Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Q1.

a) What do you mean by the term soft computing? Illustrate the different constituents of soft computing methodology? In brief describe the strengths of each of such methodologies.

b) With Neuro-fuzzy modeling as a backbone, describe at least five features of the soft computing.

Q2.

a) Let R and S be two fuzzy relations illustrated below:

      0.3 0.8 0.4
R = 0.6 0.9 0.1
      0.2 0.5 0.6
 
      0.2 0.8 0.4
S = 0.7 0.9 0.1
      0.8 0.3 0.5

i) If R = “x considerably bigger than y” and S= “y very close to x” then give the matrices defining the fuzzy relations “x considerably bigger or very close to y” and “x considerably bigger and very close to y”

ii) Find out the composition relation RoS.

b) Give fuzzy logic inference method for the given rule under the fuzzy logic. The rule is as follows:

IF A THEN B ELSE C where A = very small, B = very large and C = NOT very large.

Small and large are defined as under
Small = 1/1+0.8/2+0.4/3+0.2/4+0/5
Large = 0/1+0/2+0/4+0.8/4+1/5

If A has size = 4, then what would be the resulting inference

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M910357

Have any Question? 


Related Questions in Computer Engineering

Assume object x has one simple variable and two tables with

Assume object x has one simple variable and two tables with two and three columns respectively. What is the identifier for the variable and each column of each table? We assume that the simple variable comes before the t ...

Suppose a user has physical access to computer hardware

Suppose a user has physical access to computer hardware (specifically, the box containing the CPU and a hard drive). The user does not have an account on the computer. How can the user force the computer to shut down? To ...

Distinguish between a policy requirement and a mechanism

Distinguish between a policy requirement and a mechanism. Identify at least three specific security requirements for a system you know and describe at least two different mechanisms for implementing each one.

1 some have sounded an apocalyptic voice as far as finding

1. Some have sounded an apocalyptic voice as far as finding solutions to system vulnerabilities. Should we take them seriously? Support your response. 2. What is innovative misuse? What role does it play in the search fo ...

In this exercise you are asked to attack an rsa encrypted

In this exercise, you are asked to attack an RSA encrypted message. Imagine being the attacker: You obtain the ciphertext y = 1141 by eavesdropping on a certain connection. The public key is kpub = (n,e)=(2623,2111). 1. ...

Emergence and abm agent-based models often exhibit emergent

Emergence and ABM Agent-based models often exhibit emergent properties. One characteristic of an emergent phenomenon is that the system exhibits a property that is not defined at the individual level. For instance, exami ...

Discuss the role of efficiency and effectiveness in the

Discuss the role of efficiency and effectiveness in the creation of value.

From the weekly readings and e-activity analyze the key

From the weekly readings and e-Activity, analyze the key influences that the theoretical and practical aspects of public leadership may exert upon a public leader's performance. Provide two (2) examples of these influenc ...

1 what is pki why is it so important in information

1. What is PKI? Why is it so important in information security? 2. What is the difference between authentication and nonrepudiation? 3. Why is there a dispute between digital nonrepudiation and legal nonrepudiation?

Another form of comb filter is given by the transfer

Another form of comb filter is given by the transfer function H(z)=1+ z -L For this problem, let L = 6. (a) Find the filter's impulse response h[n]. (b) Determine a canonical realization of this filter. (c) Find and plot ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro