期刊文献+

一种新的基于Fuzzy c-means的高效自适应截集算法

A New Effective Section Set Adaptive Algorithm Based on Fuzzy c-means
下载PDF
导出
摘要 提出了一种新的模糊聚类方法-自适应截集算法。该方法克服了聚类数目c要求预先确定、局部最优、分类不确定等弱点,对算法结构加以改进,增加聚类有效性问题的分析,在聚类过程中可动态调整聚类数目。针对时间消耗问题,利用模糊截集提高分类识别的速度。经实验表明,本算法可以提高聚类算法的可靠程度和分类识别的正确性。 This paper presents a new section set adaptive FCM algorithm. The algorithm solves the weakness of local optimality, unsure classification and numbers of clustering ascertained previously. And it improves on the architecture of FCM's algorithm, enhances the analysis for effective clustering. During the process of cluster, it may adjust numbers of cluster dynamically. Finally, it uses the method of section set decreasing the time of classification. By experiments, the algorithm can improve dependability of clustering and correctness of classification.
机构地区 佳木斯大学
出处 《现代电子技术》 2006年第14期100-101,104,共3页 Modern Electronics Technique
关键词 模糊聚类 聚类数 自适应截集算法 聚类分析 fuzzy cluster numbers of clustering section set adaptive algorithm clustering analysis
  • 相关文献

参考文献5

  • 1Kamel S Mohamed. New Algorithms for Solving the Fuzzy c-means Clustering Problem[J]. Pattern Recognition, 1994,27(3):421-428.
  • 2James C,Bezdek A. Convergence Theorem for the Fuzzy ISODATA Clustering Algorithms[J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 1980, PAMI-2(1):1 -8.
  • 3Hiren Shah,Jeffrey Undercoffer, Anupam Joshi. Fuzzy Cluster for Intrusion Detection i-J-I. IEEE, International Conference on Fuzzy System,2003:1 274-1 278.
  • 4Xie XL, Beni G. A Validity Measure for Fuzzy Clustering[J]. IEEE Trans. Part. Anal. Machine Intell., 1991,13 (8):841-847.
  • 5饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部