Proposing a features preprocessing method based on artificial immune and minimum classification errors methods

Journal of Applied Research and Technology - Tập 13 - Trang 477-481 - 2015
M. Miralvand1, S. Rasoolzadeh1, M. Majidi1
1Department of Computer Engineering Malayer Branch, Islamic Azad university Malayer, Iran

Tài liệu tham khảo

Abbasian, H., Nasersharif, B., Akbari, A., Rahmani, M., & Moin, M.S. (2008). Optimized linear discriminant analysis for extracting robust speech features. In: 3rd International Symposium on Communications, Control and Signal Processing, 2008. ISCCSP 2008 (pp. 819-824). IEEE. Ayara, M., Timmis, J., De Lemos, R., De Castro, L.N., & Duncan, R. (2002). Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) (Vol. 1, pp. 89-98). Canterbury, UK. De la Torre, 1996, An application of minimum classification error to feature space transformations for speech recognition, Speech Communication, 20, 273, 10.1016/S0167-6393(96)00061-1 Dunn†, 1974, Well-separated clusters and optimal fuzzy partitions, Journal of Cybernetics, 4, 95, 10.1080/01969727408546059 Garrett, 2005, How do we evaluate artificial immune systems?, Evolutionary Computation, 13, 145, 10.1162/1063656054088512 Luther, K., Bye, R., Alpcan, T., Muller, A., & Albayrak, S. (2007). A cooperative AIS framework for intrusion detection. In: IEEE International Conference on Communications, 2007. ICC’07 (pp. 1409-1416). IEEE. Mahdian, F., Rafe, V., Rafeh, R., & Miralvand, M.Z. (2009). Considering Faults in Service-Oriented Architecture: A Graph Transformation-Based Approach. In: International Conference on Computer Technology and Development, 2009. ICCTD’09 (Vol. 1, pp. 179-183). IEEE. Markowska-Kaczmar, 2008, Multi-class iteratively refined negative selection classifier, Applied Soft Computing, 8, 972, 10.1016/j.asoc.2007.07.012 Moeinzadeh, H., Nasersharif, B., Rezaee, A., & Pazhoumand-dar, H. (2009). Improving classification accuracy using evolutionary fuzzy transformation. In: Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers (pp. 2103-2108). ACM. Raahemi, 2007, Peer-to-peer IP traffic classification using decision tree and IP layer attributes, International Journal of Business Data Communications and Networking, 3, 60, 10.4018/jbdcn.2007100104 Raahemi, 2009, Exploiting unlabeled data to improve peer-to-peer traffic classification using incremental tri-training method, Peer-to-Peer Networking and Applications, 2, 87, 10.1007/s12083-008-0022-6 Rafe, 2013, Scenario-driven analysis of systems specified through graph transformations, Journal of Visual Languages & Computing, 24, 136, 10.1016/j.jvlc.2012.12.002 Rafe, 2013, Designing an architectural style for pervasive healthcare systems, Journal of Medical Systems, 37, 1, 10.1007/s10916-013-9927-6 Rafe, 2009, A Novel Approach to verify graph Schema- Based software systems, International Journal of Software Engineering and Knowledge Engineering, 19, 857, 10.1142/S0218194009004398 Watkins, 2004, Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm, Genetic Programming and Evolvable Machines, 5, 291, 10.1023/B:GENP.0000030197.83685.94