default search action
7th ISICA 2015: Guangzhou, China
- Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione:
Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers. Communications in Computer and Information Science 575, Springer 2016, ISBN 978-981-10-0355-4
Evolutionary Algorithms
- Chengwang Xie, Wenjing Chen, Weiwei Yu:
A Hybrid Group Search Optimizer with Opposition-Based Learning and Differential Evolution. 3-12 - Hui Wang, Wenjun Wang, Hui Sun, Jia Zhao, Hai Zhang, Jin Liu, Xinyu Zhou:
A New Firefly Algorithm with Local Search for Numerical Optimization. 13-22 - Wei Li, Kangshun Li, Ying Huang, Xiaoyang Deng:
A New Trend Peak Algorithm with X-ray Image for Wheel Hubs Detection and Recognition. 23-31 - Kangshun Li, Lu Xiong:
Community Detection Based on an Improved Genetic Algorithm. 32-39 - Yan Guo, Li Ma, Fei Zhu, Fujiang Liu:
Selecting Training Samples from Large-Scale Remote-Sensing Samples Using an Active Learning Algorithm. 40-51 - Kangshun Li, Zhichao Wen, Shen Li:
Coverage Optimization for Wireless Sensor Networks by Evolutionary Algorithm. 52-63 - Xi Li, Sanyou Zeng, Liting Zhang, Guilin Zhang:
Combining Dynamic Constrained Many-Objective Optimization with DE to Solve Constrained Optimization Problems. 64-73 - Yuanyuan Fan, Qingzhong Liang, Yunsong Chen, Xuesong Yan, Chengyu Hu, Hong Yao, Chao Liu, Deze Zeng:
Executing Time and Cost-Aware Task Scheduling in Hybrid Cloud Using a Modified DE Algorithm. 74-83 - Kangshun Li, Lei Zuo, Wei Li, Lei Yang:
A Novel Differential Evolution Algorithm Based on JADE for Constrained Optimization. 84-94 - Lei Yang, Kangshun Li, Wensheng Zhang, Yan Chen, Wei Li, Xinghao Bi:
A New Ant Colony Classification Mining Algorithm. 95-106 - Shui-Ping Zhang, Wang Bi, Xue-Jiao Wang:
A Dynamic Search Space Strategy for Swarm Intelligence. 107-115 - Lanlan Kang, Wenyong Dong, Kangshun Li:
Adaptive Mutation Opposition-Based Particle Swarm Optimization. 116-128 - Zhongming Yang, Yong Qin, Han Huang, Yunfu Jia:
Quick Convergence Algorithm of ACO Based on Convergence Grads Expectation. 129-138 - Lei Yang, Kangshun Li, Wensheng Zhang, Yaolang Kong:
A New GEP Algorithm and Its Applications in Vegetable Price Forecasting Modeling Problems. 139-149 - Shuling Yang, Kangshun Li, Wei Li, Weiguang Chen:
An Optimized Clustering Algorithm Using Improved Gene Expression Programming. 150-160 - Dazhi Jiang, Bo Hu, Zhijian Wu:
Predicting Acute Hypotensive Episodes Based on Multi GP. 161-170 - Xiaoyan Yang, Yuanxiang Li, Cheng Fang, Cong Nie, Fuchuan Ni:
Research on Evolution Mechanism in Different-Structure Module Redundancy Fault-Tolerant System. 171-180
Intelligent Simulation Algorithms
- Tomasz Hachaj, Marek R. Ogiela:
Application of Neural Network for Human Actions Recognition. 183-191 - Suping Liu:
The Improved Evaluation of Virtual Resources' Performance Algorithm Based on Computer Clusters. 192-201 - Jintao Yao, Yuyan Kong, Lei Yang:
Bayesian Optimization Algorithm Based on Incremental Model Building. 202-209 - Yuyan Kong, Jintao Yao, Lei Yang:
An Improved DBOA Based on Estimation of Model Similarity. 210-218 - Dengyi Zhang, Qian Wang, Xiaoping Wu, Yu Cao:
Person Re-identification Based on Part Feature Specificity. 219-229 - Jincheng Zhang, Sanyou Zeng, Yuhong Jiang, Xi Li:
A Gaussian Process Based Method for Antenna Design Optimization. 230-240 - Dongbo Zhang, Jingbo Zhang:
An Improved Algorithm of Watermark Preprocessing Based on Arnold Transformation and Chaotic Map. 241-247 - Loganathan Ponnambalam, A. G. Rekha, Yashasvi Laxminarayan:
An Agent-Based Model for Intervention Planning Among Communities During Epidemic Outbreaks. 248-255 - Yueqin Dun, Yu Kong:
The Comparisons Between the Improved Numerical Mode-Matching Method (NMM) and the Traditional NMM Using for Resistivity Logging. 256-263 - Yong Liu:
Negative Correlation Learning with Difference Learning. 264-274 - Wen Sun, Qian Shen, Chanjuan Liu:
SURF Feature Description of Color Image Based on Gaussian Model. 275-283
Data Mining and Cloud Computing
- Fu Mo, Kangshun Li:
An Improved Adaptive Hexagon and Small Diamond Search. 287-293 - Jun Nie:
A Research of Virtual Machine Resource Scheduling Strategy Based on Cloud Computing. 294-304 - Delong Cui, Wende Ke, Zhiping Peng, Jinglong Zuo:
Multiple DAGs Workflow Scheduling Algorithm Based on Reinforcement Learning in Cloud Computing. 305-311 - Dongbo Zhang, Yanfang Shou:
An Improved Parallel K-Means Algorithm Based on Cloud Computing. 312-320 - Lei Shang, Shujing Xu, Wei Hou, Lipeng Zhou:
Research on the Integration of Spatial Data Service Based on Geographic Service. 321-328 - A. G. Rekha, Loganathan Ponnambalam, Mohammed Shahid Abdulla:
Predicting Maritime Groundings Using Support Vector Data Description Model. 329-334 - Fahui Gu, Kangshun Li, Lei Yang, Wei Li:
Estimating Parameters of Van Genuchten Equation Based on Teaching-Learning-Based Optimization Algorithm. 335-342 - George Suciu, Victor Suciu, Razvan Gheorghe, Ciprian Dobre, Florin Pop, Aniello Castiglione:
Analysis of Network Management and Monitoring Using Cloud Computing. 343-352 - Christian Esposito, Aniello Castiglione, Francesco Palmieri, Massimo Ficco:
A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks. 353-364 - Qiang Chen:
The Research on Large Scale Data Set Clustering Algorithm Based on Tag Set. 365-372 - Yuehong Xie, Weiqin Ying, Yu Wu, Bingshen Wu, Shiyun Chen, Weipeng He:
Partitioned Parallelization of MOEA/D for Bi-objective Optimization on Clusters. 373-381 - Xuesong Yan, Wei Li, Qinghua Wu, Victor S. Sheng:
A Double Weighted Naive Bayes for Multi-label Classification. 382-389 - Xiu He, Bo Yang:
An Improved Keyword Search on Big Data Graph with Graphics Processors. 390-397
Applications and Security
- Jiali Lin, Dazhi Jiang, Kangshun Li:
Rural Micro-credit Decision Model Based on Principle of Risk Control. 401-408 - Xuan Li, Jie Lin, Jin Li, Biao Jin:
A Video Deduplication Scheme with Privacy Preservation in IoT. 409-417 - Yongqing Lei, Yujuan Sun, Zeju Wu, Zengfeng Wang:
Accurate 3D Reconstruction of Face Image Based on Photometric Stereo. 418-423 - Ying Huang, Ilsun You:
Business Process Merging Based on Topic Cluster and Process Structure Matching. 424-434 - Shuxin Yang, Qiuying Peng, Le Chen:
The BPSO Based Complex Splitting of Context-Aware Recommendation. 435-444 - Lu Xiong, Kangshun Li, Suping Liu:
A Method for Calculating the Similarity of Web Pages Based on Financial Ontology. 445-455 - Chunyin Wu, Qing Ouyang, Shouhua Yu, Chengjian Deng, Xiaojuan Mao, Tiansheng Hong:
An Expert System for Tractor Fault Diagnosis Based on Ontology and Web. 456-463 - Marcello Trovati, Aniello Castiglione, Nik Bessis, Richard Hill:
A Kuramoto Model Based Approach to Extract and Assess Influence Relations. 464-473 - Zhenzhen Xie, Liang Hu, Feng Wang, Jin Li, Kuo Zhao:
PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks. 474-482 - Xiaodi Yu, Hu Liang, Fu Tao, Li Jin, Zhao Kuo:
SmartNV: Smart Network Virtualization Based on SDN. 483-488 - Jinglong Zuo, Delong Cui, Hui Yu, Qirui Li:
Image Feature Extract and Performance Analysis Based on Slant Transform. 489-494 - Zhaoquan Cai, Yihui Liang, Hui Hu, Wei Luo:
Offline Video Object Retrieval Method Based on Color Features. 495-505 - Jieren Cheng, Boyi Liu, Xiangyan Tang:
A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video. 506-518 - Yan Guo, Wenyi Liu, Fujiang Liu:
Uncertainty-Based Sample Optimization Strategies for Large Forest Samples Set. 519-530 - Shuqiang Huang, Jielin Zeng, Hongchun Zhou, Zhusong Liu, Yuyu Zhou:
A PCB Short Circuit Locating Scheme Based on Near Field Magnet Specific Point Detecting. 531-540 - Jianwu Zhang, Jianchao He, Zhendong Wu, Ping Li:
Prosodic Features Based Text-dependent Speaker Recognition with Short Utterance. 541-552 - Chao Qu, Fagui Liu, Hui Yu, Ruifen Yuan, Anxiong Wang:
User Oriented Semi-automatic Method of Constructing Domain Ontology. 553-561 - Yutong Gao, Feifan Song, Xiaqing Xie, Shengnan Geng, Wenling Tang:
Research and Implementation for Rural Medical Information Extraction Method. 562-571 - Cheng Chen, Zhendong Wu, Ping Li, Jianwu Zhang, Yani Wang, Hailong Li:
A Finger Vein Recognition Algorithm Using Feature Block Fusion and Depth Neural Network. 572-583 - Xin Li, Chao Fang:
A New Process Meta-model for Convenient Process Reconfiguration. 584-595 - Shufeng Li, Minghao Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei:
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. 596-607 - Yunlu Wang, Hao Wen, Zhihua Jian, Zhendong Wu:
A Novel WDM-PON Based on Quantum Key Distribution FPGA Controller. 608-618 - Seira Hidano, Martin Pecovský, Shinsaku Kiyomoto:
New Security Challenges in the 5G Network. 619-630 - Shuang Xiang, Yanli Lv, Chunhe Xia, Yuanlong Li, Zhihuan Wang:
A Method of Network Security Situation Assessment Based on Hidden Markov Model. 631-639 - Honghui Lai, Ying Huang:
Chaotic Secure Communication Based on Synchronization Control of Chaotic Pilot Signal. 640-647 - Kangshun Li, Zhichao Wen:
The Privacy Protection Search of Spam Firewall. 648-658 - Bin Liu, Lengxi Wu, Xiaoyan Luo, Youyuan Wang:
Study on Joint Procurement of Auto Parts Business Partner Selection. 659-664 - Xiaoyan Luo, Yu Zhou, Bin Liu, Youyuan Wang:
Research on Ontology-Based Knowledge Modeling of Design for Complex Product. 665-671 - Nan Shen, Xuan Chen, Shuang Liang, Jun Yang, Tong Li, Chunfu Jia:
Learning-Based Privacy-Preserving Location Sharing. 672-682 - Yu Wang, Jianmin Xu, Peiqun Lin:
A Two-Lane Cellular Automata Traffic Model Under Three-Phase Traffic Theory. 683-688 - Nan Jiang, Pingan Pan, Youyuan Wang, Lu Zhao:
Research on Knowledge Association and Reasoning of Product Design. 689-695 - Dongyan Zhao, Shuo Cheng, Yichuan Zheng, Xiaoyu Wang, Jian Sun:
Channel Power Control of Genetic-Nonlinear Algorithm Based on Impairment Aware in Optical Network. 696-703 - Haiyan Zhao, Xiangqian Dong, Changyuan Wang, Wenfei Chen:
Optimal Low-Hit-Zone Frequency-Hopping Sequence Set via Cyclotomy. 704-711 - Yunong Zhang, Zhengli Xiao, Dongsheng Guo, Mingzhi Mao, Hongzhou Tan:
USPD Doubling or Declining in Next Decade Estimated by WASD Neuronet Using Data as of October 2013. 712-723 - Xiaolan Xie, Zhen Long, Fahui Gu:
Prediction on Internet Safety Situation of Relevance Vector Machine about GP-RVM Kernel Function. 724-733
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.