SlideShare a Scribd company logo
1 of 15
Fuzzy LogicFuzzy Logic
1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
Introduction
 Form of multivalued logic
 Deals reasoning that is approximate rather
than precise
 the fuzzy logic variables may have
a membership value of not only 0 or 1 –
that is, the degree of truth of
a statement can range between 0 and 1 and
is not constrained to the two truth values of
classic propositional logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
Introduction
 Fuzzy logic has been applied to many fields,
from control theory to artificial intelligence
 it still remains controversial among
most statisticians, who prefer Bayesian
logic, and
 some control engineers, who prefer
traditional two-valued logic.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
Degrees of truth
 let a 100 ml glass contain 30 ml of water.
 Then we may consider two concepts: Empty
and Full.
 The meaning of each of them can be
represented by a certain fuzzy set.
 Then one might define the glass as being
0.7 empty and 0.3 full.
 The concept of emptiness would
be subjective and thus would depend on
the observer or designer.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
An image that describe fuzzy
logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
An image that describe fuzzy
logic
 A point on that scale has three "truth
values" — one for each of the three
functions.
 Since the red arrow points to zero, this
temperature may be interpreted as "not
hot".
 The orange arrow (pointing at 0.2) may
describe it as "slightly warm" and
 the blue arrow (pointing at 0.8) "fairly cold".
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
Fuzzy Rules
 fuzzy logic usually uses IF-THEN rules
 Rules are usually expressed in the form:
IF variable IS property THEN action
 For example, a simple temperature
regulator that uses a fan might look like
this:
IF temperature IS very cold THEN stop fan
IF temperature IS cold THEN turn down fan
IF temperature IS normal THEN maintain level
IF temperature IS hot THEN speed up fan
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
Fuzzy Rules
 There is no "ELSE" – all of the rules are
evaluated, because the temperature might
be "cold" and "normal" at the same time to
different degrees.
 The AND, OR, and
NOT operators of boolean logic exist in
fuzzy logic, usually defined as the minimum,
maximum, and complement
 when they are defined this way, they are
called the Zadeh operators
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
Zadeh Operators
 NOT x = (1 - truth(x))
 x AND y = minimum(truth(x), truth(y))
 x OR y = maximum(truth(x), truth(y))
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
Hedges
 There are also other operators, more
linguistic in nature, called hedges that can
be applied.
 These are generally adverbs such as "very",
or "somewhat"
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
Fuzzy Logic Applications
 Air conditioning
 Washing Machines (LG is the pioneer)
 Mono-rails (first used in Tokyo)
 Digital image processing (specially in medical imaging)
 Elevators (in case of power failure)
 Rice cookers
 Video game engines (disperse intelligence in prince of
Persia)
 Special effects (swarm intelligence in Batman Begins,
Terminator Salvation, The Lord of the Rings)
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
Objections against Fuzzy Logic
 The concept of "coldness" cannot be
expressed in an equation, because although
temperature is a quantity, "coldness" is not
 people have an idea of what "cold" is, and
agree that there is no sharp cutoff between
"cold" and "not cold"
 where something is "cold" at N degrees but
"not cold" at N+1 degrees — a concept
classical logic cannot easily handle
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
Objections against Fuzzy Logic
 The result has no set answer so it is
believed to be a 'fuzzy' answer.
 Fuzzy logic simply provides a mathematical
model of the vagueness which is manifested
in the above example.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
A new way to represent
probabilistic logic?
 fuzzy set theory uses the concept of fuzzy
set membership (i.e., how much a variable
is in a set)
 probability theory uses the concept
of subjective probability (i.e., how
probable do I think that a variable is in a
set).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
Reference
 Wikipedia, “Fuzzy Logic”,
http://en.wikipedia.org/wiki/Fuzzy_logic
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15

More Related Content

Viewers also liked

Knowledge representation
Knowledge representationKnowledge representation
Knowledge representationRushdi Shams
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineeringRushdi Shams
 
Lecture 5, 6 and 7 cpu scheduling
Lecture 5, 6 and 7  cpu schedulingLecture 5, 6 and 7  cpu scheduling
Lecture 5, 6 and 7 cpu schedulingRushdi Shams
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating SystemsRushdi Shams
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structureRushdi Shams
 
Propositional logic
Propositional logicPropositional logic
Propositional logicRushdi Shams
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Rushdi Shams
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semanticsRushdi Shams
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentationMohsan Ijaz
 

Viewers also liked (11)

Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineering
 
Lecture 5, 6 and 7 cpu scheduling
Lecture 5, 6 and 7  cpu schedulingLecture 5, 6 and 7  cpu scheduling
Lecture 5, 6 and 7 cpu scheduling
 
L1 phishing
L1  phishingL1  phishing
L1 phishing
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
 
Weka
WekaWeka
Weka
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
 

Similar to L15 fuzzy logic

fuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptxfuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptxssuser92d367
 
Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01shwetaanu
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Universitas Pembangunan Panca Budi
 

Similar to L15 fuzzy logic (7)

fuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptxfuzzylogic-120105083314-phpapp01.pptx
fuzzylogic-120105083314-phpapp01.pptx
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01Fuzzy logic-120419044344-phpapp01
Fuzzy logic-120419044344-phpapp01
 
Fuzzy logic ppt
Fuzzy logic pptFuzzy logic ppt
Fuzzy logic ppt
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 

More from Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchRushdi Shams
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IRRushdi Shams
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101Rushdi Shams
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hackingRushdi Shams
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process modelsRushdi Shams
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systemsRushdi Shams
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocksRushdi Shams
 
Lecture 1 and 2 processes
Lecture 1 and 2  processesLecture 1 and 2  processes
Lecture 1 and 2 processesRushdi Shams
 
Lecture 3 and 4 threads
Lecture 3 and 4  threadsLecture 3 and 4  threads
Lecture 3 and 4 threadsRushdi Shams
 
My slide relational algebra
My slide  relational algebraMy slide  relational algebra
My slide relational algebraRushdi Shams
 

More from Rushdi Shams (14)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
 
First order logic
First order logicFirst order logic
First order logic
 
Belief function
Belief functionBelief function
Belief function
 
L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
 
L3 defense
L3  defenseL3  defense
L3 defense
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process models
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systems
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocks
 
Lecture 1 and 2 processes
Lecture 1 and 2  processesLecture 1 and 2  processes
Lecture 1 and 2 processes
 
Lecture 3 and 4 threads
Lecture 3 and 4  threadsLecture 3 and 4  threads
Lecture 3 and 4 threads
 
My slide relational algebra
My slide  relational algebraMy slide  relational algebra
My slide relational algebra
 

Recently uploaded

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

L15 fuzzy logic

  • 1. Fuzzy LogicFuzzy Logic 1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 2. Introduction  Form of multivalued logic  Deals reasoning that is approximate rather than precise  the fuzzy logic variables may have a membership value of not only 0 or 1 – that is, the degree of truth of a statement can range between 0 and 1 and is not constrained to the two truth values of classic propositional logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
  • 3. Introduction  Fuzzy logic has been applied to many fields, from control theory to artificial intelligence  it still remains controversial among most statisticians, who prefer Bayesian logic, and  some control engineers, who prefer traditional two-valued logic. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
  • 4. Degrees of truth  let a 100 ml glass contain 30 ml of water.  Then we may consider two concepts: Empty and Full.  The meaning of each of them can be represented by a certain fuzzy set.  Then one might define the glass as being 0.7 empty and 0.3 full.  The concept of emptiness would be subjective and thus would depend on the observer or designer. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
  • 5. An image that describe fuzzy logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
  • 6. An image that describe fuzzy logic  A point on that scale has three "truth values" — one for each of the three functions.  Since the red arrow points to zero, this temperature may be interpreted as "not hot".  The orange arrow (pointing at 0.2) may describe it as "slightly warm" and  the blue arrow (pointing at 0.8) "fairly cold". Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7. Fuzzy Rules  fuzzy logic usually uses IF-THEN rules  Rules are usually expressed in the form: IF variable IS property THEN action  For example, a simple temperature regulator that uses a fan might look like this: IF temperature IS very cold THEN stop fan IF temperature IS cold THEN turn down fan IF temperature IS normal THEN maintain level IF temperature IS hot THEN speed up fan Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8. Fuzzy Rules  There is no "ELSE" – all of the rules are evaluated, because the temperature might be "cold" and "normal" at the same time to different degrees.  The AND, OR, and NOT operators of boolean logic exist in fuzzy logic, usually defined as the minimum, maximum, and complement  when they are defined this way, they are called the Zadeh operators Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
  • 9. Zadeh Operators  NOT x = (1 - truth(x))  x AND y = minimum(truth(x), truth(y))  x OR y = maximum(truth(x), truth(y)) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
  • 10. Hedges  There are also other operators, more linguistic in nature, called hedges that can be applied.  These are generally adverbs such as "very", or "somewhat" Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
  • 11. Fuzzy Logic Applications  Air conditioning  Washing Machines (LG is the pioneer)  Mono-rails (first used in Tokyo)  Digital image processing (specially in medical imaging)  Elevators (in case of power failure)  Rice cookers  Video game engines (disperse intelligence in prince of Persia)  Special effects (swarm intelligence in Batman Begins, Terminator Salvation, The Lord of the Rings) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
  • 12. Objections against Fuzzy Logic  The concept of "coldness" cannot be expressed in an equation, because although temperature is a quantity, "coldness" is not  people have an idea of what "cold" is, and agree that there is no sharp cutoff between "cold" and "not cold"  where something is "cold" at N degrees but "not cold" at N+1 degrees — a concept classical logic cannot easily handle Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13. Objections against Fuzzy Logic  The result has no set answer so it is believed to be a 'fuzzy' answer.  Fuzzy logic simply provides a mathematical model of the vagueness which is manifested in the above example. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
  • 14. A new way to represent probabilistic logic?  fuzzy set theory uses the concept of fuzzy set membership (i.e., how much a variable is in a set)  probability theory uses the concept of subjective probability (i.e., how probable do I think that a variable is in a set). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
  • 15. Reference  Wikipedia, “Fuzzy Logic”, http://en.wikipedia.org/wiki/Fuzzy_logic Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15