An Intelligent Approach for Nuclear Security Measures on Nuclear Materials: Demands and Needs Authors: A.Z.M. Salahuddin, Altab Hossain, R. A. Khan, M.S.

Slides:



Advertisements
Similar presentations
 Negnevitsky, Pearson Education, Lecture 5 Fuzzy expert systems: Fuzzy inference n Mamdani fuzzy inference n Sugeno fuzzy inference n Case study.
Advertisements

AI – CS364 Fuzzy Logic Fuzzy Logic 3 03 rd October 2006 Dr Bogdan L. Vrusias
Chapter Eleven Artificial Intelligence II: Operational Perspective.
NCSR “DEMOKRITOS” Institute of Nuclear Technology and Radiation Protection NATIONAL TECHNICAL UNIVERSITY OF ATHENS School of Chemical Engineering Fuzzy.
Fuzzy Expert System. Basic Notions 1.Fuzzy Sets 2.Fuzzy representation in computer 3.Linguistic variables and hedges 4.Operations of fuzzy sets 5.Fuzzy.
Fuzzy Logic E. Fuzzy Inference Engine. “antecedent” “consequent”
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
A Fuzzy-Based Assessment Model for Faculty Performance Evaluation Mohammed Onimisi Yahaya College of Computer Sciences and Engineering King Fahd University.
Fuzzy Expert System.
WELCOME TO THE WORLD OF FUZZY SYSTEMS. DEFINITION Fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the concept.
An Intelligent System for Dynamic Online Allocation of Information on Demand from the Internet Thamar E. Mora, Rene V. Mayorga Faculty of Engineering,
Chapter 2 A Strategy for the Appraisal of Public Sector Investments.
Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems (sections 2.7, 2.8,
The Equivalence between fuzzy logic controllers and PD controllers for single input systems Professor: Chi-Jo Wang Student: Nguyen Thi Hoai Nam Student.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Computer Controller System & Robotics Subject Code : 6872 Semester :7th Department.
Rule-Based Fuzzy Model. In rule-based fuzzy systems, the relationships between variables are represented by means of fuzzy if–then rules of the following.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
D EVELOPMENT OF AN AUTOMATED QUALITY MANAGEMENT SYSTEM TO CONTROL DISTRICT HEATING Nigina Toktasynova, Sholpan Sagyndykova, Zhanat Kenzhebayeva, Maksat.
Fuzzy Rules 1965 paper: “Fuzzy Sets” (Lotfi Zadeh) Apply natural language terms to a formal system of mathematical logic
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
1 Utilizing fuzzy logic and trend analysis for effective intrusion detection Author: Martin Botha and Rossouw von Solms Source: Computers & Security Vol.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Fuzzy Inference (Expert) System
SIPI61508 Soft computing based qualitative method for determination of SILs István Ajtonyi 1 – László Ormos 2 1 University of Miskolc, Institute of Electric.
Mobile Robot Navigation Using Fuzzy logic Controller
INVENTORY CONTROL AS IDENTIFICATION PROBLEM BASED ON FUZZY LOGIC ALEXANDER ROTSHTEIN Dept. of Industrial Engineering and Management, Jerusalem College.
Ming-Feng Yeh Fuzzy Control The primary goal of control engineering is to distill and apply knowledge about how to control a process so that the.
Fuzzy Reinforcement Learning Agents By Ritesh Kanetkar Systems and Industrial Engineering Lab Presentation May 23, 2003.
Lecture # 17 PRM 702 Project Risk Management Ghazala Amin
PART 9 Fuzzy Systems 1. Fuzzy controllers 2. Fuzzy systems and NNs 3. Fuzzy neural networks 4. Fuzzy Automata 5. Fuzzy dynamic systems FUZZY SETS AND FUZZY.
Fuzzy Applications In Finance and Investment 1390 March School of Economic Sciences In the Name of God Dr. K.Pakizeh k.Dehghan Manshadi E.Jafarzade.
Project Risk Management Planning Stage
Universal fuzzy system representation with XML Authors : Chris Tseng, Wafa Khamisy, Toan Vu Source : Computer Standards & Interfaces, Volume 28, Issue.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Lecture №4 METHODS OF RESEARCH. Method (Greek. methodos) - way of knowledge, the study of natural phenomena and social life. It is also a set of methods.
1 Lecture 4 The Fuzzy Controller design. 2 By a fuzzy logic controller (FLC) we mean a control law that is described by a knowledge-based system consisting.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
Chapter 10 FUZZY CONTROL Chi-Yuan Yeh.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
BSR Risk Management Capability Assessment Methodology
Introduction to Fuzzy Logic and Fuzzy Systems
Fuzzy Systems Michael J. Watts
Fuzzy Logic Toolbox Analysis and Design.
Unit 5 Portfolio Management
Fuzzy Inference Systems
Fuzzy expert systems Fuzzy inference Mamdani fuzzy inference
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
Artificial Intelligence
Fuzzy Logic and Fuzzy Sets
Introduction to Fuzzy Logic
Fuzzy logic Introduction 3 Fuzzy Inference Aleksandar Rakić
Dr. Unnikrishnan P.C. Professor, EEE
Dr. Unnikrishnan P.C. Professor, EEE
Barcelona, May 14, 2003 Session 5; Block 1; Paper 5
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
Lecture 5 Fuzzy expert systems: Fuzzy inference
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
in Intelligent Tutoring Systems with Fuzzy Logic Techniques
FATF/GIABA Mutual Evaluation Process and the Role of the NGOs in the Successful Conduct of the Mutual Evaluation Review (MER) Abdul Rahman Mustapha Head,
Dr. Unnikrishnan P.C. Professor, EEE
Intelligent Contextual Data Stream Monitoring
An application: A Client Financial Risk Tolerance Model
Fuzzy Inference Systems
Workplace injuries are at least a
Fuzzy Logic KH Wong Fuzzy Logic v.9a.
Introduction to Portfolio Management
Presentation transcript:

An Intelligent Approach for Nuclear Security Measures on Nuclear Materials: Demands and Needs Authors: A.Z.M. Salahuddin, Altab Hossain, R. A. Khan, M.S. Akbar, A. S. Mollah Presented by Dr. Md. Altab Hossain, CEng (UK), FIEB Associate Professor & Program Coordinator, Dept of Nuclear Science and Engineering Military Institute of Science and Technology (MIST) Dhaka, Bangladesh 06 Dec 2016

BACKGROUND Nuclear security practices a no. of preventive acts on NM & RM. A great number of NM and RM are applied and used worldwide. Several terrorists may harm society using NM and RM. Authorities have to carry out analytic and remedial activities. Risk informed approach is used to identify and assess risks. Therefore, a risk model can be a good option using FLES.

STUDY AREA Number of researchers used FLES technique in risk assessments. FLES uses expert appraisals & logical system closer to human.  A risk assessment model using AI based technique is developed. Aim is to assess and compare different membership functions. This approach could be directly applied to real application.

RISK ASSESSMENT MODEL Risk model involves few risk factors: Intent, capability of adversaries, nuclear material (NM) or radioactive material (RM), and vulnerability of target. Capability: organizational, technical and financial. Intent of adversaries: ideology and objective. Possibility of creating a device: material. Vulnerability of target: type of target and timing of attack. Assailants break into systems, cause damage that demand risk.

METHODOLOGY Fuzzy Inference System (FIS) Basic FLES comprises of four principal components: Fuzzification: takes crisp numeric inputs, Rule base: holds a set of if-then rules, Inference: creates control actions, Defuzzification : calculates actual output. Fig 1. Fundamental unit of a FES

FUZZY INFERENCE SYSTEM (FIS) FIS is based on fuzzy set theory that calculates level of risk from: capability, intent, material & vulnerability Fig.2 Architecture of Fuzzy Logic Based Risk Model

FUZZY LOGIC EXPERT SYSTEM (FLES) Membership Function: Membership function describes that every single point is mapped to a membership value (Fig. 3 & 4). For fuzzification, three possible linguistic variables, namely, low (L), medium (M), and high (H) were chosen for inputs. Five linguistic variables, namely very low (VL), low (L), medium (M), high (H) and very high (VH), were for output.

Membership Function: Fig. 3. Membership functions of input variable “Capability”. Fig. 4. Membership functions of output variable “Risk- Level”.

MATHEMATICAL MODEL USING FES They may be transformed as likelihood estimates. Threat sources have different capabilities of adversary, intent, amount of material and type of device, and targeting a system. A domestic adversary group that has advocated overthrow of any government is considered. Table I and Table II show the meaning of membership functions: one input variable capability, output variable risk level.

MATHEMATICAL MODEL USING FES Fuzzy Sets Meaning Low The adversary has limited resources, expertise, and opportunities to support a successful attack. Medium The adversary has moderate resources, expertise, and opportunities to support multiple successful attacks. High The adversary has a sophisticated level of expertise, with significant resources and opportunities to support multiple successful coordinated attacks. TABLE I: ADVERSARY CAPABILITY

MATHEMATICAL MODEL USING FES Fuzzy Sets Meaning Very Low A threat event could have a negligible adverse effect. Low A threat event could have a low adverse effect. Medium A threat event could have a moderate adverse effect. High A threat event could have a severe adverse effect. Very High A threat event could have multiple severe adverse effect. TABLE II: LEVEL OF RISK

RESULTS AND DISCUSSIONS The operation of the fuzzy expert system is shown in Fig. 5. A certain domestic insurgent group deploying an RDD at an annual celebration. Fig. 5. Rule Evaluation Viewer

RESULTS AND DISCUSSIONS Risk model can be improved with better accuracy by using MFIS that consists of three FIS. Risk level is a function of overall capabilities, overall attractiveness of materials, intent, and vulnerability at target as: Risk = (overall capabilities, overall attractiveness of materials, intent, target) Overall capabilities = (organizational, technical, financial) Overall attractiveness of materials = (material type, acquisition, device)

RESULTS AND DISCUSSIONS Fuzzy control surface can serve as a visual depiction over time. Mesh plots show the relationships between inputs and ouput. Plots are used to verify the rules and membership functions. Plot shows that when capability and intent increases, risk will be higher.

RESULTS AND DISCUSSIONS Proposed model can be effectively used for risk assessment. A good correlation ("High" and "Very High") was found. Result from FES model is more precise with final risk score. A terrorist to attack target depends on vulnerabilities, intent to steal information related to NM to cause civilian causalities, possibility of the terrorist success is very high, possibility of stealing NM by a terrorist group is very high, risk of using such NM by terrorists is very high.

CONCLUSION An intelligent approach is proposed for nuclear security. It is the practical modelling in contrast to common risk model. More precisely and accurately and assist to reduce risk ranking. Can integrate the opinions of experts in a more accurate way. In order to deliver intelligent support for the NPP and NM, entire nuclear database are to be considered. Finally, a state should allocate its resources more effectively for the threats and risks.

THANK YOU