SlideShare a Scribd company logo
1 of 9
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 232
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Soft Computing: A survey
Lukesh M. Barapatre1
, Anand Sharma2
1
Department of Information Technology, DMIETR, Wardha
2
Department of Information Technology, SGMCE, Shegaon
Abstract – Soft Computing is the fusion of methodologies that were designed to model and enable
solutions to real world problems, which are not modeled or too difficult to model, mathematically. Soft
computing is a consortium of methodologies that works synergistically and provides, in one form or
another, flexible information processing capability for handling real-life ambiguous situations. Its aim is to
exploit the tolerance for imprecision, uncertainty, approximate reasoning and partial truth in order to
achieve tractability, robustness and low-cost solutions. The guiding principle is to devise methods of
computation that lead to an acceptable solution at low cost, by seeking for an approximate solution to an
imprecisely or precisely formulated problem.Soft Computing (SC) represents a significant paradigm shift
in the aims of computing, which reflects the fact that the human mind, unlike present day computers,
possesses a remarkable ability to store and process information which is pervasively imprecise, uncertain
and lacking in categoricity. At this juncture, the principal constituents of Soft Computing (SC) are: Fuzzy
Systems (FS), including Fuzzy Logic (FL); Evolutionary Computation (EC), including Genetic
Algorithms (GA); Neural Networks (NN), including Neural Computing (NC); Machine Learning (ML);
and Probabilistic Reasoning (PR). In this paper we focus on fuzzy methodologies and fuzzy systems, as
they bring basic ideas to other SC methodologies
Index Terms – Soft Computing, Machine Learning, Fuzzy logic
I. INTRODUCTION
Soft Computing is a term which to refer to problems in computer science whose solutions are
unpredictable, uncertain and between 0 and 1. Soft Computing became a formal area of study in
Computer Science in the early 1990s. Earlier computational approaches could model and precisely
analyze only relatively simple systems. More complex systems arising in biology, medicine, the humanities,
management sciences, and similar fields often remained intractable to conventional mathematical and
analytical methods. That said, it should be pointed out that simplicity and complexity of systems are
relative, and many conventional mathematical models have been both challenging and very productive.
Soft computing deals with imprecision, uncertainty, partial truth, and approximation to achieve
practicability, robustness and low solution cost. As such it forms the basis of a considerable amount of
machine learning techniques. Recent trends tend to involve evolutionary and swarm intelligence based
algorithms and bio-inspired computation.Soft computing is a consortium of methodologies that works
synergistically and provides, in one form or another, flexible information processing capability for
handling real-life ambiguous situations. Its aim is to exploit the tolerance for imprecision, uncertainty,
approximate reasoning and partial truth in order to achieve tractability, robustness and low-cost solutions.
Soft computing differs from conventional (hard) computing. Unlike hard computing, it is tolerant of
imprecision, uncertainty, partial truth and approximation. In effect, the role model for soft computing is
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 233
the human mind. Soft Computing is basically optimization technique to find solution of problems which
are very hard to answer.
In real world, we have many problems which we have had no way to solve analytically, or problems
which could be solved theoretically but actually impossible due to its necessity of huge resources and/or
enormous time required for computation. For these problems, methods inspired by nature sometimes
work very efficiently and effectively. Although the solutions obtained by these methods do not always
equal to the mathematically strict solutions, a near optimal solution is sometimes enough in most practical
purposes. These biologically inspired methods are called Soft Computing,
II. FUZZY SYSYEM
The concept of Fuzzy Logic (FL) was conceived by Lotfi Zadeh, a professor at the University of
California at Berkley, and presented not as a control methodology, but as a way of processing data by
allowing partial set membership rather than crisp set membership or non-membership. This approach to
set theory was not applied to control systems until the 70's due to insufficient small-computer capability
prior to that time. Professor Zadeh reasoned that people do not require precise, numerical information
input, and yet they are capable of highly adaptive control. If feedback controllers could be programmed
to accept noisy, imprecise input, they would be much more effective and perhaps easier to implement.
Unfortunately, U.S. manufacturers have not been so quick to embrace this technology while the
Europeans and Japanese have been aggressively building real products around it.
A. WHAT IS FUZZY LOGIC?
In this context, FL is a problem-solving control system methodology that lends itself to implementation in
systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC
or workstation-based data acquisition and control systems. It can be implemented in hardware, software,
or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague,
ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics
how a person would make decisions, only much faster.
B. HOW DOES FL WORK?
FL requires some numerical parameters in order to operate such as what is considered significant error
and significant rate-of-change-of-error, but exact values of these numbers are usually not critical unless
very responsive performance is required in which case empirical tuning would determine them. For
example, a simple temperature control system could use a single temperature feedback sensor whose data
is subtracted from the command signal to compute "error" and then time-differentiated to yield the error
slope or rate-of-change-of-error, hereafter called "error-dot". Error might have units of degs F and a
small error considered to be 2F while a large error is 5F. The "error-dot" might then have units of
degs/min with a small error-dot being 5F/min and a large one being 15F/min. These values don't have to
be symmetrical and can be "tweaked" once the system is operating in order to optimize performance.
Generally, FL is so forgiving that the system will probably work the first time without any tweaking.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 234
III. EVOLUTIONARY COMPUTATION
Evolutionary computation, offers practical advantages to the researcher facing difficult optimization
problems. These advantages are multi-fold, including the simplicity of the approach, its robust response
to changing circumstance, its flexibility, and many other facets. The evolutionary approach can be applied
to problems where heuristic solutions are not available or generally lead to unsatisfactory results. As a
result, evolutionary computations have received increased interest, particularly with regards to the
manner in which they may be applied for practical problem solving.
In nature, evolution is mostly determined by natural selection or different individuals competing for
resources in the environment. Those individuals that are better are more likely to survive and propagate
their genetic material.
The encoding for genetic information (genome) is done in a way that admits asexual reproduction which
results in offspring that are genetically identical to the parent. Sexual reproduction allows some exchange
and re-ordering of chromosomes, producing offspring that contain a combination of information from
each parent. This is the recombination operation, which is often referred to as crossover because of the
way strands of chromosomes cross over during the exchange. The diversity in the population is achieved
by mutation. Evolutionary algorithms are ubiquitous nowadays, having been successfully applied to
numerous problems from different domains, including optimization, automatic programming, machine
learning, operations research, bioinformatics, and social systems. In many cases the mathematical
function, which describes the problem is not known and the values at certain parameters are obtained
from simulations. In contrast to many other optimization techniques an important advantage of
evolutionary algorithms is they can cope with multi-modal functions. Usually grouped under the term
evolutionary computation or evolutionary algorithms, we find the domains of genetic algorithms,
evolution strategies evolutionary programming and genetic programming. They all share a common
conceptual base of simulating the evolution of individual structures via processes of selection, mutation,
and reproduction. The processes depend on the perceived performance of the individual structures as
defined by the problem. A population of candidate solutions (for the optimization task to be solved) is
initialized. New solutions are created by applying reproduction operators (mutation and/or crossover).
The fitness (how good the solutions are) of the resulting solutions are evaluated and suitable selection
strategy is then applied to determine which solutions will be maintained into the next generation. The
procedure is then iterated and is illustrated in
Fig 1:Flow chart of an evolutionary algorithm
A. Advantages of evolutionary algorithms
Following are some of the advantages of using evolutionary algorithms while compared to other global
optimization techniques
1. Evolutionary algorithm performance is representation independent in contrast to other numerical
techniques, which might be applicable for only continuous values or other constrained sets.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 235
2. Evolutionary algorithms offer a framework such that it is comparably easy to incorporate prior
knowledge about the problem. Incorporating such information focuses the evolutionary search, yielding a
more efficient exploration of the state space of possible solutions..
3. Evolutionary algorithms can also be combined with more traditional optimization techniques. This may
be as simple as the use of a gradient minimization after primary search with an evolutionary algorithm
(e.g. fine tuning of weights of an evolutionary neural network) or it may involve simultaneous application
of other algorithms (e.g. hybridizing with simulated annealing or Tabu search to improve the efficiency of
basic evolutionary search).
4. The evaluation of each solution can be handled in parallel and only selection (which requires at least
pair-wise competition) requires some serial processing. Implicit parallelism is not possible in many global
optimization algorithms like simulated annealing and Tabu search.
5. Traditional methods of optimization are not robust to the dynamic changes in the problem of the
environment and often require a complete restart in order to provide a solution (e.g. dynamic
programming). In contrast, evolutionary algorithms can be used to adapt solutions to changing
circumstance.
6. Perhaps, the greatest advantage of evolutionary algorithms comes from the ability to address problems
for which there are no human experts. Although human expertise should be used when it is available, it
often proves less than adequate for automating problem solving routines.
IV. GENETIC ALGORITHMS (GA)
A typical flowchart of a genetic algorithm is depicted in Figure 2. One iteration of the algorithm is
referred to as a generation. The basic GA is very generic, and there are many aspects that can be
implemented differently according to the problem (e.g. representation of solution (chromosomes), type of
encoding, selection strategy, type of crossover and mutation operators, etc.).
Fig 2:Flow chart of basic genetic algorithm iteration
In practice, GAs are implemented by having arrays of bits or characters to represent the chromosomes.
The individuals in the population then go through a process of simulated evolution. Simple bit
manipulation operations allow the implementation of crossover, mutation and other operations. The
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 236
number of bits for every gene (parameter) and the decimal range in which they decode are usually the
same but nothing precludes the utilization of a different number of bits or range for every gene.
GA starts off with population of randomly generated chromosomes, each representing a candidate
solution to the concrete problem being solved and advances towards better chromosomes by applying
genetic operators based on the genetic processes occurring in nature. So far, GAs had a great measure of
success in search and optimization problems due to their robust ability to exploit the information
accumulated about an initially unknown search space. Particularly GAs specialize in large, complex and
poorly understood search spaces where classic tools are inappropriate, inefficient or time consuming. As
mentioned, the GA's basic idea is to maintain a population of chromosomes. This population evolves over
time through a successive iteration process of competition and controlled variation. Each state of
population is called generation. Associated with each chromosome at every generation is a fitness value,
which indicates the quality of the solution, represented by the chromosome values.
Based upon these fitness values, the selection of the chromosomes, which form the new generation, takes
place. Like in nature, the new chromosomes are created using genetic operators such as crossover and
mutation.
A. Mechanism of GA
The fundamental mechanism consists of the following stages which are also described in figure 3.
1. Generate randomly the initial population.
2. Select the chromosomes with the best fitness values.
3. Recombine selected chromosomes using crossover and mutation operators.
4. Insert offspring into the population.
5. If a stop criterion is satisfied, return the chromosome(s) with the best fitness. Otherwise, go to Step 2.
In GA, the population is defined to be the collection of individuals. A population is a generation that
undergoes under changes to produce new generation.
Like nature, GAs has also collection of several members to make population healthy. A chromosome that
is a collection of genes is correspondence to individual of population. Each individual chromosome
represents a possible solution to the optimization problem. The dimension of the GA refers to the
dimension of the search space which equals the number of genes in each chromosome.
Figure 3: Fundamental Mechanism of Simple Genetic Algorithm
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 237
V. NEURAL NETWORKS (NNS)
There are millions of very simple processing elements or neurons in the brain, linked together in a
massively parallel manner. This is believed to be responsible for
the human intelligence and discriminating power. Neural Networks are developed to try to achieve
biological system type performance using a dense interconnection of simple processing elements
analogous to biological neurons.
Neural Networks are information driven rather than data driven. Typically, there are at least two layers,
an input layer and an output layer. One of the most common networks is the Back Propagation Network
(BPN) which consists of an input layer, and an output layer with one or more intermediate hidden layer.
Neural Networks are trained to perform a particular function by adjusting the values of the connections
(weights) between elements using a set of examples before they can be employed to the actual problem.
Commonly neural networks are adjusted, or trained, so that a particular input leads to a specific target
output.The method used to generate the examples to train the network and the training algorithm
employed has a significant impact on the performance of the neural network-based model. One of the
training algorithms used is the Back- Propagation (BP) algorithm. This algorithm aims to reduce the
deviation between the desired objective function value and the actual objective function value.
VI. PARTICLE SWARM OPTIMIZATION (PSO)
Although GAs provides good solution but they not keep information about the best solution in the whole
community. This strategy extends search by the introduction of memory. In this optimization, along with
the local best solution, a global best solution is also stored somewhere in the memory, so that all particles
not trapped into local optima but moves to global optima. PSO is an algorithm developed by Kennedy
and Eberhart that simulates the social behaviors of bird flocking or fish schooling and the methods by
which they find roosting places, foods sources or other suitable habitat. The algorithm maintains a
population potential where each particle represents a potential solution to an optimization problem. The
PSO algorithm works by simultaneously maintaining several candidate solutions in the search space.
During each iteration of the algorithm, each candidate solution is evaluated by the objective function
being optimized, determining the fitness of that solution. Each candidate solution can be thought of as a
particle “flying” through the fitness landscape finding the maximum or minimum of the objective function.
Initially, the PSO algorithm chooses candidate solutions randomly within the search space. The initial
state of a four-particle PSO algorithm seeking the global maximum in a one-dimensional search space.
The search space is composed of all the possible solutions along the x-axis. The curve denotes the
objective function. PSO algorithm has no knowledge of the underlying objective function. hus has no way
of knowing if any of the candidate solutions are near to or far away from a local or global maximum. PSO
algorithm uses the objective function to evaluate its candidate solutions and operates upon the resultant
fitness values.
Each particle maintains its position, composed of the candidate solution and its evaluated fitness and its
velocity. Additionally, it remembers the best fitness value it has achieved thus far during the operation of
the algorithm, referred to as the individual best fitness and the candidate solution that achieved this
fitness, referred to as the individual best position or individual best candidate solution. Finally, PSO
algorithm maintains the best fitness value achieved among all particles in the swarm. It is called the global
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 238
best fitness. The candidate solution that achieved this fitness is called the global best position or global
best candidate solution.
VII. CONCLUSION
In this paper we studied the various soft computing techniques such as Fuzzy logic, Evolutionary
algorithm, Genetic algorithm, Neural Networks and PSO.FL was conceived as a better method for
sorting and handling data but has proven to be a excellent choice for many control system applications
since it mimics human control logic. It can be built into anything from small, hand-held products to large
computerized process control systems. It uses an imprecise but very descriptive language to deal with
input data more like a human operator.
REFERNCES
[1] "Europe Gets into Fuzzy Logic" (Electronics Engineering Times, Nov. 11, 1991).
[2] "Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh", ed. R.R. Yager et al. (John Wiley, New York, 1987).
[3] "U.S. Loses Focus on Fuzzy Logic" (Machine Design, June 21, 1990).
[4] Koza, J.R., ”Genetic Programming II”, A Bradford Book, MIT Press, Cambridge, 1994.
[5]Shanahan, J.G., Soft Computing for Knowledge Discovery, Kluwer Acad.Publ., Boston /Dordrecht /London, 2000
[6] Barber, J. C. 1995. "Genetic Algorithms as Tools for Optimization," Risks and Rewards, December.
[7] Bishop, C. M. 1995. Neural Networks for Pattern Recognition. Clarendon Press.
[8] Neural Network Learning and Expert Systems,Cambridge, MA:MIT Press, 1994.
[9] I. A. Taha and J. Ghosh, “Symbolic interpretation of artificial neural networks,”IEEE Trans. Knowl. Data Eng., vol. 11,
pp. 448–463, 1999.
[10] Abraham A (2004) Meta-Learning Evolutionary Artificial Neural Networks, Neurocomputing Journal, Elsevier
Science, Netherlands, 56c, pp. 1–38
[11] Ahuja RK, Orlin JB, and Tiwari A (2000) A greedy genetic algorithm for the quadratic assignment problem,
Computers and Operations Research, 27, 917–934
[12] Aruldoss AVT and Ebenezer JA (2004) Hybrid PSO-SQP for economic dispatch with valve-point effect, Electric Power
Systems Research, 71(1), pp. 51–59
.
Soft Computing: A survey
Soft Computing: A survey

More Related Content

What's hot

Patterns of Assigning Responsibilities
Patterns of Assigning ResponsibilitiesPatterns of Assigning Responsibilities
Patterns of Assigning Responsibilitiesguest2a92cd9
 
Means end analysis, knowledge in learning
Means end analysis,  knowledge in learningMeans end analysis,  knowledge in learning
Means end analysis, knowledge in learningGaurav Chaubey
 
soft computing manoj
soft computing manojsoft computing manoj
soft computing manojManoj Yadav
 
IT_Computational thinking
IT_Computational thinkingIT_Computational thinking
IT_Computational thinkingadmin57
 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstractsabctry
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft ComputingTameem Ahmad
 
IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED
 

What's hot (18)

Lecture 4 means end analysis
Lecture 4 means end analysisLecture 4 means end analysis
Lecture 4 means end analysis
 
Patterns of Assigning Responsibilities
Patterns of Assigning ResponsibilitiesPatterns of Assigning Responsibilities
Patterns of Assigning Responsibilities
 
Soft computing
Soft computing Soft computing
Soft computing
 
Fuzzy expert system
Fuzzy expert systemFuzzy expert system
Fuzzy expert system
 
Means end analysis, knowledge in learning
Means end analysis,  knowledge in learningMeans end analysis,  knowledge in learning
Means end analysis, knowledge in learning
 
Soft Computing
Soft ComputingSoft Computing
Soft Computing
 
184-144342105039-43
184-144342105039-43184-144342105039-43
184-144342105039-43
 
Soft computing01
Soft computing01Soft computing01
Soft computing01
 
soft computing manoj
soft computing manojsoft computing manoj
soft computing manoj
 
IT_Computational thinking
IT_Computational thinkingIT_Computational thinking
IT_Computational thinking
 
Introduction to Soft Computing
Introduction to Soft ComputingIntroduction to Soft Computing
Introduction to Soft Computing
 
Soft computing
Soft computingSoft computing
Soft computing
 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstracts
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
 
Kiran computer
Kiran computerKiran computer
Kiran computer
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
 
IJSRED-V2I3P104
IJSRED-V2I3P104IJSRED-V2I3P104
IJSRED-V2I3P104
 

Viewers also liked

Sgd itm-soft-computing-11-march -11
Sgd itm-soft-computing-11-march -11Sgd itm-soft-computing-11-march -11
Sgd itm-soft-computing-11-march -11Sanjeev Deshmukh
 
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...tmra
 
Information retrieval basics_v1.0
Information retrieval basics_v1.0Information retrieval basics_v1.0
Information retrieval basics_v1.0Sergey Chernov
 
Applying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsApplying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsPaloma De Las Cuevas
 
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalIndexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalVikas Bhushan
 
Soft Computing
Soft ComputingSoft Computing
Soft ComputingMANISH T I
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computingAnkush Kumar
 
Bioinformatioc: Information Retrieval
Bioinformatioc: Information RetrievalBioinformatioc: Information Retrieval
Bioinformatioc: Information RetrievalDr. Rupak Chakravarty
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIDr. Rupak Chakravarty
 
Peer to Peer Information Retrieval
Peer to Peer Information RetrievalPeer to Peer Information Retrieval
Peer to Peer Information RetrievalChetan Sundarde
 
Soft computing
Soft computingSoft computing
Soft computingCSS
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima PanditPurnima Pandit
 
1st KeyStone Summer School - Hackathon Challenge
1st KeyStone Summer School - Hackathon Challenge1st KeyStone Summer School - Hackathon Challenge
1st KeyStone Summer School - Hackathon ChallengeJoel Azzopardi
 
Introduction to Information Retrieval
Introduction to Information RetrievalIntroduction to Information Retrieval
Introduction to Information RetrievalCarsten Eickhoff
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalMauro Dragoni
 

Viewers also liked (20)

Sgd itm-soft-computing-11-march -11
Sgd itm-soft-computing-11-march -11Sgd itm-soft-computing-11-march -11
Sgd itm-soft-computing-11-march -11
 
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
 
Information retrieval basics_v1.0
Information retrieval basics_v1.0Information retrieval basics_v1.0
Information retrieval basics_v1.0
 
Applying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systemsApplying soft computing techniques to corporate mobile security systems
Applying soft computing techniques to corporate mobile security systems
 
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information RetrievalIndexing Techniques: Their Usage in Search Engines for Information Retrieval
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
 
Soft Computing
Soft ComputingSoft Computing
Soft Computing
 
CBIR with RF
CBIR with RFCBIR with RF
CBIR with RF
 
Soft computing Chapter 1
Soft computing Chapter 1Soft computing Chapter 1
Soft computing Chapter 1
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computing
 
Soft computing
Soft computingSoft computing
Soft computing
 
Bioinformatioc: Information Retrieval
Bioinformatioc: Information RetrievalBioinformatioc: Information Retrieval
Bioinformatioc: Information Retrieval
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - II
 
Peer to Peer Information Retrieval
Peer to Peer Information RetrievalPeer to Peer Information Retrieval
Peer to Peer Information Retrieval
 
Soft computing
Soft computingSoft computing
Soft computing
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
 
1st KeyStone Summer School - Hackathon Challenge
1st KeyStone Summer School - Hackathon Challenge1st KeyStone Summer School - Hackathon Challenge
1st KeyStone Summer School - Hackathon Challenge
 
Introduction to Information Retrieval
Introduction to Information RetrievalIntroduction to Information Retrieval
Introduction to Information Retrieval
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
 
Q&A with Amy Baker - 2014 NSHSS Claes Nobel Top 10 Educator of the Year - Nat...
Q&A with Amy Baker - 2014 NSHSS Claes Nobel Top 10 Educator of the Year - Nat...Q&A with Amy Baker - 2014 NSHSS Claes Nobel Top 10 Educator of the Year - Nat...
Q&A with Amy Baker - 2014 NSHSS Claes Nobel Top 10 Educator of the Year - Nat...
 
Trabajo 2
Trabajo 2Trabajo 2
Trabajo 2
 

Similar to Soft Computing: A survey

Computational optimization, modelling and simulation: Recent advances and ove...
Computational optimization, modelling and simulation: Recent advances and ove...Computational optimization, modelling and simulation: Recent advances and ove...
Computational optimization, modelling and simulation: Recent advances and ove...Xin-She Yang
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET Journal
 
A preliminary survey on optimized multiobjective metaheuristic methods for da...
A preliminary survey on optimized multiobjective metaheuristic methods for da...A preliminary survey on optimized multiobjective metaheuristic methods for da...
A preliminary survey on optimized multiobjective metaheuristic methods for da...ijcsit
 
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...Computational Optimization, Modelling and Simulation: Recent Trends and Chall...
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...Xin-She Yang
 
The potential role of ai in the minimisation and mitigation of project delay
The potential role of ai in the minimisation and mitigation of project delayThe potential role of ai in the minimisation and mitigation of project delay
The potential role of ai in the minimisation and mitigation of project delayPieter Rautenbach
 
Computational technique
Computational techniqueComputational technique
Computational techniqueNainaKhan28
 
Mathematical models and algorithms challenges
Mathematical models and algorithms challengesMathematical models and algorithms challenges
Mathematical models and algorithms challengesijctcm
 
A Development Shell For Cooperative Problem-Solving Environments
A Development Shell For Cooperative Problem-Solving EnvironmentsA Development Shell For Cooperative Problem-Solving Environments
A Development Shell For Cooperative Problem-Solving EnvironmentsJody Sullivan
 
wicked problems 20-may-14_rev-rkg
wicked problems 20-may-14_rev-rkgwicked problems 20-may-14_rev-rkg
wicked problems 20-may-14_rev-rkgBob Garrett
 
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...MITAILibrary
 
Do we measure functional size or do we count thomas fehlmann
Do we measure functional size or do we count   thomas fehlmannDo we measure functional size or do we count   thomas fehlmann
Do we measure functional size or do we count thomas fehlmannIWSM Mensura
 
Applying user modelling to human computer interaction design
Applying user modelling to human computer interaction designApplying user modelling to human computer interaction design
Applying user modelling to human computer interaction designNika Stuard
 
Soft Computing Techniques_Part 1.pptx
Soft Computing Techniques_Part 1.pptxSoft Computing Techniques_Part 1.pptx
Soft Computing Techniques_Part 1.pptxMegha V
 
Cybernetics in supply chain management
Cybernetics in supply chain managementCybernetics in supply chain management
Cybernetics in supply chain managementLuis Cabrera
 
Note on Tool to Measure Complexity
Note on Tool to Measure Complexity Note on Tool to Measure Complexity
Note on Tool to Measure Complexity John Thomas
 
operation research notes
operation research notesoperation research notes
operation research notesRenu Thakur
 
MCA Soft Computing ppt.pptx
MCA Soft Computing ppt.pptxMCA Soft Computing ppt.pptx
MCA Soft Computing ppt.pptxFahanaAbdulVahab
 

Similar to Soft Computing: A survey (20)

Computational optimization, modelling and simulation: Recent advances and ove...
Computational optimization, modelling and simulation: Recent advances and ove...Computational optimization, modelling and simulation: Recent advances and ove...
Computational optimization, modelling and simulation: Recent advances and ove...
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating Repertoire
 
25
2525
25
 
A preliminary survey on optimized multiobjective metaheuristic methods for da...
A preliminary survey on optimized multiobjective metaheuristic methods for da...A preliminary survey on optimized multiobjective metaheuristic methods for da...
A preliminary survey on optimized multiobjective metaheuristic methods for da...
 
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...Computational Optimization, Modelling and Simulation: Recent Trends and Chall...
Computational Optimization, Modelling and Simulation: Recent Trends and Chall...
 
The potential role of ai in the minimisation and mitigation of project delay
The potential role of ai in the minimisation and mitigation of project delayThe potential role of ai in the minimisation and mitigation of project delay
The potential role of ai in the minimisation and mitigation of project delay
 
Computational technique
Computational techniqueComputational technique
Computational technique
 
Mathematical models and algorithms challenges
Mathematical models and algorithms challengesMathematical models and algorithms challenges
Mathematical models and algorithms challenges
 
A Development Shell For Cooperative Problem-Solving Environments
A Development Shell For Cooperative Problem-Solving EnvironmentsA Development Shell For Cooperative Problem-Solving Environments
A Development Shell For Cooperative Problem-Solving Environments
 
Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
 
wicked problems 20-may-14_rev-rkg
wicked problems 20-may-14_rev-rkgwicked problems 20-may-14_rev-rkg
wicked problems 20-may-14_rev-rkg
 
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...
DALL-E 2 - OpenAI imagery automation first developed by Vishal Coodye in 2021...
 
Do we measure functional size or do we count thomas fehlmann
Do we measure functional size or do we count   thomas fehlmannDo we measure functional size or do we count   thomas fehlmann
Do we measure functional size or do we count thomas fehlmann
 
Applying user modelling to human computer interaction design
Applying user modelling to human computer interaction designApplying user modelling to human computer interaction design
Applying user modelling to human computer interaction design
 
Soft Computing Techniques_Part 1.pptx
Soft Computing Techniques_Part 1.pptxSoft Computing Techniques_Part 1.pptx
Soft Computing Techniques_Part 1.pptx
 
Cybernetics in supply chain management
Cybernetics in supply chain managementCybernetics in supply chain management
Cybernetics in supply chain management
 
Note on Tool to Measure Complexity
Note on Tool to Measure Complexity Note on Tool to Measure Complexity
Note on Tool to Measure Complexity
 
operation research notes
operation research notesoperation research notes
operation research notes
 
Anirban part1
Anirban part1Anirban part1
Anirban part1
 
MCA Soft Computing ppt.pptx
MCA Soft Computing ppt.pptxMCA Soft Computing ppt.pptx
MCA Soft Computing ppt.pptx
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Soft Computing: A survey

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 232 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Soft Computing: A survey Lukesh M. Barapatre1 , Anand Sharma2 1 Department of Information Technology, DMIETR, Wardha 2 Department of Information Technology, SGMCE, Shegaon Abstract – Soft Computing is the fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled or too difficult to model, mathematically. Soft computing is a consortium of methodologies that works synergistically and provides, in one form or another, flexible information processing capability for handling real-life ambiguous situations. Its aim is to exploit the tolerance for imprecision, uncertainty, approximate reasoning and partial truth in order to achieve tractability, robustness and low-cost solutions. The guiding principle is to devise methods of computation that lead to an acceptable solution at low cost, by seeking for an approximate solution to an imprecisely or precisely formulated problem.Soft Computing (SC) represents a significant paradigm shift in the aims of computing, which reflects the fact that the human mind, unlike present day computers, possesses a remarkable ability to store and process information which is pervasively imprecise, uncertain and lacking in categoricity. At this juncture, the principal constituents of Soft Computing (SC) are: Fuzzy Systems (FS), including Fuzzy Logic (FL); Evolutionary Computation (EC), including Genetic Algorithms (GA); Neural Networks (NN), including Neural Computing (NC); Machine Learning (ML); and Probabilistic Reasoning (PR). In this paper we focus on fuzzy methodologies and fuzzy systems, as they bring basic ideas to other SC methodologies Index Terms – Soft Computing, Machine Learning, Fuzzy logic I. INTRODUCTION Soft Computing is a term which to refer to problems in computer science whose solutions are unpredictable, uncertain and between 0 and 1. Soft Computing became a formal area of study in Computer Science in the early 1990s. Earlier computational approaches could model and precisely analyze only relatively simple systems. More complex systems arising in biology, medicine, the humanities, management sciences, and similar fields often remained intractable to conventional mathematical and analytical methods. That said, it should be pointed out that simplicity and complexity of systems are relative, and many conventional mathematical models have been both challenging and very productive. Soft computing deals with imprecision, uncertainty, partial truth, and approximation to achieve practicability, robustness and low solution cost. As such it forms the basis of a considerable amount of machine learning techniques. Recent trends tend to involve evolutionary and swarm intelligence based algorithms and bio-inspired computation.Soft computing is a consortium of methodologies that works synergistically and provides, in one form or another, flexible information processing capability for handling real-life ambiguous situations. Its aim is to exploit the tolerance for imprecision, uncertainty, approximate reasoning and partial truth in order to achieve tractability, robustness and low-cost solutions. Soft computing differs from conventional (hard) computing. Unlike hard computing, it is tolerant of imprecision, uncertainty, partial truth and approximation. In effect, the role model for soft computing is
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 233 the human mind. Soft Computing is basically optimization technique to find solution of problems which are very hard to answer. In real world, we have many problems which we have had no way to solve analytically, or problems which could be solved theoretically but actually impossible due to its necessity of huge resources and/or enormous time required for computation. For these problems, methods inspired by nature sometimes work very efficiently and effectively. Although the solutions obtained by these methods do not always equal to the mathematically strict solutions, a near optimal solution is sometimes enough in most practical purposes. These biologically inspired methods are called Soft Computing, II. FUZZY SYSYEM The concept of Fuzzy Logic (FL) was conceived by Lotfi Zadeh, a professor at the University of California at Berkley, and presented not as a control methodology, but as a way of processing data by allowing partial set membership rather than crisp set membership or non-membership. This approach to set theory was not applied to control systems until the 70's due to insufficient small-computer capability prior to that time. Professor Zadeh reasoned that people do not require precise, numerical information input, and yet they are capable of highly adaptive control. If feedback controllers could be programmed to accept noisy, imprecise input, they would be much more effective and perhaps easier to implement. Unfortunately, U.S. manufacturers have not been so quick to embrace this technology while the Europeans and Japanese have been aggressively building real products around it. A. WHAT IS FUZZY LOGIC? In this context, FL is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster. B. HOW DOES FL WORK? FL requires some numerical parameters in order to operate such as what is considered significant error and significant rate-of-change-of-error, but exact values of these numbers are usually not critical unless very responsive performance is required in which case empirical tuning would determine them. For example, a simple temperature control system could use a single temperature feedback sensor whose data is subtracted from the command signal to compute "error" and then time-differentiated to yield the error slope or rate-of-change-of-error, hereafter called "error-dot". Error might have units of degs F and a small error considered to be 2F while a large error is 5F. The "error-dot" might then have units of degs/min with a small error-dot being 5F/min and a large one being 15F/min. These values don't have to be symmetrical and can be "tweaked" once the system is operating in order to optimize performance. Generally, FL is so forgiving that the system will probably work the first time without any tweaking.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 234 III. EVOLUTIONARY COMPUTATION Evolutionary computation, offers practical advantages to the researcher facing difficult optimization problems. These advantages are multi-fold, including the simplicity of the approach, its robust response to changing circumstance, its flexibility, and many other facets. The evolutionary approach can be applied to problems where heuristic solutions are not available or generally lead to unsatisfactory results. As a result, evolutionary computations have received increased interest, particularly with regards to the manner in which they may be applied for practical problem solving. In nature, evolution is mostly determined by natural selection or different individuals competing for resources in the environment. Those individuals that are better are more likely to survive and propagate their genetic material. The encoding for genetic information (genome) is done in a way that admits asexual reproduction which results in offspring that are genetically identical to the parent. Sexual reproduction allows some exchange and re-ordering of chromosomes, producing offspring that contain a combination of information from each parent. This is the recombination operation, which is often referred to as crossover because of the way strands of chromosomes cross over during the exchange. The diversity in the population is achieved by mutation. Evolutionary algorithms are ubiquitous nowadays, having been successfully applied to numerous problems from different domains, including optimization, automatic programming, machine learning, operations research, bioinformatics, and social systems. In many cases the mathematical function, which describes the problem is not known and the values at certain parameters are obtained from simulations. In contrast to many other optimization techniques an important advantage of evolutionary algorithms is they can cope with multi-modal functions. Usually grouped under the term evolutionary computation or evolutionary algorithms, we find the domains of genetic algorithms, evolution strategies evolutionary programming and genetic programming. They all share a common conceptual base of simulating the evolution of individual structures via processes of selection, mutation, and reproduction. The processes depend on the perceived performance of the individual structures as defined by the problem. A population of candidate solutions (for the optimization task to be solved) is initialized. New solutions are created by applying reproduction operators (mutation and/or crossover). The fitness (how good the solutions are) of the resulting solutions are evaluated and suitable selection strategy is then applied to determine which solutions will be maintained into the next generation. The procedure is then iterated and is illustrated in Fig 1:Flow chart of an evolutionary algorithm A. Advantages of evolutionary algorithms Following are some of the advantages of using evolutionary algorithms while compared to other global optimization techniques 1. Evolutionary algorithm performance is representation independent in contrast to other numerical techniques, which might be applicable for only continuous values or other constrained sets.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 235 2. Evolutionary algorithms offer a framework such that it is comparably easy to incorporate prior knowledge about the problem. Incorporating such information focuses the evolutionary search, yielding a more efficient exploration of the state space of possible solutions.. 3. Evolutionary algorithms can also be combined with more traditional optimization techniques. This may be as simple as the use of a gradient minimization after primary search with an evolutionary algorithm (e.g. fine tuning of weights of an evolutionary neural network) or it may involve simultaneous application of other algorithms (e.g. hybridizing with simulated annealing or Tabu search to improve the efficiency of basic evolutionary search). 4. The evaluation of each solution can be handled in parallel and only selection (which requires at least pair-wise competition) requires some serial processing. Implicit parallelism is not possible in many global optimization algorithms like simulated annealing and Tabu search. 5. Traditional methods of optimization are not robust to the dynamic changes in the problem of the environment and often require a complete restart in order to provide a solution (e.g. dynamic programming). In contrast, evolutionary algorithms can be used to adapt solutions to changing circumstance. 6. Perhaps, the greatest advantage of evolutionary algorithms comes from the ability to address problems for which there are no human experts. Although human expertise should be used when it is available, it often proves less than adequate for automating problem solving routines. IV. GENETIC ALGORITHMS (GA) A typical flowchart of a genetic algorithm is depicted in Figure 2. One iteration of the algorithm is referred to as a generation. The basic GA is very generic, and there are many aspects that can be implemented differently according to the problem (e.g. representation of solution (chromosomes), type of encoding, selection strategy, type of crossover and mutation operators, etc.). Fig 2:Flow chart of basic genetic algorithm iteration In practice, GAs are implemented by having arrays of bits or characters to represent the chromosomes. The individuals in the population then go through a process of simulated evolution. Simple bit manipulation operations allow the implementation of crossover, mutation and other operations. The
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 236 number of bits for every gene (parameter) and the decimal range in which they decode are usually the same but nothing precludes the utilization of a different number of bits or range for every gene. GA starts off with population of randomly generated chromosomes, each representing a candidate solution to the concrete problem being solved and advances towards better chromosomes by applying genetic operators based on the genetic processes occurring in nature. So far, GAs had a great measure of success in search and optimization problems due to their robust ability to exploit the information accumulated about an initially unknown search space. Particularly GAs specialize in large, complex and poorly understood search spaces where classic tools are inappropriate, inefficient or time consuming. As mentioned, the GA's basic idea is to maintain a population of chromosomes. This population evolves over time through a successive iteration process of competition and controlled variation. Each state of population is called generation. Associated with each chromosome at every generation is a fitness value, which indicates the quality of the solution, represented by the chromosome values. Based upon these fitness values, the selection of the chromosomes, which form the new generation, takes place. Like in nature, the new chromosomes are created using genetic operators such as crossover and mutation. A. Mechanism of GA The fundamental mechanism consists of the following stages which are also described in figure 3. 1. Generate randomly the initial population. 2. Select the chromosomes with the best fitness values. 3. Recombine selected chromosomes using crossover and mutation operators. 4. Insert offspring into the population. 5. If a stop criterion is satisfied, return the chromosome(s) with the best fitness. Otherwise, go to Step 2. In GA, the population is defined to be the collection of individuals. A population is a generation that undergoes under changes to produce new generation. Like nature, GAs has also collection of several members to make population healthy. A chromosome that is a collection of genes is correspondence to individual of population. Each individual chromosome represents a possible solution to the optimization problem. The dimension of the GA refers to the dimension of the search space which equals the number of genes in each chromosome. Figure 3: Fundamental Mechanism of Simple Genetic Algorithm
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 237 V. NEURAL NETWORKS (NNS) There are millions of very simple processing elements or neurons in the brain, linked together in a massively parallel manner. This is believed to be responsible for the human intelligence and discriminating power. Neural Networks are developed to try to achieve biological system type performance using a dense interconnection of simple processing elements analogous to biological neurons. Neural Networks are information driven rather than data driven. Typically, there are at least two layers, an input layer and an output layer. One of the most common networks is the Back Propagation Network (BPN) which consists of an input layer, and an output layer with one or more intermediate hidden layer. Neural Networks are trained to perform a particular function by adjusting the values of the connections (weights) between elements using a set of examples before they can be employed to the actual problem. Commonly neural networks are adjusted, or trained, so that a particular input leads to a specific target output.The method used to generate the examples to train the network and the training algorithm employed has a significant impact on the performance of the neural network-based model. One of the training algorithms used is the Back- Propagation (BP) algorithm. This algorithm aims to reduce the deviation between the desired objective function value and the actual objective function value. VI. PARTICLE SWARM OPTIMIZATION (PSO) Although GAs provides good solution but they not keep information about the best solution in the whole community. This strategy extends search by the introduction of memory. In this optimization, along with the local best solution, a global best solution is also stored somewhere in the memory, so that all particles not trapped into local optima but moves to global optima. PSO is an algorithm developed by Kennedy and Eberhart that simulates the social behaviors of bird flocking or fish schooling and the methods by which they find roosting places, foods sources or other suitable habitat. The algorithm maintains a population potential where each particle represents a potential solution to an optimization problem. The PSO algorithm works by simultaneously maintaining several candidate solutions in the search space. During each iteration of the algorithm, each candidate solution is evaluated by the objective function being optimized, determining the fitness of that solution. Each candidate solution can be thought of as a particle “flying” through the fitness landscape finding the maximum or minimum of the objective function. Initially, the PSO algorithm chooses candidate solutions randomly within the search space. The initial state of a four-particle PSO algorithm seeking the global maximum in a one-dimensional search space. The search space is composed of all the possible solutions along the x-axis. The curve denotes the objective function. PSO algorithm has no knowledge of the underlying objective function. hus has no way of knowing if any of the candidate solutions are near to or far away from a local or global maximum. PSO algorithm uses the objective function to evaluate its candidate solutions and operates upon the resultant fitness values. Each particle maintains its position, composed of the candidate solution and its evaluated fitness and its velocity. Additionally, it remembers the best fitness value it has achieved thus far during the operation of the algorithm, referred to as the individual best fitness and the candidate solution that achieved this fitness, referred to as the individual best position or individual best candidate solution. Finally, PSO algorithm maintains the best fitness value achieved among all particles in the swarm. It is called the global
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 238 best fitness. The candidate solution that achieved this fitness is called the global best position or global best candidate solution. VII. CONCLUSION In this paper we studied the various soft computing techniques such as Fuzzy logic, Evolutionary algorithm, Genetic algorithm, Neural Networks and PSO.FL was conceived as a better method for sorting and handling data but has proven to be a excellent choice for many control system applications since it mimics human control logic. It can be built into anything from small, hand-held products to large computerized process control systems. It uses an imprecise but very descriptive language to deal with input data more like a human operator. REFERNCES [1] "Europe Gets into Fuzzy Logic" (Electronics Engineering Times, Nov. 11, 1991). [2] "Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh", ed. R.R. Yager et al. (John Wiley, New York, 1987). [3] "U.S. Loses Focus on Fuzzy Logic" (Machine Design, June 21, 1990). [4] Koza, J.R., ”Genetic Programming II”, A Bradford Book, MIT Press, Cambridge, 1994. [5]Shanahan, J.G., Soft Computing for Knowledge Discovery, Kluwer Acad.Publ., Boston /Dordrecht /London, 2000 [6] Barber, J. C. 1995. "Genetic Algorithms as Tools for Optimization," Risks and Rewards, December. [7] Bishop, C. M. 1995. Neural Networks for Pattern Recognition. Clarendon Press. [8] Neural Network Learning and Expert Systems,Cambridge, MA:MIT Press, 1994. [9] I. A. Taha and J. Ghosh, “Symbolic interpretation of artificial neural networks,”IEEE Trans. Knowl. Data Eng., vol. 11, pp. 448–463, 1999. [10] Abraham A (2004) Meta-Learning Evolutionary Artificial Neural Networks, Neurocomputing Journal, Elsevier Science, Netherlands, 56c, pp. 1–38 [11] Ahuja RK, Orlin JB, and Tiwari A (2000) A greedy genetic algorithm for the quadratic assignment problem, Computers and Operations Research, 27, 917–934 [12] Aruldoss AVT and Ebenezer JA (2004) Hybrid PSO-SQP for economic dispatch with valve-point effect, Electric Power Systems Research, 71(1), pp. 51–59 .