Computational Intelligence

Computational intelligence, also known as soft computing, is a form of computing modeled on the methods by which humans learn. As computers learn from processes based on logic and science, they become more intelligent. This differs from artificial intelligence in its perspective on imperfection: computational intelligence focuses on the growth of a system and does not use Boolean values (0s and 1s) to achieve learning, where AI does. Computational intelligence uses different branches of science, such as math and logic, to develop machine learning algorithms.

Computational intelligence consists of three main aspects:

Fuzzy logic: unlike artificial intelligence, computational intelligence (CI) enables systems to grow and learn with imperfect, incomplete knowledge. CI may have different degrees of information and process without full understanding. This logic is typically developed by showing images to a computer and allowing it to differentiate between content.

Artificial neural networks: these processes are designed to imitate the brain. The system learns by being given different image examples and being told different things about those images. Having many layers of learning, some more complex than others, is also known as deep learning.

Evolutionary computation: concepts from evolutionary theory, including natural selection and swarm intelligence, can be applied to computing systems. Researchers study animal groups to learn how a group behaves together and on its own, with no clear leadership – yet the group still maintains intelligence. Computing systems, then, could perhaps display intelligence and decision-making without having a human source of leadership.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...