2022
DOI: 10.1007/s40313-022-00975-2
|View full text |Cite
|
Sign up to set email alerts
|

Selection of Minimum Rules from a Fuzzy TSK Model Using a PSO–FCM Combination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…As shown in Table 1 , the OSNC method has fewer iterations and shorter searching time than the other methods (K-means 15 , FCM 21 , PSO-FCM 20 ). Experiments show that this method reduces the search time of the optimal segmentation number to a certain extent.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…As shown in Table 1 , the OSNC method has fewer iterations and shorter searching time than the other methods (K-means 15 , FCM 21 , PSO-FCM 20 ). Experiments show that this method reduces the search time of the optimal segmentation number to a certain extent.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
“…P2 : Simple and complex sample images were segmented using the K-MEANS 15 , FCM 21 and PSO-FCM 20 segmentation algorithm and the OSNC segmentation algorithm proposed in this paper. The results are shown in Figs.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This limitation can result in suboptimal clustering solutions, as the algorithm may not always identify the best possible cluster configuration. To overcome the limitations of FCM, researchers have explored the use of global-based optimization algorithms [37][38][39].…”
Section: Fuzzy C-means Algorithmmentioning
confidence: 99%
“…The Fuzzy Tsukamoto method offers a promising approach in this regard. By leveraging fuzzy logic, this method allows for the modeling of complex and nonlinear functions [11], providing flexibility and tolerance for imprecise data [12]. Through the application of fuzzy-based classification techniques, it becomes possible to differentiate and analyze network traffic [13], enabling the detection and mitigation of ping of death attacks.…”
Section: Introductionmentioning
confidence: 99%