Learn More
Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined(More)
One of the reasons why fuzzy methodology is successful is that fuzzy systems are universal approximators, i.e., that we can approximate an arbitrary continuous function within any given accuracy by a fuzzy system. In some practical applications (e.g., in control), it is desirable to approximate not only the original function, but also its derivatives (so(More)
—This paper introduces a singular value-based method for reducing a given fuzzy rule set. The method conducts singular value decomposition of the rule consequents and generates certain linear combinations of the original membership functions to form new ones for the reduced set. The present work characterizes membership functions by the conditions of sum(More)
—This paper introduces a new approach for fuzzy interpolation and extrapolation of sparse rule base comprising of membership functions with finite number of characteristic points. The approach calls for representing membership functions as points in high-dimensional Cartesian spaces using the locations of their characteristic points as coordinates. Hence, a(More)
This paper introduces a new approach for fuzzy approximation of continuous function on a compact domain. The approach calls for sampling the function over a set of rectangular grid points and applying singular value decomposition to the sample matrix. The resulting quantities are then tailored to become rule consequences and membership functions via the(More)
This paper presents a multi-biometric verification system that combines speaker verification, fingerprint verification with face identification. Their respective equal error rates (EER) are 4.3%, 5.1% and the range of (5.1% to 11.5%) for matched conditions in facial image capture. Fusion of the three by majority voting gave a relative improvement of 48%(More)
—One of the typical important criteria to be considered in real-time control applications is the computational complexity of the controllers, observers, and models applied. In this paper, a singular value decomposition (SVD)-based complexity reduction technique is proposed for Takagi Sugeno (TS) fuzzy models. The main motivation is that the TS fuzzy model(More)