Granular Computing, Computer Security andWeb Intelligence

نویسنده

  • Tsau Young Lin
چکیده

What is granular computing? As we have said in [6]: There are no mathematically valid formal definitions yet. Informally, any computing theory/technology that involves elements and granules (generalized subsets) may be called granular computing (GrC). Intuitively, elements are the data, and granules are the basic knowledge. So granular computing includes data and knowledge computing/engineering, data mining, knowledge discovery, learning and the uncertainty management (granules of no knowledge). We may lump these subfields into AI-Engineering. Here granules will be interpreted as generalized subsets that include classical subsets, fuzzy subsets, and sets with neighborhood systems (e.g., the α cut as neighborhood systems of the cores). As fuzzy sets are defined by membership functions which are bounded real-valued functions, so we will extend further to all functions, even to generalized functions (e.g. Dirac functions), measures/probabilities, generalized measures (e.g. belief functions). In this paper, we will explain two killer applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

INTERVAL ANALYSIS-BASED HYPERBOX GRANULAR COMPUTING CLASSIFICATION ALGORITHMS

Representation of a granule, relation and operation between two granules are mainly researched in granular computing. Hyperbox granular computing classification algorithms (HBGrC) are proposed based on interval analysis. Firstly, a granule is represented as the hyperbox which is the Cartesian product of $N$ intervals for classification in the $N$-dimensional space. Secondly, the relation betwee...

متن کامل

Introduction to Panels on E-Security, Granular Computing and Web Intelligence

A common definition of computer security is: ” a system is secure if it adequately protects information that it processes against unauthorized disclosure, unauthorized modification, and unauthorized withholding (denial of service).” Currently, no systems can assure all of these. The first major efforts on such a system is the so called mandatory access control (MAC). It is for military security...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006