Learn More
Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is for a server under stress to install a router throttle at selected upstream routers. The throttle can be the leaky-bucket rate at which a router can forward packets destined(More)
One of the reasons why fuzzy methodology is successful is that fuzzy systems are universal approximators, i.e., that we can approximate an arbitrary continuous function within any given accuracy by a fuzzy system. In some practical applications (e.g., in control), it is desirable to approximate not only the original function, but also its derivatives (so(More)
—This paper introduces a singular value-based method for reducing a given fuzzy rule set. The method conducts singular value decomposition of the rule consequents and generates certain linear combinations of the original membership functions to form new ones for the reduced set. The present work characterizes membership functions by the conditions of sum(More)
  • Yeung Yam
  • 1997
This paper introduces a new approach for fuzzy approximation of continuous function on a compact domain. The approach calls for sampling the function over a set of rectangular grid points and applying singular value decomposition to the sample matrix. The resulting quantities are then tailored to become rule consequences and membership functions via the(More)
This technical report summarises the use of SVD based reduction for applications using generalised rational form. Some practical formulas are also introduced for using piece-wise linear antecedent sets. Fuzzy algorithms form popular engineering tool to large complex systems. For large rule bases exceeding direct operation capacity an extended algorithm is(More)
During rRNA biogenesis, multiple RNA and protein substrates are modified and assembled through the coordinated activity of many factors. In Saccharomyces cerevisiae, the double-stranded RNA nuclease Rnt1p and the H/ACA snoRNA pseudouridylase complex participate in the transformation of the nascent pre-rRNA transcript into 35S pre-rRNA. Here we demonstrate(More)
This paper presents a multi-biometric verification system that combines speaker verification, fingerprint verification with face identification. Their respective equal error rates (EER) are 4.3%, 5.1% and the range of (5.1% to 11.5%) for matched conditions in facial image capture. Fusion of the three by majority voting gave a relative improvement of 48%(More)
| In many practical applications of fuzzy methodology, it is desirable to go beyond the interval 0; 1] and to consider more general fuzzy values: e.g., intervals, or real numbers outside the interval 0; 1]. When we increase the set of possible fuzzy values, we thus increase the number of bits necessary to store each degree, and therefore, increase the(More)
—This paper introduces a new approach for fuzzy interpolation and extrapolation of sparse rule base comprising of membership functions with finite number of characteristic points. The approach calls for representing membership functions as points in high-dimensional Cartesian spaces using the locations of their characteristic points as coordinates. Hence, a(More)