Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Computational Intelligence and its Applications

Shweta Varshney

Abstract


Abstract:

Computational intelligence (CI) is a term used to describe a computer's capacity to learn a particular task via data or experimental observation. Although it is frequently used as a synonym for soft computing, computational intelligence is still not well defined. Soft computing, commonly referred to as computational intelligence, is a type of computing that is based on how people learn. Computers become more intelligent when they learn from procedures based on logic and science. Computational intelligence, in contrast to artificial intelligence (AI), does not use Boolean values (0s and 1s) to achieve learning, focusing instead on the development of a system.

Swarm intelligence, fuzzy systems, neural networks, and evolutionary computation make up the four core subfields of computational intelligence (CI). This article demonstrates how CI approaches go beyond the artificial intelligence field's rigid constraints and can aid in the resolution of actual engineering issues from the mechanical, computer science, and electrical engineering fields.


Keywords


Computational Intelligence, article intelligence, fizzy logic, artificial neural network, evolutionary computation.

Full Text:

PDF

References


D. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning (Addison-Wesley, Reading, 1989).

R.S. Zebulum et al., Evolutionary Electronics: Automatic Design of E1lectronic Circuits and Systems by Genetic Algorithms (CRC Press, Boca Raton, 2001).

Liu et al., An inverse procedure for determination of material constants of composite laminates using elastic waves. Comput. Methods Appl. Mech. Eng. 191, 3543–3554 (2002).

M. Guzek, P. Bouvry,and E. Talbi, “A survey of evolutionary computation for resource management of processing in cloud computing,” IEEE Comput. Intell. Mag., vol. 10, no. 2, pp. 53–67, May 2015.

M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case forVM-based cloudlets in mobile computing,” IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, Oct. 2009.

Y. Gao, W. Hu, K. Ha, B. Amos, P. Pillai, and M. Satyanarayanan, “Arecloudlets necessary?” School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA, Tech. Rep. CMU-CS-15-139, 2015.

D. T. Hoang, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Wireless Commun. Mobile Comput., vol. 13, pp. 1587–1611, 2013.

L. Tang, B. Tang, L. Kang, and L. Zhang, “A novel task caching and migration strategy in multi-access edge computing based on the genetic algorithm,” Future Internet, vol. 11, no. 8, pp. 1–14, 2019.

Y. Chen, Y. Zhang, S. Maharjan, M. Alam, and T. Wu, “Deep learning for secure mobile edge computing in cyber-physical transportation systems, “IEEE Netw., vol. 33, no. 4, pp. 36–41, Jul./Aug. 2019.

P. Mell and T. Grance, “The NIST definition of cloud computing, “National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA, Tech. Rep. 800-145, Sep. 2011.




DOI: https://doi.org/10.37628/ijcam.v8i1.1424

Refbacks

  • There are currently no refbacks.