An intelligence optimization algorithm for solving nonlinear bilevel programming is proposed herein. In this algorithm, the upper solution space and lower reaction set of bilevel programming are looked as two growth e...
详细信息
Independent Component Analysis (ICA) and Linear Discriminant Analysis (LDA) are two conventional methods in feature extraction. In this paper, we propose a novel face recognition method which is based on ICA image rec...
详细信息
A new improved hybrid optimization algorithm - PGATS algorithm, which is based on toy off-lattice model, is presented for dealing with three-dimensional protein structure prediction problems. The algorithm combines th...
A new improved hybrid optimization algorithm - PGATS algorithm, which is based on toy off-lattice model, is presented for dealing with three-dimensional protein structure prediction problems. The algorithm combines the particle swarm optimization (PSO), genetic algorithm (GA), and tabu search (TS) algorithms. Otherwise, we also take some different improved strategies. The factor of stochastic disturbance is joined in the particle swarm optimization to improve the search ability; the operations of crossover and mutation that are in the genetic algorithm are changed to a kind of random liner method; at last tabu search algorithm is improved by appending a mutation operator. Through the combination of a variety of strategies and algorithms, the protein structure prediction (PSP) in a 3D off-lattice model is achieved. The PSP problem is an NP-hard problem, but the problem can be attributed to a global optimization problem of multi-extremum and multi-parameters. This is the theoretical principle of the hybrid optimization algorithm that is proposed in this paper. The algorithm combines local search and global search, which overcomes the shortcoming of a single algorithm, giving full play to the advantage of each algorithm. In the current universal standard sequences, Fibonacci sequences and real protein sequences are certified. Experiments show that the proposed new method outperforms single algorithms on the accuracy of calculating the protein sequence energy value, which is proved to be an effective way to predict the structure of proteins.
In this paper, an RGB color image encryption method based on the Lorenz chaotic system and DNA computation is presented. This method can not only change the location of the image pixel but also change the pixel values...
详细信息
In this paper, an RGB color image encryption method based on the Lorenz chaotic system and DNA computation is presented. This method can not only change the location of the image pixel but also change the pixel values. Firstly, we split the RGB color image into R, G, B three components. Then, we use the 2D-hyperchaotic sequence to disorder the location of R, G, B three-component pixels. Secondly, three different chaotic sequences are generated by a one-dimensional logistic chaotic map, and the pixel values of the three components R, G, B can be scrambled through the three logistic chaotic sequences. Then the R, G, B digital images can be transformed into DNA coding matrices based on DNA coding rules. Thirdly, 3D chaotic sequences are generated by use of Lorenz chaotic system and are encoded based on DNA encoding rules in order to generate three DNA sequences. Finally, the encrypted image can be obtained by utilizing DNA operations on the DNA sequences of three components R, G, B and DNA sequences generated by the Lorenz chaotic system. The experiment results and encryption effect demonstrate that the proposed scheme is effective, and it has strong sensibility, high security, and good ability of resisting statistic attack.
A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operati...
详细信息
A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operation, but just uses the idea of DNA subsequence operation (such as elongation operation, truncation operation, and deletion operation). And then, do the DNA addition operation under the Chen's Hyper-chaotic map in this image cipher. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.
Face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are two traditional methods in ...
详细信息
Face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are two traditional methods in pattern recognition. In this paper, we propose a novel method based on PCA image reconstruction and LDA for face recognition. First, the inner-classes covariance matrix for feature extraction is used as generating matrix and then eigenvectors from each person is obtained, then we obtain the reconstructed images. Moreover, the residual images are computed by subtracting reconstructed images from original face images. Furthermore, the residual images are applied by LDA to obtain the coefficient matrices. Finally, the features are utilized to train and test SVMs for face recognition. The simulation experiments illustrate the effectivity of this method on the ORL face database.
Nowadays, gene chip technology has rapidly produced a wealth of information about gene expression activities. But the time-series expression data present a phenomenon that the number of genes is in thousands and the n...
详细信息
Nowadays, gene chip technology has rapidly produced a wealth of information about gene expression activities. But the time-series expression data present a phenomenon that the number of genes is in thousands and the number of experimental data is only a few dozen. For such cases, it is difficult to learn network structure from such data. And the result is not ideal. So it needs to take measures to expand the capacity of the sample. In this paper, the Block bootstrap re-sampling method is utilized to enlarge the small expression data. At the same time, we apply "K2+T" algorithm to Yeast cell cycle gene expression data. Seeing from the experimental results and comparing with the semi-fixed structure EM learning algorithm, our proposed method is successful in constructing gene networks that capture much more known relationships as well as several unknown relationships which are likely to be novel.
This paper presents an analysis method to the global exponential stability for the delayed genetic regulatory networks with SUM regulatory functions. By transforming the kinetics of networks into a single delay differ...
详细信息
The prediction of protein structure that attracts many researchers to study is an NP-hard problem. In recent year, numerous algorithms are proposed. Although particle swarm optimizer has many advantages, the disadvant...
详细信息
A new image fusion encryption algorithm based on image fusion and DNA sequence operation and hyper-chaotic system is presented. Firstly, two DNA sequences matrices are obtained by encoding the original image and the k...
详细信息
A new image fusion encryption algorithm based on image fusion and DNA sequence operation and hyper-chaotic system is presented. Firstly, two DNA sequences matrices are obtained by encoding the original image and the key image. Secondly, using the chaotic sequences generated by Chen's hyper-chaotic maps to scramble the locations of elements from the DNA sequence matrix which generated form original image. Thirdly, XOR the scrambled DNA matrix and the random DNA matrix by using DNA sequence addition operation. At last, decoding the DNA sequence matrix, we will get the encrypted image. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.
暂无评论