Applying Fuzzy Possibilistic Methods on Critical Objects

Hossein Yazdani, Daniel Ortiz-Arroyo, Kazimierz Choros, Halina Kwasnicka

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

7 Citations (Scopus)
361 Downloads (Pure)

Abstract

Providing a flexible environment to process data objects is a desirable goal of machine learning algorithms. In fuzzy and possibilistic methods, the relevance of data objects is
evaluated and a membership degree is assigned. However, some critical objects objects have the potential ability to affect the performance of the clustering algorithms if they remain in a specific cluster or they are moved into another. In this paper we analyze and compare how critical objects affect the behaviour of fuzzy possibilistic methods in several data sets. The comparison is based on the accuracy and ability of learning methods to provide a proper searching space for data objects. The membership functions used by each method when dealing with critical objects is also evaluated. Our results show that relaxing the conditions of participation for data objects in as many partitions as they can, is beneficial.
Original languageEnglish
Title of host publicationProceedings of IEEE 17th International Symposium on Computational Intelligence and Informatics
Number of pages6
PublisherIEEE Press
Publication dateNov 2016
Pages271-276
ISBN (Print)978-1-5090-3909-8/16
DOIs
Publication statusPublished - Nov 2016
EventIEEE 17th International Symposium on Computational Intelligence and Informatics - Budapest, Hungary
Duration: 17 Nov 201619 Nov 2016
http://conf.uni-obuda.hu/cinti2016/

Conference

ConferenceIEEE 17th International Symposium on Computational Intelligence and Informatics
Country/TerritoryHungary
CityBudapest
Period17/11/201619/11/2016
Internet address

Keywords

  • Data Object
  • Critical Objects
  • Fuzzy Possibilistic Method
  • Classification
  • Clustering
  • Membership Function

Fingerprint

Dive into the research topics of 'Applying Fuzzy Possibilistic Methods on Critical Objects'. Together they form a unique fingerprint.

Cite this