Displaying similar documents to “Neuro-rough-fuzzy approach for regression modelling from missing data”

Evolution-fuzzy rule based system with parameterized consequences

Piotr Czekalski (2006)

International Journal of Applied Mathematics and Computer Science

Similarity:

While using automated learning methods, the lack of accuracy and poor knowledge generalization are both typical problems for a rule-based system obtained on a given data set. This paper introduces a new method capable of generating an accurate rule-based fuzzy inference system with parameterized consequences using an automated, off-line learning process based on multi-phase evolutionary computing and a training data covering algorithm. The presented method consists of the following steps:...

Fuzzy approach for data association in image tracking.

Julio García, José Manuel Molina, Juan Alberto Besada, Javier I. Portillo (2003)

Mathware and Soft Computing

Similarity:

A fuzzy system has been developed to ponder update decisions both for the trajectories and shapes estimated for targets. It is embedded in an A-SMGCS Surveillance function for airport surface, based on video data processing, in charge of the automatic detection, identification and tracking of all interesting targets (aircraft and relevant ground vehicles). The tracking system captures a sequence of images, preprocesses them to extract the moving regions (blobs), and associates the blobs...

On the comparison of some fuzzy clustering methods for privacy preserving data mining: Towards the development of specific information loss measures

Vicenç Torra, Yasunori Endo, Sadaaki Miyamoto (2009)

Kybernetika

Similarity:

Policy makers and researchers require raw data collected from agencies and companies for their analysis. Nevertheless, any transmission of data to third parties should satisfy some privacy requirements in order to avoid the disclosure of sensitive information. The areas of privacy preserving data mining and statistical disclosure control develop mechanisms for ensuring data privacy. Masking methods are one of such mechanisms. With them, third parties can do computations with a limited...

Dual meaning of verbal quantities

Milan Mareš, Radko Mesiar (2002)

Kybernetika

Similarity:

The aim of the paper is to summarize and interpret some ideas regarding effective processing of vague data. The main contribution of the submitted approach consists in respecting the fact that vague data can be decomposed into two parts. The numerical one, describing the quantitative value of such data, and the semantic one characterizing the qualitative structure of the vagueness included into them. This partition of vague verbal data leads to a significant simplification of their practical...

An ε-insensitive approach to fuzzy clustering

Jacek Łęski (2001)

International Journal of Applied Mathematics and Computer Science

Similarity:

Fuzzy clustering can be helpful in finding natural vague boundaries in data. The fuzzy c-means method is one of the most popular clustering methods based on minimization of a criterion function. However, one of the greatest disadvantages of this method is its sensitivity to the presence of noise and outliers in the data. The present paper introduces a new ε-insensitive Fuzzy C-Means (εFCM) clustering algorithm. As a special case, this algorithm includes the well-known Fuzzy C-Medians...

Fuzzy clustering: Insights and new approach.

Frank Klawonn (2004)

Mathware and Soft Computing

Similarity:

Fuzzy clustering extends crisp clustering in the sense that objects can belong to various clusters with different membership degrees at the same time, whereas crisp or deterministic clustering assigns each object to a unique cluster. The standard approach to fuzzy clustering introduces the so-called fuzzifier which controls how much clusters may overlap. In this paper we illustrate, how this fuzzifier can help to reduce the number of undesired local minima of the objective function that...