共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we describe a granular algorithm for translating information between two granular worlds, represented as fuzzy rulebases. These granular worlds are defined on the same universe of discourse, but employ different granulations of this universe. In order to translate information from one granular world to the other, we must regranulate the information so that it matches the information granularity of the target world. This is accomplished through the use of a first-order interpolation algorithm, implemented using linguistic arithmetic, a set of elementary granular computing operations. We first demonstrate this algorithm by studying the common “fuzzy-PD” rulebase at several different granularities, and conclude that the “3 × 3” granulation may be too coarse for this objective. We then examine the question of what the “natural” granularity of a system might be; this is studied through a 10-fold cross-validation experiment involving three different granulations of the same underlying mapping. For the problem under consideration, we find that a 7 × 7 granulation appears to be the minimum necessary precision. 相似文献
2.
When using granular computing for problem solving, one can focus on a specific level of understanding without looking at unwanted details of subsequent (more precise) levels. We present a granular computing framework for growing hierarchical self-organizing maps. This approach is ideal since the maps are arranged in a hierarchical manner and each is a complete abstraction of a pattern within data. The framework allows us to precisely define the connections between map levels. Formulating a neuron as a granule, the actions of granule construction and decomposition correspond to the growth and absorption of neurons in the previous model. In addition, we investigate the effects of updating granules with new information on both coarser and finer granules that have a derived relationship. Called bidirectional update propagation, the method ensures pattern consistency among data abstractions. An algorithm for the construction, decomposition, and updating of the granule-based self-organizing map is introduced. With examples, we demonstrate the effectiveness of this framework for abstracting patterns on many levels. 相似文献
3.
4.
The study introduces and discusses a principle of justifiable granularity, which supports a coherent way of designing information granules in presence of experimental evidence (either of numerical or granular character). The term “justifiable” pertains to the construction of the information granule, which is formed in such a way that it is (a) highly legitimate (justified) in light of the experimental evidence, and (b) specific enough meaning it comes with a well-articulated semantics (meaning). The design process associates with a well-defined optimization problem with the two requirements of experimental justification and specificity. A series of experiments is provided as well as a number of constructs carried for various formalisms of information granules (intervals, fuzzy sets, rough sets, and shadowed sets) are discussed as well. 相似文献
5.
6.
7.
8.
9.
Elisabeth 《Data & Knowledge Engineering》2002,41(2-3):247-272
Natural language and databases are core components of information systems. They are related to each other because they share the same purpose: the conceptualization aspects of the real world in order to deal with them in some way. Natural language processing (NLP) techniques may substantially enhance most phases of the information system lifecycle, starting with requirements analysis, specification and validation, and going up to conflict resolution, result processing and presentation. Furthermore, natural language based query languages and user interfaces facilitate the access to information for anyone and allow for new paradigms in the usage of computerized services. This paper investigates the use of NLP techniques in the design phase of information systems. Then, it reports on data base querying and information retrieval enhanced with NLP. 相似文献
10.
An Ngo-The Guenther Ruhe 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(1):95-108
Release planning is known to be a cognitively and computationally difficult problem. Different kinds of uncertainties make
it hard to formulate and solve the problem. Our solution approach called EVOLVE+ mitigates these difficulties by (i) an evolutionary
problem solving method combining rigorous solution methods to solve the actual formalization of the problem combined with
the interactive involvement of the human experts in this process, (ii) provision of a portfolio of diversified and qualified
solutions at each iteration of the solution process, and (iii) the application of a multi-criteria decision aid method (ELECTRE
IS) to assist the selection of the final solution from a set of qualified solutions. At the final stage of the process, an
outranking relation is established among the qualified candidate solutions to address existing soft constraints or objectives.
A case study is provided to illustrate and initially evaluate the given approach. The proposed method and results are not
limited to software release planning, but can be adapted to a wider class of wicked planning problems. 相似文献
11.
Pierre Fraigniaud Cyril Gavoille David Ilcinkas Andrzej Pelc 《Distributed Computing》2009,21(6):395-403
We study the problem of the amount of information (advice) about a graph that must be given to its nodes in order to achieve
fast distributed computations. The required size of the advice enables to measure the information sensitivity of a network
problem. A problem is information sensitive if little advice is enough to solve the problem rapidly (i.e., much faster than
in the absence of any advice), whereas it is information insensitive if it requires giving a lot of information to the nodes
in order to ensure fast computation of the solution. In this paper, we study the information sensitivity of distributed graph
coloring.
A preliminary version of this paper appeared in the proceedings of the 34th International Colloquium on Automata, Languages
and Programming (ICALP), July 2007. A part of this work was done during the stay of David Ilcinkas at the Research Chair in
Distributed Computing of the Université du Québec en Outaouais, as a postdoctoral fellow.
P. Fraigniaud received additional support from the ANR project ALADDIN.
A. Pelc was supported in part by NSERC discovery grant and by the Research Chair in Distributed Computing of the Université
du Québec en Outaouais. 相似文献
12.
In this study, we are concerned with a construction of granular neural networks (GNNs)—architectures formed as a direct result reconciliation of results produced by a collection of local neural networks constructed on a basis of individual data sets. Being cognizant of the diversity of the results produced by the collection of networks, we arrive at the concept of granular neural network, producing results in the form of information granules (rather than plain numeric entities) that become reflective of the diversity of the results generated by the contributing networks. The design of a granular neural network exploits the concept of justifiable granularity. Introduced is a performance index quantifying the quality of information granules generated by the granular neural network. This study is illustrated with the aid of machine learning data sets. The experimental results provide a detailed insight into the developed granular neural networks. 相似文献
13.
14.
15.
In this paper we present HySAT, a bounded model checker for linear hybrid systems, incorporating a tight integration of a
DPLL–based pseudo–Boolean SAT solver and a linear programming routine as core engine. In contrast to related tools like MathSAT,
ICS, or CVC, our tool exploits the various optimizations that arise naturally in the bounded model checking context, e.g.isomorphic
replication of learned conflict clauses or tailored decision strategies, and extends them to the hybrid domain. We demonstrate
that those optimizations are crucial to the performance of the tool. 相似文献
16.
Contemporary design process requires the development of a new computational intelligence or soft computing methodology that involves intelligence integration and hybrid intelligent systems for design, analysis and evaluation, and optimization. This paper first presents a discussion of the need to incorporate intelligence into an automated design process and the various constraints that designers face when embarking on industrial design projects. Then, it presents the design problem as optimizing the design output against constraints and the use of soft computing and hybrid intelligent systems techniques. In this paper, a soft-computing-integrated intelligent design framework is developed. A hybrid dual cross-mapping neural network (HDCMNN) model is proposed using the hybrid soft computing technique based on cross-mapping between a back-propagation network (BPNN) and a recurrent Hopfield network (HNN) for supporting modeling, analysis and evaluation, and optimization tasks in the design process. The two networks perform different but complementary tasks—the BPNN decides if the design problem is a type 0 (rational) or type 1 (non-rational) problem, and the output layer weights are then used as the energy function for the HNN. The BPNN is used for representing design patterns, training classification boundaries, and outputting network weight values to the HNN, and then the HNN uses the calculated network weight values to evaluate and modify or re-design the design patterns. The developed system provides a unified soft-computing-integrated intelligent design framework with both symbolic and computational intelligence. The system has self-modifying and self-learning functions. Within the system, only one network training is needed for accomplishing the evaluation, rectification/modification, and optimization tasks in the design process. Finally, two case studies are provided to illustrate and validate the developed model and system. 相似文献
17.
We present a program that understands Natural Language Commands, i.e. which have a free form but a well-defined semantic content. We show that by Structural Pattern Recognition techniques, the program “learns” the vocabulary and the structure of the sentences. An example is given, “the taxi driver robot”, which is directed by Natural Language Commands. 相似文献
18.
H. -G. Hegering B. Neumair M. Gutschmidt 《Journal of Network and Systems Management》1994,2(3):283-316
New information processing service structures based on client-server concepts gain growing importance in both scientific and commercial computing because theyprovide a high flexibility with respect to the positioning of building blocks of a distributed application. The price for this flexibility, however, is a more complex system management. The paper discusses the new management requirements in a cooperative computing environment. The management platforms needed in this context must provide appropriate models for cooperation, services for supporting distributed management applications and an information model as a basis for the modeling of resources relevant to system management. The paper presents and evaluates approaches to solutions existing so far in research and development. 相似文献
19.
Soft computing continuously gains interest in many fields of academic and industrial domain; among the most notable characteristics for using soft computing methodological tools is the ability to handle with vague and imprecise data in decision making processes. Similar conditions are often encountered in requirements engineering. In this paper, we introduce the PriS approach, a security and privacy requirements engineering framework which aims at incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. The conceptual model of PriS uses a goal hierarchy structure. Every privacy requirement is either applied or not on every goal. To this end every privacy requirement is a variable that can take two values [0,1] on every goal meaning that the requirements constraints the goal (value 1) or not (value 0). Following this way of working PriS ends up suggesting a number of implementation techniques based on the privacy requirements constraining the respective goals. Taking into account that the mapping of privacy variables to a crisp set consisting of two values [0,1] is constraining, we extend also the PriS framework so as to be able to address the degree of participation of every privacy requirement towards achieving the generic goal of privacy. Therefore, we propose a fuzzification of privacy variables that maps the expression of the degree of participation of each privacy variable to the [0,1] interval. We also present a mathematical framework that allows the concurrent management of combined independent preferences towards the necessity of a privacy measure; among the advantages of the presented extended framework is the scalability of the approach in such a way that the results are not limited by the number of independent opinions or by the number of factors considered while reasoning for a specific selection of privacy measures. 相似文献
20.
A hybrid estimation of distribution algorithm for solving the resource-constrained project scheduling problem 总被引:1,自引:0,他引:1
In this paper, a hybrid estimation of distribution algorithm (HEDA) is proposed to solve the resource-constrained project scheduling problem (RCPSP). In the HEDA, the individuals are encoded based on the extended active list (EAL) and decoded by serial schedule generation scheme (SGS), and a novel probability model updating mechanism is proposed for well sampling the promising searching region. To further improve the searching quality, a Forward-Backward iteration (FBI) and a permutation based local search method (PBLS) are incorporated into the EDA based search to enhance the exploitation ability. Simulation results based on benchmarks and comparisons with some existing algorithms demonstrate the effectiveness of the proposed HEDA. 相似文献