In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversif...
详细信息
In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversification search, are designed to exploit the local regions around the current solution and explore the unvisited space, respectively. Simulation experiments are conducted for six RNA sequences to show that the proposed method is feasible and effective.
Illumination variation has been one of the most intractable problems in face recognition and many approaches have been proposed to handle illumination problem in the last decades of years. The key problem is how to ge...
详细信息
Illumination variation has been one of the most intractable problems in face recognition and many approaches have been proposed to handle illumination problem in the last decades of years. The key problem is how to get stable similarity measurements between two face images of the same individual but captured under dramatically different lighting conditions. We propose a framework to optimize the illumination normalization for a pair of gallery and probe face images by maximizing a correlation (MAC) between them. The illumination normalization in the proposed framework tends to maximize the intra-individual correlations instead of both the inter- and intra-individual correlations. Experiments on Extended YaleB and CMU-PIE face databases show the effectiveness of our proposed approach in face recognition across varying lighting conditions.
A new general network model for two complex networks with time-varying delay coupling is *** we investigate its synchronization *** two complex networks of the model differ in dynamic nodes,the number of nodes and the...
详细信息
A new general network model for two complex networks with time-varying delay coupling is *** we investigate its synchronization *** two complex networks of the model differ in dynamic nodes,the number of nodes and the coupling *** using adaptive controllers,a synchronization criterion is *** examples are given to demonstrate the effectiveness of the obtained synchronization *** study may widen the application range of synchronization,such as in chaotic secure communication.
Randić et al. proposed a famous spectral graphical representation of DNA sequences, and claimed that it avoids loss of information. In this paper we build two mathematical models for this graphical representation and ...
详细信息
Randić et al. proposed a famous spectral graphical representation of DNA sequences, and claimed that it avoids loss of information. In this paper we build two mathematical models for this graphical representation and prove that the claim is correct, and that it also avoids degeneracy. Moreover, we propose a new method to do similarity analysis of DNA sequences based on the spectral representation. The method adopts M value to characterize a graphical representation and uses 24-component vector as descriptor. The approach is illustrated on the complete coding sequence of beta-globin genes from 7 different species.
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t...
详细信息
ISBN:
(纸本)9781424471645;9781424471638
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In the proposed method, each individual component of the protection system in the simulated plane is modeled. Then, the threat report of each component according to the specific tactics is determined based on its real environment. Finally, the comprehensive threat distribution is obtained based on through the D-S evidence theory to combine multi-sources information. The proposed method can easily applied to the evaluation of the effectiveness of the protection system. We make the total threat of the protection system lowest through changes of the protection resources allocation. A numerical example is used to illustrate the efficiency of the proposed method.
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the database. In this case, many of the popular...
详细信息
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the database. In this case, many of the popular face recognition methods fail to work well due to the inability to learn the discriminatory information specific to the persons to be identified. To address this problem, in this paper, we propose an Adaptive Generic Learning (AGL) method, which adapts a generic discriminant model to better distinguish the persons with single face sample. As a specific implementation of the AGL, a Coupled Linear Representation (CLR) algorithm is proposed to infer, based on the generic training set, the within-class scatter matrix and the class mean of each person given its single enrolled sample. Thus, the traditional Fisher's Linear Discriminant (FLD) can be applied to SSPP task. Experiments on the FERET and a challenging passport face database show that the proposed method can achieve better results compared with other common solutions to the SSPP problem.
The biological immune system is a highly parallel and distributed adaptive system. The informationprocessing abilities of the immune system provide important insights into the field of computation. Based on immunodom...
详细信息
The biological immune system is a highly parallel and distributed adaptive system. The informationprocessing abilities of the immune system provide important insights into the field of computation. Based on immunodominance in the biological immune system and the clonal selection mechanism, a novel data mining method, Immune Dominance Clonal Multiobjective Clustering algorithm (IDCMC), is presented. The algorithm divides an individual population into three sub-populations according to three different measurements, and adopts different evolution and selection strategies for each sub-population. The update of each sub-population, however, is not carried out in isolation. The periodic combination operation of the analysis of the three sub-populations represents considerable advantages in its global search ability. The clustering task is a multiobjective optimization problem, which is more robust with respect to the variety of cluster structures of different datasets than a single-objective clustering algorithm. In addition, the new algorithm can determine the number of clusters automatically, which should identify the most promising clustering solutions in the candidate set. The experimental results, using artificial datasets with different manifold structure and handwritten digit datasets, show that the IDCMC outperforms the PESA-Ⅱ-based clustering method, the genetic algorithm-based clustering technique and the original K-Means algorithm in solving most of the problems tested.
The quantum-inspired immune clonal algorithm(QICA) is a rising intelligence *** on evolutionary game theory and QICA,a quantum-inspired immune algorithm embedded with evolutionary game(EGQICA) is proposed to solve com...
详细信息
The quantum-inspired immune clonal algorithm(QICA) is a rising intelligence *** on evolutionary game theory and QICA,a quantum-inspired immune algorithm embedded with evolutionary game(EGQICA) is proposed to solve combination optimization *** this paper,we map the quantum antibody’s finding the optimal solution to player’s pursuing maximum utility by choosing strategies in evolutionary *** dynamics is used to model the behavior of the quantum antibody and the memory mechanism is also introduced in this *** results indicate that the proposed approach maintains a good diversity and achieves superior performance.
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t...
详细信息
To improve user experience of composite Web services, a user-aware quality of service (QoS) based Web services composition model is proposed. Under such model, a Web services selection method based on quantum geneti...
详细信息
To improve user experience of composite Web services, a user-aware quality of service (QoS) based Web services composition model is proposed. Under such model, a Web services selection method based on quantum genetic algorithm is proposed. This algorithm uses quantum bit encoding, dynamic step-length quantum gate angle adjustment, neighborhood service search and dynamic punishment strategy to expand search scope and speed up convergence. Simulation experiment shows that this algorithm is more efficient than other existing algorithms in Web services selection.
暂无评论