2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
Filter-SSLE method based on line search technology 基于行搜索技术的Filter-SSLE方法
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965637
Xiaorong Zhu, Sai Qiao, Qian Zhang, Yi-Lin Bei, Hong-guo Zhao
{"title":"Filter-SSLE method based on line search technology","authors":"Xiaorong Zhu, Sai Qiao, Qian Zhang, Yi-Lin Bei, Hong-guo Zhao","doi":"10.1109/SPAC46244.2018.8965637","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965637","url":null,"abstract":"In this article, we consider a nonlinear optimization problem with constraints. On the basis of existing research, we present an infeasible Filter-SSLE based line search technique. The algorithm only solves two linear equations with the same coefficient matrix in each iteration step to obtain the iteration direction, and the equations only contain the constraint on work concentration. The scale is much smaller than that of the original one. At the same time, we adopt the Filter technology in the algorithm, which avoids the difficulty of penalty function parameter selection caused by different problems in the penalty function method, and enhances the practicability of the algorithm.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Depth based Hand Gesture Recognition for Smart Teaching 基于深度的智能教学手势识别
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965567
Tao Xu, Zhiquan Feng, Wenyin Zhang, Xiaohui Yang, Ping Yu
{"title":"Depth based Hand Gesture Recognition for Smart Teaching","authors":"Tao Xu, Zhiquan Feng, Wenyin Zhang, Xiaohui Yang, Ping Yu","doi":"10.1109/SPAC46244.2018.8965567","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965567","url":null,"abstract":"Gesture recognition plays a very important role in human-computer interaction, and depth based gesture recognition receives more attention because depth sensors have the advantages of capturing depth information and being robust to illumination changes. At present, gesture recognition algorithms focus on the accuracy and efficiency of recognition on general data sets, but ignore the specific needs of interactive gestures in specific scenarios, and the general gesture data sets can not meet the actual interactive needs, which also limits the application and promotion of human-computer interaction. Aiming at the above problems, this paper creates a specific hand gesture data set, which dedicated to interactive teaching of intelligent classroom teaching, and proposes a deep neural network model which integrates global and local information for gesture recognition. The experimental results demonstrate that the proposed deep model achieves 93.6% recognition rate of 17 commonly used gestures and verifies the performance in virtual geometry teaching.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and implementation of multiscale dynamic terrain 多尺度动态地形的研究与实现
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965645
Ping Yu, Tao Xu, Bo Zheng, Yanfeng Zhang
{"title":"Research and implementation of multiscale dynamic terrain","authors":"Ping Yu, Tao Xu, Bo Zheng, Yanfeng Zhang","doi":"10.1109/SPAC46244.2018.8965645","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965645","url":null,"abstract":"In the real-time rendering phase of terrain, there is the possibility of dynamic deformation of terrain, such as dynamic of surface elevation and color texture. In order to better effect the surface appearance, we use higher resolution to reflect the terrain deformation. This results in multiscale dynamic deformation in the terrain. In view of this situation, the maximum change region, namely the deformation region, is determined after the accuracy is improved. Then, we establish our own binary tree and DAG structure in the deformation region. Furthermore, the nested sphere of error metric is used to avoid the generation of crack and T-connection. Finally, in order to give priority to the deformation region, the radius of nested sphere of error metric is used to constrain the error radius. The experiment proves that the algorithm can well reflect the deformation effect of the deformation area and meet the requirements of real-time terrain rendering after the local region has multiscale dynamic deformation.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132138273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese Herbal Medicine Classification Using Convolutional Neural Network with Multiscale Images and Data Augmentation 基于多尺度图像和数据增强的卷积神经网络中草药分类
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965566
Tianhao Li, Fengyang Sun, R. Sun, Lin Wang, Meihui Li, Huawei Yang
{"title":"Chinese Herbal Medicine Classification Using Convolutional Neural Network with Multiscale Images and Data Augmentation","authors":"Tianhao Li, Fengyang Sun, R. Sun, Lin Wang, Meihui Li, Huawei Yang","doi":"10.1109/SPAC46244.2018.8965566","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965566","url":null,"abstract":"Correct use of Chinese herbal medicines is vital to life safety of the patients. Chinese herbal medicine classification is very important for the correct use of Chinese herbal medicines. Traditional methods like microfeature identification and physiochemical identification are inefficient due to the various kinds and different conditions of Chinese herbal medicines. Therefore, we adopt a multiscale convolutional neural network (CNN) model with data augmentation technology to classify Chinese herbal medicines. The data augmentation techniques solve the problem of less data on Chinese herbal medicines. Multiscale technology extracts more useful features for Chinese herbal medicine classification. The experiments show favorable accuracy.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131794879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of Different Classification Methods for Breast Cancer Subtypes Prediction 不同分类方法预测乳腺癌亚型的比较
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965553
Jingru Xu, Peng Wu, Yuehui Chen, Li Zhang
{"title":"Comparison of Different Classification Methods for Breast Cancer Subtypes Prediction","authors":"Jingru Xu, Peng Wu, Yuehui Chen, Li Zhang","doi":"10.1109/SPAC46244.2018.8965553","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965553","url":null,"abstract":"Breast cancer is one of the most common cancers among women. Due to heterogeneity of cancers, breast cancer is divided into different subtypes. Different subtypes have different molecular genesis, so the corresponding target cells and treatment plans are different. Identifying the correct cancer subtypes is important for cancer diagnosis and prognosis. Breast cancer subtypes can be divided into four types: Basal, Her2, Luminal A, and Luminal B. Many machine learning approaches have been applied to cancer subtypes classification in the past few years, we present a comparison of different classifiers K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Multi-Layer Perception (MLP), and Multi-Grained Cascade Forest (gcForest) on The Cancer Genome Atlas (TCGA) databases of breast cancer. As we all know, biological data are high-dimensional and have small sample size, so before classification, we use subtype dependent feature selection method to reduce dimensionality of RNA-Seq gene expression data. Experimental results show that gcForest has a higher accuracy rate for breast cancer subtypes prediction compared with other classifiers.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of a network based intrusion detection systems 设计并实现了一个基于网络的入侵检测系统
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965538
Bing-Yan Zhang, C. Wei, Xing-Hai Yang, Bei-Bei Song
{"title":"Design and implementation of a network based intrusion detection systems","authors":"Bing-Yan Zhang, C. Wei, Xing-Hai Yang, Bei-Bei Song","doi":"10.1109/SPAC46244.2018.8965538","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965538","url":null,"abstract":"Intrusion detection is a very important network security technology in the field of network security. Capable of real-time and dynamic monitoring of the network. In this paper, the intrusion detection technology and snort tools on the basis of the detailed instructions, designs and realizes a to snort under Linux operating system as the core component of intrusion detection system, and visualization of the result can be displayed on the Web.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122555230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Calibration-Free Gaze Zone Estimation Using Convolutional Neural Network 基于卷积神经网络的无标定凝视区域估计
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965441
Xiaolei Cha, Xiaohui Yang, Zhiquan Feng, Tao Xu, Xue Fan, Jinglan Tian
{"title":"Calibration-Free Gaze Zone Estimation Using Convolutional Neural Network","authors":"Xiaolei Cha, Xiaohui Yang, Zhiquan Feng, Tao Xu, Xue Fan, Jinglan Tian","doi":"10.1109/SPAC46244.2018.8965441","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965441","url":null,"abstract":"In this paper we propose a gaze zone estimation method using deep learning. Compared with traditional method, our method does not need the procedure of calibration. In the proposed method, a Kinect is used to capture the video of a computer user, which is pre-processed to suppress illumination variations. After that, haar cascade classifier is adopted to detect the face region and eye region. Then, the eye region is used to estimate the gaze zone on the monitor via a trained CNN (Convolution Neural Network). Experimental results show that the proposed method has a high accuracy, which can be applied in human-computer interaction.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Point Symbol Recognition Algorithm based on Improved Generalized Hough Transform and Nonlinear Mapping 基于改进广义霍夫变换和非线性映射的点符号识别算法
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965548
Jianfeng Song, Zhen Zhang, Yutao Qi, Q. Miao
{"title":"Point Symbol Recognition Algorithm based on Improved Generalized Hough Transform and Nonlinear Mapping","authors":"Jianfeng Song, Zhen Zhang, Yutao Qi, Q. Miao","doi":"10.1109/SPAC46244.2018.8965548","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965548","url":null,"abstract":"The point symbol recognition in the color-scan topographic map is a difficult task in the pattern recognition of the map, which has the problems of low quality of the scanned topographic map, small symbol area, diversified shapes, superimposition with other topographic elements in the map and difficulty of separation. Therefore, many traditional recognition methods, which usually based on pre-segmentation and recognition, do not perform well in the face of such a complex condition. In this paper, we present a new method of point symbol recognition based on improved generalized Hough transform and nonlinear mapping. The proposed method contains two steps. At the first step, an improved generalized Hough transform algorithm is used to extract the target symbol from the original topographic map directly. At the second step, through the method of non-linear mapping and template matching, the preliminary identification of the region for further screening and correction. Experimental results prove that our proposed method can directly recognize and locate point symbols in color topographic maps and outperforms many traditional point symbols recognition algorithms both in both the accuracy of the location of the symbols and the accuracy of the symbol recognition.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breast cancer risk prediction model based on C5.0 algorithm for postmenopausal women 基于C5.0算法的绝经后妇女乳腺癌风险预测模型
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965528
Xia Zhang, Yingming Sun
{"title":"Breast cancer risk prediction model based on C5.0 algorithm for postmenopausal women","authors":"Xia Zhang, Yingming Sun","doi":"10.1109/SPAC46244.2018.8965528","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965528","url":null,"abstract":"Breast cancer is one of the most common malignant tumors of women in the world, and it most happen in the elderly women, but in recent years the age of onset has become younger. As we know that, postmenopausal women are the groups with less research on breast cancer, and the characteristics of breast cancer are still to be explored. In this paper, based on the characteristic of 1031 postmenopausal women (⩾43 years old) breast cancer data, a breast cancer risk prediction model based on C5.0 algorithm was constructed and the model was optimized. The experimental results show that: a) Compared with machine learning methods such as neural network and support vector machine, C5.0 algorithm has better performance in constructing breast cancer risk prediction model; b) Costmatrix_C5.0 Model with cost matrix is better than adaptiveboosting_c5.0 model with Adaptive Enhancement algorithm; c) The risk of breast cancer is strongly correlated with post-menopausal hormones, age, age of menopause, history of benign breast disease and age of the first childbearing. This research is a practical application of data mining in the medical field and has certain reference value for the clinical diagnosis of breast cancer.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finite Time Adaptive Fuzzy Control for MIMO Nonlinear Systems Under Actuator Failures 执行器失效下MIMO非线性系统的有限时间自适应模糊控制
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965434
Wenshun Lv, F. Wang
{"title":"Finite Time Adaptive Fuzzy Control for MIMO Nonlinear Systems Under Actuator Failures","authors":"Wenshun Lv, F. Wang","doi":"10.1109/SPAC46244.2018.8965434","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965434","url":null,"abstract":"This article focuses on adaptive finite time control of multi-input multi-output (MIMO) nonlinear systems under time-varying actuator failures.A finite time adaptive control policy is proposed, guaranteeing the practical finite-time stability of the MIMO nonlinear systems with actuator failures. Simulation study illustrates the usefulness of the proposed policy.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信