2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)最新文献

筛选
英文 中文
Large-scale Partially Separable Function optimization Using Cooperative Coevolution and Competition Strategies 基于合作协同进化和竞争策略的大规模部分可分离函数优化
Yu Zhu, Li Zhang, Rushi Lan, Xiaonan Luo
{"title":"Large-scale Partially Separable Function optimization Using Cooperative Coevolution and Competition Strategies","authors":"Yu Zhu, Li Zhang, Rushi Lan, Xiaonan Luo","doi":"10.1109/ICACI.2019.8778451","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778451","url":null,"abstract":"Optimizing of the large-scale partially separable functions in the real world is a challenging task. In this paper, we devise a novel optimization method based on coevolution and competition strategies. the proposed method is adopted in two stages: 1) the differential grouping (DG) is used to decompose the original problems into several different subcomponents; 2)Competitive swarm optimizer (CSO) is used to optimize the subcomponents individually. Experimental results show that the combining of DG and CSO performs better than state-of-the-art metaheuristic methods on partially separable functions optimization.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A spectrum sensing algorithm based on correlation coefficient and K-means 一种基于相关系数和k均值的频谱感知算法
Yi Li, Yonghua Wang, Pin Wan, Shunchao Zhang, Yongwei Zhang, Tianyu Zhao
{"title":"A spectrum sensing algorithm based on correlation coefficient and K-means","authors":"Yi Li, Yonghua Wang, Pin Wan, Shunchao Zhang, Yongwei Zhang, Tianyu Zhao","doi":"10.1109/ICACI.2019.8778589","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778589","url":null,"abstract":"In order to improve the detection probability in the environment of low signal-to-noise ratio (SNR), and solving the problem of complex threshold derivation in traditional spectrum sensing technology, the improved spectrum sensing method is proposed in this paper. Firstly, the signal received by each secondary user is decomposed and recombined (DAR). Then the correlation coefficient (CC) based on the sampling signal matrix is extracted as the decision statistic, which reduces the influence of the noise uncertainty. Finally, the K-means clustering algorithm is used to class these decision statistics, accuracy greatly. In order to facilitate expression, the proposed algorithm is abbreviated as DARCCK. Through experimental simulation, the DARCCK algorithm exhibits better detection performance than the energy detection (ED), the maximum and minimum eigenvalue (MME) algorithm and the difference between the maximum and minimum eigenvalues (DMM) in the communication environment with low SNR.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"58 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ocean Data Anomaly Detection Algorithm Based on Improved k-medoids 基于改进k-介质的海洋数据异常检测算法
Hua Jiang, Yao Wu, Kuilin Lyu, Huijiao Wang
{"title":"Ocean Data Anomaly Detection Algorithm Based on Improved k-medoids","authors":"Hua Jiang, Yao Wu, Kuilin Lyu, Huijiao Wang","doi":"10.1109/ICACI.2019.8778515","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778515","url":null,"abstract":"The topic of abnormal data mining in ocean Argo buoy monitoring data is studied. Firstly, dense regions were established in K-MEDOIDS clustering algorithm with the help of density accessibility of density clustering. Based on dynamic layer number, a new calculation method of domain radius and density was proposed, and the initial clustering center was selected with both considering density and similarity; At the same time, an anomaly detection algorithm is proposed, which the criterion to judge marine anomaly data is based on the result of clustering combined with point sets in dense regions. Experimental verification was carried out on the actual and artificial simulated data sets, the results show that the clustering performance and anomaly detection are improved compared with the comparison algorithm.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126652415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Combination Model Based on EEMD-PE and Echo State Network for Chaotic Time Series Prediction 基于EEMD-PE和回波状态网络的混沌时间序列预测组合模型
Xinghan Xu, Weijie Ren
{"title":"A Combination Model Based on EEMD-PE and Echo State Network for Chaotic Time Series Prediction","authors":"Xinghan Xu, Weijie Ren","doi":"10.1109/ICACI.2019.8778487","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778487","url":null,"abstract":"Prediction of chaotic time series has broad application prospects and becomes a research hotspot. Since chaotic time series is strongly non-stationary and nonlinear, it’s difficult to predict based on any single model. Therefore, the empirical mode decomposition (EMD)-based combination model becomes an important means of prediction. To reduce the scale of prediction models of conventional combination method, this paper proposes a high-efficiency combination model using ensemble EMD (EEMD), permutation entropy (PE) and echo state network(ESN). EEMD decomposes the original time series into a group of intrinsic mode functions (IMFs), and the number of IMFs is consistent with the number of predictors. On account of the complexity of the chaotic time series, there is a large demand of predictors. Through complexity analysis by PE, we combine some IMFs whose complexities are similar, and predict the combined signals instead of the initial ones based on ESNs. Finally, these obtained estimates are assembled as the ultimate prediction results. In the experiment, we use real-world dataset to examine the proposed model. The experimental results confirm that our combination approach outperforms existing single models, and efficiently reduces the scale of prediction models comparing to the EEMD-ESN.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A dynamical model for generating synthetic Ballistocardiogram signals 生成综合ballo心图信号的动力学模型
Zimin Wang, Zhiyu Gan, Zhenbing Liu, Linfa Lu, Xiaonan Luo
{"title":"A dynamical model for generating synthetic Ballistocardiogram signals","authors":"Zimin Wang, Zhiyu Gan, Zhenbing Liu, Linfa Lu, Xiaonan Luo","doi":"10.1109/ICACI.2019.8778508","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778508","url":null,"abstract":"Ballistocardiogram (BCG) signal reflects the status of cardiovascular system. Many researchers have done a lot of remarkable work on BCG research. Because of the environment noise and individual differences, acquired BCG signals often fluctuated greatly. In this paper, a dynamic BCG signal model based on Gaussian kernel function is proposed. The proposed model consists of five waveforms of BCG signals, such as H wave, I wave, J wave, K wave, L wave and M wave. By comparing the similarity and morphology from healthy individuals BCG signal, the dynamic of Gaussian model is able to close the BCG signal of real individuals. The BCG signal based on the dynamic Gaussian model can fully express the BCG signal characteristics of the healthy individual.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Intrusion Detection Model based on Parallel Multi - Artificial Bee Colony and Support Vector Machine 基于并行多人工蜂群和支持向量机的入侵检测模型
Long Li, Shaowei Zhang, Yongchao Zhang, Liang Chang, T. Gu
{"title":"The Intrusion Detection Model based on Parallel Multi - Artificial Bee Colony and Support Vector Machine","authors":"Long Li, Shaowei Zhang, Yongchao Zhang, Liang Chang, T. Gu","doi":"10.1109/ICACI.2019.8778482","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778482","url":null,"abstract":"In view of the problems existing in feature selection and support vector machine model parameter optimization in network intrusion detection, artificial bee colony algorithm is introduced. For the artificial bee colony algorithm, there are problems such as easy precocity, poor diversity of the solution, easy to fall into local optimum, and slow convergence in the later stage. In order to relieve these problems, we redesign the algorithm, including honey source coding scheme, the initialization of population, the construction of the fitness evaluation function, the neighborhood search method and so on. Then we propose the synchronization optimization model of characteristic parameters. It overcomes the above defects of the classical ABC algorithm. Finally, we propose an intrusion detection model based on the improved artificial bee colony algorithm and support vector machine model. The experimental results show that the detection performance of our model is far superior to the methods based on other feature selection and detection principles.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Segmentation Based on Deep Learning Features 基于深度学习特征的图像分割
D. Liao, Hu Lu, Xingpei Xu, Quansheng Gao
{"title":"Image Segmentation Based on Deep Learning Features","authors":"D. Liao, Hu Lu, Xingpei Xu, Quansheng Gao","doi":"10.1109/ICACI.2019.8778464","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778464","url":null,"abstract":"Image segmentation is an important technique in image analysis. Existing methods in image segmentation rely on an artificial neural network to extract the feature of the image. In this study, we propose an image segmentation method based on deep learning features and community detection. We propose the use of a pre-trained convolution neural network (CNN) to extract the deep learning features of the image. The deep CNN is trained on ImageNet dataset and transferred to image segmentations for constructing potentials of super-pixels. We first convert the original image from the pixel level to the region level based on Simple Linear Iterative Clustering super-pixels and then aim at each superpixel region to extract the deep learning features. We combine the color features and deep learning features of the superpixel region. The weights of deep learning features and color features are subsequently adjusted using a random walk algorithm to construct a new similarity matrix. We conduct community detection based on a similarity matrix. To automatically identify the number of image segmentation, we use modularity Q in order to determine the optimal number of associations. To illustrate the effectiveness of our proposed method, we evaluate the BSDS300 dataset and compare the technique with several other wellknown image segmentation methods. The segmentation experiments conducted on different images show that our proposed image segmentation algorithm outperforms other methods.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combined DTCWT-SVD-Based Video Watermarking Algorithm Using Finite State Machine 基于有限状态机的dtwt - svd组合视频水印算法
Chen Guangxi, Chen Ze, Wang Daoshun, Li Shundong, Huang Yong, Zhang Baoying
{"title":"Combined DTCWT-SVD-Based Video Watermarking Algorithm Using Finite State Machine","authors":"Chen Guangxi, Chen Ze, Wang Daoshun, Li Shundong, Huang Yong, Zhang Baoying","doi":"10.1109/ICACI.2019.8778517","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778517","url":null,"abstract":"The video carrying the watermark will undergo various attacks such as transcoding, noise, and temporal synchronization during network propagation (upload/ download), and the existing algorithm doesn’t involve analyzing and testing the combined attacks encountered by the video during network propagation. In order to correctly extract the water-mark in the video after network propagation to protect the rights of copyright holders, this paper proposes a video watermarking algorithm based on the finite state machine in DTCWT-SVD domain. Firstly, the carrier video is divided into several groups of the frame and the watermark image is scanned into several segments by Zig-Zag. Then, the watermark sequence collection is generated by the finite state machine, and each watermark sequence is embedded into the corresponding video frame by modifying the singular value of the DTCWT low-frequency coefficient matrix. Finally, the watermark is extracted according to the predefined relationship of singular values. The experimental results show that the proposed algorithm can effectively resist transcoding, noise, temporal synchronization or other attacks. It is also can accurately extract watermark information in the video after network propagation, which can effectively resist the combined attacks encountered by video in the process of network propagation.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rain-Density Squeeze-and-Excitation Residual Network for Single Image Rain-removal 单幅图像去雨的雨密度压缩激励残差网络
Xipu Hu, Wenhao Wang, Cheng Pang, Rushi Lan, Xiaonan Luo
{"title":"Rain-Density Squeeze-and-Excitation Residual Network for Single Image Rain-removal","authors":"Xipu Hu, Wenhao Wang, Cheng Pang, Rushi Lan, Xiaonan Luo","doi":"10.1109/ICACI.2019.8778583","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778583","url":null,"abstract":"The removal of rain streaks in a single image is an extremely challenging task due to the uneven rainfall density in the image. Methods based on deep learning have boosted the performance of rain removal significantly in recent years. However, most of these methods have a certain demand for different density of rain marks in the training data, which prevent them to further improve the performance in some outdoor scenarios. In this paper, we present a novel Rain-Density Squeeze-and-Excitation residual network (RDSER-NET), which adopts the squeeze-and-excitation blocks into the ResNet framework. The proposed network remove rain streaks based on single density of rain marks in the training data, reducing the limitation of multi-density proposals and achieving better results. Extensive experiments on synthetic and real datasets demonstrate that the proposed network outperform the recent state-of-the-art methods greatly.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Prediction of Vulnerability Severity Level Based on Text Mining and XGBboost 基于文本挖掘和XGBboost的漏洞严重程度智能预测
Peichao Wang, Yun Zhou, Baodan Sun, Weiming Zhang
{"title":"Intelligent Prediction of Vulnerability Severity Level Based on Text Mining and XGBboost","authors":"Peichao Wang, Yun Zhou, Baodan Sun, Weiming Zhang","doi":"10.1109/ICACI.2019.8778469","DOIUrl":"https://doi.org/10.1109/ICACI.2019.8778469","url":null,"abstract":"Vulnerabilities have always been important factors threatening the security of information systems. The endless vulnerabilities pose a huge threat to the social economy and public privacy. The vulnerability database provides abundant materials for researchers to study the threat of vulnerabilities, while mining the text information of the database and obtaining valuable information can help to grasp the severity level of the vulnerability. Based on the textual description of vulnerabilities in the database, we first use text mining to extract main features. Then we utilize principal component analysis to gather sparse features which take sparse characteristic into consideration. Finally we use XGBoost to intelligently predict the severity level of vulnerabilities and compare them with the results of other machine learning methods based on same extracted features. The experiment on real-world vulnerability text description show the effectiveness of our method.","PeriodicalId":213368,"journal":{"name":"2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信