SlideShare a Scribd company logo
Fuzzy LogicFuzzy Logic
1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Introduction
 Form of multivalued logic
 Deals reasoning that is approximate rather
than precise
 the fuzzy logic variables may have
a membership value of not only 0 or 1 –
that is, the degree of truth of
a statement can range between 0 and 1 and
is not constrained to the two truth values of
classic propositional logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
Introduction
 Fuzzy logic has been applied to many fields,
from control theory to artificial intelligence
 it still remains controversial among
most statisticians, who prefer Bayesian
logic, and
 some control engineers, who prefer
traditional two-valued logic.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
Degrees of truth
 let a 100 ml glass contain 30 ml of water.
 Then we may consider two concepts: Empty
and Full.
 The meaning of each of them can be
represented by a certain fuzzy set.
 Then one might define the glass as being
0.7 empty and 0.3 full.
 The concept of emptiness would
be subjective and thus would depend on
the observer or designer.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
An image that describe fuzzy
logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
An image that describe fuzzy
logic
 A point on that scale has three "truth
values" — one for each of the three
functions.
 Since the red arrow points to zero, this
temperature may be interpreted as "not
hot".
 The orange arrow (pointing at 0.2) may
describe it as "slightly warm" and
 the blue arrow (pointing at 0.8) "fairly cold".
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
Fuzzy Rules
 fuzzy logic usually uses IF-THEN rules
 Rules are usually expressed in the form:
IF variable IS property THEN action
 For example, a simple temperature
regulator that uses a fan might look like
this:
IF temperature IS very cold THEN stop fan
IF temperature IS cold THEN turn down fan
IF temperature IS normal THEN maintain level
IF temperature IS hot THEN speed up fan
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
Fuzzy Rules
 There is no "ELSE" – all of the rules are
evaluated, because the temperature might
be "cold" and "normal" at the same time to
different degrees.
 The AND, OR, and
NOT operators of boolean logic exist in
fuzzy logic, usually defined as the minimum,
maximum, and complement
 when they are defined this way, they are
called the Zadeh operators
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
Zadeh Operators
 NOT x = (1 - truth(x))
 x AND y = minimum(truth(x), truth(y))
 x OR y = maximum(truth(x), truth(y))
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
Hedges
 There are also other operators, more
linguistic in nature, called hedges that can
be applied.
 These are generally adverbs such as "very",
or "somewhat"
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
Fuzzy Logic Applications
 Air conditioning
 Washing Machines (LG is the pioneer)
 Mono-rails (first used in Tokyo)
 Digital image processing (specially in medical imaging)
 Elevators (in case of power failure)
 Rice cookers
 Video game engines (disperse intelligence in prince of
Persia)
 Special effects (swarm intelligence in Batman Begins,
Terminator Salvation, The Lord of the Rings)
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
Objections against Fuzzy Logic
 The concept of "coldness" cannot be
expressed in an equation, because although
temperature is a quantity, "coldness" is not
 people have an idea of what "cold" is, and
agree that there is no sharp cutoff between
"cold" and "not cold"
 where something is "cold" at N degrees but
"not cold" at N+1 degrees — a concept
classical logic cannot easily handle
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
Objections against Fuzzy Logic
 The result has no set answer so it is
believed to be a 'fuzzy' answer.
 Fuzzy logic simply provides a mathematical
model of the vagueness which is manifested
in the above example.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
A new way to represent
probabilistic logic?
 fuzzy set theory uses the concept of fuzzy
set membership (i.e., how much a variable
is in a set)
 probability theory uses the concept
of subjective probability (i.e., how
probable do I think that a variable is in a
set).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
Reference
 Wikipedia, “Fuzzy Logic”,
http://en.wikipedia.org/wiki/Fuzzy_logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15

More Related Content

Viewers also liked

Knowledge representation
Knowledge representationKnowledge representation
Knowledge representationRushdi Shams
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineeringRushdi Shams
 
Lecture 5, 6 and 7 cpu scheduling
Lecture 5, 6 and 7  cpu schedulingLecture 5, 6 and 7  cpu scheduling
Lecture 5, 6 and 7 cpu schedulingRushdi Shams
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating SystemsRushdi Shams
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structureRushdi Shams
 
Propositional logic
Propositional logicPropositional logic
Propositional logicRushdi Shams
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Rushdi Shams
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semanticsRushdi Shams
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
Mohsan Ijaz
 

Viewers also liked (11)

Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineering
 
Lecture 5, 6 and 7 cpu scheduling
Lecture 5, 6 and 7  cpu schedulingLecture 5, 6 and 7  cpu scheduling
Lecture 5, 6 and 7 cpu scheduling
 
L1 phishing
L1  phishingL1  phishing
L1 phishing
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
 
Weka
WekaWeka
Weka
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
 

Similar to L15 fuzzy logic

fuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptxfuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptx
ssuser92d367
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
Babu Appat
 
Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01
shwetaanu
 
Fuzzy logic ppt
Fuzzy logic pptFuzzy logic ppt
Fuzzy logic ppt
Priya_Srivastava
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Universitas Pembangunan Panca Budi
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
Bhanu Poudyal
 

Similar to L15 fuzzy logic (7)

fuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptxfuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptx
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01
 
Fuzzy logic ppt
Fuzzy logic pptFuzzy logic ppt
Fuzzy logic ppt
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 

More from Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
Rushdi Shams
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
Rushdi Shams
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
Rushdi Shams
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hackingRushdi Shams
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process modelsRushdi Shams
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systemsRushdi Shams
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocksRushdi Shams
 
Lecture 1 and 2 processes
Lecture 1 and 2  processesLecture 1 and 2  processes
Lecture 1 and 2 processesRushdi Shams
 
Lecture 3 and 4 threads
Lecture 3 and 4  threadsLecture 3 and 4  threads
Lecture 3 and 4 threadsRushdi Shams
 
My slide relational algebra
My slide  relational algebraMy slide  relational algebra
My slide relational algebraRushdi Shams
 

More from Rushdi Shams (14)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
 
First order logic
First order logicFirst order logic
First order logic
 
Belief function
Belief functionBelief function
Belief function
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
 
L3 defense
L3  defenseL3  defense
L3 defense
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process models
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systems
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocks
 
Lecture 1 and 2 processes
Lecture 1 and 2  processesLecture 1 and 2  processes
Lecture 1 and 2 processes
 
Lecture 3 and 4 threads
Lecture 3 and 4  threadsLecture 3 and 4  threads
Lecture 3 and 4 threads
 
My slide relational algebra
My slide  relational algebraMy slide  relational algebra
My slide relational algebra
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

L15 fuzzy logic

  • 1. Fuzzy LogicFuzzy Logic 1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 2. Introduction  Form of multivalued logic  Deals reasoning that is approximate rather than precise  the fuzzy logic variables may have a membership value of not only 0 or 1 – that is, the degree of truth of a statement can range between 0 and 1 and is not constrained to the two truth values of classic propositional logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
  • 3. Introduction  Fuzzy logic has been applied to many fields, from control theory to artificial intelligence  it still remains controversial among most statisticians, who prefer Bayesian logic, and  some control engineers, who prefer traditional two-valued logic. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
  • 4. Degrees of truth  let a 100 ml glass contain 30 ml of water.  Then we may consider two concepts: Empty and Full.  The meaning of each of them can be represented by a certain fuzzy set.  Then one might define the glass as being 0.7 empty and 0.3 full.  The concept of emptiness would be subjective and thus would depend on the observer or designer. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
  • 5. An image that describe fuzzy logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
  • 6. An image that describe fuzzy logic  A point on that scale has three "truth values" — one for each of the three functions.  Since the red arrow points to zero, this temperature may be interpreted as "not hot".  The orange arrow (pointing at 0.2) may describe it as "slightly warm" and  the blue arrow (pointing at 0.8) "fairly cold". Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7. Fuzzy Rules  fuzzy logic usually uses IF-THEN rules  Rules are usually expressed in the form: IF variable IS property THEN action  For example, a simple temperature regulator that uses a fan might look like this: IF temperature IS very cold THEN stop fan IF temperature IS cold THEN turn down fan IF temperature IS normal THEN maintain level IF temperature IS hot THEN speed up fan Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8. Fuzzy Rules  There is no "ELSE" – all of the rules are evaluated, because the temperature might be "cold" and "normal" at the same time to different degrees.  The AND, OR, and NOT operators of boolean logic exist in fuzzy logic, usually defined as the minimum, maximum, and complement  when they are defined this way, they are called the Zadeh operators Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
  • 9. Zadeh Operators  NOT x = (1 - truth(x))  x AND y = minimum(truth(x), truth(y))  x OR y = maximum(truth(x), truth(y)) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
  • 10. Hedges  There are also other operators, more linguistic in nature, called hedges that can be applied.  These are generally adverbs such as "very", or "somewhat" Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
  • 11. Fuzzy Logic Applications  Air conditioning  Washing Machines (LG is the pioneer)  Mono-rails (first used in Tokyo)  Digital image processing (specially in medical imaging)  Elevators (in case of power failure)  Rice cookers  Video game engines (disperse intelligence in prince of Persia)  Special effects (swarm intelligence in Batman Begins, Terminator Salvation, The Lord of the Rings) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
  • 12. Objections against Fuzzy Logic  The concept of "coldness" cannot be expressed in an equation, because although temperature is a quantity, "coldness" is not  people have an idea of what "cold" is, and agree that there is no sharp cutoff between "cold" and "not cold"  where something is "cold" at N degrees but "not cold" at N+1 degrees — a concept classical logic cannot easily handle Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13. Objections against Fuzzy Logic  The result has no set answer so it is believed to be a 'fuzzy' answer.  Fuzzy logic simply provides a mathematical model of the vagueness which is manifested in the above example. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
  • 14. A new way to represent probabilistic logic?  fuzzy set theory uses the concept of fuzzy set membership (i.e., how much a variable is in a set)  probability theory uses the concept of subjective probability (i.e., how probable do I think that a variable is in a set). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
  • 15. Reference  Wikipedia, “Fuzzy Logic”, http://en.wikipedia.org/wiki/Fuzzy_logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15