Supplier Classification Based on Artificial Immune System Clustering Algorithm

Article Preview

Abstract:

The theory of artificial immune system cluster analysis was studied firstly, the real encoding artificial immune system cluster analysis process was put forward, Then identify indexes of supplier classification were confirmed. Finally, according to a power company some supplier data, supplier were classed, using the cluster analysis with artificial immune system. Suppliers were divided into three categories: the first group includes 3 suppliers, 4 and 3 suppliers for the second group and the third group respectively. The results show that the calculation process of Artificial immune system clustering algorithm is simple, This method can minimize the requirements of professional knowledge and it is suitable to large volume of data while it is not sensitive to the different data order at the same time. So the artificial immune system cluster algorithm has many advantages in obtaining the optimal solution, and the artificial immune system cluster algorithm is feasible to be used in supplier classification.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4796-4800

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Marcos D, Leila S, Maria A S, Sócrates C H. Cavalcanti: Chemometrics and Intelligent Laboratory Systems Vol. 94(2008), p.1–8.

Google Scholar

[2] Ji-chengJicheng Zhou, Wenjuan Li, Jinbo Zhu: Trans. Nonferrous. Met. Soc. China Vol. 18(2008), pp.410-415.

Google Scholar

[3] Wei Liu: Mathematics in Practice and Theory Vol. 36(2006), pp.88-92, in Chinese.

Google Scholar

[4] Xing Zuo, Guangwen Ma, Wuhu Liang, Shiyong Wu, Yangju Tu: Generate Electricity by Water Vol. 32(2006), pp.13-158, in Chinese.

Google Scholar

[5] Gang Xie, Hongbo Guo, Keming Xie, Xinying Xu, Zehua Chen: Proceedings of 6th International Symposium on Test and Measurement Vol. 7(2005), pp.6588-6591.

DOI: 10.1109/grc.2005.1547333

Google Scholar

[6] Simon T P, Jun He: Information Sciences Vol. 178(2008), pp.3024-3042.

Google Scholar

[7] TAN K C, GOH C K., Mamun A A, Ei E Z: European Journal of Operational Research Vol. 187(2008), pp.371-392.

Google Scholar

[8] Gwo-ChingLiao, TA-PengTsao: Electric Power Systems Research Vol. 71(2004), pp.135-144.

Google Scholar

[9] Timmis J, Hone A, Stibor, T, Clark E: Theoretical Computer Science Vol. 403(2008), p.11–32.

DOI: 10.1016/j.tcs.2008.02.011

Google Scholar

[10] Tao Liu, Yaocai Wang, Zhijie Wang: Computer Project and Design Vol. 25(2004), pp.2051-2053, in Chinese.

Google Scholar

[11] Hong Zhou, Xinmin Gao: Journal of Chong qing Institute of Technology(Social Science) Vol. 23(2009), pp.43-46, in Chinese.

Google Scholar