Fuzzy logic - artificial intelligence, Computer Engineering

Fuzzy set theory provides a means for modeling the kind of uncertainty associated with vagueness, with imprecision, and/or with a lack of information regarding a particular element of the problem on hand. The underlying power of fuzzy set theory is that it uses linguistic variables, rather than quantitative variables, to represent imprecise concept.

The incorporation of fuzzy logic and fuzzy set theory into computer models has shown tremendous payoff in areas where intuition and judgment still play major roles in the model. Fuzzy mathematical tools and the calculus of fuzzy IF-THEN rules provide a most helpful paradigm for the implementation and automation of an extensive body of human knowledge therefore not embodied in the quantitative modeling process.

Posted Date: 2/21/2013 12:19:19 AM | Location : United States







Related Discussions:- Fuzzy logic - artificial intelligence, Assignment Help, Ask Question on Fuzzy logic - artificial intelligence, Get Answer, Expert's Help, Fuzzy logic - artificial intelligence Discussions

Write discussion on Fuzzy logic - artificial intelligence
Your posts are moderated
Related Questions
Common Functions of Interrupts: An Interrupt transfers control to the interrupt service routine, generally through the interrupt vector table, which contains the addresses

What is verilog case (1) ? wire [3:0] x; always @(...) begin case (1'b1) x[0]: SOMETHING1; x[1]: SOMETHING2; x[2]: SOMETHING3; x[3]: SOMETHING4; endcase

Define the Example Client-server Implementations Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly

Q. How to input to circuit? Register A bits as a0, a1, a2 and a3 in the corresponding X bits of the Full Adder (FA). Register B bits as given in the Figure above as in

Q. Show the spawned program? include "pvm3.h"  main() {    int ptid, msgtag;    char buf[100];    ptid = pvm_parent();    strcpy(buf, "hello, world from ");

Suppose you have to develop an error recovery protocol for a link that is unreliable and delay sensitive, which of the following protocol would you choose? (i) Stop & wait.

Can the operand expression in an ORG statement contains forward references? If so, outline how the statement can be processed in a two-pass assembly scheme. ORG that is origin

A Scanner is a device which allows you to capture photographs or drawings or text from tangible sources (paper or slides etc.) in electronic form. Scanners work by detecting differ

1. Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps. Do not forget to mention how and during which steps each inst