The document discusses soft computing and its components. Soft computing aims to solve real-world problems that are difficult for traditional hard computing techniques. It uses fuzzy logic, neural networks, evolutionary computation and other inexact methods. Unlike hard computing which requires precise modeling, soft computing is tolerant of imprecision, uncertainty and approximation. It is well-suited for problems where ideal models are not available, such as pattern recognition, forecasting and control systems. Some key applications of soft computing mentioned include handwriting recognition, image processing, data mining and control systems.
Gisvdlsigsbs zkdvdkod kaisvdv kshvdkd h kya hua hai kya hua hai kya hua hai kya hua h tere ko kuch bolna nahi kuch bhi ho raha h kya hai na dhund ke bta do ki nahi kuch puchungiii ho gya h kya hai ki h kya kr rhe h h h h ki mil jayega aur kya ho raha hai ki aap recharge ho jayega aur ek baat ka gussa h kya kar rahe hain aap bataiye ho gai thi na kal ke sath se ho gai hai aap bataiye ho ke aap hi nhi h kya kar rahe hain to aap bataiye hai aur aap hi ho jayegaa se baat karte hain aap ko free h kya aap bataiye hai aap ko bhi free nhi ho skta h tu bhi kuch share kar ye
This document introduces soft computing and provides an agenda for the lecture. Soft computing is defined as a fusion of fuzzy logic, neural networks, evolutionary computing, and probabilistic computing to deal with uncertainty and imprecision. Hybrid systems combine different soft computing techniques for improved performance. The lecture will cover an introduction to soft computing, fuzzy computing, neural networks, evolutionary computing, and hybrid systems. References are also provided.
Following topics are discussed in this presentation:What is Soft Computing?
What is Hard Computing?
What is Fuzzy Logic Models?
What is Neural Networks (NN)?
What is Genetic Algorithms or Evaluation Programming?
What is probabilistic reasoning?
Difference between fuzziness and probability
AI and Soft Computing
Future of Soft Computing
This document provides biographical information about Şaban Dalaman and summaries of key concepts in artificial intelligence and machine learning. It summarizes Şaban Dalaman's educational and professional background, then discusses Alan Turing's universal machine concept, the 1956 Dartmouth workshop proposal that helped define the field of AI, and definitions of AI, machine learning, deep learning, and data science. It also lists different tribes and algorithms within machine learning.
This document provides an overview of artificial neural networks (ANNs). It defines ANNs as systems loosely modeled after the human brain that are able to learn from experience to improve performance. ANNs can be used for functions like classification, clustering, prediction, and function approximation. The document discusses the basic structure of biological neurons and ANNs, including different connection types, topologies, and learning methods. It also compares key similarities and differences between computers and the human brain.
Gives an Introduction to Deep learning, What can you achieve with deep learning. What is deep learning's relationship with machine learning. Technical basics of working of deep learning. Introduction to LSTM. How LSTM can be used for Text classification. Results obtained.. Practical recommendations.
Soft computing is a collection of methodologies that aim to exploit imprecision and uncertainty to achieve tractability, robustness, and low solution cost. Its principal constituents are fuzzy logic, neurocomputing, and probabilistic reasoning. Soft computing provides tools to model and solve real-world problems that are too complex for conventional techniques.
Gisvdlsigsbs zkdvdkod kaisvdv kshvdkd h kya hua hai kya hua hai kya hua hai kya hua h tere ko kuch bolna nahi kuch bhi ho raha h kya hai na dhund ke bta do ki nahi kuch puchungiii ho gya h kya hai ki h kya kr rhe h h h h ki mil jayega aur kya ho raha hai ki aap recharge ho jayega aur ek baat ka gussa h kya kar rahe hain aap bataiye ho gai thi na kal ke sath se ho gai hai aap bataiye ho ke aap hi nhi h kya kar rahe hain to aap bataiye hai aur aap hi ho jayegaa se baat karte hain aap ko free h kya aap bataiye hai aap ko bhi free nhi ho skta h tu bhi kuch share kar ye
This document introduces soft computing and provides an agenda for the lecture. Soft computing is defined as a fusion of fuzzy logic, neural networks, evolutionary computing, and probabilistic computing to deal with uncertainty and imprecision. Hybrid systems combine different soft computing techniques for improved performance. The lecture will cover an introduction to soft computing, fuzzy computing, neural networks, evolutionary computing, and hybrid systems. References are also provided.
Following topics are discussed in this presentation:What is Soft Computing?
What is Hard Computing?
What is Fuzzy Logic Models?
What is Neural Networks (NN)?
What is Genetic Algorithms or Evaluation Programming?
What is probabilistic reasoning?
Difference between fuzziness and probability
AI and Soft Computing
Future of Soft Computing
This document provides biographical information about Şaban Dalaman and summaries of key concepts in artificial intelligence and machine learning. It summarizes Şaban Dalaman's educational and professional background, then discusses Alan Turing's universal machine concept, the 1956 Dartmouth workshop proposal that helped define the field of AI, and definitions of AI, machine learning, deep learning, and data science. It also lists different tribes and algorithms within machine learning.
This document provides an overview of artificial neural networks (ANNs). It defines ANNs as systems loosely modeled after the human brain that are able to learn from experience to improve performance. ANNs can be used for functions like classification, clustering, prediction, and function approximation. The document discusses the basic structure of biological neurons and ANNs, including different connection types, topologies, and learning methods. It also compares key similarities and differences between computers and the human brain.
Gives an Introduction to Deep learning, What can you achieve with deep learning. What is deep learning's relationship with machine learning. Technical basics of working of deep learning. Introduction to LSTM. How LSTM can be used for Text classification. Results obtained.. Practical recommendations.
Soft computing is a collection of methodologies that aim to exploit imprecision and uncertainty to achieve tractability, robustness, and low solution cost. Its principal constituents are fuzzy logic, neurocomputing, and probabilistic reasoning. Soft computing provides tools to model and solve real-world problems that are too complex for conventional techniques.
Neuro-Fuzzy and Soft Computing is a class that teaches techniques for creating intelligent systems that can handle real-world problems involving uncertainty and imprecision. The class will cover multiple soft computing techniques including fuzzy logic, neural networks, genetic algorithms, and probabilistic reasoning. It will present examples of industrial applications and discuss when each technique is applicable. Soft computing combines knowledge from these areas to develop systems that are human-like, adaptable, and able to explain their decisions. The techniques have already been successfully applied in areas like farming, manufacturing, and services.
The document provides an introduction to machine learning and neural networks. It defines machine learning as a field that allows computers to learn without being explicitly programmed. It also discusses different machine learning algorithms like supervised learning, unsupervised learning, and reinforcement learning. The document then describes neural networks and their biological inspiration from the human brain. It explains the basic structure and functioning of artificial neurons and neural networks. Finally, it discusses common neural network training techniques like backpropagation that are used to minimize errors and update weights in multi-layer neural networks.
This document provides an introduction to machine learning and neural networks. It defines machine learning as a field that allows computers to learn without being explicitly programmed. It also describes the main types of machine learning as supervised learning, unsupervised learning, and reinforcement learning. The document then discusses neural networks and their biological inspiration from the human brain. It provides examples of neural network applications and describes the basic structure and functioning of neural networks.
This document provides an introduction to artificial intelligence using fuzzy logic and neural networks. It discusses key concepts such as fuzzy logic, which allows for partial set membership rather than binary logic, and neural networks, which are modeled off the human brain. The document also introduces fuzzy-neural hybrid networks, which combine fuzzy logic and neural networks to leverage the strengths of both approaches. Examples of applications include pattern recognition, data mining, and control systems.
This document discusses soft computing and fuzzy set theory. It explains that fuzzy set theory allows for uncertain or vague knowledge to be represented using propositions and rules. Operations on fuzzy sets like intersection, union, and complement are defined using characteristic functions in a similar way to classical set theory. Fuzzy sets have applications in areas like artificial intelligence, control engineering, and decision making. Fuzzy rule-based systems and fuzzy control use fuzzy knowledge bases and inference to derive conclusions. Fuzzy data mining and fuzzy optimization apply fuzzy set concepts to improve existing techniques for data analysis and constrained optimization problems.
This document discusses artificial intelligence and machine learning. It begins with an introduction to AI and the Turing test. The main areas of AI discussed are reasoning and learning. Natural language processing is explained as making computers understand human language. Neural networks are described as networks of simple processing units linked by weighted connections that can be trained for tasks. The document concludes that continued advances in AI combined with techniques like neural networks and natural language processing may help create more human-like intelligent machines.
Automatic Attendace using convolutional neural network Face Recognitionvatsal199567
Automatic Attendance System will recognize the face of the student through the camera in the class and mark the attendance. It was built in Python with Machine Learning.
Ali Akram Saber's document discusses intelligent urban traffic control systems using various artificial intelligence techniques. It covers neural networks, genetic algorithms, expert systems, fuzzy logic, and rule-based systems. Neural networks can be separated into models, networks, and learning rules. Genetic algorithms mimic natural selection to find solutions. Expert systems contain knowledge bases and reasoning engines. Rule-based systems separate knowledge from execution. Fuzzy logic handles approximate reasoning between true and false values.
Artificial Intelligence AI Topics History and Overviewbutest
The document discusses the history and concepts of artificial intelligence including machine learning. It provides definitions of key AI terms and describes some famous early AI programs. It also discusses machine learning methods and applications, different types of learning, and challenges in the field. Games AI is explored through techniques like min-max trees used in chess programs. The Turing Test is introduced as a proposal to measure intelligence along with proposed modifications.
Artificial Intelligence AI Topics History and Overviewbutest
The document discusses the history and concepts of artificial intelligence including machine learning. It provides definitions of key AI terms and overview of famous early AI programs. It also discusses machine learning methods and applications, dimensions of machine learning study, and issues in the field. Games AI is explored through techniques like min-max trees used in chess programs. The Turing Test proposal and its problems/proposed modifications are summarized.
Join us for an enlightening session on AI/ML by Jeevanshi Sharma, an MS graduate from the University of Alberta with accolades from Outreachy'22 and MITACS GRI'21. Delve into cutting-edge advancements, applications, and ethical considerations. Learn basic steps to start your ML journey and explore industry applications, advancements, and associated careers.
1. Machine learning involves developing algorithms that can learn from data and improve their performance over time without being explicitly programmed. 2. Neural networks are a type of machine learning algorithm inspired by the human brain that can perform both supervised and unsupervised learning tasks. 3. Supervised learning involves using labeled training data to infer a function that maps inputs to outputs, while unsupervised learning involves discovering hidden patterns in unlabeled data through techniques like clustering.
The document discusses hard computing and soft computing. Hard computing uses precise mathematical models and algorithms, while soft computing uses techniques like neural networks and genetic algorithms to handle imprecise or complex problems. Soft computing is needed to solve real-world problems that involve uncertainty, incomplete information, noise, and non-linearity. It can provide approximate solutions and mimic human-like reasoning. The document then provides examples of applications of soft computing in various domains like image processing, automotive systems, bioinformatics, and power systems analysis.
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima PanditPurnima Pandit
The document discusses soft computing and its techniques, including artificial neural networks (ANN). It provides an overview of ANN, including how biological neurons inspired the basic ANN model. A neuron has inputs, outputs, weights, and an activation function. Networks can be single or multilayer. Learning involves updating weights to minimize error, with backpropagation commonly used for multilayer networks. Applications include pattern recognition, function approximation, and parameter estimation. A simple example is provided to estimate the slope and intercept of a line using ANN.
This document summarizes a study that compares fuzzy logic and neuro-fuzzy models for predicting direct current in motors. Fuzzy logic and neuro-fuzzy systems were used to model the relationship between motor torque, power, speed (inputs) and current (output). Both techniques were tested on a dataset of 507 samples. The neuro-fuzzy inference system (ANFIS) performed slightly better than the fuzzy logic system at predicting motor current, demonstrating the benefits of combining fuzzy logic with neural networks.
This summarizes a document describing the use of the Torch deep learning framework and convolutional neural networks to solve the Domineering game. It involves:
1) Generating training data for the neural network using Monte Carlo simulations of random Domineering games.
2) Loading the training data into Torch tensors.
3) Defining and implementing a convolutional neural network in Torch to take board configurations as input and output the best next move.
4) Training the neural network on the data for 1000 iterations using criteria and stochastic gradient descent optimization to minimize error between predictions and targets.
This document provides an overview of the IT201 Basics of Intelligent Computing course. It outlines the course outcomes, which include being able to distinguish AI branches, solve problems using techniques like fuzzy logic and genetic algorithms, design neural networks, and discuss cloud computing and IoT. It also describes the various modules that make up the course, including introductions to computing, intelligent computing, and artificial intelligence concepts. Specific techniques discussed for solving AI problems include search, use of knowledge, and abstraction. The document provides examples of different programming approaches for problems like tic-tac-toe and question answering.
This document provides information about the CS6109 Software Engineering course taught by Prof. K.Sridhar Patnaik at BIT Mesra. It outlines the course outcomes, distribution of marks, suggested reading, and covers topics related to software engineering including definitions, challenges, the software crisis, applying engineering approaches, software costs and products, and frequently asked questions.
Neuro-Fuzzy and Soft Computing is a class that teaches techniques for creating intelligent systems that can handle real-world problems involving uncertainty and imprecision. The class will cover multiple soft computing techniques including fuzzy logic, neural networks, genetic algorithms, and probabilistic reasoning. It will present examples of industrial applications and discuss when each technique is applicable. Soft computing combines knowledge from these areas to develop systems that are human-like, adaptable, and able to explain their decisions. The techniques have already been successfully applied in areas like farming, manufacturing, and services.
The document provides an introduction to machine learning and neural networks. It defines machine learning as a field that allows computers to learn without being explicitly programmed. It also discusses different machine learning algorithms like supervised learning, unsupervised learning, and reinforcement learning. The document then describes neural networks and their biological inspiration from the human brain. It explains the basic structure and functioning of artificial neurons and neural networks. Finally, it discusses common neural network training techniques like backpropagation that are used to minimize errors and update weights in multi-layer neural networks.
This document provides an introduction to machine learning and neural networks. It defines machine learning as a field that allows computers to learn without being explicitly programmed. It also describes the main types of machine learning as supervised learning, unsupervised learning, and reinforcement learning. The document then discusses neural networks and their biological inspiration from the human brain. It provides examples of neural network applications and describes the basic structure and functioning of neural networks.
This document provides an introduction to artificial intelligence using fuzzy logic and neural networks. It discusses key concepts such as fuzzy logic, which allows for partial set membership rather than binary logic, and neural networks, which are modeled off the human brain. The document also introduces fuzzy-neural hybrid networks, which combine fuzzy logic and neural networks to leverage the strengths of both approaches. Examples of applications include pattern recognition, data mining, and control systems.
This document discusses soft computing and fuzzy set theory. It explains that fuzzy set theory allows for uncertain or vague knowledge to be represented using propositions and rules. Operations on fuzzy sets like intersection, union, and complement are defined using characteristic functions in a similar way to classical set theory. Fuzzy sets have applications in areas like artificial intelligence, control engineering, and decision making. Fuzzy rule-based systems and fuzzy control use fuzzy knowledge bases and inference to derive conclusions. Fuzzy data mining and fuzzy optimization apply fuzzy set concepts to improve existing techniques for data analysis and constrained optimization problems.
This document discusses artificial intelligence and machine learning. It begins with an introduction to AI and the Turing test. The main areas of AI discussed are reasoning and learning. Natural language processing is explained as making computers understand human language. Neural networks are described as networks of simple processing units linked by weighted connections that can be trained for tasks. The document concludes that continued advances in AI combined with techniques like neural networks and natural language processing may help create more human-like intelligent machines.
Automatic Attendace using convolutional neural network Face Recognitionvatsal199567
Automatic Attendance System will recognize the face of the student through the camera in the class and mark the attendance. It was built in Python with Machine Learning.
Ali Akram Saber's document discusses intelligent urban traffic control systems using various artificial intelligence techniques. It covers neural networks, genetic algorithms, expert systems, fuzzy logic, and rule-based systems. Neural networks can be separated into models, networks, and learning rules. Genetic algorithms mimic natural selection to find solutions. Expert systems contain knowledge bases and reasoning engines. Rule-based systems separate knowledge from execution. Fuzzy logic handles approximate reasoning between true and false values.
Artificial Intelligence AI Topics History and Overviewbutest
The document discusses the history and concepts of artificial intelligence including machine learning. It provides definitions of key AI terms and describes some famous early AI programs. It also discusses machine learning methods and applications, different types of learning, and challenges in the field. Games AI is explored through techniques like min-max trees used in chess programs. The Turing Test is introduced as a proposal to measure intelligence along with proposed modifications.
Artificial Intelligence AI Topics History and Overviewbutest
The document discusses the history and concepts of artificial intelligence including machine learning. It provides definitions of key AI terms and overview of famous early AI programs. It also discusses machine learning methods and applications, dimensions of machine learning study, and issues in the field. Games AI is explored through techniques like min-max trees used in chess programs. The Turing Test proposal and its problems/proposed modifications are summarized.
Join us for an enlightening session on AI/ML by Jeevanshi Sharma, an MS graduate from the University of Alberta with accolades from Outreachy'22 and MITACS GRI'21. Delve into cutting-edge advancements, applications, and ethical considerations. Learn basic steps to start your ML journey and explore industry applications, advancements, and associated careers.
1. Machine learning involves developing algorithms that can learn from data and improve their performance over time without being explicitly programmed. 2. Neural networks are a type of machine learning algorithm inspired by the human brain that can perform both supervised and unsupervised learning tasks. 3. Supervised learning involves using labeled training data to infer a function that maps inputs to outputs, while unsupervised learning involves discovering hidden patterns in unlabeled data through techniques like clustering.
The document discusses hard computing and soft computing. Hard computing uses precise mathematical models and algorithms, while soft computing uses techniques like neural networks and genetic algorithms to handle imprecise or complex problems. Soft computing is needed to solve real-world problems that involve uncertainty, incomplete information, noise, and non-linearity. It can provide approximate solutions and mimic human-like reasoning. The document then provides examples of applications of soft computing in various domains like image processing, automotive systems, bioinformatics, and power systems analysis.
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima PanditPurnima Pandit
The document discusses soft computing and its techniques, including artificial neural networks (ANN). It provides an overview of ANN, including how biological neurons inspired the basic ANN model. A neuron has inputs, outputs, weights, and an activation function. Networks can be single or multilayer. Learning involves updating weights to minimize error, with backpropagation commonly used for multilayer networks. Applications include pattern recognition, function approximation, and parameter estimation. A simple example is provided to estimate the slope and intercept of a line using ANN.
This document summarizes a study that compares fuzzy logic and neuro-fuzzy models for predicting direct current in motors. Fuzzy logic and neuro-fuzzy systems were used to model the relationship between motor torque, power, speed (inputs) and current (output). Both techniques were tested on a dataset of 507 samples. The neuro-fuzzy inference system (ANFIS) performed slightly better than the fuzzy logic system at predicting motor current, demonstrating the benefits of combining fuzzy logic with neural networks.
This summarizes a document describing the use of the Torch deep learning framework and convolutional neural networks to solve the Domineering game. It involves:
1) Generating training data for the neural network using Monte Carlo simulations of random Domineering games.
2) Loading the training data into Torch tensors.
3) Defining and implementing a convolutional neural network in Torch to take board configurations as input and output the best next move.
4) Training the neural network on the data for 1000 iterations using criteria and stochastic gradient descent optimization to minimize error between predictions and targets.
This document provides an overview of the IT201 Basics of Intelligent Computing course. It outlines the course outcomes, which include being able to distinguish AI branches, solve problems using techniques like fuzzy logic and genetic algorithms, design neural networks, and discuss cloud computing and IoT. It also describes the various modules that make up the course, including introductions to computing, intelligent computing, and artificial intelligence concepts. Specific techniques discussed for solving AI problems include search, use of knowledge, and abstraction. The document provides examples of different programming approaches for problems like tic-tac-toe and question answering.
This document provides information about the CS6109 Software Engineering course taught by Prof. K.Sridhar Patnaik at BIT Mesra. It outlines the course outcomes, distribution of marks, suggested reading, and covers topics related to software engineering including definitions, challenges, the software crisis, applying engineering approaches, software costs and products, and frequently asked questions.
This document provides an overview of the CS4109 Computer System Architecture course taught by Prof. K.Sridhar Patnaik at BIT Mesra, Ranchi. The course objectives are to learn how computers work, analyze performance, and understand computer design and modern processor issues. The knowledge is useful for tasks like designing computers, improving software performance, and providing embedded solutions. Key topics covered include performance, instruction set architecture, arithmetic logic units, processor construction, pipelining, memory systems, and input/output. The document also discusses computer organization versus architecture, Turing machines as a model of computation, and the Church-Turing thesis.
This document provides an overview of an Object-Oriented Modeling and Design course. It discusses key concepts like objects, classes, attributes, operations, encapsulation, and abstraction. It also describes the importance of modeling, different types of models (object, dynamic, functional), and object modeling notations like class diagrams and instance diagrams. The goal of the course is to understand object-oriented methodology and modeling software systems using the Unified Modeling Language (UML).
This document provides an overview of an Object-Oriented Modeling and Design course. It discusses key concepts like objects, classes, attributes, operations, encapsulation, and abstraction. It also describes the importance of modeling, different types of models (object, dynamic, functional), and object modeling notations like class diagrams and instance diagrams. The goal of the course is to understand object-oriented methodology and modeling software systems using the Unified Modeling Language (UML).
This document provides an overview of software project management and processes at Infosys. It discusses how Infosys uses a project database, process capability baseline, process assets, and body of knowledge to build an infrastructure for project planning and management. This infrastructure aims to capture lessons learned from past projects to help plan and execute new projects more effectively. The document also describes Infosys' standard development process and how projects tailor this process.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
SoftComputing.pdf
1.
2.
3. Text Book:Neuro Fuzzy and Soft Computing
by J.S.R.Jang and C.T.Sun,Prentice Hall.
Reference Books:Fuzzy logic with Engg
App,Timothy J Ross,Willey Pub.
Soft Computing and Its application,Vol 1
K.S.Ray,Apple Academic Press.
First Course on Fuzzy Theory and
App.K.H.Lee,Spinger.
Fuzzy Set theory and its
app,H.Z.Zimmermann,Spinger Science
4. The idea behind soft computing is to model cognitive
behavior of human mind.
Soft computing is foundation of conceptual intelligence
in machines.
Unlike hard computing , Soft computing is tolerant of
imprecision, uncertainty, partial truth, and
approximation.
5. ∙ Hard computing
− Based on the concept of precise modeling and analyzing
to yield accurate results.
− Works well for simple problems, but is bound by the
NP-Complete set.
∙ Soft computing
− Aims to surmount NP-complete problems.
− Uses inexact methods to give useful but inexact answers
to intractable problems.
− Represents a significant paradigm shift in the aims of
computing - a shift which reflects the human mind.
− Tolerant to imprecision, uncertainty, partial truth, and
approximation.
− Well suited for real world problems where ideal models
are not available.
6. Can all computational problems be solved by a computer?
There are computational problems that can not be solved by
algorithms even with unlimited time.
For example Turing Halting problem (Given a program and an
input, whether the program will eventually halt when run with
that input, or will run forever)
Alan Turing proved that general algorithm to solve the halting
problem for all for all possible program-input pairs cannot
exist
A key part of the proof is, Turing machine was used as a
mathematical definition of a computer and program (Source
Halting Problem).
7. NP complete problems are problems whose status is
unknown.
No polynomial time algorithm has yet been discovered for any
NP complete problem, nor has anybody yet been able to
prove that no polynomial-time algorithm exist for any of
them.
The interesting part is, if any one of the NP complete
problems can be solved in polynomial time, then all of them
can be solved.
8. P is set of problems that can be solved by a
deterministic Turing machine in Polynomial
time.
NP is set of decision problems that can be
solved by a Non-deterministic Turing
Machine in Polynomial time.
P is subset of NP (any problem that can be
solved by deterministic machine in
polynomial time can also be solved by non-
deterministic machine in polynomial time).
9. NP-complete problems are the hardest problems in
NP set. A decision problem L is NP-complete if:
1) L is in NP (Any given solution for NP-complete
problems can be verified quickly, but there is no
efficient known solution)
2) Every problem in NP is reducible to L in
polynomial time
A problem is NP-Hard if it follows property 2
mentioned above, doesn’t need to follow property
1. Therefore, NP-Complete set is also a subset of
NP-Hard set
10.
11. Hard Computing Soft Computing
Conventional computing requires a
precisely stated analytical model.
Soft computing is tolerant of
imprecision.
Often requires a lot of computation time. Can solve some real world problems in
reasonably less time.
Not suited for real world problems for
which ideal model is not present.
Suitable for real world problems.
It requires full truth Can work with partial truth
It is precise and accurate Imprecise.
High cost for solution Low cost for solution
12. • Soft Computing is an approach for constructing
systems which are
− computationally intelligent,
− possess human like expertise in particular domain,
− can adapt to the changing environment and can learn
to do better
− can explain their decisions
13. ∙ Components of soft computing include:
− Fuzzy Logic (FL)
− Evolutionary Computation (EC) - based on the
origin of the species
➢ Genetic Algorithm
➢ Swarm Intelligence
➢ Ant Colony Optimizations
− Neural Network (NN)
− Machine Learning (ML)
14. AI: predicate logic and symbol
manipulation techniques
User
Interface
Inference
Engine
Explanation
Facility
Knowledge
Acquisition
KB:•Fact
•rules
Global
Database
Knowledge
Engineer
Human
Expert
Question
Response
Expert Systems
User
15. ANN
Learning and
adaptation
Fuzzy Set Theory
Knowledge representation
Via
Fuzzy if-then RULE
Genetic Algorithms
Systematic
Random Search
AI
Symbolic
Manipulation
19. Conventional AI:
◦ Focuses on attempt to mimic human
intelligent behavior by expressing it in
language forms or symbolic rules
◦ Manipulates symbols on the assumption
that such behavior can be stored in
symbolically structured knowledge bases
(physical symbol system hypothesis)
20. Intelligent Systems
Sensing Devices
(Vision)
Natural
Language
Processor
Mechanical
Devices
Perceptions
Actions
Task
Generator
Knowledge
Handler
Data
Handler Knowledge
Base
Machine
Learning
Inferencing
(Reasoning)
Planning
21. 8/6/2023 21
• The real world problems are pervasively
imprecise and uncertain
• Precision and certainty carry a cost
• Some problems may not even have any
precise solution
• may not even have any precise solutions
Premises of Soft Computing
22. 8/6/2023 22
The guiding principle of soft computing is:
•Exploit the tolerance for imprecision,
uncertainty, partial truth, and
approximation to achieve non-conventional
solutions, tractability (easily handled,
managed, or controlled), robustness and
low costs.
Guiding Principle of Soft Computing
23. 8/6/2023 23
Hard Computing
•Premises and guiding principles of Hard
Computing are
- Precision, Certainty, and Rigor.
• Many contemporary problems do not lend
themselves to precise solutions such as
- Recognition problems (handwriting,
speech, objects, images, texts)
- Mobile robot coordination, forecasting,
combinatorial problems etc.
- Reasoning on natural languages
24. The man is about eighty to eighty five years
old(pure imprecision)
The man is very old(imprecision and
vagueness)
The man is probably from India(uncertainty)
25. 8/6/2023 25
•Soft computing employs ANN, EC, FL etc, in a
complementary rather than a competitive way.
• One example of a particularly effective
combination is "neurofuzzy systems.”
• Such systems are becoming increasingly
visible
as consumer products ranging from air
conditioners and washing machines to
photocopiers, camcorders and many industrial
applications.
Implications of Soft Computing
26. 8/6/2023 26
Unique Property of Soft computing
• Learning from experimental data →
generalization
• Soft computing techniques derive their power
of generalization from approximating or
interpolating to produce outputs from previously
unseen inputs by using outputs from previous
learned inputs
• Generalization is usually done in a high
dimensional space.
27. 8/6/2023 27
• Handwriting recognition
• Automotive systems and manufacturing
• Image processing and data compression
• Architecture
• Decision-support systems
• Data Mining
• Power systems
• Control Systems
Current Applications using Soft
Computing
28. What is fuzzy thinking
◦ Experts rely on common sense when they solve
the problems
◦ How can we represent expert knowledge that
uses vague and ambiguous terms in a computer
◦ Fuzzy logic is not logic that is fuzzy but logic that
is used to describe the fuzziness. Fuzzy logic is
the theory of fuzzy sets, set that calibrate the
vagueness.
◦ Fuzzy logic is based on the idea that all things
admit of degrees. Temperature, height, speed,
distance, beauty – all come on a sliding scale.
Jim is tall guy
It is really very hot today
29. Communication of “fuzzy “ idea
This box is
too heavy.. Therefore, we
need a lighter
one…
30. Boolean logic
◦ Uses sharp distinctions. It forces us to
draw a line between a members of class
and non members.
Fuzzy logic
◦ Reflects how people think. It attempt to
model our senses of words, our decision
making and our common sense -> more
human and intelligent systems
33. Classical Set vs Fuzzy set
1
0
175 Height(cm)
1
0
175 Height(cm)
Universe of discourse
Membership value Membership value
34. Classical Set vs Fuzzy set
=
→
A
x
A
x
x
f
X
x
f A
A
if
,
0
if
,
1
)
(
where
},
1
,
0
{
:
)
(
Let X be the universe of discourse and its elements be denoted as x.
In the classical set theory, crisp set A of X is defined as function fA(x) called the
the characteristic function of A
In the fuzzy theory, fuzzy set A of universe of discourse X is defined by function
called the membership function of set A
)
(x
A
.
in
partly
is
if
1
)
(
0
;
in
not
is
if
0
)
(
;
in
totally
is
if
1
)
(
],
1
,
0
[
:
)
(
A
x
x
A
x
x
A
x
x
where
X
x
A
A
A
A
=
=
→
36. An example:
◦ Define the seven levels of education:
36
Highly
educated (0.8)
Very highly
educated (0.5)
37. Several fuzzy sets representing linguistic concepts such as low,
medium, high, and so one are often employed to define states of a
variable. Such a variable is usually called a fuzzy variable.
For example:
37
38. Given a universal set X, a fuzzy set is defined by a
function of the form
This kind of fuzzy sets are called ordinary fuzzy
sets(type 1 fuzzy set).
L-fuzzy set is ,
L is partial order set
Interval-valued fuzzy sets:
◦ The membership functions of ordinary fuzzy sets are often
overly precise. We may be able to identify appropriate
membership functions only approximately.
◦ .
]
1
,
0
[
: →
X
A
38
Power set
:
A X L
→
39. Interval-valued fuzzy sets: a fuzzy set
whose membership functions does not
assign to each element of the universal set
one real number, but a closed interval of
real numbers between the identified lower
and upper bounds.
]),
1
,
0
([
:
→
X
A
42. Fuzzy sets of type 2:
◦ : the set of all ordinary fuzzy sets that can be defined
with the universal set [0,1].
◦ is also called a fuzzy power set of [0,1].
42
43. Discussions:
◦ The primary disadvantage of interval-value fuzzy sets,
compared with ordinary fuzzy sets, is computationally
more demanding.
◦ The computational demands for dealing with fuzzy sets
of type 2 are even greater then those for dealing with
interval-valued fuzzy sets.
◦ This is the primary reason why the fuzzy sets of type 2
have almost never been utilized in any applications.
43
44.
45. Let Set A=“adult”. The MF of this set maps the
entire range of ‘age’ to ‘infant’, ’young’,
’adult’ ,’senior’.
The values of MFs for ‘infant’, ’young’etc are
FSs.Thus set ‘adult’ is type-2 FS. The sets
‘infant’, ’young’, and so on are type-1 FS.
If the values of MF of ‘infant’, ’young’ and so
on are type -2 ,the set ‘adult ‘is ……….
159. The operation of projection decreases the
dimension of given MF
160.
161.
162.
163.
164.
165.
166.
167.
168.
169.
170.
171.
172.
173.
174.
175.
176. Principle of incompatibility: As the complexity of the system
increases, our ability to make precise and yet significant statements
about its behaviour diminishes until a threshold is reached beyond
which a precision and significance become almost mutually
exclusive characteristics.
177.
178. Syntactic rule: refers to the way the linguistic
values in the term set T(age) are generated.
Semantic rule: defines the MFs of each
linguistic value of the term set.
193. w the degree of belief for the antecedent part
of a rule,gets propagated by the if-then rules
and the resulting degree of belief or MF for
the consequent part should be no greater
than w
218. If the out put of the fuzzy set has at least two
convex sub regions then the center of gravity
of the convex fuzzy sub region with the
largest area is used to obtain the defuzzified
value of the output z*
251. Consider three fuzzy sets that represent the concepts of a
young, middle-aged, and old person. The membership
functions are defined on the interval [0,80] as follows:
251
Find line passing through
(x,y) and (20,1):
1/[35-20] = y/[35-x]
253. -cut and strong -cut
◦ Given a fuzzy set A defined on X and any number
the -cut and strong -cut are the crisp sets:
◦ The -cut of a fuzzy set A is the crisp set that contains
all the elements of the universal set X whose
membership grades in A are greater than or equal to
the specified value of .
◦ The strong -cut of a fuzzy set A is the crisp set that
contains all the elements of the universal set X whose
membership grades in A are only greater than the
specified value of .
253
],
1
,
0
[
254. A level set of A:
◦ The set of all levels that represent distinct -cuts
of a given fuzzy set A.
◦ For example:
254
]
1
,
0
[
255. For example: consider the discrete approximation D2 of
fuzzy set A2
255
256. The standard complement of fuzzy set A with respect to the
universal set X is defined for all by the equation
◦ Elements of X for which are called equilibrium points
of A.
◦ For example, the equilibrium points of A2 in Fig. 1.7 are 27.5
and 52.5.
X
x
)
(
)
( x
A
x
A =
256
)
(
1
)
( x
A
x
A −
=
257. Given two fuzzy sets, A and B, their standard intersection and
union are defined for all by the equations
where min and max denote the minimum operator and the
maximum operator, respectively.
X
x
257
)],
(
),
(
max[
)
)(
(
)],
(
),
(
min[
)
)(
(
x
B
x
A
x
B
A
x
B
x
A
x
B
A
=
=
258. Another example:
◦ A1, A2, A3 are normal.
◦ B and C are subnormal.
◦ B and C are convex.
◦ are not
convex.
258
2
1 A
A
B
=
3
2 A
A
C
=
C
B
C
B
and
Normality and convexity
may be lost when we
operate on fuzzy sets by
the standard operations
of intersection and
complement.
259. Discussions:
◦ Normality and convexity
may be lost when we
operate on fuzzy sets by
the standard operations
of intersection and
complement.
◦ The fuzzy intersection
and fuzzy union will
satisfies all the properties
of the Boolean lattice
listed in Table 1.1 except
the low of contradiction
and the low of excluded
middle.
259
260. The law of contradiction
To verify that the law of contradiction is violated for fuzzy
sets, we need only to show that
is violated for at least one .
◦ This is easy since the equation is obviously violated for any value
, and is satisfied only for
0
)]
(
1
),
(
min[ =
− x
A
x
A
X
x
260
)
1
,
0
(
)
(
x
A }.
1
,
0
{
)
(
x
A
=
A
A
261. To verify the law of absorption,
◦ This requires showing that
is satisfied for all .
◦ Consider two cases:
(1)
(2)
)
(
)
( x
B
x
A
)
(
)
( x
B
x
A
261
A
B
A
A =
)
(
)
(
)]]
(
),
(
min[
),
(
max[ x
A
x
B
x
A
x
A =
X
x
)
(
)]
(
),
(
max[
)]]
(
),
(
min[
),
(
max[ x
A
x
A
x
A
x
B
x
A
x
A =
=
)
(
)]
(
),
(
max[
)]]
(
),
(
min[
),
(
max[ x
A
x
B
x
A
x
B
x
A
x
A =
=
)
(
)]]
(
),
(
min[
),
(
max[ x
A
x
B
x
A
x
A =
262. Given two fuzzy set
we say that A is a subset of B and write iff
for all .
◦
)
(
)
( x
B
x
A
X
x
262
B
A
any
for
and
iff B
B
A
A
B
A
B
A =
=
264. 264
Let s = [i(1),i(2),..,i(k)] be a subsequence of [1,2,…,n] and let
s* = [i(k+1), i(k+2),…, i(n)] be the sequence complementary to
[i(1),i(2),..,i(k)].
The projection of n-ary fuzzy relation R on U(s) = U(i1) U(i2) .. U(ik)
denoted Proj[U(s)](R) is k-ary fuzzy relation
{((u(i(1)),u(i(2)),…u(i(k))), sup [R](u(1),u(2),…u(n))}
u(i(k+1), u(i(k+2)), … u(i(n))
Example: Let’s take relation R – less than (previous page).
Proj[U1](R) = {(0,1),(10, 0.9), (20, 0.7), (30, 0.5),…..}
The converse of the projection of n-ary relation is called a cylindrical
extension.
Let R be k-ary fuzzy relation on U(s) = U(i1) U(i2) .. U(ik).
A cylindrical extension of R in U = U(1) U(2) … U(n) is
C(R)= {(u(1),u(2),..u(n)): [R](u(i1),u(i2),…u(i(n)))}.
268. 268
Let R be fuzzy relation on U(1) U(2) … U(r), and S be fuzzy
relation on U(s) U(s+1) … U(n).
Let {i1, i2,.., ik}= ({1,2…,r}- {s, s+1,…,n}) ({s, s+1,…,n}- {1,2,…,r})
Symmetric difference
The composition of R and S denoted by RS is defined as:
Proj[U(i1), U(i2), …, U(ik)](c(R)c(S)).
Example: R = Fast Less_Than
270. Conception of Fuzzy Logic
⚫ Many decision-making and problem-solving
tasks are too complex to be defined precisely
⚫ however, people succeed by using imprecise
knowledge
⚫ Fuzzy logic resembles human reasoning in its
use of approximate information and
uncertainty to generate decisions.
271. 271
Natural Language
⚫ Consider:
⚫ Joe is tall -- what is tall?
⚫ Joe is very tall -- what does this differ from tall?
⚫ Natural language (like most other activities in
life and indeed the universe) is not easily
translated into the absolute terms of 0 and 1.
“false” “true”
272. 272
Fuzzy Logic
⚫ An approach to uncertainty that combines
real values [0…1] and logic operations
⚫ Fuzzy logic is based on the ideas of fuzzy set
theory and fuzzy set membership often found
in natural (e.g., spoken) language.
273. 273
Example: “Young”
⚫ Example:
⚫ Ann is 28, 0.8 in set “Young”
⚫ Bob is 35, 0.1 in set “Young”
⚫ Charlie is 23, 1.0 in set “Young”
⚫ Unlike statistics and probabilities, the degree
is not describing probabilities that the item is
in the set, but instead describes to what
extent the item is the set.
274. 274
Membership function of fuzzy logic
Age
25 40 55
Young Old
1
Middle
0.5
DOM
Degree of
Membership
Fuzzy values
Fuzzy values have associated degrees of membership in the set.
0
277. Benefits of fuzzy logic
⚫ You want the value to switch gradually as
Young becomes Middle and Middle becomes
Old. This is the idea of fuzzy logic.
278. 278
Fuzzy Set Operations
⚫ Fuzzy union (): the union of two fuzzy sets
is the maximum (MAX) of each element from
two sets.
⚫ E.g.
⚫ A = {1.0, 0.20, 0.75}
⚫ B = {0.2, 0.45, 0.50}
⚫ A B = {MAX(1.0, 0.2), MAX(0.20, 0.45), MAX(0.75, 0.50)}
= {1.0, 0.45, 0.75}
279. 279
⚫ Fuzzy intersection (): the intersection of two
fuzzy sets is just the MIN of each element
from the two sets.
⚫ E.g.
⚫ A B = {MIN(1.0, 0.2), MIN(0.20, 0.45), MIN(0.75,
0.50)} = {0.2, 0.20, 0.50}
280. 280
Fuzzy Set Operations
⚫ The complement of a fuzzy variable with
DOM x is (1-x).
⚫ Complement ( _c): The complement of a
fuzzy set is composed of all elements’
complement.
⚫ Example.
⚫ Ac = {1 – 1.0, 1 – 0.2, 1 – 0.75} = {0.0, 0.8, 0.25}
281. 281
Crisp Relations
⚫ Ordered pairs showing connection between two
sets:
(a,b): a is related to b
(2,3) are related with the relation “<“
⚫ Relations are set themselves
< = {(1,2), (2, 3), (2, 4), ….}
⚫ Relations can be expressed as matrices
…
282. 282
Fuzzy Relations
⚫ Triples showing connection between two sets:
(a,b,#): a is related to b with degree #
⚫ Fuzzy relations are set themselves
⚫ Fuzzy relations can be expressed as matrices
…
284. 284
Where is Fuzzy Logic used?
⚫ Fuzzy logic is used directly in very few
applications.
⚫ Most applications of fuzzy logic use it as the
underlying logic system for decision support
systems.
285. 285
Fuzzy Expert System
⚫ Fuzzy expert system is a collection of
membership functions and rules that are
used to reason about data.
⚫ Usually, the rules in a fuzzy expert system
are have the following form:
“if x is low and y is high then z is medium”
288. 288
Fuzzification
⚫ Establishes the fact base of the fuzzy system. It identifies the
input and output of the system, defines appropriate IF THEN
rules, and uses raw data to derive a membership function.
⚫ Consider an air conditioning system that determine the best
circulation level by sampling temperature and moisture levels.
The inputs are the current temperature and moisture level.
The fuzzy system outputs the best air circulation level: “none”,
“low”, or “high”. The following fuzzy rules are used:
1. If the room is hot, circulate the air a lot.
2. If the room is cool, do not circulate the air.
3. If the room is cool and moist, circulate the air slightly.
⚫ A knowledge engineer determines membership functions that map
temperatures to fuzzy values and map moisture measurements to fuzzy
values.
289. 289
Inference
⚫ Evaluates all rules and determines their truth values.
If an input does not precisely correspond to an IF
THEN rule, partial matching of the input data is used
to interpolate an answer.
⚫ Continuing the example, suppose that the system has
measured temperature and moisture levels and mapped them
to the fuzzy values of .7 and .1 respectively. The system now
infers the truth of each fuzzy rule. To do this a simple method
called MAX-MIN is used. This method sets the fuzzy value of
the THEN clause to the fuzzy value of the IF clause. Thus, the
method infers fuzzy values of 0.7, 0.1, and 0.1 for rules 1, 2,
and 3 respectively.
290. 290
Composition
⚫ Combines all fuzzy conclusions obtained by inference
into a single conclusion. Since different fuzzy rules
might have different conclusions, consider all rules.
⚫ Continuing the example, each inference suggests a different
action
⚫ rule 1 suggests a "high" circulation level
⚫ rule 2 suggests turning off air circulation
⚫ rule 3 suggests a "low" circulation level.
⚫ A simple MAX-MIN method of selection is used where the
maximum fuzzy value of the inferences is used as the final
conclusion. So, composition selects a fuzzy value of 0.7 since
this was the highest fuzzy value associated with the inference
conclusions.
291. 291
Defuzzification
⚫ Convert the fuzzy value obtained from composition
into a “crisp” value. This process is often complex
since the fuzzy set might not translate directly into a
crisp value.Defuzzification is necessary, since
controllers of physical systems require discrete
signals.
⚫ Continuing the example, composition outputs a fuzzy value of
0.7. This imprecise value is not directly useful since the air
circulation levels are “none”, “low”, and “high”. The
defuzzification process converts the fuzzy output of 0.7 into
one of the air circulation levels. In this case it is clear that a
fuzzy output of 0.7 indicates that the circulation should be set
to “high”.
292. 292
Defuzzification
⚫ There are many defuzzification methods. Two of the
more common techniques are the centroid and
maximum methods.
⚫ In the centroid method, the crisp value of the output
variable is computed by finding the variable value of
the center of gravity of the membership function for
the fuzzy value.
⚫ In the maximum method, one of the variable values
at which the fuzzy subset has its maximum truth
value is chosen as the crisp value for the output
variable.
293. 293
Fuzzification
⚫ Two Inputs (x, y) and one output (z)
⚫ Membership functions:
low(t) = 1 - ( t / 10 )
high(t) = t / 10
Low High
1
0
t
X=0.32 Y=0.61
0.32
0.68
Low(x) = 0.68, High(x) = 0.32, Low(y) = 0.39, High(y) = 0.61
Crisp Inputs
294. 294
Create rule base
⚫ Rule 1: If x is low AND y is low Then z is high
⚫ Rule 2: If x is low AND y is high Then z is low
⚫ Rule 3: If x is high AND y is low Then z is low
⚫ Rule 4: If x is high AND y is high Then z is high
302. 302
Example II
if temperature is cold and oil is cheap
then heating is high
Linguistic
Variable
Linguistic
Variable
Linguistic
Variable
Linguistic
Value
Linguistic
Value
Linguistic
Value
cold cheap
high
303. 303
Definition [Zadeh 1973]
A linguistic variable is characterized by a quintuple
( )
, ( ), , ,
x T x U G M
Name
Term Set
Universe
Syntactic Rule
Semantic Rule
304. 304
Example
A linguistic variable is characterized by a quintuple
( )
, ( ), , ,
x T x U G M
age
old, very old, not so old,
(age) more or less young,
quite young, very young
G
=
[0, 100]
( )
old
(old) , ( ) [0,100]
M u u u
=
1
2
old
0 [0,50]
( ) 50
1 [50,100]
5
u
u u
u
−
−
=
−
+
Example semantic rule:
307. 307
A → B
A B
A B A → B
1
1
0
0
1
0
1
0
1
0
1
1
A B A B
1
1
0
0
1
0
1
0
1
0
1
1
1 ( ) ( )
( , )
( ) otherwise
A B
A B
B
x y
x y
y
→
=
( )
( , ) max 1 ( ), ( )
A B A B
x y x x
= −
308. 308
A → B If A then B
A A is true
B is true
B
A B
A
B
Modus Ponens
A B A → B
1
1
0
0
1
0
1
0
1
0
1
1
309. 309
If x is A then y is B.
antecedent
or
premise
consequence
or
conclusion
A → B
310. 310
Examples
If x is A then y is B.
A → B
⚫ If pressure is high, then volume is small.
⚫ If the road is slippery, then driving is dangerous.
⚫ If a tomato is red, then it is ripe.
⚫ If the speed is high, then apply the brake a little.
311. 311
Fuzzy Rules as Relations
If x is A then y is B.
( ) ( )
, ,
R A B
x y x y
→
=
R
A fuzzy rule can be defined
as a binary relation with MF
Depends on how
to interpret A → B
A → B
312. 312
Interpretations of A → B
A
B
A entails B
x
x
y
A coupled with B
A
B
x
x
y
( ) ( )
, , ?
R A B
x y x y
→
= =
313.
314. 314
Interpretations of A → B
A
B
A entails B
x
x
y
A coupled with B
A
B
x
x
y
( ) ( )
, , ?
R A B
x y x y
→
= =
A entails B (not A or B)
• Material implication
• Propositional calculus
• Extended propositional calculus
• Generalization of modus ponens
R A B A B
= →
( )
R A B A A B
= →
( )
R A B A B B
= →
1 ( ) ( )
( , )
( ) otherwise
A B
R
B
x y
x y
y
=
315. 315
Interpretations of A → B
( ) ( )
, , ?
R A B
x y x y
→
= =
A entails B (not A or B)
• Material implication
• Propositional calculus
• Extended propositional calculus
• Generalization of modus ponens
R A B A B
= →
( )
R A B A A B
= →
( )
R A B A B B
= →
1 ( ) ( )
( , )
( ) otherwise
A B
R
B
x y
x y
y
=
( )
( , ) max 1 ( ), ( )
R A B
x y x x
= −
( )
( )
( , ) max 1 ( ),min ( ), ( )
R A A B
x y x x x
= −
( )
( )
( , ) max 1 max ( ), ( ) , ( )
R A B B
x y x x x
= −
316. 316
Single rule with single antecedent
Rule:
Fact:
Conclusion:
if x is A then y is B
x is A’
y is B’
317. 317
Fuzzy Reasoning−
Single Rule with Single Antecedent
Rule:
Fact:
Conclusion:
if x is A then y is B
x is A’
y is B’
( )
x
x
A A’
y
( )
y
B
318. 318
Fuzzy Reasoning−
Single Rule with Single Antecedent
Rule:
Fact:
Conclusion:
if x is A then y is B
x is A’
y is B’
( )
x
x
A A’
y
( )
y
B
( )
( ) max min ( ), ( , )
B x A R
y x x y
=
( )
( ) ( , )
x A R
x x y
=
( , ) ( ) ( )
R A B
x y x y
=
( )
( ) ( ) ( )
x A A B
x x y
=
( )
( ) ( ) ( )
x A A B
x x y
=
B
Firing
Strength Firing Strength
Max-Min Composition
319. 319
Fuzzy Reasoning−
Single Rule with Single Antecedent
Rule:
Fact:
Conclusion:
if x is A then y is B
x is A’
y is B’
( )
x
x
A A’
y
( )
y
B
( )
( ) max min ( ), ( , )
B x A R
y x x y
=
( )
( ) ( , )
x A R
x x y
=
( )
B A A B
= →
( , ) ( ) ( )
R A B
x y x y
=
( )
( ) ( ) ( )
x A A B
x x y
=
( )
( ) ( ) ( )
x A A B
x x y
=
B
Max-Min Composition
320. 320
Fuzzy Reasoning−
Single Rule with Multiple Antecedents
Rule:
Fact:
Conclusion:
if x is A and y is B then z is C
x is A and y is B
z is C
321. 321
Fuzzy Reasoning−
Single Rule with Multiple Antecedents
Rule:
Fact:
Conclusion:
if x is A and y is B then z is C
x is A’ and y is B’
z is C’
( )
x
x
A A’
y
( )
y
B
B’
z
( )
z
C
322. 322
Fuzzy Reasoning−
Single Rule with Multiple Antecedents
( )
x
x
A A’
y
( )
y
B
B’
z
( )
z
C
Rule:
Fact:
Conclusion:
if x is A and y is B then z is C
x is A’ and y is B’
z is C’
( )
, ,
( ) max min ( , ), ( , , )
C x y A B R
y x y x y z
=
R A B C
= →
( )
( , , ) ( , , )
R A B C
x y z x y z
=
( ) ( ) ( )
A B C
x y z
=
( )
, , ( , ) ( , , )
x y A B R
x y x y z
=
( )
, ( ) ( ) ( ) ( ) ( )
x y A B A B C
x y x y z
=
( ) ( )
( ) ( ) ( ) ( ) ( )
x A A y B B C
x x y y z
=
Firing Strength
C
Max-Min Composition
323. 323
323
Fuzzy Reasoning−
Single Rule with Multiple Antecedents
( )
x
x
A A’
y
( )
y
B
B’
z
( )
z
C
Rule:
Fact:
Conclusion:
if x is A and y is B then z is C
x is A’ and y is B’
z is C’
( )
, ,
( ) max min ( , ), ( , , )
C x y A B R
y x y x y z
=
R A B C
= →
( )
( , , ) ( , , )
R A B C
x y z x y z
=
( ) ( ) ( )
A B C
x y z
=
( )
, , ( , ) ( , , )
x y A B R
x y x y z
=
( )
, ( ) ( ) ( ) ( ) ( )
x y A B A B C
x y x y z
=
( ) ( )
( ) ( ) ( ) ( ) ( )
x A A y B B C
x x y y z
=
Firing Strength
C
Max-Min Composition
( ) ( )
C A B A B C
= →
324. 324
Fuzzy Reasoning−
Multiple Rules with Multiple Antecedents
Rule1:
Fact:
Conclusion:
if x is A1 and y is B1 then z is C1
x is A’ and y is B’
z is C’
Rule2: if x is A2 and y is B2 then z is C2
325. 325
Fuzzy Reasoning−
Multiple Rules with Multiple Antecedents
Rule1:
Fact:
Conclusion:
if x is A1 and y is B1 then z is C1
x is A’ and y is B’
z is C’
Rule2: if x is A2 and y is B2 then z is C2
( )
x
x
A1
A’
( )
z
z
C1
( )
y
y
B1
( )
x
x
A2
( )
y
y
B2
( )
z
z
C2
A’
B’
B’
326. 326
Fuzzy Reasoning−
Multiple Rules with Multiple Antecedents
Rule1:
Fact:
Conclusion:
if x is A1 and y is B1 then z is C1
x is A’ and y is B’
z is C’
Rule2: if x is A2 and y is B2 then z is C2
( )
x
x
A1
A’
( )
z
z
C1
( )
y
y
B1
( )
x
x
A2
( )
y
y
B2
( )
z
z
C2
A’
B’
B’
( )
z
z
Max
1
C
2
C
1 2
C C C
=
( ) ( )
1 2
C A B R R
=
( ) ( )
1 2
A B R A B R
=
1 2
C C
=
Max-Min Composition