+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

Q1.

a) What do you mean by the term soft computing? Illustrate the different constituents of soft computing methodology? In brief describe the strengths of each of such methodologies.

b) With Neuro-fuzzy modeling as a backbone, describe at least five features of the soft computing.

Q2.

a) Let R and S be two fuzzy relations illustrated below:

0.3 0.8 0.4
R = 0.6 0.9 0.1
0.2 0.5 0.6

0.2 0.8 0.4
S = 0.7 0.9 0.1
0.8 0.3 0.5

i) If R = “x considerably bigger than y” and S= “y very close to x” then give the matrices defining the fuzzy relations “x considerably bigger or very close to y” and “x considerably bigger and very close to y”

ii) Find out the composition relation RoS.

b) Give fuzzy logic inference method for the given rule under the fuzzy logic. The rule is as follows:

IF A THEN B ELSE C where A = very small, B = very large and C = NOT very large.

Small and large are defined as under
Small = 1/1+0.8/2+0.4/3+0.2/4+0/5
Large = 0/1+0/2+0/4+0.8/4+1/5

If A has size = 4, then what would be the resulting inference

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M910357

Have any Question?

## Related Questions in Computer Engineering

### 1 discuss the steps you would take to protect your mobile

1. Discuss the steps you would take to protect your mobile device. 2. Search the Internet to find a company's security policy for its mobile devices. Suggest what you would change in that security policy to enhance secur ...

### Dbas you continue to review the functionality of various

DB As you continue to review the functionality of various operating systems, you also have to look at various components of the computers to ensure that your selected operating system (OS) is compatible with the hardware ...

### 1 explain why public key encryption is more useful for

1. Explain why public key encryption is more useful for securing communications on the Internet than private (shared) key encryption. 2. As discussed in the chapter, string formatting could be used to simplify the dateco ...

### 1 we said that tcp provides a connection-oriented service

1. We said that TCP provides a connection-oriented service between the two application programs. A connection in this case needs a connection identifier that distinguishes one connection from another. What do you think t ...

### Using the floor plan of a building you are familiar with

Using the floor plan of a building you are familiar with, design an electronic monitoring plan that includes closed-circuit television, burglar alarms with appropriate sensors, fire detectors, and fire suppression and ph ...

### Consider the following binary treea show the order the

Consider the following binary tree (a) Show the order the nodes will be visited in a: (b) Identify all of the leaf nodes. (c) Identify all of the interior nodes. (d) List all of the nodes on level 4. (e) List all of the ...

### Implement a votingmachine class that can be used for a

Implement a VotingMachine class that can be used for a simple election. Have methods to clear the machine state, to vote for a Democrat, to vote for a Republican, and to get the tallies for both parties. Extra credit if ...

### In the dhke protocol the private keys are chosen from the

In the DHKE protocol, the private keys are chosen from the set Why are the values 1 and p - 1 excluded? Describe the weakness of these two values. We now want to consider the importance of the proper choice of generators ...

### 1 what mac protocol is used in the baseband layer of

1. What MAC protocol is used in the baseband layer of Bluetooth? 2. What is the role of the L2CAP layer in Bluetooth? 3. In an 802.11, give the value of the address 1 field in each of the following situations (left bit d ...

### 1 what general attributes do organizations seek in

1. What general attributes do organizations seek in candidates when hiring information security professionals across all positions? Prioritize the list and justify your ranking. 2. What are the critical considerations wh ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro