III. FUZZY-NEURAL NETWORK MODEL A fuzzy-neural network is established, in accordance with the requirements of a feasible safety assessment. The five layer network is illustrated as Fig1. The first layer is the Input layer, of which each node signifies one variable. The nodes amount to 7 on the Input layer. The second layer with altogether 35 nodes is the Obfuscation layer for the purpose of obfuscating the input variable. BP Inclusion layer is known as the third layer serves as the reflection between the input variable and the output variable. The 71 nodes are derived from the 35 nodes of the second layer in the light of Kolmogorov Complexity. The fourth layer is the Output layer, where the obfuscated results come forth. The fifth is the Defuzzification layer, where more precise coming out can be expected by applying the defuzzification principles. The five layers mentioned is characterized with its capacity of self-adjustment. IV. AN ASSESSMENT INSTANCE The safety assessment of Bridge A is rendered in the light of the above network as referred to. Bridge A has a length of 1187.489 m, with a clearspan of 960 m and a width of 30 m. As a double- tower suspended bridge, an assessment is to be carried out to this five-year-old. A Sample learning A well-distributed value is vital to a relatively thorough assessment. Twenty arrays of theoretical input samples by the auto computing will generate an output scored by the experts. A hierarchy will manifest the assessment where A, B, C, D, E different degrees is to be brought forth through a weight multiplied by a centesimal criteria. The input-output is as TabI goes, of which the weight vector is ω = [ 0108, 01105, 01175, 01114, 01144, 01174, 01208 ] B Network Training The ten arrays is input in the neural-fuzzy network, where a satisfied result is generated with a discrepancy Ε < 0.00001. Two hundred and forty four learning processes confirm the parameter value. Thus is established the Fuzzy-neural network to the safety assessment of the large-span suspended bridge. In order to justify the feasibility, randomly generated five arrays of input samples yield the results in comparison with the experts’ scoring in TabII. TABLE I. Network training sample data Shape of the stiffened girder (F 4 ) Shape of main cable (F 6 ) Tension of the anchored cable (F 7 ) Sample Exterior examination (F 1 ) Tower displacement (F 2 ) Tower stress (F 3 ) Cable stress (F 5 ) 1 100 0.05 0.7 0.65 0.01 0.75 0 A Safety assessments Result 2 100 0.02 0.6 0.65 0 0.8 0.01 A 3 95 0.1 0.7 0.7 0.02 0.75 0.01 A 4 90 0.1 0.65 0.8 0.025 0.85 0.02 A 5 85 0.1 0.85 0.9 0.03 1 0.02 B 6 88 0.12 0.9 0.82 0.028 0.95 0.03 B 7 85 0.15 0.75 0.95 0.04 1.05 0.035 B 8 81 0.22 0.95 1.05 0.055 1.12 0.048 B 9 72 0.28 0.9 1.1 0.065 1.13 0.055 C 10 75 0.3 1.1 1.15 0.07 1.1 0.052 C TABLE.II Assessments results of verifying sample Sample F1 F2 F3 F4 F5 F6 F7 Result Export 11 81 .0.2 0.95 1.3 0.02 1.05 0.028 B [0.02,0.97,0.02,0,0] 12 83 0.09 0.81 0.75 0.033 0.89 0.022 B [0.07,0.71,0,0,0.1] 13 91 0.06 0.77 0.81 0.022 0.79 0.021 A [0.95,0.03,0,0,0] 14 70 0.35 1.15 1.12 0.075 1.35 0.074 D [0,0,0,0.97,0] 15 35 0.85 1.55 1.61 0.131 1.59 0.122 E [0,0,0,0,1] 44
According to maximum membership degree principle, the five samples yield the very similar results as the experts have given. Fuzzy-neural network, capable of storing the experts’ concerned knowledge, is verified to be applied to the safety assessment of suspended bridge A Assessment Result .Four reliability observations provides an array of data concerned with the exterior look, the main cable elevation, main beam elevation, the internal force of main members and the stress. The array goes as X = [ 84, 0113, 0197, 0192, 01048, 0194, 01021 ]. The fuzzy-neural network gives a output as Y = [ 0, 0199, 0, 0, 0 ]. The assessment result suggest Bridge A is in good condition. An integrated assessment criterion is on the list of Regulations of Roads and Bridges, JTG H11 – 2004. Five degrees manifest different condition of roads and bridges. A, B, C, D, E suggest the condition going from excellent structure to these in need of overhaul. An 82 points is generated in the light of this criterion, which is rendered as B class, characterized by the fine structure, good vital facilities and qualified capacity to weight. The B class of Bridge A also is statistically likened to the results yielded by the fuzzy-neural network. V. CONCLUSION A model of safety assessment to suspended bridge is established when the seven criteria is induced as exterior examination, tower displacement, tower stress, shape of the stiffened girder, cable force, shape of main cable and the tension of anchored cable. The solid assessment procedures comes to be shaped based on the fuzzy-neural network, which is sufficient to overcome the inadequacy of the traditional assessment measures, as the lacking precise results, and the dependency on the experience of experts. The fuzzy-neural network yields a result suggesting Bridge A is in good condition. The result is in correspondence with that brought forth based on the criteria of Regulations of Roads and Bridges, JTG H11 – 2004. The fuzzy-neural network, with a representation of the knowledge and the intuitive insight, reduces the human interference with the results, leading to an objective yielding. REFERENCES [1]. Maru S,Nagpal A K. “Neural network for creep and shrinkage deflections in reinforced concrete frames,” Computing in Civil Engineering. No. 4, Vol. 18, pp. 350-359, 2004, [2]. Hopfield J J. “Neural networks and physical systems with emergent colletive computational abilities,” Proc. of the National <strong>Academy</strong> of Science. U.S.A., 1982, 79: 2554-2558 [3]. Melham H G,Cheng Y. “Prediction of remaining service life of bridge decks using machine learning,” Computing in Civil Engineering, No. 1,Vol. 17, pp. 1-9, 2003. [4]. Bin Zou, Xiaoyu Liao and Yongnian Zeng, “An improved BP neural network based on evaluating and forecasting model of water quality in Second Songhua River of China,” Chinese Journal of Geochemistry, No. 1,pp. 1, 2006 [5]. LIU Xu-zheng, HUANG Ping-ming and ZHANG Yong-jian, “Reasearch On Safety Assessment of Long-span Suspanded Bridges Based on Fuzzy-neural Network,”Journal of Zhengzhou Universty(Engineering Science), No.3, Vol. 28, pp. 48-51,sep 2007. [6]. Jinwei Gao, Xueye Wang and Xiaobing Li, “Prediction of polyamide properties using quantum-chemical methods and BP artificial neural networks,” Journal of Molecular Modeling, No. 4, pp. 513-520,2008 [7]. V.M. Kuz’kin, V.D. Opp.engeĭm and S.A. Pereselkov, “The sensitivity of monitoring by measuring the frequency shifts of the sound field interference pattern,” Akusticheskiĭ Zhurnal, Vol. 54, No. 2, pp. 267–271, 2008. [8]. Ko H,Arozullah M. “Background No.ise supp.ression for signal enhancement by No.velty filtering,” IEEE Transactions on Aerospace and Electronic Systems, pp.102-113, 36, 2000. [9]. HUANG Ping-ming , LIU Xu-zheng and ZHANGYong-jian, “Health Monitoring and Structure Assessment of the Yichang Yangtze River Highway Bridge,” Journal of Jiangnan University (Natural Science Edition), No. 2, Vol. 7,pp. 211-215, Apr 2008. [10]. SugeNo. M,Kang G T. “Structure Identification Fuzzy Model,” Fuzzy Sets and Systems, 1988, 28 (1): 15-33 [11]. Xia P Q , Brownjohon J M W. “Bridges structural condition assessment using systematically validate finite-element model,” Bridge Engineering, No. 5, Vol. 9,pp. 418-423, 2004. [12]. LIU Xu-zheng, XU Sheng-lei and ZHANG Yong-jian, “Fuzzy safety assessment of Long-spanSuspended Bridges,”journal of Nanchang university (Engineering & techNo.logy), No. 1,Vol. 30, pp. 100-103, mar 2008 [13]. LIU Xu-zheng, HUANG Ping-ming and XU Han-zhang,”Analysis of parameters’ sensitiveniess of cable-stayed bridges with single tower,”Journal of Chang’an University (Natural Science Edition),No. 6, Vol. 27, pp. 63-66, No.v 2007 [14]. LIU Xu-zheng, WANG Da and XU Han-zheng,”Prediction analysis of bridge structural response based on linear regression,” Journal of Chang’an University(Natural Science Edition), No. 5, Vol. 29, pp.-76-80, Sept 2009. [15]. LIU Xu-zheng, NIU Yan-wei and HUANG Ping-ming, “Mechanics characteristics of RC beam bridge strengthend with adding beams,” Jourval of Chang’an University(Natural Sceince Edition),No. 4, Vol. 28, pp. 62-65,Jul 2008. [16]. Kaminski P C. The app.roximate location of damage through the analysis of natual frequencies with artificial neural networks[J]. Journal of Process Mechanical Engineering, pp. 117-123, 209, 1995. [17]. V. M. Kuz’kin, S. A. Pereselkov and E. A. Petnikov, “The possibility of reconstruction of two-dimensional random inhomogeneities in a shallow sea by frequency shifts of the spatial,” Physics of Wave Phenomena, No. 1, pp. 4-51, 2008 [18]. B. G. Katsnel’son, J. Lynch and A. V. Tshoidze, “Space-frequency distribution of sound field intensity in the vicinity of the temperature front in shallow water,” Acoustical Physics, Vol. 53, No. 5, pp. 695–702,2007. [19]. Renders J M,Flasse S P. Hybrid methods using genetic algorithms for global optimization .IEEE Trans on System,Man,and Cybernetics-Part B:Cybernetics. 1996,262, 26(2) :243-258 . [20]. Perttu Laurinen,Juha Roning. “An adaptive neural network model for predicting the post roughing mill temperature of steel slabs in the reheating furnace,” Journal of Materials Processing Technology, 2005,168, 168 :423-430 . [21]. Gumrah F, OZ B.”The application of artificial neural networks for the prediction of water quality of polluted aquifer,” .Water Air Soil Pollut, 2000,1191-4, 119(1-4) :275-291 . [22]. Rao S V, Protopopesca V, Mann R C, Oblow E M.and Iyengar S S. “Learning Algorithms for Feedforward Networks Based on Finite Samples,” IEEE Trans Neural Networks, 1996,74, 7(4) :926-939 45
- Page 1 and 2:
Proceedings The Second Internationa
- Page 3 and 4: Table of Contents Message from the
- Page 5 and 6: Zuming Xiao, Zhan Guo, Bin Tan, and
- Page 7 and 8: Message from the Symposium Chairs T
- Page 9 and 10: Second International Symposium on N
- Page 11 and 12: ISBN 978-952-5726-09-1 (Print) Proc
- Page 13 and 14: model that can deal with time serie
- Page 15 and 16: ISBN 978-952-5726-09-1 (Print) Proc
- Page 17 and 18: training for the Wushu competition
- Page 19 and 20: ISBN 978-952-5726-09-1 (Print) Proc
- Page 21 and 22: information, called weak uncertain
- Page 23 and 24: Student side Student side Student s
- Page 25 and 26: ISBN 978-952-5726-09-1 (Print) Proc
- Page 27 and 28: If we define element of student as
- Page 29 and 30: ISBN 978-952-5726-09-1 (Print) Proc
- Page 31 and 32: QoS, each frame data is divided int
- Page 33 and 34: ISBN 978-952-5726-09-1 (Print) Proc
- Page 35 and 36: for Imaging Two and Three Phase Flo
- Page 37 and 38: ISBN 978-952-5726-09-1 (Print) Proc
- Page 39 and 40: A. Profiling&following control algo
- Page 41 and 42: Research and Realization about Conv
- Page 43 and 44: PDF document structure is a tree st
- Page 45 and 46: ISBN 978-952-5726-09-1 (Print) Proc
- Page 47 and 48: support 10 Mb / s. But ENC28J60 onl
- Page 49 and 50: ISBN 978-952-5726-09-1 (Print) Proc
- Page 51 and 52: condition the first byte output of
- Page 53: ISBN 978-952-5726-09-1 (Print) Proc
- Page 57 and 58: ISBN 978-952-5726-09-1 (Print) Proc
- Page 59 and 60: ubber according to the mass ratio o
- Page 61 and 62: Ⅲ. AN IMPROVED DNA ALGORITHM FOR
- Page 63 and 64: Ⅴ.CONCLUSION REMARKS DNA computer
- Page 65 and 66: its first child q 1 on the left, th
- Page 67 and 68: chains can greatly improve efficien
- Page 69 and 70: II. RELATED WORK A. Mobile Service
- Page 71 and 72: special services. SOAP is used to b
- Page 73 and 74: detection methods of DDoS attacks m
- Page 75 and 76: Step4 calculate the new subordinate
- Page 77 and 78: Figure 1. An analysis of the partit
- Page 79 and 80: ISBN 978-952-5726-09-1 (Print) Proc
- Page 81 and 82: The preceding three formulas can be
- Page 83 and 84: ISBN 978-952-5726-09-1 (Print) Proc
- Page 85 and 86: And the decay speed of buffer seque
- Page 87 and 88: ISBN 978-952-5726-09-1 (Print) Proc
- Page 89 and 90: distance of view point. Given that
- Page 91 and 92: ISBN 978-952-5726-09-1 (Print) Proc
- Page 93 and 94: Ⅳ. EVALUATION OF BLENDED LEARNING
- Page 95 and 96: ISBN 978-952-5726-09-1 (Print) Proc
- Page 97 and 98: symmetric with respect to the origi
- Page 99 and 100: ISBN 978-952-5726-09-1 (Print) Proc
- Page 101 and 102: each sample belongs to each categor
- Page 103 and 104: ISBN 978-952-5726-09-1 (Print) Proc
- Page 105 and 106:
A. Data Preparing To generate our t
- Page 107 and 108:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 109 and 110:
oth α and β . determination of Qu
- Page 111 and 112:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 113 and 114:
Strong earthquake 0.1< M L
- Page 115 and 116:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 117 and 118:
indirect causes, and the logical re
- Page 119 and 120:
egression. Granger causality test i
- Page 121 and 122:
B. Evaluation We have evaluated thi
- Page 123 and 124:
used as a source and neighboring ce
- Page 125 and 126:
Figure 3. Drainage networks generat
- Page 127 and 128:
Combinational logic unit failures i
- Page 129 and 130:
Tabal.1 Combinational fault logic t
- Page 131 and 132:
under the endorsement of both the m
- Page 133 and 134:
TABLE I. DESCRIPTION OF PROPOSITION
- Page 135 and 136:
Figure 2. The process of the invers
- Page 137 and 138:
Figure 9. (a)the original image.(b)
- Page 139 and 140:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 141 and 142:
In order to reduce to the number of
- Page 143 and 144:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 145 and 146:
that studying being going to be to
- Page 147 and 148:
Reference[10] analyzed the evolutio
- Page 149 and 150:
module, communication module, apper
- Page 151 and 152:
After the comprehensive performance
- Page 153 and 154:
system testing can be seen that the
- Page 155 and 156:
III. AUTONOMIC RESOURCE ALLOCATION
- Page 157 and 158:
The QoE i (T i ) is the ith user’
- Page 159 and 160:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 161 and 162:
nodes will be formed one cluster, t
- Page 163 and 164:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 165 and 166:
Where n is the number of data point
- Page 167 and 168:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 169 and 170:
Keyboard event Application User mod
- Page 171 and 172:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 173 and 174:
SQL Azure will eventually include a
- Page 175 and 176:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 177 and 178:
The nodes in the suffix tree are dr
- Page 179 and 180:
[3] Y. Li, S. M. Chung, and J. D. H
- Page 181 and 182:
some drilling fluid produces hydrog
- Page 183 and 184:
"normalization", whose membership b
- Page 185 and 186:
and minimum structural elements in
- Page 187 and 188:
esults of the spatial transform par
- Page 189 and 190:
B. Research on protocol actions Com
- Page 191 and 192:
ACKNOWLEDGMENT This work is funded
- Page 193 and 194:
A. Problem Description In a small b
- Page 195 and 196:
[4] Huang, Hung, and J. Y. jen Hsu.
- Page 197 and 198:
Further by calculating, the followi
- Page 199 and 200:
TABLE II. THE CONCENTRATION BETWEEN
- Page 201 and 202:
private key that obtained by using
- Page 203 and 204:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 205 and 206:
ontology, and the domain dictionary
- Page 207 and 208:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 209 and 210:
Eq.4 is NP-hard and can be solved b
- Page 211 and 212:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 213 and 214:
Where: G i is the selection field o
- Page 215 and 216:
If there is X j in a generation, wh
- Page 217 and 218:
Theorem 2.4([10]). Let L 1 and L 2
- Page 219 and 220:
The relation between the lattice im
- Page 221 and 222:
Figure 2. Example of single-step de
- Page 223 and 224:
evocation and the fourth group stor
- Page 225 and 226:
focused mainly on rule-based forms
- Page 227 and 228:
Ⅵ. CONCLUSION Figure 6. The Flask
- Page 229 and 230:
EDCF in comparison with DCF, has so
- Page 231 and 232:
B. Simulation results and analysis
- Page 233 and 234:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 235 and 236:
in routing table. When search resou
- Page 237 and 238:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 239 and 240:
others through the selective emotio
- Page 241 and 242:
such as weather information, techno
- Page 243 and 244:
the opening window, a related page
- Page 245 and 246:
1) Process context storage areas. I
- Page 247 and 248:
V. CONCLUSION In this thesis, sCPU-
- Page 249 and 250:
main types of horizontal search env
- Page 251 and 252:
Enterprise Portal security provides
- Page 253 and 254:
() t = [ S () t S () t ] T N S ,...
- Page 255 and 256:
[2] Kumaravel, N., and Kavitha, V.,
- Page 257 and 258:
output, so BP network has been wide
- Page 259 and 260:
input to the artificial neural netw
- Page 261 and 262:
(2) In a process (tokens from outsi
- Page 263 and 264:
The reduction process consists of t
- Page 265 and 266:
all eight normal vectors are identi
- Page 267 and 268:
is B object , and the number of emp
- Page 269 and 270:
xi, j y' = εα ( (1 + tanh( )) −
- Page 271 and 272:
Error 8000 7000 6000 5000 4000 3000
- Page 273 and 274:
Architecture (AMBA) a new bus archi
- Page 275 and 276:
In order to ensure the smooth proce
- Page 277 and 278:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 279 and 280:
In this paper, we adopt two Sobel o
- Page 281 and 282:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 283 and 284:
four layers.The far right of the gr
- Page 285 and 286:
ISBN 978-952-5726-09-1 (Print) Proc
- Page 287 and 288:
TABLE II. OPERATIONAL EMPLOYEE TABL
- Page 289 and 290:
A. Object-relational Type To audit
- Page 291 and 292:
to execution time. Also, DBA would
- Page 293 and 294:
Liping Chen .......................