Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Breast cancer becomes the second major cause of death among women cancer patients
worldwide. Based on research conducted in 2019, there are approximately 250,000 women …
worldwide. Based on research conducted in 2019, there are approximately 250,000 women …
[PDF][PDF] Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Breast cancer is the second leading cause of mortality among female cancer patients
worldwide. Early detection of breast cancer is considerd as one of the most effective ways to …
worldwide. Early detection of breast cancer is considerd as one of the most effective ways to …
The study of cross-validated bagging fuzzy-ID3 algorithm for breast cancer classification
Globally, the second most common cause of death for female cancer patients is breast
cancer. In the United States, about 11,000 females aged below 40 are diagnosed with …
cancer. In the United States, about 11,000 females aged below 40 are diagnosed with …
Fuzzy feature subset selection using the Wang & Mendel method
ME Cintra, CH de Arruda… - 2008 Eighth International …, 2008 - ieeexplore.ieee.org
The dimension of a knowledge domain can impact the use of genetic algorithms to
automatically design fuzzy rule bases, since the search space for the genetic algorithm …
automatically design fuzzy rule bases, since the search space for the genetic algorithm …
Design of a Saving-Energy Fuzzy Logic Controller for a Differential Drive Robot Based on an Optimization
VT Pham, A Stefek, V Krivanek, TS Nguyen - Applied Sciences, 2023 - mdpi.com
In the problem of designing a Fuzzy Logic Controller (FLC) for robots in general and a
Differential Drive Robot (DDR) in particular, the determination of the parameters of …
Differential Drive Robot (DDR) in particular, the determination of the parameters of …
Detection of SQL injection using a genetic fuzzy classifier system
SQL Injection (SQLI) is one of the most popular vulnerabilities of web applications. The
consequences of SQL injection attack include the possibility of stealing sensitive information …
consequences of SQL injection attack include the possibility of stealing sensitive information …
Genetic generation of fuzzy knowledge bases: new perspectives
ME Cintra - 2012 - teses.usp.br
This work focus on the genetic generation of fuzzy systems. One of the main contribution of
this work is the proposal of the FCA-BASED method, which generates the genetic search …
this work is the proposal of the FCA-BASED method, which generates the genetic search …
Evolving Rule Based Explainable Artificial Intelligence for Decision Support System of Unmanned Aerial Vehicles
BM Keneni - 2018 - rave.ohiolink.edu
UAVs are used for many purposes including agriculture, industry, law enforcement, and
defense. These autonomous systems have several advantages over manned aerial vehicles …
defense. These autonomous systems have several advantages over manned aerial vehicles …
Electrical impedance tomography using evolutionary computing: a review
WP dos Santos, RE de Souza, RR Ribeiro… - … computing for Image …, 2018 - taylorfrancis.com
This chapter addresses the basic principles of the Electrical Impedance Tomography (EIT)
and the image reconstruction as an optimization problem solved by the following search and …
and the image reconstruction as an optimization problem solved by the following search and …
Using fuzzy formal concepts in the genetic generation of fuzzy systems
Fuzzy classification systems have been widely researched in the literature. Genetic fuzzy
systems combine the power of the global search of genetic algorithms with fuzzy systems to …
systems combine the power of the global search of genetic algorithms with fuzzy systems to …