<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Fuzzy Logic for Emergence Verification</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Ali</forename><surname>Boukehila</surname></persName>
							<email>al.boukehila@lagh-univ.dz</email>
							<affiliation key="aff0">
								<orgName type="laboratory">LISCO Laboratory</orgName>
								<orgName type="institution">Badji Mokhtar Annaba University</orgName>
								<address>
									<postCode>23000</postCode>
									<settlement>Annaba</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Amar Telidji Laghouat University</orgName>
								<address>
									<postCode>03000</postCode>
									<settlement>Laghouat</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Fuzzy Logic for Emergence Verification</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">868724CF813BE40FD0B27B0084C9B294</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T07:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Complex adaptive systems</term>
					<term>Emergence</term>
					<term>Agent-based simulation</term>
					<term>Fuzzy rule-based classification</term>
					<term>Swarming</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Actions of terrorist organizations, flu viruses or natural disasters can be considered emergent behaviours in our environment. In recent decades, emergent phenomena have been the subject of multiple research efforts in the field of complex adaptive systems, however, it is still hard to predict, track and supervise such phenomena. This highlights the urgency to better understand the dynamics of these behaviours in order to timely detect critical phase transitions that might form a risk for software or human environments. This paper introduces an emergent verification system that integrates a data retriever from agent-based simulations and a verification module based on fuzzy classification. We follow the classification of emergent behaviours according to Fromm's taxonomy. In addition, the paper presents a scenario implementation using swarms of birds (Boids model) to demonstrate the applicability of the proposed approach. The results show that the framework is able to verify weak emergence occurred during simulations. Since this work is a part of ongoing research, the future direction is also discussed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Computer systems have grown extremely complex with the expansion of storage and information processing technologies as well as the evolution of networks. As a result, models and approaches for decentralized and large-scale application have been developed. It facilitates the creation of multi-agent systems and other models and simulation tools. The versatility of agent-based simulation (ABS) enables for the investigation of complicated systems' behavior. In this study, we look at how agents interact in order to identify emergence. Emergent behaviors may be observed practically anywhere in real life, yet their research is limited since they are difficult to identify <ref type="bibr" target="#b0">[1]</ref>. Interactions between system components are unquestionably important in the formation of such events. The system may be described with Agent-Based Simulation (ABS), where agents represent these components, due to the interaction among the components and their capacity to decide separately following a given logic <ref type="bibr" target="#b1">[2]</ref>. The goal of this study is to fully use emergence's potential. Variable-based <ref type="bibr" target="#b1">[2]</ref>[3] <ref type="bibr" target="#b3">[4]</ref> and event-based <ref type="bibr" target="#b3">[4]</ref> research efforts are primarily separated into two categories. The variable-based technique measures emergence quantitatively using a specified variable, such as the mass center of an animal population, and detects emergence by assessing changes in that variable. Applying variable-based approaches in continuous uncertain systems is tough, and overcoming the computing cost, as well as the necessity for ongoing human involvement, are additional challenges. The event-based approach focuses on system state changes <ref type="bibr" target="#b4">[5]</ref>, and emergent behavior is regarded as a result of events that cause shifting points, either at the global level (Marco) or at the level of system components (Micro). One of the most common methods for identifying emergence is to look for changing points in the system; consequently, in this research, we employ an inflexion predictor to do so. Emergence is a global state in a system. Data mining is the act of sorting through enormous data sets to find relationships, forecast outcomes, and solve issues. The suggested solution leverages big data using data mining with an inflection predictor. Data mining employs a variety of sophisticated and clever approaches, including classification, clustering, time series analysis, and so on. To detect the increase of emergence, we used interactions as metrics, and the technique employs a fuzzy classification with simulation data as inputs. Our technique is designed and tested using an ABS model called the Boids model <ref type="bibr" target="#b5">[6]</ref>.</p><p>This paper is set up as follows. In the next section, theoretical foundations are described. Sec. III introduces the related works that inspired this study, the proposed approach will be presented in Sec. IV, Sec. V shows experiments conducted and their analysis. Finally, in Sec. VI some concluding remarks and future work lines are presented.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Theoretical foundations 2.1. Emergence in complex systems</head><p>Complex systems have properties that are difficult to predict by studying the behaviour of their parts <ref type="bibr" target="#b6">[7]</ref>. Exchanges in human societies, as well as the flocking in a group of birds, are emerging behaviours <ref type="bibr" target="#b5">[6]</ref>. Emerging phenomena can be beneficial, for example, if the new unknown proprieties are considered as "positive" or "useful", these behaviours can otherwise be "negative" or "dangerous". Identifying these properties can prevent potential danger.</p><p>Many attempts to define the meaning of emergence have been documented. Originating from philosophy <ref type="bibr" target="#b2">[3]</ref>, emergence became useful in ABS especially for studying complex systems. Emergence provides a great opportunity for understanding interactions in a complex environment <ref type="bibr" target="#b3">[4]</ref>. In this work, we follow Fromm's <ref type="bibr" target="#b7">[8]</ref> classification. He proposed a taxonomy that classifies emergence based on feedbacks and causality. In this work, we only consider type II (weak emergence) and type IV (Strong emergence), Strong emergence is the notion of emergence that is most common in philosophical literature about emergence, and is the notion invoked by the British emergentists of the 1920s. Weak emergence is the notion of emergence that is most common in scientific discussions of emergence, and is the notion that is typically invoked by proponents of emergence in complex systems theory. Weak emergence describes new properties arising in systems as a result of the interactions at a micro level. However, Bedau says that the properties can be determined only by computer simulation.</p><p>Strong emergence describes the direct causal action of a macro-level system upon its components; qualities produced are irreducible to the system's constituent parts <ref type="bibr" target="#b22">[23]</ref>. The whole is not equal to the sum of its parts <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">The Boids Model</head><p>Craig Reynolds <ref type="bibr" target="#b5">[6]</ref> created Boids, which is an artificial life simulation. The simulation's goal is to mimic the behavior of flocks of birds. The Boids simulation, on the other hand, instead of directing the interactions of a complete flock, merely defines the behavior of each individual bird. The program generates a result that is sophisticated and realistic enough to be utilized as a framework for computer graphics applications such as computer-generated behavioral animation in motion picture films using only a few simple principles, Figure <ref type="figure" target="#fig_0">1</ref>: Boids' rules shows Boids' rules. Within the simulation, emergent properties in the Boids model could appear. When a packing behavior occurs, emergent behavior is verified. To make visual recognition of emergence easier, we chose to analyze a small number of agents. The goal of this paper is to understand these unexpected behaviours.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Fuzzy classification</head><p>Engineering fuzzy systems, based on fuzzy logic proposed by Zadeh <ref type="bibr" target="#b23">[24]</ref>  <ref type="bibr" target="#b24">[25]</ref>, date back to the 1970s, when Mamdami <ref type="bibr" target="#b25">[26]</ref>, <ref type="bibr" target="#b26">[27]</ref> developed the first fuzzy controller. Fuzzy systems have now acquired popularity in a variety of domains, including control and automation, pattern recognition, medical diagnosis, and forecasting. Because fuzzy systems are frequently considered as black boxes, an analytical theory for fuzzy systems is required to resolve misunderstandings and disagreements. Investigation and optimization of developed fuzzy models, as well as comparison study of different methodologies, play an essential role <ref type="bibr" target="#b27">[28]</ref>, <ref type="bibr" target="#b28">[29]</ref>, <ref type="bibr" target="#b29">[30]</ref> The objective of this work is to build a fuzzy rulebased system (FRS) to verify the raise of emergent proprieties in an ABS, results. Due to the complexity of the study, several techniques to automatically generate FRS were used i.e., ad-hoc data driven models and genetic fuzzy systems (GFS). The first technique is based on learning from the input-output dataset resulting in the simulation, the second group processes learning of a fuzzy system, precisely parameters of that system, as an optimization problem and uses a genetic algorithm (GA) to proceed that task. The system modeling process is divided into three parts. First step encloses a data retrieval from the ABS, the second phase is the emergence classification via the fuzzy system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Related Works</head><p>The fast-growing complexity of modern systems is challenging for the research community, and the need for techniques that can cope with these types of systems is crucial in numerous domains, including communication, learning, industry, and engineering. Agent-based simulation (ABS) is the most widely used simulation approach because it is versatile and capable of simulating large, interconnected systems. (ABS) techniques are commonly used to explore emergent behavior as a result of simulation. Emergence is prevalent in systems with a large number of pieces, and it is usual to see and manipulate the emergence of unanticipated behaviors using ABS simulation platforms.</p><p>It is critical to provide the theoretical background for constructing and modeling the approach by initiating the emergence type and taxonomy of the emergent behaviors we are interested in. There are many other emergence definitions, however for the sake of this study, we simulated the procedure using Bedau's <ref type="bibr" target="#b8">[9]</ref> weak emergence definition. A weak emergence may be proven by simulation, and it is predicted and perhaps regulated in particular systems. The modeling of flocking in the Boids model, for example, is controlled by three rules: separation, cohesion, and alignment. The application of these criteria will result in grouping behavior (emergence). Experts may either increase or eliminate flocking by changing a few settings.</p><p>To define the technique after identifying the emergence's type we're interested in, we used Fromm's type II class of emergence <ref type="bibr" target="#b9">[10]</ref>. Fromm provided a taxonomy that categorizes four types of emergence based on distinct feedback patterns. Simple feedback (Negative or Positive) is the major characteristic of (Type II), which is defined as a top-down interaction from the macro to micro level. Positive feedbacks are preventative orders that ensure the system does not diverge into detrimental behavior, according to Fromm. Negative feedbacks are restricting to the behaviors of the agents (e.g. swarm intelligence) (e.g. Avoiding financial bubbles), To exemplify this class, in the Boids model, the Separation rule is deemed Positive if the expert does not want the birds to flock; on the other hand, removing this rule will cause the birds to swarm quickly.</p><p>Researchers have been attempting to measure emergence for a long time. As an example. <ref type="bibr" target="#b10">[11]</ref> described emergent behavior as state-changing points and stated that algorithms may be effective in verifying emergent behavior. <ref type="bibr" target="#b11">[12]</ref> employed interaction statistics as a measure to examine the emergence of emergent behaviors using Agent-based simulation (ABS). <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref> proposed an ontologybased system for semantically validating emergence, which employed a semantic state distance metric to quantify semantic differences between component attribute values. <ref type="bibr" target="#b14">[15]</ref> provides a collection of metrics-based strategies for analyzing vision-based vehicle behavior. <ref type="bibr" target="#b15">[16]</ref> uses an age metric to identify and characterize emergence utilizing swarms of Unmanned Aerial Vehicles (UAVs). <ref type="bibr" target="#b16">[17]</ref> proposed a statistic meter for detecting emergence and demonstrated how communication in disputed contexts is impacted.</p><p>Traditional models (mathematical, statistical) when the data is represented by equations to create the model, see Niharika et al., <ref type="bibr" target="#b17">[18]</ref>, have been used to detect shifting points in weather forecasting. Big data and learning-based models are being used in recent methods. Read <ref type="bibr" target="#b18">[19]</ref> for further information on Big Data and Learning Models. Yu Zheng <ref type="bibr" target="#b19">[20]</ref> employed an inflection predictor in his model, and Yu Zheng used an inflection module to capture unexpected changes in air grade in a noteworthy paper. In general, emergence verification research has progressed, however, there is still a lack in using interaction as metrics for the emergence detection. Although it is not debatable that interaction is a critical aspect in emergence, few existing approaches have addressed the analysis of massive simulation data using wellknown statistical techniques. to deal with the mentioned limitations, we present our approach in the next section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Proposed Approach</head><p>In this section we present the multi-agent simulation framework (Figure <ref type="figure" target="#fig_1">2</ref>) that consists of two components, agent-based simulation engine and fuzzy-based classification engine. These two components communicate with each other to implement their functionality. The main functionality of the simulation engine during the simulation is to retrieve data which will be passed to the fuzzy system to verify emergence. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Simulation engine</head><p>The simulation system is based on Boids model which simulates a flight of birds. Emergence is detected when a flocking situation take place, as mentioned in section II, in Boids model, an emergence behaviour i.e (packing), happens every time. Simulations were conducted using NetLogo <ref type="bibr" target="#b32">[33]</ref>, which is a well-known ABS plat-from. Figure <ref type="figure" target="#fig_2">3</ref> presents a simulation in which, a normal behaviour i.e., no packing behaviour, only the Separation rule is on. The agent number is 50, Ticks = 300 steps.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Data retriever</head><p>Figure <ref type="figure" target="#fig_3">4</ref> shows several grouping behaviours. During the simulation, data is retrieved automatically into an excel file using a Netlogo Spreadsheet extension, (see Figure <ref type="figure" target="#fig_5">5</ref>). The dataset represents the agents' interactions, in the context of Boids model, there are three type of interaction, all physical, no messages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Cohesion: Each time an agent does an action of cohesion with a neighbor • Alignment: Each time an agent does an action of alignment with a neighbor • Separation: Each time an agent does an action of separation to avoid collision with a neighbor</p><p>Every time an interaction is detected, a proper counter is incremented.  The following presents some of the simulation results: Results with agent population = 5. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Verification module</head><p>In this work, the fuzzy system is a rule-based classification system (FRBCS) using Chi's method. This method was introduced by Chi et al. <ref type="bibr">(1996)</ref>, which is an extension of Wang and Mendel's method, for treating classification problems. The Knowledge Base: it is composed of both the Rule Base (RB) and the Data Base, where the rules and the membership functions are stored respectively.</p><p>To build the rule base, we use an extension of the specification given by Singh <ref type="bibr" target="#b4">[5]</ref>,</p><p>TypeII ≡ EmergentBehavior ⊓ ∃hasParticipant.(System ⊓ sendNegativeFeedbackTo.Component). We transform every rule into the following fuzzy rule: Rule Rj 𝑖𝑓 𝑥 1 𝑖𝑠 𝐴 𝑗1 𝑎𝑛𝑑 … 𝑎𝑛𝑑 𝑥 𝑛 𝑖𝑠 𝐴 𝑗𝑛 𝑡ℎ𝑒𝑛 𝐶𝑙𝑎𝑠𝑠 = 𝐶 𝑗 𝑤𝑖ℎ 𝑅𝑊 𝑗</p><p>(1)</p><formula xml:id="formula_0">𝑅𝑊 𝑗 = 𝐶𝐹 = ∑ 𝑈𝐴 𝑗(𝑋 𝑝 ) 𝑥𝑝 ∈𝐶𝑙𝑎𝑠𝑠 𝐶 𝑗 ∑ 𝑈𝐴 𝑗(𝑋 𝑝 ) 𝑝 𝑝=1<label>(2)</label></formula><p>We obtain: IF E=1 and NfB = 1 THEN C=1 when:</p><p>• E is the emergent beaviour, equal to 1 i.e verifier (in Boids thats always the case) • NfB stands for Neative Feed Back (Fromm's condition for class number 1 to be verified) • C is the fuzzy class, in FBRCS, it is the consequence part of the rules, in this case for this rule, C=1 so type II emergence is verified (weak emergence).</p><p>The membership function contains three fuzzy sets for each interaction (Cohesion, Separation, Alignment) variable (Low, Medium, High).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>In recent years, emergence has become an important research focus. Emergence can be positive or negative and appears in a variety of systems. Therefore, we need a mechanism that provides a structured approach for analysis and control of such behaviors. In this paper, we investigated the use of fuzzy rulebased classification system combined with data retrieved from an ABS to verify and classify emergence. Emergent behaviour is verified before-hand in many ABS models such as the Boids model, however, detecting and classifying that phenomena is challenging. To address this issue, we propose a method to classify the flocking behaviour in multi-agent system with a fuzzy system. At this moment, we are extending the rules data base and we are testing it. The first results are promising and we are aiming to validate this method with other ABS systems using more complex models.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Boids' rules</figDesc><graphic coords="3,86.20,160.54,438.00,178.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Proposed framework showing fuzzy and simulation-based engines.</figDesc><graphic coords="5,86.20,72.00,429.75,235.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Simulation of 50 agents in Boids.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4</head><label>4</label><figDesc>Figure4shows an emergence behaviour example, multiple groups of birds are visible, in this case, the simulation data is retrieved and passed for the verification module.</figDesc><graphic coords="5,86.20,454.56,451.00,219.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Emergent behaviour</figDesc><graphic coords="6,86.20,72.00,401.25,215.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Data retrieval process</figDesc><graphic coords="6,86.20,538.62,396.75,170.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Simulation data extraction</figDesc><graphic coords="7,86.20,72.00,443.25,237.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Membership function</figDesc><graphic coords="8,86.20,306.93,387.00,173.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell cols="2">Fromm's emergence classification [8]</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Type</cell><cell>Name</cell><cell>Roles</cell><cell>Frequency</cell><cell>Predictability</cell><cell>System</cell></row><row><cell>I</cell><cell>Nominal or</cell><cell>fixed</cell><cell>abundant</cell><cell>predictable</cell><cell>closed, with</cell></row><row><cell></cell><cell>Intentional</cell><cell></cell><cell></cell><cell></cell><cell>passive entities</cell></row><row><cell>II</cell><cell>Weak</cell><cell>Flexible</cell><cell>frequent</cell><cell>predictable in</cell><cell>open, with</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>principle</cell><cell>active entities</cell></row><row><cell>III</cell><cell>Multiple</cell><cell>Fluctuating</cell><cell>common -</cell><cell>not</cell><cell>open, with</cell></row><row><cell></cell><cell></cell><cell></cell><cell>unusual</cell><cell>predictable</cell><cell>multiple levels</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>(or chaotic)</cell><cell></cell></row><row><cell>IV</cell><cell>Strong</cell><cell>New World</cell><cell>Rare</cell><cell>Not</cell><cell>New or many</cell></row><row><cell></cell><cell></cell><cell>of roles</cell><cell></cell><cell>predictable in</cell><cell>systems</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>principle</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell cols="2">Fromm's emergence classification [8]</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Interaction</cell><cell>Steps</cell><cell>Separation</cell><cell>Alignment</cell><cell>Cohesion</cell><cell>Emergence</cell></row><row><cell>I= (S, A, C)</cell><cell>1000</cell><cell>300</cell><cell>1054</cell><cell>1054</cell><cell>Groups</cell></row><row><cell>I = (S, A, C) at</cell><cell>3000</cell><cell>5234</cell><cell>6816</cell><cell>6816</cell><cell>Full</cell></row><row><cell>step 3000</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>I = (S, A, C, A)</cell><cell>1000</cell><cell>14</cell><cell>6876</cell><cell>3438</cell><cell>Full</cell></row><row><cell>I= (S, C)</cell><cell>1000</cell><cell>16</cell><cell>0</cell><cell>0</cell><cell>None</cell></row><row><cell>I= (S, A)</cell><cell>1000</cell><cell>12</cell><cell>2893</cell><cell>0</cell><cell>Full</cell></row><row><cell>I= (S, A, A)</cell><cell>1000</cell><cell>0</cell><cell>8142</cell><cell>0</cell><cell>Full</cell></row><row><cell>I= (S, C, C)</cell><cell>1000</cell><cell>4</cell><cell>0</cell><cell>128</cell><cell>None</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>(N= None) for emergence, for the type, as mentioned before, the result will be 1 for weak emergence and 2 for Strong emergence. After learning fuzzy if-then rules by training patterns, different weights and constants values were used. Different weights were assigned to the rules to decrease correct classification rates. The two classes get the highest classification rate for wp=0.25. Table4. presents the results of the correct classification.</figDesc><table><row><cell>Sample fuzzy rule</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>If</cell><cell></cell><cell></cell><cell>Then</cell><cell></cell></row><row><cell>Rule number</cell><cell>Cohesion</cell><cell>Separation</cell><cell>Alignment</cell><cell>Emergence</cell><cell>Type</cell></row><row><cell>1</cell><cell>L</cell><cell>H</cell><cell>L</cell><cell>N</cell><cell>/</cell></row><row><cell>2</cell><cell>H</cell><cell>L</cell><cell>H</cell><cell>Y</cell><cell>1</cell></row><row><cell>3</cell><cell>L</cell><cell>M</cell><cell>L</cell><cell>N</cell><cell>/</cell></row><row><cell>4</cell><cell>H</cell><cell>M</cell><cell>H</cell><cell>Y</cell><cell>1</cell></row><row><cell>5</cell><cell>L</cell><cell>H</cell><cell>M</cell><cell>N</cell><cell>/</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4</head><label>4</label><figDesc>Sample of preliminary Results of correct classification rates with different weighting rules.</figDesc><table><row><cell>𝜂</cell><cell>𝑤𝑝 for all classes</cell><cell>Cost(𝑆)</cell><cell>Classification rate</cell></row><row><cell>0.1</cell><cell>𝑤 𝑝 = 0.25 for all lasses</cell><cell>8</cell><cell>91.3%</cell></row><row><cell>0.3</cell><cell>𝑤𝑝= 0.25 for all classes</cell><cell>9.3</cell><cell>90.4%</cell></row><row><cell>0.1</cell><cell>𝑥𝑝 ∈ class 1 𝑤𝑝= 0.5,</cell><cell>11</cell><cell>89.1%</cell></row><row><cell></cell><cell>𝑥𝑝∈ class 2 𝑤𝑝= 0.25</cell><cell></cell><cell></cell></row><row><cell>0.3</cell><cell>𝑥𝑝 ∈ class 1 𝑤𝑝= 0.5,</cell><cell>15</cell><cell>80.3%</cell></row><row><cell></cell><cell>𝑥𝑝∈ class 2 𝑤𝑝= 0.25</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Acknowledgements</head><p>The author would like to thank the DGRSDT (General Directorate of Scientific Research and Technological Development) -MESRS (Ministry of Higher Education and Scientific Research), ALGERIA, for the financial support of LISCO Laboratory.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">-A Formal Approach to the Engineering of Emergence and its Recurrence‖</title>
		<author>
			<persName><forename type="first">M</forename><surname>Randles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Taleb-Bendiab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc of 2nd International Workshop on Engineering Emergence in Decentralized Autonomic Systems</title>
				<meeting>of 2nd International Workshop on Engineering Emergence in Decentralized Autonomic Systems</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Agent-based simulation of autonomous vehicles: A systematic literature review</title>
		<author>
			<persName><forename type="first">P</forename><surname>Jing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="79089" to="79103" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">-Emergence as a construct: History and issues</title>
		<author>
			<persName><forename type="first">J</forename><surname>Goldstein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Emergence: Complexity and Organization</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="49" to="72" />
			<date type="published" when="1999">1999cxc</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">-What are emergent properties and how do they affect the engineering of complex systems?</title>
		<author>
			<persName><forename type="first">C</forename><surname>Johnson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">91</biblScope>
			<biblScope unit="page" from="1475" to="1481" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">-Detection and classification of emergent behaviors using multi-agent simulation framework (WIP)</title>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Symposium on Modeling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems (MSCIAAS &apos;17</title>
				<editor>
			<persName><forename type="first">Saurabh</forename><surname>Mittal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Jose</forename><surname>Luis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Risco</forename><surname>Martin</surname></persName>
		</editor>
		<meeting>the Symposium on Modeling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems (MSCIAAS &apos;17<address><addrLine>San Diego, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Society for Computer Simulation International</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">3</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">-Flocks, herds and schools: A distributed behavioral model‖</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Reynolds</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGGRAPH computer graphics</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="25" to="34" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Emergence phenomena in self-organizing systems: a systematic literature review of concepts, researches, and future prospects</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kalantari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Nazemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Masoumi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Organizational Computing and Electronic Commerce</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="224" to="265" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Types and Forms of Emergence‖</title>
		<author>
			<persName><forename type="first">J</forename><surname>Fromm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">complexity Digest</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Weak emergence,‖ In Philosophical perspectives: Mind, causation, and world</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bedau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Tomberlin</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="375" to="399" />
			<date type="published" when="1997">1997</date>
			<publisher>Blackwell Publishers</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Fromm</surname></persName>
		</author>
		<title level="m">The emergence of complexity</title>
				<meeting><address><addrLine>Kassel</addrLine></address></meeting>
		<imprint>
			<publisher>Kassel University Press</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Discovering emergent behaviour from network packet data: Lessons from the angle project</title>
		<author>
			<persName><forename type="first">R</forename><surname>Grossman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">An exploration-based taxonomy for emergent behaviour analysis in simulations</title>
		<author>
			<persName><forename type="first">R</forename><surname>Gore</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><surname>Reynolds</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2007 Winter Simulation Conference</title>
				<editor>
			<persName><forename type="first">S</forename><forename type="middle">G</forename><surname>Henderson</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Biller</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M.-H</forename><surname>Hsieh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Shortle</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Tew</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Barton</surname></persName>
		</editor>
		<meeting>the 2007 Winter Simulation Conference<address><addrLine>Piscataway, New Jersy</addrLine></address></meeting>
		<imprint>
			<publisher>Institute of Electrical and Electronics Engineers</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="1232" to="1240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An Objective-based Approach for Semantic Validation of Emergence in Component-based Simulation Models</title>
		<author>
			<persName><forename type="first">C</forename><surname>Szabo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">M</forename><surname>Teo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Formalization of weak emergence in multiagent systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Szabo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">M</forename><surname>Teo</surname></persName>
		</author>
		<idno type="DOI">10.1145/2815502</idno>
		<idno>DOI:</idno>
		<ptr target="http://dx.doi.org/10.1145/2815502" />
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Model. Comput. Simul</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">25</biblScope>
			<date type="published" when="2015-09">September 2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Looking at Vehicles on the Road: A Survey of Vision-Based Vehicle Detection, Tracking, and Behavior Analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sivaraman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Intelligent Transportation Systems</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Viewing control structures as patterns of message passing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Hewitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="323" to="374" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Simulating the effect of degraded wireless communications on emergent behavior</title>
		<author>
			<persName><surname>Fraser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Winter Simulation Conference</title>
				<imprint>
			<publisher>WSC</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A review of artificial neural network models for ambient air pollution prediction</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Cabaneros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Calautit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Hughes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Environmental Modelling &amp; Software</title>
		<imprint>
			<biblScope unit="volume">119</biblScope>
			<biblScope unit="page" from="285" to="304" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">-Air Quality Prediction: Big Data and Machine Learning Approaches</title>
		<author>
			<persName><forename type="first">Kaur</forename><surname>Gaganjot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jerry</forename><forename type="middle">Zeyu</forename><surname>Kang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sen</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shengqiang</forename><surname>Chiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gang</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><surname>Xie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Environmental Science and Development</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="8" to="16" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Forecasting Fine-Grained Air Quality Based on Big Data‖</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Xiuwen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ruiyuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhangqing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Tianrui</surname></persName>
		</author>
		<idno type="DOI">10.1145/2783258</idno>
		<idno>.2788573. 2015</idno>
		<ptr target="https://doi.org/10.1145/2783258" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD &apos;15)</title>
				<meeting>the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD &apos;15)<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<biblScope unit="page" from="2267" to="2276" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Interaction metric of emergent behaviours in agent-based simulation</title>
		<author>
			<persName><forename type="first">W</forename></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Chan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2011 Winter Simulation Conference</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Jain</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Creasey</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Himmelspach</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>White</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Fu</surname></persName>
		</editor>
		<meeting>the 2011 Winter Simulation Conference</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Silhouettes: A graphical aid to the interpretation and validation of cluster analysis</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Rousseeuw</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational and Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="53" to="65" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">A Different Universe: Reinventing Physics from the Bottom Down</title>
		<author>
			<persName><forename type="first">Robert</forename><surname>Laughlin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Basic Books</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Fuzzy sets</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zadeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">‖ Information Control</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="338" to="353" />
			<date type="published" when="1965">1965</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A systematic review of fuzzing based on machine learning techniques</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">PloS one</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page">e0237749</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">-An experiment in linguistic synthesis with a fuzzy logic controller</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">H</forename><surname>Mamdani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Assilian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Man-Machine Studies</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Application of fuzzy logic to approximate reasoning using linguistic synthesis</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">H</forename><surname>Mamdani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the sixth international symposium on Multiple-valued logic</title>
				<meeting>the sixth international symposium on Multiple-valued logic<address><addrLine>Los Alamitos, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society Press</publisher>
			<date type="published" when="1976">1976</date>
			<biblScope unit="page" from="196" to="202" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Heuristic design of fuzzy inference systems: A review of three decades of research</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ojha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Abraham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Snášel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Engineering Applications of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="page" from="845" to="864" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">A comprehensive review on type 2 fuzzy logic applications: Past, present and future</title>
		<author>
			<persName><forename type="first">K</forename><surname>Mittal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Vaisla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Castillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kacprzyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Engineering Applications of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page">103916</biblScope>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Survey on fuzzy-logic-based guidance and control of marine surface vehicles and underwater vehicles</title>
		<author>
			<persName><forename type="first">X</forename><surname>Xiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lapierre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Fuzzy Systems</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="572" to="586" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Enhancing the data mining tool WEKA</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kotak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Modi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th International Conference on Computing, Communication and Security (ICCCS)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">H</forename><surname>Witten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Frank</surname></persName>
		</author>
		<title level="m">Data Mining: Practical Machine Learning Tools and Techniques</title>
				<meeting><address><addrLine>San Francisco</addrLine></address></meeting>
		<imprint>
			<publisher>Morgan Kaufmann</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">U</forename><surname>Wilensky</surname></persName>
		</author>
		<ptr target="&lt;http://ccl.northwestern.edu/netlogo/&gt;" />
		<title level="m">Netlogo. Evanston, IL: Center for Connected Learning and Computer-Based Modeling</title>
				<imprint>
			<date type="published" when="1999-10-10">1999. October 10, 2010</date>
		</imprint>
		<respStmt>
			<orgName>Northwestern University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A new expert system based on fuzzy logic and image processing algorithms for early glaucoma diagnosis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Soltani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Battikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jabri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lakhoua</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Biomedical Signal Processing and Control</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="366" to="377" />
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Interactions-based method to detect emergent behavior in ongoing simulations</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boukehila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Taleb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Benazzouz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Modeling, Simulation, and Scientific Computing</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">04</biblScope>
			<biblScope unit="page">2150022</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Case-Based Approach to Detect Emergence</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boukehila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Taleb</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 3rd International Conference on Big Data Research</title>
				<meeting>the 2019 3rd International Conference on Big Data Research</meeting>
		<imprint>
			<date type="published" when="2019-11">2019. November</date>
			<biblScope unit="page" from="98" to="102" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Statistical Study To Detect Emergent Behaviours</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boukehila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Taleb</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2nd International Conference on Mathematics and Information Technology (ICMIT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020-02">2020. February. 2020</date>
			<biblScope unit="page" from="164" to="168" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
