These two volumes constitute the Proceedings of the 7th International workshop on Soft Computing applications (SOFA 2016), held on 2426 August 2016 in Arad, Romania. This edition was organized by Aurel Vlaicu Universi...
These two volumes constitute the Proceedings of the 7th International workshop on Soft Computing applications (SOFA 2016), held on 2426 August 2016 in Arad, Romania. This edition was organized by Aurel Vlaicu University of Arad, Romania, University of Belgrade, Serbia, in conjunction with the Institute of Computer Science, Iasi Branch of the Romanian Academy, ieee Romanian Section, Romanian Society of Control Engineering and Technical Informatics (SRAIT) - Arad Section, General Association of Engineers in Romania - Arad Section, and BTM Resources Arad. The soft computing concept was introduced by Lotfi Zadeh in 1991 and serves to highlight the emergence of computing methodologies in which the accent is on exploiting the tolerance for imprecision and uncertainty to achieve tractability, robustness and lower costs. Soft computing facilitates the combined use of fuzzy logic, neurocomputing, evolutionary computing and probabilistic computing, leading to the concept of hybrid intelligent systems. The rapid emergence of new tools and applications calls for a synergy of scientific and technological disciplines in order to reveal the great potential of soft computing in all domains. The conference papers included in these proceedings, published post-conference, were grouped into the following areas of research: Methods and applications in Electrical Engineering Knowledge-Based Technologies for Web applications, Cloud Computing, Security algorithms and Computer Networks Biomedical applications Image, Text and Signal Processing Machine Learning and applications Business Process Management Fuzzy applications, theory and Fuzzy Control computationalintelligence in Education Soft Computing & Fuzzy Logic in biometrics (SCFLB) Soft Computing algorithms Applied in Economy, Industry and Communication Technology Modelling and applications in Textiles The book helps to disseminate advances in selected active research directions in the field of soft computing, along with current issu
These two volumes constitute the Proceedings of the 7th International workshop on Soft Computing applications (SOFA 2016), held on 2426 August 2016 in Arad, Romania. This edition was organized by Aurel Vlaicu Universi...
ISBN:
(纸本)9783319625232
These two volumes constitute the Proceedings of the 7th International workshop on Soft Computing applications (SOFA 2016), held on 2426 August 2016 in Arad, Romania. This edition was organized by Aurel Vlaicu University of Arad, Romania, University of Belgrade, Serbia, in conjunction with the Institute of Computer Science, Iasi Branch of the Romanian Academy, ieee Romanian Section, Romanian Society of Control Engineering and Technical Informatics (SRAIT) - Arad Section, General Association of Engineers in Romania - Arad Section, and BTM Resources Arad. The soft computing concept was introduced by Lotfi Zadeh in 1991 and serves to highlight the emergence of computing methodologies in which the accent is on exploiting the tolerance for imprecision and uncertainty to achieve tractability, robustness and lower costs. Soft computing facilitates the combined use of fuzzy logic, neurocomputing, evolutionary computing and probabilistic computing, leading to the concept of hybrid intelligent systems. The rapid emergence of new tools and applications calls for a synergy of scientific and technological disciplines in order to reveal the great potential of soft computing in all domains. The conference papers included in these proceedings, published post-conference, were grouped into the following areas of research: Methods and applications in Electrical Engineering Knowledge-Based Technologies for Web applications, Cloud Computing, Security algorithms and Computer Networks Biomedical applications Image, Text and Signal Processing Machine Learning and applications Business Process Management Fuzzy applications, theory and Fuzzy Control computationalintelligence in Education Soft Computing & Fuzzy Logic in biometrics (SCFLB) Soft Computing algorithms Applied in Economy, Industry and Communication Technology Modelling and applications in Textiles The book helps to disseminate advances in selected active research directions in the field of soft computing, along with current issues
The proceedings contain 14 papers. The topics discussed include: transforming traditional iris recognition systems to work on non-ideal situations;on the feasibility of the visible wavelength, at-a-distance and on-the...
ISBN:
(纸本)9781424427734
The proceedings contain 14 papers. The topics discussed include: transforming traditional iris recognition systems to work on non-ideal situations;on the feasibility of the visible wavelength, at-a-distance and on-the-move iris recognition;effects of image compression on iris recognition performance and image quality;secure and simplified access to home appliances using iris recognition;minimizing the number of bits needed for iris recognition via bit inconsistency and GRIT;multi-level iris video image thresholding;using artificial neural networks and feature saliency to identify iris measurements that contain the most discriminatory information for iris segmentation;automatic iris mask refinement for high performance iris recognition;and an efficient dual stage approach for IRIS feature extraction using interest point pairing.
Benchmarking is one of the most important ways to investigate the performance of metaheuristic optimization algorithms. Yet, most experimental algorithm evaluations in the literature limit themselves to simple statist...
详细信息
Benchmarking is one of the most important ways to investigate the performance of metaheuristic optimization algorithms. Yet, most experimental algorithm evaluations in the literature limit themselves to simple statistics for comparing end results. Furthermore, comparisons between algorithms from different “families” are rare. In this study, we use the TSP Suite - an open source software framework - to investigate the performance of the Branch and Bound (BB) algorithm for the Traveling Salesman Problem (TSP). We compare this BB algorithm to an Evolutionary Algorithm (EA), an Ant Colony Optimization (ACO) approach, as well as three different Local Search (LS) algorithms. Our comparisons are based on a variety of different performance measures and statistics computed over the entire optimization process. The experimental results show that the BB algorithm performs well on very small TSP instances, but is not a good choice for any medium to large-scale problem instances. Subsequently, we investigate whether hybridizing BB with LS would give rise to similar positive results like the hybrid versions of EA and ACO have. This turns out to be true - the “Memetic” BB algorithms are able to improve the performance of pure BB algorithms significantly. It is worth pointing out that, while the results presented in this paper are consistent with previous findings in the literature, our results have been obtained through a much more comprehensive and solid experimental procedure.
A memetic algorithm is an evolutionary algorithm augmented with a local search. For many applications, researchers have applied variations of memetic algorithms and have gained very positive experimental results. But ...
详细信息
ISBN:
(纸本)9781467358910
A memetic algorithm is an evolutionary algorithm augmented with a local search. For many applications, researchers have applied variations of memetic algorithms and have gained very positive experimental results. But the theory of these variations of memetic algorithms is still underdeveloped. This paper defines the (1+1) adaptive memetic algorithm with a dynamic mutation probability, and analyzes two types of local searches. We then propose different classes of functions for studying the performance of evolutionary algorithms. We give time complexity analysis that proves our two local searches can outperform each other on different functions. Also we show that memetic algorithms with dynamic mutation probabilities can outperform memetic algorithms with static mutation probabilities, and vice versa.
This volume contains the Proceedings of the 5th International workshop on Soft Computing applications (SOFA 2012). The book covers a broad spectrum of soft computing techniques, theoretical and practical applications ...
ISBN:
(纸本)9783642339400
This volume contains the Proceedings of the 5th International workshop on Soft Computing applications (SOFA 2012). The book covers a broad spectrum of soft computing techniques, theoretical and practical applications employing knowledge and intelligence to find solutions for world industrial, economic and medical problems. The combination of such intelligent systems tools and a large number of applications introduce a need for a synergy of scientific and technological disciplines in order to show the great potential of Soft Computing in all domains. The conference papers included in these proceedings, published post conference, were grouped into the following area of research: Soft Computing and Fusion algorithms in biometrics, Fuzzy theory, Control and applications, Modelling and Control applications, Steps towards Intelligent Circuits, Knowledge-Based Technologies for Web applications, Cloud Computing and Security algorithms, computationalintelligence for Biomedical applications, Neural Networks and applications, Intelligent Systems for Image Processing, Knowledge Management for Business Process and Enterprise Modelling. The combination of intelligent systems tools and a large number of applications introduce a need for a synergy of scientific and technological disciplines in order to show the great potential of Soft Computing in all domains.
At the workshop on Evolutionary algorithms, organized by the Institute for Mathematics and Its applications, University of Minnesota, Minneapolis, Minnesota, October 21 - 25, 1996, one of the invited speakers, Dave Da...
详细信息
The International workshop consists of papers describing research work that integrate different computationalintelligence (CI) methodologies for the development of hybrid intelligent systems. The use of intelligent t...
The International workshop consists of papers describing research work that integrate different computationalintelligence (CI) methodologies for the development of hybrid intelligent systems. The use of intelligent techniques, like neural networks, fuzzy logic and genetic algorithms, for real-world problems is now widely accepted. However, the performance of any of these techniques can be improved, in many situations, by using them in conjunction with other techniques. For example, genetic algorithms can be used to optimize the design of a neural network for time series prediction, or fuzzy logic can be used to combine the information from expert neural modules, just to mention two cases. Also, mathematical methods, like the ones from Chaos and Fractal theory, can be used in conjunction with intelligent techniques to improve the performance of hybrid systems for real-world applications. The main problem in this area is how to make a prudent combination of CI methodologies to build hybrid intelligent models that can outperform the results.
Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural cha...
详细信息
ISBN:
(纸本)9781424427734
Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural characteristics, the technology has been used to verify the identity of computer or network users. Given today's heightened security requirements of military as well as other applications such as banking, health care, etc., it is becoming critical to be able to monitor the presence of the authenticated user throughout a session. This paper presents a prototype system that uses facial recognition technology to monitor the authenticated user. The objective is to ensure that the user who is using the computer is the same person that logged onto the system. A neural network-based algorithm is implemented to carry out face detection, and an eigenface method is employed to perform facial recognition. A graphical user interface (GUI) has been developed which allows the performance of face detection and facial recognition to be monitored at run time. The experimental results demonstrate the feasibility of near-real-time continuous user verification for high-level security information systems.
暂无评论