The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
In recent years, logistics industry has received extensive attention with the development of online shopping. Logistics distribution is the core of logistics industry. Scientifically rational logistics distribution can save delivery cost and improve customer satisfaction. Therefore, it is very important to study the two echelon vehicle routing problem (2E-VRP) in logistics distribution.Artificial...
The idea of decomposition is becoming increasingly successful and popular in evolutionary multi-objective optimization. An efficient cone decomposition approach was further developed in the conical area evolutionary algorithm (CAEA). This approach improves the runtime efficiency and population diversity of decomposition-based algorithms effectively for bi-objective optimization in practice. In this...
Massive traffic scene data for algorithm research and model training is the fundamental for self-driving car technology development. In the procedure of scene image labeling, the most accurate method is manual annotation, but with the increasing of the amount of image data, artificial annotation method becomes infeasible due to its disadvantages of vast cost, inefficiency and subjective deviation...
Traditional dehazing techniques, as a well-studied topic in image processing, are now widely used to eliminate the haze effects from individual images. However, even the state-of-the-art dehazing algorithms may not provide sufficient support to video analytics, as a crucial pre-processing step for video-based decision making systems (e.g., robot navigation), due to the limitations of these algorithms...
ELM with kernels and MapReduce have an unparalleled advantage of other similar technologies, which attract widely attention in machine learning and distributed data processing communities respectively. In this paper, we combine the advantage of ELM with kernels and MapReduce, and propose a Distributed Extreme Learning Machine with kernels based on MapReduce framework (DK-ELMM),which makes full use...
This paper grafts rough set theory, logical computing with granular computing, and retrieving rough set model under logical computing of granular. This paper formally defines logical computer of granular and also presents its properties. In addition, this paper discusses the relationship between the values of granular with logical computing of granular. All of these will lay a foundation for knowledge...
A great deal of research has focused on using convolutional neural network for optical character recognition. However we encountered two typical problem in this field when applied convolutional neural network to handwritten Yi character recognition. First, since convolutional neural network is a kind of supervised deep learning model, the manual training data labeling is a very time consuming and...
A novel differential evolution algorithm is proposed for constrained optimization problems (COPs). The proposed algorithm combines the ideas between the self-adaptive differential evolution algorithm (JDE) and simple penalty function method (SPFM). Simulation results on the bump problem show that the solutions of the new algorithm is better than those of the algorithms in the almost exiting literature...
in idea is to express a ballot to allow voting for up to out the candidates and unlimited participants. The purpose of vote is to select more than one winner among candidates. Our result is complementary to the result by Sun peiyong ¡äs scheme, in the sense, their scheme is not amenable for large-scale electronic voting due to flaw of ballot structure. In our scheme the vote is split and hidden, and...
As a new product to promote the development of mobile Internet application, wechat has completely changed people's traditional living habits and accelerated the transformation of related industries. Especially, the openness of wechat public platform interface is brought to the education industry a new opportunity. In this paper, we do the micro-course system research based on the wechat platform system,...
This paper presents rough set model under different granular computing, and compares the model under combined granular with that under single granular, also with rough set model under logical computing of granule. Results show that combination granule and logical computing of granule construct a chain, which will lay a foundation for knowledge acquisition based on information granule and induction...
In recent years, the rapid development of geographic information system technology and the popularity of geo-location-based mobile information services have made people pay more attention to geography-related information. Thus, the information retrieval and related services based on geographic has a broad application prospects. However, the traditional search engine for the processing of geographic...
In this paper, Quantum Rotate Gate is improved, which is the main operation in the Population Update of the traditional Quantum Evolutionary Algorithm. A new rotation angle is defined, preventing the algorithm from easily falling into local optimum state in the middle and late term. Based on the characteristics of TSP, a modified quantum rotate gate is proposed in this paper to adaptively adjust the...
Image classification mainly uses the classifier to classify the extracted image features. In the traditional image feature extraction, it is difficult to set the appropriate feature patterns for the complex images. Simultaneously, the training algorithm of the classifier also affects the accuracy of image classification. In order to solve these problems, the combination of deep belief networks and...
Provable Data Possession (PDP) schemes which are vital to data-oriented mobile cloud computing security architecture enable users to check the integrity of their data in the cloud efficiently. Due to the limitation of storage space and computing power of the mobile terminals, a new identity-based proxy signature multiple-file data integrity verification scheme called Identity-Based Proxy Signature...
Inferring causal directions from observed variables is one of the fundamental problems in many scientific fields. In this paper, a new approach for causal-direction inference from mul-ti-dimensional networks is proposed based on a split-and- merge strategy. The method first de-composes an n-dimensional network into induced subnetworks, each of which corresponds to a node in the network. It shows that...
With the emergence of network virtualization, the infrastructure can be effectively integrated to overcome the "ossification" of the Internet. The biggest challenge in network virtualization is the problem of virtual network embedding. Unfortunately, most of the researches on virtual network embedding only focus on static algorithms, which allocate fixed or invariable resources to virtual...
Jamming attacks have been a great challenge for the researchers since they can severely damage the Quality of Service (QoS) of Multi-Hop Wireless Networks (MHWNs). Therefore, how to detect and distinguish multiple jamming attacks and thus to restore network service has been a hot topic in recent years. Note that different jamming attacks will cause different network status changes in MHWN. Based on...
Different from representation learning models using deep learning to project original feature space into lower density ones, we propose a feature space learning (FSL) model based on a semi-supervised clustering framework. There are three main contributions in our approach: (1) Inspired by Zipf's law and word bursts, the feature space learning processes not only select trusted unlabeled samples and...
Multi-Hop Wireless Network (MHWN) can be easily attacked by the jammer for its shared nature and open access to the wireless medium. The jamming attack may prevent the normal communication through occupying the same wireless channel of legal nodes. It is critical to localize the jammer accurately, which may provide necessary message for the implement of antjamming mechanisms. However, current range-free...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.