Proposing a features preprocessing method based on artificial immune and minimum classification errors methods
Tài liệu tham khảo
Abbasian, H., Nasersharif, B., Akbari, A., Rahmani, M., & Moin, M.S. (2008). Optimized linear discriminant analysis for extracting robust speech features. In: 3rd International Symposium on Communications, Control and Signal Processing, 2008. ISCCSP 2008 (pp. 819-824). IEEE.
Ayara, M., Timmis, J., De Lemos, R., De Castro, L.N., & Duncan, R. (2002). Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) (Vol. 1, pp. 89-98). Canterbury, UK.
De la Torre, 1996, An application of minimum classification error to feature space transformations for speech recognition, Speech Communication, 20, 273, 10.1016/S0167-6393(96)00061-1
Dunn†, 1974, Well-separated clusters and optimal fuzzy partitions, Journal of Cybernetics, 4, 95, 10.1080/01969727408546059
Garrett, 2005, How do we evaluate artificial immune systems?, Evolutionary Computation, 13, 145, 10.1162/1063656054088512
Luther, K., Bye, R., Alpcan, T., Muller, A., & Albayrak, S. (2007). A cooperative AIS framework for intrusion detection. In: IEEE International Conference on Communications, 2007. ICC’07 (pp. 1409-1416). IEEE.
Mahdian, F., Rafe, V., Rafeh, R., & Miralvand, M.Z. (2009). Considering Faults in Service-Oriented Architecture: A Graph Transformation-Based Approach. In: International Conference on Computer Technology and Development, 2009. ICCTD’09 (Vol. 1, pp. 179-183). IEEE.
Markowska-Kaczmar, 2008, Multi-class iteratively refined negative selection classifier, Applied Soft Computing, 8, 972, 10.1016/j.asoc.2007.07.012
Moeinzadeh, H., Nasersharif, B., Rezaee, A., & Pazhoumand-dar, H. (2009). Improving classification accuracy using evolutionary fuzzy transformation. In: Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers (pp. 2103-2108). ACM.
Raahemi, 2007, Peer-to-peer IP traffic classification using decision tree and IP layer attributes, International Journal of Business Data Communications and Networking, 3, 60, 10.4018/jbdcn.2007100104
Raahemi, 2009, Exploiting unlabeled data to improve peer-to-peer traffic classification using incremental tri-training method, Peer-to-Peer Networking and Applications, 2, 87, 10.1007/s12083-008-0022-6
Rafe, 2013, Scenario-driven analysis of systems specified through graph transformations, Journal of Visual Languages & Computing, 24, 136, 10.1016/j.jvlc.2012.12.002
Rafe, 2013, Designing an architectural style for pervasive healthcare systems, Journal of Medical Systems, 37, 1, 10.1007/s10916-013-9927-6
Rafe, 2009, A Novel Approach to verify graph Schema- Based software systems, International Journal of Software Engineering and Knowledge Engineering, 19, 857, 10.1142/S0218194009004398
Watkins, 2004, Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm, Genetic Programming and Evolvable Machines, 5, 291, 10.1023/B:GENP.0000030197.83685.94
