Tuning FCM Parameters with AMOSA
暂无分享,去创建一个
[1] Wuling Ren,et al. Application of Network Intrusion Detection Based on Fuzzy C-Means Clustering Algorithm , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.
[2] Don-Lin Yang,et al. An efficient Fuzzy C-Means clustering algorithm , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[3] Gerardo Beni,et al. A Validity Measure for Fuzzy Clustering , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[4] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[5] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.
[6] José Antonio Lozano,et al. Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Jin-Ho Chung,et al. $k$ -Fold Cyclotomy and Its Application to Frequency-Hopping Sequences , 2011, IEEE Transactions on Information Theory.
[8] Isak Gath,et al. Unsupervised Optimal Fuzzy Clustering , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Ujjwal Maulik,et al. A Simulated Annealing-Based Multiobjective Optimization Algorithm: AMOSA , 2008, IEEE Transactions on Evolutionary Computation.
[10] Qiang Niu,et al. An improved fuzzy C-means clustering algorithm based on PSO , 2011, J. Softw..
[11] Lawrence O. Hall,et al. Convergence of the Single-Pass and Online Fuzzy C-Means Algorithms , 2011, IEEE Transactions on Fuzzy Systems.
[12] Michio Sugeno,et al. A fuzzy-logic-based approach to qualitative modeling , 1993, IEEE Trans. Fuzzy Syst..
[13] Wei Jiang,et al. Intrusion Detection Based on Improved Fuzzy C-means Algorithm , 2008, 2008 International Symposium on Information Science and Engineering.
[14] Zhiming Qu,et al. Study of Rough Set and Clustering Algorithm in Network Security Management , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[15] Qingshan Jiang,et al. An Intrusion Detection System Based on the Clustering Ensemble , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).