International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Real Time Application of Soft Set in Parameterization Reduction for Decisio...IJECEIAES
In each and every field of science and technology Information science plays an important role. Sometimes information science is facing different types of problems to handle the data and information. Data Uncertainty is one of the challenging difficulties to handle. In past, there are several theories like fuzzy set, Rough set, Probability etc.to dealing with uncertainty. Soft set theory is the youngest theory to deal with uncertainty. In this paper we discussed how to find reducts. This paper focuses on how we can transform a sample data set to binary valued information system. We are also going to reduce the dimension of data set by using the binary valued information that results a better decision.
Interestingness Measures In Rule Mining: A ValuationIJERA Editor
In data mining it is normally desirable that discovered knowledge should possess characteristics such as accuracy, comprehensibility and interestingness. The vast majority of data mining algorithms generate patterns that are accurate and reliable but they might not be interesting. Interestingness measures are used to find the truly interesting rules which will help the user in decision making in exceptional state of affairs. A variety of interestingness measures for rule mining have been suggested by researchers in the field of data mining. In this paper we are going to carry out a valuation of these interestingness measures and classify them from numerous perspectives.
Collocation Extraction Performance Ratings Using Fuzzy logicWaqas Tariq
The performance of Collocation extraction cannot quantified or properly express by a single dimension. It is very imprecise to interpret collocation extraction metrics without knowing what application (users) are involved. Most of the existing collocation extraction techniques are of Berry-Roughe, Church and Hanks, Kita, Shimohata, Blaheta and Johnson, and Pearce. The extraction techniques need to be frequently updated based on feedbacks from implementation of previous policies. These feedbacks are always stated in the form of ordinal ratings, e.g. “high speed”, “average performance”, “good condition”. Different people can describe different values to these ordinal ratings without a clear-cut reason or scientific basis. There is need for a way or means to transform vague ordinal ratings to more appreciable and precise numerical estimates. The paper transforms the ordinal performance ratings of some Collocation performance techniques to numerical ratings using Fuzzy logic. Keywords: Fuzzy Set Theory, collocation extraction, Transformation, performance Techniques, Criteria.
COMPARISON OF DIFFERENT APPROXIMATIONS OF FUZZY NUMBERSijfls
The notions of interval approximations of fuzzy numbers and trapezoidal approximations of fuzzy numbers have been discussed. Comparisons have been made between the close-interval approximation, valueambiguity
interval approximation and distinct approximation with the corresponding crisp and trapezoidal fuzzy numbers. A numerical example is included to justify the above mentioned notions.
Literature Review on Vague Set Theory in Different Domainsrahulmonikasharma
Problem of decision making is a crucial task in every business. This decision making job is found very difficult when it is depends on the imprecise and vague environment, which is frequent in recent years. Vague sets are an extension of Fuzzy sets. In the fuzzy sets, each object is assigned a single value in the interval [0,1] reflecting its grade of membership. This single value does not allow a separation of evidence for membership and evidence against membership. Gau et al. proposed the notion of vague sets, where each object is characterized by two different membership functions: a true membership function and a false membership function. This kind of reasoning is also called interval membership, as opposed to point membership in the context of fuzzy sets. In this paper, reviews the related works on the decision making by using vague sets in different fields.
A Real Time Application of Soft Set in Parameterization Reduction for Decisio...IJECEIAES
In each and every field of science and technology Information science plays an important role. Sometimes information science is facing different types of problems to handle the data and information. Data Uncertainty is one of the challenging difficulties to handle. In past, there are several theories like fuzzy set, Rough set, Probability etc.to dealing with uncertainty. Soft set theory is the youngest theory to deal with uncertainty. In this paper we discussed how to find reducts. This paper focuses on how we can transform a sample data set to binary valued information system. We are also going to reduce the dimension of data set by using the binary valued information that results a better decision.
Interestingness Measures In Rule Mining: A ValuationIJERA Editor
In data mining it is normally desirable that discovered knowledge should possess characteristics such as accuracy, comprehensibility and interestingness. The vast majority of data mining algorithms generate patterns that are accurate and reliable but they might not be interesting. Interestingness measures are used to find the truly interesting rules which will help the user in decision making in exceptional state of affairs. A variety of interestingness measures for rule mining have been suggested by researchers in the field of data mining. In this paper we are going to carry out a valuation of these interestingness measures and classify them from numerous perspectives.
Collocation Extraction Performance Ratings Using Fuzzy logicWaqas Tariq
The performance of Collocation extraction cannot quantified or properly express by a single dimension. It is very imprecise to interpret collocation extraction metrics without knowing what application (users) are involved. Most of the existing collocation extraction techniques are of Berry-Roughe, Church and Hanks, Kita, Shimohata, Blaheta and Johnson, and Pearce. The extraction techniques need to be frequently updated based on feedbacks from implementation of previous policies. These feedbacks are always stated in the form of ordinal ratings, e.g. “high speed”, “average performance”, “good condition”. Different people can describe different values to these ordinal ratings without a clear-cut reason or scientific basis. There is need for a way or means to transform vague ordinal ratings to more appreciable and precise numerical estimates. The paper transforms the ordinal performance ratings of some Collocation performance techniques to numerical ratings using Fuzzy logic. Keywords: Fuzzy Set Theory, collocation extraction, Transformation, performance Techniques, Criteria.
COMPARISON OF DIFFERENT APPROXIMATIONS OF FUZZY NUMBERSijfls
The notions of interval approximations of fuzzy numbers and trapezoidal approximations of fuzzy numbers have been discussed. Comparisons have been made between the close-interval approximation, valueambiguity
interval approximation and distinct approximation with the corresponding crisp and trapezoidal fuzzy numbers. A numerical example is included to justify the above mentioned notions.
Literature Review on Vague Set Theory in Different Domainsrahulmonikasharma
Problem of decision making is a crucial task in every business. This decision making job is found very difficult when it is depends on the imprecise and vague environment, which is frequent in recent years. Vague sets are an extension of Fuzzy sets. In the fuzzy sets, each object is assigned a single value in the interval [0,1] reflecting its grade of membership. This single value does not allow a separation of evidence for membership and evidence against membership. Gau et al. proposed the notion of vague sets, where each object is characterized by two different membership functions: a true membership function and a false membership function. This kind of reasoning is also called interval membership, as opposed to point membership in the context of fuzzy sets. In this paper, reviews the related works on the decision making by using vague sets in different fields.
(δ,l)-diversity: Privacy Preservation for Publication Numerical Sensitive Data cscpconf
(ε,m)-anonymity considers ε as the interval to define similarity between two values, and m as
the level of privacy protection. For example {40,60} satisfies (ε,m)-anonymity but {40,50,60}
doesn't, for ε=15 and m=2. We show that protection in {40,50,60} sensitive values of an equivalence class is not less (if don't say more) than {40,60}. Therefore, although (ε,m)-anonymity has well studied publication of numerical sensitive values, it fails to address proximity in the right way. Accordingly, we introduce a revised principle which solve this problem by introducing (δ,l)-diversity principle. Surprisingly, in contrast with (ε,m)-anonymity, the proposed principle respects monotonicity property which makes it adoptable to be exploited in other anonymity principles
ON FEATURE SELECTION ALGORITHMS AND FEATURE SELECTION STABILITY MEASURES: A C...ijcsit
Data mining is indispensable for business organizations for extracting useful information from the huge volume of stored data which can be used in managerial decision making to survive in the competition. Due to the day-to-day advancements in information and communication technology, these data collected from ecommerce and e-governance are mostly high dimensional. Data mining prefers small datasets than high dimensional datasets. Feature selection is an important dimensionality reduction technique. The subsets selected in subsequent iterations by feature selection should be same or similar even in case of small perturbations of the dataset and is called as selection stability. It is recently becomes important topic of research community. The selection stability has been measured by various measures. This paper analyses the selection of the suitable search method and stability measure for the feature selection algorithms and also the influence of the characteristics of the dataset as the choice of the best approach is highly problem dependent.
The philosophy of fuzzy logic was formed by introducing the membership degree of a linguistic value or variable instead of divalent membership of 0 or 1. Membership degree is obtained by mapping the variable on the graphical shape of fuzzy numbers. Because of simplicity and convenience, triangular membership numbers (TFN) are widely used in different kinds of fuzzy analysis problems. This paper suggests a simple method using statistical data and frequency chart for constructing non-isosceles TFN when we are using direct rating for evaluating a variable in a predefined scale. In this method, the relevancy between assessment uncertainties and statistical parameters such as mean value and the standard deviation is established in a way that presents an exclusive form of triangle number for each set of data. The proposed method with regard to the graphical shape of the frequency chart distributes the standard deviation around the mean value and forms the TFN with the membership degree of 1 for mean value. In the last section of the paper modification of the proposed method is presented through a practical case study.
TYPE-2 FUZZY LINEAR PROGRAMMING PROBLEMS WITH PERFECTLY NORMAL INTERVAL TYPE-...ijceronline
In this paper, the Perfectly normal Interval Type-2 Fuzzy Linear Programming (PnIT2FLP) model is considered. This model is reduced to crisp linear programming model. This transformation is performed by a proposed ranking method. Based on the proposed fuzzy ranking method and arithmetic operation, the solution of Perfectly normal Interval Type-2 Fuzzy Linear Programming model is obtained by the solutions of linear programming model with help of MATLAB. Finally, the method is illustrated by numerical examples.
The Fuzzy Logic is discussed with three simple example problems all solved in MATLAB
1. Restaurant Problem
2. Temperature Controller
3. Washing Machine Problem
A New Method for Preserving Privacy in Data Publishingcscpconf
Protection of individuals’ privacy is a vital activity in data publishing. Government and public
sector websites publish enormous amount of data for sharing the data among their departments
and also to public for research. Sensitive information of individuals, whose data are published
must be protected. Privacy is challenged through two kinds of attack namely attribute
disclosure and identity disclosure. Early Research contributions were made in this direction and
new methods namely k-anonymity, ℓ-diversity, t-closeness are evolved. K-anonymity method
preserves the privacy against identity disclosure attack alone. It fails to address attribute
disclosure attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it
fails to address identity disclosure attack and attribute disclosure attack in some exceptional
cases. t-closeness method is good at attribute disclosure attack. but not identity disclosure
attack. Also, t-closeness method is more complex than other methods. In this paper, the authors
propose a new method to preserve the privacy of individuals’ sensitive data from attribute and
identity disclosure attacks. In the proposed method, privacy preservation is achieved through
generalization of quasi identifier by setting range values.The proposed method is implemented
and tested with various data sets. The proposed method is found to preserve the privacy of
published data against attribute and identity disclosure attacks.
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE IJORCS
Quality of clustering is an important issue in application of clustering techniques. Most traditional cluster validity indices are geometry-based cluster quality measures. This work proposes a cluster validity index based on the decision-theoretic rough set model by considering various loss functions. Real time retail data show the usefulness of the proposed validity index for the evaluation of rough and crisp clustering. The measure is shown to help determine optimal number of clusters, as well as an important parameter called threshold in rough clustering. The experiments with a promotional campaign for the retail data illustrate the ability of the proposed measure to incorporate financial considerations in evaluating quality of a clustering scheme. This ability to deal with monetary values distinguishes the proposed decision-theoretic measure from other distance-based measures. Our proposed system validity index can also be efficient for evaluating other clustering algorithms such as fuzzy clustering.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
(δ,l)-diversity: Privacy Preservation for Publication Numerical Sensitive Data cscpconf
(ε,m)-anonymity considers ε as the interval to define similarity between two values, and m as
the level of privacy protection. For example {40,60} satisfies (ε,m)-anonymity but {40,50,60}
doesn't, for ε=15 and m=2. We show that protection in {40,50,60} sensitive values of an equivalence class is not less (if don't say more) than {40,60}. Therefore, although (ε,m)-anonymity has well studied publication of numerical sensitive values, it fails to address proximity in the right way. Accordingly, we introduce a revised principle which solve this problem by introducing (δ,l)-diversity principle. Surprisingly, in contrast with (ε,m)-anonymity, the proposed principle respects monotonicity property which makes it adoptable to be exploited in other anonymity principles
ON FEATURE SELECTION ALGORITHMS AND FEATURE SELECTION STABILITY MEASURES: A C...ijcsit
Data mining is indispensable for business organizations for extracting useful information from the huge volume of stored data which can be used in managerial decision making to survive in the competition. Due to the day-to-day advancements in information and communication technology, these data collected from ecommerce and e-governance are mostly high dimensional. Data mining prefers small datasets than high dimensional datasets. Feature selection is an important dimensionality reduction technique. The subsets selected in subsequent iterations by feature selection should be same or similar even in case of small perturbations of the dataset and is called as selection stability. It is recently becomes important topic of research community. The selection stability has been measured by various measures. This paper analyses the selection of the suitable search method and stability measure for the feature selection algorithms and also the influence of the characteristics of the dataset as the choice of the best approach is highly problem dependent.
The philosophy of fuzzy logic was formed by introducing the membership degree of a linguistic value or variable instead of divalent membership of 0 or 1. Membership degree is obtained by mapping the variable on the graphical shape of fuzzy numbers. Because of simplicity and convenience, triangular membership numbers (TFN) are widely used in different kinds of fuzzy analysis problems. This paper suggests a simple method using statistical data and frequency chart for constructing non-isosceles TFN when we are using direct rating for evaluating a variable in a predefined scale. In this method, the relevancy between assessment uncertainties and statistical parameters such as mean value and the standard deviation is established in a way that presents an exclusive form of triangle number for each set of data. The proposed method with regard to the graphical shape of the frequency chart distributes the standard deviation around the mean value and forms the TFN with the membership degree of 1 for mean value. In the last section of the paper modification of the proposed method is presented through a practical case study.
TYPE-2 FUZZY LINEAR PROGRAMMING PROBLEMS WITH PERFECTLY NORMAL INTERVAL TYPE-...ijceronline
In this paper, the Perfectly normal Interval Type-2 Fuzzy Linear Programming (PnIT2FLP) model is considered. This model is reduced to crisp linear programming model. This transformation is performed by a proposed ranking method. Based on the proposed fuzzy ranking method and arithmetic operation, the solution of Perfectly normal Interval Type-2 Fuzzy Linear Programming model is obtained by the solutions of linear programming model with help of MATLAB. Finally, the method is illustrated by numerical examples.
The Fuzzy Logic is discussed with three simple example problems all solved in MATLAB
1. Restaurant Problem
2. Temperature Controller
3. Washing Machine Problem
A New Method for Preserving Privacy in Data Publishingcscpconf
Protection of individuals’ privacy is a vital activity in data publishing. Government and public
sector websites publish enormous amount of data for sharing the data among their departments
and also to public for research. Sensitive information of individuals, whose data are published
must be protected. Privacy is challenged through two kinds of attack namely attribute
disclosure and identity disclosure. Early Research contributions were made in this direction and
new methods namely k-anonymity, ℓ-diversity, t-closeness are evolved. K-anonymity method
preserves the privacy against identity disclosure attack alone. It fails to address attribute
disclosure attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it
fails to address identity disclosure attack and attribute disclosure attack in some exceptional
cases. t-closeness method is good at attribute disclosure attack. but not identity disclosure
attack. Also, t-closeness method is more complex than other methods. In this paper, the authors
propose a new method to preserve the privacy of individuals’ sensitive data from attribute and
identity disclosure attacks. In the proposed method, privacy preservation is achieved through
generalization of quasi identifier by setting range values.The proposed method is implemented
and tested with various data sets. The proposed method is found to preserve the privacy of
published data against attribute and identity disclosure attacks.
QUALITY OF CLUSTER INDEX BASED ON STUDY OF DECISION TREE IJORCS
Quality of clustering is an important issue in application of clustering techniques. Most traditional cluster validity indices are geometry-based cluster quality measures. This work proposes a cluster validity index based on the decision-theoretic rough set model by considering various loss functions. Real time retail data show the usefulness of the proposed validity index for the evaluation of rough and crisp clustering. The measure is shown to help determine optimal number of clusters, as well as an important parameter called threshold in rough clustering. The experiments with a promotional campaign for the retail data illustrate the ability of the proposed measure to incorporate financial considerations in evaluating quality of a clustering scheme. This ability to deal with monetary values distinguishes the proposed decision-theoretic measure from other distance-based measures. Our proposed system validity index can also be efficient for evaluating other clustering algorithms such as fuzzy clustering.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
201309 LOMA Policyowner Service and Contact Center WorkshopSteven Callahan
Presentation to insurance service leaders on service and contact center opportunities to provide competitive differentiation as well as summary results of a recent short survey on contact center challenges.
The 2013 ICCO Summit presentation by Andreas Fischer-Appelt, CEO of fischerAppelt, one of the biggest German PR agencies that recently opened its first overseas office in Qatar. Delivered on 11th October 2013.
Overview of Consumer Behavior
The Marketing Concept
The Marketing Mix and Relationships
Digital Technologies
Societal Marketing Concept
A Simplified Model of Consumer Decision Making
ASEAN Banker Forum has been served as an interactive platform for bankers and technology corporations to discuss and evaluate the growth opportunities for retail banking in Vietnam. It also serves as a meeting point for Vietnamese bankers and bankers from the ASEAN countries to meet and exchange experiences for better development in banking sector
Featuring theme “Achieving differentiation via channel transformation and operational excellence”, ASEAN Banker Forum 2013 will gather leadership bankers, financial experts, and technology consultants to join and discuss current challenges and key initiatives for banks to develop sustainable differentiation strategies.
1. Discussing latest developments in retail banking sector in ASEAN
2. Identifying key successful factors for banks in the upcoming period
3. Seeking IT initiatives to transform retail banking sector
4. Creating formulations to engage and retain customers
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Possibility Theory versus Probability Theory in Fuzzy Measure TheoryIJERA Editor
The purpose of this paper is to compare probability theory with possibility theory, and to use this comparison in comparing probability theory with fuzzy set theory. The best way of comparing probabilistic and possibilistic conceptualizations of uncertainty is to examine the two theories from a broader perspective. Such a perspective is offered by evidence theory, within which probability theory and possibility theory are recognized as special branches. While the various characteristic of possibility theory within the broader framework of evidence theory are expounded in this paper, we need to introduce their probabilistic counterparts to facilitate our discussion.
AN OPTIMUM TIME QUANTUM USING LINGUISTIC SYNTHESIS FOR ROUND ROBIN CPU SCHEDU...ijsc
In Round Robin CPU scheduling algorithm the main concern is with the size of time quantum and the increased waiting and turnaround time. Decision for these is usually based on parameters which are assumed to be precise. However, in many cases the values of these parameters are vague and imprecise.
The performance of fuzzy logic depends upon the ability to deal with Linguistic variables. With this intent, this paper attempts to generate an Optimal Time Quantum dynamically based on the parameters which are treated as Linguistic variables. This paper also includes Mamdani Fuzzy Inference System using Trapezoidal membership function, results in LRRTQ Fuzzy Inference System. In this paper, we present an algorithm to improve the performance of round robin scheduling algorithm. Numerical analysis based on LRRTQ results on proposed algorithm show the improvement in the performance of the system by reducing unnecessary context switches and also by providing reasonable turnaround time.
An Optimum Time Quantum Using Linguistic Synthesis for Round Robin Cpu Schedu...ijsc
In Round Robin CPU scheduling algorithm the main concern is with the size of time quantum and the increased waiting and turnaround time. Decision for these is usually based on parameters which are assumed to be precise. However, in many cases the values of these parameters are vague and imprecise. The performance of fuzzy logic depends upon the ability to deal with Linguistic variables. With this intent, this paper attempts to generate an Optimal Time Quantum dynamically based on the parameters which are treated as Linguistic variables. This paper also includes Mamdani Fuzzy Inference System using Trapezoidal membership function, results in LRRTQ Fuzzy Inference System. In this paper, we present an algorithm to improve the performance of round robin scheduling algorithm. Numerical analysis based on LRRTQ results on proposed algorithm show the improvement in the performance of the system by reducing unnecessary context switches and also by providing reasonable turnaround time.
In real life situations, there are many issues in which we face uncertainties, vagueness, complexities and unpredictability. Neutrosophic sets are a mathematical tool to address some issues which cannot be met using the existing methods. Neutrosophic soft matrices play a crucial role in handling indeterminant and inconsistent information during decision making process. The main focus of this article is to discuss the concept of neutrosophic sets, neutrosophic soft sets and neutrosophic soft matrices theory which are very useful and applicable in various situations involving uncertainties and imprecisions. Thereafter our intention is to find a new method for constructing a decision matrix using neutrosophic soft matrices as an application of the theory. A neutrosophic soft matrix based algorithm is considered to solve some problems in the diagnosis of a disease from the occurrence of various symptoms in patients. This article deals with patient-symptoms and symptoms-disease neutrosophic soft matrices. To come to a decision, a score matrix is defined where multiplication based on max-min operation and complementation of neutrosophic soft matrices are taken into considerations.
Zadeh conceptualized the theory of fuzzy set to provide a tool for the basis of the theory of possibility. Atanassov extended this theory with the introduction of intuitionistic fuzzy set. Smarandache introduced the concept of refined intuitionistic fuzzy set by further subdivision of membership and non-membership value. The meagerness regarding the allocation of a single membership and non-membership value to any object under consideration is addressed with this novel refinement. In this study, this novel idea is utilized to characterize the essential elements e.g. subset, equal set, null set, and complement set, for refined intuitionistic fuzzy set. Moreover, their basic set theoretic operations like union, intersection, extended intersection, restricted union, restricted intersection, and restricted difference, are conceptualized. Furthermore, some basic laws are also discussed with the help of an illustrative example in each case for vivid understanding.
Clays have a tendency to this article first introduces the basic concepts of fuzzy theory, including comparisons between fuzzy sets and traditional explicit sets, fuzzy sets basic operations such as the membership function of the set and the colloquial variable, the intersection and union of the fuzzy set, and use the above concepts to guide into the four basic reasoning mechanisms of fuzzy mode and introduce several common types of fuzzy application examples such as fuzzy washing machine and fuzzy control of incinerator plant in China illustrate the application of fuzzy theory in real society.
Fuzzy Logic and Neuro-fuzzy Systems: A Systematic IntroductionWaqas Tariq
Fuzzy logic is a rigorous mathematical field, and it provides an effective vehicle for modeling the uncertainty in human reasoning. In fuzzy logic, the knowledge of experts is modeled by linguistic rules represented in the form of IF-THEN logic. Like neural network models such as the multilayer perceptron (MLP) and the radial basis function network (RBFN), some fuzzy inference systems (FISs) have the capability of universal approximation. Fuzzy logic can be used in most areas where neural networks are applicable. In this paper, we first give an introduction to fuzzy sets and logic. We then make a comparison between FISs and some neural network models. Rule extraction from trained neural networks or numerical data is then described. We finally introduce the synergy of neural and fuzzy systems, and describe some neuro-fuzzy models as well. Some circuits implementations of neuro-fuzzy systems are also introduced. Examples are given to illustrate the cocepts of neuro-fuzzy systems.
Application for Logical Expression Processing csandit
Processing of logical expressions – especially a conversion from conjunctive normal form (CNF) to disjunctive normal form (DNF) – is very common problem in many aspects of information retrieval and processing. There are some existing solutions for the logical symbolic calculations, but none of them offers a functionality of CNF to DNF conversion. A new application for this purpose is presented in this paper.
Hypersoft set is an extension of the soft set where there is more than one set of attributes occur and it is very much helpful in multi-criteria group decision making problem. In a hypersoft set, the function F is a multi-argument function. In this paper, we have used the notion of Fuzzy Hypersoft Set (FHSS), which is a combination of fuzzy set and hypersoft set. In earlier research works the concept of Fuzzy Soft Set (FSS) was introduced and it was applied successfully in various fields. The FHSS theory gives more flexibility as compared to FSS to tackle the parameterized problems of uncertainty. To overcome the issue where FSS failed to explain uncertainty and incompleteness there is a dire need for another environment which is known as FHSS. It works well when there is more complexity involved in the parametric data i.e the data that involves vague concepts. This work includes some basic set-theoretic operations on FHSSs and for the reliability and the authenticity of these operations, we have shown its application with the help of a suitable example. This example shows that how FHSS theory plays its role to solve real decision-making problems.
A General Principle of Learning and its Application for Reconciling Einstein’...Jeffrey Huang
The human brain has an amazing power at solving different cognitive tasks, ranging from visual perception, playing chess, building airplanes, to the discovery of the mass and energy relation E=mc^2. However, up to now, nobody knows how the brain works and what is the principle underlying its power. In this presentation, a general principle of learning is proposed to understand intelligence like the human one. It will attempt to reveal the logical structure underlying intelligence so that we can implement it using machines to help us to smooth out the differences in individual intelligence just like machinery to individual physical power. It can help us to build better human societies for equality, peace, and prosperity.
Bayesian system reliability and availability analysis under the vague environ...ijsc
Reliability modeling is the most important discipline of reliable engineering. The main purpose of this paper is to provide a methodology for discussing the vague environment. Actually we discuss on Bayesian system reliability and availability analysis on the vague environment based on Exponential distribution under squared error symmetric and precautionary asymmetric loss functions. In order to apply the Bayesian approach, model parameters are assumed to be vague random variables with vague prior distributions. This approach will be used to create the vague Bayes estimate of system reliability and availability by introducing and applying a theorem called “Resolution Identity” for vague sets. For this purpose, the original problem is transformed into a nonlinear programming problem which is then divided up into eight subproblems to simplify computations. Finally, the results obtained for the subproblems can be used to determine the membership functions of the vague Bayes estimate of system reliability. Finally, the sub problems can be solved by using any commercial optimizers, e.g. GAMS or LINGO.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Fb35884889
1. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
RESEARCH ARTICLE
www.ijera.com
OPEN ACCESS
Systematic Study of Fuzzy, Neural Network and Neurofuzzy
Systems
K .Geetha 1and Dr. S. Santhosh Baboo2
1
Department of Information Technology, Dr.N.G.P.Arts and Science College, Coimbatore
2
Department of Computer Science, D.G.Vaishnav College, Chennai
Abstract
The techniques in artificial intelligence are used in almost all the fields where human reasoning and
uncertainties can be effectively modeled. The popular techniques in AI are fuzzy logic and neural networks
which can be used either separately or applied together. When they are used in combined way, they are called
Neuro-Fuzzy Systems. The reasons to combine these two paradigms come out of the difficulties and inherit
limitations of each isolated paradigm. This paper shows uniqueness in each technology and compares with
others to show the need for hybrid system (Neuro fuzzy).It gives an insight of different concepts how they are
utilized in various fields to yield optimized solution.
Keywords: Fuzzy Set, Fuzzy Logic, Fuzzy Rules, Neural Networks, Neural Network Architecture, Learning
Methods, Neuro-Fuzzy System
I.
INTRODUCTION
The conventional approaches to knowledge
representation lack the means for representation the
meaning of fuzzy concepts. The development of fuzzy
logic was motivated in large measure by the need for a
conceptual framework which can address the issue of
uncertainty and lexical imprecision. Fuzzy logic
provides an inference morphology that enables
approximate human reasoning capabilities to be
applied to knowledge-based systems. The theory of
fuzzy logic provides a mathematical strength to
capture the uncertainties associated with human
cognitive processes, such as thinking and reasoning.
For example, when one is designing an
expert system to mimic the diagnostic powers of a
physician, one of the major tasks is to codify the
physician's decision-making process. The designer
soon learns that the physician's view of the world,
despite her dependence upon precise, scientific tests
and measurements, incorporates evaluations of
symptoms, and relationships between them, in a
"fuzzy," intuitive manner: deciding how much of a
particular medication to administer will have as much
to do with the physician's sense of the relative
"strength" of the patient's symptoms as it will their
www.ijera.com
height/weight ratio. While some of the decisions and
calculations could be done using traditional logic, we
will see how fuzzy systems affords a broader, richer
field of data and the manipulation of that data than do
more traditional methods.
II.
THEORY OF REASONING
[7]Zadeh introduced the theory of
approximate reasoning in 1979. This theory provides a
powerful framework for reasoning in the face of
imprecise and uncertain information. This theory is
the representation of propositions as statements
assigning fuzzy sets as values to variables.
Suppose there are two interactive variables x X, y
Y and the causal relationship between x and y is
completely known. (i.e.) that y is a function of x, y
=(x).
This leads to the inferences as Premise y = f(x), Fact x
= x , Consequence y = f(x)
This inference rule says that if y = f(x), x X and
observation shows that x = x then
y takes the value f(x).
884 | P a g e
2. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
www.ijera.com
Fig: 1 Simple crisp inference.
y
y = f(x)
y = f(x)
x = x
More often than not we do not know the
complete causal link f between x and y, only we now
the values of f(x) for some particular values of x
R1: If x = x1 then y = y1
also
R2: If x = x2 then y = y2
also
...
also
Rn: If x = xn then y = yn
Suppose that we are given an x X and want to find
a y Y which corresponds to x under the rule-base.
R1: If x = x1 then y = y1
also
R2: If x = x2 then y = y2
also
...
also
Rn: If x = xn then y = yn
Fact: x = x
Consequence: y = y
This problem is frequently quoted as
interpolation.
Let x and y be linguistic variables, e.g.”x is high”
and”y is small”.
The basic problem of approximate reasoning is to
find the membership function of the consequence C
from the rule-base {R1 ... Rn } and the fact A.
R1: if x is A1 then y is C1,
R2: if x is A2 then y is C2,
………………………
Rn: if x is An then y is Cn
Fact: x is A
www.ijera.com
x
Consequence: y is C
Zadeh introduced a number of translation rules which
allow us to represent some common linguistic
statements in terms of propositions in our language.
The translation rules are Entailment rule,
Conjunction rule, Disjunction rule, Projection rule
and
Negation rule
2.1 Fuzzy System
The notion central to fuzzy systems is that
truth values (in fuzzy logic) or membership values (in
fuzzy sets) are indicated by a value on the range [0.0,
1.0], with 0.0 representing absolute Falseness and 1.0
representing absolute Truth. For example, the
statement:
"Kumar is old."
If Kumar age was 75, we might assign the
statement the truth value of 0.75. The statement could
be translated into set terminology as follows:
"Kumar is a member of the set of old people."
This statement would be rendered symbolically with
fuzzy sets as:
mOLD(Kumar) = 0.75
where m is the membership function, operating in
this case on the fuzzy set of old people, which returns
a value between 0.0 and 1.0.
The next step in establishing a complete
system of fuzzy logic is to define the operations of
EMPTY,
EQUAL,
COMPLEMENT
(NOT),
CONTAINMENT,
UNION
(OR),
and
INTERSECTION (AND).
885 | P a g e
3. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
www.ijera.com
output data. A FLS consists of four main parts:
fuzzier, rules, inference engine, and defuzzier. These
2.2 Fuzzy Logic
A fuzzy logic system (FLS) can be denied as the
components and the general architecture of a FLS is
nonlinear mapping of an input data set to a scalar
shown
in
Figure
2
.
Fig: 2 Fuzzy Logic Systems
Rules
Crisp
input
Fuzzifier
DeFuzzifier
Crisp
output
Inference
Fuzzy input set
The process of fuzzy logic is a crisp set of
input data are gathered and converted to a fuzzy set
using fuzzy linguistic variables, fuzzy linguistic
terms and membership functions. This step is known
as fuzzification. Afterwards, an inference is made
based on a set of rules. Lastly, the resulting fuzzy
output is mapped to a crisp output using the
membership functions, in the defuzzification step.
2.2.1. Linguistic Variables
Linguistic variables are the input or output
variables of the system whose values are words or
sentences from a natural language, instead of
numerical values. A linguistic variable is generally
decomposed into a set of linguistic terms.
Example: Consider age of a person, Let age
(a) is the linguistic variable which represents person’s
age. To qualify the age, terms such as “young” and
“old” are used in real life. These are the linguistic
values of age. Then, age (a) = {very young, young,
old, very old} can be the set of decompositions for
the linguistic variable age. Each member of this
decomposition is called a linguistic term and can
cover a portion of the overall values of the age.
2.2.2. Membership Function
Membership functions are used in the
fuzzification and defuzzification steps of a FLS, to
map the non-fuzzy input values to fuzzy linguistic
terms and vice versa. A membership function is used
to quantify a linguistic term. There are different
forms of membership functions such as triangular,
trapezoidal, piecewise linear, Gaussian, or singleton.
The most common types of membership functions are
triangular, trapezoidal, and Gaussian shapes.
2.3 Fuzzy Rules
In a FLS, a rule base is constructed to
control the output variable. A fuzzy rule is a simple
IF-THEN rule with a condition and a conclusion. In
Table 1, sample fuzzy rules for the healthy life
system in Figure 2 are listed. Table 2 shows the
www.ijera.com
Fuzzy output set
matrix representation of the fuzzy rules for the said
FLS. Row captions in the matrix contain the values
that age can take, column captions contain the values
for target group, and each cell is the resulting
command when the input variables take the values in
that row and column. For instance, the cell (3, 4) in
the matrix can be read as follows: If age is old and
target is very old then command is yoga.
Table 1: Fuzzy Rules
Fuzzy Rules
1
IF (age is old OR very old) AND (target is old
age group) THEN command is yoga
2
IF (age is young OR very young) AND (target is
young age group) THEN command is exercise
3
IF (age is young) AND (target is young age
group) THEN command is aerobics
Age /
Target
very
young
young
old
very
old
Table 2: Fuzzy matrix example
very
young
old
young
exercise
aerobics
yoga
very
old
yoga
exercise
exercise
yoga
yoga
yoga
yoga
aerobics
aerobics
yoga
exercise
yoga
yoga
2.3.1 Fuzzy Set Operation
The evaluations of the fuzzy rules and the
combination of the results of the individual rules are
performed using fuzzy set operations. The operations
on fuzzy sets are different than the operations on nonfuzzy sets. The mostly used operations for OR and
AND operators are max and min, respectively. After
evaluating the result of each rule, these results should
be combined to obtain a final result. This process is
called inference. The results of individual rules can
be combined in different ways.
886 | P a g e
4. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
2.4 Defuzzification
After the inference step, the overall result is
a fuzzy value. This result should be defuzzified to
obtain a final crisp output. This is the purpose of the
defuzzifier component of a FLS. Defuzzification is
performed according to the membership function of
the output variable.
2.5 Limitations of Fuzzy system
In general, knowledge acquisition is difficult
and also the universe of discourse of each input
variable needs to be divided into several intervals,
applications of fuzzy systems are restricted to the
fields where expert knowledge is available and the
number of input variables is small. To overcome the
problem of knowledge acquisition, neural networks
www.ijera.com
are extended to automatically extract fuzzy rules
from numerical data.
III.
NEURAL NETWORKS
Inspired by the structure of the brain, a
neural network consists of a set of highly
interconnected entities, called nodes or units. Each
unit is designed to mimic its biological counterpart,
the neuron. Each accepts a weighted set of inputs and
responds with an output. A neural network is
composed of such units and weighted unidirectional
connections between them. In some neural nets, the
number of units may be in the thousands. The output
of one unit typically becomes an input for another.
There may also be units with external inputs and/or
outputs
Fig: 3 present a picture of one unit in a neural network.
INPUT
(x1, x2... xn)
w
1
w
1
1
w
1
w
w
SUM(wi*xi)
OUTPUT
w
Let X = (x1, x2... xn), where the xi are real
numbers, represent the set of inputs presented to the
unit U. Each input has an associated weight that
represents the strength of that particular connection.
Let W = (w1,w2,..., wn), with wi real, represent the
weight vector corresponding to the input vector X.
Applied to U, these weighted inputs produce a net
sum at U given by
S = SUM (wi * xi) = W.X.
The weights in most neural nets can be both
negative and positive. Another common form for an
activation function is a threshold function: the
activation value is 1 if the net sum S is greater than a
given constant T, and is 0 otherwise.
affect that same layer. Feed-forward ANNs tend to be
straight forward networks that associate inputs with
outputs. They are extensively used in pattern
recognition. This type of organization is also referred
to as bottom-up or top-down
Fig: 3 Feed-forward networks
3.1 Neural Network Architecture
ANN is defined as data processing system
consists of large number of interconnected processing
elements in an architecture which represents the
cerebral cortex of brain. The widely used architecture
in neural networks is:
3.1.1. Feed-forward networks
Feed-forward ANNs (fig,3) allow signals to
travel one way only; from input to output. There is no
feedback (loops) i.e. the output of any layer does not
www.ijera.com
887 | P a g e
5. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
3.1.2.Feedback or Recurrent network
Feedback networks can have signals
travelling in both directions by introducing loops in
the network. Feedback networks are very powerful
and can get extremely complicated. Feedback
networks are dynamic; their 'state' is changing
continuously until they reach an equilibrium point.
They remain at the equilibrium point until the input
changes and a new equilibrium needs to be found.
Feedback architectures are also referred to as
interactive or recurrent, although the latter term is
often used to denote feedback connections in singlelayer organizations.
3.1.3. Network layers
The commonest type of artificial neural
network consists of three groups, or layers, of units: a
layer of "input" units is connected to a layer of
"hidden" units, which is connected to a layer
of "output" units. (see Fig.3)
The activity of the input units represents the raw
information that is fed into the network.
The activity of each hidden unit is determined by
the activities of the input units and the weights
on the connections between the input and the
hidden units.
The behavior of the output units depends on the
activity of the hidden units and the weights
between the hidden and output units.
This simple type of network is interesting
because the hidden units are free to construct their
own representations of the input. The weights
between the input and hidden units determine when
each hidden unit is active, and so by modifying these
weights, a hidden unit can choose what it represents.
We also distinguish single-layer and multi-layer
architectures. The single-layer organization, in which
all units are connected to one another, constitutes the
most general case and is of more potential
computational power than hierarchically structured
multi-layer organizations. In multi-layer networks,
units are often numbered by layer, instead of
following a global numbering.
3.2 Learning Methods
All learning methods used for adaptive
neural networks can be classified into two major
categories:
3.2.1. Supervised learning which incorporates an
external teacher, so that each output unit is told what
its desired response to input signals ought to be.
During the learning process global information may
be required. Paradigms of supervised learning include
error-correction learning, reinforcement learning and
stochastic
learning.
An important issue concerning supervised learning is
the problem of error convergence, ie the
minimization of error between the desired and
computed unit values. The aim is to determine a set
www.ijera.com
www.ijera.com
of weights which minimizes the error. One wellknown method, which is common to many learning
paradigms, is the least mean square (LMS)
convergence.
3.2.2. Unsupervised learning uses no external
teacher and is based upon only local information. It is
also referred to as self-organization, in the sense that
it self-organizes data presented to the network and
detects their emergent collective properties.
Paradigms of unsupervised learning are Hebbian
learning
and
competitive
learning.
From Human Neurons to Artificial Neuron either
aspect of learning concerns the distinction or not of a
separate phase, during which the network is trained,
or a subsequent operation phase. We say that a neural
network learns off-line if the learning phase and the
operation phase are distinct. A neural network learns
on-line if it learns and operates at the same time.
Usually, supervised learning is performed off-line,
whereas unsupervised learning is performed on-line.
IV.
F UZZY VS NEURAL NETWORKS
Every intelligent technique has particular
computational properties (e.g. ability to learn,
explanation of decisions) that make them suited for
particular problems and not for others.
For example, while neural networks are
good at recognizing patterns, they are not good at
explaining how they reach their decisions. Fuzzy
logic systems, which can reason with imprecise
information, are good at explaining their decisions
but they cannot automatically acquire the rules they
use to make those decisions. Hybrid systems are also
important when considering the varied nature of
application domains. Many complex domains have
many different component problems, each of which
may require different types of processing.
If there is a complex application which has
two distinct sub-problems, say a signal processing
task and a serial reasoning task, then a neural
network and an expert system respectively can be
used for solving these separate tasks. The use of
intelligent hybrid systems is growing rapidly with
successful applications in many areas including
process control, engineering design, financial trading,
credit evaluation, medical diagnosis, and cognitive
simulation. In theory, neural networks, and fuzzy
systems are equivalent in that they are convertible,
yet in practice each has its own advantages and
disadvantages. For neural networks, the knowledge is
automatically acquired by the back propagation
algorithm, but the learning process is relatively slow
and analysis of the trained network is difficult (black
box).
But since, in general, knowledge acquisition
is difficult and also the universe of discourse of each
input variable needs to be divided into several
intervals, applications of fuzzy systems are restricted
to the fields where expert knowledge is available and
888 | P a g e
6. K .Geetha et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.884-889
the number of input variables is small. To overcome
the problem of knowledge acquisition, neural
networks are extended to automatically extract fuzzy
rules from numerical data.
V.
NEUROF UZZY SYSTEM
The combination of fuzzy logic and neural networks
constitutes a powerful means for designing intelligent
systems. Domain knowledge can be put into a neurofuzzy system by human experts in the form of
linguistic variables and fuzzy rules. When a
representative set of examples is available, a neurofuzzy system can automatically transform it into a
robust set of fuzzy IF-THEN rules, and thereby
reduce the dependence on expert knowledge when
building intelligent systems. [5][6]A neuro-fuzzy
system is essentially a multi-layer neural network,
and thus it can apply standard learning algorithms
developed for neural networks, including the backpropagation algorithm (Lin and Lee, 1991; Nauck et
al, 1997;). When a training input-output example is
presented to the system the back-propagation
algorithm computes the system output and compares
it with the desired output of the training example.
The difference (also called the error) is propagated
backwards through the network from the output layer
to the input layer. The neuron activation functions are
modified as the error is propagated. To determine the
necessary modifications, the back propagation
algorithm differentiates the activation functions of
the neurons The strength of neuro-fuzzy systems
involves two contradictory requirements in fuzzy
modeling: interpretability versus accuracy. In
practice, one of the two properties prevails. The
neuro-fuzzy in fuzzy modeling research field is
divided into two areas: linguistic fuzzy modeling that
is focused on interpretability, mainly the Mamdani
model; and precise fuzzy modeling that is focused on
accuracy, mainly the Takagi-Sugeno-Kang (TSK)
model.
www.ijera.com
[3]
M. F. Azeem, M. Hanmandlu, N.
Ahmad.”Generalization of adaptive neurofuzzy inference systems”, IEEE Trans.Neural
Networks 11(6), pp.1332-1346, 2000.
[4] E.Czogala
and
J.Leski.”Neuro-Fuzzy
Intelligent Systems, Studies in Fuziness and
Soft
Computing”,Springer
Verlag,Germany,2000.
[5] T.C.Lin, C.S.Lee,”Neural Network Based
Fuzzy Logic Control and Decision System”,
IEEE Transactions on Computers, 1991,
Vol.40, no.12.pp.1320-1336.
[6] D.Nauck,R.Kurse,”Neuro-Fuzzy Systems for
function Approximation”,4th International
workshop Fuzzy-Neuro Sytems,1997.
[7] L.A.Zadeh,”Fuzzy Sets”, Information and
Control, 1965, Vol.8, pp.338-353.
[8] Fuzzy control programming. Technical
report,
International
Electrotechnical
Commission, 1997.
[9] J. Mendel. Fuzzy logic systems for
engineering: a tutorial. Proceedings of the
IEEE, 83(3):345-377, Mar 1995.
SUMMARY
This paper gives an introduction to concepts
in fuzzy system, neural networks and a overview
about neuro-fuzzy system. Fuzzy logic provides
effective tools for modeling uncertainty in human
reasoning, while neural networks are effective in
training the data sets. Neuro-fuzzy systems combine
the advantages of both paradigms for the purpose of
classification, acquisition of knowledge to yield an
optimal solution to the given problems.
References
[1]
[2]
J.
J.Buckley.
“Fuzzy
Complex
numbers”,Fuzzy
sets
system.pp.333345,1989.
S.Abe,M.S.Lan. “Fuzzy rules extraction
directly from numerical data for function
approximation”.IEEE
Trans.Syst.Man
Cyben.,25(1),pp.119-129,1995.
www.ijera.com
889 | P a g e