We introduce an alternative hybrid swarm algorithm for image segmentation that employs multilevel thresholding techniques. For the hybridization, we have combined the whale optimization algorithm (WOA) and the particl...
详细信息
We introduce an alternative hybrid swarm algorithm for image segmentation that employs multilevel thresholding techniques. For the hybridization, we have combined the whale optimization algorithm (WOA) and the particle swarm optimization (PSO). The proposed method is called WOAPSO, and it operates in a cooperative environment, where the initial population is divided into two subpopulations (the first subpopulation is assigned for WOA and the other is assigned for PSO). Then, the WOA and the PSO operate in parallel during the iterative process to update the solutions and the best solution is selected from the union of the updated subpopulations according to the objective function. Here, two objective functions are used, the Otsu's method and the fuzzy entropy method. These functions evaluate the quality of the thresholds generated by the WOAPSO considering the variance and the entropy of the classes where the pixels are cataloged. The experimental results and comparisons provide evidence of the ability of the proposed WOAPSO algorithm to reduce the time complexity without affecting the accuracy of the solutions. (C) 2018 SPIE and IS&T
As the community is now a days moving rapidly towards the cloud, its security is something we really need to think and research about. The problem of security is as old as the internet is, and hence a number of soluti...
详细信息
ISBN:
(纸本)9781538619742
As the community is now a days moving rapidly towards the cloud, its security is something we really need to think and research about. The problem of security is as old as the internet is, and hence a number of solutions for the problem has also been thought of. Many of the various solutions consists using firewalls for the network or in the host, anti-malware programs installed on the system, packet-sniffing techniques for detection of malicious entities as well as fake traffic, pattern and signature matching techniques for various files that the system has to deal with every now and then. One of these is solutions is deploying Intrusion Detection System (IDS) in the network. Here, we have devised a model that will be able to find any unwanted intrusions in the network. For this, we have employed Genetic algorithm (GA) with the whale optimization algorithm which we will see is an effective algorithm to use. In the first step, an Intrusion Detection System (IDS) is built using GA with natural selection method. The proposed hybrid algorithm in this scheme is then tested for the detection of malicious network traffic date set.
This work focuses on incorporation of distribution generation (DG) units in unequal three area interconnected automatic generation control (AGC) system with diversified sources. The particular system is associated wit...
详细信息
ISBN:
(纸本)9781538647691
This work focuses on incorporation of distribution generation (DG) units in unequal three area interconnected automatic generation control (AGC) system with diversified sources. The particular system is associated with appropriate value of generation rate constraint for realistic approach. A cascade combination of integer order proportional-integral-derivative with filter and fractional order integral derivative (PIDN-FOID) is utilized for study. The controller gains plus parameters are obtained using whale optimization algorithm. The performance of PIDN-FOID controller is evaluated against classical controllers. Analyses show that inclusion of DG units provides noticeable improvement on system dynamics. In AGC various energy storage devices are used in order to mitigate inter-area oscillations. Here, energy storage device redox flow battery (RFB) is incorporated in all areas. Observation reflects that inclusion of RFB improves system dynamics. Sensitivity analysis is performed for increased value of step load perturbation in presence of DG units as well as RFB.
Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and i...
详细信息
Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and infrared images, respectively, and the directional filter banks are applied to obtain multiple directional sub-band image features. Then, we compute the decomposition coefficients of visible and infrared images using a low-pass filter on the decomposed data;and finally, we introduce the whale optimization algorithm to search optimal coefficients to reconstruct the final fusion image. The experiments are conducted on multiple datasets with subjective and objective comparisons, in which the qualitative and quantitative analyses indicate the validity of the proposed method.
As traditional radar jamming methods face severe challenges, a new strategy for forwarding jamming using chaff was proposed. Its principle was introduced, its interference performance was calculated, and compound jamm...
详细信息
ISBN:
(纸本)9781538660577
As traditional radar jamming methods face severe challenges, a new strategy for forwarding jamming using chaff was proposed. Its principle was introduced, its interference performance was calculated, and compound jamming effect and safety of jammer were calculated. A space model for longdistance support of compound jamming was established. The pseudo-random and ergodicity of the Tent chaotic sequence were introduced into the whale optimization algorithm to reduce the probability of the whale optimization algorithm falling into a local optimum, which was used to solve the model. Simulation verification was carried out and relevant airspace layout was obtained. Simulation shows that the model built is scientific and effective.
This paper deals with designing a multi-objective algorithm based on recently proposed whale optimization algorithm (WOA), termed as MOWOA. The original WOA algorithm is popular among the researchers due to the encirc...
详细信息
ISBN:
(纸本)9781509011346
This paper deals with designing a multi-objective algorithm based on recently proposed whale optimization algorithm (WOA), termed as MOWOA. The original WOA algorithm is popular among the researchers due to the encircling moments of agents (Humpback whales) in the search space which provides proper balance among the exploration and exploitation, faster convergence and lessor number of parameters. The proposed multi-objective version posses all the above benefits of the original algorithm, in addition it reveals accurate convergence to the true Pareto fronts and maintain effective diversity among the solutions. The performance is demonstrated on six unconstrained bi-objective functions of IEEE CEC 2009. The obtained results are compared with that achieved by multi-objective Grey Wolf optimization (MOGWO), multi-objective Particle Swarm optimization (MOPSO), multi-objective Evolutionary algorithm based on Decomposition(MOEA/D).
作者:
LI SaiFANG HuajingSchool of Automation
Key Laboratory of Image Processing and Intelligent ControlMinistry of EducationHuazhong University of Science and Technology
Condition monitoring is very important for system safety and condition-based *** series prediction capabilities of machine learning like support vector regression(SVR) can be utilized for ***,choosing optimal paramete...
详细信息
ISBN:
(纸本)9781538629185
Condition monitoring is very important for system safety and condition-based *** series prediction capabilities of machine learning like support vector regression(SVR) can be utilized for ***,choosing optimal parameters for SVR is an important step in SVR model design,which heavily affects the performance of ***,a whale optimization algorithm(WOA) based algorithm is proposed for SVR parameters *** proposed algorithm has been evaluated through some benchmark ***,the proposed method with moving window technology is used to condition prognostics of the Tennessee Eastman *** and engineering application show that the SVR-WOA method is effective,by noting that the computation time is shortened in some application scenarios.
A content-based image retrieval system is proposed using an optimized weighted feature voting technique with multifeatures and multidistance measures. The proposed system consists of two phases: enrollment phase and q...
详细信息
A content-based image retrieval system is proposed using an optimized weighted feature voting technique with multifeatures and multidistance measures. The proposed system consists of two phases: enrollment phase and querying phase. In enrollment phase, six features have been extracted from each enrollment image. These features are color histogram, edge histogram, edge direction histogram, hierarchical annular histogram, Gabor filter, and co-occurrence matrix. The extracted features are weighted, and feature weights are optimized using the four optimization techniques. Particle swarm optimization, ant lion optimizer, bird swarm algorithm, and whale optimization algorithm are applied and compared to decide the suitable technique. In querying phase, the same features are extracted from the query image and comparing these features to the extracted features from the database images through the matching measures. Three distance measures have been used and compared for the matching process: histogram intersection, Euclidean distance, and cosine distance. Based on these distances and the feature weights, the class of the query image is identified using the weighted feature voting mechanism. Finally, the related images are retrieved based on the feature that returned the maximum number of images in the identified class. For the validation and performance evaluations of the proposed system;Wang, Caltech101, and UW datasets are used. The experimental results show that the proposed method achieves improved precision in comparison with existing methods with 93% for Wang database, 92% for UW database, and 94% for Caltech101 database. (C) 2018 SPIE and IS&T.
In this paper, a variant of the recently introduced whale optimization algorithm (WOA) was proposed based on adaptive switching of random walk per individual search agent. WOA is recently proposed bio-inspired optimiz...
详细信息
ISBN:
(纸本)9781538633687
In this paper, a variant of the recently introduced whale optimization algorithm (WOA) was proposed based on adaptive switching of random walk per individual search agent. WOA is recently proposed bio-inspired optimizers that employ two different random walks. The original optimizer stochastically switches between the two random walk at each iteration regardless of the search agents performance and regardless of the fitness terrain around it. In the proposed adaptive walk whale optimization algorithm (AWOA), an adaptive switching between the two random walk is recommended based on the agent's performance. Moreover, a random explorative switch of the walk is applied to allow search agents to try different walks. The proposed AWOA was benchmarked using 29 standard test functions with uni-modal, multi-modal, and composite test functions. Performance over such functions proves the capability of the proposed variant to outperform the original WOA.
Spam E-mailis a kind of electronic spam in which unsolicited messages are sent by E-mail. It is the most severe problem world-wide for decades. One of the best approach to identify spam E-mails is filtering E-mails by...
详细信息
ISBN:
(纸本)9781509043071
Spam E-mailis a kind of electronic spam in which unsolicited messages are sent by E-mail. It is the most severe problem world-wide for decades. One of the best approach to identify spam E-mails is filtering E-mails by classification. In many applications feature selection is the most widely used and essential task in many classification techniques to reduce the dimensionality of feature space. In this paper a Nature Inspired Meta-Heuristic algorithm, that exploits the SVM principles for finding optimized structures of the Enron-Spam dataset having high similarity, is proposed. We adopted the WOA to obtainan optimal feature subset for E-mail classification. Four different kernel functions are exploited, that includes Linear, Quadratic, Polynomial and RBF in classification to test the best kernel function for SVM. Different evaluation measurements such as Precision, Accuracy, Recall and F-measureare calculated to find the performance of the proposed technique. The investigated results are analysed and compared with those from other techniques published in spam E-mails filtering. All the analysed and compared results show that proposed technique is very competitive for E-mail classification.
暂无评论