Parameters selection of support vector machine is the key issue that impacts its accurate performance. A method for support vector regression machine with standard particle swarm optimization (SPSO) algorithm is propo...
详细信息
Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its f...
详细信息
Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its fitness values of current dominated individuals are assigned as the values of a custom distance measure, termed as Ab-Ab affinity, between the dominated individuals and one of the nondominated individuals found so far. According to the values of Ab-Ab affinity, all dominated individuals (antibodies) are divided into two kinds, subdominant antibodies and cryptic antibodies. Moreover, local search only applies to the subdominant antibodies, while the cryptic antibodies are redundant and have no function during local search, but they can become subdominant (active) antibodies during the subsequent evolution. Furthermore, a new immune operation, clonal proliferation is provided to enhance local search. Using the clonal proliferation operation, IDCMA reproduces individuals and selects their improved maturated progenies after local search, so single individuals can exploit their surrounding space effectively and the newcomers yield a broader exploration of the search space. The performance comparison of IDCMA with MISA, NSGA-Ⅱ, SPEA, PAES, NSGA, VEGA, NPGA, and HLGA in solving six well-known multiobjective function optimization problems and nine multiobjective 0/1 knapsack problems shows that IDCMA has a good performance in converging to approximate Pareto-optimal fronts with a good distribution.
It is commonplace for the lack of labeled data in novel domains on medical image computer-aided diagnosis but there have been some labeled data or prior knowledge in old correlative domains. In this paper, instance-tr...
详细信息
The performance of the traditional clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, Projection Pursuit w...
详细信息
DNA tile self-assembly has been proved to enable programmable manipulation of biological systems as a tool of molecular computation. It is mainly based on the property that is the spontaneous self-ordering of substruc...
详细信息
As we know, a novel adaptive visual servoing strategy has been proposed for the control of robot manipulators with an eye-in-hand configuration, where an adaptive law is used to estimate the unknown parameters determi...
详细信息
In this paper we propose a novel spectral clustering algorithm called Immune Greedy Spectral Clustering Algorithm, which introduces immune clone selection algorithm instead of greedy selection to choose a subset befor...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is p...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is presented for contour extraction in this paper. Two mechanisms of contextual modulation, surround suppression and collinear facilitation, are integrated in this model. We obtain good results via this model to extract contours from images with noise and texture backgrounds. This work provides a biologically motivated approach with great potential for computer vision.
The target recognition accuracy of remote sensing images is not satisfied. The labels of images acquisition and recollecting are difficult and expensive. In order to solve the problem, we introduce transfer learning i...
详细信息
Traditional recurrent neural networks are composed of capacitors, inductors, resistors, and operational *** neural networks are constructed by replacing resistors with memristors. This paper focuses on the memory anal...
详细信息
Traditional recurrent neural networks are composed of capacitors, inductors, resistors, and operational *** neural networks are constructed by replacing resistors with memristors. This paper focuses on the memory analysis,i.e. the initial value computation, of memristors. Firstly, we present the memory analysis for a single memristor based on memristors’ mathematical models with linear and nonlinear ***, we present the memory analysis for two memristors in series and parallel. Thirdly, we point out the difference between traditional neural networks and those that are memristive. Based on the current and voltage relationship of memristors, we use mathematical analysis and SPICE simulations to demonstrate the validity of our methods.
暂无评论