Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    MixUNet: A Hybrid Retinal Vessels Segmentation Model Combining The Latest CNN and MLPs

    The success of Vision Transformer has led to an increased emphasis on combining global and local context, and its high training cost spawned numerous alternative works. The latest MLP architecture has achieved...

    Ziyan Ke, Lingxi Peng, Yiduan Chen, Jie Liu in Knowledge Science, Engineering and Managem… (2023)

  2. No Access

    Chapter and Conference Paper

    A Gras** System with Structured Light 3D Machine Vision Guided Strategy Optimization

    In scenarios such as automated sorting in logistics warehouses, automated assembly on industrial production lines, and transportation of rescue tasks and items, it is necessary to quickly grasp and place objec...

    **hui Lin, Haohuai Liu, Lingxi Peng in Knowledge Science, Engineering and Managem… (2023)

  3. No Access

    Chapter and Conference Paper

    Research on Information Hiding Based on Intelligent Creation of Tang Poem

    Text is the most important and frequent way for people to exchange information and daily communication in today’s society; thus, text information hiding has great research value and practical significance. Thi...

    Fufang Li, Binbin Li, Yongfeng Huang in Proceedings of the 9th International Confe… (2021)

  4. No Access

    Chapter and Conference Paper

    A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1

    With compressed speech codecs having been widely used as the key technology for VoIP and mobile communications, steganography based on compressed speech streams has been flourishing in recent years. In this pa...

    Fufang Li, Binbin Li, Lingxi Peng, Wenbin Chen in Cloud Computing and Security (2018)

  5. No Access

    Chapter and Conference Paper

    Algorithms for the Densest Subgraph with at Least k Vertices and with a Specified Subset

    The density of a subgraph in an undirected graph is the sum of the subgraph’s edge weights divided by the number of the subgraph’s vertices. Finding an induced subgraph of maximum density among all subgraphs w...

    Wenbin Chen, Lingxi Peng, Jianxiong Wang in Combinatorial Optimization and Applications (2015)

  6. No Access

    Chapter and Conference Paper

    Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization

    The privacy preserving data mining is a research hotspot. Most of the privacy preserving algorithms are focused on the centralized database. The algorithms on the distributed database are very vulnerable to co...

    Lei Yang, Jue Wu, Lingxi Peng, Feng Liu in Intelligent Computing Methodologies (2014)

  7. No Access

    Chapter and Conference Paper

    Multiobjective Estimation of Distribution Algorithms Using Multivariate Archimedean Copulas and Average Ranking

    Estimation of distribution algorithms (EDAs) are a class of evolutionary optimization algorithms based on probability distribution model. This chapter extends the basic EDAs for tackling multiobjective optimiz...

    Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, **ao Hu in Foundations of Intelligent Systems (2014)

  8. No Access

    Chapter and Conference Paper

    Opposition-Based Learning Fully Informed Particle Swarm Optimizer without Velocity

    By applying full information and employing the notion of opposition-based learning, a new opposition based learning fully information particle swarm optimiser without velocity is proposed for optimization prob...

    Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu in Advances in Swarm Intelligence (2013)

  9. No Access

    Chapter and Conference Paper

    EDA-Based Multi-objective Optimization Using Preference Order Ranking and Multivariate Gaussian Copula

    Estimation of distribution algorithms (EDAs) are a class of evolutionary optimization algorithms based on probability distribution model. This article extends the basic EDAs for tackling multi-objective optimi...

    Ying Gao, Lingxi Peng, Fufang Li, Miao Liu in Advances in Neural Networks – ISNN 2013 (2013)

  10. No Access

    Chapter and Conference Paper

    Immune Network Risk Evaluation Model Based on the Spreading of Infectious Diseases

    From the mechanism of infectious epidemic spreading, the theory of network epidemic spreading was studied in this paper. The process of the developments and changes of the network intrusion behaviors were anal...

    ** Yang, Tang Liu, Lingxi Peng in Proceedings of 2013 Chinese Intelligent Au… (2013)

  11. No Access

    Chapter and Conference Paper

    Network Security Evaluation Model Based on Cloud Computing

    Cloud computing is an important innovation in the current computing model. The critical problem of cloud computing faced at present is the security issue. In the current network environment, that relying on a ...

    ** Yang, Cilin Wang, Le Yu, Caiming Liu in Information Computing and Applications (2012)

  12. No Access

    Chapter and Conference Paper

    An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection

    Traditional intrusion detection system is confronted with the pressure of processing massive network traffic data which increases sharply. Besides, its feature of static detection causes the weak adaptability ...

    Caiming Liu, Chunming **e, Yan Zhang, Qin Li in Artificial Intelligence and Computational … (2012)

  13. No Access

    Chapter and Conference Paper

    Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization

    A velocity-free multi-objective particle swarm optimizer with centroid is proposed and applied to optimization of wireless sensor network. Different from the standard PSO, particles in swarm only have position...

    Ying Gao, Lingxi Peng, Fufang Li, MiaoLiu in Artificial Intelligence and Computational … (2012)

  14. No Access

    Chapter and Conference Paper

    Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius

    Negative selection algorithm (NSA) generates the detectors based on the self space. Due to the drawbacks of the current representation of the self space in NSAs, the generated detectors cannot enough cover the...

    **quan Zeng, Weiwen Tang, Caiming Liu in Information Computing and Applications (2012)

  15. No Access

    Chapter and Conference Paper

    Efficient Detect Scheme of Botnet Command and Control Communication

    Botnet is an attack network composed of hundreds of millions of compromised computers. Botnet is emerging as the most serious threat against cyber-security and is used to launch Distributed Denial of Service (...

    **quan Zeng, Weiwen Tang, Caiming Liu in Information Computing and Applications (2012)

  16. No Access

    Chapter and Conference Paper

    Opposition-Based Learning Estimation of Distribution Algorithm with Gaussian Copulas and Its Application to Placement of RFID Readers

    Estimation of distribution algorithms are a class of optimization algorithms based on probability distribution model. In this paper, we propose an improved estimation of distribution algorithm using opposition...

    Ying Gao, **ao Hu, Huiliang Liu, Fufang Li in Artificial Intelligence and Computational … (2011)

  17. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

  18. No Access

    Chapter and Conference Paper

    Quantum Immune Algorithm and Its Application in Collision Detection

    Collision detection is very important to improve the truth and immersion in the virtual environment. Firstly the paper analyzes the problems that exist in traditional algorithms. There is no algorithm suitable...

    Jue Wu, Ling** Peng, LiXue Chen, Lei Yang in Life System Modeling and Intelligent Computing (2010)

  19. No Access

    Chapter and Conference Paper

    Research of Modified Quantum Genetic Algorithm and It’s Application in Collision Detection

    Collision detection is very important for improving the truth and immersion in the virtual environment. The paper analyzes the problems that exist in the normal algorithm. And there is no algorithm which is su...

    Jue Wu, LiXue Chen, Lei Yang, Ling** Peng in Advanced Intelligent Computing Theories an… (2010)

  20. No Access

    Chapter and Conference Paper

    A Collision Detection Algorithm Based on Self-adaptive Genetic Method in Virtual Environment

    Collision detection is very important to enhance the sense of reality and immersion in virtual environment. Most of the traditional collision detection algorithms have been analyzed, but there is no algorithm ...

    Jue Wu, Lixue Chen, Lei Yang, Qunyan Zhang, Lingxi Peng in Advances in Swarm Intelligence (2010)

previous disabled Page of 2