Fuzzy Cognitive Maps

Fuzzy Cognitive Maps

 

196,21 €
IVA incluido
Consulta disponibilidad
Editorial:
Springer Nature B.V.
Año de edición:
2024
Materia
Ingeniería: general
ISBN:
9783031489624

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book starts with the rationale for creating an FCM by contrast to other techniques for participatory modeling, as this rationale is a key element to justify the adoption of techniques in a research paper. Fuzzy cognitive mapping is an active research field with over 20,000 publications devoted to externalizing the qualitative perspectives or 'mental models' of individuals and groups. Since the emergence of fuzzy cognitive maps (FCMs) back in the 80s, new algorithms have been developed to reduce bias, facilitate the externalization process, or efficiently utilize quantitative data via machine learning. It covers the development of an FCM with participants through a traditional in-person setting, drawing from the experience of practitioners and highlighting solutions to commonly encountered challenges. The book continues with introducing principles of simulations with FCMs as a tool to perform what-if scenario analysis, while extending those principles to more elaborated simulation scenarios where FCMs and agent-based modeling are combined. Once an FCM model is obtained, the book then details the analytical tools available for practitioners (e.g., to identify the most important factors) and provides examples to aid in the interpretation of results. The discussion concerning relevant extensions is equally pertinent, which are devoted to increasing the expressiveness of the FCM formalism in problems involving uncertainty. The last four chapters focus on building FCM models from historical data. These models are typically needed when facing multi-output prediction or pattern classification problems. In that regard, the book smoothly guides the reader from simple approaches to more elaborated algorithms, symbolizing the noticeable progress of this field in the last 35 years. Problems, recent references, and functional codes are included in each chapter to provide practice and support further learning from practitioners and researchers.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €