2011
DOI: 10.1016/j.amc.2011.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Automatic clustering using genetic algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
84
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 105 publications
(85 citation statements)
references
References 31 publications
0
84
0
1
Order By: Relevance
“…The noise method guiding the heuristic search produces to explore the solution space has led to the proposal of the recent combinatorial optimization metaheuristics technique [38], which has been applied to K-means clustering [22], as well as other application fields of the noising method such as task allocation [39], and the clique partitioning problem [40]. In addition, the noise method considers the optimal results as the outcome of a series of fluctuating data converging towards the genuine ones, and the features and the variants of the noise method are detailed, the tunings of their parameters when are applied to different combinatorial optimization problems have been summarized in [36].…”
Section: Initial Population Using Noise and K-means++ Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The noise method guiding the heuristic search produces to explore the solution space has led to the proposal of the recent combinatorial optimization metaheuristics technique [38], which has been applied to K-means clustering [22], as well as other application fields of the noising method such as task allocation [39], and the clique partitioning problem [40]. In addition, the noise method considers the optimal results as the outcome of a series of fluctuating data converging towards the genuine ones, and the features and the variants of the noise method are detailed, the tunings of their parameters when are applied to different combinatorial optimization problems have been summarized in [36].…”
Section: Initial Population Using Noise and K-means++ Methodsmentioning
confidence: 99%
“…In early GAs, 0, 1 binary digits are usually used, and it has been shown that more natural representations can obtain a more efficient and better optimal solution. However, with the increase of the length of the 0, 1 strings, more CPU computing time is needed, which causes the genetic performance to decline [20,22,36]. Therefore, OD representation is utilized to describe the chromosome in this paper; furthermore, a noise method is proposed to use the chromosomes initial selection where K-means++ is also used to select the initial seeds (see Section 2.3).…”
Section: Gps Data Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The task of clustering is to divide an unlabeled model into several subsets according to some criteria, and the similar samples are classified into the same class. Many existing clustering methods such as rough set clustering [15], fuzzy clustering [16,17] and support vector clustering [18] have been used in many fields, including data analysis, fault diagnosis, text classification, pattern recognition, image processing, radar target detection, biological engineering, space remote sensing technology, etc.…”
Section: Clustering Algorithmmentioning
confidence: 99%
“…Network security management is an important part of the protection of personal privacy and account security. It is the future development of network application that is one of the important topics [1][2][3][4][5]. Network security management mainly includes intrusion detection and trust management, that is achieved using artificial intelligence, the clustering theory and evidence theory to carry out the management of the network security, which is a clonal selection theory of clustering based on fuzzy clustering algorithm; the clonal selection method of anomaly detection based on fuzzy clustering algorithm for Intrusion Detection based on evidence theory, which proposes compensation method of the evidence combination rule and reliability of the average compensation based on the sharing of evidence combination rule based trust management; and trust management model for P2P based on the improved evidence combination rule [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%