{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T07:04:02Z","timestamp":1762067042778,"version":"build-2065373602"},"reference-count":86,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>In this study, a new approach for novelty and anomaly detection, called HPFuzzNDA, is introduced. It is similar to the Possibilistic Fuzzy multi-class Novelty Detector (PFuzzND), which was originally developed for data streams. Both algorithms initially use a portion of labelled data from known classes to divide them into a given number of clusters, and then attempt to determine if the new instances, which may be unlabelled, belong to the known or novel classes or if they are anomalies, namely if they are extreme values that deviate from other observations, indicating noise or errors in measurement. However, for each class in HPFuzzNDA clusters are designed by using the new evolutionary algorithm NL-SHADE-RSP, the latter is a modification of the well-known L-SHADE approach. Additionally, the number of clusters for all classes is automatically adjusted in each step of HPFuzzNDA to improve its efficiency. The performance of the HPFuzzNDA approach was evaluated on a set of benchmark problems, specifically generated for novelty and anomaly detection. Experimental results demonstrated the workability and usefulness of the proposed approach as it was able to detect extensions of the known classes and to find new classes in addition to the anomalies. Moreover, numerical results showed that it outperformed PFuzzND. This was exhibited by the new mechanism proposed for cluster adjustments allowing HPFuzzNDA to achieve better classification accuracy in addition to better results in terms of macro F-score metric.<\/jats:p>","DOI":"10.3390\/a15100342","type":"journal-article","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T05:33:14Z","timestamp":1663824794000},"page":"342","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Hybrid Clustering Approach Based on Fuzzy Logic and Evolutionary Computation for Anomaly Detection"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2927-1974","authenticated-orcid":false,"given":"Shakhnaz","family":"Akhmedova","sequence":"first","affiliation":[{"name":"Independent Researcher, 13353 Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1695-5798","authenticated-orcid":false,"given":"Vladimir","family":"Stanovov","sequence":"additional","affiliation":[{"name":"Independent Researcher, 660037 Krasnoyarsk, Russia"}]},{"given":"Yukihiro","family":"Kamiya","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, Aichi Prefectural University, Nakagute 480-1198, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Gurjar, G.S., and Chhabria, S. (2015, January 8\u201310). A review on concept evolution technique on data stream. Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India.","DOI":"10.1109\/PERVASIVE.2015.7087172"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2523813","article-title":"A survey on concept drift adaptation","volume":"46","author":"Gama","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"405","DOI":"10.3233\/IDA-2009-0373","article-title":"Novelty detection with application to data streams","volume":"13","author":"Spinosa","year":"2009","journal-title":"Intell. Data Anal."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gama, J. (2010). Knowledge Discovery from Data Streams, Chapman and Hall\/CRC. [1st ed.].","DOI":"10.1201\/EBK1439826119"},{"key":"ref_5","unstructured":"Silva, T.P., and Arruda Camargo, H. (2020, January 19\u201324). Possibilistic approach for novelty detection in data streams. Proceedings of the 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Glasgow, UK."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Stanovov, V., Akhmedova, S., and Semenkin, E. (July, January 28). NL-SHADE-RSP algorithm with adaptive archive and selective pressure for CEC 2021 numerical optimization. Proceedings of the 2021 IEEE Congress on Evolutionary Computation (CEC), Krakow, Poland.","DOI":"10.1109\/CEC45853.2021.9504959"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tanabe, R., and Fukunaga, A.S. (2014, January 6\u201311). Improving the search performance of SHADE using linear population size reduction. Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China.","DOI":"10.1109\/CEC.2014.6900380"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/TFUZZ.2004.840099","article-title":"A possibilistic fuzzy C-means clustering algorithm","volume":"13","author":"Pal","year":"2005","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_9","unstructured":"Xiong, X., Chan, K.L., and Tan, K.L. (2004, January 7\u201311). Similarity-driven cluster merging method for unsupervised fuzzy clustering. Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, Banff, AB, Canada."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1500","DOI":"10.1109\/TFUZZ.2016.2540063","article-title":"The generalized C index for internal fuzzy cluster validity","volume":"24","author":"Bezdek","year":"2016","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1007\/s10618-015-0433-y","article-title":"MINAS: Multiclass learning algorithm for novelty detection in data streams","volume":"30","author":"Gama","year":"2016","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.1007\/s10462-019-09771-y","article-title":"Analyzing rare event, anomaly, novelty and outlier detection terms under the supervised classification framework","volume":"53","author":"Inza","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","article-title":"A review of novelty detection","volume":"99","author":"Pimentel","year":"2014","journal-title":"Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.foodcont.2016.02.023","article-title":"novelty detection of foreign objects in food using multi-modal X-ray imaging","volume":"67","author":"Emerson","year":"2016","journal-title":"Food Control"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.neulet.2018.01.053","article-title":"How do memory systems detect and respond to novelty?","volume":"680","author":"Kafkas","year":"2018","journal-title":"Neurosci. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.eswa.2016.07.036","article-title":"OCPAD: One class Naive Bayes classifier for payload based anomaly detection","volume":"64","author":"Swarnkar","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_17","first-page":"1","article-title":"One-class classification of point patterns of extremes","volume":"17","author":"Luca","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TKDE.2012.109","article-title":"Classification and adaptive novel class detection of feature-evolving data streams","volume":"25","author":"Masud","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_19","first-page":"16","article-title":"Social stream classification with emerging new labels","volume":"Volume 10937","author":"Phung","year":"2018","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Spinosa, E.J., de Leon, F., de Carvalho, A.P., and Gama, J. (2007, January 11\u201315). OLINDDA: A cluster-based approach for detecting novelty and concept drift in data streams. Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea.","DOI":"10.1145\/1244002.1244107"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1109\/TKDE.2018.2810872","article-title":"Multi-label learning with emerging new labels","volume":"30","author":"Zhu","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.neucom.2018.04.069","article-title":"Concept drift robust adaptive novelty detection for data streams","volume":"309","author":"Cejnek","year":"2018","journal-title":"Neurocomputing"},{"key":"ref_23","first-page":"263","article-title":"Extracting predictor variables to construct breast cancer survivability model with class imbalance problem","volume":"6","author":"Ahmadzadeh","year":"2018","journal-title":"J. AI Data Min."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.ins.2017.12.030","article-title":"Using generative adversarial networks for improving classification effectiveness in credit card fraud detection","volume":"479","author":"Fiore","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput."},{"key":"ref_26","unstructured":"Flexer, A., Pampalk, E., and Widmer, G. (2005, January 11\u201315). Novelty detection based on spectral similarity of songs. Proceedings of the 6th International Conference on Music Information Retrieval, London, UK."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Putra, B.C., Setiyono, B., Sulistyaningrum, D.R., and Mukhlash, I. (2018, January 27\u201330). Moving vehicle classification using pixel quantity based on Gaussian Mixture Models. Proceedings of the 3rd International Conference on Computer and Communication Systems (ICCCS), Nagoya, Japan.","DOI":"10.1109\/CCOMS.2018.8463218"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Li, Z., Liu, L., and Kong, D. (2019, January 12\u201313). Virtual machine failure prediction method based on AdaBoost-Hidden Markov Model. Proceedings of the 2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), Changsha, China.","DOI":"10.1109\/ICITBS.2019.00173"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Jo, T. (2018, January 11\u201314). String vector based KNN for text categorization. Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), ChunCheon, Korea.","DOI":"10.23919\/ICACT.2018.8323785"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mandhare, H.C., and Idate, S.R. (2017, January 15\u201316). A comparative study of cluster based outlier detection, distance based outlier detection and density based outlier detection techniques. Proceedings of the 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India.","DOI":"10.1109\/ICCONS.2017.8250601"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s10115-006-0020-z","article-title":"Detecting outlying subspaces for high-dimensional data: The new task, and performance","volume":"10","author":"Zhang","year":"2006","journal-title":"Knowl. Inf. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zhang, J. (2017, January 23\u201325). An efficient density-based clustering algorithm for the capacitated vehicle routing problem. Proceedings of the International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi\u2019an, China.","DOI":"10.1109\/ICCNEA.2017.96"},{"key":"ref_33","unstructured":"Shirzadi, A., and Jackson, S. (2014). Modelling creep in nickel alloys in high temperature power plants. Structural Alloys for Power Plants, Woodhead Publishing."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/TMTT.2010.2042523","article-title":"Subspace-based optimization method for reconstruction of 2-D complex anisotropic dielectric objects","volume":"58","author":"Agarwal","year":"2010","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhao, F., Li, P., Li, Y., and Li, Y. (2019, January 3\u20135). The Li-ion battery State of charge prediction of electric vehicle using deep neural network. Proceedings of the 2019 Chinese Control and Decision Conference (CCDC), Nanchang, China.","DOI":"10.1109\/CCDC.2019.8832959"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/TGRS.2009.2025122","article-title":"Subspace-based optimization method for solving inverse-scattering problems","volume":"48","author":"Chen","year":"2010","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Marchi, E., Vesperini, F., Weninger, F., Eyben, F., Squartini, S., and Schuller, B. (2015, January 11\u201316). Non-linear prediction with LSTM recurrent neural networks for acoustic novelty detection. Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland.","DOI":"10.1109\/IJCNN.2015.7280757"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","article-title":"Continuous user authentication on mobile devices: Recent progress and remaining challenges","volume":"33","author":"Patel","year":"2016","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Guo, Z., Chen, Q., Wu, G., Xu, Y., Shibasaki, R., and Shao, X. (2017). Village building identification based on ensemble convolutional neural networks. Sensors, 17.","DOI":"10.3390\/s17112487"},{"key":"ref_40","unstructured":"Martinez-Heras, J.A., and Donati, A. (June, January 28). Novelty detection with deep learning. Proceedings of the SpaceOps Conference, Marseilles, France."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1093\/bioinformatics\/bti1125","article-title":"A gamma mixture model better accounts for among site rate heterogeneity","volume":"21","author":"Mayrose","year":"2005","journal-title":"Bioinformatics"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"5266","DOI":"10.1016\/j.csda.2006.09.032","article-title":"Modelling nonlinear count time series with local mixtures of Poisson autoregressions","volume":"51","author":"Carvalho","year":"2007","journal-title":"Comput. Stat. Data Anal."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.neucom.2004.11.018","article-title":"Robust Bayesian mixture modelling","volume":"64","author":"Bishop","year":"2005","journal-title":"Neurocomputing"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ymssp.2014.04.022","article-title":"Novelty detection by multivariate kernel density estimation and growing neural gas algorithm","volume":"50\u201351","author":"Fink","year":"2015","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_45","unstructured":"Bishop, C.M. (2006). Pattern Recognition and Machine Learning, Springer. [1st ed.]."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1315","DOI":"10.1038\/nbt1004-1315","article-title":"What is a hidden Markov model?","volume":"22","author":"Eddy","year":"2004","journal-title":"Nat. Biotechnol."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kruegel, C., and Vigna, G. (2003, January 27\u201330). Anomaly detection of web-based attacks. Proceedings of the 10th ACM conference on Computer and communications security (CCS), Washington, DC, USA.","DOI":"10.1145\/948109.948144"},{"key":"ref_48","unstructured":"Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. (2003, January 8\u201312). Bayesian event classification for intrusion detection. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, USA."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Mahoney, M., and Chan, P. (2002, January 23\u201326). Learning nonstationary models of normal network traffic for detecting novel attacks. Proceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Edmonton, AB, Canada.","DOI":"10.1145\/775047.775102"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Lee, C., Woo, S., and Rim, J. (2018, January 23\u201325). Parzen density estimator for complex pattern classification and high dimensional data analysis. Proceedings of the 9th International Conference on Information, Intelligence, Systems and Applications (IISA), Zakynthos, Greece.","DOI":"10.1109\/IISA.2018.8633675"},{"key":"ref_51","unstructured":"Yeung, D., and Chow, C. (2002, January 11\u201315). Parzen-window network intrusion detectors. Proceedings of the 16th International Conference on Pattern Recognition, Quebec City, QC, Canada."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Bishop, C. (1994, January 19\u201322). Novelty detection and neural network validation. Proceedings of the IEEE Conference on Vision, Image and Signal Processing, Adelaide, SA, Australia.","DOI":"10.1049\/ip-vis:19941330"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Tarassenko, L., Hayton, P., Cerneaz, N., and Brady, M. (1995, January 26\u201328). Novelty detection for the identification of masses in mammograms. Proceedings of the 4th International Conference on Artificial Neural Networks, Cambridge, UK.","DOI":"10.1049\/cp:19950597"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Angiulli, F., and Pizzuti, C. (2002, January 19\u201323). Fast outlier detection in high dimensional spaces. Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery (PKDD), Helsinki, Finland.","DOI":"10.1007\/3-540-45681-3_2"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bay, S., and Schwabacher, M. (2003, January 24\u20132). Mining distance-based outliers in near linear time with randomization and a simple pruning rule. Proceedings of the 9th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Washington, DC, USA.","DOI":"10.1145\/956750.956758"},{"key":"ref_56","unstructured":"Budalakoti, S., Srivastava, A., Akella, R., and Turkov, E. (2006). Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences, NASA Ames Research Center. Technical Report, NASATM-2006-214553."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"305","DOI":"10.4028\/www.scientific.net\/KEM.347.305","article-title":"A framework for novelty detection in jet engine vibration data","volume":"347","author":"Clifton","year":"2007","journal-title":"Key Eng. Mater."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Kumar, N., and Kaur, S. (2016, January 18\u201319). Distance based angular clustering algorithm (DACA) for heterogeneous wireless sensor networks. Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, Madhya Pradesh, India.","DOI":"10.1109\/CDAN.2016.7570912"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Soylemez, O.F., Ergen, B., and Soylemez, N.H. (2017, January 15\u201318). A 3D facial expression recognition system based on SVM classifier using distance based features. Proceedings of the 25th Signal Processing and Communications Applications Conference (SIU), Antalya, Turkey.","DOI":"10.1109\/SIU.2017.7960597"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.neunet.2012.02.032","article-title":"Autonomous growing neural gas for applications with time constraint: Optimal parameter estimation","volume":"32","author":"Angelopoulou","year":"2012","journal-title":"Neural Netw."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","article-title":"Representation learning: A review and new perspectives","volume":"32","author":"Bengio","year":"2013","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., and Langs, G. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. International Conference on Information Processing in Medical Imaging, Springer.","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref_63","unstructured":"Doersch, C. (2016). Tutorial on variational autoencoders. arXiv."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., and van den Hengel, A. (2019). Deep anomaly detection with deviation networks. KDD, 353\u2013362.","DOI":"10.1145\/3292500.3330871"},{"key":"ref_65","unstructured":"Pang, G., van den Hengel, A., Shen, C., and Cao, L. (2020). Deep reinforcement learning for unknown anomaly detection. arXiv."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Pang, G., Yan, C., Shen, C., van den Hengel, A., and Bai, X. (2020). Self-trained deep ordinal regression for end-to-end video anomaly detection. arXiv.","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"ref_67","unstructured":"Moya, M.M., Koch, M.W., and Hostetler, L.D. (1993). One-Class Classifier Networks for Target Recognition Applications, Sandia National Labs.. Technical Report."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Masud, M.M., Chen, Q., Khan, L., Aggarwal, C.C., Gao, J., Han, J., and Thuraisingham, B.M. (2010, January 14\u201317). Addressing concept evolution in concept-drifting data streams. Proceedings of the 10th IEEE International Conference on Data Mining (ICDM), Sydney, Australia.","DOI":"10.1109\/ICDM.2010.160"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TKDE.2010.61","article-title":"Classification and novel class detection in concept-drifting data streams under time constraints","volume":"23","author":"Masud","year":"2011","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Al-Khateeb, T., Masud, M.M., Khan, L., Aggarwal, C., Han, J., and Thuraisingham, B.M. (2012, January 10\u201313). Stream classification with recurring and novel class detection using class-based ensemble. Proceedings of the IEEE 12th International Conference on Data Mining (ICDM), Brussels, Belgium.","DOI":"10.1109\/ICDM.2012.125"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Pal, N.R., Pal, K., and Bezdek, J.C. (1997, January 1\u20135). A mixed C-means clustering model. Proceedings of the IEEE 6th International Fuzzy Systems Conference, Barcelona, Spain.","DOI":"10.1109\/FUZZY.1997.616338"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Bezdek, J.C. (1981). Pattern Recognition With Fuzzy Objective Function Algorithms, Plenum.","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/91.227387","article-title":"A possibilistic approach to clustering","volume":"1","author":"Krishnapuram","year":"1993","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_74","unstructured":"Silva, T.P., Schick, L., Lopes, P.A., and Camargo, H.A. (2018, January 8\u201313). A fuzzy multiclass novelty detector for data streams. Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, Rio de Janeiro, Brazil."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"2858","DOI":"10.1016\/j.fss.2006.07.006","article-title":"A fuzzy extension of the silhouette width criterion for cluster analysis","volume":"157","author":"Campello","year":"2006","journal-title":"Fuzzy Sets Syst."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","article-title":"Differential Evolution\u2014A simple and efficient heuristic for global optimization over continuous spaces","volume":"11","author":"Storn","year":"1997","journal-title":"J. Glob. Optim."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/TEVC.2009.2014613","article-title":"JADE: Adaptive differential evolution with optional external archive","volume":"13","author":"Zhang","year":"2009","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Stanovov, V., Akhmedova, S., and Semenkin, E. (2018, January 8\u201313). LSHADE algorithm with rank-based selective pressure strategy for solving CEC 2017 benchmark problems. Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC), Rio de Janeiro, Brazil.","DOI":"10.1109\/CEC.2018.8477977"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"100463","DOI":"10.1016\/j.swevo.2018.10.014","article-title":"Selective pressure strategy in differential evolution: Exploitation improvement in solving global optimization problems","volume":"50","author":"Stanovov","year":"2019","journal-title":"Swarm Evol. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Sallam, K.M., Elsayed, S., Chakrabortty, R.K., and Ryan, M. (2020, January 19\u201324). Improved multi-operator differential evolution algorithm for solving unconstrained problems. Proceedings of the 2020 IEEE Congress on Evolutionary Computation (CEC), Glasgow, UK.","DOI":"10.1109\/CEC48606.2020.9185577"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Brest, J., Maucec, M.S., and Boskovic, B. (2017, January 5\u20138). Single objective real-parameter optimization algorithm jSO. Proceedings of the IEEE Congress on Evolutionary Computation (CEC), San Sebastian, Spain.","DOI":"10.1109\/CEC.2017.7969456"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/s10922-022-09653-9","article-title":"A feature selection based on the farmland fertility algorithm for improved intrusion detection systems","volume":"30","author":"Naseri","year":"2022","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"e4434","DOI":"10.1002\/dac.4434","article-title":"A wrapper-based feature selection for improving performance of intrusion detection systems","volume":"33","author":"Ghaffari","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_84","unstructured":"(2022, August 24). Data Stream Repository. (n.d.). Computational Intelligence Group. Department of Computing. Federal University of Sao Carlos. Sao Carlos, Brazil. Available online: https:\/\/github.com\/CIG-UFSCar\/DS_Datasets."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/91.531779","article-title":"The possibilistic c-means algorithm: Insights and recommendations","volume":"4","author":"Krishnapuram","year":"1996","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_86","first-page":"2961","article-title":"Evaluation of multiclass novelty detection algorithms for data streams","volume":"27","author":"Gama","year":"1996","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/10\/342\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:37:13Z","timestamp":1760143033000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/10\/342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":86,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["a15100342"],"URL":"https:\/\/doi.org\/10.3390\/a15100342","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2022,9,22]]}}}