2011 6th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI) 2011
DOI: 10.1109/saci.2011.5872973
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary pruning of non-nested generalized exemplars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 10 publications
0
11
0
1
Order By: Relevance
“…Situação esperada para o caso estudado, uma vez que há pesquisas prévias indicando a baixa correlação entre consumo de água e variáveis climáticas (Silva et al, 2008). Informações adicionais acerca do algoritmo NNGE podem ser encontradas no trabalho de Zaharie et al (2011). Para utilização do algoritmo NNGE, utilizou-se a ferramenta de mineração de dados Weka (Waikato Environment for Knowledge Analysis).…”
Section: Seunclassified
“…Situação esperada para o caso estudado, uma vez que há pesquisas prévias indicando a baixa correlação entre consumo de água e variáveis climáticas (Silva et al, 2008). Informações adicionais acerca do algoritmo NNGE podem ser encontradas no trabalho de Zaharie et al (2011). Para utilização do algoritmo NNGE, utilizou-se a ferramenta de mineração de dados Weka (Waikato Environment for Knowledge Analysis).…”
Section: Seunclassified
“…Several approaches have been proposed to secure the CPPS systems such as the behavior rule-based monitoring devices methodology [1] in the smart grid that is used to detect the insider threats, the anomaly detection techniques [2], which extract the normal behaviors from various communication protocols of Industrial Control Systems (ICSs) to create a full description of the communication pattern, The Specification-Based IDS [3] that monitors system security states and sends the alerts when the system behavior approaches an unsafe or disallowed state, the common path mining approach [4] that creates an IDS using heterogeneous data for detecting power system cyberattacks using the State Tracking and Extraction Method (STEM) algorithm [5] to preprocess data and then uses frequent item set mining to extract common paths associated with specific system behaviors, and recently a NNGE with a Hoeffding Adaptive Trees approach [5,6] that is used to create an offline and online Event Intrusion Detection Systems using STEM to process the power system security datasets. However, these approaches are still neither accurate nor scalable enough to process the high speed big data of the CPPS [5,[7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…(2) Pruning of nongeneralized exemplars using the highest ranked features of the PSO: VHDRA uses the Evolutionary Pruning Algorithms (EPA-NNGE) [19] to improve the classification accuracy of NNGE and to reduce the model size by reducing the hyperrectangles and ignoring the nonselected features among the significant ones defined by PSO. (3) A horizontal reduction for the size of the dataset while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method [6], which is used to quantize and reduce the heterogeneous datasets to reduce STEM tracks system states from measurements and creates a compressed sequence of states for each observed scenario.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations