Java Fuzzy Editor is a basic editor to allow creation of fuzzy based rules. It will save to serveral formats including to source code in several languages.
The Toolbox GraphC generates a graph of classes for fuzzy time Petri nets, taking into account unbounded transitions. This project is a scientific research project conducted by LAAS-CNRS and IRIT-UT1, France.
TreeSap introduces simple yet powerful qualitative querying:rather than specifying a query using numerical measurements ("within 5km") english phrases are used ("near"). In-built fuzzy logic handles vagueness producing results with weighted relevance
This is a prolog-like programming language based on the fuzzy logic. It includes the class-libraries for fuzzy logic, probability theory and method of resolution, all made in C++. Java releases possible in the future.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
mbFuzzIT enables the work with Fuzzy technology (fuzzy inference / fuzzy logic) in Java.
In order to facilitate the creation of the inference mechanisms, mbFuzzIT containts a visual editor.
Project FuzzyGKS is a Java-based fuzzy logic control system. It provides an extensible, multithreaded framework for fuzzy controllers. FuzzyGKS can be extended from Type I fuzzy reasoning to Type II fuzzy reasoning.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.