| The last decade has seen a large interest in technologies that have as their motivation some aspect of human function. Some of these, like artificial intelligence, can be seen to be rooted in the psychological domain. Others, like neural networks, genetic algorithms, and evolutionary programming, are inspired by reconsiderations of biological processes. Common to all these so-called “intelligent technologies” is a need to represent knowledge in a manner that is both faithful to the human style of processing information as well as a form amenable to computer manipulation.
Fuzzy sets were originally introduced in 1965; the related discipline of fuzzy logic is proving itself as the most appropriate medium to accomplish this task. At one level, fuzzy logic can be viewed as a language that allows one to translate sophisticated statements from natural language into a mathematical formalism. Once we have this mathematical form of knowledge, we are able to draw upon hundreds of years of recent history in technology to manipulate this knowledge. |
|
|
Introduction to Chemical Engineering Kinetics and Reactor Design
The Second Edition features new problems that engage readers in contemporary reactor design
Highly praised by instructors, students, and chemical engineers, Introduction to Chemical Engineering Kinetics & Reactor Design has been extensively revised and updated in this Second Edition. The text... | | The Robotics Divide: A New Frontier in the 21st Century?
Societies survive in their environment and compete with each other depending on the technology they develop. Economic, military and political power are directly related to the available technology, while access to technology is key to the well-being of our societies at the individual, community and national level.
The Robotics... | | Mission-Critical Security Planner: When Hackers Won't Take No for an AnswerAll the worksheets and templates you need to create a complete customized security plan that works for your business
Let’s face it: Security is a business problem, not just a technical challenge. Whether hackers simply want to test their skills or steal your data, they can–and will–do incalculable damage to your company. You... |
|