Small Catchment Agricultural Management Using Decision Variables Defined at Catchment Scale and a Fuzzy Rule-Based System: A Mediterranean Vineyard Case Study

2011 ◽  
Vol 25 (11) ◽  
pp. 2649-2668 ◽  
Author(s):  
François Colin ◽  
Serge Guillaume ◽  
Bruno Tisseyre
2012 ◽  
Vol 66 (8) ◽  
pp. 1766-1773 ◽  
Author(s):  
J. Yazdi ◽  
S. A. A. S. Neyshabouri

Population growth and urbanization in the last decades have increased the vulnerability of properties and societies in flood-prone areas. Vulnerability analysis is one of the main factors used to determine the necessary measures of flood risk reduction in floodplains. At present, the vulnerability of natural disasters is analyzed by defining the various physical and social indices. This study presents a model based on a fuzzy rule-based system to address various ambiguities and uncertainties from natural variability, and human knowledge and preferences in vulnerability analysis. The proposed method is applied for a small watershed as a case study and the obtained results are compared with one of the index approaches. Both approaches present the same ranking for the sub-basin's vulnerability in the watershed. Finally, using the scores of vulnerability in different sub-basins, a vulnerability map of the watershed is presented.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Shah Nazir ◽  
Sara Shahzad ◽  
Sher Afzal Khan ◽  
Norma Binti Alias ◽  
Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark.


Author(s):  
Ashu S. Kedia ◽  
D. Sowjanya ◽  
P. S. Salini ◽  
M. Jabeena ◽  
Bhimaji Krishnaji Katti

2014 ◽  
Vol 8 (3) ◽  
pp. 335-356 ◽  
Author(s):  
Andreiwid Sheffer Corrêa ◽  
Alexandre de Assis Mota ◽  
Lia Toledo Moreira Mota ◽  
Pedro Luiz Pizzigatti Corrêa

Purpose – The purpose of this study is to present a system called NEBULOSUS, which is a fuzzy rule-based expert system for assessing the maturity level of an agency regarding technical interoperability. Design/methodology/approach – The study introduces the use of artificial intelligence and fuzzy logic to deal with the imprecision and uncertainty present in the assessment process. To validate the system proposed and demonstrate its operation, the study takes into account the Brazilian technical interoperability maturity model, based on the Brazilian Government Interoperability Framework (GIF). Findings – With the system proposed and its methodology, it could be possible to increase the assessment process to management level and to provide decision-making support without worrying about technical details that make it complex and time-consuming. Moreover, NEBULOSUS is a standalone system that offers an easy-to-use, open and flexible structuring database that can be adapted by governments throughout the world. It will serve as a tool and contribute to governments’ expectations for continuous improvement of their technologies. Originality/value – This study contributes toward filling a gap in general interoperability architectures, which is a means to provide an objective method to evaluate GIF adherence by governments. The proposed system allows governments to configure their technical models and GIF to assess information and communication technology resources.


Sign in / Sign up

Export Citation Format

Share Document