Soft Computing
Soft Computing
a. (0 ,1)
b. [0 ,1]
c. (0 ,1]
d. (-∞ ,∞)
a.
b.
c.
d.
b.
2 points
Two fuzzy set A and B are given by A ={(x1, 0.3), (x2, 0.9), (x3, 0.4)}, and B ={(x1, 0.1), (x2, 0.5), (x3, 0.4)}
Intersection of these two sets i.e. A⋂B is given by
a. {(x1, 0.3), (x2, 0.5), (x3, 0.4)}
b. {(x1, 0.1), (x2, 0.9), (x3, 0.4)}
c. {(x1, 0.1), (x2, 0.5), (x3, 0.9)}
d. {(x1, 0.1), (x2, 0.5), (x3, 0.4)}
μA(x) = {0.6,0.5,0.1,0.7,0.8}
μB(x) = {0.9,0.2,0.6,0.8,0.5}
a. Associativity
b. Distributivity
c. Commutativity
d. Transitivity
b.
c.
d.
a.
2 points
The set of all points x in X in a fuzzy set A is defined as a “core”, if
a. μA(X) = 0
b. μA(X) > 1
c. μA(X) = 1
d. μA(X) < 1
a. P ∨Q
b. P ∧Q
c. P ⇒Q
d. P ⇔Q
a. Minimum
b. Algebraic product
c. Union
d. Drastic product
A ={(a1,0.3),(a2,0.6),(a3,0.8)} , B={(b1,0.4),(b2,0.5)}
find R=(B×A) ?
a.
b.
c.
d.
a.
2 points
Which of the following defuzzification methods is not a centroid method?
Using Zadeh’s notations, the fuzzy set A∪B into λ –cut sets for λ = 0.7 is
a.
b.
c.
d. None of the above
a.
2 points
What is the following sequence of steps taken in designing a fuzzy logic system?
a. Fuzzification → Rule evaluation → Defuzzification
b. Fuzzification → Defuzzification → Rule evaluation
c. Rule evaluation → Fuzzification → Defuzzification
d. Rule evaluation → Defuzzification → Fuzzification
a. t(x,y) = 1 – s(x,y)
b. t(x,y) = s(1-x,1-y)
c. t(x,y) = 1- s(1-x,1-y)
d. t(x,y) = s(1+x,1+y)
Week 03 : Assignment 03
The due date for submitting this assignment has passed.
Due on 2024-02-14, 23:59 IST.
a. Mamdani approach
b. Takagi and Sugeno's approach
c. Both approaches provide the same level of interpretability and accuracy.
d. The choice depends on the specific application and its priorities.
1. If the room is Cold and Dry, then the heater is set to Low.
2. If the room is Hot and Wet, then the heater is set to High.
Now, suppose on a particular day, the membership functions for the inputs are as
follows: μCold(x) = 0.4, μHot(x) = 0.6, μDry(y) = 0.5, and μWet(y) = 0.5. Can you compute the rule
strengths for the two rules?
a. 0.5, 0.5
b. 0.2, 0.3
c. 0.4, 0.5
d. 0.24,0.25
a. Mamdani approach
b. Takagi and sugeno’s approach
c. Both a, b
d. None of the above
a. NP‐Hard problem
b. NP‐complete problem
c. Scholastic Assessment problem
d. None of the above
a. Binary Encoding
b. Permutation Encoding
c. Value Encoding
d. None of the above
a. 100100
b. 100000
c. 100110
d. 101100
a. 15
b. 7
c. 45
d. 9
Yes, the answer is correct.
Score: 2
Accepted Answers:
a. 15
2 points
In the context of genetic algorithms and their selection processes, why might the
Roulette Wheel Selection method be considered advantageous yet potentially
problematic?
a. It guarantees the selection of the best individual in every generation, ensuring rapid
convergence.
b. It distributes selection probabilities based on fitness, favouring fitter individuals but
potentially sidelining lesser-fit individuals over time.
c. It always promotes diversity by selecting individuals randomly, ensuring a wide range
of solutions in subsequent generations.
d. It eliminates the need for a fitness function, relying solely on random chance for
selection.
a. No gap
b. Small gap
c. Large gap
d. The type of gap doesn't affect selection pressure
a. 1100
b. 1010
c. 1110
d. 1111
a.
b.
c.
d.
b.
2 points
The generation gap with N population size and p number of individuals is
a.
b.
c.
d.
a.
2 points
Which coding scheme has evolved to overcome the binary code-related problem?
a. Pink coding.
b. Grey coding.
c. Yellow coding.
d. Black coding.
a. Optimal Solutions
b. Non-Dominated Solutions
c. Dominated Solutions
d. Converged Solutions
a. 15.6
b. 17.7
c. 16.1
d. 23.4
a. Reflexive
b. Symmetric
c. Transitive
d. Antisymmetric
a. P dominates Q.
b. Q dominate P.
c. Both dominate each other.
d. None of the above
a. Lexicographic ordering
b. Criterion selection (VEGA)
c. Simple weighted approach (SOEA)
d. Non-dominated Sorting based approach (NSGA)
a. A technique for evaluating the fitness of individuals based on their Pareto dominance.
b. A mechanism for sharing the fitness values equally among all individuals in the
population.
c. An approach for preventing premature convergence by penalizing solutions that are
too similar.
d. A method for randomly selecting individuals for crossover and mutation operations.
Week 07 : Assignment 07
Due date: 2024-03-13, 23:59 IST.
Your last recorded submission was on 2024-03-03, 16:48 IST
2 points
What is the time complexity of the Non-dominated Sorting Procedure in the context of
Genetic Algorithms, where m is the number of objectives, and n is the population size?
a. O(n^2)
b. O(mn)
c. O(mn^2)
d. O(log n)
2 points
What is the purpose of the sharing technique in NSGA?
2 points
What is the significance of the crowding distance method in NSGA-2?
2 points
Which selection method does NSGA-II use in its algorithm?
2 points
What does the crowding comparison operator consider when selecting a winner between
two solutions in NSGA-II?
2 points
The behavior of a biological neural network can be captured by a simple model called an
artificial neuron or perceptron. Which of the following statements about the perceptron is
correct?
2 points
In the context of neural network architectures, what distinguishes recurrent neural
networks (RNNs) from feedforward network architectures?
2 points
To address non-linearly separable problems, which type of neural network architecture is
commonly employed?
2 points
What is the fundamental structural unit of a biological nervous system consisting of
interconnected processing units?
a. Synapse
b. Neuron
c. Axon
d. Dendrite
2 points
What is the chemical present in each neuron that plays a crucial role in transmitting
signals between neurons?
a. Enzyme
b. Hormone
c. Neurotransmitter
d. Antigen
Week 08 : Assignment 08
Due date: 2024-03-20, 23:59 IST.
Your last recorded submission was on 2024-03-09, 15:24 IST
2 points
What is the primary purpose of the weight matrix in a perceptron during the training
process?
2 points
In Hebbian learning, what does the weight adjustment depend on?
2 points
What role does the activation function play in the back-propagation algorithm for training
multilayer feed-forward neural networks?
2 points
What role does the learning rate play in the Steepest Descent method?
a. Supervised learning requires labeled output data, while unsupervised learning does
not.
b. Unsupervised learning uses a teacher to guide the learning process.
c. Supervised learning does not involve input data, unlike unsupervised learning.
d. Unsupervised learning requires a predefined threshold value.
2 points
In the Fuzzy Toolbox Library in the Simulink environment, which block is responsible for
implementing the desirable rules based on a FIS variable produced by the FIS Editor?
a. Defuzzification block
b. FIS Variable block
c. Fuzzy Controller block
d. Rule Base block
2 points
In a Sequential Hybrid System, how are the technologies utilized?
a. Parallel execution
b. Hierarchical execution
c. Pipelining fashion
d. Synchronous execution
2 points
In an Embedded Hybrid System, how are the participating technologies integrated?
a. Sequential execution
b. Isolated execution
c. Intertwined integration
d. Modular execution
2 points
What is a characteristic of a fuzzy rule base in a fuzzy logic system?
2 points
Why are fuzzy logic and neural networks considered natural complementary tools in
building intelligent systems in the context of Neuro-Fuzzy Systems?
a. Fuzzy logic focuses on raw data, while neural networks handle linguistic information.
b. Fuzzy logic and neural networks both operate at a high level of abstraction.
c. Neural networks excel in linguistic reasoning, while fuzzy logic deals with raw data.
d. Neural networks handle raw data well, and fuzzy logic is effective in dealing with
linguistic information.