Reference Hub3
Hierarchies of Architectures of Collaborative Computational Intelligence

Hierarchies of Architectures of Collaborative Computational Intelligence

Witold Pedrycz
Copyright: © 2009 |Volume: 1 |Issue: 1 |Pages: 14
ISSN: 1942-9045|EISSN: 1942-9037|ISSN: 1942-9045|EISBN13: 9781615204229|EISSN: 1942-9037|DOI: 10.4018/jssci.2009010102
Cite Article Cite Article

MLA

Pedrycz, Witold. "Hierarchies of Architectures of Collaborative Computational Intelligence." IJSSCI vol.1, no.1 2009: pp.18-31. http://doi.org/10.4018/jssci.2009010102

APA

Pedrycz, W. (2009). Hierarchies of Architectures of Collaborative Computational Intelligence. International Journal of Software Science and Computational Intelligence (IJSSCI), 1(1), 18-31. http://doi.org/10.4018/jssci.2009010102

Chicago

Pedrycz, Witold. "Hierarchies of Architectures of Collaborative Computational Intelligence," International Journal of Software Science and Computational Intelligence (IJSSCI) 1, no.1: 18-31. http://doi.org/10.4018/jssci.2009010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Computational Intelligence (CI) supports a wealth of methodologies and a plethora of algorithmic developments essential to the construction of intelligent systems. Being faced with inherently distributed data which become evident, the paradigm of CI calls for further enhancements along the line of designing systems that are hierarchical and collaborative in nature. This emerging direction could be referred to as collaborative Computational Intelligence (or C2I for brief). The pervasive phenomenon encountered in architectures of C2I is that collaboration is synonym of knowledge sharing, knowledge reuse and knowledge reconciliation. Knowledge itself comes in different ways: as some structural findings in data and usually formalized in the framework of information granules, locally available models, some action plans, classification schemes, and alike. In such distributed systems sharing data is not feasible given existing technical constraints which are quite often exacerbated by non-technical requirements of privacy or security. In this study, we elaborate on the design of information granules which comes hand in hand with various clustering techniques and fuzzy clustering, in particular.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.