Developing a Genetic Fuzzy System Model for Cost-Benefit Analysis.
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 4
Abstract
Cost benefit analysis is a systematic approach for calculation and analyzing the cost of a project. Soft computing approaches are also applicable to deal with cost benefit analysis. In this paper Mamdani fuzzy system has been developed for cost benefit analysis. The genetic optimization of the model is carried out. The interpretability and accuracy features are also analyzed.
Authors and Affiliations
Saurabh Singh, Praveen Kumar Shukla, Rashmi Ranjan, Anurag Kumar
Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods
This paper, explains about the background study of the coupled tank and to model such tanks using Simulink blocks. It must explains, the coupled tanks are used to select the best tuning strategy for PID controller based...
DEFINING QUALITY CRITERIA IN SITUATIONAL METHOD ENGINEERING
Method engineering is a field of engineering that has been created a need expressed by engineers. These engineers faced problems in using conventional methods such as SSADM, DSDM, OOAD...In this way, Method engineering w...
AN APPROACH OF FLOW MEASUREMENT IN SOLAR WATER HEATER USING TURBINE FLOW METER
boost its use in domestic applications. A Techno-economical system is designed using microcontroller based turbine flow meter to measure flow of water in solar water heater. There is no need of bulky remote electronics s...
Evaluating a Model for Implementing Knowledge Management in Banking Informatics Corporations in Iran
The purpose of this paper is to measure the perceived importance and practical establishment of five factors affecting successful establishment of knowledge management (KM) in banking informatics corporations in Iran bas...
Enhancing RSA algorithm using Mersenne Primes with reduced size of encrypted file
Message passing from source to destination is one of the important aspects of communication. However, it is requiredmany times that this message gets transmitted secretly, so that no unauthorized person gets knowledge of...