Fuzzy logic based security region evaluation of the urban rail transit operating system

In the process of urban rail transit system operation, various factors may interact with each other and cause accidents. The complexity and uncertainty of the urban rail transit operating system make fuzzy logic method become an efficient tool to deal with the security information. The paper attempts to combine fuzzy logic based information process method with the security region method to solve the security problems in urban rail transit system. Based on the research of information aggregation, fuzzy decision making, and the current results of security region research, the paper proposes a new solution to the security region control and its management. The main points include: the security region information collection, information fusion and aggregation methods with multiple source of the rail transit security regions, fuzzy logic based the urban rail transit security region decision and control, and the simulation of these theoretical models. It will provide theoretical support for the urban rail transit security region decision and control, and also promote the management level of the Chinese urban rail transit operating system.

[1]  Tongwen Chen,et al.  A new method for stabilization of networked control systems with random delays , 2005 .

[2]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Krassimir T. Atanassov,et al.  Intuitionistic fuzzy sets , 1986 .

[4]  Lotfi A. Zadeh,et al.  Fuzzy Logic , 2009, Encyclopedia of Complexity and Systems Science.

[5]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[6]  Jerry M. Mendel,et al.  Connect Karnik-Mendel Algorithms to Root-Finding for Computing the Centroid of an Interval Type-2 Fuzzy Set , 2011, IEEE Transactions on Fuzzy Systems.

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Tassos Dimitriou,et al.  Autonomic Communication Security in Sensor Networks , 2005, WAC.

[9]  Hsing-Chia Kuo,et al.  An image tracking system for welded seams using fuzzy logic , 2002 .

[10]  Dong Tao Wang,et al.  Security Region Based Dynamic Security Risk Assessment of Power Transmission System , 2012 .

[11]  Lotfi A. Zadeh,et al.  Toward extended fuzzy logic - A first step , 2009, Fuzzy Sets Syst..

[12]  Pla Information,et al.  Identity-Based Secure Inter-Domain Routing Protocol , 2009 .

[13]  Shiwei Xia,et al.  The Application of Energy Sensitivity for Practical Dynamic Security Region Calculation , 2012 .

[14]  Lech J. Janczewski,et al.  Development of Information Security Baselines for Healthcare Information Systems in New Zealand , 2002, Comput. Secur..

[15]  M. K. Angelova,et al.  Intuitionistic fuzzy logic based quality assessment of simple genetic algorithm , 2012, 2012 16th International Conference on System Theory, Control and Computing (ICSTCC).

[16]  S. Chakravartya,et al.  A PSO based integrated functional link net and interval type-2 fuzzy logic system for predicting stock market indices , 2015 .

[17]  Essam A. Al-Ammar,et al.  Framework for Identification of Power System Operating Security Regions , 2009, 2009 Third International Conference on Network and System Security.

[18]  Masaharu Mizumoto,et al.  Some Properties of Fuzzy Sets of Type 2 , 1976, Inf. Control..

[19]  Atef Ghobrial,et al.  Evaluating security of rail transit systems: A metric system approach , 1995 .

[20]  Dimitris Skarlatos,et al.  Railway wheel fault diagnosis using a fuzzy-logic method , 2004 .

[21]  Jia Limin Security region estimation of peak amplitudes of track irregularities based on danger points distribution ratio and SVM , 2012 .

[22]  Chengshan Wang,et al.  Distribution system security region: definition, model and security assessment , 2012 .

[23]  Jerry M. Mendel,et al.  Interval type-2 fuzzy logic systems , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).

[24]  Yu Yi-xin Review of Study on Methodology of Security Regions of Power System , 2008 .

[25]  George Gargov,et al.  Elements of intuitionistic fuzzy logic. Part I , 1998, Fuzzy Sets Syst..

[26]  Enrique E. Mombello,et al.  Expert system for the assessment of power transformer insulation condition based on type-2 fuzzy logic systems , 2011, Expert Syst. Appl..

[27]  A. M. El-Zonkoly,et al.  Optimal tunning of lead-lag and fuzzy logic power system stabilizers using particle swarm optimization , 2009, Expert Syst. Appl..

[28]  Robert Ivor John,et al.  A survey-based type-2 fuzzy logic system for energy management in hybrid electrical vehicles , 2012, Inf. Sci..

[29]  J. Mendel Fuzzy logic systems for engineering: a tutorial , 1995, Proc. IEEE.

[30]  Anastasia Loukaitou-Sideris,et al.  Rail Transit Security in an International Context , 2006 .

[31]  Jerry M. Mendel,et al.  Type-2 fuzzy logic systems , 1999, IEEE Trans. Fuzzy Syst..

[32]  Hani Hagras,et al.  An interval type-2 Fuzzy Logic based system for model generation and summarization of arbitrage opportunities in stock markets , 2012, 2012 12th UK Workshop on Computational Intelligence (UKCI).

[33]  Binqiang Wang,et al.  Identity-Based Secure Inter-Domain Routing Protocol: Identity-Based Secure Inter-Domain Routing Protocol , 2009 .

[34]  Hani Hagras,et al.  A hierarchical type-2 fuzzy logic control architecture for autonomous mobile robots , 2004, IEEE Transactions on Fuzzy Systems.

[35]  Jerry M. Mendel,et al.  Study on enhanced Karnik-Mendel algorithms: Initialization explanations and computation improvements , 2012, Inf. Sci..

[36]  G. Pillai,et al.  Design of an Interval Type-2 Fuzzy Logic Controller for Automatic Voltage Regulator System , 2011 .

[37]  Jerry M. Mendel,et al.  Interval Type2 Fuzzy Sets , 2010 .