首页 > 最新文献

2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)最新文献

英文 中文
An innovative approach for feature selection based on chicken swarm optimization 一种基于鸡群优化的特征选择方法
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492775
Ahmed Hafez, Hossam M. Zawbaa, E. Emary, Hamdi A. Mahmoud, A. Hassanien
In this paper, a system for feature selection based on chicken swarm optimization (CSO) algorithm is proposed. Datasets ordinarily includes a huge number of attributes, with irrelevant and redundant attribute. Commonly wrapper-based approaches are used for feature selection but it always requires an intelligent search technique as part of the evaluation function. Chicken swarm optimization (CSO)is a new bio-inspired algorithm mimicking the hierarchal order of the chicken swarm and the behaviors of chicken swarm, including roosters, hens and chicks, CSO can efficiently extract the chickens' swarm intelligence to optimize problems. Therefore, CSO was employed to feature selection in wrapper mode to search the feature space for optimal feature combination maximizing classification performance, while minimizing the number of selected features. The proposed system was benchmarked on 18 datasets drawn from the UCI repository and using different evaluation criteria and proves advance over particle swarm optimization (PSO) and genetic algorithms (GA) that commonly used in optimization problems.
提出了一种基于鸡群优化(CSO)算法的特征选择系统。数据集通常包含大量的属性,其中有不相关的和冗余的属性。通常基于包装器的方法用于特征选择,但它总是需要智能搜索技术作为评估功能的一部分。鸡群优化算法(CSO)是一种模仿鸡群(公鸡、母鸡和小鸡)的等级秩序和行为的新型仿生算法,可以有效地提取鸡群智能来优化问题。因此,将CSO用于包装器模式的特征选择,在特征空间中搜索最优的特征组合,使分类性能最大化,同时使选择的特征数量最少。基于UCI知识库中的18个数据集,采用不同的评价标准对该系统进行了基准测试,证明了该系统在优化问题中优于粒子群算法(PSO)和遗传算法(GA)。
{"title":"An innovative approach for feature selection based on chicken swarm optimization","authors":"Ahmed Hafez, Hossam M. Zawbaa, E. Emary, Hamdi A. Mahmoud, A. Hassanien","doi":"10.1109/SOCPAR.2015.7492775","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492775","url":null,"abstract":"In this paper, a system for feature selection based on chicken swarm optimization (CSO) algorithm is proposed. Datasets ordinarily includes a huge number of attributes, with irrelevant and redundant attribute. Commonly wrapper-based approaches are used for feature selection but it always requires an intelligent search technique as part of the evaluation function. Chicken swarm optimization (CSO)is a new bio-inspired algorithm mimicking the hierarchal order of the chicken swarm and the behaviors of chicken swarm, including roosters, hens and chicks, CSO can efficiently extract the chickens' swarm intelligence to optimize problems. Therefore, CSO was employed to feature selection in wrapper mode to search the feature space for optimal feature combination maximizing classification performance, while minimizing the number of selected features. The proposed system was benchmarked on 18 datasets drawn from the UCI repository and using different evaluation criteria and proves advance over particle swarm optimization (PSO) and genetic algorithms (GA) that commonly used in optimization problems.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114240138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Stream-based Particle Swarm Optimization for data migration decision 基于流的粒子群算法的数据迁移决策
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492818
Qiuchen Cheng, Kun Ma, Bo Yang
As the load in the cloud environment is always changing, data migration become a key technology to realize the load balance of clusters. A good migration decision can make data migration more efficiency. To realize the migration decision rapidly, parallel Particle Swarm Optimization (PSO) based on stream computing technology is presented in this paper. We use PSO to get a migration plan with minimum overhead. Since the implementation of traditional PSO in serial is a huge waste of time in our scene, we design and accomplish Stream-based Particle Swarm Optimization (SPSO). SPSO utilizes stream computing technology to realize parallel PSO to make the process of data migration decision more rapidly and accurately, and realize real-time decisions on the basis of real-time status of nodes in the cloud. The average execution time of our SPSO is shorter than traditional serial PSO algorithm, and the migration cost of data migration decision result is lower.
由于云环境中的负载是不断变化的,数据迁移成为实现集群负载均衡的关键技术。一个好的迁移决策可以提高数据迁移的效率。为了快速实现迁移决策,本文提出了基于流计算技术的并行粒子群优化算法。我们使用PSO来获得开销最小的迁移计划。由于传统的粒子群优化算法在场景中的串行实现浪费大量时间,我们设计并实现了基于流的粒子群优化算法(SPSO)。SPSO利用流计算技术实现并行PSO,使数据迁移决策过程更加快速、准确,并根据云中节点的实时状态实现实时决策。与传统串行粒子群算法相比,该算法的平均执行时间更短,数据迁移决策结果的迁移成本更低。
{"title":"Stream-based Particle Swarm Optimization for data migration decision","authors":"Qiuchen Cheng, Kun Ma, Bo Yang","doi":"10.1109/SOCPAR.2015.7492818","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492818","url":null,"abstract":"As the load in the cloud environment is always changing, data migration become a key technology to realize the load balance of clusters. A good migration decision can make data migration more efficiency. To realize the migration decision rapidly, parallel Particle Swarm Optimization (PSO) based on stream computing technology is presented in this paper. We use PSO to get a migration plan with minimum overhead. Since the implementation of traditional PSO in serial is a huge waste of time in our scene, we design and accomplish Stream-based Particle Swarm Optimization (SPSO). SPSO utilizes stream computing technology to realize parallel PSO to make the process of data migration decision more rapidly and accurately, and realize real-time decisions on the basis of real-time status of nodes in the cloud. The average execution time of our SPSO is shorter than traditional serial PSO algorithm, and the migration cost of data migration decision result is lower.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A recursive estimation of network state for improving probabilistic caching 一种改进概率缓存的网络状态递归估计
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492819
Munehiro Namba
There is a trend to introduce content caches as an inherent capacity of network device, such as routers, for improving the efficiency of content distribution and reducing network traffic. In this paper, we discuss the network state estimation in probabilistic caching based on a study with Bayesian inference, and propose a recursive estimation method for potentially improving the performance of adaptation to time-varying network state.
有一种趋势是将内容缓存作为网络设备(如路由器)的固有容量引入,以提高内容分发的效率并减少网络流量。本文在贝叶斯推理的基础上,讨论了概率缓存中的网络状态估计问题,提出了一种递归估计方法,有望提高网络对时变状态的自适应性能。
{"title":"A recursive estimation of network state for improving probabilistic caching","authors":"Munehiro Namba","doi":"10.1109/SOCPAR.2015.7492819","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492819","url":null,"abstract":"There is a trend to introduce content caches as an inherent capacity of network device, such as routers, for improving the efficiency of content distribution and reducing network traffic. In this paper, we discuss the network state estimation in probabilistic caching based on a study with Bayesian inference, and propose a recursive estimation method for potentially improving the performance of adaptation to time-varying network state.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image encryption scheme for secure digital images based on 3D cat map and Turing machine 基于三维猫图和图灵机的安全数字图像加密方案
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492812
N. A. Mohamed, M. A. El-Azeim, Alaa Zaghloul, A. El-latif
In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. This paper presents a new image encryption scheme relaying on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The proposed technique composed of two processes of pixels' locations confusion using a chaotic 3D cat map, which is performed concurrently with substituting values swapping pixels' locations using Turing machine. The generated key is dependent on the plain image, to resist the chosen plaintext attack. Both experimental and security analysis show that the presented technique can achieve a large key space and resist the common against cipher attacks. These good cryptographic advantages make it suitable for image transmission over network.
目前,为了保证多媒体数据在传输和存储过程中的安全性,可以采用加密技术对图像数据进行保护。提出了一种基于混沌三维猫图和图灵机的动态随机增长技术的图像加密方案。该技术由两个过程组成:利用混沌三维猫图进行像素位置混淆,同时利用图灵机进行替换值交换像素位置。生成的密钥依赖于明文图像,以抵抗所选择的明文攻击。实验和安全性分析表明,该方法可以实现较大的密钥空间,并能抵抗常见的反密码攻击。这些良好的密码学优势使其适用于网络上的图像传输。
{"title":"Image encryption scheme for secure digital images based on 3D cat map and Turing machine","authors":"N. A. Mohamed, M. A. El-Azeim, Alaa Zaghloul, A. El-latif","doi":"10.1109/SOCPAR.2015.7492812","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492812","url":null,"abstract":"In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. This paper presents a new image encryption scheme relaying on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The proposed technique composed of two processes of pixels' locations confusion using a chaotic 3D cat map, which is performed concurrently with substituting values swapping pixels' locations using Turing machine. The generated key is dependent on the plain image, to resist the chosen plaintext attack. Both experimental and security analysis show that the presented technique can achieve a large key space and resist the common against cipher attacks. These good cryptographic advantages make it suitable for image transmission over network.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Integer wavelet transform for thermal image authentication 整数小波变换在热图像认证中的应用
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492794
S. Yassen, T. Gaber, A. Hassanien
Thermal imaging is a technology with property of seeing objects in the darkness. Such property makes this technology very important tool for security and surveillance applications. In this paper, a thermal image authentication technique using hash function is proposed. In this technique, the thermal images are used as cover images and bits from secret data (i.e. messages or images) are then hidden in the cover images. This is achieved by using the hash function and Integer Wavelet Transform (IWT). 1, 2 and 3 bits per bytes have been hidden in both horizontal and vertical components of wavelet transform. The proposed technique has been evaluated based on mean square error (MSE), peak signal to noise ratio (PSNR), image fidelity (IF) and standard deviation (SD). The results have shown better performance of the proposed technique comparing with the most related work.
热成像技术是一种能够在黑暗中看清物体的技术。这种特性使该技术成为安全监控应用的重要工具。本文提出了一种基于哈希函数的热图像认证技术。在这种技术中,热图像被用作封面图像,然后从秘密数据(即消息或图像)隐藏在封面图像中。这是通过使用哈希函数和整数小波变换(IWT)来实现的。每字节1、2和3位隐藏在小波变换的水平和垂直分量中。基于均方误差(MSE)、峰值信噪比(PSNR)、图像保真度(IF)和标准差(SD)对该技术进行了评估。结果表明,与大多数相关工作相比,该技术具有更好的性能。
{"title":"Integer wavelet transform for thermal image authentication","authors":"S. Yassen, T. Gaber, A. Hassanien","doi":"10.1109/SOCPAR.2015.7492794","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492794","url":null,"abstract":"Thermal imaging is a technology with property of seeing objects in the darkness. Such property makes this technology very important tool for security and surveillance applications. In this paper, a thermal image authentication technique using hash function is proposed. In this technique, the thermal images are used as cover images and bits from secret data (i.e. messages or images) are then hidden in the cover images. This is achieved by using the hash function and Integer Wavelet Transform (IWT). 1, 2 and 3 bits per bytes have been hidden in both horizontal and vertical components of wavelet transform. The proposed technique has been evaluated based on mean square error (MSE), peak signal to noise ratio (PSNR), image fidelity (IF) and standard deviation (SD). The results have shown better performance of the proposed technique comparing with the most related work.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust vehicle tracking and detection from UAVs 来自无人机的鲁棒车辆跟踪和检测
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492814
Xiyan Chen, Q. Meng
Unmanned Aerial Vehicles have been used widely in the commercial and surveillance use in the recent year. Vehicle tracking from aerial video is one of commonly used application. In this paper, a self-learning mechanism has been proposed for the vehicle tracking in real time. The main contribution of this paper is that the proposed system can automatic detect and track multiple vehicles with a self-learning process leading to enhance the tracking and detection accuracy. Two detection methods have been used for the detection. The Features from Accelerated Segment Test (FAST) with Histograms of Oriented Gradient (HoG) method and the HSV colour feature with Grey Level Cooccurrence Matrix (GLCM) method have been proposed for the vehicle detection. A Forward and Backward Tracking (FBT) mechanism has been employed for the vehicle tracking. The main purpose of this research is to increase the vehicle detection accuracy by using the tracking results and the learning process, which can monitor the detection and tracking performance by using their outputs. Videos captured from UAVs have been used to evaluate the performance of the proposed method. According to the results, the proposed learning system can increase the detection performance.
近年来,无人机在商业和监视领域得到了广泛的应用。航拍视频的车辆跟踪是常用的应用之一。本文提出了一种用于车辆实时跟踪的自学习机制。本文的主要贡献在于该系统能够自动检测和跟踪多辆车辆,并具有自学习过程,从而提高了跟踪和检测精度。采用了两种检测方法进行检测。提出了基于定向梯度直方图(HoG)方法的加速段测试(FAST)特征和基于灰度协同矩阵(GLCM)方法的HSV颜色特征用于车辆检测。采用前向和后向跟踪(FBT)机制对车辆进行跟踪。本研究的主要目的是利用跟踪结果和学习过程来提高车辆检测精度,并利用它们的输出来监控检测和跟踪性能。从无人机捕获的视频已用于评估所提出的方法的性能。结果表明,所提出的学习系统可以提高检测性能。
{"title":"Robust vehicle tracking and detection from UAVs","authors":"Xiyan Chen, Q. Meng","doi":"10.1109/SOCPAR.2015.7492814","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492814","url":null,"abstract":"Unmanned Aerial Vehicles have been used widely in the commercial and surveillance use in the recent year. Vehicle tracking from aerial video is one of commonly used application. In this paper, a self-learning mechanism has been proposed for the vehicle tracking in real time. The main contribution of this paper is that the proposed system can automatic detect and track multiple vehicles with a self-learning process leading to enhance the tracking and detection accuracy. Two detection methods have been used for the detection. The Features from Accelerated Segment Test (FAST) with Histograms of Oriented Gradient (HoG) method and the HSV colour feature with Grey Level Cooccurrence Matrix (GLCM) method have been proposed for the vehicle detection. A Forward and Backward Tracking (FBT) mechanism has been employed for the vehicle tracking. The main purpose of this research is to increase the vehicle detection accuracy by using the tracking results and the learning process, which can monitor the detection and tracking performance by using their outputs. Videos captured from UAVs have been used to evaluate the performance of the proposed method. According to the results, the proposed learning system can increase the detection performance.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Quantitative network analysis for passenger pattern recognition: An analysis of railway stations 客流模式识别的定量网络分析:以火车站为例
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492815
M. Zsifkovits, M. S. Nistor, Silja Meyer-Nieberg
As recent attacks in trains and train stations show, the protections of such critical infrastructure plays a major role for public decision makers. Thereby, security installations in the railway network are a frequently discussed topic. Especially the need for an open system demands for technologies that do not influence or delay passenger flows. This also leads to the question of optimal placement of security installations such as smart camera systems or stand-off detectors. For answering this question we observed passenger flows in the Munich central station. The observation data was transferred into a quantitative network and analyzed using various measures. With its help, critical parameter constellations can be identified and investigated in detail. Furthermore we are able to identify special groups of passengers and the differences in their behavior.
最近发生在火车和火车站的袭击表明,保护这些关键基础设施对公共决策者起着重要作用。因此,铁路网中的安全装置是一个经常讨论的话题。特别是对开放系统的需求,要求不影响或延迟客流的技术。这也导致了诸如智能摄像头系统或对峙探测器等安全装置的最佳放置问题。为了回答这个问题,我们观察了慕尼黑中央车站的客流。将观测数据传输到定量网络中,并采用各种措施进行分析。在它的帮助下,可以识别和详细研究关键参数星座。此外,我们能够识别特殊的乘客群体和他们的行为差异。
{"title":"Quantitative network analysis for passenger pattern recognition: An analysis of railway stations","authors":"M. Zsifkovits, M. S. Nistor, Silja Meyer-Nieberg","doi":"10.1109/SOCPAR.2015.7492815","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492815","url":null,"abstract":"As recent attacks in trains and train stations show, the protections of such critical infrastructure plays a major role for public decision makers. Thereby, security installations in the railway network are a frequently discussed topic. Especially the need for an open system demands for technologies that do not influence or delay passenger flows. This also leads to the question of optimal placement of security installations such as smart camera systems or stand-off detectors. For answering this question we observed passenger flows in the Munich central station. The observation data was transferred into a quantitative network and analyzed using various measures. With its help, critical parameter constellations can be identified and investigated in detail. Furthermore we are able to identify special groups of passengers and the differences in their behavior.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126371151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint fuzzy vault chaff point generation by squares method 指纹模糊拱顶箔条点的平方生成
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492773
D. Nabil, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman, Fathelalem F. Ali
In the literature, several abscissae generation methods of chaff points in fingerprint fuzzy vault exist. In this paper, we make an experimental comparison between squares method and threshold methods. The experimental results show that the squares method is far better than methods based on threshold. But minutiae representation in squares method use 2D representation while threshold methods are represented by composite representation. We proposed to implements squares methods using composite representation and made same experiments which showed less gain of time.
文献中存在几种指纹模糊拱顶中箔条点的横坐标生成方法。本文对平方法和阈值法进行了实验比较。实验结果表明,平方法远优于基于阈值的方法。但平方法中的细节表示采用二维表示,阈值方法采用复合表示。我们提出了用复合表示实现平方方法,并进行了相同的实验,结果表明时间增益较小。
{"title":"Fingerprint fuzzy vault chaff point generation by squares method","authors":"D. Nabil, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman, Fathelalem F. Ali","doi":"10.1109/SOCPAR.2015.7492773","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492773","url":null,"abstract":"In the literature, several abscissae generation methods of chaff points in fingerprint fuzzy vault exist. In this paper, we make an experimental comparison between squares method and threshold methods. The experimental results show that the squares method is far better than methods based on threshold. But minutiae representation in squares method use 2D representation while threshold methods are represented by composite representation. We proposed to implements squares methods using composite representation and made same experiments which showed less gain of time.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126404039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Clustering of moving vectors for evolutionary computation 演化计算中运动向量的聚类
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492802
Jun Yu, H. Takagi
We propose a method for clustering moving vectors oriented around two different local optima and some methods for improving the clustering performance. Evolutionary computation is an optimization method for finding the global optimum iteratively using multiple individuals; we propose a method for estimating the global optimum mathematically using the moving vectors between parent individuals and their offspring. Our proposed clustering method is the first to tackle the extension of the estimation method to multi-modal optimization. We describe the algorithm of the clustering method, the improvements made to the method, and the estimation performance for two local optima.
我们提出了一种围绕两个不同的局部最优的移动向量聚类方法和一些提高聚类性能的方法。进化计算是一种利用多个体迭代寻找全局最优解的优化方法;我们提出了一种利用亲本个体与子代之间的移动向量进行全局最优估计的数学方法。我们提出的聚类方法是第一个将估计方法扩展到多模态优化的方法。本文描述了聚类方法的算法,对方法的改进,以及对两个局部最优的估计性能。
{"title":"Clustering of moving vectors for evolutionary computation","authors":"Jun Yu, H. Takagi","doi":"10.1109/SOCPAR.2015.7492802","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492802","url":null,"abstract":"We propose a method for clustering moving vectors oriented around two different local optima and some methods for improving the clustering performance. Evolutionary computation is an optimization method for finding the global optimum iteratively using multiple individuals; we propose a method for estimating the global optimum mathematically using the moving vectors between parent individuals and their offspring. Our proposed clustering method is the first to tackle the extension of the estimation method to multi-modal optimization. We describe the algorithm of the clustering method, the improvements made to the method, and the estimation performance for two local optima.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Strategies for determining effective step size of the backpropagation algorithm for on-line learning 在线学习反向传播算法有效步长确定策略
Pub Date : 2015-11-01 DOI: 10.1109/SOCPAR.2015.7492800
Yuya Kaneda, Qiangfu Zhao, Yong Liu, Yan Pei
In this paper, we investigate proper strategies for determining the step size of the backpropagation (BP) algorithm for on-line learning. It is known that for off-line learning, the step size can be determined adaptively during learning. For on-line learning, since the same data may never appear again, we cannot use the same strategy proposed for off-line learning. If we do not update the neural network with a proper step size for on-line learning, the performance of the network may not be improved steadily. Here, we investigate four strategies for updating the step size. They are (1) constant, (2) random, (3) linearly decreasing, and (4) inversely proportional, respectively. The first strategy uses a constant step size during learning, the second strategy uses a random step size, the third strategy decreases the step size linearly, and the fourth strategy updates the step size inversely proportional to time. Experimental results show that, the third and the fourth strategies are more effective. In addition, compared with the third strategy, the fourth one is more stable, and usually can improve the performance steadily.
本文研究了在线学习中反向传播(BP)算法步长的确定策略。众所周知,对于离线学习,可以在学习过程中自适应地确定步长。对于在线学习,由于相同的数据可能永远不会再次出现,因此我们不能使用离线学习中提出的相同策略。如果我们不为在线学习对神经网络进行适当的步长更新,网络的性能可能无法得到稳定的提高。在这里,我们研究了更新步长的四种策略。它们分别是(1)常数,(2)随机,(3)线性递减,(4)反比。第一种策略在学习过程中使用恒定的步长,第二种策略使用随机的步长,第三种策略线性地减少步长,第四种策略与时间成反比地更新步长。实验结果表明,第三种和第四种策略更有效。此外,与第三种策略相比,第四种策略更加稳定,通常可以稳定地提高性能。
{"title":"Strategies for determining effective step size of the backpropagation algorithm for on-line learning","authors":"Yuya Kaneda, Qiangfu Zhao, Yong Liu, Yan Pei","doi":"10.1109/SOCPAR.2015.7492800","DOIUrl":"https://doi.org/10.1109/SOCPAR.2015.7492800","url":null,"abstract":"In this paper, we investigate proper strategies for determining the step size of the backpropagation (BP) algorithm for on-line learning. It is known that for off-line learning, the step size can be determined adaptively during learning. For on-line learning, since the same data may never appear again, we cannot use the same strategy proposed for off-line learning. If we do not update the neural network with a proper step size for on-line learning, the performance of the network may not be improved steadily. Here, we investigate four strategies for updating the step size. They are (1) constant, (2) random, (3) linearly decreasing, and (4) inversely proportional, respectively. The first strategy uses a constant step size during learning, the second strategy uses a random step size, the third strategy decreases the step size linearly, and the fourth strategy updates the step size inversely proportional to time. Experimental results show that, the third and the fourth strategies are more effective. In addition, compared with the third strategy, the fourth one is more stable, and usually can improve the performance steadily.","PeriodicalId":409493,"journal":{"name":"2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131732658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1