首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
Traffic Signs Detection and Recognition by Improved RBFNN 基于改进RBFNN的交通标志检测与识别
Yangping Wang, Jianwu Dang, Zhengping Zhu
The paper develops radial basis function neural networks (RBFNN) applications in the traffic signs recognition. Firstly traffic signs are detected by using their color and shape informations. Then genetic algorithm (GA), which has a powerful global exploration capability, is applied to train RBFNN to obtain appropriate structures and parameters according to given objective functions. In order to improve recognition speed and accuracy, traffic signs are classified into three categories by special color and shape information. Three RBFNNs are designed for the three categories. Before fed into networks, the sign images are transformed into binary images and their features are optimized by linear discriminate analysis (LDA). The training set imitating possible sign transformations in real road conditions, is created to train and test the nets. The experimental results show the feasibility and validity of the proposed algorithm.
研究径向基函数神经网络(RBFNN)在交通标志识别中的应用。首先,利用交通标志的颜色和形状信息进行检测。然后利用具有强大全局搜索能力的遗传算法(GA)对RBFNN进行训练,根据给定的目标函数获得合适的结构和参数。为了提高识别速度和准确性,根据交通标志的特殊颜色和形状信息将其分为三类。针对这三个类别设计了三个rbfnn。在输入网络之前,将符号图像转换为二值图像,并通过线性判别分析(LDA)对其特征进行优化。创建了模拟真实道路条件下可能的标志变换的训练集来训练和测试网络。实验结果表明了该算法的可行性和有效性。
{"title":"Traffic Signs Detection and Recognition by Improved RBFNN","authors":"Yangping Wang, Jianwu Dang, Zhengping Zhu","doi":"10.1109/CIS.2007.223","DOIUrl":"https://doi.org/10.1109/CIS.2007.223","url":null,"abstract":"The paper develops radial basis function neural networks (RBFNN) applications in the traffic signs recognition. Firstly traffic signs are detected by using their color and shape informations. Then genetic algorithm (GA), which has a powerful global exploration capability, is applied to train RBFNN to obtain appropriate structures and parameters according to given objective functions. In order to improve recognition speed and accuracy, traffic signs are classified into three categories by special color and shape information. Three RBFNNs are designed for the three categories. Before fed into networks, the sign images are transformed into binary images and their features are optimized by linear discriminate analysis (LDA). The training set imitating possible sign transformations in real road conditions, is created to train and test the nets. The experimental results show the feasibility and validity of the proposed algorithm.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123365582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data 基于计算机审计数据的入侵检测技术的典型集方法
Du Xuetao, Ji Chunfu, Fu Yubing
The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature database. Using the data set of UNM CERT sendmail for testing, the feasibility of typical set method is validated, and a proper rate of typical set for intrusion detection is proposed. Meanwhile, the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity. A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate. Abnormal detection experiments results show good performance of our intrusion detection method.
入侵检测系统的特征库通常由系统调用的短序列组成。特征库的规模和入侵数据分析的方法对入侵检测的实时性和准确性有很大的影响。本文提出了一种典型集压缩特征库的方法。利用UNM CERT发送邮件的数据集进行测试,验证了典型集方法的可行性,提出了典型集用于入侵检测的适当比率。同时,提出了LSM (Linux Security Modules)框架,从操作系统中钩接系统调用和其他审计数据,构建入侵检测系统特征库,识别入侵活动。为了提高入侵检测的针对性和准确性,还引入了面向系统服务过程的检测思想。异常检测实验结果表明了该方法的良好性能。
{"title":"A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data","authors":"Du Xuetao, Ji Chunfu, Fu Yubing","doi":"10.1109/CIS.2007.75","DOIUrl":"https://doi.org/10.1109/CIS.2007.75","url":null,"abstract":"The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature database. Using the data set of UNM CERT sendmail for testing, the feasibility of typical set method is validated, and a proper rate of typical set for intrusion detection is proposed. Meanwhile, the LSM (Linux Security Modules) framework is presented to hook system calls and other audit data from operation system to build intrusion detection system signature database and identify intrusion activity. A system service process oriented detection idea is also introduced to make the intrusion detection more pertinent and accurate. Abnormal detection experiments results show good performance of our intrusion detection method.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126516248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation 模糊等价关系下基于粗糙集的属性约简方法研究
Guorui Jiang, G. Zang
In this paper, first we proposed a method of attribute reduction based on rough set under fuzzy equivalent relation. We computed the similarity of cases with the fuzzy equivalent relation, reduced the attributes by the same fuzzy equivalent partitions based on rough set, and then gave a method of computing the weights of the attributes. Comparing with the traditional method of attribute reduction based on rough set, more information of the primary data is held, and more accuracy of the attribute reduction is enhanced by our method.
本文首先提出了一种模糊等价关系下基于粗糙集的属性约简方法。利用模糊等价关系计算案例的相似度,利用基于粗糙集的相同模糊等价分区约简属性,给出了属性权值的计算方法。与传统的基于粗糙集的属性约简方法相比,该方法保留了更多的原始数据信息,提高了属性约简的精度。
{"title":"A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation","authors":"Guorui Jiang, G. Zang","doi":"10.1109/CIS.2007.151","DOIUrl":"https://doi.org/10.1109/CIS.2007.151","url":null,"abstract":"In this paper, first we proposed a method of attribute reduction based on rough set under fuzzy equivalent relation. We computed the similarity of cases with the fuzzy equivalent relation, reduced the attributes by the same fuzzy equivalent partitions based on rough set, and then gave a method of computing the weights of the attributes. Comparing with the traditional method of attribute reduction based on rough set, more information of the primary data is held, and more accuracy of the attribute reduction is enhanced by our method.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"87 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126296152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shape Modification of B-Spline Curve with Geometric Constraints 几何约束下b样条曲线的形状修正
Siyuan Cheng, Xiangwei Zhang, Kelun Tang
A new physically based model for the shape modification of B-spline curve with geometric constraints is presented. The deformation energy of the B-spline curve is minimized based on finite element method, while geometric constraints can be imposed to control the modified shape. By changing the external force, different methods of modification can be obtained. The method based on least square, which results from applying no force, is local and simpler, but the modified shape seems less smooth. While the method based on global deformation, which is more complicated by adding synthetic spring force, can give more natural and smooth results.
提出了一种新的具有几何约束的b样条曲线形状修正的物理模型。利用有限元法使b样条曲线的变形能最小化,同时施加几何约束来控制修改后的形状。通过改变外力,可以得到不同的修饰方法。基于最小二乘的方法是不施加力的结果,是局部的和简单的,但修改后的形状似乎不那么光滑。而基于全局变形的方法由于加入了合成弹簧力而更加复杂,可以得到更加自然和平滑的结果。
{"title":"Shape Modification of B-Spline Curve with Geometric Constraints","authors":"Siyuan Cheng, Xiangwei Zhang, Kelun Tang","doi":"10.1109/CIS.2007.43","DOIUrl":"https://doi.org/10.1109/CIS.2007.43","url":null,"abstract":"A new physically based model for the shape modification of B-spline curve with geometric constraints is presented. The deformation energy of the B-spline curve is minimized based on finite element method, while geometric constraints can be imposed to control the modified shape. By changing the external force, different methods of modification can be obtained. The method based on least square, which results from applying no force, is local and simpler, but the modified shape seems less smooth. While the method based on global deformation, which is more complicated by adding synthetic spring force, can give more natural and smooth results.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Distribution Games with Minimum Risk Criteria 具有最小风险准则的模糊分布对策
Bin Sun, Yian-Kui Liu
In this paper, we present a new class of two-stage min- imum risk distribution games model based on credibility theory and two-stage fuzzy optimization method. Then we first introduce approximation approach to dealing with the approximation of the distribution games problem. After that, a hybrid algorithm, which combines approximation approach, neural network (NN) and particle warm opti- mizer (PSO), is designed to solve the distribution games problem, and a numerical example is given to show the fea- sibility of the hybrid algorithm.
本文基于可信性理论和两阶段模糊优化方法,提出了一类新的两阶段最小风险分配博弈模型。然后,我们首先引入近似方法来处理分布对策问题的近似。在此基础上,设计了一种结合近似法、神经网络(NN)和粒子热优化(PSO)的混合算法来求解分布博弈问题,并通过数值算例验证了该混合算法的可行性。
{"title":"Fuzzy Distribution Games with Minimum Risk Criteria","authors":"Bin Sun, Yian-Kui Liu","doi":"10.1109/CIS.2007.131","DOIUrl":"https://doi.org/10.1109/CIS.2007.131","url":null,"abstract":"In this paper, we present a new class of two-stage min- imum risk distribution games model based on credibility theory and two-stage fuzzy optimization method. Then we first introduce approximation approach to dealing with the approximation of the distribution games problem. After that, a hybrid algorithm, which combines approximation approach, neural network (NN) and particle warm opti- mizer (PSO), is designed to solve the distribution games problem, and a numerical example is given to show the fea- sibility of the hybrid algorithm.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved MRF Based Unsupervised Change Detection Method 一种改进的基于MRF的无监督变化检测方法
Yuan Qi, Zhao Rong-Chun
Traditional unsupervised change detection algorithms based on simple MRF model assume that subimages applied to extracting features are homogeneous, but that is not always true and causes low accuracy. Based on the fields correlation Markov random field (CMRF) model, an adaptive algorithm is proposed in this paper. The labeling is obtained through solving a MAP (Maximum a posterior) problem by ICM (Iteration Condition Model). Features of each pixel are exacted by using only the pixels currently labeled as the same pattern. With the adapted features, the new labeling is obtained. The satisfied experimental confirm the effectiveness of proposed techniques. Although the proposed method has been presented in the specific context of the analysis of multitemporal remote-sensing images, it could be used in any change detection application requiring the technique based on the difference image
传统的基于简单MRF模型的无监督变化检测算法假设用于提取特征的子图像是均匀的,但这并不总是正确的,并且导致准确率低。基于场相关马尔可夫随机场(CMRF)模型,提出了一种自适应算法。通过ICM(迭代条件模型)求解MAP (Maximum a posterior problem)问题获得标记。每个像素的特征仅通过使用当前标记为相同模式的像素来确定。利用适应的特征,得到新的标记。实验结果验证了所提方法的有效性。虽然所提出的方法是在多时相遥感图像分析的具体背景下提出的,但它可以用于任何需要基于差分图像技术的变化检测应用
{"title":"An Improved MRF Based Unsupervised Change Detection Method","authors":"Yuan Qi, Zhao Rong-Chun","doi":"10.1109/CIS.2007.100","DOIUrl":"https://doi.org/10.1109/CIS.2007.100","url":null,"abstract":"Traditional unsupervised change detection algorithms based on simple MRF model assume that subimages applied to extracting features are homogeneous, but that is not always true and causes low accuracy. Based on the fields correlation Markov random field (CMRF) model, an adaptive algorithm is proposed in this paper. The labeling is obtained through solving a MAP (Maximum a posterior) problem by ICM (Iteration Condition Model). Features of each pixel are exacted by using only the pixels currently labeled as the same pattern. With the adapted features, the new labeling is obtained. The satisfied experimental confirm the effectiveness of proposed techniques. Although the proposed method has been presented in the specific context of the analysis of multitemporal remote-sensing images, it could be used in any change detection application requiring the technique based on the difference image","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network 基于分类小波系数细节的动态反传播网络的灰度图像人脸检测
L. Yeong, L. Ang, K. Seng
A dynamic counterpropagation network based on the forward only counterpropagation network (CPN) is applied to face detection in this paper. The network, called the dynamic supervised forward-propagation network (DSFPN) trains using a supervised algorithm and can grow dynamically during training allowing subclasses in the training data to be learnt. The network is trained using the categorized wavelet coefficients of the image as features of the image. The results suggests a 98% correct detection rate can be achieved with 4% false positives by increasing network complexity.
将一种基于前向反传播网络(CPN)的动态反传播网络应用于人脸检测。该网络被称为动态监督前向传播网络(DSFPN),使用监督算法进行训练,并且可以在训练过程中动态增长,从而允许学习训练数据中的子类。使用图像的分类小波系数作为图像的特征来训练网络。结果表明,通过提高网络复杂性,可以实现98%的正确检测率和4%的误报。
{"title":"Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network","authors":"L. Yeong, L. Ang, K. Seng","doi":"10.1109/CIS.2007.230","DOIUrl":"https://doi.org/10.1109/CIS.2007.230","url":null,"abstract":"A dynamic counterpropagation network based on the forward only counterpropagation network (CPN) is applied to face detection in this paper. The network, called the dynamic supervised forward-propagation network (DSFPN) trains using a supervised algorithm and can grow dynamically during training allowing subclasses in the training data to be learnt. The network is trained using the categorized wavelet coefficients of the image as features of the image. The results suggests a 98% correct detection rate can be achieved with 4% false positives by increasing network complexity.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"42 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System 旋转倒立摆系统的离线和在线模糊反步控制器
M. Rahmanian, M. A. Shoorehdeli, M. Teshnehlab
In this study a new combination of nonlinear backstepping scheme with fuzzy system is presented for controlling a rotary inverted pendulum system to achieve better performance in nonlinear controller approach. This study uses two different fuzzy systems: off-line and on-line to consider different concept. The purpose of this study is to design a stabilizing controller that balances the inverted pendulum in the up-right position.
本文提出了一种新的非线性反推与模糊系统相结合的方法来控制旋转倒立摆系统,以获得更好的非线性控制性能。本研究采用离线和在线两种不同的模糊系统来考虑不同的概念。本研究的目的是设计一种稳定控制器,使倒立摆保持在直立状态。
{"title":"The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System","authors":"M. Rahmanian, M. A. Shoorehdeli, M. Teshnehlab","doi":"10.1109/CIS.2007.217","DOIUrl":"https://doi.org/10.1109/CIS.2007.217","url":null,"abstract":"In this study a new combination of nonlinear backstepping scheme with fuzzy system is presented for controlling a rotary inverted pendulum system to achieve better performance in nonlinear controller approach. This study uses two different fuzzy systems: off-line and on-line to consider different concept. The purpose of this study is to design a stabilizing controller that balances the inverted pendulum in the up-right position.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcing Business Leaders' Role in Striving for Information Security 加强商界领袖在争取资讯安全方面的作用
J. Anttila
{"title":"Reinforcing Business Leaders' Role in Striving for Information Security","authors":"J. Anttila","doi":"10.1109/CIS.2007.176","DOIUrl":"https://doi.org/10.1109/CIS.2007.176","url":null,"abstract":"","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs 梯级水库优化调度的改进遗传算法
Na Li, Ya-dong Mei
Based on the characteristics of optimal operation of cascaded hydropower stations, a mathematic model about the multistage optimization is established. In order to improve the capability of the traditional algorithm in optimal operation of cascaded reservoirs, Niche Genetic Algorithm (NGA) is suggested. This method could avoid the situation of GA convergence at a much earlier stage. The validity of improvement algorithm is testified by the solution of three classic functions. Finally it is successfully applied to the cascaded hydropower stations of the Qing River. The results show that NGA has not only better optimization capability, but also better accuracy. It is a superior non-linear optimal method which could locally search the global solution with greater probability.
根据梯级水电站优化运行的特点,建立了多级优化的数学模型。为了提高传统算法在梯级水库优化调度中的能力,提出了小生境遗传算法(NGA)。该方法避免了遗传算法在较早阶段收敛的情况。通过对三个经典函数的求解,验证了改进算法的有效性。最后将其成功应用于清河梯级水电站。结果表明,NGA不仅具有更好的优化能力,而且具有更好的精度。它能以较大的概率局部搜索全局解,是一种优越的非线性优化方法。
{"title":"An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs","authors":"Na Li, Ya-dong Mei","doi":"10.1109/CIS.2007.50","DOIUrl":"https://doi.org/10.1109/CIS.2007.50","url":null,"abstract":"Based on the characteristics of optimal operation of cascaded hydropower stations, a mathematic model about the multistage optimization is established. In order to improve the capability of the traditional algorithm in optimal operation of cascaded reservoirs, Niche Genetic Algorithm (NGA) is suggested. This method could avoid the situation of GA convergence at a much earlier stage. The validity of improvement algorithm is testified by the solution of three classic functions. Finally it is successfully applied to the cascaded hydropower stations of the Qing River. The results show that NGA has not only better optimization capability, but also better accuracy. It is a superior non-linear optimal method which could locally search the global solution with greater probability.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1