Introduction and Security Applications of Computational Intelligence

Abstract

Computational intelligence is the study of the design of intelligent agents. An agent is something that acts in an environment—it does something. Agents include worms, dogs, thermostats, airplanes, humans, organizations, and society. An intelligent agent is a system that acts intelligently: What it does is appropriate for its circumstances and its goal, it is flexible to changing environments and changing goals, it learns from experience, and it makes appropriate choices given perceptual limitations and finite computation. The central scientific goal of computational intelligence is to understand the principles that make intelligent behavior possible, in natural or artificial systems. The main hypothesis is that reasoning is computation. The central engineering goal is to specify methods for the design of useful, intelligent artifacts. It primarily includes artificial neural networks, evolutionary computation and fuzzy logic. In addition, CI also embraces biologically inspired algorithms such as swarm intelligence and artificial immune systems, which can be seen as a part of evolutionary computation, and includes broader fields such as image processing, data mining, and natural language processing. Furthermore other formalisms: Dempster–Shafer theory, chaos theory and many-valued logic are used in the construction of computational models.

Authors and Affiliations

Nikhil Singla, Sahil Jindal, Vikas Verma, Tushar Mehmi

Keywords

Related Articles

A Study on Women Empowerment through SelfHelp Groups with Special Reference to Ghaziabad in Uttar Pradesh District

women’s empowerment is a much debated topic, which has many aspects to it. It is not only multidimensional in approach, but also helps one understand that, when women are empowered, they gain self confidence and actuali...

Experimental Investigation Of Heat Transfer In Heat Exchanger Using Different Geometry Of Inserts – A Review

Heat transfer enhancement techniques are used to increase the rate of heat transfer forthfor developing efficient heat transfer enhancement devices with several designs in order to enhance the turbulence, enhance the fr...

Synthesis and Flexural Strength of Carbon Fiber Reinforced Epoxy Matrix Composite

Composite materials are multiphase materials obtained through the judicious combination of different materials in order to attain properties that the individual components by themselves cannot attain. The development of...

North-East Corner Method-An Initial Basic Feasible Solution for Transportation Problem

A transportation problem can be solved by using modi method. Modi method is not a self-starting method which requires an initial basic feasible solution. In this paper, north east corner method is introduced in order to...

slugSTUDY AND ANALYSIS OF SINGLE POINT CUTTING TOOL UNDER VARIABLE RAKE ANGLE

The finite element method is used to study the effect of different rake angles on the force exerted on the tool during cutting . This method is attracting the resea rchers for better understanding the chip formation...

Download PDF file
  • EP ID EP18995
  • DOI -
  • Views 283
  • Downloads 10

How To Cite

Nikhil Singla, Sahil Jindal, Vikas Verma, Tushar Mehmi (2014). Introduction and Security Applications of Computational Intelligence. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk./articles/-A-18995