The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
We have developed an individual-based evolving predator-prey ecosystem simulation that integrates, for the first time, a complex individual behaviour model, an evolutionary mecha...
This paper integrates Markov random fields (MRFs) with type-2 fuzzy sets (T2 FSs) referred to as T2 FMRFs, which can handle the fuzziness of the labeling space as well as the rand...
A number of generalizations of answer set programming have been proposed in the literature to deal with vagueness, uncertainty, and partial rule satisfaction. We introduce a unifyi...
Jeroen Janssen, Steven Schockaert, Dirk Vermeir, M...
This paper presents an action selection method using fuzzy logic. The objective is to solve behaviour conflict in behaviour-based architectures for virtual agent navigation in un...