An online shadowed clustering algorithm applied to risk visualization in Territorial Security
暂无分享,去创建一个
[1] Witold Pedrycz,et al. Shadowed c-means: Integrating fuzzy and rough clustering , 2010, Pattern Recognit..
[2] Lawrence O. Hall,et al. A fuzzy c means variant for clustering evolving data streams , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[3] James M. Keller,et al. A possibilistic fuzzy c-means clustering algorithm , 2005, IEEE Transactions on Fuzzy Systems.
[4] Witold Pedrycz,et al. From fuzzy sets to shadowed sets: Interpretation and computing , 2009, Int. J. Intell. Syst..
[5] Ivan Stojmenovic,et al. The one-commodity traveling salesman problem with selective pickup and delivery: An ant colony approach , 2010, IEEE Congress on Evolutionary Computation.
[6] L.O. Hall,et al. Online fuzzy c means , 2008, NAFIPS 2008 - 2008 Annual Meeting of the North American Fuzzy Information Processing Society.
[7] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[8] Amiya Nayak,et al. An evolving risk management framework for wireless sensor networks , 2011, 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings.
[9] Andrzej Skowron,et al. Rough-Fuzzy Hybridization: A New Trend in Decision Making , 1999 .
[10] Kjetil Haslum,et al. Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models , 2006, 2006 International Conference on Computational Intelligence and Security.
[11] Bor-Chen Kuo,et al. A New Adaptive Fuzzy Clustering Algorithm for Remotely Sensed Images , 2008, IGARSS 2008 - 2008 IEEE International Geoscience and Remote Sensing Symposium.
[12] Hongsheng Xi,et al. Using hidden markov models to evaluate the real-time risks of network , 2008, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.
[13] Witold Pedrycz,et al. Evolvable fuzzy systems: some insights and challenges , 2010, Evol. Syst..
[14] L. Hall,et al. Creating Streaming Iterative Soft Clustering Algorithms , 2007, NAFIPS 2007 - 2007 Annual Meeting of the North American Fuzzy Information Processing Society.
[15] Benjamin Gâteau,et al. Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures , 2010, 2010 International Conference on Availability, Reliability and Security.