Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Q1.

a) What do you mean by the term soft computing? Illustrate the different constituents of soft computing methodology? In brief describe the strengths of each of such methodologies.

b) With Neuro-fuzzy modeling as a backbone, describe at least five features of the soft computing.

Q2.

a) Let R and S be two fuzzy relations illustrated below:

      0.3 0.8 0.4
R = 0.6 0.9 0.1
      0.2 0.5 0.6
 
      0.2 0.8 0.4
S = 0.7 0.9 0.1
      0.8 0.3 0.5

i) If R = “x considerably bigger than y” and S= “y very close to x” then give the matrices defining the fuzzy relations “x considerably bigger or very close to y” and “x considerably bigger and very close to y”

ii) Find out the composition relation RoS.

b) Give fuzzy logic inference method for the given rule under the fuzzy logic. The rule is as follows:

IF A THEN B ELSE C where A = very small, B = very large and C = NOT very large.

Small and large are defined as under
Small = 1/1+0.8/2+0.4/3+0.2/4+0/5
Large = 0/1+0/2+0/4+0.8/4+1/5

If A has size = 4, then what would be the resulting inference

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M910357

Have any Question? 


Related Questions in Computer Engineering

Network design proposal part cmit 265 fundamentals of

Network Design Proposal Part CMIT 265 Fundamentals of Networking In this section, address each of the following. Identify network services needed. List additional servers or network devices needed to implement the networ ...

1 what common security system is an idps most like in what

1. What common security system is an IDPS most like? In what ways are these systems similar? 2. How does a false positive alarm differ from a false negative one? From a security perspective, which is least desirable? 3. ...

1 if the drain and gate supply voltages are dropped to 06v

1. If the drain and gate supply voltages are dropped to 0.6V and the oxide reduced to 40A as indicated by a recent (1989-1990)IBM 0.1-micron Si nMOST at 77K, compute the device parameters required in Table 662.1. Discuss ...

1 assuming there are no stalls or hazards what is the

1. Assuming there are no stalls or hazards, what is the utilization of the data memory? 2. Assuming there are no stalls or hazards, what is the utilization of the write-register port of the "Registers" unit? 3. Instead o ...

Respond to t he following questions in one essay at least

Respond to t he following questions in one essay. At least three to four paragraphs for each question with examples is expected. Describe the term performance booster(s) and how it relates to a Virtual Teams There are th ...

Write a function that counts the occurrences of a word in a

Write a function that counts the occurrences of a word in a string. The function should return an integer. Do not assume that just one space separates words and assume that a string can contain punctuation. Write the fun ...

Select a java program that contains an exception error the

Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential ...

Group members will build upon the work from the previous

Group members will build upon the work from the previous weeks, incorporating instructor feedback. Continue the paper by adding your marketing plan. Thissection should be high-level aspects of a basic plan for marketing ...

Perform a hierarchical clustering of the one-dimensional

Perform a hierarchical clustering of the one-dimensional set of points 1, 4, 9, 16, 25, 36, 49, 64, 81, assuming clusters are represented by their centroid (average), and at each step the clusters wit

1 what kind of legislation can be effective to prevent

1. What kind of legislation can be effective to prevent hacking? 2. List and discuss the types of hacker crimes. 3. Discuss the major sources of computer crimes. 4. Why is crime reporting so low in major industries? 5. I ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen