SlideShare uma empresa Scribd logo
1 de 12
Optimization of Fuzzy BEXA using Nelder Mead Search Algorithm By:  Ashish Khetan (a.khetan@iitg.ernet.in ) Bachelor of Technology, Department of Mechanical Engineering,  Indian Institute of Technology Guwahati, India    Under the guidance of:  Prof Dr. Ian Cloete, President IU in Germany, Germany  Date: 21.07.2008 INTRODUCTION Fuzzy BEXA is a machine learning algorithm, which through some iterative process classifies a given data set and then generates rules for a given class attribute. The core algorithm of Fuzzy BEXA runs over a fuzzy attribute relation file format (farff) but it also incorporates an algorithm which is able to convert a given attribute relation file format (arff) into farff. While it converts arff into farff it uses some parameters, values of which are based on expert’s knowledge. While it generates rules using some iterative process again it uses some expert knowledge based parameters like α cut for attributes and class attribute.  One of the criteria to estimate the performance of Fuzzy BEXA is the percentage accuracy of instances classification from the rules generated. The percentage accuracy as an objective function depends upon these expert knowledge based parameters.  Nelder Mead search algorithm can be used for finding the optimum values of these parameters for which the value of objective function is maximum. The algorithm does not use the use of concept of derivative to find the maximum/minimum. This property of algorithm makes it suitable for the optimization of parameters in Fuzzy BEXA to obtain the maximum percentage accuracy of classification.    Literature review As a part of literature review, some of the basic concepts of fuzzy set theory, arff and farff, are explained with the help of “fuzzy set covering as a new paradigm for the induction of fuzzy classification rules”, Jacobus van Zyl. A brief description of Nelder Mead search algorithm is also provided. Basic Fuzzy Set Theory  Let U be a given universal set. Generally, a set A, A ∈ U, is defined using one of three methods: listing each element in the set, e.g. A = {a, b, c}, using a proposition to describe a property that must be satisfied by all the members of the set, e.g. A = {x|x ∈ Z, 0 < x < 10}, or using a function, usually called the characteristic function, that declares which elements are members of the set, μA (u) =   1, for u ∈ A            =    0, for u not belonging to A where u ∈ U. Fuzzy sets are a generalization of crisp sets, and are defined using the functional method, where the characteristic function is defined as μA (u) : U → [0, 1]  The degree to which an element u, u ∈ U, belongs to the fuzzy set A is described in terms of the membership function μA (u). This degree of membership expresses the certainty or ambiguity that u belongs to A, with μA (u) = 1 meaning absolute certainty that u ∈ A, and μA (u) = 0 absolute certainty that u does not belong to A. Crisp sets are special cases of fuzzy sets, since for a crisp set, μA  (u) : U → {0, 1}, i.e. the membership function is either 1 or 0, and elements can either belong to a set or not with absolute certainty.  Membership Function Attributes are usually of two types:  Nominal: which takes a finite set of unordered values (e.g. attribute outlook takes the values sunny, cloudy, and rainy).  Real: which take values from a linearly ordered range (e.g. temperature). For real attributes the fuzzy membership function maps the linear domain to membership degrees on the scale [0, 1]. The figure below shows how temperature values are mapped onto membership degrees for the term set of temp, defining the membership functions μcold, μmild and μhot.                   Linguistic variables with an unordered input domain, for example outlook (sunny, cloudy, rainy) have no associated mapping from a linear domain to membership degrees. In this case the membership function just describes the ambiguity that an instance belongs to a certain term. Attribute relation file format When the data set is in the crisp format, it can be written in attribute relation file format (arff). It can be well understood using an example crisp data set. Table 1: A crisp data set (arff)   @relation sport @attribute outlook {sunny, cloudy, rainy} @attribute temp real @attribute humidity {humid, normal} @attribute wind real @attribute activity {volleyball, swimming, weights} @data sunny, 30, humid, 26, swimming ;1 sunny, 26,normal, 5, volleyball ;2 cloudy, 28, normal, 12, swimming ;3 cloudy, 23, normal, 14, volleyball ;4 rainy, 28, normal, 20,weights ;5 cloudy, 13, humid, 24, weights ;6 rainy, 10, normal, 10, weights ;7 cloudy, 12, normal, 14, volleyball ;8 sunny, 33, humid, 22, swimming ;9 sunny, 13, normal, 33, weights ;10 sunny, 31, humid, 0, swimming ;11 An example of a Vl1 (Variable Valued logic system 1) concept description: IF antecedent THEN consequent:  ([outlook = sunny ∨ cloudy] ∧ [temp = 13]) ∨ ([humidity = normal] ∧ [temp = 28]) →  weights ∧: Symbol of conjunction; two expressions must be true simultaneously.    ∨: Symbol of disjunction; either of the two expressions must be true.  A set of values of each attributes is called an instance. Instances classified correctly under a given rule are called positive instances otherwise negative. When concept descriptions for a particular class attribute, suppose weights, are written all together it forms the rule for that particular class attribute.      Fuzzy attribute relation file format When the same (Table 1) kind of data is in fuzzy format it can be written in fuzzy attribute relation file format. It can be well understood using an example data set.  Table 2: A fuzzy data set (farff) @relation sport @attribute outlook {sunny, cloudy, rainy} @attribute temp {hot, mild, cold} @attribute humidity {humid, normal} @attribute wind {windy, calm} @attribute activity {volleyball, swimming, weights} @data (.9 .1 .0), (1. .0 .0), (.8 .2), (.4 .6), (.0 .8 .2) ;1 (.8 .2 .0), (.6 .4 .0), (.0 1.), (.4 .6), (1. .7 .2) ;2 (.0 .7 .3), (.8 .2 .0), (.1 .9), (.2 .8), (.3 .6 .1) ;3 (.2 .7 .1), (.3 .7 .0), (.2 .8), (.3 .7), (.9 .1 .0) ;4 (.0 .1 .9), (.7 .3 .0), (.5 .5), (.5 .5), (.0 .0 1.) ;5 (.0 .7 .3), (.0 .3 .7), (.7 .3), (.4 .6), (.2 .0 .8) ;6 (.0 .3 .7), (.0 .0 1.), (.0 1.), (.1 .9), (.0 .0 1.) ;7 (.0 1. .0), (.0 .2 .8), (.2 .8), (.0 1.), (.7 .0 .3) ;8 (1. .0 .0), (1. .0 .0), (.6 .4), (.7 .3), (.2 .8 .0) ;9 (.9 .1 .0), (.0 .3 .7), (.0 1.), (.9 .1), (.0 .3 .7) ;10 (.7 .3 .0), (1. .0 .0), (1. .0), (.2 .8), (.4 .7 .0) ;11 (.2 .6 .2), (.0 1. .0), (.3 .7), (.3 .7), (.7 .2 .1) ;12 (.9 .1 .0), (.2 .8 .0), (.1 .9), (1. .0), (.0 .0 1.) ;13 (.0 .9 .1), (.0 .9 .1), (.1 .9), (.7 .3), (.0 .0 1.) ;14 (.0 .0 1.), (.0 .0 1.), (1. .0), (.8 .2), (.0 .0 1.) ;15 (1. .0 .0), (.5 .5 .0), (.0 1.), (.0 1.), (.8 .6 .0) ;16 Rules generated by Fuzzy BEXA over farff data set are of the same format “IF antecedent THEN consequent” where the antecedent is a conjunction in Fuzzy AL, and the concept is a linguistic term from the set of class variables.  For example consider the rule  IF [sunny, cloudy][mild]@0.7 THEN weights@0.8  The number following the antecedent is the value of αa, the antecedent threshold, and the number following the consequent is the value of αc, the concept threshold. The threshold values decide whether the membership of that particular attribute is true or not. Let us take an example to understand αa and αc..  Let the concept be activity.volleyball and the conjunction c = [sunny][normal]. Let αc = αa = 0.8, then XT(c) (training set which depends upon αa ) = {2, 10, 13, 16}, P (positive instances which depends upon αc)  = {2, 4, 16}, XP (c) (positive instances out of training set which satisfies both αc and αa)= {2, 16}, N = T − P, and XN(c) = XT (c) – XP (c) = {10, 13}, where we list the instances by their instance numbers in the table. Nelder Mead search algorithm  It is a numerical method for minimizing an objective function in a multi dimensional space. In other words, the algorithm gives the optimum value of parameters involved in a system while minimizing or maximizing the objective function. The most important property of the algorithm is that it does not use the concept of derivative while most other algorithms of this class do use the concept.  To find the set of optimum values of the parameters, the algorithm starts with a set of random initial values and generates an initial simplex of certain size with N+1points in an N dimensional space to optimize the N parameters for a given objective function. The algorithm converges with the simplex becoming smaller and smaller while approaching towards the optimum point.  The algorithm works iteratively while the initial simplex changes its shape and size and moves towards the optimum point. At each step of iteration, it sorts vertices of simplex in order of the value of the objective function at that point. Then it replaces the worst point with a point reflected through the centroid of the remaining N points. If this point is better than the best current point, then it tries to stretch out/in along this line. If this new point is not much better than the previous point, then it is steeping across a valley, so it shrinks the simplex towards the best point. Sometimes it gets stuck in a rut, and then the algorithm restarts from the new initial random point. The algorithm can only find the local minimum depending upon the position and size of the initial simplex with which it starts.  Approach While the Fuzzy BEXA generates rules from a given data set for a particular class attribute, it uses some of the expert knowledge based parameters. Whenever there are some expert knowledge based parameters in a system, upon which the performance of the system depends, Nelder Mead search algorithm can always be used to optimize the values of parameters to obtain the best performance.   In my studies I found that there are mainly two places in the Fuzzy BEXA where the expert knowledge based parameters come into picture. First, when the arff file is converted into farff and the second when it presumes some value for the threshold cut parameters αa (for attributes) and αc (for class attribute). While the Fuzzy BEXA converts arff file into farff, first using expert’s knowledge it decides how many linguistic variables should be created for each real valued attribute. The number of linguistic variables for each real valued attribute is the first parameter which can be optimized. In the Fuzzy BEXA it is usually taken as three or five depending upon the range of data and apparent number of clusters in the data, values of the attribute across all the instances.  Then it comes to the second stage when the shape of the membership function is decided using expert’s knowledge. It can be a continuously smooth function or a piecewise linear function. The membership function can be different for different attributes. Fuzzy BEXA takes a piecewise linear bell shape function for all the real valued attributes. The shape of the membership function is a parameter with discrete values which can be optimized at the second stage.    A piecewise linear bell shape function approximation. Referring to the above figure the points of discontinuity in the piecewise linear bell shape function used in the Fuzzy BEXA are the parameters at the third stage which can also be optimized.  The algorithm used in the Fuzzy BEXA for the generation of membership function Referring to the algorithm above, the values 0.25 and 0.125, decide the point of discontinuity on the horizontal axis and the value 0.8 decides the same on the vertical axis for the membership function. These three values are three parameters which can also be optimized.   Any change in the value of parameters at the above mentioned three stages, causes changes in the definition of membership function for the attribute and hence the farff file generated from the arff file is changed. It ultimately leads into the generation of different rules as the data set (farff file) itself is changed and hence the accuracy of classification of instances changes. The threshold cut parameters αa (for attributes) and αc (for class attribute) are the parameters which come into picture while the rules are generated from a given farff file. If the values of these parameters are changed it also leads into the change in the accuracy of classification of instances.    Implementation in JAVA As already explained Nelder Mead search algorithm works over an N+1 points simplex in an N dimensional space, the dimensions of which are the N parameters to be optimized to obtain the maximum or minimum value of the objective function which depends upon those parameters.  All parameters in a system can be optimized together at a time or one by one while optimizing only similar parameters at a time. Similar parameters mean, referring to the above mentioned parameters, (αa and αc) and (0.25, 0.125 and 0.8) which decides the points of discontinuity in the piecewise linear function. A piece of JAVA code is developed to optimize the two parameters (αa and αc) involved in the Fuzzy BEXA taking percentage accuracy of instances classification as the objective function. The algorithm of the code is explained below. ,[object Object]
Write a set of values of αa and αc at the appropriate place in the data file, and call Fuzzy BEXA through a batch file, the fuzzy BEXA writes the percentage accuracy in a text file, read it from there.
Repeat step 2 to get the value of objective function at all the three points.
Run the core Nelder Mead algorithm over the initial simplex. At each iteration Nelder Mead algorithm calls Fuzzy BEXA two to four times using step 2.
Depending upon the tolerance limit given, with the smallest size of simplex while each vertex of simplex approaches the optimum point. Conclusion  Nelder Mead Search algorithm can be applied effectively to optimize the parameters involved in the Fuzzy BEXA algorithm. The same has been tested by optimizing the two parameters αa and αc to obtain the maximum accuracy of classification for the instances. The algorithm can also be applied to optimize other parameters, number of linguistic variables, shape of membership function, and points of discontinuity in the membership function. These parameters can be optimized separately for each attribute but it would be feasible if there are only few attributes.    Convergence of the Nelder Mead algorithm depends upon the initial guess of the parameters using which the initial simplex is created. The algorithm gets stuck in one of the local minima and cannot move ahead to find the global minima. Hence it is necessary to run the algorithm number of times with different initial guesses to get the global minima for the objective function.
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm

Mais conteúdo relacionado

Mais procurados

11.final paper 0040www.iiste.org call-for_paper-46
11.final paper  0040www.iiste.org call-for_paper-4611.final paper  0040www.iiste.org call-for_paper-46
11.final paper 0040www.iiste.org call-for_paper-46Alexander Decker
 
Knowledge Representation, Inference and Reasoning
Knowledge Representation, Inference and ReasoningKnowledge Representation, Inference and Reasoning
Knowledge Representation, Inference and ReasoningSagacious IT Solution
 
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and Scala
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and ScalaFolding Unfolded - Polyglot FP for Fun and Profit - Haskell and Scala
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and ScalaPhilip Schwarz
 
24 Machine Learning Combining Models - Ada Boost
24 Machine Learning Combining Models - Ada Boost24 Machine Learning Combining Models - Ada Boost
24 Machine Learning Combining Models - Ada BoostAndres Mendez-Vazquez
 
He laplace method for special nonlinear partial differential equations
He laplace method for special nonlinear partial differential equationsHe laplace method for special nonlinear partial differential equations
He laplace method for special nonlinear partial differential equationsAlexander Decker
 
Fuzzy Logic and Neural Network
Fuzzy Logic and Neural NetworkFuzzy Logic and Neural Network
Fuzzy Logic and Neural NetworkSHIMI S L
 
31 Machine Learning Unsupervised Cluster Validity
31 Machine Learning Unsupervised Cluster Validity31 Machine Learning Unsupervised Cluster Validity
31 Machine Learning Unsupervised Cluster ValidityAndres Mendez-Vazquez
 
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...Tosin Amuda
 
28 Machine Learning Unsupervised Hierarchical Clustering
28 Machine Learning Unsupervised Hierarchical Clustering28 Machine Learning Unsupervised Hierarchical Clustering
28 Machine Learning Unsupervised Hierarchical ClusteringAndres Mendez-Vazquez
 
28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms
28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms
28 Dealing with the NP Poblems: Exponential Search and Approximation AlgorithmsAndres Mendez-Vazquez
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsKrishnan MuthuManickam
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAmrinder Arora
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansijsc
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...ijfls
 
Algorithm in computer science
Algorithm in computer scienceAlgorithm in computer science
Algorithm in computer scienceRiazul Islam
 
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...IAEME Publication
 

Mais procurados (20)

Machine Learning Algorithms
Machine Learning AlgorithmsMachine Learning Algorithms
Machine Learning Algorithms
 
11.final paper 0040www.iiste.org call-for_paper-46
11.final paper  0040www.iiste.org call-for_paper-4611.final paper  0040www.iiste.org call-for_paper-46
11.final paper 0040www.iiste.org call-for_paper-46
 
Knowledge Representation, Inference and Reasoning
Knowledge Representation, Inference and ReasoningKnowledge Representation, Inference and Reasoning
Knowledge Representation, Inference and Reasoning
 
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and Scala
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and ScalaFolding Unfolded - Polyglot FP for Fun and Profit - Haskell and Scala
Folding Unfolded - Polyglot FP for Fun and Profit - Haskell and Scala
 
Ch03 fls
Ch03 flsCh03 fls
Ch03 fls
 
24 Machine Learning Combining Models - Ada Boost
24 Machine Learning Combining Models - Ada Boost24 Machine Learning Combining Models - Ada Boost
24 Machine Learning Combining Models - Ada Boost
 
He laplace method for special nonlinear partial differential equations
He laplace method for special nonlinear partial differential equationsHe laplace method for special nonlinear partial differential equations
He laplace method for special nonlinear partial differential equations
 
Fuzzy Logic and Neural Network
Fuzzy Logic and Neural NetworkFuzzy Logic and Neural Network
Fuzzy Logic and Neural Network
 
31 Machine Learning Unsupervised Cluster Validity
31 Machine Learning Unsupervised Cluster Validity31 Machine Learning Unsupervised Cluster Validity
31 Machine Learning Unsupervised Cluster Validity
 
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...
An Experiment to Determine and Compare Practical Efficiency of Insertion Sort...
 
28 Machine Learning Unsupervised Hierarchical Clustering
28 Machine Learning Unsupervised Hierarchical Clustering28 Machine Learning Unsupervised Hierarchical Clustering
28 Machine Learning Unsupervised Hierarchical Clustering
 
28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms
28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms
28 Dealing with the NP Poblems: Exponential Search and Approximation Algorithms
 
CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of Algorithms
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Asymptotic Notation and Data Structures
Asymptotic Notation and Data StructuresAsymptotic Notation and Data Structures
Asymptotic Notation and Data Structures
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-means
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
 
Algorithm in computer science
Algorithm in computer scienceAlgorithm in computer science
Algorithm in computer science
 
Classical Sets & fuzzy sets
Classical Sets & fuzzy setsClassical Sets & fuzzy sets
Classical Sets & fuzzy sets
 
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
 

Destaque

Neural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewNeural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewAshish Khetan
 
Nuclear rocket engine reactor
Nuclear rocket engine reactorNuclear rocket engine reactor
Nuclear rocket engine reactorSpringer
 
Artificial Neural Network Abstract
Artificial Neural Network AbstractArtificial Neural Network Abstract
Artificial Neural Network AbstractAnjali Agrawal
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlAsoka Technologies
 
Artificial Intelligence: Artificial Neural Networks
Artificial Intelligence: Artificial Neural NetworksArtificial Intelligence: Artificial Neural Networks
Artificial Intelligence: Artificial Neural NetworksThe Integral Worm
 
Applications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringApplications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringPramey Zode
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networksstellajoseph
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural networkDEEPASHRI HK
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 

Destaque (9)

Neural Network Applications In Machining: A Review
Neural Network Applications In Machining: A ReviewNeural Network Applications In Machining: A Review
Neural Network Applications In Machining: A Review
 
Nuclear rocket engine reactor
Nuclear rocket engine reactorNuclear rocket engine reactor
Nuclear rocket engine reactor
 
Artificial Neural Network Abstract
Artificial Neural Network AbstractArtificial Neural Network Abstract
Artificial Neural Network Abstract
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter control
 
Artificial Intelligence: Artificial Neural Networks
Artificial Intelligence: Artificial Neural NetworksArtificial Intelligence: Artificial Neural Networks
Artificial Intelligence: Artificial Neural Networks
 
Applications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringApplications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil Engineering
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networks
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 

Semelhante a Optimization Of Fuzzy Bexa Using Nm

Design and analysis of ra sort
Design and analysis of ra sortDesign and analysis of ra sort
Design and analysis of ra sortijfcstjournal
 
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920Karl Rudeen
 
An AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control SystemAn AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control Systeminfopapers
 
A Framework for Self-Tuning Optimization Algorithm
A Framework for Self-Tuning Optimization AlgorithmA Framework for Self-Tuning Optimization Algorithm
A Framework for Self-Tuning Optimization AlgorithmXin-She Yang
 
Data structures arrays
Data structures   arraysData structures   arrays
Data structures arraysmaamir farooq
 
Knowledge extraction from support vector machines
Knowledge extraction from support vector machinesKnowledge extraction from support vector machines
Knowledge extraction from support vector machinesEyad Alshami
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxskilljiolms
 
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNA GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNcscpconf
 
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...csandit
 
Firefly Algorithm, Stochastic Test Functions and Design Optimisation
 Firefly Algorithm, Stochastic Test Functions and Design Optimisation Firefly Algorithm, Stochastic Test Functions and Design Optimisation
Firefly Algorithm, Stochastic Test Functions and Design OptimisationXin-She Yang
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sineijcsa
 

Semelhante a Optimization Of Fuzzy Bexa Using Nm (20)

Design and analysis of ra sort
Design and analysis of ra sortDesign and analysis of ra sort
Design and analysis of ra sort
 
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
 
Project Paper
Project PaperProject Paper
Project Paper
 
Bigdata analytics
Bigdata analyticsBigdata analytics
Bigdata analytics
 
An AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control SystemAn AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control System
 
A Framework for Self-Tuning Optimization Algorithm
A Framework for Self-Tuning Optimization AlgorithmA Framework for Self-Tuning Optimization Algorithm
A Framework for Self-Tuning Optimization Algorithm
 
Data structures arrays
Data structures   arraysData structures   arrays
Data structures arrays
 
Dycops2019
Dycops2019 Dycops2019
Dycops2019
 
Knowledge extraction from support vector machines
Knowledge extraction from support vector machinesKnowledge extraction from support vector machines
Knowledge extraction from support vector machines
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNA GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGN
 
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...
 
Hmm and neural networks
Hmm and neural networksHmm and neural networks
Hmm and neural networks
 
Chapter26
Chapter26Chapter26
Chapter26
 
Firefly Algorithm, Stochastic Test Functions and Design Optimisation
 Firefly Algorithm, Stochastic Test Functions and Design Optimisation Firefly Algorithm, Stochastic Test Functions and Design Optimisation
Firefly Algorithm, Stochastic Test Functions and Design Optimisation
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
 
Machine Learning 1
Machine Learning 1Machine Learning 1
Machine Learning 1
 
I046850
I046850I046850
I046850
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy sets
Fuzzy sets Fuzzy sets
Fuzzy sets
 

Mais de Ashish Khetan

General Pollution Control
General Pollution ControlGeneral Pollution Control
General Pollution ControlAshish Khetan
 
A novel geometric and analytic technique for the singularity analysis of one-...
A novel geometric and analytic technique for thesingularity analysis of one-...A novel geometric and analytic technique for thesingularity analysis of one-...
A novel geometric and analytic technique for the singularity analysis of one-...Ashish Khetan
 
Power Plant Simulation
Power Plant SimulationPower Plant Simulation
Power Plant SimulationAshish Khetan
 
Nelder Mead Search Algorithm
Nelder Mead Search AlgorithmNelder Mead Search Algorithm
Nelder Mead Search AlgorithmAshish Khetan
 
Application of welding arc to obtain small angular bend in steel plates
Application of welding arc to obtain small angular bend in steel platesApplication of welding arc to obtain small angular bend in steel plates
Application of welding arc to obtain small angular bend in steel platesAshish Khetan
 

Mais de Ashish Khetan (6)

General Pollution Control
General Pollution ControlGeneral Pollution Control
General Pollution Control
 
A novel geometric and analytic technique for the singularity analysis of one-...
A novel geometric and analytic technique for thesingularity analysis of one-...A novel geometric and analytic technique for thesingularity analysis of one-...
A novel geometric and analytic technique for the singularity analysis of one-...
 
Emphatic Design
Emphatic DesignEmphatic Design
Emphatic Design
 
Power Plant Simulation
Power Plant SimulationPower Plant Simulation
Power Plant Simulation
 
Nelder Mead Search Algorithm
Nelder Mead Search AlgorithmNelder Mead Search Algorithm
Nelder Mead Search Algorithm
 
Application of welding arc to obtain small angular bend in steel plates
Application of welding arc to obtain small angular bend in steel platesApplication of welding arc to obtain small angular bend in steel plates
Application of welding arc to obtain small angular bend in steel plates
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Optimization Of Fuzzy Bexa Using Nm

  • 1.
  • 2. Write a set of values of αa and αc at the appropriate place in the data file, and call Fuzzy BEXA through a batch file, the fuzzy BEXA writes the percentage accuracy in a text file, read it from there.
  • 3. Repeat step 2 to get the value of objective function at all the three points.
  • 4. Run the core Nelder Mead algorithm over the initial simplex. At each iteration Nelder Mead algorithm calls Fuzzy BEXA two to four times using step 2.
  • 5. Depending upon the tolerance limit given, with the smallest size of simplex while each vertex of simplex approaches the optimum point. Conclusion Nelder Mead Search algorithm can be applied effectively to optimize the parameters involved in the Fuzzy BEXA algorithm. The same has been tested by optimizing the two parameters αa and αc to obtain the maximum accuracy of classification for the instances. The algorithm can also be applied to optimize other parameters, number of linguistic variables, shape of membership function, and points of discontinuity in the membership function. These parameters can be optimized separately for each attribute but it would be feasible if there are only few attributes. Convergence of the Nelder Mead algorithm depends upon the initial guess of the parameters using which the initial simplex is created. The algorithm gets stuck in one of the local minima and cannot move ahead to find the global minima. Hence it is necessary to run the algorithm number of times with different initial guesses to get the global minima for the objective function.