Question

In: Computer Science

Computational Intelligence or Soft Computing, is a new advanced information processing technique that uses characteristics closely...

Computational Intelligence or Soft Computing, is a new advanced information processing technique that uses characteristics closely associated with human intelligence. Some common algorithms are Genetic Algorithms, Neural networks etc. Make a report on some of these algorithms and explain their advantages and usage areas. (2 paragraphs each algorithm at least)

Solutions

Expert Solution

Solution :-

Various algorithms are used on Computational Intelligence or Soft Computing. They are -

1) Neural Network -

A network of artificial neurons which are inspired from biological network of neurons and as information processing units uses mathematical models in order to discover patterns in data is called as Neural Network. These patterns in data are too complex that cannot be noticed by human. Neural networks can learn and model non-linear and complex relationships because many of relationships between inputs and outputs are complex as well as non-linear. No restrictions are being imposed by Neural networks on input variables.

Neural networks are used in different areas. They are used in Image processing and character recognition. It is also used in forecasting which is extensively required in everyday business decisions, in finance and stock market, in monetary and economic policy. Neural networks are also used in data processing such as clustering, filtering, compression and blind signal separation. Regression analysis or functional approximation that includes time series prediction and modeling are some of the fields that fall under neural networks.

2) Fuzzy Logic -

The vagueness of a solution can be understood by a technique called as fuzzy logic. This solution is presented with a degree of vagueness which is practical to human secision. It is flexible and simple. With imprecise and incomplete data problems can be handled. Non linear functions having arbitrary complexity can be modeled using fuzzy logic. Fuzzy logic are customizable in natural language terms and covers a wide range of operating conditions. Also fuzzy logic is cheaper to develop.

Fuzzy Logic is applicable in various fields.Fuzzy logic can be used in control brakes in hazardous situations which depend upon speed of car, its acceleration, speed of wheel etc. It is used in auto transmission where fuel injection and ignition based on throttle setting, RPM, cooling water temperature can be controlled. It can also be used in controlling elevators where waiting time is reduced based on passenger traffic. Also fitness of the employees can be checked by using fuzzy rules.

3) Genetic algorithms (GA)-

The heuristic search and optimization techniques where the process of evolution is mimic is called as genetic algorithm. For both machine learning applications and optimization genetic algorithms are efficient and effective techniques. Multi-objective optimization is supported by GA. They are easily parallelised. It doesn't search from a single point rather it searches from a population of points. GAs are good for noisy environments.

GA is applicable to wider range of learning and optimization problem in many domains. Problems like optimization problems, skill based employee allocation problems, job shop problem, scheduling of job shop problems etc can be solved by using GA. Multidirectional search can be performed by GA by maintaining a population of potential problems.

4) Evolutionary Computation -

This algorithm is inspired by biological evolution and belongs to a family of optimization algorithms such as Genetic algorithm, Ant Colony Optimization, Particle Swarm Intelligence, Artificial Bee Colony Optimization etc. An initial set of candidate solutions is generated and updated iteratively in evolutionary computation. With respect to noisy evaluation functions this algorithms are robust. Any aspect of this algorithm can be customized and changed.

Evolutionary Computation can be used in construction of fuzzy systems, neuro fuzzy systems and neural networks. They are inspired by biological evolution such as reproduction, recombination etc.


Related Solutions

Advanced Digital Design is analyzing a capital investment project for using new computing technology to reduce...
Advanced Digital Design is analyzing a capital investment project for using new computing technology to reduce current operating costs. The new computing technology will have a five-year life with no salvage value at the end of five years. Advanced Digital Design’s cost of capital is 12%. Relevant cash flows and present value factors for 5 years @ 12% are as follows: Investment in computer technology = $500,000. Annual net cash savings from new computer technology = $135,000. Salvage value of...
An information system: is a different from a data processing system because it uses computers. is...
An information system: is a different from a data processing system because it uses computers. is not generally used for transaction processing is composed of only the computer-based information resources of an organization may consist of both computer-related and manual components
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their...
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their competition scores were recorded before and after the training. The results are shown below Subject     A    B    C   D     E      F G Before     9.6 9.7 9.7 9.4 9.7 9.5 9.5 After       9.7 9.9 9.7 9.3 9.8 9.8 9.3 Using a 0.01 level of significance, test the claim that the training technique is effective in raising the gymnasts’...
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their...
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their competition scores were recorded before and after the training. The results are shown below Subject A B C D E F G Before 9.6 9.7 9.7 9.4 9.7 9.5 9.5 After 9.7 9.9 9.7 9.3 9.8 9.8 9.3 Using a 0.01 level of significance, test the claim that the training technique is effective in raising the gymnasts’ score. Use the traditional method of hypothesis...
A coach uses a new technique in training middle distance runners. The times for 9 randomly...
A coach uses a new technique in training middle distance runners. The times for 9 randomly selected, independent athletes to run 800 meters before and after this training are shown below. Assume the distribution of differences are normally distributed Before 115.2 120.9 108.0 112.4 107.5 119.1 121.3 110.8 122.3 After 116.0 119.1 105.1 111.9 109.1 115.1 118.5 110.7 120.9 Build and Interpret 90% confidence interval for the true mean difference in 800-meter times.
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their...
A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their competition scores were recorded before and after the training. The results are shown below. Use a 0.01 significance level to test the claim that the training technique is effective in rising the gymnasts’ scores. Subject A B C D E F G Before 9.6 9.7 9.7 9.1 9.7 9.2 9.1 After 9.7 9.9 9.7 9.3 9.8 9.8 9.3
The following is information for Intel. Intel wants to pursue a new type of artificial intelligence...
The following is information for Intel. Intel wants to pursue a new type of artificial intelligence (AI) chip that would be used in autonomous vehicles. They want to know what they should use for their WACC (weighted average cost of capital). Preferred stock sells for $145 and pays an annual dividend of $13.25. There are currently 20 year 5.1% coupon bonds that pay semi-annual payments and are non-callable available at a price of $1,016.79. The bond-yield risk premium is 4%....
Encryption is a technique used to keep information private. It involves transforming text into a new...
Encryption is a technique used to keep information private. It involves transforming text into a new unreadable sequence of characters by changing the text in some way using a key. The goal is to do this in such a way that someone else who has the key can decrypt the information. In this question, you will write a program to encrypt an input string with the help of a key and an alphabet string. The program will start by setting...
Question #4 A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected...
Question #4 A coach uses a new technique to train gymnasts. 7 gymnasts were randomly selected and their competition scores were recorded before and after the training. The results are shown below. Before 9.4 9.0 9.2 9.4 9.2 9.3 9.7 After 9.5 9.3 9.5 9.6 9.4 9.5 9.9 Using a 0.10 level of significance and Critical Value method to test the claim that the training technique is effective in raising the gymnasts' scores. (Mean difference is less than zero)
An efficient market has which of the following characteristics? New information causes a quick price change...
An efficient market has which of the following characteristics? New information causes a quick price change followed by smaller price changes as the market adjusts. New information causes a large price change followed by price changes in the opposite direction as the market settles down after the news. New information causes a quick price change followed by random price changes. New information is reflected in an unbiased manner in stock prices after several days. What does large stock price increases...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT