首页 > 最新文献

2018 14th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average 有效合谋-加权平均的可容忍安全多方计算
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00098
Hongwei Duan, Runmeng Du, Qiong Wei, Wenli Wang, Xin Liu
Secure multiparty computation is a research focus in the international cryptographic community and a key privacy preserving technology in cyberspaces. Secure multiparty computation for the weighted average problem has great significance, and there are a wide range of applications for this problem. However, there are only a few solutions to this problem at present. In addition, to the best of our knowledge, most of the existing secure multiparty computation schemes for weighted average cannot exclude the influence of invalid data on the weighted average. To address this challenge, in this paper, we propose a corresponding solution to eliminate the influence of invalid data on the final result, and specific number of participants who give invalid datas will not be revealed. A new secure multiparty computation protocol for weighted average are designed to effectively resist different levels of collusion attacks, and the security analysis and performance analysis of the protocol is given. Finally, secure multiparty computation protocol for the weighted average problem is applied to solve secure data aggregation problem, secure weighted voting problem, and privacy-preserving location proximity detection.
安全多方计算是国际密码学界的研究热点,也是网络空间中关键的隐私保护技术。加权平均问题的安全多方计算具有重要意义,具有广泛的应用前景。然而,目前解决这一问题的方法不多。此外,据我们所知,大多数现有的加权平均安全多方计算方案都不能排除无效数据对加权平均的影响。针对这一挑战,在本文中,我们提出了相应的解决方案,以消除无效数据对最终结果的影响,并且不会透露提供无效数据的具体参与者人数。设计了一种新的加权平均安全多方计算协议,以有效抵御不同级别的合谋攻击,并对该协议进行了安全性分析和性能分析。最后,将加权平均问题的安全多方计算协议应用于安全数据聚合问题、安全加权投票问题和保护隐私的位置邻近检测问题。
{"title":"Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average","authors":"Hongwei Duan, Runmeng Du, Qiong Wei, Wenli Wang, Xin Liu","doi":"10.1109/CIS2018.2018.00098","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00098","url":null,"abstract":"Secure multiparty computation is a research focus in the international cryptographic community and a key privacy preserving technology in cyberspaces. Secure multiparty computation for the weighted average problem has great significance, and there are a wide range of applications for this problem. However, there are only a few solutions to this problem at present. In addition, to the best of our knowledge, most of the existing secure multiparty computation schemes for weighted average cannot exclude the influence of invalid data on the weighted average. To address this challenge, in this paper, we propose a corresponding solution to eliminate the influence of invalid data on the final result, and specific number of participants who give invalid datas will not be revealed. A new secure multiparty computation protocol for weighted average are designed to effectively resist different levels of collusion attacks, and the security analysis and performance analysis of the protocol is given. Finally, secure multiparty computation protocol for the weighted average problem is applied to solve secure data aggregation problem, secure weighted voting problem, and privacy-preserving location proximity detection.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion Detection 一种改进的网络入侵检测动态克隆选择算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00062
Li Ma, Jingjing Qu, Yan Chen, Shiwei Wei
An improved Dynamic Clonal Selection Algorithm (IDCSA) is proposed in this paper which is used in distributed network intrusion detection system (NIDS). It aims to improve the detector's ability to recognize both the known and unknown intrusions by using the strategies of establishing rules of expert knowledge, automatic evolution of gene pools, and optimization of detector generation process. The experimental results show that the proposed IDCSA can reduce FP (false positive) and improve TP (true positive), effectively improve the detection performance and adaptability of the system.
提出了一种用于分布式网络入侵检测系统的改进动态克隆选择算法(IDCSA)。通过建立专家知识规则、自动进化基因库、优化检测器生成过程等策略,提高检测器对已知和未知入侵的识别能力。实验结果表明,所提出的IDCSA能够有效地降低假阳性(FP)和提高真阳性(TP),有效地提高了系统的检测性能和适应性。
{"title":"An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion Detection","authors":"Li Ma, Jingjing Qu, Yan Chen, Shiwei Wei","doi":"10.1109/CIS2018.2018.00062","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00062","url":null,"abstract":"An improved Dynamic Clonal Selection Algorithm (IDCSA) is proposed in this paper which is used in distributed network intrusion detection system (NIDS). It aims to improve the detector's ability to recognize both the known and unknown intrusions by using the strategies of establishing rules of expert knowledge, automatic evolution of gene pools, and optimization of detector generation process. The experimental results show that the proposed IDCSA can reduce FP (false positive) and improve TP (true positive), effectively improve the detection performance and adaptability of the system.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"111 3S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Quality Analysis and Reform of Professional Construction—Illustrated by the Case of Dongguan Polytechnic 专业建设质量分析与改革——以东莞职业技术学院为例
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00076
Tianxiang Feng, Hongxia Liu, Zhonglin Wan
The talent development data of two typical departments were collected from the talent training plan and the evaluation report made by a consulting company. Based on the data, the professional construction of two departments is evaluated and compared by using four-table chi-square test. And then the relationship between the professional ability, the career maturity, the ratio of basic ability improvement, the ratio of innovation ability improvement, and the ratio of professional quality improvement are explored. Finally, some useful rules between them are discovered.
两个典型部门的人才发展数据收集自某咨询公司的人才培养计划和评估报告。根据数据,采用四表卡方检验对两个科室的专业建设进行评价和比较。进而探讨了职业能力与职业成熟度、基本能力提升比例、创新能力提升比例、职业素质提升比例之间的关系。最后,发现了它们之间的一些有用的规律。
{"title":"The Quality Analysis and Reform of Professional Construction—Illustrated by the Case of Dongguan Polytechnic","authors":"Tianxiang Feng, Hongxia Liu, Zhonglin Wan","doi":"10.1109/CIS2018.2018.00076","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00076","url":null,"abstract":"The talent development data of two typical departments were collected from the talent training plan and the evaluation report made by a consulting company. Based on the data, the professional construction of two departments is evaluated and compared by using four-table chi-square test. And then the relationship between the professional ability, the career maturity, the ratio of basic ability improvement, the ratio of innovation ability improvement, and the ratio of professional quality improvement are explored. Finally, some useful rules between them are discovered.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124728918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm and Scheme in RNA Structure Prediction Including Pseudoknots 包含假结的RNA结构预测算法与方案
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00050
Zhendong Liu, Fanghan Liu, Qingxia Kong, Fanchang Hao, Hongluan Zhao
It is an NP-hard problem for prediction of RNA folding structure incuding pseudoknots, we investigate the RNA pseudoknotted structure based on characteristics of the RNA folding structure, and the Basin Hopping Graph as a novel model of RNA folding landscape structures. Our paper design an 1+ε (ε>0) polynomial time approximation scheme in searching maximum number of stackings, we give the proof of the approximation scheme in RNA pseudoknotted structure. we have also presented the computing algorithm of barrier tree based on the BHG.
基于RNA折叠结构的特点,我们研究了RNA的伪结结构,并将盆跳图作为RNA折叠景观结构的一种新模型。本文设计了一种1+ε (ε>0)多项式时间逼近方案来搜索最大堆叠数,并在RNA伪结结构中给出了该逼近方案的证明。提出了基于BHG的屏障树的计算算法。
{"title":"Algorithm and Scheme in RNA Structure Prediction Including Pseudoknots","authors":"Zhendong Liu, Fanghan Liu, Qingxia Kong, Fanchang Hao, Hongluan Zhao","doi":"10.1109/CIS2018.2018.00050","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00050","url":null,"abstract":"It is an NP-hard problem for prediction of RNA folding structure incuding pseudoknots, we investigate the RNA pseudoknotted structure based on characteristics of the RNA folding structure, and the Basin Hopping Graph as a novel model of RNA folding landscape structures. Our paper design an 1+ε (ε>0) polynomial time approximation scheme in searching maximum number of stackings, we give the proof of the approximation scheme in RNA pseudoknotted structure. we have also presented the computing algorithm of barrier tree based on the BHG.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131627678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Collaborative Representation and Discriminative Projection for Pattern Classification 模式分类的联合协同表示与判别投影
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00035
Junyu Li, Haoliang Yuan, L. L. Lai, Yiu-ming Cheung
Representation-based classifiers have shown the impressive results for pattern classification. In this paper, we propose a joint collaborative representation and discriminative projection model (JCRDP) for subspace learning. We aim to seek a linear projection matrix to effectively reveal or maintain the underlying structure of original data and well fit collaborative representation classifier simultaneously. Unlike previous representation-based subspace learning methods, in which the linear reconstruction and the generalized eigenvalue decomposition are two independent steps, our proposed JCRDP integrates these two tasks into one single optimization step to learn a more discriminative linear projection matrix. To effectively solve JCRDP, we develop an alternative strategy to deal with the optimization problem. Extensive experimental results demonstrate the effectiveness of our proposed method.
基于表示的分类器在模式分类方面显示了令人印象深刻的结果。本文提出了一种用于子空间学习的联合协同表示与判别投影模型(JCRDP)。我们的目标是寻求一个线性投影矩阵,以有效地揭示或保持原始数据的底层结构,同时很好地适合协同表示分类器。不同于以往基于表示的子空间学习方法,线性重构和广义特征值分解是两个独立的步骤,我们提出的JCRDP将这两个任务集成到一个优化步骤中,以学习更具判别性的线性投影矩阵。为了有效地解决JCRDP问题,我们开发了一种替代策略来处理优化问题。大量的实验结果证明了该方法的有效性。
{"title":"Joint Collaborative Representation and Discriminative Projection for Pattern Classification","authors":"Junyu Li, Haoliang Yuan, L. L. Lai, Yiu-ming Cheung","doi":"10.1109/CIS2018.2018.00035","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00035","url":null,"abstract":"Representation-based classifiers have shown the impressive results for pattern classification. In this paper, we propose a joint collaborative representation and discriminative projection model (JCRDP) for subspace learning. We aim to seek a linear projection matrix to effectively reveal or maintain the underlying structure of original data and well fit collaborative representation classifier simultaneously. Unlike previous representation-based subspace learning methods, in which the linear reconstruction and the generalized eigenvalue decomposition are two independent steps, our proposed JCRDP integrates these two tasks into one single optimization step to learn a more discriminative linear projection matrix. To effectively solve JCRDP, we develop an alternative strategy to deal with the optimization problem. Extensive experimental results demonstrate the effectiveness of our proposed method.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Standardization of Detection Data of Atmospheric Microparticle Lidar Based on Metadata 基于元数据的大气微粒激光雷达探测数据标准化研究
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00114
Jie Zhang, Hao Chen, Kai Wang
Decentralized original and disordered management of atmospheric lidar data are seriously obstructing regional atmospheric environment research. Though the analysis of the characteristics of atmospheric lidar data in this paper, it shows that it is very necessary to create the data standard based on metadata. After the analysis of the basic functions and the main content of the atmospheric lidar metadata standard, it gives a descriptive method and atmospheric lidar metadata model to based on meteorological metadata standard.
大气激光雷达数据的原始分散和管理混乱严重阻碍了区域大气环境研究。本文通过对大气激光雷达数据特点的分析,指出建立基于元数据的数据标准是十分必要的。在分析了大气激光雷达元数据标准的基本功能和主要内容的基础上,提出了基于气象元数据标准的大气激光雷达元数据描述方法和模型。
{"title":"Study on Standardization of Detection Data of Atmospheric Microparticle Lidar Based on Metadata","authors":"Jie Zhang, Hao Chen, Kai Wang","doi":"10.1109/CIS2018.2018.00114","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00114","url":null,"abstract":"Decentralized original and disordered management of atmospheric lidar data are seriously obstructing regional atmospheric environment research. Though the analysis of the characteristics of atmospheric lidar data in this paper, it shows that it is very necessary to create the data standard based on metadata. After the analysis of the basic functions and the main content of the atmospheric lidar metadata standard, it gives a descriptive method and atmospheric lidar metadata model to based on meteorological metadata standard.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"37 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Consumption and Investment Strategies in a Jump-Diffusion Model 跳跃-扩散模型中的最优消费与投资策略
Pub Date : 2018-11-01 DOI: 10.1109/cis2018.2018.00110
Yunfeng Yang, Huihui Bai, Yinchun Zheng
A portfolio optimization problem with consumption is considered.Risky asset price obeys jump-diffusion process, and the dividend is paid continuously.The goal is to choose optimal investment and consumption policies for the problem of maximizing expected total utility form both consumption and terminal wealth. It is fined unique equivalent martingale measure, we employ the conventional stochastic analysis methods. We find explicit formula for the optimal portfolio and the consumption process.In addition, for a special case where the utility is logarithmic or is a power function, an explicit formula is given.
考虑了一个有消费的投资组合优化问题。风险资产价格遵循跳跃-扩散过程,股息是连续支付的。目标是为消费和终端财富的期望总效用最大化问题选择最优的投资和消费政策。它被定义为唯一的等价鞅测度,我们使用常规的随机分析方法。我们找到了最优投资组合和消费过程的显式公式。此外,对于效用为对数或幂函数的特殊情况,给出了显式公式。
{"title":"Optimal Consumption and Investment Strategies in a Jump-Diffusion Model","authors":"Yunfeng Yang, Huihui Bai, Yinchun Zheng","doi":"10.1109/cis2018.2018.00110","DOIUrl":"https://doi.org/10.1109/cis2018.2018.00110","url":null,"abstract":"A portfolio optimization problem with consumption is considered.Risky asset price obeys jump-diffusion process, and the dividend is paid continuously.The goal is to choose optimal investment and consumption policies for the problem of maximizing expected total utility form both consumption and terminal wealth. It is fined unique equivalent martingale measure, we employ the conventional stochastic analysis methods. We find explicit formula for the optimal portfolio and the consumption process.In addition, for a special case where the utility is logarithmic or is a power function, an explicit formula is given.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117134000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Validation Method Based on IP Covert Channel Packet Ordering 一种基于IP隐蔽信道分组排序的数据验证方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00056
Tianwen Huang, Lejun Zhang, Xiaoyan Hu, Xiaoying Lei
Information hiding technology based on IP covert channel is a research hotspot. Although the existing packet ordering IP covert channel can realize data transmission, it is unable to judge the correctness of data transmission due to the lack of data verification. In this paper, a data verification method based on packet ordering IP covert channel is proposed. Two different covert data transmission methods are used for data transmission, and data verification is carried out after the transmission of data is completed. Experiments show that the method proposed in this paper can realize data verification and can use retransmission mechanism to retransmit data after data is different.
基于IP隐蔽信道的信息隐藏技术是一个研究热点。现有的分组排序IP隐蔽通道虽然可以实现数据传输,但由于缺乏数据验证,无法判断数据传输的正确性。提出了一种基于分组排序的IP隐蔽信道数据验证方法。数据传输采用两种不同的隐蔽数据传输方式,数据传输完成后进行数据验证。实验表明,本文提出的方法可以实现数据验证,并可以在数据不同后使用重传机制进行重传。
{"title":"A Data Validation Method Based on IP Covert Channel Packet Ordering","authors":"Tianwen Huang, Lejun Zhang, Xiaoyan Hu, Xiaoying Lei","doi":"10.1109/CIS2018.2018.00056","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00056","url":null,"abstract":"Information hiding technology based on IP covert channel is a research hotspot. Although the existing packet ordering IP covert channel can realize data transmission, it is unable to judge the correctness of data transmission due to the lack of data verification. In this paper, a data verification method based on packet ordering IP covert channel is proposed. Two different covert data transmission methods are used for data transmission, and data verification is carried out after the transmission of data is completed. Experiments show that the method proposed in this paper can realize data verification and can use retransmission mechanism to retransmit data after data is different.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123233508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image of Plant Disease Segmentation Model Based on Pulse Coupled Neural Network with Shuffle Frog Leap Algorithm 基于脉冲耦合神经网络和Shuffle Frog Leap算法的植物病害图像分割模型
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00044
X. Guo, Ming Zhang, Yongqiang Dai
Image segmentation is a key step in feature extraction and disease recognition of plant diseases images. To avoid the subjectivity of using traditional PCNN (pulse-coupled neural network) to segment plant disease image, a new image segmentation model (SFLA-PCNN) is proposed in this paper to get the parameters configuration of PCNN. The weighted sum of cross entropy and compactness degree of image segmentation is chosen as fitness function of shuffled frog leap algorithm to optimize the parameters PCNN, which could improve the performance of PCNN. After 100 times local iteration and 1500 times global iteration, we get the best parameter configure. The extensive tests prove that SFLA-PCNN model could be used to extract the lesion from the background effectively, which could provide a foundation for following disease diagnose.
图像分割是植物病害图像特征提取和病害识别的关键步骤。为了避免传统脉冲耦合神经网络(PCNN)分割植物病害图像时的主观性,本文提出了一种新的图像分割模型(SFLA-PCNN),得到了PCNN的参数配置。选择交叉熵和图像分割紧密度的加权和作为shuffle frog leap算法的适应度函数,对PCNN参数进行优化,提高了PCNN的性能。经过100次局部迭代和1500次全局迭代,得到了最佳参数配置。大量的实验证明,SFLA-PCNN模型可以有效地从背景中提取病变,为后续的疾病诊断提供依据。
{"title":"Image of Plant Disease Segmentation Model Based on Pulse Coupled Neural Network with Shuffle Frog Leap Algorithm","authors":"X. Guo, Ming Zhang, Yongqiang Dai","doi":"10.1109/CIS2018.2018.00044","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00044","url":null,"abstract":"Image segmentation is a key step in feature extraction and disease recognition of plant diseases images. To avoid the subjectivity of using traditional PCNN (pulse-coupled neural network) to segment plant disease image, a new image segmentation model (SFLA-PCNN) is proposed in this paper to get the parameters configuration of PCNN. The weighted sum of cross entropy and compactness degree of image segmentation is chosen as fitness function of shuffled frog leap algorithm to optimize the parameters PCNN, which could improve the performance of PCNN. After 100 times local iteration and 1500 times global iteration, we get the best parameter configure. The extensive tests prove that SFLA-PCNN model could be used to extract the lesion from the background effectively, which could provide a foundation for following disease diagnose.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Smoothing Penalty Function Algorithm for Two-Cardinality Sparse Constrained Optimization Problems 二基数稀疏约束优化问题的一种平滑罚函数算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00018
M. Jiang, Z. Meng, Gengui Zhou, R. Shen
In this paper, a smoothing penalty function for two-cardinality sparse constrained optimization problems is presented. The paper proves that this type of the smoothing penalty functions has good properties in helping to solve two-cardinality sparse constrained optimization problems. Moreover, based on the penalty function, an algorithm is presented to solve the two-cardinality sparse constrained optimization problems, with its convergence under some conditions proved. A numerical experiment shows that a satisfactory approximate optimal solution can be obtained by the proposed algorithm.
提出了一种适用于二基数稀疏约束优化问题的平滑惩罚函数。证明了这类平滑惩罚函数在解决双基数稀疏约束优化问题上具有良好的性能。在此基础上,提出了一种基于惩罚函数的二基数稀疏约束优化算法,并证明了该算法在一定条件下的收敛性。数值实验表明,该算法能得到满意的近似最优解。
{"title":"A Smoothing Penalty Function Algorithm for Two-Cardinality Sparse Constrained Optimization Problems","authors":"M. Jiang, Z. Meng, Gengui Zhou, R. Shen","doi":"10.1109/CIS2018.2018.00018","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00018","url":null,"abstract":"In this paper, a smoothing penalty function for two-cardinality sparse constrained optimization problems is presented. The paper proves that this type of the smoothing penalty functions has good properties in helping to solve two-cardinality sparse constrained optimization problems. Moreover, based on the penalty function, an algorithm is presented to solve the two-cardinality sparse constrained optimization problems, with its convergence under some conditions proved. A numerical experiment shows that a satisfactory approximate optimal solution can be obtained by the proposed algorithm.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 14th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1