Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
Genetic programming: on the programming of computers by means of natural selection
Genetic programming: on the programming of computers by means of natural selection
An introduction to genetic algorithms
An introduction to genetic algorithms
When information retrieval measures agree about the relative quality of document rankings
Journal of the American Society for Information Science
A Framework for Evolving Fuzzy Classifier Systems Using Genetic Programming
Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference
Genetic programming: a paradigm for genetically breeding populations of computer programs to solve problems
Evolutionary prediction of photovoltaic power plant energy production
Proceedings of the 14th annual conference companion on Genetic and evolutionary computation
Prediction of dental milling time-error by flexible neural trees and fuzzy rules
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
Value estimation of the use case parameters using SOM and fuzzy rules
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Towards new directions of data mining by evolutionary fuzzy rules and symbolic regression
Computers & Mathematics with Applications
Hi-index | 0.00 |
Fuzzy classifiers and fuzzy rules can be informally defined as tools that use fuzzy sets or fuzzy logic for their operations. In this paper, we use genetic programming to evolve a fuzzy classifier in the form of a fuzzy search expression to predict product quality. We interpret the data mining task as a fuzzy information retrieval problem and we apply a successful information retrieval method for search query optimization to the fuzzy classifier evolution. We demonstrate the ability of the genetic programming to evolve useful fuzzy classifiers on two use cases in which we detect faulty products of a product processing plant and discover intrusions in a computer network.