Zadeh’s Vision of Going from Fuzzy to Computing With Words: from the Idea’s Origin to Current Successes to Remaining Challenges

نویسنده

  • Vladik Kreinovich
چکیده

Need for incorporating expert knowledge into automated systems. In order to better understand Zadeh’s vision of going from fuzzy to computing with words, let us recall the reason why we need to use words in computations and whey fuzzy techniques were invented in the first place. These techniques come from the need for expert knowledge. In many application areas, we rely on experts: medical doctors diagnose and cure diseases, civil engineers design reliable bridges and roads, pilots control planes, etc. Some experts are more skilled than others. Every patient wants to be diagnosed and treated by the best doctors, every passenger wants to be flown by the best pilots, etc. The problem is that realistically, the best doctor cannot physically treat all the millions of illnesses, the best pilot cannot himor herself fly all thousands of planes. Since we cannot have the best medical doctor treat every patient, we should help all the other doctors use the knowledge and experience of the best ones – and maybe even allow the patients themselves to use this knowledge. Similarly, we should help all the pilots to use the knowledge and experience of the best ones. In general, we want all the experts to use the expertise of the best ones. For that, we need to incorporate the knowledge of the best experts into an automated system that others can use.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...

متن کامل

Type-2 fuzzy set extension of DEMATEL method combined with perceptual computing for decision making

Most decision making methods used to evaluate a system or demonstrate the weak and strength points are based on fuzzy sets and evaluate the criteria with words that are modeled with fuzzy sets. The ambiguity and vagueness of the words and different perceptions of a word are not considered in these methods. For this reason, the decision making methods that consider the perceptions of decision...

متن کامل

How I would like to foresee the future of theoretic fuzzy logic

Departing from how the speaker became involved, and by what he did work with fuzzy sets and fuzzy logic, an (obviously subjective) look at their future will be discussed. Namely, by arguing on some aspects such research could follow to not only being a theoretic ground for Zadeh’s Computing with Words, but also for going towards a new experimental science dealing with the imprecision and non-ra...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012