The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Firstly, the paper makes a briefly analysis and comment about the fuzzy c-means clustering algorithm. Then a new kind of hybrid genetic algorithm is proposed on the base of the combination of genetic algorithm and simulated annealing algorithm, and it is applied in fuzzy c-means clustering. It overcomes the locality and the Sensitivity to initial clustering central of fuzzy c-means clustering, by...
Intrusion detection technique has become increasingly important in the area of network security research. It is innovative that various soft computing approaches have been applied to the intrusion detection field. This paper presents an intelligent intrusion detection system which incorporates several soft computing techniques to implement either misuse or anomaly detection. Genetic algorithm is used...
In this paper, a new radial basis function (RBF) neural network with fuzzy c-means clustering algorithm based on genetic algorithm (GA) is proposed for the fault diagnosis of gyroscopes and accelerometers of strapdown inertial navigation system (SINS). The fuzzy c-means algorithm (FCM) tends to fall into the local optimum. The fuzzy c-means clustering algorithm combined with GA (FGA) obtains the global...
With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. This paper presents an approach incorporating several soft computing techniques to construct a hierarchical neuro-fuzzy inference intrusion detection system which can implement either misuse or anomaly detection. In the proposed system principal component analysis neural network...
To determine typical flood hydrographs by making full use of observed data, the fuzzy c-means (FCM) clustering algorithm is used to cluster all observed hydrographs into several clusters, each of which gives a typical hydrograph. Because it is prone to fall into local optimum, especially when dealing with massive high dimensional data as in the flood hydrograph classification, the conventional FCM...
With the growing changes in global market, manufacturing enterprise needs more agility to fulfill customized demand. Holonic manufacturing system (HMS) has advantages of both hierarchical and heterarchical structure, and is an effective way for manufacturing enterprises to be competitive. However, interaction among a large number of holons is complex. In this paper, two methods are presented as tools...
We constructed a code book (CB) for vector quantization (VQ) of an image using a real-coded genetic algorithm (GA). Simulated binary crossover (SBX) and a minimum generation gap (MGG) were employed in the GA as a crossover and selection, respectively. We compared the performance three algorithms for construction of a CB: fuzzy c means, read-coded GA, and a combination of two algorithms in which a...
For overcoming the shortcoming that Fuzzy c-Means (FCM) clustering algorithm seriously depends on the initial values of clustering numbers (c) and fuzzy exponent (m), we introduce genetic algorithm to find the pair parameters of FCM simultaneity. In the proposed algorithm, the clustering numbers and the fuzzy exponent are controlled by a binary code. In order to optimize the two parameters, new methods...
The logistic distribution under electronic commerce has the characteristic of dispersive customer positions, large order forms, little batches and many repeated routes. The traditional optimizing vehicle routing problems meet with diversified problems in different extents and are difficult to play their roles. Therefore, according to the particularity of logistic distribution under electronic commerce,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.