#### Filter Results:

#### Publication Year

1997

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined… (More)

One of the reasons why fuzzy methodology is successful is that fuzzy systems are universal approximators, i.e., that we can approximate an arbitrary continuous function within any given accuracy by a fuzzy system. In some practical applications (e.g., in control), it is desirable to approximate not only the original function, but also its derivatives (so… (More)

—This paper introduces a singular value-based method for reducing a given fuzzy rule set. The method conducts singular value decomposition of the rule consequents and generates certain linear combinations of the original membership functions to form new ones for the reduced set. The present work characterizes membership functions by the conditions of sum… (More)

- Péter Baranyi, Yeung Yam
- 2000

This technical report summarises the use of SVD based reduction for applications using generalised rational form. Some practical formulas are also introduced for using piece-wise linear antecedent sets. Fuzzy algorithms form popular engineering tool to large complex systems. For large rule bases exceeding direct operation capacity an extended algorithm is… (More)

This paper presents a multi-biometric verification system that combines speaker verification, fingerprint verification with face identification. Their respective equal error rates (EER) are 4.3%, 5.1% and the range of (5.1% to 11.5%) for matched conditions in facial image capture. Fusion of the three by majority voting gave a relative improvement of 48%… (More)

—This paper introduces a new approach for fuzzy interpolation and extrapolation of sparse rule base comprising of membership functions with finite number of characteristic points. The approach calls for representing membership functions as points in high-dimensional Cartesian spaces using the locations of their characteristic points as coordinates. Hence, a… (More)

This paper introduces a new approach for fuzzy approximation of continuous function on a compact domain. The approach calls for sampling the function over a set of rectangular grid points and applying singular value decomposition to the sample matrix. The resulting quantities are then tailored to become rule consequences and membership functions via the… (More)

Rule interpolation methods deal with sparse fuzzy rule bases. The KH interpolation method, which has advantageous computational behaviour , can produce ,,abnormal " output in certain cases. Recently a new method has been proposed to eliminate this property. The goal of this paper is to investigate the mathematical stability of the new α-cut based… (More)

—One of the typical important criteria to be considered in real-time control applications is the computational complexity of the controllers, observers, and models applied. In this paper, a singular value decomposition (SVD)-based complexity reduction technique is proposed for Takagi Sugeno (TS) fuzzy models. The main motivation is that the TS fuzzy model… (More)