期刊文献+

一种基于人工免疫网络的文本聚类算法 被引量:1

A Document Clustering Algorithm Based on Artificial Immune Networks
下载PDF
导出
摘要 本文构造了一种能准确描述文本之间相似性(亲和力)的新方法,并在此基础上提出了一种基于人工免疫网络的文本聚类算法。仿真结果表明,与传统的文本聚类算法相比,新算法不仅能自动发现新类,而且具有聚类精度更高、数据压缩比更大、与输入初始配置无关、可增量处理的优势。 A new method which can accurately compute the affinity between documents is presented in this paper. By using the method a document clustering algorithm based on artificial immune networks is proposed. Simulation results show that the new algorithm can not only locate new clusters automatically, but has the advantage of being independent of the input initialization and incremental clustering ability as well, where it has better clustering quality and higher data compression rate than some current document clustering algorithms.
机构地区 中山大学电子系
出处 《计算机工程与科学》 CSCD 2007年第10期17-19,49,共4页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60575006)
关键词 亲和力计算 人工免疫网络 文本聚类 affinity computing artificial immune network document clustering
  • 相关文献

参考文献16

  • 1Chakrabarti S. Mining the Web Discovering Knowledge from Hypertext Data[M]. San Francisco: Morgan Kaufmann Publishers, 2003.
  • 2Selim S Z K-Means-Type Algorithms: A Generalhed Convergence Theorem and Characterization of Local Optimality[J]. IEEE Tram on Pattern Analysis and Machine Intelligence, 1984, 6(1) : 81-87.
  • 3Yang Y. An Evaluation of Statistical Approaches to Text Categorization[J]. Journal of Information Retrieval, 1999, 1(1-2) : 67-88.
  • 4Hyotyniemi H. Text Document Classification with Self-Organizing Maps[A]. Proc of Finnish Artificial Intelligence Conference-Genes, Nets and Symbols[C]. 1996. 64-72.
  • 5李涛.基于免疫的网络监控模型[J].计算机学报,2006,29(9):1515-1522. 被引量:53
  • 6Dasgupta D, Gonzalez F. An Immunity-Based Technique to Characterize Intrusions in Computer Networks[J]. IEEE Trans on Evolutionary Computation, 2002,6 (3):1081-1088.
  • 7Kim J, Bentley P J. Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection[A]. Proe of the Congress on Evolutionary Computation[C]. 2002. 1015-1020.
  • 8Li Z,Tan H-Z. A Combinational Clustering Method Based on Artificial Immune System and Support Vector Machine[A]. Lecture Notes in Artificial Intelligence[M]. 2006, 153-162.
  • 9Femando L N de C, von Zuben J. An Evolutionary Immune Betwork for Data Clusterlng[A]. Proe of the 6th Brazilian Symposium on Neural Network[C]. 2000. 84-89.
  • 10Jerne N K. Towards a Network Theory of the Immune System, Annals of Immunology [J]. Annals of Immunology, 1973,125C: 373-389.

二级参考文献21

  • 1Butler D.. Computer security: Who's been looking at your data? Nature, 2002, 418:580-582
  • 2Albert R. , Jeong H. , Barabasi A. L.. Diameter of the worldwide Web. Nature, 1999, 401:130-131
  • 3Balthrop J. , Forrest S. , Newman M. E. J. , Williamson M.M.. Technological networks and the spread of computer viruses. Science, 2004, 304(5670): 527-529
  • 4Staniford S. , Paxson V. , Weaver N.. How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, San Francisco Marriott, 2002, 149-167
  • 5Morda D.. Public monitoring. In: Proceedings of the 16th FIRST Conference on Computer Security Incident Handling Response, Budapest, 2004, 81-88
  • 6Albert R. , Jeong H. , Barabasi A.L.. Attack and error tolerance of complex networks. Nature, 2002, 406:378-382
  • 7Klarreich E.. Inspired by Immunity, Nature, 2002, 415:468-470
  • 8Forrest S. , Perelson A. S.. Self-nonself discrimination in a computer. In; Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1994, 202-213
  • 9Hofmeyr S. , Forrest S.. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473
  • 10Harmer P. K. , Williams P. D. , Gunsch G. H. , Lamont G. B.An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation,2002, 6(3): 252-280

共引文献52

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部