A Gentle Introduction and Survey on Computing with Words (CWW) Methodologies

08/12/2022
by   Prashant K Gupta, et al.
0

Human beings have an inherent capability to use linguistic information (LI) seamlessly even though it is vague and imprecise. Computing with Words (CWW) was proposed to impart computing systems with this capability of human beings. The interest in the field of CWW is evident from a number of publications on various CWW methodologies. These methodologies use different ways to model the semantics of the LI. However, to the best of our knowledge, the literature on these methodologies is mostly scattered and does not give an interested researcher a comprehensive but gentle guide about the notion and utility of these methodologies. Hence, to introduce the foundations and state-of-the-art CWW methodologies, we provide a concise but a wide-ranging coverage of them in a simple and easy to understand manner. We feel that the simplicity with which we give a high-quality review and introduction to the CWW methodologies is very useful for investigators, especially those embarking on the use of CWW for the first time. We also provide future research directions to build upon for the interested and motivated researchers.

READ FULL TEXT

page 5

page 17

research
04/30/2020

Perceptual reasoning based solution methodology for linguistic optimization problems

Decision making in real-life scenarios may often be modeled as an optimi...
research
06/15/2021

A Survey on Mining and Analysis of Uncertain Graphs

Uncertain Graph (also known as Probabilistic Graph) is a generic model t...
research
06/24/2023

A Tutorial on Modeling and Control of Slippage in Wheeled Mobile Robots

This tutorial intends to present a deep insight of the slip and skid pro...
research
08/27/2023

MITRE ATT CK: State of the Art and Way Forward

MITRE ATT CK is a comprehensive framework of adversary tactics, techni...
research
06/07/2021

Mechanism Design for Facility Location Problems: A Survey

The study of approximate mechanism design for facility location problems...
research
07/14/2023

Evaluation Methodologies in Software Protection Research

Man-at-the-end (MATE) attackers have full control over the system on whi...

Please sign up or login with your details

Forgot password? Click here to reset