Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Real Coded Feature Selection Integrated with Self-adaptive Differential Evolution Algorithm

    The current optimization algorithms for feature selection are mostly based on binary coded swarm intelligence algorithms. A novel real coded optimization algorithm which using the weighted distance metric is p...

    Zhigang Shang, Zhihui Li, **g Liang in Emerging Intelligent Computing Technology … (2012)

  2. Chapter and Conference Paper

    Distance Metric Learning-Based Conformal Predictor

    In order to improve the computational efficiency of conformal predictor, distance metric learning methods were used in the algorithm. The process of learning was divided into two stages: offline learning and o...

    Fan Yang, Zhigang Chen, Guifang Shao in Artificial Intelligence Applications and I… (2012)

  3. No Access

    Chapter and Conference Paper

    Discriminative Locality Preserving Canonical Correlation Analysis

    In this paper, we propose a novel dimension reduction method based on canonical correlation analysis, called discriminative locality preserving canonical correlation analysis (DLPCCA) method. In particular, we...

    **ang Zhang, Naiyang Guan, Zhigang Luo, Long Lan in Pattern Recognition (2012)

  4. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on Hidden Semi-Markov Model

    This paper takes use of the hidden semi-Markov model to evaluate network security situation. HsMM modifies HMM model on the presumption that certain system status dwell time abides with exponential distributio...

    Boyun Zhang, Zhigang Chen, **ai Yan, Shulin Wang in Advanced Intelligent Computing (2012)

  5. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on HMM

    Network security situation assessment is the core of situation awareness, and is also a qualitative and quantitative description of network security state. In this paper, the security state and intrusion alarm...

    Boyun Zhang, Zhigang Chen, Shulin Wang in Advanced Intelligent Computing Theories an… (2012)

  6. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on Stochastic Game Model

    From the perspective of game theory, this paper studies the information security problem, establishes an offense and defense game model of information security, and puts forward a quantitative evaluation algor...

    Boyun Zhang, Zhigang Chen, Wensheng Tang, Qiang Fan in Advanced Intelligent Computing (2012)

  7. Chapter and Conference Paper

    Local Clustering Conformal Predictor for Imbalanced Data Classification

    The recently developed Conformal Predictor (CP) can provide calibrated confidence for prediction which is out of the traditional predictors’ capacity. However, CP works for balanced data and fails in the case ...

    Huazhen Wang, Yewang Chen, Zhigang Chen in Artificial Intelligence Applications and I… (2013)

  8. No Access

    Chapter and Conference Paper

    Glaucus: Predicting Computing-Intensive Program’s Performance for Cloud Customers

    As Cloud computing has gained much popularity recently, many organizations consider transmitting their large-scale computing-intensive programs to cloud. However, cloud service market is still in its infant st...

    **a Liu, Zhigang Zhou, **aojiang Du, Hongli Zhang in Intelligent Computing Theories (2013)

  9. No Access

    Chapter and Conference Paper

    A Multi-Instance Multi-Label Learning Approach for Protein Domain Annotation

    Domains act as structural and functional units of proteins, playing an essential role in functional genomics. To investigate the annotation of finite protein domains is of much importance because the functions...

    Yang Meng, Lei Deng, Zhigang Chen, Cheng Zhou in Intelligent Computing in Bioinformatics (2014)

  10. No Access

    Chapter and Conference Paper

    Structure-Based Prediction of Protein Phosphorylation Sites Using an Ensemble Approach

    As one of the most prevailing post-translational modifications, phosphorylation is vital in regulating almost every cellular behavior. In this paper, we propose a new computational method that can effectively ...

    Yong Gao, Weilin Hao, Zhigang Chen, Lei Deng in Intelligent Computing in Bioinformatics (2014)

  11. No Access

    Chapter and Conference Paper

    A Fractional-Order Chaotic Circuit Based on Memristor and Its Generalized Projective Synchronization

    In this paper, we generalize the integer-order chua circuit model based on memristor into the fractional-order domain. The new fractional-order circuit can generate complex chaotic behavior. Based on the stabi...

    Wenwen Shen, Zhigang Zeng, Fang Zou in Intelligent Computing Theory (2014)

  12. No Access

    Chapter and Conference Paper

    Semi-supervised Non-negative Local Coordinate Factorization

    Non-negative matrix factorization (NMF) is a popular matrix decomposition technique that has attracted extensive attentions from data mining community. However, NMF suffers from the following deficiencies: (1)...

    Cherong Zhou, **ang Zhang, Naiyang Guan, Xuhui Huang in Neural Information Processing (2015)

  13. Chapter and Conference Paper

    Dimensionality Reduction for Hyperspectral Image Based on Manifold Learning

    A novel dimensionality reduction method named spectral angle and geodesic distance-based locality preserving projection (SAGD-LPP) was proposed in this paper. Considering the physical characters of hyperspectr...

    Yiting Wang, Shiqi Huang, Hongxia Wang, Daizhi Liu, Zhigang Liu in Image and Graphics (2015)

  14. Chapter and Conference Paper

    Mobile Panoramic Vision for Assisting the Blind via Indexing and Localization

    In this paper, we propose a first-person localization and navigation system for hel** blind and visually-impaired people navigate in indoor environments. The system consists of a mobile vision front end with...

    Feng Hu, Zhigang Zhu, Jianting Zhang in Computer Vision - ECCV 2014 Workshops (2015)

  15. Chapter and Conference Paper

    Face Recognition by 3D Registration for the Visually Impaired Using a RGB-D Sensor

    To help visually impaired people recognize people in their daily life, a 3D face feature registration approach is proposed with a RGB-D sensor. Compared to 2D face recognition methods, 3D data based approaches...

    Wei Li, Xudong Li, Martin Goldberg, Zhigang Zhu in Computer Vision - ECCV 2014 Workshops (2015)