stuttgart (Germany); Klawonn, F. [Fachhochschule Braunschweig/Wolfenbuettel (Germany). Fachbereich Informatik; Kruse, R. [Magdeburg Univ. (Germany). Fakultaet Informatik, Abt. Wiss.- und Sprachverarbeitung; Nuernberger, A. (eds.) [California Univ., Berkeley, CA (United States). Computer Science Division

    2006-07-01

    The book provides a critical discussion of fuzzy controllers from the perspective of classical control theory. Special emphases are placed on topics that are of importance for industrial applications, like (self-) tuning of fuzzy controllers, optimisation and stability analysis. The book is written as a textbook for graduate students as well as a comprehensive reference book about fuzzy control for researchers and application engineers. Starting with a detailed introduction to fuzzy systems and control theory the reader is guided to up-to-date research results. (orig.)

  12. Hardening Azure applications

    CERN Document Server

    Gaurav, Suraj

    2015-01-01

    Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be bui

  13. Introduction to fuzzy systems

    CERN Document Server

    Chen, Guanrong

    2005-01-01

    Introduction to Fuzzy Systems provides students with a self-contained introduction that requires no preliminary knowledge of fuzzy mathematics and fuzzy control systems theory. Simplified and readily accessible, it encourages both classroom and self-directed learners to build a solid foundation in fuzzy systems. After introducing the subject, the authors move directly into presenting real-world applications of fuzzy logic, revealing its practical flavor. This practicality is then followed by basic fuzzy systems theory. The book also offers a tutorial on fuzzy control theory, based mainly on th

  14. Stability analysis of polynomial fuzzy models via polynomial fuzzy Lyapunov functions

    OpenAIRE

    Bernal Reza, Miguel Ángel; Sala, Antonio; JAADARI, ABDELHAFIDH; Guerra, Thierry-Marie

    2011-01-01

    In this paper, the stability of continuous-time polynomial fuzzy models by means of a polynomial generalization of fuzzy Lyapunov functions is studied. Fuzzy Lyapunov functions have been fruitfully used in the literature for local analysis of Takagi-Sugeno models, a particular class of the polynomial fuzzy ones. Based on a recent Taylor-series approach which allows a polynomial fuzzy model to exactly represent a nonlinear model in a compact set of the state space, it is shown that a refinemen...

  15. Relational Demonic Fuzzy Refinement

    OpenAIRE

    Tchier, Fairouz

    2014-01-01

    We use relational algebra to define a refinement fuzzy order called demonic fuzzy refinement and also the associated fuzzy operators which are fuzzy demonic join $({\\bigsqcup }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ , fuzzy demonic meet $({\\sqcap }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ , and fuzzy demonic composition $({\\square }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ . Our definitions and properties are illustrated by some examples using ma...

  16. Intuitionistic supra fuzzy topological spaces

    International Nuclear Information System (INIS)

    Abbas, S.E.

    2004-01-01

    In this paper, We introduce an intuitionistic supra fuzzy closure space and investigate the relationship between intuitionistic supra fuzzy topological spaces and intuitionistic supra fuzzy closure spaces. Moreover, we can obtain intuitionistic supra fuzzy topological space induced by an intuitionistic fuzzy bitopological space. We study the relationship between intuitionistic supra fuzzy closure space and the intuitionistic supra fuzzy topological space induced by an intuitionistic fuzzy bitopological space

  17. Intelligent control-I: review of fuzzy logic and fuzzy set theory

    International Nuclear Information System (INIS)

    Nagrial, M.H.

    2004-01-01

    In the past decade or so, fuzzy systems have supplanted conventional technologies in many engineering systems, in particular in control systems and pattern recognition. Fuzzy logic has found applications in a variety of consumer products e.g. washing machines, camcorders, digital cameras, air conditioners, subway trains, cement kilns and many others. The fuzzy technology is also being applied in information technology, where it provides decision-support and expert systems with powerful reasoning capabilities. Fuzzy sets, introduced by Zadeh in 1965 as a mathematical way to represent vagueness in linguistics, can be considered a generalisation of classical set theory. Fuzziness is often confused with probability. This lecture will introduce the principal concepts and mathematical notions of fuzzy set theory. (author)

  18. Hesitant fuzzy sets theory

    CERN Document Server

    Xu, Zeshui

    2014-01-01

    This book provides the readers with a thorough and systematic introduction to hesitant fuzzy theory. It presents the most recent research results and advanced methods in the field. These includes: hesitant fuzzy aggregation techniques, hesitant fuzzy preference relations, hesitant fuzzy measures, hesitant fuzzy clustering algorithms and hesitant fuzzy multi-attribute decision making methods. Since its introduction by Torra and Narukawa in 2009, hesitant fuzzy sets have become more and more popular and have been used for a wide range of applications, from decision-making problems to cluster analysis, from medical diagnosis to personnel appraisal and information retrieval. This book offers a comprehensive report on the state-of-the-art in hesitant fuzzy sets theory and applications, aiming at becoming a reference guide for both researchers and practitioners in the area of fuzzy mathematics and other applied research fields (e.g. operations research, information science, management science and engineering) chara...

  19. Fuzzy logic in management

    CERN Document Server

    Carlsson, Christer; Fullér, Robert

    2004-01-01

    Fuzzy Logic in Management demonstrates that difficult problems and changes in the management environment can be more easily handled by bringing fuzzy logic into the practice of management. This explicit theme is developed through the book as follows: Chapter 1, "Management and Intelligent Support Technologies", is a short survey of management leadership and what can be gained from support technologies. Chapter 2, "Fuzzy Sets and Fuzzy Logic", provides a short introduction to fuzzy sets, fuzzy relations, the extension principle, fuzzy implications and linguistic variables. Chapter 3, "Group Decision Support Systems", deals with group decision making, and discusses methods for supporting the consensus reaching processes. Chapter 4, "Fuzzy Real Options for Strategic Planning", summarizes research where the fuzzy real options theory was implemented as a series of models. These models were thoroughly tested on a number of real life investments, and validated in 2001. Chapter 5, "Soft Computing Methods for Reducing...

  20. The World of Combinatorial Fuzzy Problems and the Efficiency of Fuzzy Approximation Algorithms

    OpenAIRE

    Yamakami, Tomoyuki

    2015-01-01

    We re-examine a practical aspect of combinatorial fuzzy problems of various types, including search, counting, optimization, and decision problems. We are focused only on those fuzzy problems that take series of fuzzy input objects and produce fuzzy values. To solve such problems efficiently, we design fast fuzzy algorithms, which are modeled by polynomial-time deterministic fuzzy Turing machines equipped with read-only auxiliary tapes and write-only output tapes and also modeled by polynomia...

  1. Influence of Microstructure and Process Conditions on Simultaneous Low-Temperature Surface Hardening and Bulk Precipitation Hardening of Nanoflex®

    DEFF Research Database (Denmark)

    Bottoli, Federico; Winther, Grethe; Christiansen, Thomas L.

    2015-01-01

    Precipitation hardening martensitic stainless steel Nanoflex was low-temperature nitrided or nitrocarburized. In these treatments, simultaneous hardening of the bulk, by precipitation hardening, and the surface by dissolving nitrogen/carbon can be obtained because the treatment temperatures...... and times for these essentially different hardening mechanisms are compatible. The effect of the processing history of the steel on the nitrided/nitrocarburized case was investigated by varying the amounts of austenite and martensite through variation of the degree of plastic deformation by tensile strain...... consisting of martensite results in the deepest nitrided case, while a shallow case develops on a microstructure consisting of austenite. For an initial microstructure consisting of both martensite and austenite a non-uniform case depth is achieved. Simultaneous bulk and surface hardening is only possible...

  2. Devising Strain Hardening Models Using Kocks–Mecking Plots—A Comparison of Model Development for Titanium Aluminides and Case Hardening Steel

    Directory of Open Access Journals (Sweden)

    Markus Bambach

    2016-08-01

    Full Text Available The present study focuses on the development of strain hardening models taking into account the peculiarities of titanium aluminides. In comparison to steels, whose behavior has been studied extensively in the past, titanium aluminides possess a much larger initial work hardening rate, a sharp peak stress and pronounced softening. The work hardening behavior of a TNB-V4 (Ti–44.5Al–6.25Nb–0.8Mo–0.1B alloy is studied using isothermal hot compression tests conducted on a Gleeble 3500 simulator, and compared to the typical case hardening steel 25MoCrS4. The behavior is analyzed with the help of the Kocks-Mecking plots. In contrast to steel the TNB-V4 alloy shows a non-linear course of θ (i.e., no stage-III hardening initially and exhibits neither a plateau (stage IV hardening nor an inflection point at all deformation conditions. The present paper describes the development and application of a methodology for the design of strain hardening models for the TNB-V4 alloy and the 25CrMoS4 steel by taking the course of the Kocks-Mecking plots into account. Both models use different approaches for the hardening and softening mechanisms and accurately predict the flow stress over a wide range of deformation conditions. The methodology may hence assist in further developments of more sophisticated physically-based strain hardening models for TiAl-alloys.

  3. Hydrogen embrittlement susceptibility of laser-hardened 4140 steel

    Energy Technology Data Exchange (ETDEWEB)

    Tsay, L.W.; Lin, Z.W. [Nat. Taiwan Ocean Univ., Keelung (Taiwan). Inst. of Mater. Eng.; Shiue, R.K. [Institute of Materials Sciences and Engineering, National Dong Hwa University, Hualien, Taiwan (Taiwan); Chen, C. [Institute of Materials Sciences and Engineering, National Taiwan University, Taipei, Taiwan (Taiwan)

    2000-10-15

    Slow strain rate tensile (SSRT) tests were performed to investigate the susceptibility to hydrogen embrittlement of laser-hardened AISI 4140 specimens in air, gaseous hydrogen and saturated H{sub 2}S solution. Experimental results indicated that round bar specimens with two parallel hardened bands on opposite sides along the loading axis (i.e. the PH specimens), exhibited a huge reduction in tensile ductility for all test environments. While circular-hardened (CH) specimens with 1 mm hardened depth and 6 mm wide within the gauge length were resistant to gaseous hydrogen embrittlement. However, fully hardened CH specimens became susceptible to hydrogen embrittlement for testing in air at a lower strain rate. The strength of CH specimens increased with decreasing the depth of hardened zones in a saturated H{sub 2}S solution. The premature failure of hardened zones in a susceptible environment caused the formation of brittle intergranular fracture and the decrease in tensile ductility. (orig.)

  4. Intuitionistic fuzzy calculus

    CERN Document Server

    Lei, Qian

    2017-01-01

    This book offers a comprehensive and systematic review of the latest research findings in the area of intuitionistic fuzzy calculus. After introducing the intuitionistic fuzzy numbers’ operational laws and their geometrical and algebraic properties, the book defines the concept of intuitionistic fuzzy functions and presents the research on the derivative, differential, indefinite integral and definite integral of intuitionistic fuzzy functions. It also discusses some of the methods that have been successfully used to deal with continuous intuitionistic fuzzy information or data, which are different from the previous aggregation operators focusing on discrete information or data. Mainly intended for engineers and researchers in the fields of fuzzy mathematics, operations research, information science and management science, this book is also a valuable textbook for postgraduate and advanced undergraduate students alike.

  5. Fuzzy risk matrix

    International Nuclear Information System (INIS)

    Markowski, Adam S.; Mannan, M. Sam

    2008-01-01

    A risk matrix is a mechanism to characterize and rank process risks that are typically identified through one or more multifunctional reviews (e.g., process hazard analysis, audits, or incident investigation). This paper describes a procedure for developing a fuzzy risk matrix that may be used for emerging fuzzy logic applications in different safety analyses (e.g., LOPA). The fuzzification of frequency and severity of the consequences of the incident scenario are described which are basic inputs for fuzzy risk matrix. Subsequently using different design of risk matrix, fuzzy rules are established enabling the development of fuzzy risk matrices. Three types of fuzzy risk matrix have been developed (low-cost, standard, and high-cost), and using a distillation column case study, the effect of the design on final defuzzified risk index is demonstrated

  6. Global sensitivity analysis for fuzzy inputs based on the decomposition of fuzzy output entropy

    Science.gov (United States)

    Shi, Yan; Lu, Zhenzhou; Zhou, Yicheng

    2018-06-01

    To analyse the component of fuzzy output entropy, a decomposition method of fuzzy output entropy is first presented. After the decomposition of fuzzy output entropy, the total fuzzy output entropy can be expressed as the sum of the component fuzzy entropy contributed by fuzzy inputs. Based on the decomposition of fuzzy output entropy, a new global sensitivity analysis model is established for measuring the effects of uncertainties of fuzzy inputs on the output. The global sensitivity analysis model can not only tell the importance of fuzzy inputs but also simultaneously reflect the structural composition of the response function to a certain degree. Several examples illustrate the validity of the proposed global sensitivity analysis, which is a significant reference in engineering design and optimization of structural systems.

  7. Intuitionistic Fuzzy Subbialgebras and Duality

    Directory of Open Access Journals (Sweden)

    Wenjuan Chen

    2014-01-01

    Full Text Available We investigate connections between bialgebras and Atanassov’s intuitionistic fuzzy sets. Firstly we define an intuitionistic fuzzy subbialgebra of a bialgebra with an intuitionistic fuzzy subalgebra structure and also with an intuitionistic fuzzy subcoalgebra structure. Secondly we investigate the related properties of intuitionistic fuzzy subbialgebras. Finally we prove that the dual of an intuitionistic fuzzy strong subbialgebra is an intuitionistic fuzzy strong subbialgebra.

  8. Challenges in hardening technologies using shallow-trench isolation

    International Nuclear Information System (INIS)

    Shaneyfelt, M.R.; Dodd, P.E.; Draper, B.L.; Flores, R.S.

    1998-02-01

    Challenges related to radiation hardening CMOS technologies with shallow-trench isolation are explored. Results show that trench hardening can be more difficult than simply replacing the trench isolation oxide with a hardened field oxide

  9. Fuzzy topological digital space and digital fuzzy spline of electroencephalography during epileptic seizures

    Science.gov (United States)

    Shah, Mazlina Muzafar; Wahab, Abdul Fatah

    2017-08-01

    Epilepsy disease occurs because of there is a temporary electrical disturbance in a group of brain cells (nurons). The recording of electrical signals come from the human brain which can be collected from the scalp of the head is called Electroencephalography (EEG). EEG then considered in digital format and in fuzzy form makes it a fuzzy digital space data form. The purpose of research is to identify the area (curve and surface) in fuzzy digital space affected by inside epilepsy seizure in epileptic patient's brain. The main focus for this research is to generalize fuzzy topological digital space, definition and basic operation also the properties by using digital fuzzy set and the operations. By using fuzzy digital space, the theory of digital fuzzy spline can be introduced to replace grid data that has been use previously to get better result. As a result, the flat of EEG can be fuzzy topological digital space and this type of data can be use to interpolate the digital fuzzy spline.

  10. Intuitionistic Fuzzy Time Series Forecasting Model Based on Intuitionistic Fuzzy Reasoning

    Directory of Open Access Journals (Sweden)

    Ya’nan Wang

    2016-01-01

    Full Text Available Fuzzy sets theory cannot describe the data comprehensively, which has greatly limited the objectivity of fuzzy time series in uncertain data forecasting. In this regard, an intuitionistic fuzzy time series forecasting model is built. In the new model, a fuzzy clustering algorithm is used to divide the universe of discourse into unequal intervals, and a more objective technique for ascertaining the membership function and nonmembership function of the intuitionistic fuzzy set is proposed. On these bases, forecast rules based on intuitionistic fuzzy approximate reasoning are established. At last, contrast experiments on the enrollments of the University of Alabama and the Taiwan Stock Exchange Capitalization Weighted Stock Index are carried out. The results show that the new model has a clear advantage of improving the forecast accuracy.

  11. Radiation hardened COTS-based 32-bit microprocessor

    International Nuclear Information System (INIS)

    Haddad, N.; Brown, R.; Cronauer, T.; Phan, H.

    1999-01-01

    A high performance radiation hardened 32-bit RISC microprocessor based upon a commercial single chip CPU has been developed. This paper presents the features of radiation hardened microprocessor, the methods used to radiation harden this device, the results of radiation testing, and shows that the RAD6000 is well-suited for the vast majority of space applications. (authors)

  12. Fuzzy forecasting based on two-factors second-order fuzzy-trend logical relationship groups and the probabilities of trends of fuzzy logical relationships.

    Science.gov (United States)

    Chen, Shyi-Ming; Chen, Shen-Wen

    2015-03-01

    In this paper, we present a new method for fuzzy forecasting based on two-factors second-order fuzzy-trend logical relationship groups and the probabilities of trends of fuzzy-trend logical relationships. Firstly, the proposed method fuzzifies the historical training data of the main factor and the secondary factor into fuzzy sets, respectively, to form two-factors second-order fuzzy logical relationships. Then, it groups the obtained two-factors second-order fuzzy logical relationships into two-factors second-order fuzzy-trend logical relationship groups. Then, it calculates the probability of the "down-trend," the probability of the "equal-trend" and the probability of the "up-trend" of the two-factors second-order fuzzy-trend logical relationships in each two-factors second-order fuzzy-trend logical relationship group, respectively. Finally, it performs the forecasting based on the probabilities of the down-trend, the equal-trend, and the up-trend of the two-factors second-order fuzzy-trend logical relationships in each two-factors second-order fuzzy-trend logical relationship group. We also apply the proposed method to forecast the Taiwan Stock Exchange Capitalization Weighted Stock Index (TAIEX) and the NTD/USD exchange rates. The experimental results show that the proposed method outperforms the existing methods.

  13. Probabilistic fuzzy systems as additive fuzzy systems

    NARCIS (Netherlands)

    Almeida, R.J.; Verbeek, N.; Kaymak, U.; Costa Sousa, da J.M.; Laurent, A.; Strauss, O.; Bouchon-Meunier, B.; Yager, R.

    2014-01-01

    Probabilistic fuzzy systems combine a linguistic description of the system behaviour with statistical properties of data. It was originally derived based on Zadeh’s concept of probability of a fuzzy event. Two possible and equivalent additive reasoning schemes were proposed, that lead to the

  14. Models for cooperative games with fuzzy relations among the agents fuzzy communication, proximity relation and fuzzy permission

    CERN Document Server

    Jiménez-Losada, Andrés

    2017-01-01

    This book offers a comprehensive introduction to cooperative game theory and a practice-oriented reference guide to new models and tools for studying bilateral fuzzy relations among several agents or players. It introduces the reader to several fuzzy models, each of which is first analyzed in the context of classical games (crisp games) and subsequently in the context of fuzzy games. Special emphasis is given to the value of Shapley, which is presented for the first time in the context of fuzzy games. Students and researchers will find here a self-contained reference guide to cooperative fuzzy games, characterized by a wealth of examples, descriptions of a wide range of possible situations, step-by-step explanations of the basic mathematical concepts involved, and easy-to-follow information on axioms and properties.

  15. On residual stresses and fatigue of laser hardened steels

    International Nuclear Information System (INIS)

    Lin, Ru.

    1992-01-01

    This thesis deals with studies on residual stresses and fatigue properties of laser-transformation hardened steels. Two types of specimens, cylinders and fatigue specimens were used in the studies. The cylinders, made of Swedish steels SS 2244 and SS 2258 which correspond to AISI 4140 and AISI 52100 respectively, were locally hardened by a single scan of laser beam in the longitudinal direction, with various laser parameters. Residual stress distributions across the hardened tracks were measured by means of X-ray diffraction. The origins of residual stresses were investigated and discussed. For the fatigue specimens, including smooth and notched types made of Swedish steels SS 2244, SS 2225 and SS 1572 (similar to AISI 4140, AISI 4130 and AISI 1035, respectively), laser hardening was carried out in the gauge section. The residual stress field induced by the hardening process and the fatigue properties by plane bending fatigue test were studied. In order to investigate the stability of the residual stress field, stress measurements were also made on specimens being loaded near the fatigue limits for over 10 7 cycles. Further the concept of local fatigue strength was employed to correlate quantitatively the effect of hardness and residual stress field on the fatigue limits. In addition a group of smooth specimens of SS 2244 was induction hardened and the hardening results were compared with the corresponding laser hardened ones in terms of residual stress and fatigue behaviour. It has been found that compressive stresses exist in the hardened zone of all the specimens studied. The laser hardening condition, the specimen and how the hardening is carried out can significantly affect the residual stress field. Laser hardening can greatly improve the fatigue properties by inducing a hardened and compressed surface layer. (112 refs.)(au)

  16. On residual stresses and fatigue of laser hardened steels

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Ru.

    1992-01-01

    This thesis deals with studies on residual stresses and fatigue properties of laser-transformation hardened steels. Two types of specimens, cylinders and fatigue specimens were used in the studies. The cylinders, made of Swedish steels SS 2244 and SS 2258 which correspond to AISI 4140 and AISI 52100 respectively, were locally hardened by a single scan of laser beam in the longitudinal direction, with various laser parameters. Residual stress distributions across the hardened tracks were measured by means of X-ray diffraction. The origins of residual stresses were investigated and discussed. For the fatigue specimens, including smooth and notched types made of Swedish steels SS 2244, SS 2225 and SS 1572 (similar to AISI 4140, AISI 4130 and AISI 1035, respectively), laser hardening was carried out in the gauge section. The residual stress field induced by the hardening process and the fatigue properties by plane bending fatigue test were studied. In order to investigate the stability of the residual stress field, stress measurements were also made on specimens being loaded near the fatigue limits for over 10[sup 7] cycles. Further the concept of local fatigue strength was employed to correlate quantitatively the effect of hardness and residual stress field on the fatigue limits. In addition a group of smooth specimens of SS 2244 was induction hardened and the hardening results were compared with the corresponding laser hardened ones in terms of residual stress and fatigue behaviour. It has been found that compressive stresses exist in the hardened zone of all the specimens studied. The laser hardening condition, the specimen and how the hardening is carried out can significantly affect the residual stress field. Laser hardening can greatly improve the fatigue properties by inducing a hardened and compressed surface layer. (112 refs.)(au).

  17. Multicriteria optimization in a fuzzy environment: The fuzzy analytic hierarchy process

    Directory of Open Access Journals (Sweden)

    Gardašević-Filipović Milanka

    2010-01-01

    Full Text Available In the paper the fuzzy extension of the Analytic Hierarchy Process (AHP based on fuzzy numbers, and its application in solving a practical problem, are considered. The paper advocates the use of contradictory test to check the fuzzy user preferences during fuzzy AHP decision-making process. We also propose consistency check and deriving priorities from inconsistent fuzzy judgment matrices to be included in the process, in order to check if the fuzzy approach can be applied in the AHP for the problem considered. An aggregation of local priorities obtained at different levels into composite global priorities for the alternatives based on weighted-sum method is also discussed. The contradictory fuzzy judgment matrix is analyzed. Our theoretical consideration has been verified by an application of commercially available Super Decisions program (developed for solving multi-criteria optimization problems using AHP approach on the problem previously treated in the literature. The obtained results are compared with those from the literature. The conclusions are given and the possibilities for further work in the field are pointed out.

  18. Fuzzy weakly preopen (preclosed) function in Kubiak-Sostak fuzzy topological spaces

    International Nuclear Information System (INIS)

    Zahran, A.M.; Abd-Allah, M. Azab.; Abd El-Rahman, Abd El-Nasser G.

    2009-01-01

    In this paper, we introduce and characterize fuzzy weakly preopen and fuzzy weakly preclosed functions between L-fuzzy topological spaces in Kubiak-Sostak sense and also study these functions in relation to some other types of already known functions.

  19. On Fuzzy β-I-open sets and Fuzzy β-I-continuous functions

    International Nuclear Information System (INIS)

    Keskin, Aynur

    2009-01-01

    In this paper, first of all we obtain some properties and characterizations of fuzzy β-I-open sets. After that, we also define the notion of β-I-closed sets and obtain some properties. Lastly, we introduce the notions of fuzzy β-I-continuity with the help of fuzzy β-I-open sets to obtain decomposition of fuzzy continuity.

  20. On Fuzzy {beta}-I-open sets and Fuzzy {beta}-I-continuous functions

    Energy Technology Data Exchange (ETDEWEB)

    Keskin, Aynur [Department of Mathematics, Faculty of Science and Arts, Selcuk University, Campus, 42075 Konya (Turkey)], E-mail: akeskin@selcuk.edu.tr

    2009-11-15

    In this paper, first of all we obtain some properties and characterizations of fuzzy {beta}-I-open sets. After that, we also define the notion of {beta}-I-closed sets and obtain some properties. Lastly, we introduce the notions of fuzzy {beta}-I-continuity with the help of fuzzy {beta}-I-open sets to obtain decomposition of fuzzy continuity.

  1. Fuzzy stochastic damage mechanics (FSDM based on fuzzy auto-adaptive control theory

    Directory of Open Access Journals (Sweden)

    Ya-jun Wang

    2012-06-01

    Full Text Available In order to fully interpret and describe damage mechanics, the origin and development of fuzzy stochastic damage mechanics were introduced based on the analysis of the harmony of damage, probability, and fuzzy membership in the interval of [0,1]. In a complete normed linear space, it was proven that a generalized damage field can be simulated through β probability distribution. Three kinds of fuzzy behaviors of damage variables were formulated and explained through analysis of the generalized uncertainty of damage variables and the establishment of a fuzzy functional expression. Corresponding fuzzy mapping distributions, namely, the half-depressed distribution, swing distribution, and combined swing distribution, which can simulate varying fuzzy evolution in diverse stochastic damage situations, were set up. Furthermore, through demonstration of the generalized probabilistic characteristics of damage variables, the cumulative distribution function and probability density function of fuzzy stochastic damage variables, which show β probability distribution, were modified according to the expansion principle. The three-dimensional fuzzy stochastic damage mechanical behaviors of the Longtan rolled-concrete dam were examined with the self-developed fuzzy stochastic damage finite element program. The statistical correlation and non-normality of random field parameters were considered comprehensively in the fuzzy stochastic damage model described in this paper. The results show that an initial damage field based on the comprehensive statistical evaluation helps to avoid many difficulties in the establishment of experiments and numerical algorithms for damage mechanics analysis.

  2. ANALYSIS OF FUZZY QUEUES: PARAMETRIC PROGRAMMING APPROACH BASED ON RANDOMNESS - FUZZINESS CONSISTENCY PRINCIPLE

    OpenAIRE

    Dhruba Das; Hemanta K. Baruah

    2015-01-01

    In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah’s Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM...

  3. ANALYSIS OF FUZZY QUEUES: PARAMETRIC PROGRAMMING APPROACH BASED ON RANDOMNESS - FUZZINESS CONSISTENCY PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Dhruba Das

    2015-04-01

    Full Text Available In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah’s Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM/M/1 and M/FM/1 has been studied and constructed their membership functions of the system characteristics based on the aforesaid principle. The former represents a queue with fuzzy exponential arrivals and exponential service rate while the latter represents a queue with exponential arrival rate and fuzzy exponential service rate.

  4. Introduction to Fuzzy Set Theory

    Science.gov (United States)

    Kosko, Bart

    1990-01-01

    An introduction to fuzzy set theory is described. Topics covered include: neural networks and fuzzy systems; the dynamical systems approach to machine intelligence; intelligent behavior as adaptive model-free estimation; fuzziness versus probability; fuzzy sets; the entropy-subsethood theorem; adaptive fuzzy systems for backing up a truck-and-trailer; product-space clustering with differential competitive learning; and adaptive fuzzy system for target tracking.

  5. Laser Surface Hardening of Groove Edges

    Science.gov (United States)

    Hussain, A.; Hamdani, A. H.; Akhter, R.; Aslam, M.

    2013-06-01

    Surface hardening of groove-edges made of 3Cr13 Stainless Steel has been carried out using 500 W CO2 laser with a rectangular beam of 2.5×3 mm2. The processing speed was varied from 150-500 mm/min. It was seen that the hardened depth increases with increase in laser interaction time. A maximum hardened depth of around 1mm was achieved. The microhardness of the transformed zone was 2.5 times the hardness of base metal. The XRD's and microstructural analysis were also reported.

  6. Uncertainty analysis of flexible rotors considering fuzzy parameters and fuzzy-random parameters

    Directory of Open Access Journals (Sweden)

    Fabian Andres Lara-Molina

    Full Text Available Abstract The components of flexible rotors are subjected to uncertainties. The main sources of uncertainties include the variation of mechanical properties. This contribution aims at analyzing the dynamics of flexible rotors under uncertain parameters modeled as fuzzy and fuzzy random variables. The uncertainty analysis encompasses the modeling of uncertain parameters and the numerical simulation of the corresponding flexible rotor model by using an approach based on fuzzy dynamic analysis. The numerical simulation is accomplished by mapping the fuzzy parameters of the deterministic flexible rotor model. Thereby, the flexible rotor is modeled by using both the Fuzzy Finite Element Method and the Fuzzy Stochastic Finite Element Method. Numerical simulations illustrate the methodology conveyed in terms of orbits and frequency response functions subject to uncertain parameters.

  7. Statistical Methods for Fuzzy Data

    CERN Document Server

    Viertl, Reinhard

    2011-01-01

    Statistical data are not always precise numbers, or vectors, or categories. Real data are frequently what is called fuzzy. Examples where this fuzziness is obvious are quality of life data, environmental, biological, medical, sociological and economics data. Also the results of measurements can be best described by using fuzzy numbers and fuzzy vectors respectively. Statistical analysis methods have to be adapted for the analysis of fuzzy data. In this book, the foundations of the description of fuzzy data are explained, including methods on how to obtain the characterizing function of fuzzy m

  8. Paired fuzzy sets

    DEFF Research Database (Denmark)

    Rodríguez, J. Tinguaro; Franco de los Ríos, Camilo; Gómez, Daniel

    2015-01-01

    In this paper we want to stress the relevance of paired fuzzy sets, as already proposed in previous works of the authors, as a family of fuzzy sets that offers a unifying view for different models based upon the opposition of two fuzzy sets, simply allowing the existence of different types...

  9. Hardening Embrittlement and Non-Hardening Embrittlement of Welding-Heat-Affected Zones in a Cr-Mo Low Alloy Steel

    Directory of Open Access Journals (Sweden)

    Yu Zhao

    2018-06-01

    Full Text Available The embrittlement of heat affected zones (HAZs resulting from the welding of a P-doped 2.25Cr-1Mo steel was studied by the analysis of the fracture appearance transition temperatures (FATTs of the HAZs simulated under a heat input of 45 kJ/cm with different peak temperatures. The FATTs of the HAZs both with and without tempering increased with the rise of the peak temperature. However, the FATTs were apparently lower for the tempered HAZs. For the as-welded (untempered HAZs, the FATTs were mainly affected by residual stress, martensite/austenite (M/A islands, and bainite morphology. The observed embrittlement is a hardening embrittlement. On the other hand, the FATTs of the tempered HAZs were mainly affected by phosphorus grain boundary segregation, thereby causing a non-hardening embrittlement. The results demonstrate that the hardening embrittlement of the as-welded HAZs was more severe than the non-hardening embrittlement of the tempered HAZs. Consequently, a post-weld heat treatment should be carried out if possible so as to eliminate the hardening embrittlement.

  10. Fuzzy Arden Syntax: A fuzzy programming language for medicine.

    Science.gov (United States)

    Vetterlein, Thomas; Mandl, Harald; Adlassnig, Klaus-Peter

    2010-05-01

    The programming language Arden Syntax has been optimised for use in clinical decision support systems. We describe an extension of this language named Fuzzy Arden Syntax, whose original version was introduced in S. Tiffe's dissertation on "Fuzzy Arden Syntax: Representation and Interpretation of Vague Medical Knowledge by Fuzzified Arden Syntax" (Vienna University of Technology, 2003). The primary aim is to provide an easy means of processing vague or uncertain data, which frequently appears in medicine. For both propositional and number data types, fuzzy equivalents have been added to Arden Syntax. The Boolean data type was generalised to represent any truth degree between the two extremes 0 (falsity) and 1 (truth); fuzzy data types were introduced to represent fuzzy sets. The operations on truth values and real numbers were generalised accordingly. As the conditions to decide whether a certain programme unit is executed or not may be indeterminate, a Fuzzy Arden Syntax programme may split. The data in the different branches may be optionally aggregated subsequently. Fuzzy Arden Syntax offers the possibility to formulate conveniently Medical Logic Modules (MLMs) based on the principle of a continuously graded applicability of statements. Furthermore, ad hoc decisions about sharp value boundaries can be avoided. As an illustrative example shows, an MLM making use of the features of Fuzzy Arden Syntax is not significantly more complex than its Arden Syntax equivalent; in the ideal case, a programme handling crisp data remains practically unchanged when compared to its fuzzified version. In the latter case, the output data, which can be a set of weighted alternatives, typically depends continuously from the input data. In typical applications an Arden Syntax MLM can produce a different output after only slight changes of the input; discontinuities are in fact unavoidable when the input varies continuously but the output is taken from a discrete set of possibilities

  11. Radiation-chemical hardening of phenol-formaldehyde oligomers

    International Nuclear Information System (INIS)

    Shlapatskaya, V.V.; Omel'chenko, S.I.

    1978-01-01

    Radiation-chemical hardening of phenol formaldehyde oligomers of the resol type has been studied in the presence of furfural and diallylphthalate diluents. The samples have been hardened on an electron accelerator at an electron energy of 1.0-1.1 MeV and a dose rate of 2-3 Mrad/s. The kinetics of hardening has been studied on the yield of gel fraction within the range of absorbed doses from 7 to 400 Mrad. Radiation-chemical hardening of the studied compositions is activated with sensitizers, namely, amines, metal chlorides, and heterocyclic derivatives of metals. Furfural and diallylphthalate compositions are suitable for forming glass-fibre plastic items by the wet method and coatings under the action of ionizing radiations

  12. Intuitionistic fuzzy logics

    CERN Document Server

    T Atanassov, Krassimir

    2017-01-01

    The book offers a comprehensive survey of intuitionistic fuzzy logics. By reporting on both the author’s research and others’ findings, it provides readers with a complete overview of the field and highlights key issues and open problems, thus suggesting new research directions. Starting with an introduction to the basic elements of intuitionistic fuzzy propositional calculus, it then provides a guide to the use of intuitionistic fuzzy operators and quantifiers, and lastly presents state-of-the-art applications of intuitionistic fuzzy sets. The book is a valuable reference resource for graduate students and researchers alike.

  13. (L,M-Fuzzy σ-Algebras

    Directory of Open Access Journals (Sweden)

    Fu-Gui Shi

    2010-01-01

    Full Text Available The notion of (L,M-fuzzy σ-algebras is introduced in the lattice value fuzzy set theory. It is a generalization of Klement's fuzzy σ-algebras. In our definition of (L,M-fuzzy σ-algebras, each L-fuzzy subset can be regarded as an L-measurable set to some degree.

  14. Recurrent fuzzy ranking methods

    Science.gov (United States)

    Hajjari, Tayebeh

    2012-11-01

    With the increasing development of fuzzy set theory in various scientific fields and the need to compare fuzzy numbers in different areas. Therefore, Ranking of fuzzy numbers plays a very important role in linguistic decision-making, engineering, business and some other fuzzy application systems. Several strategies have been proposed for ranking of fuzzy numbers. Each of these techniques has been shown to produce non-intuitive results in certain case. In this paper, we reviewed some recent ranking methods, which will be useful for the researchers who are interested in this area.

  15. Bake hardening of nanograin AA7075 aluminum alloy

    International Nuclear Information System (INIS)

    Dehghani, Kamran

    2011-01-01

    Highlights: ► The bake hardening behavior of AA7075 was studied and compared with its coarse-grain counterpart. ► Nanograin AA7075 exhibited 88–100% increase in bake hardenability. ► Nanograin AA7075 exhibited 36–38% increase in final yield strength after baking. ► Maximum bake hardenability and final yield stress were about 185 MPa and 719 MPa. - Abstract: In the present work, the bake hardening of nanostructured AA7075 aluminum alloy was compared with that of its coarse-grain counterpart. Surface severe plastic deformation (SSPD) was used to produce nanograin layers on both surfaces of workpieces. The nanostructured layers were characterized using scanning electron microscopy (SEM) and atomic force microscopy (AFM) techniques. The thickness of nanostructured layer, having the grains of 50–110 nm, was about 75 μm on each side of workpiece. The bake hardenability of nanograin and coarse-grain AA7075 was then compared by pre-straining to 2, 4 and 6% followed by baking at 100 °C and 200 °C for 20 min. Comparing to coarse-grain case, there was about 88–100% increase in bake hardenability and about 36–38% increase in yield strength after the bake hardening of present nanograin AA7075. Such an increase in bake hardenability and strength was achieved when the thickness of two nanograin layers was about only one-tenth of the whole thickness.

  16. Fuzzy production planning models for an unreliable production system with fuzzy production rate and stochastic/fuzzy demand rate

    Directory of Open Access Journals (Sweden)

    K. A. Halim

    2011-01-01

    Full Text Available In this article, we consider a single-unit unreliable production system which produces a single item. During a production run, the production process may shift from the in-control state to the out-of-control state at any random time when it produces some defective items. The defective item production rate is assumed to be imprecise and is characterized by a trapezoidal fuzzy number. The production rate is proportional to the demand rate where the proportionality constant is taken to be a fuzzy number. Two production planning models are developed on the basis of fuzzy and stochastic demand patterns. The expected cost per unit time in the fuzzy sense is derived in each model and defuzzified by using the graded mean integration representation method. Numerical examples are provided to illustrate the optimal results of the proposed fuzzy models.

  17. Structural heredity influence upon principles of strain wave hardening

    Science.gov (United States)

    Kiricheck, A. V.; Barinov, S. V.; Yashin, A. V.

    2017-02-01

    It was established experimentally that by penetration of a strain wave through material hardened not only the technological modes of processing, but also a technological heredity - the direction of the fibers of the original macrostructure have an influence upon the diagram of microhardness. By penetration of the strain wave along fibers, the degree of hardening the material is less, however, a product is hardened throughout its entire section mainly along fibers. In the direction of the strain waves across fibers of the original structure of material, the degree of material hardening is much higher, the depth of the hardened layer with the degree of hardening not less than 50% makes at least 3 mm. It was found that under certain conditions the strain wave can completely change the original structure of the material. Thus, a heterogeneously hardened structure characterized by the interchange of harder and more viscous areas is formed, which is beneficial for assurance of high operational properties of material.

  18. Construction of Fuzzy Sets and Applying Aggregation Operators for Fuzzy Queries

    DEFF Research Database (Denmark)

    Hudec, Miroslav; Sudzina, Frantisek

    Flexible query conditions could use linguistic terms described by fuzzy sets. The question is how to properly construct fuzzy sets for each linguistic term and apply an adequate aggregation function. For construction of fuzzy sets, the lowest value, the highest value of attribute...... and the distribution of data inside its domain are used. The logarithmic transformation of domains appears to be suitable. This way leads to a balanced distribution of tuples over fuzzy sets. In addition, users’ opinions about linguistic terms as well as current content in database are merged. The second investigated...

  19. Thermomechanical properties of radiation hardened oligoesteracrylates

    International Nuclear Information System (INIS)

    Lomonosova, N.V.; Chikin, Yu.A.

    1984-01-01

    Thermomechanical properties of radiation hardened oligoesteracrylates are studied by the methods of isothermal heating and thermal mechanics. Films of dimethacrylate of ethylene glycol, triethylene glycol (TGM-3), tetraethylene glycol, tridecaethylene glycol and TGM-3 mixture with methyl methacrylate hardened by different doses (5-150 kGy) using Co 60 installation with a dose rate of 2x10 -3 kGy/s served as a subject of the research. During oligoesteracrylate hargening a space network is formed, chain sections between lattice points of which are in a stressed state. Maximum of deformation is observed at 210-220 deg C on thermomechanical curves of samples hardened by doses > 5 kGy, which form and intensity is dependent on an absorbed dose. Presence of a high-temperature maximum on diaqrams of isometric heating of spatially cross-linked oligoesteracrylates is discovered. High thermal stability of three-dimensional network of radiation hardened oligoesteracrylates provides satisfactory tensile properties (40% of initial strength) in sample testing an elevated temperatures (200-250 deg C)

  20. Fuzzy social choice theory

    CERN Document Server

    B Gibilisco, Michael; E Albert, Karen; N Mordeson, John; J Wierman, Mark; D Clark, Terry

    2014-01-01

    This book offers a comprehensive analysis of the social choice literature and shows, by applying fuzzy sets, how the use of fuzzy preferences, rather than that of strict ones, may affect the social choice theorems. To do this, the book explores the presupposition of rationality within the fuzzy framework and shows that the two conditions for rationality, completeness and transitivity, do exist with fuzzy preferences. Specifically, this book examines: the conditions under which a maximal set exists; the Arrow’s theorem;  the Gibbard-Satterthwaite theorem; and the median voter theorem.  After showing that a non-empty maximal set does exists for fuzzy preference relations, this book goes on to demonstrating the existence of a fuzzy aggregation rule satisfying all five Arrowian conditions, including non-dictatorship. While the Gibbard-Satterthwaite theorem only considers individual fuzzy preferences, this work shows that both individuals and groups can choose alternatives to various degrees, resulting in a so...

  1. Relations Among Some Fuzzy Entropy Formulae

    Institute of Scientific and Technical Information of China (English)

    卿铭

    2004-01-01

    Fuzzy entropy has been widely used to analyze and design fuzzy systems, and many fuzzy entropy formulae have been proposed. For further in-deepth analysis of fuzzy entropy, the axioms and some important formulae of fuzzy entropy are introduced. Some equivalence results among these fuzzy entropy formulae are proved, and it is shown that fuzzy entropy is a special distance measurement.

  2. New fuzzy EWMA control charts for monitoring phase II fuzzy profiles

    Directory of Open Access Journals (Sweden)

    Ghazale Moghadam

    2016-01-01

    Full Text Available In many quality control applications, the quality of a process or product is explained by the relationship between response variable and one or more explanatory variables, called a profile. In this paper, a new fuzzy EWMA control chart for phase II fuzzy profile monitoring is proposed. To this end, we extend EWMA control charts to its equivalent Fuzzy type and then implement fuzzy ranking methods to determine whether the process fuzzy profile is under or out of control. The proposed method is capable of identifying small changes in process under condition of process profile explaining parameters vagueness, roughness and uncertainty. Determining the source of changes, this method provides us with the possibility of recognizing the causes of process transition from stable mode, removing these causes and restoring the process stable mode.

  3. Inference of RMR value using fuzzy set theory and neuro-fuzzy techniques

    Energy Technology Data Exchange (ETDEWEB)

    Bae, Gyu-Jin; Cho, Mahn-Sup [Korea Institute of Construction Technology, Koyang(Korea)

    2001-12-31

    In the design of tunnel, it contains inaccuracy of data, fuzziness of evaluation, observer error and so on. The face observation during tunnel excavation, therefore, plays an important role to raise stability and to reduce supporting cost. This study is carried out to minimize the subjectiveness of observer and to exactly evaluate the natural properties of ground during the face observation. For these purpose, fuzzy set theory and neuro-fuzzy techniques in artificial intelligent techniques are applied to the inference of the RMR(Rock Mass Rating) value from the observation data. The correlation between original RMR value and inferred RMR{sub {sub F}U} and RMR{sub {sub N}F} values from fuzzy Set theory and neuro-fuzzy techniques is investigated using 46 data. The results show that good correlation between original RMR value and inferred RMR{sub {sub F}U} and RMR{sub {sub N}F} values is observed when the correlation coefficients are |R|=0.96 and |R|=0.95 respectively. >From these results, applicability of fuzzy set theory and neuro-fuzzy techniques to rock mass classification is proved to be sufficiently high enough. (author). 17 refs., 5 tabs., 9 figs.

  4. Outdoor altitude stabilization of QuadRotor based on type-2 fuzzy and fuzzy PID

    Science.gov (United States)

    Wicaksono, H.; Yusuf, Y. G.; Kristanto, C.; Haryanto, L.

    2017-11-01

    This paper presents a design of altitude stabilization of QuadRotor based on type-2 fuzzy and fuzzy PID. This practical design is implemented outdoor. Barometric and sonar sensor were used in this experiment as an input for the controller YoHe. The throttle signal as a control input was provided by the controller to leveling QuadRotor in particular altitude and known well as altitude stabilization. The parameter of type-2 fuzzy and fuzzy PID was tuned in several heights to get the best control parameter for any height. Type-2 fuzzy produced better result than fuzzy PID but had a slow response in the beginning.

  5. Instabilities in power law gradient hardening materials

    DEFF Research Database (Denmark)

    Niordson, Christian Frithiof; Tvergaard, Viggo

    2005-01-01

    Tension and compression instabilities are investigated for specimens with dimensions in the micron range. A finite strain generalization of a higher order strain gradient plasticity theory is implemented in a finite element scheme capable of modeling power law hardening materials. Effects...... of gradient hardening are found to delay the onset of localization under plane strain tension, and significantly reduce strain gradients in the localized zone. For plane strain compression gradient hardening is found to increase the load-carrying capacity significantly....

  6. ps-ro Fuzzy Open(Closed Functions and ps-ro Fuzzy Semi-Homeomorphism

    Directory of Open Access Journals (Sweden)

    Pankaj Chettri

    2015-11-01

    Full Text Available The aim of this paper is to introduce and characterize some new class of functions in a fuzzy topological space termed as ps-ro fuzzy open(closed functions, ps-ro fuzzy pre semiopen functions and ps-ro fuzzy semi-homeomorphism. The interrelation among these concepts and also their relations with the parallel existing concepts are established. It is also shown with the help of examples that these newly introduced concepts are independent of the well known existing allied concepts.

  7. Precipitation and Hardening in Magnesium Alloys

    Science.gov (United States)

    Nie, Jian-Feng

    2012-11-01

    Magnesium alloys have received an increasing interest in the past 12 years for potential applications in the automotive, aircraft, aerospace, and electronic industries. Many of these alloys are strong because of solid-state precipitates that are produced by an age-hardening process. Although some strength improvements of existing magnesium alloys have been made and some novel alloys with improved strength have been developed, the strength level that has been achieved so far is still substantially lower than that obtained in counterpart aluminum alloys. Further improvements in the alloy strength require a better understanding of the structure, morphology, orientation of precipitates, effects of precipitate morphology, and orientation on the strengthening and microstructural factors that are important in controlling the nucleation and growth of these precipitates. In this review, precipitation in most precipitation-hardenable magnesium alloys is reviewed, and its relationship with strengthening is examined. It is demonstrated that the precipitation phenomena in these alloys, especially in the very early stage of the precipitation process, are still far from being well understood, and many fundamental issues remain unsolved even after some extensive and concerted efforts made in the past 12 years. The challenges associated with precipitation hardening and age hardening are identified and discussed, and guidelines are outlined for the rational design and development of higher strength, and ultimately ultrahigh strength, magnesium alloys via precipitation hardening.

  8. The microstructural origin of work hardening stages

    DEFF Research Database (Denmark)

    Hughes, D. A.; Hansen, N.

    2018-01-01

    The strain evolution of the flow stress and work hardening rate in stages III and IV is explored by utilizing a fully described deformation microstructure. Extensive measurements by transmission electron microscopy reveal a hierarchical subdivision of grains by low angle incidental dislocation...... addition of the classical Taylor and Hall-Petch formulations. Model predictions agree closely with experimental values of flow stress and work hardening rate in stages III and IV. Strong connections between the evolutionary stages of the deformation microstructure and work hardening rates create a new...... (modern) basis for the classic problem of work hardening in metals and alloys. These connections lead the way for the future development of ultra high strength ductile metals produced via plastic deformation.(c) 2018 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved....

  9. Determination of interrill soil erodibility coefficient based on Fuzzy and Fuzzy-Genetic Systems

    Directory of Open Access Journals (Sweden)

    Habib Palizvan Zand

    2017-02-01

    Full Text Available Introduction: Although the fuzzy logic science has been used successfully in various sudies of hydrology and soil erosion, but in literature review no article was found about its performance for estimating of interrill erodibility. On the other hand, studies indicate that genetic algorithm techniques can be used in fuzzy models and finding the appropriate membership functions for linguistic variables and fuzzy rules. So this study was conducted to develop the fuzzy and fuzzy–genetics models and investigation of their performance in the estimation of soil interrill erodibility factor (Ki. Materials and Methods: For this reason 36 soil samples with different physical and chemical properties were collected from west of Azerbaijan province . soilsamples were also taken from the Ap or A horizon of each soil profile. The samples were air-dried , sieved and Some soil characteristics such as soil texture, organic matter (OM, cation exchange capacity (CEC, sodium adsorption ratio (SAR, EC and pH were determined by the standard laboratory methods. Aggregates size distributions (ASD were determined by the wet-sieving method and fractal dimension of soil aggregates (Dn was also calculated. In order to determination of soil interrill erodibility, the flume experiment performed by packing soil a depth of 0.09-m in 0.5 × 1.0 m. soil was saturated from the base and adjusted to 9% slope and was subjected to at least 90 min rainfall . Rainfall intensity treatments were 20, 37 and 47 mm h-1. During each rainfall event, runoff was collected manually in different time intervals, being less than 60 s at the beginning, up to 15 min near the end of the test. At the end of the experiment, the volumes of runoff samples and the mass of sediment load at each time interval were measured. Finally interrill erodibility values were calculated using Kinnell (11 Equation. Then by statistical analyses Dn and sand percent of the soils were selected as input variables and Ki as

  10. Radiation hardenable coating mixture

    International Nuclear Information System (INIS)

    Howard, D.D.

    1977-01-01

    This invention relates to coatings that harden under radiation and to their compositions. Specifically, this invention concerns unsaturated urethane resins polymerisable by addition and to compositions, hardening under the effect of radiation, containing these resins. These resins feature the presence of at least one unsaturated ethylenic terminal group of structure CH 2 =C and containing the product of the reaction of an organic isocyanate compound with at least two isocyanate groups and one polyester polyol with at least two hydroxyl groups, and one unsaturated monomer compound polymerisable by addition having a single active hydrogen group reacting with the isocyanate [fr

  11. Foundations Of Fuzzy Control

    DEFF Research Database (Denmark)

    Jantzen, Jan

    The objective of this textbook is to acquire an understanding of the behaviour of fuzzy logic controllers. Under certain conditions a fuzzy controller is equivalent to a proportional-integral-derivative (PID) controller. Using that equivalence as a link, the book applies analysis methods from...... linear and nonlinear control theory. In the linear domain, PID tuning methods and stability analyses are transferred to linear fuzzy controllers. The Nyquist plot shows the robustness of different settings of the fuzzy gain parameters. As a result, a fuzzy controller is guaranteed to perform as well...... as any PID controller. In the nonlinear domain, the stability of four standard control surfaces is analysed by means of describing functions and Nyquist plots. The self-organizing controller (SOC) is shown to be a model reference adaptive controller. There is a possibility that a nonlinear fuzzy PID...

  12. Properties of Bipolar Fuzzy Hypergraphs

    OpenAIRE

    Akram, M.; Dudek, W. A.; Sarwar, S.

    2013-01-01

    In this article, we apply the concept of bipolar fuzzy sets to hypergraphs and investigate some properties of bipolar fuzzy hypergraphs. We introduce the notion of $A-$ tempered bipolar fuzzy hypergraphs and present some of their properties. We also present application examples of bipolar fuzzy hypergraphs.

  13. Fatigue hardening and softening studies on strain hardened 18-8 austenitic stainless steel

    International Nuclear Information System (INIS)

    Ramakrishna Prasad, C.; Vasudevan, R.

    1976-01-01

    Metals when subjected to fatigue harden or soften depending on their previous mechanical history. Annealed or mildly cold worked metals are known to harden while severely cold worked metals soften when subjected to fatigue loading. In the present work samples of austenitic 18-8 steel cold worked to 11% and 22% reduction in area were mounted in a vertical pulsator and fatigued in axial tension-compression. Clear cut effects were produced and it was noticed that these depended on the extent of cold work, the amplitude as well as the number of cycles of fatigue and mean stress if any. (orig.) [de

  14. Password Hardened Biometric: A Complete Solution of Online Security

    OpenAIRE

    Ajay Sharma; Deo Brat Ojha

    2013-01-01

    In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security ...

  15. Word Similarity from Dictionaries: Inferring Fuzzy Measures from Fuzzy Graphs

    Directory of Open Access Journals (Sweden)

    Vicenc Torra

    2008-01-01

    Full Text Available WORD SIMILARITY FROM DICTIONARIES: INFERRING FUZZY MEASURES FROM FUZZY GRAPHS The computation of similarities between words is a basic element of information retrieval systems, when retrieval is not solely based on word matching. In this work we consider a measure between words based on dictionaries. This is achieved assuming that a dictionary is formalized as a fuzzy graph. We show that the approach permits to compute measures not only for pairs of words but for sets of them.

  16. Comparison of fuzzy AHP and fuzzy TODIM methods for landfill location selection.

    Science.gov (United States)

    Hanine, Mohamed; Boutkhoum, Omar; Tikniouine, Abdessadek; Agouti, Tarik

    2016-01-01

    Landfill location selection is a multi-criteria decision problem and has a strategic importance for many regions. The conventional methods for landfill location selection are insufficient in dealing with the vague or imprecise nature of linguistic assessment. To resolve this problem, fuzzy multi-criteria decision-making methods are proposed. The aim of this paper is to use fuzzy TODIM (the acronym for Interactive and Multi-criteria Decision Making in Portuguese) and the fuzzy analytic hierarchy process (AHP) methods for the selection of landfill location. The proposed methods have been applied to a landfill location selection problem in the region of Casablanca, Morocco. After determining the criteria affecting the landfill location decisions, fuzzy TODIM and fuzzy AHP methods are applied to the problem and results are presented. The comparisons of these two methods are also discussed.

  17. (Fuzzy) Ideals of BN-Algebras

    Science.gov (United States)

    Walendziak, Andrzej

    2015-01-01

    The notions of an ideal and a fuzzy ideal in BN-algebras are introduced. The properties and characterizations of them are investigated. The concepts of normal ideals and normal congruences of a BN-algebra are also studied, the properties of them are displayed, and a one-to-one correspondence between them is presented. Conditions for a fuzzy set to be a fuzzy ideal are given. The relationships between ideals and fuzzy ideals of a BN-algebra are established. The homomorphic properties of fuzzy ideals of a BN-algebra are provided. Finally, characterizations of Noetherian BN-algebras and Artinian BN-algebras via fuzzy ideals are obtained. PMID:26125050

  18. An Application of Fuzzy Inference System by Clustering Subtractive Fuzzy Method for Estimating of Product Requirement

    Directory of Open Access Journals (Sweden)

    Fajar Ibnu Tufeil

    2009-06-01

    Full Text Available Model fuzzy memiliki kemampuan untuk menjelaskan secara linguistik suatu sistem yang terlalu kompleks. Aturan-aturan dalam model fuzzy pada umumnya dibangun berdasarkan keahlian manusia dan pengetahuan heuristik dari sistem yang dimodelkan. Teknik ini selanjutnya dikembangkan menjadi teknik yang dapat mengidentifikasi aturan-aturan dari suatu basis data yang telah dikelompokkan berdasarkan persamaan strukturnya. Dalam hal ini metode pengelompokan fuzzy berfungsi untuk mencari kelompok-kelompok data. Informasi yang dihasilkan dari metode pengelompokan ini, yaitu informasi tentang pusat kelompok, digunakan untuk membentuk aturan-aturan dalam sistem penalaran fuzzy. Dalam skripsi ini dibahas mengenai penerapan fuzzy infereance system dengan metode pengelompokan fuzzy subtractive clustering, yaitu untuk membentuk sistem penalaran fuzzy dengan menggunakan model fuzzy Takagi-Sugeno orde satu. Selanjutnya, metode pengelompokan fuzzy subtractive clustering diterapkan dalam memodelkan masalah dibidang pemasaran, yaitu untuk memprediksi permintaan pasar terhadap suatu produk susu. Aplikasi ini dibangun menggunakan Borland Delphi 6.0. Dari hasil pengujian diperoleh tingkat error prediksi terkecil yaitu dengan Error Average 0.08%.

  19. A review of the stages of work hardening

    Energy Technology Data Exchange (ETDEWEB)

    Rollett, A.D.; Kocks, U.F.

    1993-07-01

    Stages of work hardening are reviewed with emphasis on links between each stage. Simple quantitative descriptions are given for each stage. Similarities between stage I, easy glide, and stage IV, large strain hardening, are pointed out both in terms of magnitude of the hardening rate and of the underlying mechanism of dislocation debris accumulation. Stage II is described as an athermal hardening stage that occurs when statistical variations in the dislocation ``forest`` lead to geometrical storage of dislocations. The steadily decreasing hardening rate observed in stage III is characterized by the increasing rate of loss of dislocation density due to dynamic recovery. Stage III appears to have an asymptote to a saturation stress which is determined by the characteristics of the dislocation tangles, or cell walls. The imperfect nature of the dynamic recovery process, however, leads to the accumulation of dislocation debris and this, by analogy with stage 1, causes the apparent saturation stress to rise, thus causing stage IV.

  20. Fuzzy control and identification

    CERN Document Server

    Lilly, John H

    2010-01-01

    This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering systems with unknown models. Finally, fuzzy modeling and control methods are combined in the book, to create adaptive fuzzy controllers, ending with an example of an obstacle-avoidance controller for an autonomous vehicle using modus ponendo tollens logic.

  1. Fuzzy pharmacology: theory and applications.

    Science.gov (United States)

    Sproule, Beth A; Naranjo, Claudio A; Türksen, I Burhan

    2002-09-01

    Fuzzy pharmacology is a term coined to represent the application of fuzzy logic and fuzzy set theory to pharmacological problems. Fuzzy logic is the science of reasoning, thinking and inference that recognizes and uses the real world phenomenon that everything is a matter of degree. It is an extension of binary logic that is able to deal with complex systems because it does not require crisp definitions and distinctions for the system components. In pharmacology, fuzzy modeling has been used for the mechanical control of drug delivery in surgical settings, and work has begun evaluating its use in other pharmacokinetic and pharmacodynamic applications. Fuzzy pharmacology is an emerging field that, based on these initial explorations, warrants further investigation.

  2. Radiation-hardened bulk Si-gate CMOS microprocessor family

    International Nuclear Information System (INIS)

    Stricker, R.E.; Dingwall, A.G.F.; Cohen, S.; Adams, J.R.; Slemmer, W.C.

    1979-01-01

    RCA and Sandia Laboratories jointly developed a radiation-hardened bulk Si-gate CMOS technology which is used to fabricate the CDP-1800 series microprocessor family. Total dose hardness of 1 x 10 6 rads (Si) and transient upset hardness of 5 x 10 8 rads (Si)/sec with no latch up at any transient level was achieved. Radiation-hardened parts manufactured to date include the CDP-1802 microprocessor, the CDP-1834 ROM, the CDP-1852 8-bit I/O port, the CDP-1856 N-bit 1 of 8 decoder, and the TCC-244 256 x 4 Static RAM. The paper is divided into three parts. In the first section, the basic fundamentals of the non-hardened C 2 L technology used for the CDP-1800 series microprocessor parts is discussed along with the primary reasons for hardening this technology. The second section discusses the major changes in the fabrication sequence that are required to produce radiation-hardened devices. The final section details the electrical performance characteristics of the hardened devices as well as the effects of radiation on device performance. Also included in this section is a discussion of the TCC-244 256 x 4 Static RAM designed jointly by RCA and Sandia Laboratories for this application

  3. Fuzzy data analysis

    CERN Document Server

    Bandemer, Hans

    1992-01-01

    Fuzzy data such as marks, scores, verbal evaluations, imprecise observations, experts' opinions and grey tone pictures, are quite common. In Fuzzy Data Analysis the authors collect their recent results providing the reader with ideas, approaches and methods for processing such data when looking for sub-structures in knowledge bases for an evaluation of functional relationship, e.g. in order to specify diagnostic or control systems. The modelling presented uses ideas from fuzzy set theory and the suggested methods solve problems usually tackled by data analysis if the data are real numbers. Fuzzy Data Analysis is self-contained and is addressed to mathematicians oriented towards applications and to practitioners in any field of application who have some background in mathematics and statistics.

  4. Compound Option Pricing under Fuzzy Environment

    Directory of Open Access Journals (Sweden)

    Xiandong Wang

    2014-01-01

    Full Text Available Considering the uncertainty of a financial market includes two aspects: risk and vagueness; in this paper, fuzzy sets theory is applied to model the imprecise input parameters (interest rate and volatility. We present the fuzzy price of compound option by fuzzing the interest and volatility in Geske’s compound option pricing formula. For each α, the α-level set of fuzzy prices is obtained according to the fuzzy arithmetics and the definition of fuzzy-valued function. We apply a defuzzification method based on crisp possibilistic mean values of the fuzzy interest rate and fuzzy volatility to obtain the crisp possibilistic mean value of compound option price. Finally, we present a numerical analysis to illustrate the compound option pricing under fuzzy environment.

  5. Fuzzy measures and integrals

    Czech Academy of Sciences Publication Activity Database

    Mesiar, Radko

    2005-01-01

    Roč. 28, č. 156 (2005), s. 365-370 ISSN 0165-0114 R&D Projects: GA ČR(CZ) GA402/04/1026 Institutional research plan: CEZ:AV0Z10750506 Keywords : fuzzy measures * fuzzy integral * regular fuzzy integral Subject RIV: BA - General Mathematics Impact factor: 1.039, year: 2005

  6. Fuzzy Control Tutorial

    DEFF Research Database (Denmark)

    Dotoli, M.; Jantzen, Jan

    1999-01-01

    The tutorial concerns automatic control of an inverted pendulum, especially rule based control by means of fuzzy logic. A ball balancer, implemented in a software simulator in Matlab, is used as a practical case study. The objectives of the tutorial are to teach the basics of fuzzy control......, and to show how to apply fuzzy logic in automatic control. The tutorial is distance learning, where students interact one-to-one with the teacher using e-mail....

  7. Pemodelan Sistem Fuzzy Dengan Menggunakan Matlab

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2010-12-01

    Full Text Available Fuzzy logic is a method in soft computing category, a method that could process uncertain, inaccurate, and less cost implemented data. Some methods in soft computing category besides fuzzy logic are artificial network nerve, probabilistic reasoning, and evolutionary computing. Fuzzy logic has the ability to develop fuzzy system that is intelligent system in uncertain environment. Some stages in fuzzy system formation process is input and output analysis, determining input and output variable, defining each fuzzy set member function, determining rules based on experience or knowledge of an expert in his field, and implementing fuzzy system. Overall, fuzzy logic uses simple mathematical concept, understandable, detectable uncertain and accurate data. Fuzzy system could create and apply expert experiences directly without exercise process and effort to decode the knowledge into a computer until becoming a modeling system that could be relied on decision making.

  8. Integrating Fuzzy AHP and Fuzzy ARAS for evaluating financial performance

    Directory of Open Access Journals (Sweden)

    Abdolhamid Safaei Ghadikolaei

    2014-09-01

    Full Text Available Multi Criteria Decision Making (MCDM is an advanced field of Operation Research; recently MCDM methods are efficient and common tools for performance evaluation in many areas such as finance and economy. The aim of this study is to show one of applications of mathematics in real word. This study with considering value based measures and accounting based measures simultaneously, provided a hybrid approach of MCDM methods in fuzzy environment for financial performance evaluation of automotive and parts manufacturing industry of Tehran stock exchange (TSE.for this purpose Fuzzy analytic hierarchy process (FAHP is applied to determine the relative important of each criterion, then The companies are ranked according their financial performance by using fuzzy additive ratio assessment (Fuzzy ARAS method. The finding of this study showed effective of this approach in evaluating financial performance.

  9. Fuzzy Graph Language Recognizability

    OpenAIRE

    Kalampakas , Antonios; Spartalis , Stefanos; Iliadis , Lazaros

    2012-01-01

    Part 5: Fuzzy Logic; International audience; Fuzzy graph language recognizability is introduced along the lines of the established theory of syntactic graph language recognizability by virtue of the algebraic structure of magmoids. The main closure properties of the corresponding class are investigated and several interesting examples of fuzzy graph languages are examined.

  10. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.12 What security controls must I use for identification codes and passwords? If you use electronic signatures based upon use...

  11. Safety critical application of fuzzy control

    International Nuclear Information System (INIS)

    Schildt, G.H.

    1995-01-01

    After an introduction into safety terms a short description of fuzzy logic will be given. Especially, for safety critical applications of fuzzy controllers a possible controller structure will be described. The following items will be discussed: Configuration of fuzzy controllers, design aspects like fuzzfiication, inference strategies, defuzzification and types of membership functions. As an example a typical fuzzy rule set will be presented. Especially, real-time behaviour a fuzzy controllers is mentioned. An example of fuzzy controlling for temperature control purpose within a nuclear reactor together with membership functions and inference strategy of such a fuzzy controller will be presented. (author). 4 refs, 17 figs

  12. Radiation protection and fuzzy set theory

    International Nuclear Information System (INIS)

    Nishiwaki, Y.

    1993-01-01

    In radiation protection we encounter a variety of sources of uncertainties which are due to fuzziness in our cognition or perception of objects. For systematic treatment of this type of uncertainty, the concepts of fuzzy sets or fuzzy measures could be applied to construct system models, which may take into consideration both subjective or intrinsic fuzziness and objective or extrinsic fuzziness. The theory of fuzzy sets and fuzzy measures is still in a developing stage, but its concept may be applied to various problems of subjective perception of risk, nuclear safety, radiation protection and also to the problems of man-machine interface and human factor engineering or ergonomic

  13. Investigation of a Hardened Cement Paste Grout

    DEFF Research Database (Denmark)

    Esteves, Luis Pedro; Sørensen, Eigil Verner

    This report documents a series of tests performed on a hardened cement paste grout delivered by the client, Det Norske Veritas A/S.......This report documents a series of tests performed on a hardened cement paste grout delivered by the client, Det Norske Veritas A/S....

  14. Fuzziness and fuzzy modelling in Bulgaria's energy policy decision-making dilemma

    International Nuclear Information System (INIS)

    Wang Xingquan

    2006-01-01

    The decision complexity resulting from imprecision in decision variables and parameters, a major difficulty for conventional decision analysis methods, can be relevantly analysed and modelled by fuzzy logic. Bulgaria's nuclear policy decision-making process implicates such complexity of imprecise nature: stakeholders, criteria, measurement, etc. Given the suitable applicability of fuzzy logic in this case, this article tries to offer a concrete fuzzy paradigm including delimitation of decision space, quantification of imprecise variables, and, of course, parameterisation. (author)

  15. Fuzzy combination of fuzzy and switching state-feedback controllers for nonlinear systems subject to parameter uncertainties.

    Science.gov (United States)

    Lam, H K; Leung, Frank H F

    2005-04-01

    This paper presents a fuzzy controller, which involves a fuzzy combination of local fuzzy and global switching state-feedback controllers, for nonlinear systems subject to parameter uncertainties with known bounds. The nonlinear system is represented by a fuzzy combined Takagi-Sugeno-Kang model, which is a fuzzy combination of the global and local fuzzy plant models. By combining the local fuzzy and global switching state-feedback controllers using fuzzy logic techniques, the advantages of both controllers can be retained and the undesirable chattering effect introduced by the global switching state-feedback controller can be eliminated. The steady-state error introduced by the global switching state-feedback controller when a saturation function is used can also be removed. Stability conditions, which are related to the system matrices of the local and global closed-loop systems, are derived to guarantee the closed-loop system stability. An application example will be given to demonstrate the merits of the proposed approach.

  16. [Predicting Incidence of Hepatitis E in Chinausing Fuzzy Time Series Based on Fuzzy C-Means Clustering Analysis].

    Science.gov (United States)

    Luo, Yi; Zhang, Tao; Li, Xiao-song

    2016-05-01

    To explore the application of fuzzy time series model based on fuzzy c-means clustering in forecasting monthly incidence of Hepatitis E in mainland China. Apredictive model (fuzzy time series method based on fuzzy c-means clustering) was developed using Hepatitis E incidence data in mainland China between January 2004 and July 2014. The incidence datafrom August 2014 to November 2014 were used to test the fitness of the predictive model. The forecasting results were compared with those resulted from traditional fuzzy time series models. The fuzzy time series model based on fuzzy c-means clustering had 0.001 1 mean squared error (MSE) of fitting and 6.977 5 x 10⁻⁴ MSE of forecasting, compared with 0.0017 and 0.0014 from the traditional forecasting model. The results indicate that the fuzzy time series model based on fuzzy c-means clustering has a better performance in forecasting incidence of Hepatitis E.

  17. The foundations of fuzzy control

    CERN Document Server

    Lewis, Harold W

    1997-01-01

    Harold Lewis applied a cross-disciplinary approach in his highly accessible discussion of fuzzy control concepts. With the aid of fifty-seven illustrations, he thoroughly presents a unique mathematical formalism to explain the workings of the fuzzy inference engine and a novel test plant used in the research. Additionally, the text posits a new viewpoint on why fuzzy control is more popular in some countries than in others. A direct and original view of Japanese thinking on fuzzy control methods, based on the author's personal knowledge of - and association with - Japanese fuzzy research, is also included.

  18. Introduction to fuzzy logic using Matlab

    CERN Document Server

    Sivanandam, SN; Deepa, S N

    2006-01-01

    Fuzzy Logic, at present is a hot topic, among academicians as well various programmers. This book is provided to give a broad, in-depth overview of the field of Fuzzy Logic. The basic principles of Fuzzy Logic are discussed in detail with various solved examples. The different approaches and solutions to the problems given in the book are well balanced and pertinent to the Fuzzy Logic research projects. The applications of Fuzzy Logic are also dealt to make the readers understand the concept of Fuzzy Logic. The solutions to the problems are programmed using MATLAB 6.0 and the simulated results are given. The MATLAB Fuzzy Logic toolbox is provided for easy reference.

  19. Numerical and experimental comparison of plastic work-hardening rules

    International Nuclear Information System (INIS)

    Haisler, W.E.

    1977-01-01

    The purpose of this paper is to describe recent numerical and experimental correlation studies of several plastic work-hardening rules. The mechanical sublayer model and the combined kinematic-isotropic hardening rules are examined and the numerical results for several structural geometries are compared to experimental results. Both monotonic and cyclic loads are considered. The governing incremental plasticity relations are developed for both work-hardening models. The combined kinematic-isotropic hardening model is developed in terms of a ratio γ which controls the relative contribution of kinematic hardening (yield surface translation) and isotropic hardening (yield surface expansion). In addition to making use of a uniaxial stress-strain curve as input data, the model allows for the input of a yield surface size vs. uniaxial plastic strain curve obtained from a cyclic uniaxial reverse loading test. The mechanical sublayer model is developed in general form and a new method for determining the sublayer parameters (stress weighting factors and yield stresses) is presented. It is demonstrated that former procedures used to obtain the sublayer parameters are inconsistent for multiaxial loading. Numerical and experimental results are presented for a cylinder, circular plate with punch, and a steel pressure vessel. The numerical results are obtained with the computer program AGGIE I. The comparison study indicates that reasonable agreement is obtained with both hardening models; the choice depending upon whether the loading is monotonic or cyclic

  20. A Fuzzy Query Mechanism for Human Resource Websites

    Science.gov (United States)

    Lai, Lien-Fu; Wu, Chao-Chin; Huang, Liang-Tsung; Kuo, Jung-Chih

    Users' preferences often contain imprecision and uncertainty that are difficult for traditional human resource websites to deal with. In this paper, we apply the fuzzy logic theory to develop a fuzzy query mechanism for human resource websites. First, a storing mechanism is proposed to store fuzzy data into conventional database management systems without modifying DBMS models. Second, a fuzzy query language is proposed for users to make fuzzy queries on fuzzy databases. User's fuzzy requirement can be expressed by a fuzzy query which consists of a set of fuzzy conditions. Third, each fuzzy condition associates with a fuzzy importance to differentiate between fuzzy conditions according to their degrees of importance. Fourth, the fuzzy weighted average is utilized to aggregate all fuzzy conditions based on their degrees of importance and degrees of matching. Through the mutual compensation of all fuzzy conditions, the ordering of query results can be obtained according to user's preference.

  1. Fuzzy Rough Ring and Its Prop erties

    Institute of Scientific and Technical Information of China (English)

    REN Bi-jun; FU Yan-ling

    2013-01-01

    This paper is devoted to the theories of fuzzy rough ring and its properties. The fuzzy approximation space generated by fuzzy ideals and the fuzzy rough approximation operators were proposed in the frame of fuzzy rough set model. The basic properties of fuzzy rough approximation operators were analyzed and the consistency between approximation operators and the binary operation of ring was discussed.

  2. CHARACTERIZATIONS OF FUZZY SOFT PRE SEPARATION AXIOMS

    OpenAIRE

    El-Latif, Alaa Mohamed Abd

    2015-01-01

    − The notions of fuzzy pre open soft sets and fuzzy pre closed soft sets were introducedby Abd El-latif et al. [2]. In this paper, we continue the study on fuzzy soft topological spaces andinvestigate the properties of fuzzy pre open soft sets, fuzzy pre closed soft sets and study variousproperties and notions related to these structures. In particular, we study the relationship betweenfuzzy pre soft interior fuzzy pre soft closure. Moreover, we study the properties of fuzzy soft pre regulars...

  3. Fuzzy Constraint-Based Agent Negotiation

    Institute of Scientific and Technical Information of China (English)

    Menq-Wen Lin; K. Robert Lai; Ting-Jung Yu

    2005-01-01

    Conflicts between two or more parties arise for various reasons and perspectives. Thus, resolution of conflicts frequently relies on some form of negotiation. This paper presents a general problem-solving framework for modeling multi-issue multilateral negotiation using fuzzy constraints. Agent negotiation is formulated as a distributed fuzzy constraint satisfaction problem (DFCSP). Fuzzy constrains are thus used to naturally represent each agent's desires involving imprecision and human conceptualization, particularly when lexical imprecision and subjective matters are concerned. On the other hand, based on fuzzy constraint-based problem-solving, our approach enables an agent not only to systematically relax fuzzy constraints to generate a proposal, but also to employ fuzzy similarity to select the alternative that is subject to its acceptability by the opponents. This task of problem-solving is to reach an agreement that benefits all agents with a high satisfaction degree of fuzzy constraints, and move towards the deal more quickly since their search focuses only on the feasible solution space. An application to multilateral negotiation of a travel planning is provided to demonstrate the usefulness and effectiveness of our framework.

  4. Multi-dimensional Fuzzy Euler Approximation

    Directory of Open Access Journals (Sweden)

    Yangyang Hao

    2017-05-01

    Full Text Available Multi-dimensional Fuzzy differential equations driven by multi-dimen-sional Liu process, have been intensively applied in many fields. However, we can not obtain the analytic solution of every multi-dimensional fuzzy differential equation. Then, it is necessary for us to discuss the numerical results in most situations. This paper focuses on the numerical method of multi-dimensional fuzzy differential equations. The multi-dimensional fuzzy Taylor expansion is given, based on this expansion, a numerical method which is designed for giving the solution of multi-dimensional fuzzy differential equation via multi-dimensional Euler method will be presented, and its local convergence also will be discussed.

  5. Fuzzy Control Teaching Models

    Directory of Open Access Journals (Sweden)

    Klaus-Dietrich Kramer

    2016-05-01

    Full Text Available Many degree courses at technical universities include the subject of control systems engineering. As an addition to conventional approaches Fuzzy Control can be used to easily find control solutions for systems, even if they include nonlinearities. To support further educational training, models which represent a technical system to be controlled are required. These models have to represent the system in a transparent and easy cognizable manner. Furthermore, a programming tool is required that supports an easy Fuzzy Control development process, including the option to verify the results and tune the system behavior. In order to support the development process a graphical user interface is needed to display the fuzzy terms under real time conditions, especially with a debug system and trace functionality. The experiences with such a programming tool, the Fuzzy Control Design Tool (FHFCE Tool, and four fuzzy teaching models will be presented in this paper. The methodical and didactical objective in the utilization of these teaching models is to develop solution strategies using Computational Intelligence (CI applications for Fuzzy Controllers in order to analyze different algorithms of inference or defuzzyfication and to verify and tune those systems efficiently.

  6. Fuzzy statistical decision-making theory and applications

    CERN Document Server

    Kabak, Özgür

    2016-01-01

    This book offers a comprehensive reference guide to fuzzy statistics and fuzzy decision-making techniques. It provides readers with all the necessary tools for making statistical inference in the case of incomplete information or insufficient data, where classical statistics cannot be applied. The respective chapters, written by prominent researchers, explain a wealth of both basic and advanced concepts including: fuzzy probability distributions, fuzzy frequency distributions, fuzzy Bayesian inference, fuzzy mean, mode and median, fuzzy dispersion, fuzzy p-value, and many others. To foster a better understanding, all the chapters include relevant numerical examples or case studies. Taken together, they form an excellent reference guide for researchers, lecturers and postgraduate students pursuing research on fuzzy statistics. Moreover, by extending all the main aspects of classical statistical decision-making to its fuzzy counterpart, the book presents a dynamic snapshot of the field that is expected to stimu...

  7. COMPLEX SURFACE HARDENING OF STEEL ARTICLES

    Directory of Open Access Journals (Sweden)

    A. V. Kovalchuk

    2014-01-01

    Full Text Available The method of complex surface hardening of steel detailswas designed. The method is a compound of two processes of hardening: chemical heat treatment and physical vapor deposition (PVD of the coating. The result, achieved in this study is much higher, than in other work on this topic and is cumulative. The method designed can be used in mechanical engineering, medicine, energetics and is perspective for military and space technologies.

  8. Radiation-hardened control system

    International Nuclear Information System (INIS)

    Vandermolen, R.I.; Smith, S.F.; Emery, M.S.

    1993-01-01

    A radiation-hardened bit-slice control system with associated input/output circuits was developed to prove that programmable circuits could be constructed to successfully implement intelligent functions in a highly radioactive environment. The goal for this effort was to design and test a programmable control system that could withstand a minimum total dose of 10 7 rads (gamma). The Radiation Hardened Control System (RHCS) was tested in operation at a dose rate that ranged up to 135 krad/h, with an average total dose of 10.75 Mrads. Further testing beyond the required 10 7 rads was also conducted. RHCS performed properly through the target dose of 10 7 rads, and sporadic intermittent failures in some programmable logic devices were noted after ∼ 13 Mrads

  9. Fuzzy Clustering Methods and their Application to Fuzzy Modeling

    DEFF Research Database (Denmark)

    Kroszynski, Uri; Zhou, Jianjun

    1999-01-01

    Fuzzy modeling techniques based upon the analysis of measured input/output data sets result in a set of rules that allow to predict system outputs from given inputs. Fuzzy clustering methods for system modeling and identification result in relatively small rule-bases, allowing fast, yet accurate....... An illustrative synthetic example is analyzed, and prediction accuracy measures are compared between the different variants...

  10. A computationally efficient fuzzy control s

    Directory of Open Access Journals (Sweden)

    Abdel Badie Sharkawy

    2013-12-01

    Full Text Available This paper develops a decentralized fuzzy control scheme for MIMO nonlinear second order systems with application to robot manipulators via a combination of genetic algorithms (GAs and fuzzy systems. The controller for each degree of freedom (DOF consists of a feedforward fuzzy torque computing system and a feedback fuzzy PD system. The feedforward fuzzy system is trained and optimized off-line using GAs, whereas not only the parameters but also the structure of the fuzzy system is optimized. The feedback fuzzy PD system, on the other hand, is used to keep the closed-loop stable. The rule base consists of only four rules per each DOF. Furthermore, the fuzzy feedback system is decentralized and simplified leading to a computationally efficient control scheme. The proposed control scheme has the following advantages: (1 it needs no exact dynamics of the system and the computation is time-saving because of the simple structure of the fuzzy systems and (2 the controller is robust against various parameters and payload uncertainties. The computational complexity of the proposed control scheme has been analyzed and compared with previous works. Computer simulations show that this controller is effective in achieving the control goals.

  11. Shapley's value for fuzzy games

    Directory of Open Access Journals (Sweden)

    Raúl Alvarado Sibaja

    2009-02-01

    Full Text Available This is the continuation of a previous article titled "Fuzzy Games", where I defined a new type of games based on the Multilinear extensions f, of characteristic functions and most of standard theorems for cooperative games also hold for this new type of games: The fuzzy games. Now we give some other properties and the extension of the definition of Shapley¨s Value for Fuzzy Games Keywords: game theory, fuzzy sets, multiattribute decisions.

  12. FFLP problem with symmetric trapezoidal fuzzy numbers

    Directory of Open Access Journals (Sweden)

    Reza Daneshrad

    2015-04-01

    Full Text Available The most popular approach for solving fully fuzzy linear programming (FFLP problems is to convert them into the corresponding deterministic linear programs. Khan et al. (2013 [Khan, I. U., Ahmad, T., & Maan, N. (2013. A simplified novel technique for solving fully fuzzy linear programming problems. Journal of Optimization Theory and Applications, 159(2, 536-546.] claimed that there had been no method in the literature to find the fuzzy optimal solution of a FFLP problem without converting it into crisp linear programming problem, and proposed a technique for the same. Others showed that the fuzzy arithmetic operation used by Khan et al. (2013 had some problems in subtraction and division operations, which could lead to misleading results. Recently, Ezzati et al. (2014 [Ezzati, R., Khorram, E., & Enayati, R. (2014. A particular simplex algorithm to solve fuzzy lexicographic multi-objective linear programming problems and their sensitivity analysis on the priority of the fuzzy objective functions. Journal of Intelligent and Fuzzy Systems, 26(5, 2333-2358.] defined a new operation on symmetric trapezoidal fuzzy numbers and proposed a new algorithm to find directly a lexicographic/preemptive fuzzy optimal solution of a fuzzy lexicographic multi-objective linear programming problem by using new fuzzy arithmetic operations, but their model was not fully fuzzy optimization. In this paper, a new method, by using Ezzati et al. (2014’s fuzzy arithmetic operation and a fuzzy version of simplex algorithm, is proposed for solving FFLP problem whose parameters are represented by symmetric trapezoidal fuzzy number without converting the given problem into crisp equivalent problem. By using the proposed method, the fuzzy optimal solution of FFLP problem can be easily obtained. A numerical example is provided to illustrate the proposed method.

  13. Hardening of niobium alloys at precrystallization annealing

    International Nuclear Information System (INIS)

    Vasil'eva, E.V.; Pustovalov, V.A.

    1989-01-01

    Niobium base alloys were investigated. It is shown that precrystallization annealing of niobium-molybdenum, niobium-vanadium and niobium-zirconium alloys elevates much more sufficiently their resistance to microplastic strains, than to macroplastic strains. Hardening effect differs sufficiently for different alloys. The maximal hardening is observed for niobium-vanadium alloys, the minimal one - for niobium-zirconium alloys

  14. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  15. Effectiveness of Securities with Fuzzy Probabilistic Return

    Directory of Open Access Journals (Sweden)

    Krzysztof Piasecki

    2011-01-01

    Full Text Available The generalized fuzzy present value of a security is defined here as fuzzy valued utility of cash flow. The generalized fuzzy present value cannot depend on the value of future cash flow. There exists such a generalized fuzzy present value which is not a fuzzy present value in the sense given by some authors. If the present value is a fuzzy number and the future value is a random one, then the return rate is given as a probabilistic fuzzy subset on a real line. This kind of return rate is called a fuzzy probabilistic return. The main goal of this paper is to derive the family of effective securities with fuzzy probabilistic return. Achieving this goal requires the study of the basic parameters characterizing fuzzy probabilistic return. Therefore, fuzzy expected value and variance are determined for this case of return. These results are a starting point for constructing a three-dimensional image. The set of effective securities is introduced as the Pareto optimal set determined by the maximization of the expected return rate and minimization of the variance. Finally, the set of effective securities is distinguished as a fuzzy set. These results are obtained without the assumption that the distribution of future values is Gaussian. (original abstract

  16. Application of fuzzy logic to social choice theory

    CERN Document Server

    Mordeson, John N; Clark, Terry D

    2015-01-01

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice theory.The book explains the concept of a fuzzy maximal subset of a set of alternatives, fuzzy choice functions, the factorization of a fuzzy preference relation into the ""union"" (conorm) of a strict fuzzy relation and an indifference operator, fuzzy non-Arrowian results, fuzzy versions of Arrow's

  17. Implementation of Steiner point of fuzzy set.

    Science.gov (United States)

    Liang, Jiuzhen; Wang, Dejiang

    2014-01-01

    This paper deals with the implementation of Steiner point of fuzzy set. Some definitions and properties of Steiner point are investigated and extended to fuzzy set. This paper focuses on establishing efficient methods to compute Steiner point of fuzzy set. Two strategies of computing Steiner point of fuzzy set are proposed. One is called linear combination of Steiner points computed by a series of crisp α-cut sets of the fuzzy set. The other is an approximate method, which is trying to find the optimal α-cut set approaching the fuzzy set. Stability analysis of Steiner point of fuzzy set is also studied. Some experiments on image processing are given, in which the two methods are applied for implementing Steiner point of fuzzy image, and both strategies show their own advantages in computing Steiner point of fuzzy set.

  18. On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System

    Directory of Open Access Journals (Sweden)

    JuanM. Medina

    2012-08-01

    Full Text Available This paper proposes a parameterized definition for fuzzy comparators on complex fuzzy datatypes like fuzzy collections with conjunctive semantics and fuzzy objects. This definition and its implementation on a Fuzzy Object-Relational Database Management System (FORDBMS provides the designer with a powerful tool to adapt the behavior of these operators to the semantics of the considered application.

  19. Metamathematics of fuzzy logic

    CERN Document Server

    Hájek, Petr

    1998-01-01

    This book presents a systematic treatment of deductive aspects and structures of fuzzy logic understood as many valued logic sui generis. Some important systems of real-valued propositional and predicate calculus are defined and investigated. The aim is to show that fuzzy logic as a logic of imprecise (vague) propositions does have well-developed formal foundations and that most things usually named `fuzzy inference' can be naturally understood as logical deduction.

  20. Comparison between genetic fuzzy system and neuro fuzzy system to select oil wells for hydraulic fracturing; Comparacao entre genetic fuzzy system e neuro fuzzy system para selecao de pocos de petroleo para fraturamento hidraulico

    Energy Technology Data Exchange (ETDEWEB)

    Castro, Antonio Orestes de Salvo [PETROBRAS, Rio de Janeiro, RJ (Brazil); Ferreira Filho, Virgilio Jose Martins [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil)

    2004-07-01

    The hydraulic fracture operation is wide used to increase the oil wells production and to reduce formation damage. Reservoir studies and engineer analysis are made to select the wells for this kind of operation. As the reservoir parameters have some diffuses characteristics, Fuzzy Inference Systems (SIF) have been tested for this selection processes in the last few years. This paper compares the performance of a neuro fuzzy system and a genetic fuzzy system used for hydraulic Fracture well selection, with knowledge acquisition from an operational data base to set the SIF membership functions. The training data and the validation data used were the same for both systems. We concluded that, in despite of the genetic fuzzy system would be a younger process, it got better results than the neuro fuzzy system. Another conclusion was that, as the genetic fuzzy system can work with constraints, the membership functions setting kept the consistency of variables linguistic values. (author)

  1. Construction of fuzzy automata by fuzzy experiments

    International Nuclear Information System (INIS)

    Mironov, A.

    1994-01-01

    The solving the problem of canonical realization of partial reaction morphisms (PRM) for automata in toposes and fuzzy automata is addressed. This problem extends the optimal construction problem for finite deterministic automata by experiments. In the present paper the conception of canonical realization of PRM for automata in toposes is introduced and the sufficient conditions for the existence of canonical realizations for PRM in toposes are presented. As a consequence of this result the existence of canonical realizations for PRM in the category of fuzzy sets over arbitrary complete chain is proven

  2. Construction of fuzzy automata by fuzzy experiments

    Energy Technology Data Exchange (ETDEWEB)

    Mironov, A [Moscow Univ. (Russian Federation). Dept. of Mathematics and Computer Science

    1994-12-31

    The solving the problem of canonical realization of partial reaction morphisms (PRM) for automata in toposes and fuzzy automata is addressed. This problem extends the optimal construction problem for finite deterministic automata by experiments. In the present paper the conception of canonical realization of PRM for automata in toposes is introduced and the sufficient conditions for the existence of canonical realizations for PRM in toposes are presented. As a consequence of this result the existence of canonical realizations for PRM in the category of fuzzy sets over arbitrary complete chain is proven.

  3. Image matching navigation based on fuzzy information

    Institute of Scientific and Technical Information of China (English)

    田玉龙; 吴伟仁; 田金文; 柳健

    2003-01-01

    In conventional image matching methods, the image matching process is mostly based on image statistic information. One aspect neglected by all these methods is that there is much fuzzy information contained in these images. A new fuzzy matching algorithm based on fuzzy similarity for navigation is presented in this paper. Because the fuzzy theory is of the ability of making good description of the fuzzy information contained in images, the image matching method based on fuzzy similarity would look forward to producing good performance results. Experimental results using matching algorithm based on fuzzy information also demonstrate its reliability and practicability.

  4. Fuzzy Entropy: Axiomatic Definition and Neural Networks Model

    Institute of Scientific and Technical Information of China (English)

    QINGMing; CAOYue; HUANGTian-min

    2004-01-01

    The measure of uncertainty is adopted as a measure of information. The measures of fuzziness are known as fuzzy information measures. The measure of a quantity of fuzzy information gained from a fuzzy set or fuzzy system is known as fuzzy entropy. Fuzzy entropy has been focused and studied by many researchers in various fields. In this paper, firstly, the axiomatic definition of fuzzy entropy is discussed. Then, neural networks model of fuzzy entropy is proposed, based on the computing capability of neural networks. In the end, two examples are discussed to show the efficiency of the model.

  5. On Intuitionistic Fuzzy Context-Free Languages

    Directory of Open Access Journals (Sweden)

    Jianhua Jin

    2013-01-01

    automata theory. Additionally, we introduce the concepts of Chomsky normal form grammar (IFCNF and Greibach normal form grammar (IFGNF based on intuitionistic fuzzy sets. The results of our study indicate that intuitionistic fuzzy context-free languages generated by IFCFGs are equivalent to those generated by IFGNFs and IFCNFs, respectively, and they are also equivalent to intuitionistic fuzzy recognizable step functions. Then some operations on the family of intuitionistic fuzzy context-free languages are discussed. Finally, pumping lemma for intuitionistic fuzzy context-free languages is investigated.

  6. Hardening device, by inserts, of electronic component against radiation

    International Nuclear Information System (INIS)

    Val, C.

    1987-01-01

    The hardening device includes at least two materials, one with high atomic number with respect to the other. One of these materials is set as inserts in a layer of the other material. The hardening device is then made by stacking of such layers, the insert density varying from one layer to the other, making thus vary the atomic number resulting from the hardening device along its thickness, following a predefined law [fr

  7. Investigation of srawberry hardening in low temperatures in vitro

    OpenAIRE

    Lukoševičiūtė, Vanda; Rugienius, Rytis; Kavaliauskaitė, Danguolė

    2007-01-01

    Cold resistance of different strawberry varieties in vitro and ability to retain hardening after defrosting and repeated hardening. Phytohormons – gibberellin and abscisic acid added in the growing medium were investigated in Horticulture plant genetic and biotechnology department of LIH. We tried to model common conditions in temperate zone when freeze-thaw cycles often occur during wintertime. For investigation in vitro strawberries for the first time hardened in light at the temperature of...

  8. Fuzzy Evidence in Identification, Forecasting and Diagnosis

    CERN Document Server

    Rotshtein, Alexander P

    2012-01-01

    The purpose of this book is to present a methodology for designing and tuning fuzzy expert systems in order to identify nonlinear objects; that is, to build input-output models using expert and experimental information. The results of these identifications are used for direct and inverse fuzzy evidence in forecasting and diagnosis problem solving. The book is organised as follows: Chapter 1 presents the basic knowledge about fuzzy sets, genetic algorithms and neural nets necessary for a clear understanding of the rest of this book. Chapter 2 analyzes direct fuzzy inference based on fuzzy if-then rules. Chapter 3 is devoted to the tuning of fuzzy rules for direct inference using genetic algorithms and neural nets. Chapter 4 presents models and algorithms for extracting fuzzy rules from experimental data. Chapter 5 describes a method for solving fuzzy logic equations necessary for the inverse fuzzy inference in diagnostic systems. Chapters 6 and 7 are devoted to inverse fuzzy inference based on fu...

  9. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  10. Fuzzy promises

    DEFF Research Database (Denmark)

    Anker, Thomas Boysen; Kappel, Klemens; Eadie, Douglas

    2012-01-01

    as narrative material to communicate self-identity. Finally, (c) we propose that brands deliver fuzzy experiential promises through effectively motivating consumers to adopt and play a social role implicitly suggested and facilitated by the brand. A promise is an inherently ethical concept and the article...... concludes with an in-depth discussion of fuzzy brand promises as two-way ethical commitments that put requirements on both brands and consumers....

  11. On Intuitionistic Fuzzy Sets Theory

    CERN Document Server

    Atanassov, Krassimir T

    2012-01-01

    This book aims to be a  comprehensive and accurate survey of state-of-art research on intuitionistic fuzzy sets theory and could be considered a continuation and extension of the author´s previous book on Intuitionistic Fuzzy Sets, published by Springer in 1999 (Atanassov, Krassimir T., Intuitionistic Fuzzy Sets, Studies in Fuzziness and soft computing, ISBN 978-3-7908-1228-2, 1999). Since the aforementioned  book has appeared, the research activity of the author within the area of intuitionistic fuzzy sets has been expanding into many directions. The results of the author´s most recent work covering the past 12 years as well as the newest general ideas and open problems in this field have been therefore collected in this new book.

  12. Work Hardening Behavior of 1020 Steel During Cold-Beating Simulation

    Science.gov (United States)

    CUI, Fengkui; LING, Yuanfei; XUE, Jinxue; LIU, Jia; LIU, Yuhui; LI, Yan

    2017-03-01

    The present research of cold-beating formation mainly focused on roller design and manufacture, kinematics, constitutive relation, metal flow law, thermo-mechanical coupling, surface micro-topography and microstructure evolution. However, the research on surface quality and performance of workpieces in the process of cold-beating is rare. Cold-beating simulation experiment of 1020 steel is conducted at room temperature and strain rates ranging from 2000 to 4000 s-1 base on the law of plastic forming. According to the experimental data, the model of strain hardening of 1020 steel is established, Scanning Electron Microscopy(SEM) is conducted, the mechanism of the work hardening of 1020 steel is clarified by analyzing microstructure variation of 1020 steel. It is found that the strain rate hardening effect of 1020 steel is stronger than the softening effect induced by increasing temperatures, the process of simulation cold-beating cause the grain shape of 1020 steel significant change and microstructure elongate significantly to form a fibrous tissue parallel to the direction of deformation, the higher strain rate, the more obvious grain refinement and the more hardening effect. Additionally, the change law of the work hardening rate is investigated, the relationship between dislocation density and strain, the relationship between work hardening rate and dislocation density is obtained. Results show that the change trend of the work hardening rate of 1020 steel is divided into two stages, the work hardening rate decreases dramatically in the first stage and slowly decreases in the second stage, finally tending toward zero. Dislocation density increases with increasing strain and strain rate, work hardening rate decreases with increasing dislocation density. The research results provide the basis for solving the problem of improving the surface quality and performance of workpieces under cold-beating formation of 1020 steel.

  13. HARDENING OF CRANE RAILS BY PLASMA DISCRETE-TIME SURFACE TREATMENT

    Directory of Open Access Journals (Sweden)

    S. S. Samotugin

    2017-01-01

    Full Text Available Crane wheels and rails are subjected to intensive wear in the process of operation. Therefore, improvement of these components’ performance can be considered a task of high importance. A promising direction in this regard is surface treatment by highly concentrated energy flows such as laser beams or plasma jets. This thesis suggests that the use of gradient plasma surface treatment can improve the performance of crane rails. A research was conducted, according to which hardened zones were deposited on crane rails under different treatment modes. Microhardness was measured both at the surface and in depth using custom-made microsections. The article includes the results of study of plasma surface hardening effects on wear resistance of crane rails. Change of plasma surface treatment parameters (current, plasma torch movement speed, argon gas flow rate allows for desired steel hardness and structure, while the choice of optimal location for hardened zones makes it possible to significantly improve wear resistance and crack resistance. As a result of plasma surface hardening, the fine-grained martensite structure is obtained with mainly lamellar morphology and higher hardness rate compared toinduction hardening or overlaying. Wear test of carbon steels revealed that plasma surfacing reduces abrasive wear rate compared to the irinitial state by 2 to 3 times. Enough sharp boundary between hardened and non-hardened portions has a positive effect on the performance of parts under dynamic loads, contributing to the inhibition of cracks during the transition from solid to a soft metal. For carbon and low alloy rail steels, the properties achieved by plasma surface hardening can effectively replace induction hardening or overlaying.The mode range for plasma surface treatment that allow sobtaining a surface layer with certain operating properties has been determined.

  14. The first order fuzzy predicate logic (I)

    International Nuclear Information System (INIS)

    Sheng, Y.M.

    1986-01-01

    Some analysis tools of fuzzy measures, Sugeno's integrals, etc. are introduced into the semantic of the first order predicate logic to explain the concept of fuzzy quantifiers. The truth value of a fuzzy quantification proposition is represented by Sugeno's integral. With this framework, several important notions of formation rules, fuzzy valutions and fuzzy validity are discussed

  15. A procedure for the hardening of materials

    International Nuclear Information System (INIS)

    Dearnaley, G.

    1984-01-01

    A method of hardening metals or ceramics which have fcc, bcc or hcp structures in which two species of differing atomic radii are introduced into the material to be hardened. One species is of a size such that it can diffuse through the lattice normally. The other is of a size such that it can diffuse readily only along dislocations. Ion bombardment is the preferred method of introducing the species with different atomic radii. The material to be hardened is subjected to heat and plastic deformation so as to cause a large number of dislocations with jogs. The species meet at the jogs where they interact and are trapped and set up strain fields which prevent further deformation of the material. (author)

  16. An Anisotropic Hardening Model for Springback Prediction

    Science.gov (United States)

    Zeng, Danielle; Xia, Z. Cedric

    2005-08-01

    As more Advanced High-Strength Steels (AHSS) are heavily used for automotive body structures and closures panels, accurate springback prediction for these components becomes more challenging because of their rapid hardening characteristics and ability to sustain even higher stresses. In this paper, a modified Mroz hardening model is proposed to capture realistic Bauschinger effect at reverse loading, such as when material passes through die radii or drawbead during sheet metal forming process. This model accounts for material anisotropic yield surface and nonlinear isotropic/kinematic hardening behavior. Material tension/compression test data are used to accurately represent Bauschinger effect. The effectiveness of the model is demonstrated by comparison of numerical and experimental springback results for a DP600 straight U-channel test.

  17. An Anisotropic Hardening Model for Springback Prediction

    International Nuclear Information System (INIS)

    Zeng, Danielle; Xia, Z. Cedric

    2005-01-01

    As more Advanced High-Strength Steels (AHSS) are heavily used for automotive body structures and closures panels, accurate springback prediction for these components becomes more challenging because of their rapid hardening characteristics and ability to sustain even higher stresses. In this paper, a modified Mroz hardening model is proposed to capture realistic Bauschinger effect at reverse loading, such as when material passes through die radii or drawbead during sheet metal forming process. This model accounts for material anisotropic yield surface and nonlinear isotropic/kinematic hardening behavior. Material tension/compression test data are used to accurately represent Bauschinger effect. The effectiveness of the model is demonstrated by comparison of numerical and experimental springback results for a DP600 straight U-channel test

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 985 ... Vol 15 (2009), Application of Neuro-Fuzzy to palm oil production ... the Strength of Users Passwords in Computing Systems in Nigeria, Abstract ... of the Chebyshev polynomials for the Tau numerical method, Abstract.

  19. Theta-Generalized closed sets in fuzzy topological spaces

    International Nuclear Information System (INIS)

    El-Shafei, M.E.; Zakari, A.

    2006-01-01

    In this paper we introduce the concepts of theta-generalized closed fuzzy sets and generalized fuzzy sets in topological spaces. Furthermore, generalized fuzzy sets are extended to theta-generalized fuzzy sets. Also, we introduce the concepts of fuzzy theta-generalized continuous and fuzzy theta-generalized irresolute mappings. (author)

  20. A new fuzzy regression model based on interval-valued fuzzy neural network and its applications to management

    Directory of Open Access Journals (Sweden)

    Somaye Yeylaghi

    2017-06-01

    Full Text Available In this paper, a novel hybrid method based on interval-valued fuzzy neural network for approximate of interval-valued fuzzy regression models, is presented. The work of this paper is an expansion of the research of real fuzzy regression models. In this paper interval-valued fuzzy neural network (IVFNN can be trained with crisp and interval-valued fuzzy data. Here a neural network is considered as a part of a large field called neural computing or soft computing. Moreover, in order to find the approximate parameters, a simple algorithm from the cost function of the fuzzy neural network is proposed. Finally, we illustrate our approach by some numerical examples and compare this method with existing methods.

  1. Fuzzy GML Modeling Based on Vague Soft Sets

    Directory of Open Access Journals (Sweden)

    Bo Wei

    2017-01-01

    Full Text Available The Open Geospatial Consortium (OGC Geography Markup Language (GML explicitly represents geographical spatial knowledge in text mode. All kinds of fuzzy problems will inevitably be encountered in spatial knowledge expression. Especially for those expressions in text mode, this fuzziness will be broader. Describing and representing fuzziness in GML seems necessary. Three kinds of fuzziness in GML can be found: element fuzziness, chain fuzziness, and attribute fuzziness. Both element fuzziness and chain fuzziness belong to the reflection of the fuzziness between GML elements and, then, the representation of chain fuzziness can be replaced by the representation of element fuzziness in GML. On the basis of vague soft set theory, two kinds of modeling, vague soft set GML Document Type Definition (DTD modeling and vague soft set GML schema modeling, are proposed for fuzzy modeling in GML DTD and GML schema, respectively. Five elements or pairs, associated with vague soft sets, are introduced. Then, the DTDs and the schemas of the five elements are correspondingly designed and presented according to their different chains and different fuzzy data types. While the introduction of the five elements or pairs is the basis of vague soft set GML modeling, the corresponding DTD and schema modifications are key for implementation of modeling. The establishment of vague soft set GML enables GML to represent fuzziness and solves the problem of lack of fuzzy information expression in GML.

  2. On rarely generalized regular fuzzy continuous functions in fuzzy topological spaces

    Directory of Open Access Journals (Sweden)

    Appachi Vadivel

    2016-11-01

    Full Text Available In this paper, we introduce the concept of rarely generalized regular fuzzy continuous functions in the sense of A.P. Sostak's and Ramadan is introduced. Some interesting properties and characterizations of them are investigated. Also, some applications to fuzzy compact spaces are established.

  3. Novel circuits for radiation hardened memories

    International Nuclear Information System (INIS)

    Haraszti, T.P.; Mento, R.P.; Moyer, N.E.; Grant, W.M.

    1992-01-01

    This paper reports on implementation of large storage semiconductor memories which combine radiation hardness with high packing density, operational speed, and low power dissipation and require both hardened circuit and hardened process technologies. Novel circuits, including orthogonal shuffle type of write-read arrays, error correction by weighted bidirectional codes and associative iterative repair circuits, are proposed for significant improvements of SRAMs' immunity against the effects of total dose and cosmic particle impacts. The implementation of the proposed circuit resulted in fault-tolerant 40-Mbit and 10-Mbit monolithic memories featuring a data rate of 120 MHz and power dissipation of 880 mW. These experimental serial-parallel memories were fabricated with a nonhardened standard CMOS processing technology, yet provided a total dose hardness of 1 Mrad and a projected SEU rate of 1 x 10 - 12 error/bit/day. Using radiation hardened processing improvements by factors of 10 to 100 are predicted in both total dose hardness and SEU rate

  4. Logika Fuzzy untuk Audit Sistem Informasi

    Directory of Open Access Journals (Sweden)

    Hari Setiabudi Husni

    2013-06-01

    Full Text Available The aim of this research is to study and introduce fuzzy logic into audit information system. Fuzzy logic is already adopted in other field of study. It helps decision process that incorporates subjective information and transforms it to scientific objective information which is more accepted. This research implements simulation scenario to see how fuzzy logic concept should be used in audit information process. The result shows that there is a possible concept of fuzzy logic that can be used for helping auditor in making objective decision in audit information system process. More researches needed to further explore the fuzzy logic concept such as creating the system of fuzzy logic and build application that can be used for daily information system audit process. 

  5. ANISOTROPIC STRAIN-HARDENING IN POLYCRYSTALLINE COPPER AND ALUMINUM

    NARCIS (Netherlands)

    HESS, F

    1993-01-01

    A new viscoplastic model for the plastic stress-strain behaviour of f.c.c. metals is presented. In this model the strain hardening results from increasing dislocation densities. The observed stagnation of strain hardening after strain reversals is explained by a lowering of the increase in

  6. Surface hardening of titanium alloys with melting depth controlled by heat sink

    Science.gov (United States)

    Oden, Laurance L.; Turner, Paul C.

    1995-01-01

    A process for forming a hard surface coating on titanium alloys includes providing a piece of material containing titanium having at least a portion of one surface to be hardened. The piece having a portion of a surface to be hardened is contacted on the backside by a suitable heat sink such that the melting depth of said surface to be hardened may be controlled. A hardening material is then deposited as a slurry. Alternate methods of deposition include flame, arc, or plasma spraying, electrodeposition, vapor deposition, or any other deposition method known by those skilled in the art. The surface to be hardened is then selectively melted to the desired depth, dependent on the desired coating thickness, such that a molten pool is formed of the piece surface and the deposited hardening material. Upon cooling a hardened surface is formed.

  7. Beyond fuzzy spheres

    International Nuclear Information System (INIS)

    Govindarajan, T R; Padmanabhan, Pramod; Shreecharan, T

    2010-01-01

    We study polynomial deformations of the fuzzy sphere, specifically given by the cubic or the Higgs algebra. We derive the Higgs algebra by quantizing the Poisson structure on a surface in R 3 . We find that several surfaces, differing by constants, are described by the Higgs algebra at the fuzzy level. Some of these surfaces have a singularity and we overcome this by quantizing this manifold using coherent states for this nonlinear algebra. This is seen in the measure constructed from these coherent states. We also find the star product for this non-commutative algebra as a first step in constructing field theories on such fuzzy spaces.

  8. Research on SEU hardening of heterogeneous Dual-Core SoC

    Science.gov (United States)

    Huang, Kun; Hu, Keliu; Deng, Jun; Zhang, Tao

    2017-08-01

    The implementation of Single-Event Upsets (SEU) hardening has various schemes. However, some of them require a lot of human, material and financial resources. This paper proposes an easy scheme on SEU hardening for Heterogeneous Dual-core SoC (HD SoC) which contains three techniques. First, the automatic Triple Modular Redundancy (TMR) technique is adopted to harden the register heaps of the processor and the instruction-fetching module. Second, Hamming codes are used to harden the random access memory (RAM). Last, a software signature technique is applied to check the programs which are running on CPU. The scheme need not to consume additional resources, and has little influence on the performance of CPU. These technologies are very mature, easy to implement and needs low cost. According to the simulation result, the scheme can satisfy the basic demand of SEU-hardening.

  9. Fuzzy tree automata and syntactic pattern recognition.

    Science.gov (United States)

    Lee, E T

    1982-04-01

    An approach of representing patterns by trees and processing these trees by fuzzy tree automata is described. Fuzzy tree automata are defined and investigated. The results include that the class of fuzzy root-to-frontier recognizable ¿-trees is closed under intersection, union, and complementation. Thus, the class of fuzzy root-to-frontier recognizable ¿-trees forms a Boolean algebra. Fuzzy tree automata are applied to processing fuzzy tree representation of patterns based on syntactic pattern recognition. The grade of acceptance is defined and investigated. Quantitative measures of ``approximate isosceles triangle,'' ``approximate elongated isosceles triangle,'' ``approximate rectangle,'' and ``approximate cross'' are defined and used in the illustrative examples of this approach. By using these quantitative measures, a house, a house with high roof, and a church are also presented as illustrative examples. In addition, three fuzzy tree automata are constructed which have the capability of processing the fuzzy tree representations of ``fuzzy houses,'' ``houses with high roofs,'' and ``fuzzy churches,'' respectively. The results may have useful applications in pattern recognition, image processing, artificial intelligence, pattern database design and processing, image science, and pictorial information systems.

  10. Fuzzy logic controller using different inference methods

    International Nuclear Information System (INIS)

    Liu, Z.; De Keyser, R.

    1994-01-01

    In this paper the design of fuzzy controllers by using different inference methods is introduced. Configuration of the fuzzy controllers includes a general rule-base which is a collection of fuzzy PI or PD rules, the triangular fuzzy data model and a centre of gravity defuzzification algorithm. The generalized modus ponens (GMP) is used with the minimum operator of the triangular norm. Under the sup-min inference rule, six fuzzy implication operators are employed to calculate the fuzzy look-up tables for each rule base. The performance is tested in simulated systems with MATLAB/SIMULINK. Results show the effects of using the fuzzy controllers with different inference methods and applied to different test processes

  11. Fuzzy control of small servo motors

    Science.gov (United States)

    Maor, Ron; Jani, Yashvant

    1993-01-01

    To explore the benefits of fuzzy logic and understand the differences between the classical control methods and fuzzy control methods, the Togai InfraLogic applications engineering staff developed and implemented a motor control system for small servo motors. The motor assembly for testing the fuzzy and conventional controllers consist of servo motor RA13M and an encoder with a range of 4096 counts. An interface card was designed and fabricated to interface the motor assembly and encoder to an IBM PC. The fuzzy logic based motor controller was developed using the TILShell and Fuzzy C Development System on an IBM PC. A Proportional-Derivative (PD) type conventional controller was also developed and implemented in the IBM PC to compare the performance with the fuzzy controller. Test cases were defined to include step inputs of 90 and 180 degrees rotation, sine and square wave profiles in 5 to 20 hertz frequency range, as well as ramp inputs. In this paper we describe our approach to develop a fuzzy as well as PH controller, provide details of hardware set-up and test cases, and discuss the performance results. In comparison, the fuzzy logic based controller handles the non-linearities of the motor assembly very well and provides excellent control over a broad range of parameters. Fuzzy technology, as indicated by our results, possesses inherent adaptive features.

  12. Hardening and softening mechanisms of pearlitic steel wire under torsion

    International Nuclear Information System (INIS)

    Zhao, Tian-Zhang; Zhang, Shi-Hong; Zhang, Guang-Liang; Song, Hong-Wu; Cheng, Ming

    2014-01-01

    Highlights: • Mechanical behavior of pearlitic steel wire is studied using torsion. • Work hardening results from refinement lamellar pearlitic structure. • Softening results from recovery, shear bands and lamellar fragmentations. • A microstructure based analytical flow stress model is established. - Abstract: The mechanical behaviors and microstructure evolution of pearlitic steel wires under monotonic shear deformation have been investigated by a torsion test and a number of electron microscopy techniques including scanning electron microscopy (SEM) and transmission electron microscopy (TEM), with an aim to reveal the softening and hardening mechanisms of a randomly oriented pearlitic structure during a monotonic stain path. Significantly different from the remarkable strain hardening in cold wire drawing, the strain hardening rate during torsion drops to zero quickly after a short hardening stage. The microstructure observations indicate that the inter-lamellar spacing (ILS) decreases and the dislocations accumulate with strain, which leads to hardening of the material. Meanwhile, when the strain is larger than 0.154, the enhancement of dynamic recovery, shear bands (SBs) and cementite fragmentations results in the softening and balances the strain hardening. A microstructure based analytical flow stress model with considering the influence of ILS on the mean free path of dislocations and the softening caused by SBs and cementite fragmentations, has been established and the predicted flow shear curve meets well with the measured curve in the torsion test

  13. Enric Trillas a passion for fuzzy sets : a collection of recent works on fuzzy logic

    CERN Document Server

    Verdegay, Jose; Esteva, Francesc

    2015-01-01

    This book presents a comprehensive collection of the latest and most significant research advances and applications in the field of fuzzy logic. It covers fuzzy structures, rules, operations and mathematical formalisms, as well as important applications of fuzzy logic in a number of fields, like decision-making, environmental prediction and prevention, communication, controls and many others. Dedicated to Enric Trillas in recognition of his pioneering research in the field, the book also includes a foreword by Lotfi A. Zadeh and an outlook on the future of fuzzy logic.

  14. Fuzzy Logic in Medicine and Bioinformatics

    Directory of Open Access Journals (Sweden)

    Angela Torres

    2006-01-01

    Full Text Available The purpose of this paper is to present a general view of the current applications of fuzzy logic in medicine and bioinformatics. We particularly review the medical literature using fuzzy logic. We then recall the geometrical interpretation of fuzzy sets as points in a fuzzy hypercube and present two concrete illustrations in medicine (drug addictions and in bioinformatics (comparison of genomes.

  15. Model predictive control using fuzzy decision functions

    NARCIS (Netherlands)

    Kaymak, U.; Costa Sousa, da J.M.

    2001-01-01

    Fuzzy predictive control integrates conventional model predictive control with techniques from fuzzy multicriteria decision making, translating the goals and the constraints to predictive control in a transparent way. The information regarding the (fuzzy) goals and the (fuzzy) constraints of the

  16. EFFECT OF HARDENING TIME ON DEFORMATION-STRENGTH INDICATORS OF CONCRETE FOR INJECTION WITH A TWO-STAGE EXPANSION DURING HARDENING IN WATER

    Directory of Open Access Journals (Sweden)

    Tatjana N. Zhilnikova

    2017-01-01

    Full Text Available Abstract. Objectives Concretes for injection with a two-stage expansion are a kind of selfstressing concrete obtained with the use of self-stressing cement.The aim of the work is to study the influence of the duration of aging on the porosity, strength and self-stress of concrete hardening in water, depending on the expansion value at the first stage. At the first stage, the compacted concrete mixture is expanded to ensure complete filling of the formwork space. At the second stage, the hardening concrete expands due to the formation of an increased amount of ettringite. This process is prolonged in time, with the amount of self-stress and strength dependant on the conditions of hardening. Methods  Experimental evaluation of self-stress, strength and porosity of concretes that are permanently hardened in water, under air-moist and air-dry conditions after different expansion at the first stage. The self-stress of cement stone is the result of superposition of two processes: the hardening of the structure due to hydration of silicates and its expansion as a result of hydration of calcium aluminates with the subsequent formation of ettringite. The magnitude of self-stress is determined by the ratio of these two processes. The self-stress of the cement stone changes in a manner similar to the change in its expansion. The stabilisation of expansion is accompanied by stabilisation of self-stress of cement stone. Results  The relationship of self-stress, strength and porosity of concrete for injection with a two-stage expansion on the duration and humidity conditions of hardening, taking into account the conditions of deformation limitation at the first stage, is revealed. Conclusion During prolonged hardening in an aqueous medium, self-stresses are reduced up to 25% with the exception of expansion at the first stage and up to 20% with an increase in volume up to 5% at the first stage. The increase in compressive strength is up to 28% relative to

  17. Algebraic Aspects of Families of Fuzzy Languages

    NARCIS (Netherlands)

    Asveld, P.R.J.; Heylen, Dirk K.J.; Nijholt, Antinus; Scollo, Giuseppe

    2000-01-01

    We study operations on fuzzy languages such as union, concatenation,Kleene $\\star$, intersection with regular fuzzy languages, and several kinds of (iterated) fuzzy substitution. Then we consider families of fuzzy languages, closed under a fixed collection of these operations, which results in the

  18. Approximate Solution of LR Fuzzy Sylvester Matrix Equations

    Directory of Open Access Journals (Sweden)

    Xiaobin Guo

    2013-01-01

    Full Text Available The fuzzy Sylvester matrix equation AX~+X~B=C~ in which A,B are m×m and n×n crisp matrices, respectively, and C~ is an m×n LR fuzzy numbers matrix is investigated. Based on the Kronecker product of matrices, we convert the fuzzy Sylvester matrix equation into an LR fuzzy linear system. Then we extend the fuzzy linear system into two systems of linear equations according to the arithmetic operations of LR fuzzy numbers. The fuzzy approximate solution of the original fuzzy matrix equation is obtained by solving the crisp linear systems. The existence condition of the LR fuzzy solution is also discussed. Some examples are given to illustrate the proposed method.

  19. Fuzzy histogram for internal and external fuzzy directional relations

    OpenAIRE

    Salamat , Nadeem; Zahzah , El-Hadi

    2009-01-01

    5 Pages; Spatial relations have key point importance in image analysis and computer vision. Numerous technics have been developed to study these relations especially directional relations. Modern digital computers give rise to quantitative methods and among them fuzzy methods have core importance due to handling imprecise knowledge information and vagueness. In most fuzzy methods external directional relations are considered which are useful for small scale space image analysis but in large s...

  20. Fuzzy relational calculus theory, applications and software

    CERN Document Server

    Peeva, Ketty

    2004-01-01

    This book examines fuzzy relational calculus theory with applications in various engineering subjects. The scope of the text covers unified and exact methods with algorithms for direct and inverse problem resolution in fuzzy relational calculus. Extensive engineering applications of fuzzy relation compositions and fuzzy linear systems (linear, relational and intuitionistic) are discussed. Some examples of such applications include solutions of equivalence, reduction and minimization problems in fuzzy machines, pattern recognition in fuzzy languages, optimization and inference engines in textile and chemical engineering, etc. A comprehensive overview of the authors' original work in fuzzy relational calculus is also provided in each chapter. The attached CD-Rom contains a toolbox with many functions for fuzzy calculations, together with an original algorithm for inverse problem resolution in MATLAB. This book is also suitable for use as a textbook in related courses at advanced undergraduate and graduate level...

  1. On the mathematics of fuzziness

    Energy Technology Data Exchange (ETDEWEB)

    Chulichkov, A.I.; Chulichkova, N.M.; Pyt`ev, Y. P.; Smolnik, L.

    1994-12-31

    The problem of the minimax linear interpretation of stochastic measurements with fuzzy conditions on values of the object`s parameters is considered. The result of a measurement interpretation is the fuzzy element (u, h, alpha, mu(.,.,.)), where u is the object`s parameter estimation, h is the estimation accuracy and alpha is the reliability of interpretation, mu is the characteristic function of a fuzzy element. Reliability is the characteristic of the agreement between fuzzy a priori information and measuring data. The information on the values of the parameters of an object under investigation is interactively submitted to the computer.

  2. Fuzzy upper bounds and their applications

    Energy Technology Data Exchange (ETDEWEB)

    Soleimani-damaneh, M. [Department of Mathematics, Faculty of Mathematical Science and Computer Engineering, Teacher Training University, 599 Taleghani Avenue, Tehran 15618 (Iran, Islamic Republic of)], E-mail: soleimani_d@yahoo.com

    2008-04-15

    This paper considers the concept of fuzzy upper bounds and provides some relevant applications. Considering a fuzzy DEA model, the existence of a fuzzy upper bound for the objective function of the model is shown and an effective approach to solve that model is introduced. Some dual interpretations are provided, which are useful for practical purposes. Applications of the concept of fuzzy upper bounds in two physical problems are pointed out.

  3. Fuzzy Clustering

    DEFF Research Database (Denmark)

    Berks, G.; Keyserlingk, Diedrich Graf von; Jantzen, Jan

    2000-01-01

    A symptom is a condition indicating the presence of a disease, especially, when regarded as an aid in diagnosis.Symptoms are the smallest units indicating the existence of a disease. A syndrome on the other hand is an aggregate, set or cluster of concurrent symptoms which together indicate...... and clustering are the basic concerns in medicine. Classification depends on definitions of the classes and their required degree of participant of the elements in the cases' symptoms. In medicine imprecise conditions are the rule and therefore fuzzy methods are much more suitable than crisp ones. Fuzzy c......-mean clustering is an easy and well improved tool, which has been applied in many medical fields. We used c-mean fuzzy clustering after feature extraction from an aphasia database. Factor analysis was applied on a correlation matrix of 26 symptoms of language disorders and led to five factors. The factors...

  4. Application of Bipolar Fuzzy Sets in Graph Structures

    Directory of Open Access Journals (Sweden)

    Muhammad Akram

    2016-01-01

    Full Text Available A graph structure is a useful tool in solving the combinatorial problems in different areas of computer science and computational intelligence systems. In this paper, we apply the concept of bipolar fuzzy sets to graph structures. We introduce certain notions, including bipolar fuzzy graph structure (BFGS, strong bipolar fuzzy graph structure, bipolar fuzzy Ni-cycle, bipolar fuzzy Ni-tree, bipolar fuzzy Ni-cut vertex, and bipolar fuzzy Ni-bridge, and illustrate these notions by several examples. We study ϕ-complement, self-complement, strong self-complement, and totally strong self-complement in bipolar fuzzy graph structures, and we investigate some of their interesting properties.

  5. Influence of fuzzy norms and other heuristics on “Mixed fuzzy rule formation”

    OpenAIRE

    Gabriel, Thomas R.; Berthold, Michael R.

    2004-01-01

    In Mixed Fuzzy Rule Formation [Int. J. Approx. Reason. 32 (2003) 67] a method to extract mixed fuzzy rules from data was introduced. The underlying algorithm s performance is influenced by the choice of fuzzy t-norm and t-conorm, and a heuristic to avoid conflicts between patterns and rules of different classes throughout training. In the following addendum to [Int. J. Approx. Reason. 32 (2003) 67], we discuss in more depth how these parameters affect the generalization performance of the res...

  6. Towards the future of fuzzy logic

    CERN Document Server

    Trillas, Enric; Kacprzyk, Janusz

    2015-01-01

    This book provides readers with a snapshot of the state-of-the art in fuzzy logic. Throughout the chapters, key theories developed in the last fifty years as well as important applications to practical problems are presented and discussed from different perspectives, as the authors hail from different disciplines and therefore use fuzzy logic for different purposes.  The book aims at showing how fuzzy logic has evolved since the first theory formulation by Lotfi A. Zadeh in his seminal paper on Fuzzy Sets in 1965. Fuzzy theories and implementation grew at an impressive speed and achieved significant results, especially on the applicative side. The study of fuzzy logic and its practice spread all over the world, from Europe to Asia, America and Oceania. The editors believe that, thanks to the drive of young researchers, fuzzy logic will be able to face the challenging goals posed by computing with words. New frontiers of knowledge are waiting to be explored. In order to motivate young people to engage in the ...

  7. Sputtering properties of tungsten 'fuzzy' surfaces

    International Nuclear Information System (INIS)

    Nishijima, D.; Baldwin, M.J.; Doerner, R.P.; Yu, J.H.

    2011-01-01

    Sputtering yields of He-induced W 'fuzzy' surfaces bombarded by Ar have been measured in the linear divertor plasma simulator PISCES-B. It is found that the sputtering yield of a fuzzy surface, Y fuzzy , decreases with increasing fuzzy layer thickness, L, and saturates at ∼10% of that of a smooth surface, Y smooth , at L > 1 μm. The reduction in the sputtering yield is suspected to be due mainly to the porous structure of fuzz, since the ratio, Y fuzzy /Y smooth follows (1 - p fuzz ), where p fuzz is the fuzz porosity. Further, Y fuzzy /Y smooth is observed to increase with incident ion energy, E i . This may be explained by an energy dependent change in the angular distribution of sputtered W atoms, since at lower E i , the angular distribution is observed to become more butterfly-shaped. That is, a larger fraction of sputtered W atoms can line-of-sight deposit/stick onto neighboring fuzz nanostructures for lower E i butterfly distributions, resulting in lower ratio of Y fuzzy /Y smooth .

  8. Influence of fuzzy norms and other heuristics on "Mixed fuzzy rule formation" - [Corrigendum

    OpenAIRE

    Gabriel, Thomas R.; Berthold, Michael R.

    2008-01-01

    We hereby correct an error in Ref. [2], in which we studied the influence of various parameters that affect the generalization performance of fuzzy models constructed using the mixed fuzzy rule formation method [1].

  9. Radiation hardening of semiconductor parts

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This chapter is an overview of total-ionizing-dose and single-event hardening techniques and should be used as a guide to a range of research publications. It should be stressed that there is no clear and simple route to a radiation-tolerant silicon integrated circuit. What works for one fabrication process may not work for another, and there are many complex interactions within individual processes and designs. The authors have attempted to highlight the most important factors and those process changes which should bring improved hardness. The main point is that radiation-hardening as a procedure must be approached in a methodical fashion and with a good understanding of the response mechanisms involved

  10. Energetic model of metal hardening

    Directory of Open Access Journals (Sweden)

    Ignatova O.N.

    2011-01-01

    Full Text Available Based on Bailey hypothesis on the link between strain hardening and elastic lattice defect energy this paper suggests a shear strength energetic model that takes into consideration plastic strain intensity and rate as well as softening related to temperature annealing and dislocation annihilation. Metal strain hardening was demonstrated to be determined only by elastic strain energy related to the energy of accumulated defects. It is anticipated that accumulation of the elastic energy of defects is governed by plastic work. The suggested model has a reasonable agreement with the available experimental data for copper up to P = 70 GPa , for aluminum up to P = 10 GPa and for tantalum up to P = 20 GPa.

  11. On the Power of Fuzzy Markup Language

    CERN Document Server

    Loia, Vincenzo; Lee, Chang-Shing; Wang, Mei-Hui

    2013-01-01

    One of the most successful methodology that arose from the worldwide diffusion of Fuzzy Logic is Fuzzy Control. After the first attempts dated in the seventies, this methodology has been widely exploited for controlling many industrial components and systems. At the same time, and very independently from Fuzzy Logic or Fuzzy Control, the birth of the Web has impacted upon almost all aspects of computing discipline. Evolution of Web, Web 2.0 and Web 3.0 has been making scenarios of ubiquitous computing much more feasible;  consequently information technology has been thoroughly integrated into everyday objects and activities. What happens when Fuzzy Logic meets Web technology? Interesting results might come out, as you will discover in this book. Fuzzy Mark-up Language is a son of this synergistic view, where some technological issues of Web are re-interpreted taking into account the transparent notion of Fuzzy Control, as discussed here.  The concept of a Fuzzy Control that is conceived and modeled in terms...

  12. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  13. Neuro-fuzzy Control of Integrating Processes

    Directory of Open Access Journals (Sweden)

    Anna Vasičkaninová

    2011-11-01

    Full Text Available Fuzzy technology is adaptive and easily applicable in different areas.Fuzzy logic provides powerful tools to capture the perceptionof natural phenomena. The paper deals with tuning of neuro-fuzzy controllers for integrating plant and for integrating plantswith time delay. The designed approach is verified on three examples by simulations and compared plants with classical PID control.Designed fuzzy controllers lead to better closed-loop control responses then classical PID controllers.

  14. Frechet differentiation of nonlinear operators between fuzzy normed spaces

    International Nuclear Information System (INIS)

    Yilmaz, Yilmaz

    2009-01-01

    By the rapid advances in linear theory of fuzzy normed spaces and fuzzy bounded linear operators it is natural idea to set and improve its nonlinear peer. We aimed in this work to realize this idea by introducing fuzzy Frechet derivative based on the fuzzy norm definition in Bag and Samanta [Bag T, Samanta SK. Finite dimensional fuzzy normed linear spaces. J Fuzzy Math 2003;11(3):687-705]. The definition is divided into two part as strong and weak fuzzy Frechet derivative so that it is compatible with strong and weak fuzzy continuity of operators. Also we restate fuzzy compact operator definition of Lael and Nouroizi [Lael F, Nouroizi K. Fuzzy compact linear operators. Chaos, Solitons and Fractals 2007;34(5):1584-89] as strongly and weakly fuzzy compact by taking into account the compatibility. We prove also that weak Frechet derivative of a nonlinear weakly fuzzy compact operator is also weakly fuzzy compact.

  15. Solution of Fuzzy Differential Equations Using Fuzzy Sumudu Transforms

    Directory of Open Access Journals (Sweden)

    Raheleh Jafari

    2018-01-01

    Full Text Available The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST method. Significant theorems are suggested in order to explain the properties of FST. The proposed method is validated with three real examples.

  16. New Applications of m-Polar Fuzzy Matroids

    Directory of Open Access Journals (Sweden)

    Musavarah Sarwar

    2017-12-01

    Full Text Available Mathematical modelling is an important aspect in apprehending discrete and continuous physical systems. Multipolar uncertainty in data and information incorporates a significant role in various abstract and applied mathematical modelling and decision analysis. Graphical and algebraic models can be studied more precisely when multiple linguistic properties are dealt with, emphasizing the need for a multi-index, multi-object, multi-agent, multi-attribute and multi-polar mathematical approach. An m-polar fuzzy set is introduced to overcome the limitations entailed in single-valued and two-valued uncertainty. Our aim in this research study is to apply the powerful methodology of m-polar fuzzy sets to generalize the theory of matroids. We introduce the notion of m-polar fuzzy matroids and investigate certain properties of various types of m-polar fuzzy matroids. Moreover, we apply the notion of the m-polar fuzzy matroid to graph theory and linear algebra. We present m-polar fuzzy circuits, closures of m-polar fuzzy matroids and put special emphasis on m-polar fuzzy rank functions. Finally, we also describe certain applications of m-polar fuzzy matroids in decision support systems, ordering of machines and network analysis.

  17. Nonlinear kinematic hardening under non-proportional loading

    International Nuclear Information System (INIS)

    Ottosen, N.S.

    1979-07-01

    Within the framework of conventional plasticity theory, it is first determined under which conditions Melan-Prager's and Ziegler's kinematic hardening rules result in identical material behaviour. Next, assuming initial isotropy and adopting the von Mises yield criterion, a nonlinear kinematic hardening function is proposed for prediction of metal behaviour. The model assumes that hardening at a specific stress point depends on the direction of the new incremental loading. Hereby a realistic response is obtained for general reversed loading, and a smooth behaviour is assured, even when loading deviates more and more from proportional loading and ultimately results in reversed loading. The predictions of the proposed model for non-proportional loading under plane stress conditions are compared with those of the classical linear kinematic model, the isotropic model and with published experimental data. Finally, the limitations of the proposaed model are discussed. (author)

  18. Hardening cookies in web-based systems for better system integrity

    International Nuclear Information System (INIS)

    Mohamad Safuan Sulaiman; Mohd Dzul Aiman Aslan; Saaidi Ismail; Abdul Aziz Mohd Ramli; Abdul Muin Abdul Rahman; Siti Nurbahyah Hamdan; Norlelawati Hashimuddin; Sufian Norazam Mohamed Aris

    2012-01-01

    IT Center (ITC) as technical support and provider for most of web-based systems in Nuclear Malaysia has conducted a study to investigate cookie vulnerability in a system for better integrity. A part of the result has found that cookies in a web-based system in Nuclear Malaysia can be easily manipulated. The main objective of the study is to harden the vulnerability of the cookies. Two levels of security procedures have been used and enforced which consist of 1) Penetration test (Pen Test) 2) Hardening procedure. In one of the system, study has found that 121 attempts threats have been detected after the hardening enforcement from 23 March till 20 September 2012. At this stage, it can be concluded that cookie vulnerability in the system has been hardened and integrity has been assured after the enforcement. This paper describes in detail the penetration and hardening process of cookie vulnerability for better supporting web-based system in Nuclear Malaysia. (author)

  19. Design of interpretable fuzzy systems

    CERN Document Server

    Cpałka, Krzysztof

    2017-01-01

    This book shows that the term “interpretability” goes far beyond the concept of readability of a fuzzy set and fuzzy rules. It focuses on novel and precise operators of aggregation, inference, and defuzzification leading to flexible Mamdani-type and logical-type systems that can achieve the required accuracy using a less complex rule base. The individual chapters describe various aspects of interpretability, including appropriate selection of the structure of a fuzzy system, focusing on improving the interpretability of fuzzy systems designed using both gradient-learning and evolutionary algorithms. It also demonstrates how to eliminate various system components, such as inputs, rules and fuzzy sets, whose reduction does not adversely affect system accuracy. It illustrates the performance of the developed algorithms and methods with commonly used benchmarks. The book provides valuable tools for possible applications in many fields including expert systems, automatic control and robotics.

  20. Comparison of Fuzzy AHP and Fuzzy TOPSIS for Road Pavement Maintenance Prioritization: Methodological Exposition and Case Study

    OpenAIRE

    Yashon O. Ouma; J. Opudo; S. Nyambenya

    2015-01-01

    For road pavement maintenance and repairs prioritization, a multiattribute approach that compares fuzzy Analytical Hierarchy Process (AHP) and fuzzy Technique for Order Preference by Ideal Situation (TOPSIS) is evaluated. The pavement distress data was collected through empirical condition surveys and rating by pavement experts. In comparison to the crisp AHP, the fuzzy AHP and fuzzy TOPSIS pairwise comparison techniques are considered to be more suitable for the subjective analysis of the pa...

  1. Approximations of Fuzzy Systems

    Directory of Open Access Journals (Sweden)

    Vinai K. Singh

    2013-03-01

    Full Text Available A fuzzy system can uniformly approximate any real continuous function on a compact domain to any degree of accuracy. Such results can be viewed as an existence of optimal fuzzy systems. Li-Xin Wang discussed a similar problem using Gaussian membership function and Stone-Weierstrass Theorem. He established that fuzzy systems, with product inference, centroid defuzzification and Gaussian functions are capable of approximating any real continuous function on a compact set to arbitrary accuracy. In this paper we study a similar approximation problem by using exponential membership functions

  2. A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP

    OpenAIRE

    K. Krishna Prasad; P. S. Aithal

    2018-01-01

    By definition, Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of late...

  3. Fuzzy-based HAZOP study for process industry

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Junkeon; Chang, Daejun, E-mail: djchang@kaist.edu

    2016-11-05

    Highlights: • HAZOP is the important technique to evaluate system safety and its risks while process operations. • Fuzzy theory can handle the inherent uncertainties of process systems for the HAZOP. • Fuzzy-based HAZOP considers the aleatory and epistemic uncertainties and provides the risk level with less uncertainty. • Risk acceptance criteria should be considered regarding the transition region for each risk. - Abstract: This study proposed a fuzzy-based HAZOP for analyzing process hazards. Fuzzy theory was used to express uncertain states. This theory was found to be a useful approach to overcome the inherent uncertainty in HAZOP analyses. Fuzzy logic sharply contrasted with classical logic and provided diverse risk values according to its membership degree. Appropriate process parameters and guidewords were selected to describe the frequency and consequence of an accident. Fuzzy modeling calculated risks based on the relationship between the variables of an accident. The modeling was based on the mean expected value, trapezoidal fuzzy number, IF-THEN rules, and the center of gravity method. A cryogenic LNG (liquefied natural gas) testing facility was the objective process for the fuzzy-based and conventional HAZOPs. The most significant index is the frequency to determine risks. The comparison results showed that the fuzzy-based HAZOP provides better sophisticated risks than the conventional HAZOP. The fuzzy risk matrix presents the significance of risks, negligible risks, and necessity of risk reduction.

  4. Formulating the strength factor α for improved predictability of radiation hardening

    Energy Technology Data Exchange (ETDEWEB)

    Tan, L., E-mail: tanl@ornl.gov; Busby, J.T.

    2015-10-15

    Analytical equations were developed to calculate the strength factors of precipitates, Frank loops, and cavities in austenitic alloys, which strongly depend on barrier type, size, geometry and density, as well as temperature. Calculated strength factors were successfully used to estimate radiation hardening using the broadly employed dispersed barrier-hardening model, leading to good agreement with experimentally measured hardening in neutron-irradiated type 304 and 316 stainless steel variants. The formulated strength factor provides a route for more reliable hardening predictions and can be easily incorporated into component simulations and design.

  5. Supply chain management under fuzziness recent developments and techniques

    CERN Document Server

    Öztayşi, Başar

    2014-01-01

    Supply Chain Management Under Fuzziness presents recently developed fuzzy models and techniques for supply chain management. These include: fuzzy PROMETHEE, fuzzy AHP, fuzzy ANP, fuzzy VIKOR, fuzzy DEMATEL, fuzzy clustering, fuzzy linear programming, and fuzzy inference systems. The book covers both practical applications and new developments concerning these methods. This book offers an excellent resource for researchers and practitioners in supply chain management and logistics, and will provide them with new suggestions and directions for future research. Moreover, it will support graduate students in their university courses, such as specialized courses on supply chains and logistics, as well as related courses in the fields of industrial engineering, engineering management and business administration.

  6. Optical Generation of Fuzzy-Based Rules

    Science.gov (United States)

    Gur, Eran; Mendlovic, David; Zalevsky, Zeev

    2002-08-01

    In the last third of the 20th century, fuzzy logic has risen from a mathematical concept to an applicable approach in soft computing. Today, fuzzy logic is used in control systems for various applications, such as washing machines, train-brake systems, automobile automatic gear, and so forth. The approach of optical implementation of fuzzy inferencing was given by the authors in previous papers, giving an extra emphasis to applications with two dominant inputs. In this paper the authors introduce a real-time optical rule generator for the dual-input fuzzy-inference engine. The paper briefly goes over the dual-input optical implementation of fuzzy-logic inferencing. Then, the concept of constructing a set of rules from given data is discussed. Next, the authors show ways to implement this procedure optically. The discussion is accompanied by an example that illustrates the transformation from raw data into fuzzy set rules.

  7. Stage IV work-hardening related to disorientations in dislocation structures

    DEFF Research Database (Denmark)

    Pantleon, W.

    2004-01-01

    The effect of deformation-induced disorientations on the work-hardening of metals is modelled based on dislocation dynamics. Essentially, Kocks’ dislocation model describing stage III hardening is extended to stage IV by incorporation of excess dislocations related to the disorientations....... Disorientations evolving from purely statistical reasons — leading to a square root dependence of the average disorientation angle on strain — affect the initial work-hardening rate (and the saturation stress) of stage III only slightly. On the other hand, deterministic contributions to the development...... of disorientations, as differences in the activated slip systems across boundaries, cause a linear increase of the flow stress at large strains. Such a constant work-hardening rate is characteristic for stage IV....

  8. Intuitionistic fuzzy aggregation and clustering

    CERN Document Server

    Xu, Zeshui

    2012-01-01

    This book offers a systematic introduction to the clustering algorithms for intuitionistic fuzzy values, the latest research results in intuitionistic fuzzy aggregation techniques, the extended results in interval-valued intuitionistic fuzzy environments, and their applications in multi-attribute decision making, such as supply chain management, military system performance evaluation, project management, venture capital, information system selection, building materials classification, and operational plan assessment, etc.

  9. Scintillation-Hardened GPS Receiver

    Science.gov (United States)

    Stephens, Donald R.

    2015-01-01

    CommLargo, Inc., has developed a scintillation-hardened Global Positioning System (GPS) receiver that improves reliability for low-orbit missions and complies with NASA's Space Telecommunications Radio System (STRS) architecture standards. A software-defined radio (SDR) implementation allows a single hardware element to function as either a conventional radio or as a GPS receiver, providing backup and redundancy for platforms such as the International Space Station (ISS) and high-value remote sensing platforms. The innovation's flexible SDR implementation reduces cost, weight, and power requirements. Scintillation hardening improves mission reliability and variability. In Phase I, CommLargo refactored an open-source GPS software package with Kalman filter-based tracking loops to improve performance during scintillation and also demonstrated improved navigation during a geomagnetic storm. In Phase II, the company generated a new field-programmable gate array (FPGA)-based GPS waveform to demonstrate on NASA's Space Communication and Navigation (SCaN) test bed.

  10. Extracting material response from simple mechanical tests on hardening-softening-hardening viscoplastic solids

    Science.gov (United States)

    Mohan, Nisha

    Compliant foams are usually characterized by a wide range of desirable mechanical properties. These properties include viscoelasticity at different temperatures, energy absorption, recoverability under cyclic loading, impact resistance, and thermal, electrical, acoustic and radiation-resistance. Some foams contain nano-sized features and are used in small-scale devices. This implies that the characteristic dimensions of foams span multiple length scales, rendering modeling their mechanical properties difficult. Continuum mechanics-based models capture some salient experimental features like the linear elastic regime, followed by non-linear plateau stress regime. However, they lack mesostructural physical details. This makes them incapable of accurately predicting local peaks in stress and strain distributions, which significantly affect the deformation paths. Atomistic methods are capable of capturing the physical origins of deformation at smaller scales, but suffer from impractical computational intensity. Capturing deformation at the so-called meso-scale, which is capable of describing the phenomenon at a continuum level, but with some physical insights, requires developing new theoretical approaches. A fundamental question that motivates the modeling of foams is `how to extract the intrinsic material response from simple mechanical test data, such as stress vs. strain response?' A 3D model was developed to simulate the mechanical response of foam-type materials. The novelty of this model includes unique features such as the hardening-softening-hardening material response, strain rate-dependence, and plastically compressible solids with plastic non-normality. Suggestive links from atomistic simulations of foams were borrowed to formulate a physically informed hardening material input function. Motivated by a model that qualitatively captured the response of foam-type vertically aligned carbon nanotube (VACNT) pillars under uniaxial compression [2011,"Analysis of

  11. Development of Bake Hardening Effect by Plastic Deformation and Annealing Conditions

    Directory of Open Access Journals (Sweden)

    Kvačkaj, T.

    2006-01-01

    Full Text Available The paper deals with the classification of steel sheets for automotives industry on the basis of strength and structural characteristics. Experimental works were aimed to obtain the best possible strengthening parameters as well as work hardening and solid solution ferrite hardening, which are the result of thermal activation of interstitial carbon atoms during paint-baking of auto body. Hardening process coming from interstitial atoms is realized as two-step process. The first step is BH (bake hardening effect achieved by interaction of interstitial atoms with dislocations. The Cottrels atmosphere is obtained. The second step of BH effect is to produced the hardening from precipitation of the carbon atoms in e-carbides, or formation of Fe32C4 carbides. WH (work hardening effect is obtained as dislocation hardening from plastic deformations during sheet deep drawing. Experimental works were aimed at as to achieve such plastic material properties after cold rolling, annealing and skin-pass rolling, which would be able to classify the material ZStE220BH into the drawing categories at the level of DQ – DDQ. As resulting from the experimental results, the optimal treatment conditions for the maximal sum (WH+BH = 86 MPa are as follows: total cold rolling deformation ecold = 65 %, annealing temperature Tanneal. = 700 °C.

  12. Designing PID-Fuzzy Controller for Pendubot System

    Directory of Open Access Journals (Sweden)

    Ho Trong Nguyen

    2017-12-01

    Full Text Available In the paper, authors analize dynamic equation of a pendubot system. Familiar kinds of controller – PID, fuzzy controllers – are concerned. Then, a structure of PID-FUZZY is presented. The comparison of three kinds of controllers – PID, fuzzy and PID-FUZZY shows the better response of system under PID-FUZZY controller. Then, the experiments on the real model also prove the better stabilization of the hybrid controller which is combined between linear and intelligent controller.

  13. Ellipsoidal fuzzy learning for smart car platoons

    Science.gov (United States)

    Dickerson, Julie A.; Kosko, Bart

    1993-12-01

    A neural-fuzzy system combined supervised and unsupervised learning to find and tune the fuzzy-rules. An additive fuzzy system approximates a function by covering its graph with fuzzy rules. A fuzzy rule patch can take the form of an ellipsoid in the input-output space. Unsupervised competitive learning found the statistics of data clusters. The covariance matrix of each synaptic quantization vector defined on ellipsoid centered at the centroid of the data cluster. Tightly clustered data gave smaller ellipsoids or more certain rules. Sparse data gave larger ellipsoids or less certain rules. Supervised learning tuned the ellipsoids to improve the approximation. The supervised neural system used gradient descent to find the ellipsoidal fuzzy patches. It locally minimized the mean-squared error of the fuzzy approximation. Hybrid ellipsoidal learning estimated the control surface for a smart car controller.

  14. Research on Bounded Rationality of Fuzzy Choice Functions

    Directory of Open Access Journals (Sweden)

    Xinlin Wu

    2014-01-01

    Full Text Available The rationality of a fuzzy choice function is a hot research topic in the study of fuzzy choice functions. In this paper, two common fuzzy sets are studied and analyzed in the framework of the Banerjee choice function. The complete rationality and bounded rationality of fuzzy choice functions are defined based on the two fuzzy sets. An assumption is presented to study the fuzzy choice function, and especially the fuzzy choice function with bounded rationality is studied combined with some rationality conditions. Results show that the fuzzy choice function with bounded rationality also satisfies some important rationality conditions, but not vice versa. The research gives supplements to the investigation in the framework of the Banerjee choice function.

  15. WHY FUZZY QUALITY?

    Directory of Open Access Journals (Sweden)

    Abbas Parchami

    2016-09-01

    Full Text Available Such as other statistical problems, we may confront with uncertain and fuzzy concepts in quality control. One particular case in process capability analysis is a situation in which specification limits are two fuzzy sets. In such a uncertain and vague environment, the produced product is not qualified with a two-valued Boolean view, but to some degree depending on the decision-maker strictness and the quality level of the produced product. This matter can be cause to a rational decision-making on the quality of the production line. First, a comprehensive approach is presented in this paper for modeling the fuzzy quality concept. Then, motivations and advantages of applying this flexible approach instead of using classical quality are mentioned.

  16. Application of submerged induction hardening; Ekichu koshuha yakiire no jitsuyoka

    Energy Technology Data Exchange (ETDEWEB)

    Nishimori, Y; Nagai, Y; Amii, Y [Mazda Motor Corp., Hiroshima (Japan); Tanaka, Y [Netsuren Co. Ltd., Tokyo (Japan); Mizuma, T [Toyo Advanced Technologies Co. Ltd., Hiroshima (Japan)

    1997-10-01

    As a cost-cutting measure, the linerless diesel engine was adopted by applying submerged induction hardening process which can harden partial inner surface of cylinder block bore. In applying this process, (1) development of induction coil which can form any shape of quenched pattern and (2) the development of machining technology which can hone precisely the distorted bore after quenching, were important. With these improvements, submerged Induction hardening was made practical. 1 ref., 11 figs.

  17. Fuzzy systems for process identification and control

    International Nuclear Information System (INIS)

    Gorrini, V.; Bersini, H.

    1994-01-01

    Various issues related to the automatic construction and on-line adaptation of fuzzy controllers are addressed. A Direct Adaptive Fuzzy Control (this is an adaptive control methodology requiring a minimal knowledge of the processes to be coupled with) derived in a way reminiscent of neurocontrol methods, is presented. A classical fuzzy controller and a fuzzy realization of a PID controller is discussed. These systems implement a highly non-linear control law, and provide to be quite robust, even in the case of noisy inputs. In order to identify dynamic processes of order superior to one, we introduce a more complex architecture, called Recurrent Fuzzy System, that use some fuzzy internal variables to perform an inferential chaining.I

  18. Plastic limit pressure of spherical vessels with combined hardening involving large deformation

    International Nuclear Information System (INIS)

    Leu, S.-Y.; Liao, K.-C.; Lin, Y.-C.

    2014-01-01

    The paper aims to investigate plastic limit pressure of spherical vessels of nonlinear combined isotropic/kinematic hardening materials. The Armstrong-Frederick kinematic hardening model is adopted and the Voce hardening law is incorporated for isotropic hardening behavior. Analytically, we extend sequential limit analysis to deal with combined isotropic/kinematic hardening materials. Further, exact solutions of plastic limit pressure were developed analytically by conducting both static and kinematic limit analysis. The onset of instability was also derived and solved iteratively by Newton's method. Numerically, elastic–plastic analysis is also performed by the commercial finite-element code ABAQUS incorporated with the user subroutine UMAT implemented with user materials of combined hardening. Finally, the problem formulation and the solution derivations presented here are validated by a very good agreement between the numerical results of exact solutions and the results of elastic–plastic finite-element analysis by ABAQUS. -- Highlights: • Sequential limit analysis is extended to consider combined hardening. • Exact solutions of plastic limit pressure are developed. • The onset of instability of a spherical vessel is derived and solved numerically

  19. A new fuzzy Monte Carlo method for solving SLAE with ergodic fuzzy Markov chains

    Directory of Open Access Journals (Sweden)

    Maryam Gharehdaghi

    2015-05-01

    Full Text Available In this paper we introduce a new fuzzy Monte Carlo method for solving system of linear algebraic equations (SLAE over the possibility theory and max-min algebra. To solve the SLAE, we first define a fuzzy estimator and prove that this is an unbiased estimator of the solution. To prove unbiasedness, we apply the ergodic fuzzy Markov chains. This new approach works even for cases with coefficients matrix with a norm greater than one.

  20. Process design of press hardening with gradient material property influence

    International Nuclear Information System (INIS)

    Neugebauer, R.; Schieck, F.; Rautenstrauch, A.

    2011-01-01

    Press hardening is currently used in the production of automotive structures that require very high strength and controlled deformation during crash tests. Press hardening can achieve significant reductions of sheet thickness at constant strength and is therefore a promising technology for the production of lightweight and energy-efficient automobiles. The manganese-boron steel 22MnB5 have been implemented in sheet press hardening owing to their excellent hot formability, high hardenability, and good temperability even at low cooling rates. However, press-hardened components have shown poor ductility and cracking at relatively small strains. A possible solution to this problem is a selective increase of steel sheet ductility by press hardening process design in areas where the component is required to deform plastically during crash tests. To this end, process designers require information about microstructure and mechanical properties as a function of the wide spectrum of cooling rates and sequences and austenitizing treatment conditions that can be encountered in production environments. In the present work, a Continuous Cooling Transformation (CCT) diagram with corresponding material properties of sheet steel 22MnB5 was determined for a wide spectrum of cooling rates. Heating and cooling programs were conducted in a quenching dilatometer. Motivated by the importance of residual elasticity in crash test performance, this property was measured using a micro-bending test and the results were integrated into the CCT diagrams to complement the hardness testing results. This information is essential for the process design of press hardening of sheet components with gradient material properties.

  1. Fuzzy control in environmental engineering

    CERN Document Server

    Chmielowski, Wojciech Z

    2016-01-01

    This book is intended for engineers, technicians and people who plan to use fuzzy control in more or less developed and advanced control systems for manufacturing processes, or directly for executive equipment. Assuming that the reader possesses elementary knowledge regarding fuzzy sets and fuzzy control, by way of a reminder, the first parts of the book contain a reminder of the theoretical foundations as well as a description of the tools to be found in the Matlab/Simulink environment in the form of a toolbox. The major part of the book presents applications for fuzzy controllers in control systems for various manufacturing and engineering processes. It presents seven processes and problems which have been programmed using fuzzy controllers. The issues discussed concern the field of Environmental Engineering. Examples are the control of a flood wave passing through a hypothetical, and then the real Dobczyce reservoir in the Raba River, which is located in the upper Vistula River basin in Southern Poland, th...

  2. The fuzzy approach to statistical analysis

    NARCIS (Netherlands)

    Coppi, Renato; Gil, Maria A.; Kiers, Henk A. L.

    2006-01-01

    For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are: (i) to introduce new data analysis problems in which the objective involves either fuzzy relationships or fuzzy terms;

  3. Minimal solution for inconsistent singular fuzzy matrix equations

    Directory of Open Access Journals (Sweden)

    M. Nikuie

    2013-10-01

    Full Text Available The fuzzy matrix equations $Ailde{X}=ilde{Y}$ is called a singular fuzzy matrix equations while the coefficients matrix of its equivalent crisp matrix equations be a singular matrix. The singular fuzzy matrix equations are divided into two parts: consistent singular matrix equations and inconsistent fuzzy matrix equations. In this paper, the inconsistent singular fuzzy matrix equations is studied and the effect of generalized inverses in finding minimal solution of an inconsistent singular fuzzy matrix equations are investigated.

  4. Frontiers of higher order fuzzy sets

    CERN Document Server

    Tahayori, Hooman

    2015-01-01

    Frontiers of Higher Order Fuzzy Sets, strives to improve the theoretical aspects of general and Interval Type-2 fuzzy sets and provides a unified representation theorem for higher order fuzzy sets. Moreover, the book elaborates on the concept of gradual elements and their integration with the higher order fuzzy sets. This book also introduces new frameworks for information granulation based on general T2FSs, IT2FSs, Gradual elements, Shadowed sets and rough sets. In particular, the properties and characteristics of the new proposed frameworks are studied. Such new frameworks are shown to be more capable to be exploited in real applications. Higher order fuzzy sets that are the result of the integration of general T2FSs, IT2FSs, gradual elements, shadowed sets and rough sets will be shown to be suitable to be applied in the fields of bioinformatics, business, management, ambient intelligence, medicine, cloud computing and smart grids. Presents new variations of fuzzy set frameworks and new areas of applicabili...

  5. Fuzzy forecasting based on two-factors second-order fuzzy-trend logical relationship groups and particle swarm optimization techniques.

    Science.gov (United States)

    Chen, Shyi-Ming; Manalu, Gandhi Maruli Tua; Pan, Jeng-Shyang; Liu, Hsiang-Chuan

    2013-06-01

    In this paper, we present a new method for fuzzy forecasting based on two-factors second-order fuzzy-trend logical relationship groups and particle swarm optimization (PSO) techniques. First, we fuzzify the historical training data of the main factor and the secondary factor, respectively, to form two-factors second-order fuzzy logical relationships. Then, we group the two-factors second-order fuzzy logical relationships into two-factors second-order fuzzy-trend logical relationship groups. Then, we obtain the optimal weighting vector for each fuzzy-trend logical relationship group by using PSO techniques to perform the forecasting. We also apply the proposed method to forecast the Taiwan Stock Exchange Capitalization Weighted Stock Index and the NTD/USD exchange rates. The experimental results show that the proposed method gets better forecasting performance than the existing methods.

  6. Kinematic Hardening: Characterization, Modeling and Impact on Springback Prediction

    International Nuclear Information System (INIS)

    Alves, J. L.; Bouvier, S.; Jomaa, M.; Billardon, R.; Oliveira, M. C.; Menezes, L. F.

    2007-01-01

    The constitutive modeling of the materials' mechanical behavior, usually carried out using a phenomenological constitutive model, i.e., a yield criterion associated to the isotropic and kinematic hardening laws, is of paramount importance in the FEM simulation of the sheet metal forming processes, as well as in the springback prediction. Among others, the kinematic behavior of the yield surface plays an essential role, since it is indispensable to describe the Bauschinger effect, i.e., the materials' answer to the multiple tension-compression cycles to which material points are submitted during the forming process. Several laws are usually used to model and describe the kinematic hardening, namely: a) the Prager's law, which describes a linear evolution of the kinematic hardening with the plastic strain rate tensor b) the Frederick-Armstrong non-linear kinematic hardening, basically a non-linear law with saturation; and c) a more advanced physically-based law, similar to the previous one but sensitive to the strain path changes. In the present paper a mixed kinematic hardening law (linear + non-linear behavior) is proposed and its implementation into a static fully-implicit FE code is described. The material parameters identification for sheet metals using different strategies, and the classical Bauschinger loading tests (i.e. in-plane forward and reverse monotonic loading), are addressed, and their impact on springback prediction evaluated. Some numerical results concerning the springback prediction of the Numisheet'05 Benchmark no. 3 are briefly presented to emphasize the importance of a correct modeling and identification of the kinematic hardening behavior

  7. Multicriteria Personnel Selection by the Modified Fuzzy VIKOR Method

    Directory of Open Access Journals (Sweden)

    Rasim M. Alguliyev

    2015-01-01

    Full Text Available Personnel evaluation is an important process in human resource management. The multicriteria nature and the presence of both qualitative and quantitative factors make it considerably more complex. In this study, a fuzzy hybrid multicriteria decision-making (MCDM model is proposed to personnel evaluation. This model solves personnel evaluation problem in a fuzzy environment where both criteria and weights could be fuzzy sets. The triangular fuzzy numbers are used to evaluate the suitability of personnel and the approximate reasoning of linguistic values. For evaluation, we have selected five information culture criteria. The weights of the criteria were calculated using worst-case method. After that, modified fuzzy VIKOR is proposed to rank the alternatives. The outcome of this research is ranking and selecting best alternative with the help of fuzzy VIKOR and modified fuzzy VIKOR techniques. A comparative analysis of results by fuzzy VIKOR and modified fuzzy VIKOR methods is presented. Experiments showed that the proposed modified fuzzy VIKOR method has some advantages over fuzzy VIKOR method. Firstly, from a computational complexity point of view, the presented model is effective. Secondly, compared to fuzzy VIKOR method, it has high acceptable advantage compared to fuzzy VIKOR method.

  8. Fuzzy commutative algebra and its application in mechanical engineering

    International Nuclear Information System (INIS)

    Han, J.; Song, H.

    1996-01-01

    Based on literature data, this paper discusses the whole mathematical structure about point-fuzzy number set F(R). By introducing some new operations about addition, subtraction, multiplication, division and scalar multiplication, we prove that F(R) can form fuzzy linear space, fuzzy commutative ring, fuzzy commutative algebra in order. Furthermore, we get that A is fuzzy commutative algebra for any fuzzy subset. At last, we give an application of point-fuzzy number to mechanical engineering

  9. A SELF-ORGANISING FUZZY LOGIC CONTROLLER

    African Journals Online (AJOL)

    ES Obe

    One major drawback of fuzzy logic controllers is the difficulty encountered in the construction of a rule- base ... The greatest limitation of fuzzy logic control is the lack ..... c(kT)= e(kT)-e((k-1)T). (16) .... with the aid of fuzzy models”, It in Industrial.

  10. Computer modelling of age hardening for cast aluminium alloys

    International Nuclear Information System (INIS)

    Wu, Linda; Ferguson, W George

    2009-01-01

    Age hardening, or precipitation hardening, is one of the most widely adopted techniques for strengthening of aluminium alloys. Although various age hardening models have been developed for aluminium alloys, from the large volume of literature reviewed, it appears that the bulk of the research has been concentrated on wrought aluminium alloys, only a few of the established precipitation models have been applied to the casting aluminium alloys. In the present work, there are two modelling methods that have been developed and applied to the casting aluminium alloys A356 and A357. One is based on the Shercliff-Ashby methodology to produce a process model, by which we mean a mathematical relationship between process variables (alloy composition, ageing temperature and time) and material properties (yield strength or hardness) through microstructure evolution (precipitate radius, volume fraction). The other method is based on the Kampmann and Wagner Numerical (KWN) model which deals with concomitant nucleation, growth and coarsening and is thus capable of predicting the full evolution of the particle size distribution and then a strength model is used to evaluate the resulting change in hardness or yield strength at room temperature by taking into account contributions from lattice resistance, solid solution hardening and precipitation hardening.

  11. A project of X-ray hardening correction in large ICT

    International Nuclear Information System (INIS)

    Fang Min; Liu Yinong; Ni Jianping

    2005-01-01

    This paper presents a means of polychromatic X-ray beam hardening correction using a standard function to transform the polychromatic projection to monochromatic projection in large Industrial Computed Tomography (ICT). Some parameters were defined to verify the validity of hardening correction in large ICT and optimized. Simulated experiments were used to prove that without prior knowledge of the composition of the scanned object, the correction method using monochromatic reconstruction arithmetic could remove beam hardening artifact greatly. (authors)

  12. Influence of Hardening Model on Weld Residual Stress Distribution

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, Jonathan; Gunnars, Jens (Inspecta Technology AB, Stockholm (Sweden))

    2009-06-15

    This study is the third stage of a project sponsored by the Swedish Radiation Safety Authority (SSM) to improve the weld residual stress modelling procedures currently used in Sweden. The aim of this study was to determine which material hardening model gave the best agreement with experimentally measured weld residual stress distributions. Two girth weld geometries were considered: 19mm and 65mm thick girth welds with Rin/t ratios of 10.5 and 2.8, respectively. The FE solver ABAQUS Standard v6.5 was used for analysis. As a preliminary step some improvements were made to the welding simulation procedure used in part one of the project. First, monotonic stress strain curves and a mixed isotropic/kinematic hardening model were sourced from the literature for 316 stainless steel. Second, more detailed information was obtained regarding the geometry and welding sequence for the Case 1 weld (compared with phase 1 of this project). Following the preliminary step, welding simulations were conducted using isotropic, kinematic and mixed hardening models. The isotropic hardening model gave the best overall agreement with experimental measurements; it is therefore recommended for future use in welding simulations. The mixed hardening model gave good agreement for predictions of the hoop stress but tended to under estimate the magnitude of the axial stress. It must be noted that two different sources of data were used for the isotropic and mixed models in this study and this may have contributed to the discrepancy in predictions. When defining a mixed hardening model it is difficult to delineate the relative contributions of isotropic and kinematic hardening and for the model used it may be that a greater isotropic hardening component should have been specified. The kinematic hardening model consistently underestimated the magnitude of both the axial and hoop stress and is not recommended for use. Two sensitivity studies were also conducted. In the first the effect of using a

  13. Influence of Hardening Model on Weld Residual Stress Distribution

    International Nuclear Information System (INIS)

    Mullins, Jonathan; Gunnars, Jens

    2009-06-01

    This study is the third stage of a project sponsored by the Swedish Radiation Safety Authority (SSM) to improve the weld residual stress modelling procedures currently used in Sweden. The aim of this study was to determine which material hardening model gave the best agreement with experimentally measured weld residual stress distributions. Two girth weld geometries were considered: 19mm and 65mm thick girth welds with Rin/t ratios of 10.5 and 2.8, respectively. The FE solver ABAQUS Standard v6.5 was used for analysis. As a preliminary step some improvements were made to the welding simulation procedure used in part one of the project. First, monotonic stress strain curves and a mixed isotropic/kinematic hardening model were sourced from the literature for 316 stainless steel. Second, more detailed information was obtained regarding the geometry and welding sequence for the Case 1 weld (compared with phase 1 of this project). Following the preliminary step, welding simulations were conducted using isotropic, kinematic and mixed hardening models. The isotropic hardening model gave the best overall agreement with experimental measurements; it is therefore recommended for future use in welding simulations. The mixed hardening model gave good agreement for predictions of the hoop stress but tended to under estimate the magnitude of the axial stress. It must be noted that two different sources of data were used for the isotropic and mixed models in this study and this may have contributed to the discrepancy in predictions. When defining a mixed hardening model it is difficult to delineate the relative contributions of isotropic and kinematic hardening and for the model used it may be that a greater isotropic hardening component should have been specified. The kinematic hardening model consistently underestimated the magnitude of both the axial and hoop stress and is not recommended for use. Two sensitivity studies were also conducted. In the first the effect of using a

  14. [Microstructural changes in hardened beans (Phaseolus vulgaris)].

    Science.gov (United States)

    Mujica, Maria Virginia; Granito, Marisela; Soto, Naudy

    2015-06-01

    (Phaseolus vulgaris). The hardening of Phaseolus vulgaris beans stored at high temperature and high relative humidity is one of the main constraints for consumption. The objective of this research was to evaluate by scanning electron microscopy, structural changes in cotyledons and testa of the hardened beans. The freshly harvested grains were stored for twelve months under two conditions: 5 ° C-34% RH and 37 ° C-75% RH, in order to promote hardening. The stored raw and cooked grains were lyophilized and fractured. The sections of testa and cotyledons were observed in an electron microscope JSM-6390. After twelve months, grains stored at 37 ° C-75% RH increased their hardness by 503%, whereas there were no significant changes in grains stored at 5 ° C-34% RH. At the microstructural level, the cotyledons of the raw grains show clear differences in appearance of the cell wall, into the intercellular space size and texture matrix protein. There were also differences in compaction of palisade and sub-epidermal layer in the testa of raw grains. After cooking, cotyledon cells of the soft grains were well separated while these ofhard grains were seldom separated. In conclusion, the found differences in hard and soft grains showed a significant participation of both structures, cotyledons and testa, in the grains hardening.

  15. Recovering Data from Password Protected Data Security Applications in Android Based Smartphones

    Directory of Open Access Journals (Sweden)

    Hammad Riaz

    2016-06-01

    Full Text Available The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.

  16. A new method for ordering triangular fuzzy numbers

    Directory of Open Access Journals (Sweden)

    S.H. Nasseri

    2010-09-01

    Full Text Available Ranking fuzzy numbers plays a very important role in linguistic decision making and other fuzzy application systems. In spite of many ranking methods, no one can rank fuzzy numbers with human intuition consistently in all cases. Shortcoming are found in some of the convenient methods for ranking triangular fuzzy numbers such as the coefficient of variation (CV index, distance between fuzzy sets, centroid point and original point, and also weighted mean value. In this paper, we introduce a new method for ranking triangular fuzzy number to overcome the shortcomings of the previous techniques. Finally, we compare our method with some convenient methods for ranking fuzzy numbers to illustrate the advantage our method.

  17. Fuzzy Stochastic Optimization Theory, Models and Applications

    CERN Document Server

    Wang, Shuming

    2012-01-01

    Covering in detail both theoretical and practical perspectives, this book is a self-contained and systematic depiction of current fuzzy stochastic optimization that deploys the fuzzy random variable as a core mathematical tool to model the integrated fuzzy random uncertainty. It proceeds in an orderly fashion from the requisite theoretical aspects of the fuzzy random variable to fuzzy stochastic optimization models and their real-life case studies.   The volume reflects the fact that randomness and fuzziness (or vagueness) are two major sources of uncertainty in the real world, with significant implications in a number of settings. In industrial engineering, management and economics, the chances are high that decision makers will be confronted with information that is simultaneously probabilistically uncertain and fuzzily imprecise, and optimization in the form of a decision must be made in an environment that is doubly uncertain, characterized by a co-occurrence of randomness and fuzziness. This book begins...

  18. On a Fuzzy Algebra for Querying Graph Databases

    OpenAIRE

    Pivert , Olivier; Thion , Virginie; Jaudoin , Hélène; Smits , Grégory

    2014-01-01

    International audience; This paper proposes a notion of fuzzy graph database and describes a fuzzy query algebra that makes it possible to handle such database, which may be fuzzy or not, in a flexible way. The algebra, based on fuzzy set theory and the concept of a fuzzy graph, is composed of a set of operators that can be used to express preference queries on fuzzy graph databases. The preferences concern i) the content of the vertices of the graph and ii) the structure of the graph. In a s...

  19. An Integrated Approach of Fuzzy Linguistic Preference Based AHP and Fuzzy COPRAS for Machine Tool Evaluation.

    Directory of Open Access Journals (Sweden)

    Huu-Tho Nguyen

    Full Text Available Globalization of business and competitiveness in manufacturing has forced companies to improve their manufacturing facilities to respond to market requirements. Machine tool evaluation involves an essential decision using imprecise and vague information, and plays a major role to improve the productivity and flexibility in manufacturing. The aim of this study is to present an integrated approach for decision-making in machine tool selection. This paper is focused on the integration of a consistent fuzzy AHP (Analytic Hierarchy Process and a fuzzy COmplex PRoportional ASsessment (COPRAS for multi-attribute decision-making in selecting the most suitable machine tool. In this method, the fuzzy linguistic reference relation is integrated into AHP to handle the imprecise and vague information, and to simplify the data collection for the pair-wise comparison matrix of the AHP which determines the weights of attributes. The output of the fuzzy AHP is imported into the fuzzy COPRAS method for ranking alternatives through the closeness coefficient. Presentation of the proposed model application is provided by a numerical example based on the collection of data by questionnaire and from the literature. The results highlight the integration of the improved fuzzy AHP and the fuzzy COPRAS as a precise tool and provide effective multi-attribute decision-making for evaluating the machine tool in the uncertain environment.

  20. Fuzzy neural network theory and application

    CERN Document Server

    Liu, Puyin

    2004-01-01

    This book systematically synthesizes research achievements in the field of fuzzy neural networks in recent years. It also provides a comprehensive presentation of the developments in fuzzy neural networks, with regard to theory as well as their application to system modeling and image restoration. Special emphasis is placed on the fundamental concepts and architecture analysis of fuzzy neural networks. The book is unique in treating all kinds of fuzzy neural networks and their learning algorithms and universal approximations, and employing simulation examples which are carefully designed to he

  1. Concrete, hardened: Self desiccation

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan De Place; Hansen, Kurt Kielsgaard; Persson, Bertil

    1999-01-01

    The test method covers the determination of internal relative humidity (RH) in hardened concrete and cement mortar using RH instruments. The determination of RH is done on crushed samples of concrete or cement motar. This test method is only for measuring equipment which gives off or takes up...

  2. Fuzzy preference based interactive fuzzy physical programming and its application in multi-objective optimization

    International Nuclear Information System (INIS)

    Zhang, Xu; Huang, Hong Zhong; Yu, Lanfeng

    2006-01-01

    Interactive Fuzzy Physical Programming (IFPP) developed in this paper is a new efficient multi-objective optimization method, which retains the advantages of physical programming while considering the fuzziness of the designer's preferences. The fuzzy preference function is introduced based on the model of linear physical programming, which is used to guide the search for improved solutions by interactive decision analysis. The example of multi-objective optimization design of the spindle of internal grinder demonstrates that the improved preference conforms to the subjective desires of the designer

  3. Fuzzy Nonnative Phonolexical Representations Lead to Fuzzy Form-to-Meaning Mappings

    Directory of Open Access Journals (Sweden)

    Svetlana V Cook

    2016-09-01

    Full Text Available The present paper explores nonnative (L2 phonological encoding of lexical entries and dissociates the difficulties associated with L2 phonological and phonolexical encoding by focusing on similarly sounding L2 words that are not differentiated by difficult phonological contrasts. We test two main claims of the fuzzy lexicon hypothesis: (1 L2 fuzzy phonolexical representations are not fully specified and lack details at both phonological and phonolexical levels of representation (Experiment 1; and (2 fuzzy phonolexical representations can lead to establishing incorrect form-to-meaning mappings (Experiment 2.The Russian-English Translation Priming task (Experiment 1, TJT explores how the degree of phonolexical similarity between a word and its lexical competitor affects lexical access of Russian words. Words with smaller phonolexical distance (e.g., parent - parrot show longer reaction times and lower accuracy compared to words with a larger phonolexical distance (e.g., parent – parchment in lower-proficiency nonnative speakers, and, to a lesser degree, higher-proficiency speakers. This points to a lack of detail in nonnative phonolexical representations necessary for efficient lexical access. The Russian Pseudo-Semantic Priming task (Experiment 2, PSP addresses the vulnerability of form-to-meaning mappings as a consequence of fuzzy phonolexical representations in L2. We primed the target with a word semantically related to its phonological competitor, or a potentially confusable word. The findings of Experiment 2 extend the results of Experiment 1 that, unlike native speakers, nonnative speakers do not properly encode phonolexical information. As a result, they are prone to access an incorrect lexical representation of a competitor word, as indicated by a slowdown in the judgments to confusable words.The study provides evidence that fuzzy phonolexical representations result in unfaithful form-to-meaning mappings, which lead to retrieval of

  4. An extension of fuzzy decisi

    Directory of Open Access Journals (Sweden)

    Basem Mohamed Elomda

    2013-07-01

    Full Text Available This paper presents a new extension to Fuzzy Decision Maps (FDMs by allowing use of fuzzy linguistic values to represent relative importance among criteria in the preference matrix as well as representing relative influence among criteria for computing the steady-state matrix in the stage of Fuzzy Cognitive Map (FCM. The proposed model is called the Linguistic Fuzzy Decision Networks (LFDNs. The proposed LFDN provides considerable flexibility to decision makers when solving real world Multi-Criteria Decision-Making (MCDM problems. The performance of the proposed LFDN model is compared with the original FDM using a previously published case study. The result of comparison ensures the ability to draw the same decisions with a more realistic decision environment.

  5. Radiation-hardened CMOS/SOS LSI circuits

    International Nuclear Information System (INIS)

    Aubuchon, K.G.; Peterson, H.T.; Shumake, D.P.

    1976-01-01

    The recently developed technology for building radiation-hardened CMOS/SOS devices has now been applied to the fabrication of LSI circuits. This paper describes and presents results on three different circuits: an 8-bit adder/subtractor (Al gate), a 256-bit shift register (Si gate), and a polycode generator (Al gate). The 256-bit shift register shows very little degradation after 1 x 10 6 rads (Si), with an increase from 1.9V to 2.9V in minimum operating voltage, a decrease of about 20% in maximum frequency, and little or no change in quiescent current. The p-channel thresholds increase from -0.9V to -1.3V, while the n-channel thresholds decrease from 1.05 to 0.23V, and the n-channel leakage remains below 1nA/mil. Excellent hardening results were also obtained on the polycode generator circuit. Ten circuits were irradiated to 1 x 10 6 rads (Si), and all continued to function well, with an increase in minimum power supply voltage from 2.85V to 5.85V and an increase in quiescent current by a factor of about 2. Similar hardening results were obtained on the 8-bit adder, with the minimum power supply voltage increasing from 2.2V to 4.6V and the add time increasing from 270 to 350 nsec after 1 x 10 6 rads (Si). These results show that large CMOS/SOS circuits can be hardened to above 1 x 10 6 rads (Si) with either the Si gate or Al gate technology. The paper also discusses the relative advantages of the Si gate versus the Al gate technology

  6. Beam hardening correction algorithm in microtomography images

    International Nuclear Information System (INIS)

    Sales, Erika S.; Lima, Inaya C.B.; Lopes, Ricardo T.; Assis, Joaquim T. de

    2009-01-01

    Quantification of mineral density of bone samples is directly related to the attenuation coefficient of bone. The X-rays used in microtomography images are polychromatic and have a moderately broad spectrum of energy, which makes the low-energy X-rays passing through a sample to be absorbed, causing a decrease in the attenuation coefficient and possibly artifacts. This decrease in the attenuation coefficient is due to a process called beam hardening. In this work the beam hardening of microtomography images of vertebrae of Wistar rats subjected to a study of hyperthyroidism was corrected by the method of linearization of the projections. It was discretized using a spectrum in energy, also called the spectrum of Herman. The results without correction for beam hardening showed significant differences in bone volume, which could lead to a possible diagnosis of osteoporosis. But the data with correction showed a decrease in bone volume, but this decrease was not significant in a confidence interval of 95%. (author)

  7. Beam hardening correction algorithm in microtomography images

    Energy Technology Data Exchange (ETDEWEB)

    Sales, Erika S.; Lima, Inaya C.B.; Lopes, Ricardo T., E-mail: esales@con.ufrj.b, E-mail: ricardo@lin.ufrj.b [Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Lab. de Instrumentacao Nuclear; Assis, Joaquim T. de, E-mail: joaquim@iprj.uerj.b [Universidade do Estado do Rio de Janeiro (UERJ), Nova Friburgo, RJ (Brazil). Inst. Politecnico. Dept. de Engenharia Mecanica

    2009-07-01

    Quantification of mineral density of bone samples is directly related to the attenuation coefficient of bone. The X-rays used in microtomography images are polychromatic and have a moderately broad spectrum of energy, which makes the low-energy X-rays passing through a sample to be absorbed, causing a decrease in the attenuation coefficient and possibly artifacts. This decrease in the attenuation coefficient is due to a process called beam hardening. In this work the beam hardening of microtomography images of vertebrae of Wistar rats subjected to a study of hyperthyroidism was corrected by the method of linearization of the projections. It was discretized using a spectrum in energy, also called the spectrum of Herman. The results without correction for beam hardening showed significant differences in bone volume, which could lead to a possible diagnosis of osteoporosis. But the data with correction showed a decrease in bone volume, but this decrease was not significant in a confidence interval of 95%. (author)

  8. Evaluation of hardening by ion irradiation in molybdenum using nanoindentation techniques

    International Nuclear Information System (INIS)

    Iwakiri, Hirotomi; Watanabe, Hideo; Yoshida, Naoaki

    1997-01-01

    As a part of fundamental research on interaction of plasma and wall, some model experiments on loading of particles such as He, H and so forth suffered by plasma facing material were conducted for Mo in high Z material. As an evaluation method for it, nanoindentation technique was proposed. By this method, the hardness evaluation in surface neighboring damage range was conducted. As a result, in the helium irradiated materials, sufficient hardening was observed even at low dpa range impossible to recognize hardening on heavy ion and deuterium irradiated materials, and extreme hardening was established by formation of helium bubble at high dpa region. Furthermore, in the helium irradiated materials, recovery of hardening could not be observed even for annealed materials at 1173 K for 1 hr after irradiation. From such results, hardening promotion work due to helium and extreme thermal stability of the formed defects were elucidated. (B.K.)

  9. Fuzzy control for optimal operation of complex chilling systems; Betriebsoptimierung von komplexen Kaelteanlagen mit Fuzzy-Control

    Energy Technology Data Exchange (ETDEWEB)

    Talebi-Daryani, R. [Fachhochschule Koeln (Germany). Lehrgebiet und Lab. fuer Regelungs- und Gebaeudeleittechnik; Luther, C. [JCI Regelungstechnik GmbH, Koeln (Germany)

    1998-05-01

    The optimization potentials for the operation of chilling systems within the building supervisory control systems are limited to abilities of PLC functions with their binary logic. The aim of this project is to replace inefficient PLC-solutions for the operation of chilling system by a Fuzzy control system. Optimal operation means: reducing operation time and operation costs of the system, reducing cooling energy generation- and consumption costs. Analysis of the thermal behaviour of the building and the chilling system is necessary, in order to find the current efficient cooling potentials and cooling methods during the operation. Three different Fuzzy controller have been developed with a total rule number of just 70. This realized Fuzzy control system is able to forecast the maximum cooling power of the building, but also to determine the cooling potential of the out door air. This new Fuzzy control system has been successfully commissioned, and remarkable improvement of the system behaviour is reached. Comparison of the system behaviour before and after the implementation of Fuzzy control system proved the benefits of the Fuzzy logic based operation system realized here. The system described here is a joint project between the University of applied sciences Cologne, and Johnson Controls International Cologne. The Fuzzy software tool used here (SUCO soft Fuzzy TECH 4.0), was provided by Kloeckner Moeller Bonn. (orig.) [Deutsch] Die Betriebsoptimierung von Kaelteanlagen innerhalb von Gebaeudeleitsystemen ist auf die Faehigkeiten von logischen Steuerverknuepfungen der Digitaltechnik begrenzt. In diesem Zusammenhang kann nur ein geringer Anteil der Information ueber das thermische Speicherverhalten des jeweiligen Gebaeudes herangezogen werden. Ziel des vorliegenden Projektes war es, die unzureichenden logischen Steuerverknuepfungen durch ein Fuzzy-Control-System zu ersetzen, um die Arbeitsweise der Kaelteanlage zu optimieren. Die Optimierungskriterien dieses

  10. Forecasting Enrollments with Fuzzy Time Series.

    Science.gov (United States)

    Song, Qiang; Chissom, Brad S.

    The concept of fuzzy time series is introduced and used to forecast the enrollment of a university. Fuzzy time series, an aspect of fuzzy set theory, forecasts enrollment using a first-order time-invariant model. To evaluate the model, the conventional linear regression technique is applied and the predicted values obtained are compared to the…

  11. Fuzzy control of pressurizer dynamic process

    International Nuclear Information System (INIS)

    Ming Zhedong; Zhao Fuyu

    2006-01-01

    Considering the characteristics of pressurizer dynamic process, the fuzzy control system that takes the advantages of both fuzzy controller and PID controller is designed for the dynamic process in pressurizer. The simulation results illustrate this type of composite control system is with better qualities than those of single fuzzy controller and single PID controller. (authors)

  12. A version of Stone-Weierstrass theorem in Fuzzy Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Font, J.J.; Sanchis, D.; Sanchis, M.

    2017-07-01

    Fuzzy numbers provide formalized tools to deal with non-precise quantities. They are indeed fuzzy sets in the real line and were introduced in 1978 by Dubois and Prade , who also defined their basic operations. Since then, Fuzzy Analysis has developed based on the notion of fuzzy number just as much as classical Real Analysis did based on the concept of real number. Such development was eased by a characterization of fuzzy numbers provided in 1986 by Goetschel and Voxman leaning on their level sets. As in the classical setting, continuous fuzzy-valued functions (fuzzy functions) are the central core of the theory. The principal difference with regard to real-valued continuous functions is the fact that the fuzzy numbers do not form a vectorial space, which determines all the results, and, especially, the proofs. The study of fuzzy functions has developed, principally, about two lines of investigation: - Differential fuzzy equations, which have turned out to be the natural way of modelling physical and engineering problems in contexts where the parameters are vague or incomplete. - The problem of approximation of fuzzy functions, basically using the approximation capability of fuzzy neural networks. We will focus on this second line of investigation, though our approach will be more general and based on an adaptation of the famous Stone-Weierstrass Theorem to the fuzzy context. This way so, we introduce the concept of “multiplier” of a set of fuzzy functions and use it to give a constructive proof of a Stone-Weiestrass type theorem for fuzzy functions. (Author)

  13. Qualitative assessment of environmental impacts through fuzzy logic

    International Nuclear Information System (INIS)

    Peche G, Roberto

    2008-01-01

    The vagueness of many concepts usually utilized in environmental impact studies, along with frequent lack of quantitative information, suggests that fuzzy logic can be applied to carry out qualitative assessment of such impacts. This paper proposes a method for valuing environmental impacts caused by projects, based on fuzzy sets theory and methods of approximate reasoning. First, impacts must be described by a set of features. A linguistic variable is assigned to each feature, whose values are fuzzy sets. A fuzzy evaluation of environmental impacts is achieved using rule based fuzzy inference and the estimated fuzzy value of each feature. Generalized modus ponens has been the inference method. Finally, a crisp value of impact is attained by aggregation and defuzzification of all fuzzy results

  14. Experiment research on grind-hardening of AISI5140 steel based on thermal copensation

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Xiang Ming; Ren, Ying Hui; Zheng, Bo; Zhou, Zhixiong [College of Mechanical and Vehicle Engineering, Hunan University, Changsha, Hunan (China); Deng, Zhao Hui [Key Laboratory for High Efficiency and Precision Machining of Difficult-to-Cut Material of Hunan Province, Hunan (China)

    2016-08-15

    The grind-hardening process utilizes the heat generated to induce martensitic phase transformation. However, the maximum achievable harden layer depth is limited due to high grinding forces, and the tensile residual stress appears on the ground surface in the grind-hardening process. This paper proposes a new grind-hardening technology using thermal compensation. The workpiece of AISI5140 steel is preheated by electric resistance heating, and ground under the condition of the workpiece temperature 25°C, 120°C, 180°C and 240°C. The grinding force, harden layer depth and surface quality including residual stress on ground surface, surface roughness and micro-hardness are investigated. The experimental results show that a deep harden layer with a fine grain martensite can be obtained with the thermal compensation. The ground workpiece surface produces a certain compressive residual stress, and the residual compressive stress value increases with preheating temperature. As the preheating temperature increases, grinding force slightly decreases, while there is slightly increment of surface roughness. Compared with the conventional grind-hardening process, both the harden layer depth and residual stress distribution are significantly improved.

  15. a New Model for Fuzzy Personalized Route Planning Using Fuzzy Linguistic Preference Relation

    Science.gov (United States)

    Nadi, S.; Houshyaripour, A. H.

    2017-09-01

    This paper proposes a new model for personalized route planning under uncertain condition. Personalized routing, involves different sources of uncertainty. These uncertainties can be raised from user's ambiguity about their preferences, imprecise criteria values and modelling process. The proposed model uses Fuzzy Linguistic Preference Relation Analytical Hierarchical Process (FLPRAHP) to analyse user's preferences under uncertainty. Routing is a multi-criteria task especially in transportation networks, where the users wish to optimize their routes based on different criteria. However, due to the lake of knowledge about the preferences of different users and uncertainties available in the criteria values, we propose a new personalized fuzzy routing method based on the fuzzy ranking using center of gravity. The model employed FLPRAHP method to aggregate uncertain criteria values regarding uncertain user's preferences while improve consistency with least possible comparisons. An illustrative example presents the effectiveness and capability of the proposed model to calculate best personalize route under fuzziness and uncertainty.

  16. Consolidity analysis for fully fuzzy functions, matrices, probability and statistics

    Directory of Open Access Journals (Sweden)

    Walaa Ibrahim Gabr

    2015-03-01

    Full Text Available The paper presents a comprehensive review of the know-how for developing the systems consolidity theory for modeling, analysis, optimization and design in fully fuzzy environment. The solving of systems consolidity theory included its development for handling new functions of different dimensionalities, fuzzy analytic geometry, fuzzy vector analysis, functions of fuzzy complex variables, ordinary differentiation of fuzzy functions and partial fraction of fuzzy polynomials. On the other hand, the handling of fuzzy matrices covered determinants of fuzzy matrices, the eigenvalues of fuzzy matrices, and solving least-squares fuzzy linear equations. The approach demonstrated to be also applicable in a systematic way in handling new fuzzy probabilistic and statistical problems. This included extending the conventional probabilistic and statistical analysis for handling fuzzy random data. Application also covered the consolidity of fuzzy optimization problems. Various numerical examples solved have demonstrated that the new consolidity concept is highly effective in solving in a compact form the propagation of fuzziness in linear, nonlinear, multivariable and dynamic problems with different types of complexities. Finally, it is demonstrated that the implementation of the suggested fuzzy mathematics can be easily embedded within normal mathematics through building special fuzzy functions library inside the computational Matlab Toolbox or using other similar software languages.

  17. An Extension of the Fuzzy Possibilistic Clustering Algorithm Using Type-2 Fuzzy Logic Techniques

    Directory of Open Access Journals (Sweden)

    Elid Rubio

    2017-01-01

    Full Text Available In this work an extension of the Fuzzy Possibilistic C-Means (FPCM algorithm using Type-2 Fuzzy Logic Techniques is presented, and this is done in order to improve the efficiency of FPCM algorithm. With the purpose of observing the performance of the proposal against the Interval Type-2 Fuzzy C-Means algorithm, several experiments were made using both algorithms with well-known datasets, such as Wine, WDBC, Iris Flower, Ionosphere, Abalone, and Cover type. In addition some experiments were performed using another set of test images to observe the behavior of both of the above-mentioned algorithms in image preprocessing. Some comparisons are performed between the proposed algorithm and the Interval Type-2 Fuzzy C-Means (IT2FCM algorithm to observe if the proposed approach has better performance than this algorithm.

  18. A study on generalized hesitant intuitionistic Fuzzy soft sets

    Science.gov (United States)

    Nazra, A.; Syafruddin; Wicaksono, G. C.; Syafwan, M.

    2018-03-01

    By combining the concept of hesitant intuitionistic fuzzy sets, fuzzy soft sets and fuzzy sets, we extend hesitant intuitionistic fuzzy soft sets to a generalized hesitant intuitionistic fuzzy soft sets. Some operations on generalized hesitant intuitionistic fuzzy soft sets, such as union, complement, operations “AND” and “OR”, and intersection are defined. From such operations the authors obtain related properties such as commutative, associative and De Morgan's laws. The authors also get an algebraic structure of the collection of all generalized hesitant intuitionistic fuzzy soft sets over a set.

  19. Grind hardening process

    CERN Document Server

    Salonitis, Konstantinos

    2015-01-01

    This book presents the grind-hardening process and the main studies published since it was introduced in 1990s.  The modelling of the various aspects of the process, such as the process forces, temperature profile developed, hardness profiles, residual stresses etc. are described in detail. The book is of interest to the research community working with mathematical modeling and optimization of manufacturing processes.

  20. A note on the L-fuzzy Banach's contraction principle

    International Nuclear Information System (INIS)

    Martinez-Moreno, J.; Roldan, A.; Roldan, C.

    2009-01-01

    Recently, Alaca et al. [Alaca C, Turkoglu D, Yildiz C. Fixed points in intuitionistic fuzzy metric spaces. Chaos, Solitons and Fractals 2006;29:10738] proved fuzzy Banach fixed point theorem in intuitionistic fuzzy metric spaces and Saadati [Saadati R. Notes to the paper 'fixed points in intuitionistic fuzzy metric spaces' and its generalization to L-fuzzy metric spaces. Chaos, Solitions and Fractals 2008;35:80-176] extended it in generalized fuzzy metric spaces. The purpose of this paper is to give a correct proof of the main result in Saadati [Saadati R. Notes to the paper 'fixed points in intuitionistic fuzzy metric spaces' and its generalization to L-fuzzy metric spaces. Chaos, Solitions and Fractals 2008;35:80-176].

  1. FUZZY LOGIC IN LEGAL EDUCATION

    Directory of Open Access Journals (Sweden)

    Z. Gonul BALKIR

    2011-04-01

    Full Text Available The necessity of examination of every case within its peculiar conditions in social sciences requires different approaches complying with the spirit and nature of social sciences. Multiple realities require different and various perceptual interpretations. In modern world and social sciences, interpretation of perception of valued and multi-valued have been started to be understood by the principles of fuzziness and fuzzy logic. Having the verbally expressible degrees of truthness such as true, very true, rather true, etc. fuzzy logic provides the opportunity for the interpretation of especially complex and rather vague set of information by flexibility or equivalence of the variables’ of fuzzy limitations. The methods and principles of fuzzy logic can be benefited in examination of the methodological problems of law, especially in the applications of filling the legal loopholes arising from the ambiguities and interpretation problems in order to understand the legal rules in a more comprehensible and applicable way and the efficiency of legal implications. On the other hand, fuzzy logic can be used as a technical legal method in legal education and especially in legal case studies and legal practice applications in order to provide the perception of law as a value and the more comprehensive and more quality perception and interpretation of value of justice, which is the core value of law. In the perception of what happened as it has happened in legal relationships and formations, the understanding of social reality and sociological legal rules with multi valued sense perspective and the their applications in accordance with the fuzzy logic’s methods could create more equivalent and just results. It can be useful for the young lawyers and law students as a facilitating legal method especially in the materialization of the perception and interpretation of multi valued and variables. Using methods and principles of fuzzy logic in legal

  2. Comparative Study of Hardening Mechanisms During Aging of a 304 Stainless Steel Containing α'-Martensite

    Science.gov (United States)

    Jeong, S. W.; Kang, U. G.; Choi, J. Y.; Nam, W. J.

    2012-09-01

    Strain aging and hardening behaviors of a 304 stainless steel containing deformation-induced martensite were investigated by examining mechanical properties and microstructural evolution for different aging temperature and time. Introduced age hardening mechanisms of a cold rolled 304 stainless steel were the additional formation of α'-martensite, hardening of α'-martensite, and hardening of deformed austenite. The increased amount of α'-martensite at an aging temperature of 450 °C confirmed the additional formation of α'-martensite as a hardening mechanism in a cold rolled 304 stainless steel. Additionally, the increased hardness in both α'-martensite and austenite phases with aging temperature proved that hardening of both α'-martensite and austenite phases would be effective as hardening mechanisms in cold rolled and aged 304 stainless steels. The results suggested that among hardening mechanisms, hardening of an α'-martensite phase, including the diffusion of interstitial solute carbon atoms to dislocations and the precipitation of fine carbide particles would become a major hardening mechanism during aging of cold rolled 304 stainless steels.

  3. Analysis of the work-hardening process in spheroidized steels

    International Nuclear Information System (INIS)

    Pacheco, J.L.

    1981-07-01

    An elementary model for the work-hardening process in duplex-structures steels (ferrite - spheroidite) is proposed and tested on low, medium and high carbon content, which seems to give good results concerning the influence of the volume fraction and particle size of the second phase on the work-hardening behaviour. (Author) [pt

  4. Design and characterization of cellulose nanocrystal-enhanced epoxy hardeners

    Science.gov (United States)

    Shane X. Peng; Robert J. Moon; Jeffrey P. Youngblood

    2014-01-01

    Cellulose nanocrystals (CNCs) are renewable, sustainable, and abundant nanomaterial widely used as reinforcing fillers in the field of polymer nanocomposites. In this study, two-part epoxy systems with CNC-enhanced hardeners were fabricated. Three types of hardeners, Jeffamine D400 (JD400), diethylenetriamine (DETA), and (±)-trans-1,2- diaminocyclohexane (DACH), were...

  5. More on θ-compact fuzzy topological spaces

    International Nuclear Information System (INIS)

    Ekici, Erdal

    2006-01-01

    Recently, El-Naschie has shown that the notion of fuzzy topology may be relevant to quantum particle physics in connection with string theory and ε ∞ theory. In 2005, Caldas and Jafari have introduced θ-compact fuzzy topological spaces. The purpose of this paper is to investigate further properties of θ-compact fuzzy topological spaces. Moreover, the notion of θ-closed fuzzy topological spaces is introduced and properties of it are obtained

  6. Physical and Thermodynamical Properties of Water Phases in Hardening Portland Cement Systems

    DEFF Research Database (Denmark)

    Hansen, T. Bæk

    The present study is devoted to the description of water phases in hardening portland cement paste systems containing a significant amount of micro-filler and having a low to moderate water/powder ratio. Emphasis has been placed on the early stages of the hardening process.......The present study is devoted to the description of water phases in hardening portland cement paste systems containing a significant amount of micro-filler and having a low to moderate water/powder ratio. Emphasis has been placed on the early stages of the hardening process....

  7. Risk Mapping of Cutaneous Leishmaniasis via a Fuzzy C Means-based Neuro-Fuzzy Inference System

    Science.gov (United States)

    Akhavan, P.; Karimi, M.; Pahlavani, P.

    2014-10-01

    Finding pathogenic factors and how they are spread in the environment has become a global demand, recently. Cutaneous Leishmaniasis (CL) created by Leishmania is a special parasitic disease which can be passed on to human through phlebotomus of vector-born. Studies show that economic situation, cultural issues, as well as environmental and ecological conditions can affect the prevalence of this disease. In this study, Data Mining is utilized in order to predict CL prevalence rate and obtain a risk map. This case is based on effective environmental parameters on CL and a Neuro-Fuzzy system was also used. Learning capacity of Neuro-Fuzzy systems in neural network on one hand and reasoning power of fuzzy systems on the other, make it very efficient to use. In this research, in order to predict CL prevalence rate, an adaptive Neuro-fuzzy inference system with fuzzy inference structure of fuzzy C Means clustering was applied to determine the initial membership functions. Regarding to high incidence of CL in Ilam province, counties of Ilam, Mehran, and Dehloran have been examined and evaluated. The CL prevalence rate was predicted in 2012 by providing effective environmental map and topography properties including temperature, moisture, annual, rainfall, vegetation and elevation. Results indicate that the model precision with fuzzy C Means clustering structure rises acceptable RMSE values of both training and checking data and support our analyses. Using the proposed data mining technology, the pattern of disease spatial distribution and vulnerable areas become identifiable and the map can be used by experts and decision makers of public health as a useful tool in management and optimal decision-making.

  8. Risk Mapping of Cutaneous Leishmaniasis via a Fuzzy C Means-based Neuro-Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    P. Akhavan

    2014-10-01

    Full Text Available Finding pathogenic factors and how they are spread in the environment has become a global demand, recently. Cutaneous Leishmaniasis (CL created by Leishmania is a special parasitic disease which can be passed on to human through phlebotomus of vector-born. Studies show that economic situation, cultural issues, as well as environmental and ecological conditions can affect the prevalence of this disease. In this study, Data Mining is utilized in order to predict CL prevalence rate and obtain a risk map. This case is based on effective environmental parameters on CL and a Neuro-Fuzzy system was also used. Learning capacity of Neuro-Fuzzy systems in neural network on one hand and reasoning power of fuzzy systems on the other, make it very efficient to use. In this research, in order to predict CL prevalence rate, an adaptive Neuro-fuzzy inference system with fuzzy inference structure of fuzzy C Means clustering was applied to determine the initial membership functions. Regarding to high incidence of CL in Ilam province, counties of Ilam, Mehran, and Dehloran have been examined and evaluated. The CL prevalence rate was predicted in 2012 by providing effective environmental map and topography properties including temperature, moisture, annual, rainfall, vegetation and elevation. Results indicate that the model precision with fuzzy C Means clustering structure rises acceptable RMSE values of both training and checking data and support our analyses. Using the proposed data mining technology, the pattern of disease spatial distribution and vulnerable areas become identifiable and the map can be used by experts and decision makers of public health as a useful tool in management and optimal decision-making.

  9. Stabilization of nonlinear systems using sampled-data output-feedback fuzzy controller based on polynomial-fuzzy-model-based control approach.

    Science.gov (United States)

    Lam, H K

    2012-02-01

    This paper investigates the stability of sampled-data output-feedback (SDOF) polynomial-fuzzy-model-based control systems. Representing the nonlinear plant using a polynomial fuzzy model, an SDOF fuzzy controller is proposed to perform the control process using the system output information. As only the system output is available for feedback compensation, it is more challenging for the controller design and system analysis compared to the full-state-feedback case. Furthermore, because of the sampling activity, the control signal is kept constant by the zero-order hold during the sampling period, which complicates the system dynamics and makes the stability analysis more difficult. In this paper, two cases of SDOF fuzzy controllers, which either share the same number of fuzzy rules or not, are considered. The system stability is investigated based on the Lyapunov stability theory using the sum-of-squares (SOS) approach. SOS-based stability conditions are obtained to guarantee the system stability and synthesize the SDOF fuzzy controller. Simulation examples are given to demonstrate the merits of the proposed SDOF fuzzy control approach.

  10. Radiation hardening revisited: Role of intracascade clustering

    DEFF Research Database (Denmark)

    Singh, B.N.; Foreman, A.J.E.; Trinkaus, H.

    1997-01-01

    be explained in terms of conventional dispersed-barrier hardening because (a) the grown-in dislocations are not free, and (b) irradiation-induced defect clusters are not rigid indestructible Orowan obstacles. A new model called 'cascade-induced source hardening' is presented where glissile loops produced...... directly in cascades are envisaged to decorate the grown-in dislocations so that they cannot act as dislocation sources. The upper yield stress is related to the breakaway stress which is necessary to pull the dislocation away from the clusters/loops decorating it. The magnitude of the breakaway stress has...

  11. A Combined Fuzzy-AHP and Fuzzy-GRA Methodology for Hydrogen Energy Storage Method Selection in Turkey

    Directory of Open Access Journals (Sweden)

    Aytac Yildiz

    2013-06-01

    Full Text Available In this paper, we aim to select the most appropriate Hydrogen Energy Storage (HES method for Turkey from among the alternatives of tank, metal hydride and chemical storage, which are determined based on expert opinions and literature review. Thus, we propose a Buckley extension based fuzzy Analytical Hierarchical Process (Fuzzy-AHP and linear normalization based fuzzy Grey Relational Analysis (Fuzzy-GRA combined Multi Criteria Decision Making (MCDM methodology. This combined approach can be applied to a complex decision process, which often makes sense with subjective data or vague information; and used to solve to solve HES selection problem with different defuzzification methods. The proposed approach is unique both in the HES literature and the MCDM literature.

  12. Type-2 fuzzy granular models

    CERN Document Server

    Sanchez, Mauricio A; Castro, Juan R

    2017-01-01

    In this book, a series of granular algorithms are proposed. A nature inspired granular algorithm based on Newtonian gravitational forces is proposed. A series of methods for the formation of higher-type information granules represented by Interval Type-2 Fuzzy Sets are also shown, via multiple approaches, such as Coefficient of Variation, principle of justifiable granularity, uncertainty-based information concept, and numerical evidence based. And a fuzzy granular application comparison is given as to demonstrate the differences in how uncertainty affects the performance of fuzzy information granules.

  13. Fuzzy expert systems using CLIPS

    Science.gov (United States)

    Le, Thach C.

    1994-01-01

    This paper describes a CLIPS-based fuzzy expert system development environment called FCLIPS and illustrates its application to the simulated cart-pole balancing problem. FCLIPS is a straightforward extension of CLIPS without any alteration to the CLIPS internal structures. It makes use of the object-oriented and module features in CLIPS version 6.0 for the implementation of fuzzy logic concepts. Systems of varying degrees of mixed Boolean and fuzzy rules can be implemented in CLIPS. Design and implementation issues of FCLIPS will also be discussed.

  14. Possibility Fuzzy Soft Set

    Directory of Open Access Journals (Sweden)

    Shawkat Alkhazaleh

    2011-01-01

    Full Text Available We introduce the concept of possibility fuzzy soft set and its operation and study some of its properties. We give applications of this theory in solving a decision-making problem. We also introduce a similarity measure of two possibility fuzzy soft sets and discuss their application in a medical diagnosis problem.

  15. MOULDING MIXTURES HARDENING PROCESS BASED ON LIGNIN-BASE SULPHONATE BINDER

    Directory of Open Access Journals (Sweden)

    V. N. Ektova

    2004-01-01

    Full Text Available Hardening of agglutinant sands on lignosulphonate binding agent is the result of two processes: oxidation-reduction in the system lignosulphonate acids — persulfuric natrium in the early stages of hardening and hydration of cement in the latter stages.

  16. Operator’s Fuzzy Norm and Some Properties

    OpenAIRE

    Bag, T.; Samanta, S.K.

    2015-01-01

    In this paper, a concept of operator’s fuzzy norm is introduced for the first time in general t-norm setting. Ideas of fuzzy continuous operators, fuzzy bounded linear operators are given with some properties of such operators studied in this general setting.

  17. The majority rule in a fuzzy environment.

    OpenAIRE

    Montero, Javier

    1986-01-01

    In this paper, an axiomatic approach to rational decision making in a fuzzy environment is studied. In particular, the majority rule is proposed as a rational way for aggregating fuzzy opinions in a group, when such agroup is defined as a fuzzy set.

  18. New types of bipolar fuzzy sets in -semihypergroups

    Directory of Open Access Journals (Sweden)

    Naveed Yaqoob

    2016-04-01

    Full Text Available The notion of bipolar fuzzy set was initiated by Lee (2000 as a generalization of the notion fuzzy sets and intuitionistic fuzzy sets, which have drawn attention of many mathematicians and computer scientists. In this paper, we initiate a study on bipolar ( , -fuzzy sets in -semihypergroups. By using the concept of bipolar ( , -fuzzy sets (Yaqoob and Ansari, 2013, we introduce the notion of bipolar ( , -fuzzy sub -semihypergroups (-hyperideals and bi--hyperideals and discuss some basic results on bipolar ( , -fuzzy sets in -semihypergroups. Furthermore, we define the bipolar fuzzy subset ,               and prove that if  ,       is a bipolar ( , -fuzzy sub -semihypergroup (resp., -hyperideal and bi--hyperideal of H; then ,               is also a bipolar ( , -fuzzy sub -semihypergroup (resp., -hyperideal and bi--hyperideal of H.

  19. Make man-machine communication easier: fuzzy programming

    Energy Technology Data Exchange (ETDEWEB)

    Farreny, H; Prade, H

    1982-06-01

    Procedures and data used by the human brain are not always accurately specified; fuzzy programming may help in the realisation of languages for the manipulation of such fuzzy entities. After having considered fuzzy instruction and its requirements, arguments, functions, predicates and designations, the authors present the outlines of a fuzzy filtering system. Two applications are given as examples; these are the accessing of a database and an expert system which may be used to solve problems in robotics.

  20. Radiation-hardened optoelectronic components: detectors

    International Nuclear Information System (INIS)

    Wiczer, J.J.

    1986-01-01

    In this talk, we will survey recent research in the area of radiation hardened optical detectors. We have studied conventional silicon photodiode structures, special radiation hardened silicon photodiodes, and special double heterojunction AlGaAs/GaAs photodiodes in neutron, gamma, pulsed x-ray and charged particle environments. We will present results of our work and summarize other research in this area. Our studies have shown that detectors can be made to function acceptably after exposures to neutron fluences of 10 15 n/cm 2 , total dose gamma exposures of 10 8 rad (Si), and flash x-ray environments of 10 8 rad/sec (Si). We will describe detector structures that can operate through these conditions, pre-rad and post-rad operational characteristics, and experimental conditions that produced these results. 23 refs., 10 figs., 1 tab

  1. Driver's Behavior Modeling Using Fuzzy Logic

    Directory of Open Access Journals (Sweden)

    Sehraneh Ghaemi

    2010-01-01

    Full Text Available In this study, we propose a hierarchical fuzzy system for human in a driver-vehicle-environment system to model takeover by different drivers. The driver's behavior is affected by the environment. The climate, road and car conditions are included in fuzzy modeling. For obtaining fuzzy rules, experts' opinions are benefited by means of questionnaires on effects of parameters such as climate, road and car conditions on driving capabilities. Also the precision, age and driving individuality are used to model the driver's behavior. Three different positions are considered for driving and decision making. A fuzzy model called Model I is presented for modeling the change of steering angle and speed control by considering time distances with existing cars in these three positions, the information about the speed and direction of car, and the steering angle of car. Also we obtained two other models based on fuzzy rules called Model II and Model III by using Sugeno fuzzy inference. Model II and Model III have less linguistic terms than Model I for the steering angle and direction of car. The results of three models are compared for a driver who drives based on driving laws.

  2. Fuzzy logic control and optimization system

    Science.gov (United States)

    Lou, Xinsheng [West Hartford, CT

    2012-04-17

    A control system (300) for optimizing a power plant includes a chemical loop having an input for receiving an input signal (369) and an output for outputting an output signal (367), and a hierarchical fuzzy control system (400) operably connected to the chemical loop. The hierarchical fuzzy control system (400) includes a plurality of fuzzy controllers (330). The hierarchical fuzzy control system (400) receives the output signal (367), optimizes the input signal (369) based on the received output signal (367), and outputs an optimized input signal (369) to the input of the chemical loop to control a process of the chemical loop in an optimized manner.

  3. Fuzzy logic applications to control engineering

    Science.gov (United States)

    Langari, Reza

    1993-12-01

    This paper presents the results of a project presently under way at Texas A&M which focuses on the use of fuzzy logic in integrated control of manufacturing systems. The specific problems investigated here include diagnosis of critical tool wear in machining of metals via a neuro-fuzzy algorithm, as well as compensation of friction in mechanical positioning systems via an adaptive fuzzy logic algorithm. The results indicate that fuzzy logic in conjunction with conventional algorithmic based approaches or neural nets can prove useful in dealing with the intricacies of control/monitoring of manufacturing systems and can potentially play an active role in multi-modal integrated control systems of the future.

  4. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2015-01-01

    Full Text Available We present the first provably-secure three-party password-only authenticated key exchange (PAKE protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000 without any idealized assumptions on the cryptographic primitives used. We also investigate the security of the two-round, three-party PAKE protocol of Wang, Hu and Li (2010 and demonstrate that this protocol cannot achieve implicit key authentication in the presence of an active adversary.

  5. Radiation hardening of metals irradiated by heavy ions

    International Nuclear Information System (INIS)

    Didyk, A.Yu.; Skuratov, V.A.; Mikhajlova, N.Yu.; Regel', V.R.

    1988-01-01

    The damage dose dependence in the 10 -4 -10 -2 dpa region of radiation hardening of Al, V, Ni, Cu irradiated by xenon ions with 124 MeV energy is investigated using the microhardness technique and transmission electron microscope. It is shown that the pure metals radiation hardening is stimulated for defects clusters with the typical size less than 5 nm, as in the case of neutron and the light charge ion irradiation

  6. Fuzzy model-based observers for fault detection in CSTR.

    Science.gov (United States)

    Ballesteros-Moncada, Hazael; Herrera-López, Enrique J; Anzurez-Marín, Juan

    2015-11-01

    Under the vast variety of fuzzy model-based observers reported in the literature, what would be the properone to be used for fault detection in a class of chemical reactor? In this study four fuzzy model-based observers for sensor fault detection of a Continuous Stirred Tank Reactor were designed and compared. The designs include (i) a Luenberger fuzzy observer, (ii) a Luenberger fuzzy observer with sliding modes, (iii) a Walcott-Zak fuzzy observer, and (iv) an Utkin fuzzy observer. A negative, an oscillating fault signal, and a bounded random noise signal with a maximum value of ±0.4 were used to evaluate and compare the performance of the fuzzy observers. The Utkin fuzzy observer showed the best performance under the tested conditions. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  7. Nuclear effects hardened shelters

    International Nuclear Information System (INIS)

    Lindke, P.

    1990-01-01

    This paper reports on the Houston Fearless 76 Government Projects Group that has been actively engaged for more than twenty-five years as a sub-contractor and currently as a prime contractor in the design, manufacture, repair and logistics support of custom mobile ground stations and their equipment accommodations. Other associated products include environmental control units (ECU's), mobilizers for shelters and a variety of mobile power generation units (MPU's). Since 1984, Houston Fearless 76 has designed and manufactured four 8 foot by 8 foot x 22 foot nuclear hardened mobile shelters. These shelters were designed to contain electronic data processing/reduction equipment. One shelter is currently being operated by the Air Force as a Defense Intelligence Agency (DIA) approved and certified Special Compartmented Information Facility (SCIF). During the development and manufacturing process of the shelters, we received continual technical assistance and design concept evaluations from Science Applications International Corporation (SAIC) Operations Analysis and Logistics Engineering Division and the Nondestructive Inspection Lab at McClellan AFB. SAIC was originally employed by the Air Force to design the nuclear hardening specifications applied to these shelters

  8. Some fixed point theorems in fuzzy reflexive Banach spaces

    International Nuclear Information System (INIS)

    Sadeqi, I.; Solaty kia, F.

    2009-01-01

    In this paper, we first show that there are some gaps in the fixed point theorems for fuzzy non-expansive mappings which are proved by Bag and Samanta, in [Bag T, Samanta SK. Fixed point theorems on fuzzy normed linear spaces. Inf Sci 2006;176:2910-31; Bag T, Samanta SK. Some fixed point theorems in fuzzy normed linear spaces. Inform Sci 2007;177(3):3271-89]. By introducing the notion of fuzzy and α- fuzzy reflexive Banach spaces, we obtain some results which help us to establish the correct version of fuzzy fixed point theorems. Second, by applying Theorem 3.3 of Sadeqi and Solati kia [Sadeqi I, Solati kia F. Fuzzy normed linear space and it's topological structure. Chaos, Solitons and Fractals, in press] which says that any fuzzy normed linear space is also a topological vector space, we show that all topological version of fixed point theorems do hold in fuzzy normed linear spaces.

  9. Defuzzification Strategies for Fuzzy Classifications of Remote Sensing Data

    Directory of Open Access Journals (Sweden)

    Peter Hofmann

    2016-06-01

    Full Text Available The classes in fuzzy classification schemes are defined as fuzzy sets, partitioning the feature space through fuzzy rules, defined by fuzzy membership functions. Applying fuzzy classification schemes in remote sensing allows each pixel or segment to be an incomplete member of more than one class simultaneously, i.e., one that does not fully meet all of the classification criteria for any one of the classes and is member of more than one class simultaneously. This can lead to fuzzy, ambiguous and uncertain class assignation, which is unacceptable for many applications, indicating the need for a reliable defuzzification method. Defuzzification in remote sensing has to date, been performed by “crisp-assigning” each fuzzy-classified pixel or segment to the class for which it best fulfills the fuzzy classification rules, regardless of its classification fuzziness, uncertainty or ambiguity (maximum method. The defuzzification of an uncertain or ambiguous fuzzy classification leads to a more or less reliable crisp classification. In this paper the most common parameters for expressing classification uncertainty, fuzziness and ambiguity are analysed and discussed in terms of their ability to express the reliability of a crisp classification. This is done by means of a typical practical example from Object Based Image Analysis (OBIA.

  10. Design of supply chain in fuzzy environment

    Science.gov (United States)

    Rao, Kandukuri Narayana; Subbaiah, Kambagowni Venkata; Singh, Ganja Veera Pratap

    2013-05-01

    Nowadays, customer expectations are increasing and organizations are prone to operate in an uncertain environment. Under this uncertain environment, the ultimate success of the firm depends on its ability to integrate business processes among supply chain partners. Supply chain management emphasizes cross-functional links to improve the competitive strategy of organizations. Now, companies are moving from decoupled decision processes towards more integrated design and control of their components to achieve the strategic fit. In this paper, a new approach is developed to design a multi-echelon, multi-facility, and multi-product supply chain in fuzzy environment. In fuzzy environment, mixed integer programming problem is formulated through fuzzy goal programming in strategic level with supply chain cost and volume flexibility as fuzzy goals. These fuzzy goals are aggregated using minimum operator. In tactical level, continuous review policy for controlling raw material inventories in supplier echelon and controlling finished product inventories in plant as well as distribution center echelon is considered as fuzzy goals. A non-linear programming model is formulated through fuzzy goal programming using minimum operator in the tactical level. The proposed approach is illustrated with a numerical example.

  11. Design of fuzzy systems using neurofuzzy networks.

    Science.gov (United States)

    Figueiredo, M; Gomide, F

    1999-01-01

    This paper introduces a systematic approach for fuzzy system design based on a class of neural fuzzy networks built upon a general neuron model. The network structure is such that it encodes the knowledge learned in the form of if-then fuzzy rules and processes data following fuzzy reasoning principles. The technique provides a mechanism to obtain rules covering the whole input/output space as well as the membership functions (including their shapes) for each input variable. Such characteristics are of utmost importance in fuzzy systems design and application. In addition, after learning, it is very simple to extract fuzzy rules in the linguistic form. The network has universal approximation capability, a property very useful in, e.g., modeling and control applications. Here we focus on function approximation problems as a vehicle to illustrate its usefulness and to evaluate its performance. Comparisons with alternative approaches are also included. Both, nonnoisy and noisy data have been studied and considered in the computational experiments. The neural fuzzy network developed here and, consequently, the underlying approach, has shown to provide good results from the accuracy, complexity, and system design points of view.

  12. COMPARISON of FUZZY-BASED MODELS in LANDSLIDE HAZARD MAPPING

    Directory of Open Access Journals (Sweden)

    N. Mijani

    2017-09-01

    Full Text Available Landslide is one of the main geomorphic processes which effects on the development of prospect in mountainous areas and causes disastrous accidents. Landslide is an event which has different uncertain criteria such as altitude, slope, aspect, land use, vegetation density, precipitation, distance from the river and distance from the road network. This research aims to compare and evaluate different fuzzy-based models including Fuzzy Analytic Hierarchy Process (Fuzzy-AHP, Fuzzy Gamma and Fuzzy-OR. The main contribution of this paper reveals to the comprehensive criteria causing landslide hazard considering their uncertainties and comparison of different fuzzy-based models. The quantify of evaluation process are calculated by Density Ratio (DR and Quality Sum (QS. The proposed methodology implemented in Sari, one of the city of Iran which has faced multiple landslide accidents in recent years due to the particular environmental conditions. The achieved results of accuracy assessment based on the quantifier strated that Fuzzy-AHP model has higher accuracy compared to other two models in landslide hazard zonation. Accuracy of zoning obtained from Fuzzy-AHP model is respectively 0.92 and 0.45 based on method Precision (P and QS indicators. Based on obtained landslide hazard maps, Fuzzy-AHP, Fuzzy Gamma and Fuzzy-OR respectively cover 13, 26 and 35 percent of the study area with a very high risk level. Based on these findings, fuzzy-AHP model has been selected as the most appropriate method of zoning landslide in the city of Sari and the Fuzzy-gamma method with a minor difference is in the second order.

  13. Comparison of Fuzzy AHP and Fuzzy TOPSIS for Road Pavement Maintenance Prioritization: Methodological Exposition and Case Study

    Directory of Open Access Journals (Sweden)

    Yashon O. Ouma

    2015-01-01

    Full Text Available For road pavement maintenance and repairs prioritization, a multiattribute approach that compares fuzzy Analytical Hierarchy Process (AHP and fuzzy Technique for Order Preference by Ideal Situation (TOPSIS is evaluated. The pavement distress data was collected through empirical condition surveys and rating by pavement experts. In comparison to the crisp AHP, the fuzzy AHP and fuzzy TOPSIS pairwise comparison techniques are considered to be more suitable for the subjective analysis of the pavement conditions for automated maintenance prioritization. From the case study results, four pavement maintenance objectives were determined as road safety, pavement surface preservation, road operational status and standards, and road aesthetics, with corresponding depreciating significance weights of W=0.37,0.31,0.22,0.10T. The top three maintenance functions were identified as Thin Hot Mix Asphalt (HMA overlays, resurfacing and slurry seals, which were a result of pavement cracking, potholes, raveling, and patching, while the bottom three were cape seal, micro surfacing, and fog seal. The two methods gave nearly the same prioritization ranking. In general, the fuzzy AHP approach tended to overestimate the maintenance prioritization ranking as compared to the fuzzy TOPSIS.

  14. ST-intuitionistic fuzzy metric space with properties

    Science.gov (United States)

    Arora, Sahil; Kumar, Tanuj

    2017-07-01

    In this paper, we define ST-intuitionistic fuzzy metric space and the notion of convergence and completeness properties of cauchy sequences is studied. Further, we prove some properties of ST-intuitionistic fuzzy metric space. Finally, we introduce the concept of symmetric ST Intuitionistic Fuzzy metric space.

  15. Fuzzy associative memories for instrument fault detection

    International Nuclear Information System (INIS)

    Heger, A.S.

    1996-01-01

    A fuzzy logic instrument fault detection scheme is developed for systems having two or three redundant sensors. In the fuzzy logic approach the deviation between each signal pairing is computed and classified into three fuzzy sets. A rule base is created allowing the human perception of the situation to be represented mathematically. Fuzzy associative memories are then applied. Finally, a defuzzification scheme is used to find the centroid location, and hence the signal status. Real-time analyses are carried out to evaluate the instantaneous signal status as well as the long-term results for the sensor set. Instantaneous signal validation results are used to compute a best estimate for the measured state variable. The long-term sensor validation method uses a frequency fuzzy variable to determine the signal condition over a specific period. To corroborate the methodology synthetic data representing various anomalies are analyzed with both the fuzzy logic technique and the parity space approach. (Author)

  16. Analysis of inventory difference using fuzzy controllers

    International Nuclear Information System (INIS)

    Zardecki, A.

    1994-01-01

    The principal objectives of an accounting system for safeguarding nuclear materials are as follows: (a) to provide assurance that all material quantities are present in the correct amount; (b) to provide timely detection of material loss; and (c) to estimate the amount of any loss and its location. In fuzzy control, expert knowledge is encoded in the form of fuzzy rules, which describe recommended actions for different classes of situations represented by fuzzy sets. The concept of a fuzzy controller is applied to the forecasting problem in a time series, specifically, to forecasting and detecting anomalies in inventory differences. This paper reviews the basic notion underlying the fuzzy control systems and provides examples of application. The well-known material-unaccounted-for diffusion plant data of Jaech are analyzed using both feedforward neural networks and fuzzy controllers. By forming a deference between the forecasted and observed signals, an efficient method to detect small signals in background noise is implemented

  17. On Algebraic Study of Type-2 Fuzzy Finite State Automata

    Directory of Open Access Journals (Sweden)

    Anupam K. Singh

    2017-08-01

    Full Text Available Theories of fuzzy sets and type-2 fuzzy sets are powerful mathematical tools for modeling various types of uncertainty. In this paper we introduce the concept of type-2 fuzzy finite state automata and discuss the algebraic study of type-2 fuzzy finite state automata, i.e., to introduce the concept of homomorphisms between two type-2 fuzzy finite state automata, to associate a type-2 fuzzy transformation semigroup with a type-2 fuzzy finite state automata. Finally, we discuss several product of type-2 fuzzy finite state automata and shown that these product is a categorical product.

  18. A first course in fuzzy logic, fuzzy dynamical systems, and biomathematics theory and applications

    CERN Document Server

    de Barros, Laécio Carvalho; Lodwick, Weldon Alexander

    2017-01-01

    This book provides an essential introduction to the field of dynamical models. Starting from classical theories such as set theory and probability, it allows readers to draw near to the fuzzy case. On one hand, the book equips readers with a fundamental understanding of the theoretical underpinnings of fuzzy sets and fuzzy dynamical systems. On the other, it demonstrates how these theories are used to solve modeling problems in biomathematics, and presents existing derivatives and integrals applied to the context of fuzzy functions. Each of the major topics is accompanied by examples, worked-out exercises, and exercises to be completed. Moreover, many applications to real problems are presented. The book has been developed on the basis of the authors’ lectures to university students and is accordingly primarily intended as a textbook for both upper-level undergraduates and graduates in applied mathematics, statistics, and engineering. It also offers a valuable resource for practitioners such as mathematical...

  19. Aumann Fuzzy Improper Integral and Its Application to Solve Fuzzy Integro-Differential Equations by Laplace Transform Method

    Directory of Open Access Journals (Sweden)

    Elhassan Eljaoui

    2018-01-01

    Full Text Available We introduce the Aumann fuzzy improper integral to define the convolution product of a fuzzy mapping and a crisp function in this paper. The Laplace convolution formula is proved in this case and used to solve fuzzy integro-differential equations with kernel of convolution type. Then, we report and correct an error in the article by Salahshour et al. dealing with the same topic.

  20. Increase of resistance to cracking on stress relieving of hardened steel

    International Nuclear Information System (INIS)

    Velichko, V.V.; Zabil'skij, V.V.; Mikheev, G.M.

    1995-01-01

    Regularities of increase of resistance to cracking during stress relieving of hardened low-alloyed steels were studied, using complex of methods. Effect of carbon, stress concentrator radius, duration and temperature of stress relieving was studies in particular. Results of investigating kinetics of change of physicomechanical properties, hydrogen desorption from hardened specimens showed, that increase of resistance to cracking was caused by desorption from grain boundaries of diffusion-mobile hydrogen, formed during hardening. 18 refs., 8 figs

  1. Solving fuzzy two-point boundary value problem using fuzzy Laplace transform

    OpenAIRE

    Ahmad, Latif; Farooq, Muhammad; Ullah, Saif; Abdullah, Saleem

    2014-01-01

    A natural way to model dynamic systems under uncertainty is to use fuzzy boundary value problems (FBVPs) and related uncertain systems. In this paper we use fuzzy Laplace transform to find the solution of two-point boundary value under generalized Hukuhara differentiability. We illustrate the method for the solution of the well known two-point boundary value problem Schrodinger equation, and homogeneous boundary value problem. Consequently, we investigate the solutions of FBVPs under as a ne...

  2. Probabilistic Quadratic Programming Problems with Some Fuzzy Parameters

    Directory of Open Access Journals (Sweden)

    S. K. Barik

    2012-01-01

    making problem by using some specified random variables and fuzzy numbers. In the present paper, randomness is characterized by Weibull random variables and fuzziness is characterized by triangular and trapezoidal fuzzy number. A defuzzification method has been introduced for finding the crisp values of the fuzzy numbers using the proportional probability density function associated with the membership functions of these fuzzy numbers. An equivalent deterministic crisp model has been established in order to solve the proposed model. Finally, a numerical example is presented to illustrate the solution procedure.

  3. Fuzzy logic and neural networks basic concepts & application

    CERN Document Server

    Alavala, Chennakesava R

    2008-01-01

    About the Book: The primary purpose of this book is to provide the student with a comprehensive knowledge of basic concepts of fuzzy logic and neural networks. The hybridization of fuzzy logic and neural networks is also included. No previous knowledge of fuzzy logic and neural networks is required. Fuzzy logic and neural networks have been discussed in detail through illustrative examples, methods and generic applications. Extensive and carefully selected references is an invaluable resource for further study of fuzzy logic and neural networks. Each chapter is followed by a question bank

  4. A New Method to Find Fuzzy Nth Order Derivation and Applications to Fuzzy Nth Order Arithmetic Based on Generalized H-Derivation

    Directory of Open Access Journals (Sweden)

    Laleh Hooshangian

    2014-07-01

    Full Text Available In this paper, fuzzy nth-order derivative for n in N is introduced. To do this, nth-order derivation under generalized Hukuhara derivative here in discussed. Calculations on the fuzzy nth-order derivative on fuzzy functions and their relationships, in general, are introduced. Then, the fuzzy nth-order differential equations is solved, for n in N.

  5. Fuzzy Multi-objective Linear Programming Approach

    Directory of Open Access Journals (Sweden)

    Amna Rehmat

    2007-07-01

    Full Text Available Traveling salesman problem (TSP is one of the challenging real-life problems, attracting researchers of many fields including Artificial Intelligence, Operations Research, and Algorithm Design and Analysis. The problem has been well studied till now under different headings and has been solved with different approaches including genetic algorithms and linear programming. Conventional linear programming is designed to deal with crisp parameters, but information about real life systems is often available in the form of vague descriptions. Fuzzy methods are designed to handle vague terms, and are most suited to finding optimal solutions to problems with vague parameters. Fuzzy multi-objective linear programming, an amalgamation of fuzzy logic and multi-objective linear programming, deals with flexible aspiration levels or goals and fuzzy constraints with acceptable deviations. In this paper, a methodology, for solving a TSP with imprecise parameters, is deployed using fuzzy multi-objective linear programming. An example of TSP with multiple objectives and vague parameters is discussed.

  6. Flows in networks under fuzzy conditions

    CERN Document Server

    Bozhenyuk, Alexander Vitalievich; Kacprzyk, Janusz; Rozenberg, Igor Naymovich

    2017-01-01

    This book offers a comprehensive introduction to fuzzy methods for solving flow tasks in both transportation and networks. It analyzes the problems of minimum cost and maximum flow finding with fuzzy nonzero lower flow bounds, and describes solutions to minimum cost flow finding in a network with fuzzy arc capacities and transmission costs. After a concise introduction to flow theory and tasks, the book analyzes two important problems. The first is related to determining the maximum volume for cargo transportation in the presence of uncertain network parameters, such as environmental changes, measurement errors and repair work on the roads. These parameters are represented here as fuzzy triangular, trapezoidal numbers and intervals. The second problem concerns static and dynamic flow finding in networks under fuzzy conditions, and an effective method that takes into account the network’s transit parameters is presented here. All in all, the book provides readers with a practical reference guide to state-of-...

  7. Some aspects of plasticity in hardened face-centred cubic metals

    International Nuclear Information System (INIS)

    Jackson, P.J.; Nathanson, P.D.K.

    1978-01-01

    The plasticity of crystals of f.c.c. metals hardened by solute atoms, neutron irradiation, quenching and by dislocation distributions not characteristic of the active mode of testing is reviewed, with emphasis being placed on the simiularity of slip after various hardening treatments. Normal work hardening is not treated. The reasons for this exclusion are discussed. It is concluded that correlated slip is a normal aspect of deformation, and that diffuse uncorrelated slip occurs only when secondary dislocation multiplication is promoted, e.g. by obstacles introduced by prior slip, or by the presence of hard impenetrable obstacles of another material or phase [af

  8. Work hardening behavior study of structural alloys for cryogenic applications

    International Nuclear Information System (INIS)

    Chu, D.; Morris, J.W. Jr.

    1992-01-01

    Previous investigation on aluminum-lithium alloys have indicated different dependencies of the work hardening behavior on temperature. This variation in temperature dependence is attributed to differences in microstructure rather than composition. An understanding of the microstructural effect on the observed thermal dependency is important as it may allow the tailoring of deformation properties through mechanical processing. Work hardening analyses on other aluminum alloys and a number of structural steels have been performed to better elucidate the role played by microstructure in determining the work hardening behavior. In the paper correlations between the differences in mechanical behavior and the various microstructures observed are presented

  9. Human factors and fuzzy set theory for safety analysis

    International Nuclear Information System (INIS)

    Nishiwaki, Y.

    1987-01-01

    Human reliability and performance is affected by many factors: medical, physiological and psychological, etc. The uncertainty involved in human factors may not necessarily be probabilistic, but fuzzy. Therefore, it is important to develop a theory by which both the non-probabilistic uncertainties, or fuzziness, of human factors and the probabilistic properties of machines can be treated consistently. In reality, randomness and fuzziness are sometimes mixed. From the mathematical point of view, probabilistic measures may be considered a special case of fuzzy measures. Therefore, fuzzy set theory seems to be an effective tool for analysing man-machine systems. The concept 'failure possibility' based on fuzzy sets is suggested as an approach to safety analysis and fault diagnosis of a large complex system. Fuzzy measures and fuzzy integrals are introduced and their possible applications are also discussed. (author)

  10. Fuzzy randomness uncertainty in civil engineering and computational mechanics

    CERN Document Server

    Möller, Bernd

    2004-01-01

    This book, for the first time, provides a coherent, overall concept for taking account of uncertainty in the analysis, the safety assessment, and the design of structures. The reader is introduced to the problem of uncertainty modeling and familiarized with particular uncertainty models. For simultaneously considering stochastic and non-stochastic uncertainty the superordinated uncertainty model fuzzy randomness, which contains real valued random variables as well as fuzzy variables as special cases, is presented. For this purpose basic mathematical knowledge concerning the fuzzy set theory and the theory of fuzzy random variables is imparted. The body of the book comprises the appropriate quantification of uncertain structural parameters, the fuzzy and fuzzy probabilistic structural analysis, the fuzzy probabilistic safety assessment, and the fuzzy cluster structural design. The completely new algorithms are described in detail and illustrated by way of demonstrative examples.

  11. General analytical shakedown solution for structures with kinematic hardening materials

    Science.gov (United States)

    Guo, Baofeng; Zou, Zongyuan; Jin, Miao

    2016-09-01

    The effect of kinematic hardening behavior on the shakedown behaviors of structure has been investigated by performing shakedown analysis for some specific problems. The results obtained only show that the shakedown limit loads of structures with kinematic hardening model are larger than or equal to those with perfectly plastic model of the same initial yield stress. To further investigate the rules governing the different shakedown behaviors of kinematic hardening structures, the extended shakedown theorem for limited kinematic hardening is applied, the shakedown condition is then proposed, and a general analytical solution for the structural shakedown limit load is thus derived. The analytical shakedown limit loads for fully reversed cyclic loading and non-fully reversed cyclic loading are then given based on the general solution. The resulting analytical solution is applied to some specific problems: a hollow specimen subjected to tension and torsion, a flanged pipe subjected to pressure and axial force and a square plate with small central hole subjected to biaxial tension. The results obtained are compared with those in literatures, they are consistent with each other. Based on the resulting general analytical solution, rules governing the general effects of kinematic hardening behavior on the shakedown behavior of structure are clearly.

  12. Possible use of fuzzy logic in database

    Directory of Open Access Journals (Sweden)

    Vaclav Bezdek

    2011-04-01

    Full Text Available The article deals with fuzzy logic and its possible use in database systems. At first fuzzy thinking style is shown on a simple example. Next the advantages of the fuzzy approach to database searching are considered on the database of used cars in the Czech Republic.

  13. Optimal solution of full fuzzy transportation problems using total integral ranking

    Science.gov (United States)

    Sam’an, M.; Farikhin; Hariyanto, S.; Surarso, B.

    2018-03-01

    Full fuzzy transportation problem (FFTP) is a transportation problem where transport costs, demand, supply and decision variables are expressed in form of fuzzy numbers. To solve fuzzy transportation problem, fuzzy number parameter must be converted to a crisp number called defuzzyfication method. In this new total integral ranking method with fuzzy numbers from conversion of trapezoidal fuzzy numbers to hexagonal fuzzy numbers obtained result of consistency defuzzyfication on symmetrical fuzzy hexagonal and non symmetrical type 2 numbers with fuzzy triangular numbers. To calculate of optimum solution FTP used fuzzy transportation algorithm with least cost method. From this optimum solution, it is found that use of fuzzy number form total integral ranking with index of optimism gives different optimum value. In addition, total integral ranking value using hexagonal fuzzy numbers has an optimal value better than the total integral ranking value using trapezoidal fuzzy numbers.

  14. Skin hardening effect in patients with polymorphic light eruption: comparison of UVB hardening in hospital with a novel home UV-hardening device.

    Science.gov (United States)

    Franken, S M; Genders, R E; de Gruijl, F R; Rustemeyer, T; Pavel, S

    2013-01-01

    An effective prophylactic treatment of patients with polymorphic light eruption (PLE) consists of repeated low, gradually increasing exposures to UVB radiation. This so-called UV(B) hardening induces better tolerance of the skin to sunlight. SunshowerMedical company (Amsterdam) has developed an UV (B) source that can be used during taking shower. The low UV fluence of this apparatus makes it an interesting device for UV hardening. In a group of PLE patients, we compared the effectiveness of the irradiation with SunshowerMedical at home with that of the UVB treatment in the hospital. The PLE patients were randomized for one of the treatments. The hospital treatment consisted of irradiations with broad-band UVB (Waldmann 85/UV21 lamps) twice a week during 6 weeks. The home UV-device was used each day with the maximal irradiation time of 6 min. The outcome assessment was based on the information obtained from patients' dermatological quality of life (DLQI) questionnaires, the ability of both phototherapies to reduce the provocation reaction and from the patients' evaluation of the long-term benefits of their phototherapies. Sixteen patients completed treatment with SunshowerMedical and thirteen completed treatment in hospital. Both types of phototherapy were effective. There was a highly significant improvement in DLQI with either treatment. In most cases, the hardening reduced or even completely suppressed clinical UV provocation of PLE. The patients using SunshowerMedical at home were, however, much more content with the treatment procedure than the patients visiting the dermatological units. Both treatments were equally effective in the induction of skin tolerance to sunlight in PLE patients. However, the home treatment was much better accepted than the treatment in the hospital. © 2011 The Authors. Journal of the European Academy of Dermatology and Venereology © 2011 European Academy of Dermatology and Venereology.

  15. Markowitz portfolio optimization model employing fuzzy measure

    Science.gov (United States)

    Ramli, Suhailywati; Jaaman, Saiful Hafizah

    2017-04-01

    Markowitz in 1952 introduced the mean-variance methodology for the portfolio selection problems. His pioneering research has shaped the portfolio risk-return model and become one of the most important research fields in modern finance. This paper extends the classical Markowitz's mean-variance portfolio selection model applying the fuzzy measure to determine the risk and return. In this paper, we apply the original mean-variance model as a benchmark, fuzzy mean-variance model with fuzzy return and the model with return are modeled by specific types of fuzzy number for comparison. The model with fuzzy approach gives better performance as compared to the mean-variance approach. The numerical examples are included to illustrate these models by employing Malaysian share market data.

  16. A study of fuzzy control in nuclear scale system

    International Nuclear Information System (INIS)

    Wang Yu; Zhang Yongming; Wu Ruisheng; Du Xianbin; Liu Shixing

    2001-01-01

    The new development of the nuclear scale system which uses fuzzy control strategy is presented. Good results have been obtained in using fuzzy control to solve the problems, such as un-linearities, instabilities, time delays, which are difficultly described by formula, etc. The fuzzy variance, membership function and fuzzy rules are given, and the noise disturbances of fuzzy control and PID control are also given

  17. Effects of solute elements on irradiation hardening and microstructural evolution in low alloy steels

    Energy Technology Data Exchange (ETDEWEB)

    Fujii, Katsuhiko, E-mail: fujiik@inss.co.jp [Institute of Nuclear Safety System Inc., 64 Sata, Mihama 919-1205 (Japan); Ohkubo, Tadakatsu, E-mail: OHKUBO.Tadakatsu@nims.go.jp [National Institute for Materials Science, 1-2-1 Sengen, Tsukuba 305-0047 (Japan); Fukuya, Koji, E-mail: fukuya@inss.co.jp [Institute of Nuclear Safety System Inc., 64 Sata, Mihama 919-1205 (Japan)

    2011-10-01

    The effects of the elements Mn, Ni, Si and Cu on irradiation hardening and microstructural evolution in low alloy steels were investigated in ion irradiation experiments using five kinds of alloys prepared by removing Mn, Ni and Si from, and adding 0.05 wt.%Cu to, the base alloy (Fe-1.5Mn-0.5Ni-0.25Si). The alloy without Mn showed less hardening and the alloys without Ni or Si showed more hardening. The addition of Cu had hardly any influence on hardening. These facts indicated that Mn enhanced hardening and that Ni and Si had some synergetic effects. The formation of solute clusters was not confirmed by atom probe (AP) analysis, whereas small dislocation loops were identified by TEM observation. The difference in hardening between the alloys with and without Mn was qualitatively consistent with loop formation. However, microstructural components that were not detected by the AP and TEM were assumed to explain the hardening level quantitatively.

  18. New approach to solve symmetric fully fuzzy linear systems

    Indian Academy of Sciences (India)

    concepts of fuzzy set theory and then define a fully fuzzy linear system of equations. .... To represent the above problem as fully fuzzy linear system, we represent x .... Fully fuzzy linear systems can be solved by Linear programming approach, ...

  19. Hesitant fuzzy methods for multiple criteria decision analysis

    CERN Document Server

    Zhang, Xiaolu

    2017-01-01

    The book offers a comprehensive introduction to methods for solving multiple criteria decision making and group decision making problems with hesitant fuzzy information. It reports on the authors’ latest research, as well as on others’ research, providing readers with a complete set of decision making tools, such as hesitant fuzzy TOPSIS, hesitant fuzzy TODIM, hesitant fuzzy LINMAP, hesitant fuzzy QUALIFEX, and the deviation modeling approach with heterogeneous fuzzy information. The main focus is on decision making problems in which the criteria values and/or the weights of criteria are not expressed in crisp numbers but are more suitable to be denoted as hesitant fuzzy elements. The largest part of the book is devoted to new methods recently developed by the authors to solve decision making problems in situations where the available information is vague or hesitant. These methods are presented in detail, together with their application to different type of decision-making problems. All in all, the book ...

  20. OCCUPATIONAL ASTHMA CAUSED BY A HARDENER CONTAINING AN ALIPHATIC AND A CYCLOALIPHATIC DIAMINE

    NARCIS (Netherlands)

    ALEVA, RM; AALBERS, R; KOETER, GH; DEMONCHY, JGR

    An otherwise healthy 44-yr-old man experienced a serious attack of bronchial obstruction after working with resins and hardeners, releasing fumes of a mixture of an aliphatic and a cycloaliphatic diamine hardener. Eight hours after deliberate challenge with the hardener a large increase of airway

  1. Technology of hardening fills for mined spaces

    International Nuclear Information System (INIS)

    Simek, P.; Holas, M.; Chyla, A.; Pech, P.

    1985-01-01

    The technology is described of hardening fills for mined spaces of uranium deposits in North Bohemian chalk. A special equipment was developed for the controlled preparation of a hardening mixture. The composition of the fill is determined by the strength of the filled rock, expecially by the standard strength, i.e., the minimal strength of the filling under uniaxial pressure. The said parameter determines the consumption of binding materials and thereby the total costs of the filling. A description is presented of the filling technology, including rabbit tube transport of the mixture and quality control. (Pu)

  2. A revisit to quadratic programming with fuzzy parameters

    International Nuclear Information System (INIS)

    Liu, S.-T.

    2009-01-01

    Quadratic programming has been widely applied to solving real-world problems. Recently, Liu describes a solution method for solving a class of fuzzy quadratic programming problems, where the cost coefficients of the linear terms in objective function, constraint coefficients, and right-hand sides are fuzzy numbers [Liu ST. Quadratic programming with fuzzy parameters: a membership function approach. Chaos, Solitons and Fractals 2009;40:237-45]. In this paper, we generalize Liu's method to a more general fuzzy quadratic programming problem, where the cost coefficients in objective function, constraint coefficients, and right-hand sides are all fuzzy numbers. A pair of two-level mathematical programs is formulated to calculate the upper bound and lower bound of the objective values of the fuzzy quadratic program. Based on the duality theorem and by applying the variable transformation technique, the pair of two-level mathematical programs is transformed into a family of conventional one-level quadratic programs. Solving the pair of quadratic programs produces the fuzzy objective values of the problem. With the ability of calculating the fuzzy objective value developed in this paper, it might help initiate wider applications.

  3. On the intuitionistic fuzzy inner product spaces

    International Nuclear Information System (INIS)

    Goudarzi, M.; Vaezpour, S.M.; Saadati, R.

    2009-01-01

    In this paper, the definition of intuitionistic fuzzy inner product is given. By virtue of this definition, some convergence theorems, Schwarts inequality and the orthogonal concept for intuitionistic fuzzy inner product spaces are established and introduced. Moreover the relationship between this kind of spaces and intuitionistic fuzzy normed spaces is considered.

  4. Effect of hardening methods of moulding sands with water glass on structure of bonding bridges

    Directory of Open Access Journals (Sweden)

    M. Stachowicz

    2010-07-01

    Full Text Available Research on influence of hardening methods on structure of bonding bridges in moulding sands with sodium water glass is presented.Moulding sands with addition of 2.5 % of binder with molar module 2.0 were hardened with CO2 and dried in traditional way or hardenedwith microwaves. It was proved that the hardening method affects structure of bonding bridges, correlating with properties of the hardened moulding sands. It was found that strength of the moulding sands hardened with microwaves for 4 min is very close to that measured after traditional drying at 110 °C for 120 min. So, application of microwave hardening ensures significant shortening of the process time to the value comparable with CO2 hardening but guaranteeing over 10-fold increase of mechanical properties. Analysis of SEM images of hardened moulding sands permitted explaining differences in quality parameters of moulding sands by connecting them with structure of the created bonding bridges.

  5. Generation Mechanism of Work Hardened Surface Layer in Metal Cutting

    Science.gov (United States)

    Hikiji, Rikio; Kondo, Eiji; Kawagoishi, Norio; Arai, Minoru

    Finish machining used to be carried out in grinding, but it is being replaced by cutting with very small undeformed chip thickness. In ultra precision process, the effects of the cutting conditions and the complicated factors on the machined surface integrity are the serious problems. In this research, work hardened surface layer was dealt with as an evaluation of the machined surface integrity and the effect of the mechanical factors on work hardening was investigated experimentally in orthogonal cutting. As a result, it was found that work hardened surface layer was affected not only by the shear angle varied under the cutting conditions and the thrust force of cutting resistance, but also by the thrust force acting point, the coefficient of the thrust force and the compressive stress equivalent to the bulk hardness. Furthermore, these mechanical factors acting on the depth of the work hardened surface layer were investigated with the calculation model.

  6. Construction of fuzzy spaces and their applications to matrix models

    Science.gov (United States)

    Abe, Yasuhiro

    Quantization of spacetime by means of finite dimensional matrices is the basic idea of fuzzy spaces. There remains an issue of quantizing time, however, the idea is simple and it provides an interesting interplay of various ideas in mathematics and physics. Shedding some light on such an interplay is the main theme of this dissertation. The dissertation roughly separates into two parts. In the first part, we consider rather mathematical aspects of fuzzy spaces, namely, their construction. We begin with a review of construction of fuzzy complex projective spaces CP k (k = 1, 2, · · ·) in relation to geometric quantization. This construction facilitates defining symbols and star products on fuzzy CPk. Algebraic construction of fuzzy CPk is also discussed. We then present construction of fuzzy S 4, utilizing the fact that CP3 is an S2 bundle over S4. Fuzzy S4 is obtained by imposing an additional algebraic constraint on fuzzy CP3. Consequently it is proposed that coordinates on fuzzy S4 are described by certain block-diagonal matrices. It is also found that fuzzy S8 can analogously be constructed. In the second part of this dissertation, we consider applications of fuzzy spaces to physics. We first consider theories of gravity on fuzzy spaces, anticipating that they may offer a novel way of regularizing spacetime dynamics. We obtain actions for gravity on fuzzy S2 and on fuzzy CP3 in terms of finite dimensional matrices. Application to M(atrix) theory is also discussed. With an introduction of extra potentials to the theory, we show that it also has new brane solutions whose transverse directions are described by fuzzy S 4 and fuzzy CP3. The extra potentials can be considered as fuzzy versions of differential forms or fluxes, which enable us to discuss compactification models of M(atrix) theory. In particular, compactification down to fuzzy S4 is discussed and a realistic matrix model of M-theory in four-dimensions is proposed.

  7. Fuzzy logic control of nuclear power plant

    International Nuclear Information System (INIS)

    Yao Liangzhong; Guo Renjun; Ma Changwen

    1996-01-01

    The main advantage of the fuzzy logic control is that the method does not require a detailed mathematical model of the object to be controlled. In this paper, the shortcomings and limitations of the model-based method in nuclear power plant control were presented, the theory of the fuzzy logic control was briefly introduced, and the applications of the fuzzy logic control technology in nuclear power plant controls were surveyed. Finally, the problems to be solved by using the fuzzy logic control in nuclear power plants were discussed

  8. Neuro-fuzzy modelling of hydro unit efficiency

    International Nuclear Information System (INIS)

    Iliev, Atanas; Fushtikj, Vangel

    2003-01-01

    This paper presents neuro-fuzzy method for modeling of the hydro unit efficiency. The proposed method uses the characteristics of the fuzzy systems as universal function approximates, as well the abilities of the neural networks to adopt the parameters of the membership's functions and rules in the consequent part of the developed fuzzy system. Developed method is practically applied for modeling of the efficiency of unit which will be installed in the hydro power plant Kozjak. Comparison of the performance of the derived neuro-fuzzy method with several classical polynomials models is also performed. (Author)

  9. Unit rupture work as a criterion for quantitative estimation of hardenability in steel

    International Nuclear Information System (INIS)

    Kramarov, M.A.; Orlov, E.D.; Rybakov, A.B.

    1980-01-01

    Shown is possible utilization of high sensitivity of resistance to fracture of structural steel to the hardenability degree in the course of hardening to find the quantitative estimation of the latter one. Proposed is a criterion kappa, the ratio of the unit rupture work in the case of incomplete hardenability (asub(Tsub(ih))) under investigation, and the analoguc value obtained in the case of complete hardenability Asub(Tsub(Ch)) at the testing temperature corresponding to the critical temperature Tsub(100(M). Confirmed is high criterion sensitivity of the hardened steel structure on the basis of experimental investigation of the 40Kh, 38KhNM and 38KhNMFA steels after isothermal hold-up at different temperatures, corresponding to production of various products of austenite decomposition

  10. Development of a new fuzzy exposure model

    International Nuclear Information System (INIS)

    Vasconcelos, Wagner Eustaquio de; Lira, Carlos Alberto Brayner de Oliveira; Texeira, Marcello Goulart

    2007-01-01

    The main topic of this study is the development of an exposure fuzzy model to evaluate the exposure of inhabitants in an area containing uranium, which present a high natural background. In this work, a fuzzy model was created, based on some of the following main factors: activity concentration of uranium, physiological factors and characteristic customs of the exposed individuals. An inference block was created to evaluate some factors of radiation exposure. For this, AHP-fuzzy technique (Analytic Hierarchic Process) was used and its application was demonstrated for a subjected population to the radiation of the natural uranium. The Mandami type fuzzy model was also created from the opinion of specialists. The Monte Carlo method was used to generate a statistics of input data and the daily average exposure served as comparison parameter between the three techniques. The output fuzzy sets were expressed in form of linguistic variables, such as high, medium and low. In the qualitative analysis, the obtained results were satisfactory when translating the opinion of the specialists. In the quantitative analysis, the obtained values are part of the same fuzzy set as the values found in literature. The global results suggest that this type of fuzzy model is highly promising for analysis of exposure to ionizing radiation. (author)

  11. Development of a new fuzzy exposure model

    Energy Technology Data Exchange (ETDEWEB)

    Vasconcelos, Wagner Eustaquio de; Lira, Carlos Alberto Brayner de Oliveira [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Dept. de Energia Nuclear. Grupo de Engenharia de Reatores], E-mail: wagner@ufpe.br, E-mail: cabol@ufpe.br; Texeira, Marcello Goulart [Instituto Militar de Engenharia (IME), Rio de Janeiro, RJ (Brazil). Terrestrial Modelling Group], E-mail: marcellogt@ime.eb.br

    2007-07-01

    The main topic of this study is the development of an exposure fuzzy model to evaluate the exposure of inhabitants in an area containing uranium, which present a high natural background. In this work, a fuzzy model was created, based on some of the following main factors: activity concentration of uranium, physiological factors and characteristic customs of the exposed individuals. An inference block was created to evaluate some factors of radiation exposure. For this, AHP-fuzzy technique (Analytic Hierarchic Process) was used and its application was demonstrated for a subjected population to the radiation of the natural uranium. The Mandami type fuzzy model was also created from the opinion of specialists. The Monte Carlo method was used to generate a statistics of input data and the daily average exposure served as comparison parameter between the three techniques. The output fuzzy sets were expressed in form of linguistic variables, such as high, medium and low. In the qualitative analysis, the obtained results were satisfactory when translating the opinion of the specialists. In the quantitative analysis, the obtained values are part of the same fuzzy set as the values found in literature. The global results suggest that this type of fuzzy model is highly promising for analysis of exposure to ionizing radiation. (author)

  12. Automatic approach to deriving fuzzy slope positions

    Science.gov (United States)

    Zhu, Liang-Jun; Zhu, A.-Xing; Qin, Cheng-Zhi; Liu, Jun-Zhi

    2018-03-01

    Fuzzy characterization of slope positions is important for geographic modeling. Most of the existing fuzzy classification-based methods for fuzzy characterization require extensive user intervention in data preparation and parameter setting, which is tedious and time-consuming. This paper presents an automatic approach to overcoming these limitations in the prototype-based inference method for deriving fuzzy membership value (or similarity) to slope positions. The key contribution is a procedure for finding the typical locations and setting the fuzzy inference parameters for each slope position type. Instead of being determined totally by users in the prototype-based inference method, in the proposed approach the typical locations and fuzzy inference parameters for each slope position type are automatically determined by a rule set based on prior domain knowledge and the frequency distributions of topographic attributes. Furthermore, the preparation of topographic attributes (e.g., slope gradient, curvature, and relative position index) is automated, so the proposed automatic approach has only one necessary input, i.e., the gridded digital elevation model of the study area. All compute-intensive algorithms in the proposed approach were speeded up by parallel computing. Two study cases were provided to demonstrate that this approach can properly, conveniently and quickly derive the fuzzy slope positions.

  13. Determination of the strain hardening rate of metals and alloys by X ray diffraction

    International Nuclear Information System (INIS)

    Cadalbert, Robert

    1977-01-01

    This report for engineering graduation is based on the study of X ray diffraction line profile which varies with the plastic strain rate of the metal. After some generalities of strain hardening (consequence of a plastic deformation on the structure of a polycrystalline metal, means to study a strain hardened structure, use of X ray diffraction to analyse the strain hardened crystalline structure), the author reports the strain hardening rate measurement by using X ray diffraction. Several aspects are addressed: principles, experimental technique, apparatus, automation and programming of the measurement cycle, method sensitivity and precision. In the next part, the author reports applications: measurement of the strain hardening rate in different materials (tubes with hexagonal profile, cylindrical tubes in austenitic steel), and study of the evolution of strain hardening with temperature [fr

  14. Fuzzy improvement of the SQL

    Directory of Open Access Journals (Sweden)

    Hudec Miroslav

    2011-01-01

    Full Text Available Structured Query Language (SQL is used to obtain data from relational databases. Fuzzy improvement of SQL queries has advantages in cases when the user cannot unambiguously define selection criteria or when the user wants to examine data that almost meet the given criteria. In this paper we examine a realization of the fuzzy querying concept. For this purposes the fuzzy generalized logical condition for the WHERE part of the SQL is created. It allows users to create queries by linguistic terms. The proposed model is an extension of the SQL so that no modification inside databases has to be undertaken.

  15. Fuzzy resource optimization for safeguards

    International Nuclear Information System (INIS)

    Zardecki, A.; Markin, J.T.

    1991-01-01

    Authorization, enforcement, and verification -- three key functions of safeguards systems -- form the basis of a hierarchical description of the system risk. When formulated in terms of linguistic rather than numeric attributes, the risk can be computed through an algorithm based on the notion of fuzzy sets. Similarly, this formulation allows one to analyze the optimal resource allocation by maximizing the overall detection probability, regarded as a linguistic variable. After summarizing the necessary elements of the fuzzy sets theory, we outline the basic algorithm. This is followed by a sample computation of the fuzzy optimization. 10 refs., 1 tab

  16. A New Fuzzy Harmony Search Algorithm Using Fuzzy Logic for Dynamic Parameter Adaptation

    Directory of Open Access Journals (Sweden)

    Cinthia Peraza

    2016-10-01

    Full Text Available In this paper, a new fuzzy harmony search algorithm (FHS for solving optimization problems is presented. FHS is based on a recent method using fuzzy logic for dynamic adaptation of the harmony memory accepting (HMR and pitch adjustment (PArate parameters that improve the convergence rate of traditional harmony search algorithm (HS. The objective of the method is to dynamically adjust the parameters in the range from 0.7 to 1. The impact of using fixed parameters in the harmony search algorithm is discussed and a strategy for efficiently tuning these parameters using fuzzy logic is presented. The FHS algorithm was successfully applied to different benchmarking optimization problems. The results of simulation and comparison studies demonstrate the effectiveness and efficiency of the proposed approach.

  17. Fuzzy Dynamic Discrimination Algorithms for Distributed Knowledge Management Systems

    Directory of Open Access Journals (Sweden)

    Vasile MAZILESCU

    2010-12-01

    Full Text Available A reduction of the algorithmic complexity of the fuzzy inference engine has the following property: the inputs (the fuzzy rules and the fuzzy facts can be divided in two parts, one being relatively constant for a long a time (the fuzzy rule or the knowledge model when it is compared to the second part (the fuzzy facts for every inference cycle. The occurrence of certain transformations over the constant part makes sense, in order to decrease the solution procurement time, in the case that the second part varies, but it is known at certain moments in time. The transformations attained in advance are called pre-processing or knowledge compilation. The use of variables in a Business Rule Management System knowledge representation allows factorising knowledge, like in classical knowledge based systems. The language of the first-degree predicates facilitates the formulation of complex knowledge in a rigorous way, imposing appropriate reasoning techniques. It is, thus, necessary to define the description method of fuzzy knowledge, to justify the knowledge exploiting efficiency when the compiling technique is used, to present the inference engine and highlight the functional features of the pattern matching and the state space processes. This paper presents the main results of our project PR356 for designing a compiler for fuzzy knowledge, like Rete compiler, that comprises two main components: a static fuzzy discrimination structure (Fuzzy Unification Tree and the Fuzzy Variables Linking Network. There are also presented the features of the elementary pattern matching process that is based on the compiled structure of fuzzy knowledge. We developed fuzzy discrimination algorithms for Distributed Knowledge Management Systems (DKMSs. The implementations have been elaborated in a prototype system FRCOM (Fuzzy Rule COMpiler.

  18. DMILL circuits. The hardened electronics decuples its performances

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    Thanks to the DMILL (mixed logic-linear hardening) technology under development at the CEA, MHS, a French company specialized in the fabrication of integrated circuits now produces hardened electronic circuits ten times more resistant to radiations than its competitors. Outside the initial market (several thousands of circuits for the LHC particle accelerator of Geneva), a broad choice of applications is opened to this technology: national defense, space, civil nuclear and medical engineering, and high temperature applications. Short paper. (J.S.)

  19. Expert system driven fuzzy control application to power reactors

    International Nuclear Information System (INIS)

    Tsoukalas, L.H.; Berkan, R.C.; Upadhyaya, B.R.; Uhrig, R.E.

    1990-01-01

    For the purpose of nonlinear control and uncertainty/imprecision handling, fuzzy controllers have recently reached acclaim and increasing commercial application. The fuzzy control algorithms often require a ''supervisory'' routine that provides necessary heuristics for interface, adaptation, mode selection and other implementation issues. Performance characteristics of an on-line fuzzy controller depend strictly on the ability of such supervisory routines to manipulate the fuzzy control algorithm and enhance its control capabilities. This paper describes an expert system driven fuzzy control design application to nuclear reactor control, for the automated start-up control of the Experimental Breeder Reactor-II. The methodology is verified through computer simulations using a valid nonlinear model. The necessary heuristic decisions are identified that are vitally important for the implemention of fuzzy control in the actual plant. An expert system structure incorporating the necessary supervisory routines is discussed. The discussion also includes the possibility of synthesizing the fuzzy, exact and combined reasoning to include both inexact concepts, uncertainty and fuzziness, within the same environment

  20. A Hybrid Fuzzy Time Series Approach Based on Fuzzy Clustering and Artificial Neural Network with Single Multiplicative Neuron Model

    Directory of Open Access Journals (Sweden)

    Ozge Cagcag Yolcu

    2013-01-01

    Full Text Available Particularly in recent years, artificial intelligence optimization techniques have been used to make fuzzy time series approaches more systematic and improve forecasting performance. Besides, some fuzzy clustering methods and artificial neural networks with different structures are used in the fuzzification of observations and determination of fuzzy relationships, respectively. In approaches considering the membership values, the membership values are determined subjectively or fuzzy outputs of the system are obtained by considering that there is a relation between membership values in identification of relation. This necessitates defuzzification step and increases the model error. In this study, membership values were obtained more systematically by using Gustafson-Kessel fuzzy clustering technique. The use of artificial neural network with single multiplicative neuron model in identification of fuzzy relation eliminated the architecture selection problem as well as the necessity for defuzzification step by constituting target values from real observations of time series. The training of artificial neural network with single multiplicative neuron model which is used for identification of fuzzy relation step is carried out with particle swarm optimization. The proposed method is implemented using various time series and the results are compared with those of previous studies to demonstrate the performance of the proposed method.

  1. Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition

    Science.gov (United States)

    Malcangi, Mario

    2009-08-01

    Personal authentication is becoming increasingly important in many applications that have to protect proprietary data. Passwords and personal identification numbers (PINs) prove not to be robust enough to ensure that unauthorized people do not use them. Biometric authentication technology may offer a secure, convenient, accurate solution but sometimes fails due to its intrinsically fuzzy nature. This research aims to demonstrate that combining two basic speech processing methods, voiceprint identification and speech recognition, can provide a very high degree of robustness, especially if fuzzy decision logic is used.

  2. Fuzzy controllers in nuclear material accounting

    International Nuclear Information System (INIS)

    Zardecki, A.

    1994-01-01

    Fuzzy controllers are applied to predicting and modeling a time series, with particular emphasis on anomaly detection in nuclear material inventory differences. As compared to neural networks, the fuzzy controllers can operate in real time; their learning process does not require many iterations to converge. For this reason fuzzy controllers are potentially useful in time series forecasting, where the authors want to detect and identify trends in real time. They describe an object-oriented implementation of the algorithm advanced by Wang and Mendel. Numerical results are presented both for inventory data and time series corresponding to chaotic situations, such as encountered in the context of strange attractors. In the latter case, the effects of noise on the predictive power of the fuzzy controller are explored

  3. The fuzzy bag model revisited

    International Nuclear Information System (INIS)

    Pilotto, F.; Vasconcellos, C.A.Z.; Coelho, H.T.

    2001-01-01

    In this work we develop a new version of the fuzzy bag model. Th main ideas is to include the conservation of energy and momentum in the model. This feature is not included in the original formulation of the fuzzy bag model, but is of paramount importance to interpret the model as being a bag model - that, is a model in which the outward pressure of the quarks inside the bag is balanced by the inward pressure of the non-perturbative vacuum outside the bag - as opposed to a relativistic potential model, in which there is no energy-momentum conservation. In the MT bag model, as well as in the original version of the fuzzy bag model, the non-perturbative QCD vacuum is parametrized by a constant B in the Lagrangian density. One immediate consequence of including energy-momentum conservation in the fuzzy bag model is that the bag constant B will acquire a radial dependence, B = B(r). (author)

  4. The fuzzy bag model revisited

    Energy Technology Data Exchange (ETDEWEB)

    Pilotto, F.; Vasconcellos, C.A.Z. [Rio Grande do Sul Univ., Porto Alegre, RS (Brazil). Inst. de Fisica; Coelho, H.T. [Pernambuco Univ., Recife, PE (Brazil). Inst. de Fisica

    2001-07-01

    In this work we develop a new version of the fuzzy bag model. Th main ideas is to include the conservation of energy and momentum in the model. This feature is not included in the original formulation of the fuzzy bag model, but is of paramount importance to interpret the model as being a bag model - that, is a model in which the outward pressure of the quarks inside the bag is balanced by the inward pressure of the non-perturbative vacuum outside the bag - as opposed to a relativistic potential model, in which there is no energy-momentum conservation. In the MT bag model, as well as in the original version of the fuzzy bag model, the non-perturbative QCD vacuum is parametrized by a constant B in the Lagrangian density. One immediate consequence of including energy-momentum conservation in the fuzzy bag model is that the bag constant B will acquire a radial dependence, B = B(r). (author)

  5. Segmentation-free empirical beam hardening correction for CT

    Energy Technology Data Exchange (ETDEWEB)

    Schüller, Sören; Sawall, Stefan [German Cancer Research Center (DKFZ), Im Neuenheimer Feld 280, Heidelberg 69120 (Germany); Stannigel, Kai; Hülsbusch, Markus; Ulrici, Johannes; Hell, Erich [Sirona Dental Systems GmbH, Fabrikstraße 31, 64625 Bensheim (Germany); Kachelrieß, Marc, E-mail: marc.kachelriess@dkfz.de [German Cancer Research Center (DKFZ), Im Neuenheimer Feld 280, 69120 Heidelberg (Germany)

    2015-02-15

    Purpose: The polychromatic nature of the x-ray beams and their effects on the reconstructed image are often disregarded during standard image reconstruction. This leads to cupping and beam hardening artifacts inside the reconstructed volume. To correct for a general cupping, methods like water precorrection exist. They correct the hardening of the spectrum during the penetration of the measured object only for the major tissue class. In contrast, more complex artifacts like streaks between dense objects need other techniques of correction. If using only the information of one single energy scan, there are two types of corrections. The first one is a physical approach. Thereby, artifacts can be reproduced and corrected within the original reconstruction by using assumptions in a polychromatic forward projector. These assumptions could be the used spectrum, the detector response, the physical attenuation and scatter properties of the intersected materials. A second method is an empirical approach, which does not rely on much prior knowledge. This so-called empirical beam hardening correction (EBHC) and the previously mentioned physical-based technique are both relying on a segmentation of the present tissues inside the patient. The difficulty thereby is that beam hardening by itself, scatter, and other effects, which diminish the image quality also disturb the correct tissue classification and thereby reduce the accuracy of the two known classes of correction techniques. The herein proposed method works similar to the empirical beam hardening correction but does not require a tissue segmentation and therefore shows improvements on image data, which are highly degraded by noise and artifacts. Furthermore, the new algorithm is designed in a way that no additional calibration or parameter fitting is needed. Methods: To overcome the segmentation of tissues, the authors propose a histogram deformation of their primary reconstructed CT image. This step is essential for the

  6. Segmentation-free empirical beam hardening correction for CT.

    Science.gov (United States)

    Schüller, Sören; Sawall, Stefan; Stannigel, Kai; Hülsbusch, Markus; Ulrici, Johannes; Hell, Erich; Kachelrieß, Marc

    2015-02-01

    The polychromatic nature of the x-ray beams and their effects on the reconstructed image are often disregarded during standard image reconstruction. This leads to cupping and beam hardening artifacts inside the reconstructed volume. To correct for a general cupping, methods like water precorrection exist. They correct the hardening of the spectrum during the penetration of the measured object only for the major tissue class. In contrast, more complex artifacts like streaks between dense objects need other techniques of correction. If using only the information of one single energy scan, there are two types of corrections. The first one is a physical approach. Thereby, artifacts can be reproduced and corrected within the original reconstruction by using assumptions in a polychromatic forward projector. These assumptions could be the used spectrum, the detector response, the physical attenuation and scatter properties of the intersected materials. A second method is an empirical approach, which does not rely on much prior knowledge. This so-called empirical beam hardening correction (EBHC) and the previously mentioned physical-based technique are both relying on a segmentation of the present tissues inside the patient. The difficulty thereby is that beam hardening by itself, scatter, and other effects, which diminish the image quality also disturb the correct tissue classification and thereby reduce the accuracy of the two known classes of correction techniques. The herein proposed method works similar to the empirical beam hardening correction but does not require a tissue segmentation and therefore shows improvements on image data, which are highly degraded by noise and artifacts. Furthermore, the new algorithm is designed in a way that no additional calibration or parameter fitting is needed. To overcome the segmentation of tissues, the authors propose a histogram deformation of their primary reconstructed CT image. This step is essential for the proposed

  7. Anomalous precipitation hardening in Al-(1 wt%)Cu thin films

    NARCIS (Netherlands)

    Bergers, L. J. C.; De Hosson, J. Th. M.; Geers, M. G. D.; Hoefnagels, J. P. M.

    2018-01-01

    This paper concentrates on the precipitation hardening of Al-(1 wt%)Cu thin films. It is shown that in contrast to bulk, the well-known approach of precipitation hardening in confined systems like thin layers and thin films does not operate in the conventional way. This work analyses and discusses

  8. Soft ideal topological space and mixed fuzzy soft ideal topological space

    Directory of Open Access Journals (Sweden)

    Manash Borah

    2019-01-01

    Full Text Available In this paper we introduce fuzzy soft ideal and mixed fuzzy soft ideal topological spaces and some properties of this space. Also we introduce fuzzy soft $I$-open set, fuzzy soft $\\alpha$-$I$-open set, fuzzy soft pre-$I$-open set, fuzzy soft semi-$I$-open set and fuzzy soft $\\beta$-$I$-open set and discuss some of their properties.

  9. Recent advances in fuzzy preference modelling

    International Nuclear Information System (INIS)

    Van de Walle, B.; De Baets, B.; Kerre, E.

    1996-01-01

    Preference structures are well-known mathematical concepts having numerous applications in a variety of disciplines, such as economics, sociology and psychology. The generalization of preference structures to the fuzzy case has received considerable attention over the past years. Fuzzy preference structures allow a decision maker to express degrees of preference instead of the rigid classical yes-or-no preference assignment. This paper reports on the recent insights gained into the existence, construction and characterization of these fuzzy preference structures

  10. A NEW APPROACH ON SHORTEST PATH IN FUZZY ENVIRONMENT

    OpenAIRE

    A. Nagoorgani; A. Mumtaj Begam

    2010-01-01

    This paper introduces a new type of fuzzy shortest path network problem using triangular fuzzy number. To find the smallest edge by the fuzzy distance using graded mean integration representation of generalized fuzzy number for every node. Thus the optimum shortest path for the given problem is obtained.

  11. Implementing fuzzy polynomial interpolation (FPI and fuzzy linear regression (LFR

    Directory of Open Access Journals (Sweden)

    Maria Cristina Floreno

    1996-05-01

    Full Text Available This paper presents some preliminary results arising within a general framework concerning the development of software tools for fuzzy arithmetic. The program is in a preliminary stage. What has been already implemented consists of a set of routines for elementary operations, optimized functions evaluation, interpolation and regression. Some of these have been applied to real problems.This paper describes a prototype of a library in C++ for polynomial interpolation of fuzzifying functions, a set of routines in FORTRAN for fuzzy linear regression and a program with graphical user interface allowing the use of such routines.

  12. Fuzzy implicative hyper BCK-ideals of hyper BCK-algebras

    OpenAIRE

    Jun, Young Bae; Shim, Wook Hwan

    2002-01-01

    We consider the fuzzification of the notion of implicative hyper BCK-ideals, and then investigate several properties. Using the concept of level subsets, we give a characterization of a fuzzy implicative hyper BCK-ideal. We state a relation between a fuzzy hyper BCK-ideal and a fuzzy implicative hyper BCK-ideal. We establish a condition for a fuzzy hyper BCK-ideal to be a fuzzy implicative hyper BCK-ideal. Finally, we introduce the notion of hyper homomorphisms of hyper ...

  13. Residual stresses relaxation in surface-hardened half-space under creep conditions

    Directory of Open Access Journals (Sweden)

    Vladimir P. Radchenko

    2015-09-01

    Full Text Available We developed the method for solving the problem of residual stresses relaxation in surface-hardened layer of half-space under creep conditions. At the first stage we made the reconstruction of stress-strain state in half-space after plastic surface hardening procedure based on partial information about distribution for one residual stress tensor component experimentally detected. At the second stage using a numerical method we solve the problem of relaxation of self-balanced residual stresses under creep conditions. To solve this problem we introduce the following Cartesian system: x0y plane is aligned with hardened surface of half-space and 0z axis is directed to the depth of hardened layer. We also introduce the hypotheses of plane sections parallel to x0z and y0z planes. Detailed analysis of the problem has been done. Comparison of the calculated data with the corresponding test data was made for plane specimens (rectangular parallelepipeds made of EP742 alloy during T=650°C after the ultrasonic hardening with four hardening modes. We use half-space to model these specimens because penetration's depth of residual stresses is less than specimen general size in two digit exponent. There is enough correspondence of experimental and calculated data. It is shown that there is a decay (in modulus of pressing residual stresses under creep in 1.4–1.6 times.

  14. FUZZY-GENETIC CONTROL OF QUADROTOR UNMANNED AERIAL VEHICLES

    Directory of Open Access Journals (Sweden)

    Attila Nemes

    2016-03-01

    Full Text Available This article presents a novel fuzzy identification method for dynamic modelling of quadrotor unmanned aerial vehicles. The method is based on a special parameterization of the antecedent part of fuzzy systems that results in fuzzy-partitions for antecedents. This antecedent parameter representation method of fuzzy rules ensures upholding of predefined linguistic value ordering and ensures that fuzzy-partitions remain intact throughout an unconstrained hybrid evolutionary and gradient descent based optimization process. In the equations of motion the first order derivative component is calculated based on Christoffel symbols, the derivatives of fuzzy systems are used for modelling the Coriolis effects, gyroscopic and centrifugal terms. The non-linear parameters are subjected to an initial global evolutionary optimization scheme and fine tuning with gradient descent based local search. Simulation results of the proposed new quadrotor dynamic model identification method are promising.

  15. Ion irradiation-induced swelling and hardening effect of Hastelloy N alloy

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, S.J. [Key Laboratory of Artificial Micro-and Nano-structures of Ministry of Education, School of Physics and Technology, Wuhan University, Wuhan 430072 (China); Shanghai Institute of Applied Physics, Chinese Academy of Sciences, Shanghai 201800 (China); Li, D.H.; Chen, H.C.; Lei, G.H.; Huang, H.F.; Zhang, W.; Wang, C.B. [Shanghai Institute of Applied Physics, Chinese Academy of Sciences, Shanghai 201800 (China); Yan, L., E-mail: yanlong@sinap.ac.cn [Shanghai Institute of Applied Physics, Chinese Academy of Sciences, Shanghai 201800 (China); Fu, D.J. [Key Laboratory of Artificial Micro-and Nano-structures of Ministry of Education, School of Physics and Technology, Wuhan University, Wuhan 430072 (China); Tang, M. [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2017-06-15

    The volumetric swelling and hardening effect of irradiated Hastelloy N alloy were investigated in this paper. 7 MeV and 1 MeV Xe ions irradiations were performed at room temperature (RT) with irradiation dose ranging from 0.5 to 27 dpa. The volumetric swelling increases with increasing irradiation dose, and reaches up to 3.2% at 27 dpa. And the irradiation induced lattice expansion is also observed. The irradiation induced hardening initiates at low ion dose (≤1dpa) then saturates with higher ion dose. The irradiation induced volumetric swelling may be ascribed to excess atomic volume of defects. The irradiation induced hardening may be explained by the pinning effect where the defects can act as obstacles for the free movement of dislocation lines. And the evolution of the defects' size and number density could be responsible for the saturation of hardness. - Highlights: •Irradiation Swelling: The irradiation induced volumetric swelling increases with ion dose. •Irradiation Hardening: The irradiation hardening initiates below 1 dpa, then saturates with higher ion dose (1–10 dpa). •Irradiation Mechanism: The irradiation phenomena are ascribed to the microstructural evolution of the irradiation defects.

  16. Petr Hájek on mathematical fuzzy logic

    CERN Document Server

    Montagna, Franco

    2014-01-01

    This volume celebrates the work of Petr Hájek on mathematical fuzzy logic and presents how his efforts have influenced prominent logicians who are continuing his work. The book opens with a discussion on Hájek's contribution to mathematical fuzzy logic and with a scientific biography of him, progresses to include two articles with a foundation flavour, that demonstrate some important aspects of Hájek's production, namely, a paper on the development of fuzzy sets and another paper on some fuzzy versions of set theory and arithmetic. Articles in the volume also focus on the treatment of vague

  17. Fuzzy sets, rough sets, multisets and clustering

    CERN Document Server

    Dahlbom, Anders; Narukawa, Yasuo

    2017-01-01

    This book is dedicated to Prof. Sadaaki Miyamoto and presents cutting-edge papers in some of the areas in which he contributed. Bringing together contributions by leading researchers in the field, it concretely addresses clustering, multisets, rough sets and fuzzy sets, as well as their applications in areas such as decision-making. The book is divided in four parts, the first of which focuses on clustering and classification. The second part puts the spotlight on multisets, bags, fuzzy bags and other fuzzy extensions, while the third deals with rough sets. Rounding out the coverage, the last part explores fuzzy sets and decision-making.

  18. Fuzzy logic control for camera tracking system

    Science.gov (United States)

    Lea, Robert N.; Fritz, R. H.; Giarratano, J.; Jani, Yashvant

    1992-01-01

    A concept utilizing fuzzy theory has been developed for a camera tracking system to provide support for proximity operations and traffic management around the Space Station Freedom. Fuzzy sets and fuzzy logic based reasoning are used in a control system which utilizes images from a camera and generates required pan and tilt commands to track and maintain a moving target in the camera's field of view. This control system can be implemented on a fuzzy chip to provide an intelligent sensor for autonomous operations. Capabilities of the control system can be expanded to include approach, handover to other sensors, caution and warning messages.

  19. Fuzzy set classifier for waste classification tracking

    International Nuclear Information System (INIS)

    Gavel, D.T.

    1992-01-01

    We have developed an expert system based on fuzzy logic theory to fuse the data from multiple sensors and make classification decisions for objects in a waste reprocessing stream. Fuzzy set theory has been applied in decision and control applications with some success, particularly by the Japanese. We have found that the fuzzy logic system is rather easy to design and train, a feature that can cut development costs considerably. With proper training, the classification accuracy is quite high. We performed several tests sorting radioactive test samples using a gamma spectrometer to compare fuzzy logic to more conventional sorting schemes

  20. Application of fuzzy logic control in industry

    International Nuclear Information System (INIS)

    Van der Wal, A.J.

    1994-01-01

    An overview is given of the various ways fuzzy logic can be used to improve industrial control. The application of fuzzy logic in control is illustrated by two case studies. The first example shows how fuzzy logic, incorporated in the hardware of an industrial controller, helps to finetune a PID controller, without the operator having any a priori knowledge of the system to be controlled. The second example is from process industry. Here, fuzzy logic supervisory control is implemented in software and enhances the operation of a sintering oven through a subtle combination of priority management and deviation-controlled timing