SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Computer Engineering and Intelligent Systems                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

                Fuzzy Logic - Retrieval of Data from Database
                                        R.V.S.Lalitha M.Tech., (Ph.D)
                                                  Asst. Professor,
                           Sri Sai Aditya Institute of Science And Tech.,Surampalem.
                                         e-mail: rvslalitha@gmail.com

                                                N.Pavani (M.Tech)
                        Sri Sai Aditya Institute of Science and Technology,Surampalem.
                                            pavaninarala@gmail.com
Received: 2011-10-21
Accepted: 20 11-10-29
Published: 2011-11-04

Abstract There has been a complicated relationship associated with fuzzy logic and probability theory. All the
techniques in fuzzy logic discuss possibility theory and probability theory which measure two kinds of
uncertainty. In classical probability theory, a probability measure is a number between 0 and 1. Fuzzy rule
based system consists of a set of fuzzy rules with partially overlapping conditions. This paper demonstrates new
methodologies for predicting an output, when a particular input “triggers” with multiple fuzzy rules. This paper
analyzes the behavior of width of an interval to represent imprecision of the probability estimates. We also
propose new applications of possibility theory and probability theory as can be applied to Fuzzy logic.

Introduction: Fuzzy logic is developed by American mathematician Lotfi Zadeh. Fuzzy logic is form of multi-
valued logic derived from fuzzy set to deal with approximate values rather precise values. In real, there are only
two truth-values: “True” and “False”. The fuzzy logic introduces infinite number of truth values between
“True” and “False”. True can be represented as “1” and False by “0” and any truth value between “True” and
“False” lies in the interval 0 and 1.(eg. 0.6) are considered as approximate rather precise. Crisp logic uses binary
sets have binary logic i.e.1 for “True” and 0 for “False” to deal with precise information. In contrast with this,
fuzzy logic is not constrained to 0 and 1, but also with the degree of truth statement that can range between 0
and 1. Degree of truth is related to probability because both range between 0 and 1. The representation of
degree of membership in fuzzy set is not same as an event or a condition in probability. Fuzzy logic and
probability are different ways of expressing uncertainty. Fuzzy logic uses the concept of fuzzy set membership
(i.e. how much a variable in a fuzzy set) where as a probability uses the concept of subjective (how probable do
I think that a variable is in a set) or a condition in probability theory. A rough set, first described by
Zdzislaw.I.Pawlak, is a formal approximation of crisp set in terms of a pair of sets which give the lower and the
upper approximation of the original set. In rough set theory, he lower and upper approximation sets are crisp
sets and approximation sets that lie between lower and upper approximation sets are fuzzy sets. Defuzzification
is the process of producing a quantifiable result in fuzzy logic. Fuzzy set will have number of rules that
transform a number of variables into a resultant fuzzy set. Thus the resultant fuzzy set is the set whose elements
have degree of membership.
       In this paper, we proceed with our discussion by taking standard example dataset from data mining
techniques [1].Secondly, we discuss how to generate fuzzy sets for the data given. Thirdly, we compute
possible occurrence of few events. Fourth, we discuss about the skewness factor for decision analysis based on
error rate. Fifth, to take effective decision, we divide the data into subsets using CHAID (Chi-squared
Automatic Interaction Detector). Finally, we give membership value for each subset, to proceed to pruning.
           By observing the leaf node information, we came to know what records fall under which condition. If
  the test data set is not satisfying the leaf node information, then pruning is performed on the decision tree, to
  see that, what all nodes that do not satisfy the criterion are. Based on that, that particular branch is removed.
  This also happens either with posing wrong query, or with the complexity in the query itself, while dealing
  with large databases. So, for every query, we need to refer, what is data stored in the training data set, what is
  obtained after execution of query. Literature says, if the results are not processed properly, then pruning is
  performed based on the error rate. In this paper, pruning is performed based on the membership value.

40 | P a g e
Computer Engineering and Intelligent Systems                                                      www.iiste.org
  ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
  Vol 2, No.8, 2011

       1.Decision Tree:

                Data mining is all about automating the process of searching for patterns in the data. While dealing
       with large amount of data, users have to check, whether the results produced are same as the data stored in the
       original database. Decision tree is a classification scheme which generates a tree and a set of rules,
       representing the model of different classes, from a given data set. The set of records available for classification
       methods is generally divided into two disjoint subsets – a training set and a test set. The former is used for
       deriving the classifier, while latter is used to measure the accuracy of the classifier. The accuracy of the
       classifier is determined by the percentage of the test examples that are correctly classified. Attributes are
       divided into two different types. 1. Numerical 2 Non-numerical or Categorical. There is one distinguishable
       attribute called class label. The goal of this classification is to build a concise model that can be used to predict
       the class of the records whose class label is not known.

       We proceed with our discussion by taking standard example dataset from data mining concepts[1].
       Consider the training data set X

       Outlook             Temp               humidity        wind     class
                                                              y
       Sunny             79                   90              T        No play
       Sunny             56                   70              F        play
       Sunny             79                   75              T        play
       Sunny             60                   90              T        No play
       Overcast          88                   88              F        No play
       Overcast          63                   75              T        play
       Overcast          88                   95              F        play
       Rain              78                   60              F        play
       Rain              66                   70              F        No play
       Rain              68                   60              T        No play
       Table 1. Training Data Set X




        Decision tree representation for the dataset (Table 1) is :-



                                    Outlook


              Sunny                overcast        rainy
            Humidity                Play                       Windy
            a
  <=75              >=75                                   T               F


Play                   No Play                      No Play             Play


        Fig. 1 Decision Tree
  41 | P a g e
Computer Engineering and Intelligent Systems                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011




       From the Fig 1. we can observe that, there five leaf nodes. In decision tree, each node represents a rule.
So, the rules corresponding to the decision tree are,

Rule 1: If it is sunny and the humidity is not above 75% then play.

Rule 2: If it is sunny and the humidity is above 75%, then do not play.

Rule 3: If it is overcast, then play.

Rule 4: If it is rainy and not windy, then play.

Rule 5: If it is rainy and windy, then don’t play.

2. Fuzzy Referencing:

Now, we apply fuzzy referencing [3], to furnish the details of the dataset in Table 1.
Fuzzy sets provide mathematical meanings to the natural language statements and become an effective solution
for dealing with uncertainty. Retrieval of data using fuzzy logic membership functions is well suited to express
the intent of a database query when the semantics of the query are rather vague. In this section, we apply a few
definitions and concepts from the fuzzy set theory literature.


The attributes in the data set can be represented as objects.

     I.     Let X={x} set of objects, then
            X={“outlook”,”temp”.”humidity”,”windy”,”class”}

    II. A fuzzy set is characterized by membership function[17]. Eg. membership function for the attribute
            “outlook” is

            µoutlook:X-> [0.0,1.0]

  III.     Variables in mathematics usually take numerical values. Linguistic variables are non-numeric to
           represent data in the form of labels.
           The attribute outlook ={“Sunny”,” Overcast”,” Rainy”},which is a subset of
           Relation R.
  IV.      Similarly, attribute play={T,F}, a subset of Relation X.

3. Probability Theory and Fuzzy Logic:

The relationship between Probability theory and fuzzy logic has been, and continues to be; an object of
controversy [9].Possibility theory is a mathematical theory for dealing with certain types of uncertainty and is
an alternative to probability theory. Professor Lotfi Zadeh first introduced possibility theory in 1978 as an
extension of his theory of fuzzy sets and fuzzy logic. Possibility can be seen as an upper probability. Any
42 | P a g e
Computer Engineering and Intelligent Systems                                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

possibility distribution defines a unique set of admissible probability distributions.

 Applying the concepts of fuzzy logic and probability theory,

The probability of the attribute outlook is

           P(outlook)=       µoutlook (x)     Px(x)       where x is an element in the set “outlook”.

           If x is continuous, or

           P(outlook)=       µoutlook (xi) Pxi(xi)         if xi is discrete.

           Probability of getting humidity >75
           P(R)=0.5 obviously probability of getting humidity<=75 is 0.5
           An attribute with 0.5 membership is the critical uncertainty point.
          Probability of getting windy true is 0.5 and false is 0.5. Again, point of uncertainty is 0.5.
          Probability of getting class label play is 0.5 and getting no play is 0.5.Here also, point of uncertainty
           is 0.5.
          If A1,A2,…AK are the attributes of relation X, then decision analysis is based on,
                   µAi(xi)

4. Data skew: In probability theory and statistics, skewness is a measure of the asymmetry of the probability
distribution of a real-valued random variable. Consider the tuples that lie to the left and that of tuples that lie to
the right of the critical point. The tapering of data on both sides of critical point is not uniform. These tapering
sides are called tails. Based on this, data skew can be subdivided into two criterions. 1. Negative skew:-If the
left tail is longer, criteria will be based on right side tail, as it has few high values. 2. Positive skew: If the right
tail is longer, analysis is done based on left side few high values.

  Consider the rule 1 for the illustration of Data skew.

If outlook is sunny and humidity is not above 75 then play
           Output:


 Outlook      Temp       Humidity        Windy      Class
 Sunny        56         70              F          Play
 Sunny        79         75              T          Play
 Table 2:Tuples that do not fall under the above condition are, rule 2.



 Outloo         Temp      Humid       Wi      Class
 K                        ity         nd
                                      y
 Sunny          79        90          T       No
                                              Play

  Table 3: If it is sunny and the humidity is above 75%, then do not play.

In our example,(table 3) records that lie to the left of critical point are uniform( nearing to 75) and to that of

43 | P a g e
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

right are farther from 75. As the critical point is 75, we have to concentrate on left tail tampering rather right.So,
skewness factor is required for such analysis.

5. Applying CHAID algorithm for dividing data into subsets: For studying leaf node information, we apply
CHAID[1](Chi-squared Automatic Interaction Detector) for dividing attribute into subsets.

CHAID algorithm: -
      1.   Construct the decision tree, by partitioning the data set into two or more subsets, based on the value
           of non-class attributes.(eg. humidity).
      2.   Apply same algorithm, to further partitioning.
      3.   Each subset is partitioned without regard to any other subset.
      4.   This process is repeated for each subset until some stopping criterion is met.
Consider the dataset for humidity and class, the class labels given for play are incorrectly classified. This type of
errors can be identified in test data set.




 Humidity       class
 90             No play
 70             play
 75             play
                                Table 4:Training data set Table
 90             No play

 Humidity        class
 90              play
                                 Table 5:Test data set Table
 70              play
 75              No play
 90              No play


     By observing this, it is understood that there are some inequalities(table 4 and table 5) in either query are
labels given. Labeling is based on the attribute values. But there is confusion in query and the data in the
database. To coupe up with this, we need to opt for elaborate way of data representation in database. This helps
in answering queries in a straight forward way. As we cannot change the query, which is a user need, so, it is
advisable to change the representation in one or other way without modifying data in the database. Here is the
one solution for representation of data.

1. Label each subset

2. Give class labels based on subset labels

Step 1: Partition the humidity attribute into two subsets (A,B).The subset A contains records whose
humidity<=75 and subset B contains records whose humidity >75.

In the above training data set table 2 two records are wrongly classified in test data set table 3. We are put in
trouble to take a decision whether it is to consider as play or no play. When decision tree is constructed, if a
branch is does not satisfy the criterion, then it is simply removed for consideration. When a branch is removed,

44 | P a g e
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

there will be loss of data. To avoid this, fuzzy rough set approach helps us to decide whether to prune or not to
prune.

Step 2: Apply fuzzy rough set approach to classify which records fall under which subset(A, B)

      Rule-based systems have sharp cutoffs for continuous attributes [1].For example consider the rule 1.
Besides having straight cutoffs fuzzy set allows truth values between 0.0 and 1.0 to represent the degree of
membership that a certain value has in a given subset.

Each subset then represents a fuzzy set. Based on the membership value, we can decide, whether to discard or
not.

Let set A represents, the attribute values, that satisfy the criterion and set B represents the attributes that does
not satisfy the criterion.

A={ 60,70,75} B={88.90,95}

Compute the distances from the decision line(<=75) for the elements that are to the left, and to the right for >75.
Represent them in terms of membership value.

Now membership values for the attribute values are

MA(60)=0.05 MB(88)=0.17
MA(70)=0.25 MB(90)=0.2
MA(75)=1.0 MB(95)=0.26

             The graph 1 below represents the membership values corresponding to the attribute
  values.




                                     membership value
         1
       0.5
                                                       membership
                                                       value
         0
             0              50             100




  Graph 1.
  6.Pruning: At each node in a tree it is possible to see the number of instances that are misclassified on a
  testing set by propagating errors upwards from leaf nodes. This can be compared to the error-rate if the node
  was replaced by the most common class resulting from that node. If the difference is a reduction in error, then
45 | P a g e
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.8, 2011

  the sub tree at the node can be considered for pruning. This calculation is performed for all nodes in the tree
  and whichever one has the highest reduced-error rate is pruned. The procedure is then recurred over the
  freshly pruned tree until there is no possible reduction in error rate at any node.

     The queries, when apply on small table of data, may execute correctly. But when applied to large
  databases, may not work properly because of the following reasons.

                 1.   Complexity of the query.
                 2.   Partial satisfaction of the query
                 3.   Some tuples may not fall under the class labels given
                 4.   Inappropriate formation of the query

      While testing, before removing a branch that does not satisfy the criteria, we have to recheck the above
  mentioned reasons. If the entire above are correct, if still, it is required pruning, pruning rate at which it is to
  deleted, is decided based on the membership values.

  7. Conclusion: Membership values in Fuzzy logic takes a predominant role in the decision analysis. This
  discussion can be extended very well, whenever, there is a abnormal growth in the database, like population,
  pay revision etc.



8. References:

1. Arun K Pujari, “Data Mining Techniques”,
2. JoséGalindo “Introduction and Trends to Fuzzy Logic and Fuzzy Databases” ,University of Málaga, Spain.
3. JOHN YEN and REZA LANGARI ,“Fuzzy Logic”
4.Ramkrishnan ,Gehrke “Database Management Systems”
5.Jiawei Han and Micheline Kamber “Data mining Concepts and Techniques”
6.Andrew W Moore ,“Decision Trees”, Professor
7.“Fuzzy Classification Query Language(fcql)”
8.K.V.S.V.N.Raju A.U. and Arun K.Majumdar ,“ Fuzzy Functional Dependencies and Lossless Join
Decomposition of Fuzzy Relational Database Systems” , University of Guelph,
9.Lotfi A Zadeh,”Probability theory and Fuzzy Logic”.




46 | P a g e
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Más contenido relacionado

La actualidad más candente

Deep neural networks & computational graphs
Deep neural networks & computational graphsDeep neural networks & computational graphs
Deep neural networks & computational graphsRevanth Kumar
 
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelsJAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelshirokazutanaka
 
Lesson 23: Antiderivatives (Section 021 slides)
Lesson 23: Antiderivatives (Section 021 slides)Lesson 23: Antiderivatives (Section 021 slides)
Lesson 23: Antiderivatives (Section 021 slides)Matthew Leingang
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataeSAT Publishing House
 
Tree models with Scikit-Learn: Great models with little assumptions
Tree models with Scikit-Learn: Great models with little assumptionsTree models with Scikit-Learn: Great models with little assumptions
Tree models with Scikit-Learn: Great models with little assumptionsGilles Louppe
 
2013 11 01(fast_grbf-nmf)_for_share
2013 11 01(fast_grbf-nmf)_for_share2013 11 01(fast_grbf-nmf)_for_share
2013 11 01(fast_grbf-nmf)_for_shareTatsuya Yokota
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataeSAT Journals
 
8 chapter4 trees_bst
8 chapter4 trees_bst8 chapter4 trees_bst
8 chapter4 trees_bstSSE_AndyLi
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks Abdallah Bashir
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkHiroshi Kuwajima
 
Data mining assignment 4
Data mining assignment 4Data mining assignment 4
Data mining assignment 4BarryK88
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionNagasuri Bala Venkateswarlu
 
Understanding Random Forests: From Theory to Practice
Understanding Random Forests: From Theory to PracticeUnderstanding Random Forests: From Theory to Practice
Understanding Random Forests: From Theory to PracticeGilles Louppe
 
07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation MaximizationAndres Mendez-Vazquez
 

La actualidad más candente (20)

Deep neural networks & computational graphs
Deep neural networks & computational graphsDeep neural networks & computational graphs
Deep neural networks & computational graphs
 
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron modelsJAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
JAISTサマースクール2016「脳を知るための理論」講義01 Single neuron models
 
fuzzy logic
fuzzy logicfuzzy logic
fuzzy logic
 
Lesson 23: Antiderivatives (Section 021 slides)
Lesson 23: Antiderivatives (Section 021 slides)Lesson 23: Antiderivatives (Section 021 slides)
Lesson 23: Antiderivatives (Section 021 slides)
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical data
 
Tree models with Scikit-Learn: Great models with little assumptions
Tree models with Scikit-Learn: Great models with little assumptionsTree models with Scikit-Learn: Great models with little assumptions
Tree models with Scikit-Learn: Great models with little assumptions
 
2013 11 01(fast_grbf-nmf)_for_share
2013 11 01(fast_grbf-nmf)_for_share2013 11 01(fast_grbf-nmf)_for_share
2013 11 01(fast_grbf-nmf)_for_share
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical data
 
Disjoint sets
Disjoint setsDisjoint sets
Disjoint sets
 
8 chapter4 trees_bst
8 chapter4 trees_bst8 chapter4 trees_bst
8 chapter4 trees_bst
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks
 
Backpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural NetworkBackpropagation in Convolutional Neural Network
Backpropagation in Convolutional Neural Network
 
Nn3
Nn3Nn3
Nn3
 
lec18_ref.pdf
lec18_ref.pdflec18_ref.pdf
lec18_ref.pdf
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Data mining assignment 4
Data mining assignment 4Data mining assignment 4
Data mining assignment 4
 
Fuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introductionFuzzy mathematics:An application oriented introduction
Fuzzy mathematics:An application oriented introduction
 
Understanding Random Forests: From Theory to Practice
Understanding Random Forests: From Theory to PracticeUnderstanding Random Forests: From Theory to Practice
Understanding Random Forests: From Theory to Practice
 
07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization07 Machine Learning - Expectation Maximization
07 Machine Learning - Expectation Maximization
 
A Gentle Introduction to the EM Algorithm
A Gentle Introduction to the EM AlgorithmA Gentle Introduction to the EM Algorithm
A Gentle Introduction to the EM Algorithm
 

Destacado

Challenges of traditional markets administration in yagba communities, north ...
Challenges of traditional markets administration in yagba communities, north ...Challenges of traditional markets administration in yagba communities, north ...
Challenges of traditional markets administration in yagba communities, north ...Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Destacado (9)

Challenges of traditional markets administration in yagba communities, north ...
Challenges of traditional markets administration in yagba communities, north ...Challenges of traditional markets administration in yagba communities, north ...
Challenges of traditional markets administration in yagba communities, north ...
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Similar a Fuzzy logic method retrieves data from databases

Fuzzy logic and fuzzy time series edited
Fuzzy logic and fuzzy time series   editedFuzzy logic and fuzzy time series   edited
Fuzzy logic and fuzzy time series editedProf Dr S.M.Aqil Burney
 
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmOptimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmAshish Khetan
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Förderverein Technische Fakultät
 
Application for Logical Expression Processing
Application for Logical Expression Processing Application for Logical Expression Processing
Application for Logical Expression Processing csandit
 
Literature Review on Vague Set Theory in Different Domains
Literature Review on Vague Set Theory in Different DomainsLiterature Review on Vague Set Theory in Different Domains
Literature Review on Vague Set Theory in Different Domainsrahulmonikasharma
 
Design and analysis of ra sort
Design and analysis of ra sortDesign and analysis of ra sort
Design and analysis of ra sortijfcstjournal
 
Neural Nets Deconstructed
Neural Nets DeconstructedNeural Nets Deconstructed
Neural Nets DeconstructedPaul Sterk
 
Fuzzy Logic ppt
Fuzzy Logic pptFuzzy Logic ppt
Fuzzy Logic pptRitu Bafna
 
Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Editor IJARCET
 
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...cscpconf
 
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsAn Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsWaqas Tariq
 
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...ijaia
 
Mathematical Model of Affinity Predictive Model for Multi-Class Prediction
Mathematical Model of Affinity Predictive Model for Multi-Class PredictionMathematical Model of Affinity Predictive Model for Multi-Class Prediction
Mathematical Model of Affinity Predictive Model for Multi-Class Predictioninventionjournals
 

Similar a Fuzzy logic method retrieves data from databases (20)

A Method for Constructing Non-Isosceles Triangular Fuzzy Numbers Using Freque...
A Method for Constructing Non-Isosceles Triangular Fuzzy Numbers Using Freque...A Method for Constructing Non-Isosceles Triangular Fuzzy Numbers Using Freque...
A Method for Constructing Non-Isosceles Triangular Fuzzy Numbers Using Freque...
 
16928_5302_1.pdf
16928_5302_1.pdf16928_5302_1.pdf
16928_5302_1.pdf
 
Fuzzy logic and fuzzy time series edited
Fuzzy logic and fuzzy time series   editedFuzzy logic and fuzzy time series   edited
Fuzzy logic and fuzzy time series edited
 
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmOptimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
 
Application for Logical Expression Processing
Application for Logical Expression Processing Application for Logical Expression Processing
Application for Logical Expression Processing
 
Literature Review on Vague Set Theory in Different Domains
Literature Review on Vague Set Theory in Different DomainsLiterature Review on Vague Set Theory in Different Domains
Literature Review on Vague Set Theory in Different Domains
 
Design and analysis of ra sort
Design and analysis of ra sortDesign and analysis of ra sort
Design and analysis of ra sort
 
Neural Nets Deconstructed
Neural Nets DeconstructedNeural Nets Deconstructed
Neural Nets Deconstructed
 
Fuzzy Logic ppt
Fuzzy Logic pptFuzzy Logic ppt
Fuzzy Logic ppt
 
Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582
 
Lesson 26
Lesson 26Lesson 26
Lesson 26
 
AI Lesson 26
AI Lesson 26AI Lesson 26
AI Lesson 26
 
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
Economic Load Dispatch (ELD), Economic Emission Dispatch (EED), Combined Econ...
 
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsAn Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
 
Lec12
Lec12Lec12
Lec12
 
Fuzzy logic1
Fuzzy logic1Fuzzy logic1
Fuzzy logic1
 
Haoying1999
Haoying1999Haoying1999
Haoying1999
 
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...
A NEW PERSPECTIVE OF PARAMODULATION COMPLEXITY BY SOLVING 100 SLIDING BLOCK P...
 
Mathematical Model of Affinity Predictive Model for Multi-Class Prediction
Mathematical Model of Affinity Predictive Model for Multi-Class PredictionMathematical Model of Affinity Predictive Model for Multi-Class Prediction
Mathematical Model of Affinity Predictive Model for Multi-Class Prediction
 

Más de Alexander Decker

A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceAlexander Decker
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions ofAlexander Decker
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenAlexander Decker
 

Más de Alexander Decker (20)

A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among science
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions of
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal women
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Fuzzy logic method retrieves data from databases

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 Fuzzy Logic - Retrieval of Data from Database R.V.S.Lalitha M.Tech., (Ph.D) Asst. Professor, Sri Sai Aditya Institute of Science And Tech.,Surampalem. e-mail: rvslalitha@gmail.com N.Pavani (M.Tech) Sri Sai Aditya Institute of Science and Technology,Surampalem. pavaninarala@gmail.com Received: 2011-10-21 Accepted: 20 11-10-29 Published: 2011-11-04 Abstract There has been a complicated relationship associated with fuzzy logic and probability theory. All the techniques in fuzzy logic discuss possibility theory and probability theory which measure two kinds of uncertainty. In classical probability theory, a probability measure is a number between 0 and 1. Fuzzy rule based system consists of a set of fuzzy rules with partially overlapping conditions. This paper demonstrates new methodologies for predicting an output, when a particular input “triggers” with multiple fuzzy rules. This paper analyzes the behavior of width of an interval to represent imprecision of the probability estimates. We also propose new applications of possibility theory and probability theory as can be applied to Fuzzy logic. Introduction: Fuzzy logic is developed by American mathematician Lotfi Zadeh. Fuzzy logic is form of multi- valued logic derived from fuzzy set to deal with approximate values rather precise values. In real, there are only two truth-values: “True” and “False”. The fuzzy logic introduces infinite number of truth values between “True” and “False”. True can be represented as “1” and False by “0” and any truth value between “True” and “False” lies in the interval 0 and 1.(eg. 0.6) are considered as approximate rather precise. Crisp logic uses binary sets have binary logic i.e.1 for “True” and 0 for “False” to deal with precise information. In contrast with this, fuzzy logic is not constrained to 0 and 1, but also with the degree of truth statement that can range between 0 and 1. Degree of truth is related to probability because both range between 0 and 1. The representation of degree of membership in fuzzy set is not same as an event or a condition in probability. Fuzzy logic and probability are different ways of expressing uncertainty. Fuzzy logic uses the concept of fuzzy set membership (i.e. how much a variable in a fuzzy set) where as a probability uses the concept of subjective (how probable do I think that a variable is in a set) or a condition in probability theory. A rough set, first described by Zdzislaw.I.Pawlak, is a formal approximation of crisp set in terms of a pair of sets which give the lower and the upper approximation of the original set. In rough set theory, he lower and upper approximation sets are crisp sets and approximation sets that lie between lower and upper approximation sets are fuzzy sets. Defuzzification is the process of producing a quantifiable result in fuzzy logic. Fuzzy set will have number of rules that transform a number of variables into a resultant fuzzy set. Thus the resultant fuzzy set is the set whose elements have degree of membership. In this paper, we proceed with our discussion by taking standard example dataset from data mining techniques [1].Secondly, we discuss how to generate fuzzy sets for the data given. Thirdly, we compute possible occurrence of few events. Fourth, we discuss about the skewness factor for decision analysis based on error rate. Fifth, to take effective decision, we divide the data into subsets using CHAID (Chi-squared Automatic Interaction Detector). Finally, we give membership value for each subset, to proceed to pruning. By observing the leaf node information, we came to know what records fall under which condition. If the test data set is not satisfying the leaf node information, then pruning is performed on the decision tree, to see that, what all nodes that do not satisfy the criterion are. Based on that, that particular branch is removed. This also happens either with posing wrong query, or with the complexity in the query itself, while dealing with large databases. So, for every query, we need to refer, what is data stored in the training data set, what is obtained after execution of query. Literature says, if the results are not processed properly, then pruning is performed based on the error rate. In this paper, pruning is performed based on the membership value. 40 | P a g e
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 1.Decision Tree: Data mining is all about automating the process of searching for patterns in the data. While dealing with large amount of data, users have to check, whether the results produced are same as the data stored in the original database. Decision tree is a classification scheme which generates a tree and a set of rules, representing the model of different classes, from a given data set. The set of records available for classification methods is generally divided into two disjoint subsets – a training set and a test set. The former is used for deriving the classifier, while latter is used to measure the accuracy of the classifier. The accuracy of the classifier is determined by the percentage of the test examples that are correctly classified. Attributes are divided into two different types. 1. Numerical 2 Non-numerical or Categorical. There is one distinguishable attribute called class label. The goal of this classification is to build a concise model that can be used to predict the class of the records whose class label is not known. We proceed with our discussion by taking standard example dataset from data mining concepts[1]. Consider the training data set X Outlook Temp humidity wind class y Sunny 79 90 T No play Sunny 56 70 F play Sunny 79 75 T play Sunny 60 90 T No play Overcast 88 88 F No play Overcast 63 75 T play Overcast 88 95 F play Rain 78 60 F play Rain 66 70 F No play Rain 68 60 T No play Table 1. Training Data Set X Decision tree representation for the dataset (Table 1) is :- Outlook Sunny overcast rainy Humidity Play Windy a <=75 >=75 T F Play No Play No Play Play Fig. 1 Decision Tree 41 | P a g e
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 From the Fig 1. we can observe that, there five leaf nodes. In decision tree, each node represents a rule. So, the rules corresponding to the decision tree are, Rule 1: If it is sunny and the humidity is not above 75% then play. Rule 2: If it is sunny and the humidity is above 75%, then do not play. Rule 3: If it is overcast, then play. Rule 4: If it is rainy and not windy, then play. Rule 5: If it is rainy and windy, then don’t play. 2. Fuzzy Referencing: Now, we apply fuzzy referencing [3], to furnish the details of the dataset in Table 1. Fuzzy sets provide mathematical meanings to the natural language statements and become an effective solution for dealing with uncertainty. Retrieval of data using fuzzy logic membership functions is well suited to express the intent of a database query when the semantics of the query are rather vague. In this section, we apply a few definitions and concepts from the fuzzy set theory literature. The attributes in the data set can be represented as objects. I. Let X={x} set of objects, then X={“outlook”,”temp”.”humidity”,”windy”,”class”} II. A fuzzy set is characterized by membership function[17]. Eg. membership function for the attribute “outlook” is µoutlook:X-> [0.0,1.0] III. Variables in mathematics usually take numerical values. Linguistic variables are non-numeric to represent data in the form of labels. The attribute outlook ={“Sunny”,” Overcast”,” Rainy”},which is a subset of Relation R. IV. Similarly, attribute play={T,F}, a subset of Relation X. 3. Probability Theory and Fuzzy Logic: The relationship between Probability theory and fuzzy logic has been, and continues to be; an object of controversy [9].Possibility theory is a mathematical theory for dealing with certain types of uncertainty and is an alternative to probability theory. Professor Lotfi Zadeh first introduced possibility theory in 1978 as an extension of his theory of fuzzy sets and fuzzy logic. Possibility can be seen as an upper probability. Any 42 | P a g e
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 possibility distribution defines a unique set of admissible probability distributions. Applying the concepts of fuzzy logic and probability theory, The probability of the attribute outlook is P(outlook)= µoutlook (x) Px(x) where x is an element in the set “outlook”. If x is continuous, or P(outlook)= µoutlook (xi) Pxi(xi) if xi is discrete. Probability of getting humidity >75 P(R)=0.5 obviously probability of getting humidity<=75 is 0.5 An attribute with 0.5 membership is the critical uncertainty point. Probability of getting windy true is 0.5 and false is 0.5. Again, point of uncertainty is 0.5. Probability of getting class label play is 0.5 and getting no play is 0.5.Here also, point of uncertainty is 0.5. If A1,A2,…AK are the attributes of relation X, then decision analysis is based on, µAi(xi) 4. Data skew: In probability theory and statistics, skewness is a measure of the asymmetry of the probability distribution of a real-valued random variable. Consider the tuples that lie to the left and that of tuples that lie to the right of the critical point. The tapering of data on both sides of critical point is not uniform. These tapering sides are called tails. Based on this, data skew can be subdivided into two criterions. 1. Negative skew:-If the left tail is longer, criteria will be based on right side tail, as it has few high values. 2. Positive skew: If the right tail is longer, analysis is done based on left side few high values. Consider the rule 1 for the illustration of Data skew. If outlook is sunny and humidity is not above 75 then play Output: Outlook Temp Humidity Windy Class Sunny 56 70 F Play Sunny 79 75 T Play Table 2:Tuples that do not fall under the above condition are, rule 2. Outloo Temp Humid Wi Class K ity nd y Sunny 79 90 T No Play Table 3: If it is sunny and the humidity is above 75%, then do not play. In our example,(table 3) records that lie to the left of critical point are uniform( nearing to 75) and to that of 43 | P a g e
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 right are farther from 75. As the critical point is 75, we have to concentrate on left tail tampering rather right.So, skewness factor is required for such analysis. 5. Applying CHAID algorithm for dividing data into subsets: For studying leaf node information, we apply CHAID[1](Chi-squared Automatic Interaction Detector) for dividing attribute into subsets. CHAID algorithm: - 1. Construct the decision tree, by partitioning the data set into two or more subsets, based on the value of non-class attributes.(eg. humidity). 2. Apply same algorithm, to further partitioning. 3. Each subset is partitioned without regard to any other subset. 4. This process is repeated for each subset until some stopping criterion is met. Consider the dataset for humidity and class, the class labels given for play are incorrectly classified. This type of errors can be identified in test data set. Humidity class 90 No play 70 play 75 play Table 4:Training data set Table 90 No play Humidity class 90 play Table 5:Test data set Table 70 play 75 No play 90 No play By observing this, it is understood that there are some inequalities(table 4 and table 5) in either query are labels given. Labeling is based on the attribute values. But there is confusion in query and the data in the database. To coupe up with this, we need to opt for elaborate way of data representation in database. This helps in answering queries in a straight forward way. As we cannot change the query, which is a user need, so, it is advisable to change the representation in one or other way without modifying data in the database. Here is the one solution for representation of data. 1. Label each subset 2. Give class labels based on subset labels Step 1: Partition the humidity attribute into two subsets (A,B).The subset A contains records whose humidity<=75 and subset B contains records whose humidity >75. In the above training data set table 2 two records are wrongly classified in test data set table 3. We are put in trouble to take a decision whether it is to consider as play or no play. When decision tree is constructed, if a branch is does not satisfy the criterion, then it is simply removed for consideration. When a branch is removed, 44 | P a g e
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 there will be loss of data. To avoid this, fuzzy rough set approach helps us to decide whether to prune or not to prune. Step 2: Apply fuzzy rough set approach to classify which records fall under which subset(A, B) Rule-based systems have sharp cutoffs for continuous attributes [1].For example consider the rule 1. Besides having straight cutoffs fuzzy set allows truth values between 0.0 and 1.0 to represent the degree of membership that a certain value has in a given subset. Each subset then represents a fuzzy set. Based on the membership value, we can decide, whether to discard or not. Let set A represents, the attribute values, that satisfy the criterion and set B represents the attributes that does not satisfy the criterion. A={ 60,70,75} B={88.90,95} Compute the distances from the decision line(<=75) for the elements that are to the left, and to the right for >75. Represent them in terms of membership value. Now membership values for the attribute values are MA(60)=0.05 MB(88)=0.17 MA(70)=0.25 MB(90)=0.2 MA(75)=1.0 MB(95)=0.26 The graph 1 below represents the membership values corresponding to the attribute values. membership value 1 0.5 membership value 0 0 50 100 Graph 1. 6.Pruning: At each node in a tree it is possible to see the number of instances that are misclassified on a testing set by propagating errors upwards from leaf nodes. This can be compared to the error-rate if the node was replaced by the most common class resulting from that node. If the difference is a reduction in error, then 45 | P a g e
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.8, 2011 the sub tree at the node can be considered for pruning. This calculation is performed for all nodes in the tree and whichever one has the highest reduced-error rate is pruned. The procedure is then recurred over the freshly pruned tree until there is no possible reduction in error rate at any node. The queries, when apply on small table of data, may execute correctly. But when applied to large databases, may not work properly because of the following reasons. 1. Complexity of the query. 2. Partial satisfaction of the query 3. Some tuples may not fall under the class labels given 4. Inappropriate formation of the query While testing, before removing a branch that does not satisfy the criteria, we have to recheck the above mentioned reasons. If the entire above are correct, if still, it is required pruning, pruning rate at which it is to deleted, is decided based on the membership values. 7. Conclusion: Membership values in Fuzzy logic takes a predominant role in the decision analysis. This discussion can be extended very well, whenever, there is a abnormal growth in the database, like population, pay revision etc. 8. References: 1. Arun K Pujari, “Data Mining Techniques”, 2. JoséGalindo “Introduction and Trends to Fuzzy Logic and Fuzzy Databases” ,University of Málaga, Spain. 3. JOHN YEN and REZA LANGARI ,“Fuzzy Logic” 4.Ramkrishnan ,Gehrke “Database Management Systems” 5.Jiawei Han and Micheline Kamber “Data mining Concepts and Techniques” 6.Andrew W Moore ,“Decision Trees”, Professor 7.“Fuzzy Classification Query Language(fcql)” 8.K.V.S.V.N.Raju A.U. and Arun K.Majumdar ,“ Fuzzy Functional Dependencies and Lossless Join Decomposition of Fuzzy Relational Database Systems” , University of Guelph, 9.Lotfi A Zadeh,”Probability theory and Fuzzy Logic”. 46 | P a g e
  • 8. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).