Modified Floating Search Feature Selection Based on Genetic Algorithm
نویسندگان
چکیده
منابع مشابه
Feature Selection Based on Genetic Algorithm in the Diagnosis of Autism Disorder by fMRI
Background: Autism Spectrum Disorder (ASD) occurs based on the continuous deficit in a person’s verbal skills, visual, auditory, touch, and social behavior. Over the last two decades, one of the most important approaches in studying brain functions in autistic persons is using functional Magnetic Resonance Imaging (fMRI). Objectives: It is common to use all brain regions in functional extracti...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملAdaptive floating search methods in feature selection
Publication information: Pattem Recwnition Letters (ISSN 0167-8655). For 1999. Volume 20 is scheduled for publication. Subscription prices are available upon request from the Publisher o; from the ~ e ~ i o n a l Sales Office nearest you or from this'journal's website (http:l/ www.elsevier.nl/locate/patrec). Further information is available on this journal and other Elsevier Science products th...
متن کاملFloating search methods in feature selection
Sequential search methods characterized by a dynamically changing number of features included or eliminated at each step, henceforth "floating" methods, are presented. They are shown to give very good results and to be computationally more effective than the branch and bound method.
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: MATEC Web of Conferences
سال: 2018
ISSN: 2261-236X
DOI: 10.1051/matecconf/201816401023