Scheduled System Maintenance
On Thursday, July 20, IEEE Xplore will undergo scheduled maintenance from 1:00-3:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

2015 11th International Conference on Computational Intelligence and Security (CIS)

19-20 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2673 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (156 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2015, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2015, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • A Recognition Algorithm for Similar Characters on License Plates Based on Improved CNN

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    A recognition algorithm for similar characters on license plates based on convolution neural networks (CNN) is proposed in this study to improve the recognition rate in a complex environment. The algorithm adopts the improved CNN to recognize similar letters and numbers in license plate images. Experimental results suggest that the improved CNN may improve the recognition rate and speed of similar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm for Distance Constrained Aerial Vehicle Routing Problem: Based on Minimum Spanning Tree and Genetic Computation

    Publication Year: 2015, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    The main goal of this research is to find a solution of distance constrained aerial vehicle routing problem using genetic algorithm based on the minimum spanning tree heuristic. As the lower bound of vehicle routing problem, the minimum spanning tree provides a natural heuristic for the searching of routes. It is used in generating the initial population and designing of the reorganization crossov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improvement and Application of Genetic BP Neural Network

    Publication Year: 2015, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    Reasonable network structure can obviously improve the learning speed and generalization ability of BP network. In this paper, an improved method to determine the number of hidden layer neurons is proposed. The method mainly takes the theory of linear correlation analysis to delete the redundant nodes and assign the weights related to others. What's more, genetic algorithm is used to optimize the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Efficient Divisible Load Scheduling Using Genetic Algorithm

    Publication Year: 2015, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    In the past decades, divisible load scheduling has become an increasingly concerned field in the research of computer science. At the same time, the total system cost of data center has received worldwide attention, and the concept of green computing has been put forward. This paper investigates an cost-efficient divisible load scheduling using genetic algorithm. It focuses on finding an efficient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation Model of Web Service Health Level on End-to-End Network Based on Artificial Immune

    Publication Year: 2015, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    ENHMM, Evaluation model of Web service health level, is constructed based on multidimensional network performance. The model supports to customize evaluation factors dynamically, and gives the methods of active measurement for the network performance based on the evaluation attributes. To evaluation algorithm, AiNet immune algorithm is used, in which a new mechanism of antibody promotion and suppr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligence Computing Technology for UAV's Autonomy

    Publication Year: 2015, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    UAV has been more and more applied in the military and civil domain. It needs to have the capability to perform some autonomous tasks to ensure its mission's success under the complex electromagnetic conditions. However most of existing researches are at the laboratory level and do the special case studies. Intelligence computing technology, as a basic and universal technology, should be focused o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interbank Offered Rate Forecasting Using PSO-LS-SVM

    Publication Year: 2015, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    In the procedure of China's market-oriented reforms of interest rates, the interest-rate risk becomes increasingly apparent. Analyzing the existing studies and the interbank offered rate trend, this paper finds that LS-SVM, which is short for Least Squares Support Vector Machines, is excel in nonlinear data approximation, which is suitable for interest rate forecasting. Firstly, the paper establis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memory Based Differential Evolution Algorithms for Dynamic Constrained Optimization Problems

    Publication Year: 2015, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    A memory based differential evolution algorithm is adapted in this paper to solve Dynamic Constrained Optimization Problems. The approach is based on a mechanism to utilize the useful past information based on the problem special characteristics. A hybrid memory scheme combined short-term and long term memory is adopted based on this approach and reuses the best feasible individual and the best re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Algorithm of RNA Folding Structure with Pseudoknots

    Publication Year: 2015, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    It is NP-hard problem of predicting RNA structure with pseudoknots. According to minimum free energy models and computational methods, we investigate the RNA pseudoknotted structure. The paper present an efficient algorithm for predicting RNA structure with pseudoknots, and the algorithm takes O (n3) time and O (n2) space. The experimental tests in Rfam10.1 and Pseudo Base indicate that the algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Linear Bilevel Programming Problems Using a Binary Differential Evolution

    Publication Year: 2015, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    A linear bilevel programming problem can be reformulated as a single level mathematical program with complementarity constraints, which in turn is equivalent to a mixed integer (0-1) linear programming problem. A binary differential evolution algorithm with a linear programming solver is developed to solve the mixed integer (0-1) linear programming problem. The computational results show the effic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Emergency Relief VRP Based on Clustering and PSO

    Publication Year: 2015, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    This paper, based on the concern that a large quantity of affected spots, relatively concentrated distribution and a small quantity of emergency materials in the affected area. It addresses an optimized mathematical model and presents a new optimal vehicle routing on emergency relief materials with the goals of the shortest transport time in emergency materials allocation. Firstly the K-means clus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching-Learning Based Optimization Algorithm Based on Course by Course Improvement

    Publication Year: 2015, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Teaching-learning-based optimization (TLBO) algorithm is a new intelligence algorithm. It takes evaluation scheme which updates learners' grade totally in solving multi-dimensional function optimization problems, thus decreases the convergence speed. Moreover, the interference phenomena among dimensions would influence the quality of solutions. While all existing improvement strategies on TLBO int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Waste Electrical Recycling Network Optimum Design under the Carbon Cap Constraint

    Publication Year: 2015, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    The well-designed green waste electrical recycling logistics network should not only consider the recovery efficiency, but also consider the negative impact of logistics activities on the environment, and therefore a good balance logistics efficiency and impact on the environment is the key. In this paper, environmental quality and logistics efficiency as the optimization objectives, using Carbon ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Image Feature Descriptor for Classification

    Publication Year: 2015, Page(s):58 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Feature extraction methods have an important role in image classification. In this paper, a hybrid texture feature descriptor is proposed by utilizing the attributes of two complementary features, PRICoLBP and LPQ. PRICoLBP performs well in the case of geometric and photometric variations however it does not properly express the local texture of an image, while LPQ method performs well for the loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel SVM-Based Reduced NN Classification Method

    Publication Year: 2015, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    In pattern classification or machine learning, instance-based learning (IBL) has gained much attention and can yield superior performance in many domains. In IBL, however, the storage requirement is proportional to the number of training instances. Furthermore, it usually takes too much time to classify a new, unseen instance because all training instances need to be considered in determining the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Diagnosis Based on Prior Knowledge for Train Air-Conditioning Unit

    Publication Year: 2015, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    The fault diagnosis of train air-conditioning unit is becoming extremely necessity because train is often occupied with many passengers for a long time. However, limited diagnostic accuracy has become a bottleneck of train air-conditioning unit fault diagnosis. In the paper, two new fault diagnosis methods based on prior knowledge (PK) for train air-conditioning unit was proposed. First of all, ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.