首页 > 最新文献

2020 16th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Multi-objective Ant Colony Algorithm Based on Pheromone Weight 基于信息素权重的多目标蚁群算法
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00019
Lei Yang, Xiaotian Jia, Ganming Liu
This paper proposed multi-objective ant colony algorithm based on pheromone weight, which is used to solve multi-objective optimization problems. The algorithm introduces the weight of distance-related in the initialization of pheromones, which is beneficial to the ant speed up the path selection, improving the efficiency of ant search. At the same time, the adaptive variation operator that dynamically adjusts the number of ant neighbors with the number of iterations and the weight Tchebycheff aggregation method are also introduced, which are beneficial to improve the convergence speed and the quality of the algorithm. The algorithm has been compared with other related algorithms using Hypervolume and other indicators in the standard dual Traveling Salesman Problem (TSP), and has been proven that the improved algorithm has better results.
提出了一种基于信息素权重的多目标蚁群算法,用于解决多目标优化问题。该算法在初始化信息素时引入距离相关权值,有利于蚁群加快路径选择,提高蚁群搜索效率。同时,引入了随迭代次数动态调整蚂蚁邻居数量的自适应变异算子和权重Tchebycheff聚合方法,有利于提高算法的收敛速度和质量。将该算法与标准对偶旅行商问题(TSP)中使用Hypervolume等指标的其他相关算法进行比较,证明改进算法具有更好的结果。
{"title":"Multi-objective Ant Colony Algorithm Based on Pheromone Weight","authors":"Lei Yang, Xiaotian Jia, Ganming Liu","doi":"10.1109/CIS52066.2020.00019","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00019","url":null,"abstract":"This paper proposed multi-objective ant colony algorithm based on pheromone weight, which is used to solve multi-objective optimization problems. The algorithm introduces the weight of distance-related in the initialization of pheromones, which is beneficial to the ant speed up the path selection, improving the efficiency of ant search. At the same time, the adaptive variation operator that dynamically adjusts the number of ant neighbors with the number of iterations and the weight Tchebycheff aggregation method are also introduced, which are beneficial to improve the convergence speed and the quality of the algorithm. The algorithm has been compared with other related algorithms using Hypervolume and other indicators in the standard dual Traveling Salesman Problem (TSP), and has been proven that the improved algorithm has better results.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121096305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Framework for Cell Mitosis Detection in Microscopy Images 显微镜图像中细胞有丝分裂检测的深度框架
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00030
Jian Shi, Yi Xin, Benlian Xu, Mingli Lu, Jinliang Cong
Detection and tracking of multiple cells is critical in biomedical research and computer vision. Resolving lineage relationships between mitotic cells has been of fundamental interest in this filed recently. Microscopy images with cells at poor imagining conditions are difficult to detect and manual operation still remains standard procedure. This paper proposed a cell detection framework consisting of a convolution neural network (CNN) cell detector and a convolutional long short-term memory (LSTM) model. The detector is modeled by a well-trained Faster RCNN network to learn various cell features, and the convolutional LSTM network is employed to capture cell mitotic events, which utilizes both appearance and motion information from candidate sequences. Experimental results on realistic low contrast cell images are presented to demonstrate the robustness and validation of the proposed method.
多细胞的检测和跟踪在生物医学研究和计算机视觉中至关重要。解决有丝分裂细胞之间的谱系关系是近年来该领域的基本兴趣。在较差的想象条件下,细胞的显微镜图像难以检测,人工操作仍然是标准程序。本文提出了一种由卷积神经网络(CNN)细胞检测器和卷积长短期记忆(LSTM)模型组成的细胞检测框架。检测器由训练有素的Faster RCNN网络建模以学习各种细胞特征,并使用卷积LSTM网络捕获细胞有丝分裂事件,该网络利用候选序列的外观和运动信息。实验结果表明,该方法具有较好的鲁棒性和有效性。
{"title":"A Deep Framework for Cell Mitosis Detection in Microscopy Images","authors":"Jian Shi, Yi Xin, Benlian Xu, Mingli Lu, Jinliang Cong","doi":"10.1109/CIS52066.2020.00030","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00030","url":null,"abstract":"Detection and tracking of multiple cells is critical in biomedical research and computer vision. Resolving lineage relationships between mitotic cells has been of fundamental interest in this filed recently. Microscopy images with cells at poor imagining conditions are difficult to detect and manual operation still remains standard procedure. This paper proposed a cell detection framework consisting of a convolution neural network (CNN) cell detector and a convolutional long short-term memory (LSTM) model. The detector is modeled by a well-trained Faster RCNN network to learn various cell features, and the convolutional LSTM network is employed to capture cell mitotic events, which utilizes both appearance and motion information from candidate sequences. Experimental results on realistic low contrast cell images are presented to demonstrate the robustness and validation of the proposed method.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115961064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SM9 Digital Signature with Non-repudiation 具有不可否认性的SM9数字签名
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00082
Meng Wang, Yihong Long
SM9 is an identity-based cryptography algorithm published by the State Cryptography Administration of China. With SM9, a user's private key for signing is generated by a central system called key generation center (KGC). When the owner of the private key wants to shirk responsibility by denying that the signature was generated by himself, he can claim that the operator of KGC forged the signature using the generated private key. To address this issue, in this paper, two schemes of SM9 digital signature with non-repudiation are proposed. With the proposed schemes, the user's private key for signing is collaboratively generated by two separate components, one of which is deployed in the private key service provider's site while the other is deployed in the user's site. The private key can only be calculated in the user's site with the help of homomorphic encryption. Therefore, only the user can obtain the private key and he cannot deny that the signature was generated by himself. The proposed schemes can achieve the non-repudiation of SM9 digital signature.
SM9是中国国家密码管理局发布的一种基于身份的密码算法。在SM9中,用于签名的用户私钥由称为密钥生成中心(KGC)的中央系统生成。当私钥的拥有者想要通过否认签名是由他自己生成来逃避责任时,他可以声称KGC的操作者使用生成的私钥伪造了签名。为了解决这一问题,本文提出了两种具有不可否认性的SM9数字签名方案。在提出的方案中,用于签名的用户私钥由两个独立的组件协作生成,其中一个部署在私钥服务提供者的站点中,而另一个部署在用户的站点中。私钥只能借助同态加密在用户站点中计算。因此,只有用户可以获得私钥,并且他不能否认签名是由自己生成的。提出的方案可以实现SM9数字签名的不可否认性。
{"title":"SM9 Digital Signature with Non-repudiation","authors":"Meng Wang, Yihong Long","doi":"10.1109/CIS52066.2020.00082","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00082","url":null,"abstract":"SM9 is an identity-based cryptography algorithm published by the State Cryptography Administration of China. With SM9, a user's private key for signing is generated by a central system called key generation center (KGC). When the owner of the private key wants to shirk responsibility by denying that the signature was generated by himself, he can claim that the operator of KGC forged the signature using the generated private key. To address this issue, in this paper, two schemes of SM9 digital signature with non-repudiation are proposed. With the proposed schemes, the user's private key for signing is collaboratively generated by two separate components, one of which is deployed in the private key service provider's site while the other is deployed in the user's site. The private key can only be calculated in the user's site with the help of homomorphic encryption. Therefore, only the user can obtain the private key and he cannot deny that the signature was generated by himself. The proposed schemes can achieve the non-repudiation of SM9 digital signature.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Algorithms and Complexity in RNA Structure Based on BHG 基于BHG的RNA结构预测算法及复杂度
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00081
Zhendong Liu, Yurong Yang, Xinrong Lv, Dongyan Li, Xi Chen, Xiaofeng Li
It is a computing mode of basin hopping graph in RNA folding structural prediction including pseudoknots. We investigate the computing algorithm in RNA folding structural prediction based on extended structure and basin hopping graph. This study presents predicting algorithm based on extended structure, also presents an improved computing algorithm based on basin hopping graph, they are attractive approachs in RNA folding structural prediction. Many experiments have been implemented in Rfam14.2 database and PseudoBase database, the experimental results show our two algorithms are efficiently and accurately than other existing algorithm.
它是包含假结的RNA折叠结构预测中的一种盆跳图计算模式。研究了基于扩展结构和盆跳图的RNA折叠结构预测的计算算法。本文提出了基于扩展结构的预测算法,以及基于盆跳图的改进计算算法,它们是RNA折叠结构预测中有吸引力的方法。在Rfam14.2数据库和PseudoBase数据库中进行了大量的实验,实验结果表明,这两种算法比现有的算法更高效、准确。
{"title":"Predicting Algorithms and Complexity in RNA Structure Based on BHG","authors":"Zhendong Liu, Yurong Yang, Xinrong Lv, Dongyan Li, Xi Chen, Xiaofeng Li","doi":"10.1109/CIS52066.2020.00081","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00081","url":null,"abstract":"It is a computing mode of basin hopping graph in RNA folding structural prediction including pseudoknots. We investigate the computing algorithm in RNA folding structural prediction based on extended structure and basin hopping graph. This study presents predicting algorithm based on extended structure, also presents an improved computing algorithm based on basin hopping graph, they are attractive approachs in RNA folding structural prediction. Many experiments have been implemented in Rfam14.2 database and PseudoBase database, the experimental results show our two algorithms are efficiently and accurately than other existing algorithm.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The errors analysis of natural language generation — A case study of Topic-to-Essay generation 自然语言生成的错误分析——以Topic-to-Essay生成为例
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00027
Ping Cai, Xingyuan Chen, Hongjun Wang, Peng Jin
Although natural language generation (NLG) has achieved great success, there are still many problems with the generated text, if humans carefully examine it. To analyze the problems of NLG, we use manual evaluation methods to annotate and analyze the text generated by NLG. According to the analysis results, we can understand the defects of NLG in-depth, comprehensively, and accurately. Further, these provide cues for future improvement. In this paper, we first use a state-of-the-art Topic-to-Essay generation model to generate texts conditional on some topic words. Then, by analyzing the generated text, we propose an annotation framework, and then quantify the main drawbacks of current NLG, including poor semantic coherence, content duplication, logic errors, and repetition. It shows that the text generated by the current sequence-to-sequence model is still far from human expectation.
虽然自然语言生成(NLG)已经取得了巨大的成功,但如果人类仔细研究,生成的文本仍然存在许多问题。为了分析NLG的问题,我们使用人工评价方法对NLG生成的文本进行注释和分析。根据分析结果,我们可以深入、全面、准确地了解NLG的缺陷。此外,这些为未来的改进提供了线索。在本文中,我们首先使用最先进的topic -to- essay生成模型来生成以某些主题词为条件的文本。然后,通过分析生成的文本,我们提出了一个注释框架,然后量化了当前NLG的主要缺点,包括语义一致性差、内容重复、逻辑错误和重复。这表明当前序列到序列模型生成的文本与人类的期望还有很大的差距。
{"title":"The errors analysis of natural language generation — A case study of Topic-to-Essay generation","authors":"Ping Cai, Xingyuan Chen, Hongjun Wang, Peng Jin","doi":"10.1109/CIS52066.2020.00027","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00027","url":null,"abstract":"Although natural language generation (NLG) has achieved great success, there are still many problems with the generated text, if humans carefully examine it. To analyze the problems of NLG, we use manual evaluation methods to annotate and analyze the text generated by NLG. According to the analysis results, we can understand the defects of NLG in-depth, comprehensively, and accurately. Further, these provide cues for future improvement. In this paper, we first use a state-of-the-art Topic-to-Essay generation model to generate texts conditional on some topic words. Then, by analyzing the generated text, we propose an annotation framework, and then quantify the main drawbacks of current NLG, including poor semantic coherence, content duplication, logic errors, and repetition. It shows that the text generated by the current sequence-to-sequence model is still far from human expectation.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116812616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Credit Platform Construction of Vocational Education Group Based on Blockchain 基于区块链的职教集团信用平台建设
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00073
Jie Chen, X. Su, WeiSheng Wen, Hao-Tian Wu
To establish the vocational education personal learning account and achieve the traceability, query and conversion of learning results, the paper proposes a credit platform of vocational education chain. The technical characteristics of block chain decentralization, bookkeeping, asymmetric encryption, distributed, smart contract and consensus mechanism are used to construct the platform. In system design and system logic design, we focus on how to evaluate students more objectively, completely and accurately, how to make the platform more secure, public and shared, and how to make colleges, students and enterprises more trustworthy and prefer to use credit platforms. In view of the difficulties in the construction of credit platform nodes in polytechnic education chain, such as credit issuance and acquisition, credit query and so on, this paper puts forward some ideas and carries out prototype design. As a result, the credit platform is made more suitable for the development of educational alliance, collectivization, diversification and Internet +, open, shared and lifelong education.
为建立职业教育个人学习账户,实现学习成果的可追溯、查询和转换,本文提出了一个职业教育链条信用平台。利用区块链去中心化、记账、非对称加密、分布式、智能合约、共识机制等技术特点构建平台。在系统设计和系统逻辑设计上,我们重点关注如何更加客观、全面、准确地评价学生,如何使平台更加安全、公开、共享,以及如何使高校、学生和企业更信任、更愿意使用信用平台。针对高职教育链中信用平台节点在信用发放与获取、信用查询等方面的建设难点,本文提出了一些思路,并进行了原型设计。使得信用平台更适合教育联盟、集团化、多元化、互联网+、开放、共享、终身教育的发展。
{"title":"Credit Platform Construction of Vocational Education Group Based on Blockchain","authors":"Jie Chen, X. Su, WeiSheng Wen, Hao-Tian Wu","doi":"10.1109/CIS52066.2020.00073","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00073","url":null,"abstract":"To establish the vocational education personal learning account and achieve the traceability, query and conversion of learning results, the paper proposes a credit platform of vocational education chain. The technical characteristics of block chain decentralization, bookkeeping, asymmetric encryption, distributed, smart contract and consensus mechanism are used to construct the platform. In system design and system logic design, we focus on how to evaluate students more objectively, completely and accurately, how to make the platform more secure, public and shared, and how to make colleges, students and enterprises more trustworthy and prefer to use credit platforms. In view of the difficulties in the construction of credit platform nodes in polytechnic education chain, such as credit issuance and acquisition, credit query and so on, this paper puts forward some ideas and carries out prototype design. As a result, the credit platform is made more suitable for the development of educational alliance, collectivization, diversification and Internet +, open, shared and lifelong education.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page i] [标题页i]
Pub Date : 2020-11-01 DOI: 10.1109/cis52066.2020.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/cis52066.2020.00001","DOIUrl":"https://doi.org/10.1109/cis52066.2020.00001","url":null,"abstract":"","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130247912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Super-Resolution Reconstruction Based on Online dictionary learning Algorithm 基于在线字典学习算法的图像超分辨率重建
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00075
Chunman Yan, Yuyao Zhang
For the image super-resolution reconstruction method based on case-learning shows that a fast and efficient dictionary learning algorithm is very important to solve the problem of mapping inconsistency between low-resolution and high-resolution images. This paper adopts the online dictionary learning algorithm for the image super-resolution. In the learning stage, the algorithm constructs the high-resolution and the corresponding low-resolution feature training sets, then by using the online dictionary learning algorithm, obtains a sparse coding matrix of the low-resolution training sets, and computers the high-resolution dictionary by sharing the sparse coding coefficients; in the reconstruction stage, the input low-resolution image firstly is interpolated to the size of the desired high-resolution image, and obtains the sparse coding matrix through OMP ( Orthogonal Matching Pursuit ) method in the low-resolution test sets, then computers the high-resolution image blocks based on the above high-resolution dictionary and the later sparse coding matrix, finally reorders and averages the blocks to achieve the reconstructed high-resolution image. The experimental results show that the proposed method can achieve better quality for image super-resolution reconstruction than the traditional sparse coding method, the detail and texture of the reconstructed image are reconstructed well, and the algorithm can effectively inhibit the artifact of image edge phenomenon.
基于案例学习的图像超分辨率重建方法表明,快速高效的字典学习算法对于解决低分辨率和高分辨率图像映射不一致问题至关重要。本文采用在线字典学习算法对图像进行超分辨率处理。在学习阶段,算法构建高分辨率和相应的低分辨率特征训练集,然后利用在线字典学习算法,得到低分辨率训练集的稀疏编码矩阵,通过共享稀疏编码系数计算高分辨率字典;在重建阶段,首先将输入的低分辨率图像插值到所需的高分辨率图像的大小,并在低分辨率测试集中通过OMP(正交匹配追踪)方法获得稀疏编码矩阵,然后根据上述高分辨率字典和后期稀疏编码矩阵计算高分辨率图像块,最后对块进行重新排序和平均,以实现重建的高分辨率图像。实验结果表明,与传统的稀疏编码方法相比,该方法可以获得更好的图像超分辨率重建质量,重建图像的细节和纹理得到很好的重建,并且该算法可以有效地抑制图像边缘伪影现象。
{"title":"Image Super-Resolution Reconstruction Based on Online dictionary learning Algorithm","authors":"Chunman Yan, Yuyao Zhang","doi":"10.1109/CIS52066.2020.00075","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00075","url":null,"abstract":"For the image super-resolution reconstruction method based on case-learning shows that a fast and efficient dictionary learning algorithm is very important to solve the problem of mapping inconsistency between low-resolution and high-resolution images. This paper adopts the online dictionary learning algorithm for the image super-resolution. In the learning stage, the algorithm constructs the high-resolution and the corresponding low-resolution feature training sets, then by using the online dictionary learning algorithm, obtains a sparse coding matrix of the low-resolution training sets, and computers the high-resolution dictionary by sharing the sparse coding coefficients; in the reconstruction stage, the input low-resolution image firstly is interpolated to the size of the desired high-resolution image, and obtains the sparse coding matrix through OMP ( Orthogonal Matching Pursuit ) method in the low-resolution test sets, then computers the high-resolution image blocks based on the above high-resolution dictionary and the later sparse coding matrix, finally reorders and averages the blocks to achieve the reconstructed high-resolution image. The experimental results show that the proposed method can achieve better quality for image super-resolution reconstruction than the traditional sparse coding method, the detail and texture of the reconstructed image are reconstructed well, and the algorithm can effectively inhibit the artifact of image edge phenomenon.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Preprocessing Method For The Analysis Of Incomplete Data On Students In Poverty 贫困学生不完整数据分析的数据预处理方法
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00060
Haiyan Huang, Bizhong Wei, Jian Dai, Wenlong Ke
Data mining is the focus of big data applications in various fields. Data pre-processing is a crucial step in the data mining process. With the development of the information society and the application of databases, the educational data has seen explosive growth, and the data on poor students has become informative. However, the actual student financial aid management system collects the data on poor students which generally has problems such as missing values, attributes redundancy, and noise. To solve this problem, we proposed a novel method called DPBP to preprocess data. The proposed DPBP approach consists of four stages: the preparation of data, the scoping of characteristics, the combination of characteristics, and the filtering of missing number. Firstly, we prepare the dataset by extracting data. Next, the characteristic range is limited by choosing experimental results of feature selection algorithm. Then, third stage performs feature combination to obtain the feature decomposition sets. Finally, based on accuracy and missing number, we gain the optimal dataset. Series of experiments result show that our proposed method significantly improves the data quality and stability.
数据挖掘是大数据在各个领域应用的焦点。数据预处理是数据挖掘过程中的关键步骤。随着信息社会的发展和数据库的应用,教育数据呈爆炸式增长,贫困学生的数据也越来越丰富。然而,实际的学生资助管理系统所收集的贫困生数据普遍存在缺失值、属性冗余、噪声等问题。为了解决这一问题,我们提出了一种新的数据预处理方法DPBP。提出的DPBP方法包括数据准备、特征范围确定、特征组合和缺失数过滤四个阶段。首先,我们通过提取数据来准备数据集。其次,通过选择特征选择算法的实验结果来限制特征范围。第三阶段进行特征组合,得到特征分解集。最后,基于准确率和缺失数,得到最优数据集。一系列实验结果表明,该方法显著提高了数据质量和稳定性。
{"title":"Data Preprocessing Method For The Analysis Of Incomplete Data On Students In Poverty","authors":"Haiyan Huang, Bizhong Wei, Jian Dai, Wenlong Ke","doi":"10.1109/CIS52066.2020.00060","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00060","url":null,"abstract":"Data mining is the focus of big data applications in various fields. Data pre-processing is a crucial step in the data mining process. With the development of the information society and the application of databases, the educational data has seen explosive growth, and the data on poor students has become informative. However, the actual student financial aid management system collects the data on poor students which generally has problems such as missing values, attributes redundancy, and noise. To solve this problem, we proposed a novel method called DPBP to preprocess data. The proposed DPBP approach consists of four stages: the preparation of data, the scoping of characteristics, the combination of characteristics, and the filtering of missing number. Firstly, we prepare the dataset by extracting data. Next, the characteristic range is limited by choosing experimental results of feature selection algorithm. Then, third stage performs feature combination to obtain the feature decomposition sets. Finally, based on accuracy and missing number, we gain the optimal dataset. Series of experiments result show that our proposed method significantly improves the data quality and stability.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning Technique 基于特征选择和集成学习技术的企业信用风险评估
Pub Date : 2020-11-01 DOI: 10.1109/CIS52066.2020.00056
Di Wang, Zuoquan Zhang
Financial crisis happened in 2008 has inflicted heavy losses on the global economy and enterprise credit risk has caused extensive concern. There are all kinds of financial data in an enterprise. By using these data, credit risk models can be used to judge credit risk accurately. However, there are still many limitations in these models and the high dimension data brings about difficulties for modeling. Therefore, this paper puts forward a hybrid system based on feature selection approach and ensemble learning. The first experiment is the hybrid system HFES based on F-score and ensemble learning; and the second one is the hybrid system HGIES combines the Gini index and ensemble learning. Both experiments achieve good performance. The real data set consists of 160 listed companies with total 22 features. By using this data, our experiment indicates that the accuracy of classification is signifiantly raised by hybrid system HFES and HGIES. Meanwhile, they not only can be applied to credit risk assessment, but also can be put into use in more fields.
2008年发生的金融危机给全球经济造成重大损失,企业信用风险引起广泛关注。企业中有各种各样的财务数据。利用这些数据,信用风险模型可以准确地判断信用风险。然而,这些模型仍然存在许多局限性,高维数据给建模带来了困难。因此,本文提出了一种基于特征选择方法和集成学习的混合系统。第一个实验是基于F-score和集成学习的混合系统HFES;二是结合基尼指数和集成学习的混合系统。两种实验均取得了较好的效果。真实数据集由160家上市公司组成,共有22个特征。利用这些数据,我们的实验表明,混合系统hes和hgis的分类精度显著提高。同时,它们不仅可以应用于信用风险评估,而且可以在更多的领域得到应用。
{"title":"Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning Technique","authors":"Di Wang, Zuoquan Zhang","doi":"10.1109/CIS52066.2020.00056","DOIUrl":"https://doi.org/10.1109/CIS52066.2020.00056","url":null,"abstract":"Financial crisis happened in 2008 has inflicted heavy losses on the global economy and enterprise credit risk has caused extensive concern. There are all kinds of financial data in an enterprise. By using these data, credit risk models can be used to judge credit risk accurately. However, there are still many limitations in these models and the high dimension data brings about difficulties for modeling. Therefore, this paper puts forward a hybrid system based on feature selection approach and ensemble learning. The first experiment is the hybrid system HFES based on F-score and ensemble learning; and the second one is the hybrid system HGIES combines the Gini index and ensemble learning. Both experiments achieve good performance. The real data set consists of 160 listed companies with total 22 features. By using this data, our experiment indicates that the accuracy of classification is signifiantly raised by hybrid system HFES and HGIES. Meanwhile, they not only can be applied to credit risk assessment, but also can be put into use in more fields.","PeriodicalId":106959,"journal":{"name":"2020 16th International Conference on Computational Intelligence and Security (CIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129370221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 16th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1