-
Article
Retinal vessel segmentation by using AFNet
Retinal vessel segmentation can obtain rich ocular information which is important for the diagnosis of fundus diseases. To address the problems of existing segmentation methods such as poor capillary segmentat...
-
Chapter and Conference Paper
MixUNet: A Hybrid Retinal Vessels Segmentation Model Combining The Latest CNN and MLPs
The success of Vision Transformer has led to an increased emphasis on combining global and local context, and its high training cost spawned numerous alternative works. The latest MLP architecture has achieved...
-
Chapter and Conference Paper
A Gras** System with Structured Light 3D Machine Vision Guided Strategy Optimization
In scenarios such as automated sorting in logistics warehouses, automated assembly on industrial production lines, and transportation of rescue tasks and items, it is necessary to quickly grasp and place objec...
-
Article
Research on covert communication channel based on modulation of common compressed speech codec
As is well known, multimedia has been widely used in VoIP and mobile communications. Research on how to establish covert communication channel over the above popular public applications has been flourishing in...
-
Chapter and Conference Paper
Research on Information Hiding Based on Intelligent Creation of Tang Poem
Text is the most important and frequent way for people to exchange information and daily communication in today’s society; thus, text information hiding has great research value and practical significance. Thi...
-
Chapter and Conference Paper
A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1
With compressed speech codecs having been widely used as the key technology for VoIP and mobile communications, steganography based on compressed speech streams has been flourishing in recent years. In this pa...
-
Article
An immune-inspired political boycotts action prediction paradigm
The political boycotts action has been highly valued and studied by social scientists. So the research on political boycotts prediction has important theoretical research value and significance. In order to ex...
-
Article
An improved lower bound for approximating the Minimum Integral Solution Problem with Preprocessing over \(\ell _\infty \) norm
In this paper, we study the approximation complexity of the Minimum Integral Solution Problem with Preprocessing introduced by Alekhnovich et al. (FOCS, pp. 216–225, 2005). We show that the Minimum Integral Solut...
-
Chapter and Conference Paper
Algorithms for the Densest Subgraph with at Least k Vertices and with a Specified Subset
The density of a subgraph in an undirected graph is the sum of the subgraph’s edge weights divided by the number of the subgraph’s vertices. Finding an induced subgraph of maximum density among all subgraphs w...
-
Chapter and Conference Paper
Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization
The privacy preserving data mining is a research hotspot. Most of the privacy preserving algorithms are focused on the centralized database. The algorithms on the distributed database are very vulnerable to co...
-
Chapter and Conference Paper
Multiobjective Estimation of Distribution Algorithms Using Multivariate Archimedean Copulas and Average Ranking
Estimation of distribution algorithms (EDAs) are a class of evolutionary optimization algorithms based on probability distribution model. This chapter extends the basic EDAs for tackling multiobjective optimiz...
-
Article
An Automated Diagnosis System of Liver Disease using Artificial Immune and Genetic Algorithms
The rise of health care cost is one of the world’s most important problems. Disease prediction is also a vibrant research area. Researchers have approached this problem using various techniques such as support...
-
Chapter and Conference Paper
Opposition-Based Learning Fully Informed Particle Swarm Optimizer without Velocity
By applying full information and employing the notion of opposition-based learning, a new opposition based learning fully information particle swarm optimiser without velocity is proposed for optimization prob...
-
Chapter and Conference Paper
EDA-Based Multi-objective Optimization Using Preference Order Ranking and Multivariate Gaussian Copula
Estimation of distribution algorithms (EDAs) are a class of evolutionary optimization algorithms based on probability distribution model. This article extends the basic EDAs for tackling multi-objective optimi...
-
Chapter and Conference Paper
Immune Network Risk Evaluation Model Based on the Spreading of Infectious Diseases
From the mechanism of infectious epidemic spreading, the theory of network epidemic spreading was studied in this paper. The process of the developments and changes of the network intrusion behaviors were anal...
-
Chapter and Conference Paper
Network Security Evaluation Model Based on Cloud Computing
Cloud computing is an important innovation in the current computing model. The critical problem of cloud computing faced at present is the security issue. In the current network environment, that relying on a ...
-
Chapter and Conference Paper
An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection
Traditional intrusion detection system is confronted with the pressure of processing massive network traffic data which increases sharply. Besides, its feature of static detection causes the weak adaptability ...
-
Chapter and Conference Paper
Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization
A velocity-free multi-objective particle swarm optimizer with centroid is proposed and applied to optimization of wireless sensor network. Different from the standard PSO, particles in swarm only have position...
-
Chapter and Conference Paper
Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius
Negative selection algorithm (NSA) generates the detectors based on the self space. Due to the drawbacks of the current representation of the self space in NSAs, the generated detectors cannot enough cover the...
-
Chapter and Conference Paper
Efficient Detect Scheme of Botnet Command and Control Communication
Botnet is an attack network composed of hundreds of millions of compromised computers. Botnet is emerging as the most serious threat against cyber-security and is used to launch Distributed Denial of Service (...