Skip to main content

Page of 6
and
  1. No Access

    Article

    A palm vein identification system based on Gabor wavelet features

    As a new and promising biometric feature, thermal palm vein pattern has drawn lots of attention in research and application areas. Many algorithms have been proposed for authentication since palm vein has spec...

    Ran Wang, Guoyou Wang, Zhong Chen, Zhigang Zeng in Neural Computing and Applications (2014)

  2. Article

    Special issue on ICONIP 2012

    Zhigang Zeng, Tingwen Huang, Chuandong Li, He Huang in Neural Computing and Applications (2014)

  3. No Access

    Chapter and Conference Paper

    Analysis on a Multi-objective Binary Disperse Bacterial Colony Chemotaxis Algorithm and Its Convergence

    A simple, convenient and efficient multi-objective binary disperse optimized bacterial colony chemotaxis algorithm (MDOBCC) is proposed, in which the Disp(disperse update mechanism) is defined to handle 0-1 di...

    Tao Feng, Zhaozheng Liu, Zhigang Lu in Advances in Swarm Intelligence (2014)

  4. No Access

    Chapter and Conference Paper

    Multi-step Predictions of Landslide Displacements Based on Echo State Network

    Time series prediction theory and methods can be applied to many practical problems, such as the early warning of landslide hazard. Most already existing time series prediction methods cannot be effectively ap...

    Wei Yao, Zhigang Zeng, Cheng Lian, Huiming Tang in Neural Information Processing (2014)

  5. No Access

    Article

    A new short-term load forecasting method of power system based on EEMD and SS-PSO

    Aiming to the disadvantages of short-term load forecasting with empirical mode decomposition (EMD) such as mode mixing and many high-frequency random components, a new short-term load forecasting model based o...

    Zhigang Liu, Wanlu Sun, Jiajun Zeng in Neural Computing and Applications (2014)

  6. No Access

    Article

    Global robust stability of uncertain delayed neural networks with discontinuous neuron activation

    This paper integrates global robust stability of uncertain delay neural networks with discontinuous activation. The activation function is unbounded and the uncertainties are norm bound. By the homotopy invari...

    Jian **ao, Zhigang Zeng in Neural Computing and Applications (2014)

  7. No Access

    Article

    Analysis and design of winner-take-all behavior based on a novel memristive neural network

    In this paper, some sufficient conditions are derived to guarantee a novel memristive neural network for realizing winner-take-all behavior. Some design methods for synthesizing the winner-take-all behavior ba...

    Ailong Wu, Zhigang Zeng, Jiejie Chen in Neural Computing and Applications (2014)

  8. No Access

    Chapter and Conference Paper

    Semi-supervised Non-negative Local Coordinate Factorization

    Non-negative matrix factorization (NMF) is a popular matrix decomposition technique that has attracted extensive attentions from data mining community. However, NMF suffers from the following deficiencies: (1)...

    Cherong Zhou, **ang Zhang, Naiyang Guan, Xuhui Huang in Neural Information Processing (2015)

  9. No Access

    Chapter and Conference Paper

    A Hybrid Algorithm Based on Tabu Search and Chemical Reaction Optimization for 0-1 Knapsack Problem

    The 0-1 knapsack problem(01KP) is a well-known NP-complete problem in combinatorial optimization problems. There exist different approaches employed to solve the problem such as brute force, dynamic programmin...

    Chaokun Yan, Siqi Gao, Huimin Luo in Advances in Swarm and Computational Intell… (2015)

  10. No Access

    Chapter and Conference Paper

    Pricing in Social Networks with Negative Externalities

    We study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. We assume impatient consumers who buy the pro...

    Zhigang Cao, Xu** Chen, **aodong Hu, Changjun Wang in Computational Social Networks (2015)

  11. No Access

    Article

    Incremental multiple instance outlier detection

    I-MLOF algorithm is an extension of local outlier factor (LOF) algorithm in multiple instance (MI) setting. The task of I-MLOF is to identify MI outlier. However, I-MLOF algorithm works in batch mode, where a...

    Zhigang Wang, Zengshun Zhao, Shifeng Weng in Neural Computing and Applications (2015)

  12. Chapter and Conference Paper

    Event Detection with Convolutional Neural Networks for Forensic Investigation

    Traditional approaches rely on domain expertise to acquire complicated features. Meanwhile, existing Natural Language Processing (NLP) tools and techniques are not competent to extract information from digital...

    Bo Yang, Ning Li, Zhigang Lu, Jianguo Jiang in Intelligent Information Processing VIII (2016)

  13. No Access

    Chapter and Conference Paper

    Domain Specific Cross-Lingual Knowledge Linking Based on Similarity Flooding

    The global knowledge sharing makes large-scale multi-lingual knowledge bases an extremely valuable resource in the Big Data era. However, current mainstream multi-lingual ontologies based on online wikis still...

    Liangming Pan, Zhigang Wang, Juanzi Li in Knowledge Science, Engineering and Managem… (2016)

  14. No Access

    Chapter and Conference Paper

    Boosting to Build a Large-Scale Cross-Lingual Ontology

    The global knowledge sharing makes large-scale multi-lingual knowledge bases an extremely valuable resource in the Big Data era. However, current mainstream Wikipedia-based multi-lingual ontologies still face ...

    Zhigang Wang, Liangming Pan, Juanzi Li in Knowledge Graph and Semantic Computing: Se… (2016)

  15. No Access

    Article

    Application of multi-gene genetic programming based on separable functional network for landslide displacement prediction

    Complexity of analysis of landslide hazard is due to uncertainty. In this study, a novel approach multi-gene genetic programming based on separable functional network (MGGPSFN) is presented for predicting land...

    Jiejie Chen, Zhigang Zeng, ** Jiang, Huiming Tang in Neural Computing and Applications (2016)

  16. No Access

    Chapter and Conference Paper

    Robot Path Planning Based on A Hybrid Approach

    In this paper, an optimal method based on combination of improved genetic algorithm (IGA) and improved artificial potential field (IAPF) for path planning of mobile robot is proposed. This method consists of t...

    Zhou Jiang, Zhigang Zeng in Neural Information Processing (2017)

  17. No Access

    Chapter and Conference Paper

    A Novel Recommendation Service Method Based on Cloud Model and User Personality

    The number of Internet Web services has become increasingly large recently. Cloud services consumers face a critical challenge in selecting services from abundant candidates. Due to the uncertainty of Web serv...

    **g Yao, Zhigang Hu, Hua Ma, Bingting Jiang in Data Science (2017)

  18. No Access

    Chapter and Conference Paper

    Classifying Non-linear Gene Expression Data Using a Novel Hybrid Rotation Forest Method

    Rotation forest (RoF) is an ensemble classifier based on the combination of linear analysis theories and decision tree algorithms. In existing works, the RoF has demonstrated high classification accuracy and g...

    Huijuan Lu, Yaqiong Meng, Ke Yan, Yu Xue in Intelligent Computing Methodologies (2017)

  19. Chapter and Conference Paper

    A New Cuckoo Search

    In this paper, we intend to formulate a new Cuckoo Search (NCS) for solving optimization problems. This algorithm is based on the obligate brood parasitic behavior of some cuckoo species in combination with th...

    Zhigang Lian, Lihua Lu, Yangquan Chen in Intelligence Science I (2017)

  20. No Access

    Chapter and Conference Paper

    Secured Privacy Preserving Data Aggregation with Semi-honest Servers

    With the large deployment of smart devices, the collections and analysis of user data significantly benefit both industry and people’s daily life. However, it has showed a serious risk to people’s privacy in t...

    Zhigang Lu, Hong Shen in Advances in Knowledge Discovery and Data Mining (2017)

Page of 6