Mining coverage-based fuzzy rules by evolutional computation

被引:6
|
作者
Hong, TP [1 ]
Lee, YC [1 ]
机构
[1] Natl Univ Kaohsiung, Dept Elect Engn, Kaohsiung, Taiwan
关键词
data mining; machine learning; genetic algorithm; fuzzy set; rule base;
D O I
10.1109/ICDM.2001.989522
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a novel mining approach based on the genetic process and an evaluation mechanism to automatically construct an effective fuzzy rule base. The proposed approach consists of three phases. fuzzy-rule generating, fuzzy-rule encoding and fuzzy-rule evolution. In the fuzzy-rule generating phase, a number of fuzzy rules are randomly generated. In the fuzzy-rule encoding phase, all the rules generated are translated into fixed-length bit strings to form an initial population, In the fuzzy-rule evolution phase, genetic operations and credit assignment are applied at the rule level. The proposed mining approach chooses good individuals in the population for mating, gradually creating better offspring fuzzy rules. A concise and compact fuzzy rule base is thus constructed effectively without human expert intervention.
引用
收藏
页码:218 / 224
页数:7
相关论文
共 50 条
  • [41] A Coverage-Based Utility Model for Identifying Unknown Unknowns
    Bansal, Gagan
    Weld, Daniel S.
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 1463 - 1470
  • [42] Intuitionistic fuzzy vector association rules mining based on dual fuzzy simulation
    Chen T.
    Fan B.
    Chen D.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2020, 26 (07): : 1875 - 1886
  • [43] Code coverage-based power estimation techniques for microprocessors
    Qu, G
    Kawabe, N
    Usami, K
    Potkonjak, M
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2002, 11 (05) : 557 - 574
  • [44] A coverage-based genetic knowledge-integration strategy
    Wang, CH
    Hong, TP
    Chang, MB
    Tseng, SS
    EXPERT SYSTEMS WITH APPLICATIONS, 2000, 19 (01) : 9 - 17
  • [45] Coverage-based cooperative target acquisition for hypersonic interceptions
    ZHOU Jin
    LEI HuMin
    Science China(Technological Sciences), 2018, 61 (10) : 1575 - 1587
  • [46] Coverage-based cooperative target acquisition for hypersonic interceptions
    Jin Zhou
    HuMin Lei
    Science China Technological Sciences, 2018, 61 : 1575 - 1587
  • [47] Coverage-based cooperative target acquisition for hypersonic interceptions
    Zhou Jin
    Lei HuMin
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2018, 61 (10) : 1575 - 1587
  • [48] Coverage-based cooperative target acquisition for hypersonic interceptions
    ZHOU Jin
    LEI HuMin
    Science China(Technological Sciences), 2018, (10) : 1575 - 1587
  • [49] Detecting Logical Bugs of DBMS with Coverage-based Guidance
    Liang, Yu
    Liu, Song
    Hu, Hong
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 4309 - 4326
  • [50] A Random and Coverage-based Approach for Fault Localization Prioritization
    Zhang, Xiao-Yi
    Towey, Dave
    Chen, Tsong Yueh
    Zheng, Zheng
    Cai, Kai-Yuan
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 3354 - 3361