𝔖 Scriptorium
✦   LIBER   ✦

📁

Intelligent Computing Methodologies: 18th International Conference, ICIC 2022, Xi'an, China, August 7–11, 2022, Proceedings, Part III (Lecture Notes in Computer Science, 13395)

✍ Scribed by De-Shuang Huang (editor), Kang-Hyun Jo (editor), Junfeng Jing (editor), Prashan Premaratne (editor), Vitoantonio Bevilacqua (editor), Abir Hussain (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
928
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volumes were carefully reviewed and selected from 449 submissions.

This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was “Advanced Intelligent Computing Technology and Applications”. Papers focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.

✦ Table of Contents


Preface
Organization
Contents – Part III
Fuzzy Theory and Algorithms
An Incremental Approach Based on Hierarchical Classification in Multikernel Fuzzy Rough Sets Under the Variation of Object Set
1 Introduction
2 An Introduction of Fuzzy Rough Sets
3 Multikernel Fuzzy Rough Sets Based on Hierarchical Classifification
4 Incremental Updating for Lower and Upper Approximations Under the Variation of Single Object
4.1 Immigration of Single Object
4.2 Emmigration of Single Object
5 Conclusions and Further Research
References
A Clustering Method Based on Improved Density Estimation and Shared Nearest Neighbors
1 Introduction
2 Method
2.1 The New Density Estimation Method
2.2 A New Allocation Strategy in the Clustering Process
3 Experiments
3.1 Datasets and Processing
3.2 Parameters Selection
3.3 Experimental Results
4 Conclusion
References
Bagging-AdaTSK: An Ensemble Fuzzy Classifier for High-Dimensional Data
1 Introduction
1.1 A Subsection Sample
2 Methodology
2.1 AdaTSK Classifier
2.2 The Improved Bagging Strategy
2.3 Bagging-AdaTSK Classifier
2.4 The Computation Complexity of Bagging-AdaTSK Classifier
3 Simulation Results
3.1 The Classification Performance of Bagging-AdaTSK
3.2 Sensitivity of Bagging-AdaTSK to the Overlap Rates
4 Conclusion
References
Some Results on the Dominance Relation Between Conjunctions and Disjunctions
1 Introduction
2 Preliminaries
3 The Characterization of Conjunctions Dominating All Triangular Conorms
4 The Characterization of Disjunctions Weakly Dominating All Triangular Norms
5 Conclusion
References
Robust Virtual Sensors Design for Linear Systems
1 Introduction
2 Problem Solution
2.1 The Mail Models
2.2 ICF-Based Model Design
2.3 Observer Design
2.4 JCF-Based Model Design
3 Robust Model Design
3.1 ICF-Based Model
3.2 JCF-Based Model
4 Example
5 Conclusion
References
Clustering Analysis in the Student Academic Activities on COVID-19 Pandemic in Mexico
1 Introduction
2 Related Work
3 Cluster Model
3.1 K-means Algorithm
3.2 Linkage Rules
4 Experimental Set up
4.1 Dataset
4.2 K-means Models Performance
5 Results and Discussion
6 Conclusion
References
Application of Stewart Platform as a Haptic Device for Teleoperation of a Mobile Robot
1 Introduction
2 Admittance Model
3 Design Inner Position Control
3.1 Dynamic of the Haptic Device
3.2 Extended State Observer-Based Estimation for Faults
3.3 Inner Position Control for the Haptic Device
4 Experiment
4.1 The Performance of the Proposed Controller
4.2 Teleoperation of a Mobile Robot in the Virtual Environment
5 Conclusion
References
Geometric Parameters Calibration Method for Multilink Manipulators
1 Introduction
2 Description of MM Parameter Calibration Method
3 Simulation Results
4 Conclusions and Discussion
References
A Kind of PWM DC Motor Speed Regulation System Based on STM32 with Fuzzy-PID Dual Closed-Loop Control
1 Introduction
2 System Framework
3 Modeling and Analyzing of Dual Closed-Loop
3.1 Dual Closed-Loop Control System
3.2 Simulation of Motor PID Dual Closed-Loop Model
4 Fuzzy-PID Design and Simulation
5 Conclusion
References
Machine Learning and Data Mining
Research on Exchange and Management Platform of Enterprise Power Data Uniftcation Summit
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 Business Architecture
3.2 Application Architecture
3.3 Technical Architecture
3.4 Data Architecture
3.5 Integration Architecture
3.6 Security Architecture
4 Conclusion
References
Application of Deep Learning Autoencoders as Features Extractor of Diabetic Foot Ulcer Images
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Dataset
3.2 Background of Machine Learning Algorithms
3.3 Proposed Machine Learning Model
4 Results
4.1 Evaluation Metrics
4.2 Results
5 Conclusion
References
MPCNN with Knowledge Augmentation: A Model for Chinese Text Classification
1 Introduction
1.1 Related Work
2 Model
2.1 Knowledge Augmentation
2.2 Multi-pyramid
3 Experiment
3.1 Short Text
3.2 Long Text
4 Conclusion
References
An Improved Mobilenetv2 for Rust Detection of Angle Steel Tower Bolts Based on Small Sample Transfer Learning
1 Introduction
2 Materials and Methods
2.1 Dataset
2.2 Model Framework
3 Experimental Analysis
3.1 Related Parameter Settings
3.2 Loss Function and Evaluation Index
3.3 Optimizer Selection
3.4 Ablation Experiment
3.5 Test Curve
3.6 Comparative Experiment
3.7 Comparison of Flops in Different Networks
4 Conclusion
References
Generate Judge-View of Online Dispute Resolution Based on Pretrained-Model Method
1 Introduction
2 Related Works
3 Problem Statement
4 Model
5 Training Method
6 Experiment and Result
6.1 Dataset
6.2 Experimental Setup
6.3 Results
7 Conclusion
References
An Effective Chinese Text Classification Method with Contextualized Weak Supervision for Review Autograding
1 Introduction
2 Methodology
2.1 Dataset Collection
2.2 The Proposed Workflow
2.3 Model Selection
2.4 Performance Evaluation Metrics
3 Result Evaluation
3.1 Overall Results
3.2 Confusion Matrix
4 Conclusion and Discussion
References
Comparison of Subjective and Physiological Stress Levels in Home and Office Work Environments
1 IntroductionIntroduction
2 Background
3 Methodology
3.1 Dataset
3.2 Feature Extraction and Machine Learning
4 Results and Discussion
4.1 Limitations
5 Conclusion
References
Cross Distance Minimization for Solving the Nearest Point Problem Based on Scaled Convex Hull
1 Introduction
2 Preliminary on SCH
3 The Proposed Method
4 Experiments
5 Conclusion
References
Nut Recognition and Positioning Based on YOLOv5 and RealSense
1 Introduction
2 Method
2.1 The Principle of Positioning Using RealSense
2.2 YOLO
2.3 Hough Circle Detection
3 Experimental Results and Analysis
4 Conclusion
References
Gait Identification Using Hip Joint Movement and Deep Machine Learning
1 Introduction
2 Methodology
2.1 Dataset Acquisition Setup
2.2 Feature Extraction
2.3 Gait Identification Models
2.4 The Mode Metric
3 Results and Discussion
4 Conclusions and Future Directions
References
Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function
1 Introduction
2 Materials and Methods
2.1 Datasets
2.2 Combined Loss Function
2.3 Action – Value Method based on Qualification Trace
2.4 Activation Function
3 Experiments and Discussion
3.1 Evaluation metric
3.2 Model Parameters
3.3 Result of Comparison
4 Conclusion
References
A Systematic Review of Distributed Deep Learning Frameworks for Big Data
1 Introduction
2 Research Methodology
3 Background
3.1 Distributed Deep Learning
3.2 Data Parallelism and Model Parallelism
3.3 Parameters Update Sharing and Communication
3.4 Synchronous and Asynchronous Communication
4 Distributed Deep Learning Frameworks
4.1 Classification Criteria
4.2 Discussion
5 Conclusion
References
Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment
1 Introduction
2 Related Works and Post Event Analysis Methods
3 Post Event Analysis in Practice
3.1 Proposed Architecture
3.2 Graphical User Interface
3.3 Key Components and Capabilities
4 Knowledge Accumulation and Leveraging CT
5 Conclusions
References
Federated Sparse Gaussian Processes
1 Introduction
2 Related Models
3 Federated Sparse Gaussian Processes
3.1 FederatedAveraging Algorithm
3.2 Prediction
4 Experiments
5 Conclusion
References
Classification of Spoken English Accents Using Deep Learning and Speech Analysis
1 Introduction
2 Methodology
2.1 Dataset
2.2 Preprocessing
3 Convolution Neural Network
4 Proposed Design
5 Results
6 Conclusion
References
A Stable Community Detection Approach for Large-Scale Complex Networks Based on Improved Label Propagation Algorithm
1 Introduction
2 Related Work
3 Proposed Algorithm
3.1 Boundary Nodes Generation
3.2 Label Propagation Based on the Number of Common Neighbors and Node Degree
4 Experiments
4.1 Experimental Environment
4.2 Influents of the Parameter
4.3 Effectiveness of Initial Boundary Nodes
4.4 Community Detection
5 Conclusion
References
An Effective Method for Yemeni License Plate Recognition Based on Deep Neural Networks
1 Introduction:
2 Related Work
2.1 License Plate Detection
2.2 License Plate Recognition
3 Methodology
3.1 The Proposed Dataset
3.2 Proposed ALPR Method
4 Experimental Results
5 Conclusions and Future Work
References
Topic Analysis of Public Welfare Microblogs in the Early Period of the COVID-19 Epidemic Based on LDA Model
1 Introduction
2 Related Work
3 The LDA Topic Model
4 Process of Experiment
5 Experiments and Discussion
5.1 Data Collection
5.2 Data Preprocessing
5.3 Life Cycle Division
5.4 Word Frequency Statistics
5.5 TF-IDF Features Extraction
5.6 LDA Topic Model Establishment
5.7 Analysis of Results
5.8 Discussion
6 Conclusion and Future Work
References
Intelligent Computing in Computer Vision
Object Detection Networks and Mixed Reality for Cable Harnesses Identification in Assembly Environment
1 Introduction
2 The Proposed System Framework
2.1 Cable Type Inspection Sub-system
2.2 Assembly Process Guidance Based on AR
3 Experiments and Discussions
3.1 Dataset and Experimental Parameters
3.2 Baselines and Evaluation Metric
3.3 Experimental Results and Discussion
4 Conclusions
References
Improved YOLOv5 Network with Attention and Context for Small Object Detection
1 Introduction
2 Related Work
2.1 CNN-Based Object Detection
2.2 Attention Mechanism
2.3 Context Information
3 Proposed Method
3.1 Network Architecture
3.2 Coordinate Attention
3.3 Context Feature Enhancement Module
4 Experiments
4.1 Datasets and Evaluation Metrics
4.2 Implementation Details
4.3 Evaluation on VisDrone-Detection Datasets
4.4 Ablation Studies
5 Conclusion
References
Inverse Sparse Object Tracking via Adaptive Representation
1 Introduction
2 Related Work
3 Methodology
3.1 Formulation
3.2 Optimization
3.3 Time Complexity
3.4 Tracking Frame
4 Experiment
4.1 Evaluation Criteria
4.2 Quantitative Comparison
4.3 Qualitative Evaluation
5 Conclusion
References
A Sub-captions Semantic-Guided Network for Image Captioning
1 Introduction
2 Related Work
3 Method
3.1 Multimodal Feature Extraction
3.2 Iterative Mutual Attention
4 Experiments
4.1 Datasets and Metrics
4.2 Implementation Details
4.3 Accurate Image Captioning
4.4 Controllable Image Captioning
4.5 Diverse Image Captioning
5 Conclusion
References
A Novel Gaze Detection Method Based on Local Feature Fusion
1 Introduction
2 Related Work
3 The Proposed Method
3.1 Saliency Module
3.2 Gaze Direction Module
3.3 Information Fusion Module
3.4 Implementations Details
4 Experiments
4.1 Datasets
4.2 Evaluation Metrics
4.3 Comparative Methods and Analysis
4.4 Ablation Study Analysis
4.5 Qualitative Analysis
5 Conclusion and Future Work
References
Vehicle Detection, Classification and Counting on Highways - Accuracy Enhancements
1 Introduction
2 Vehicle Detection
2.1 Basic Counting Approach
2.2 Deep Learning
2.3 Limitations
2.4 Performance and Results
3 Conclusion
References
Image Dehazing Based on Deep Multiscale Fusion Network and Continuous Memory Mechanism
1 Introduction
2 Related Works
3 Proposed Dehazing Method
3.1 Network Architecture
3.2 Continuous Memory Residual Block
3.3 Pixel Attention Module
3.4 Residual Dense Block (RDB)
3.5 Loss Function
4 Experimental Results and Analysis
4.1 Implement Details
4.2 Dataset
4.3 Evaluation Results
4.4 Ablation Study
5 Conclusions
References
Improved YOLOv5s Model for Vehicle Detection and Recognition
1 Introduction
2 Model Introduction and Optimization
2.1 Model
2.2 YOLOv5s Structure
2.3 YOLOv5s-ATE
3 Experiment and Evaluation
3.1 Data Selection
3.2 Model Training
3.3 Result and Analysis
3.4 Real-Time Detection of Traffic Flow
4 Conclusion
References
Garbage Classification Detection Model Based on YOLOv4 with Lightweight Neural Network Feature Fusion
1 Introduction
2 Related Work
3 YOLOv4-LFF
3.1 Lightweight Backbone Network
3.2 Lightweight Enhanced Feature Extraction Network
3.3 Feature Fusion Module
4 Experimental Results and Analysis
4.1 Experimental Dataset
4.2 Experimental Conditions
4.3 Evaluation Metrics
4.4 Experimental Analysis
4.5 Testing Effect
5 Conclusions
References
Detection of Personal Protective Equipment in Factories: A Survey and Benchmark Dataset
1 Introduction
2 Related Work
3 Dataset
4 Baseline Experiments and Result Analysis
5 Conclusions
References
Intelligent Control and Automation
A Novel IoMT System for Pathological Diagnosis Based on Intelligent Mobile Scanner and Whole Slide Image Stitching Method
1 Introduction
2 Methods
2.1 Overview of the IoMT System
2.2 Embedded Design of the Mobile Scanner
2.3 Image Stitching Method
3 Evaluation Scheme and Results
4 Conclusion
References
Deep Reinforcement Learning Algorithm for Permutation Flow Shop Scheduling Problem
1 Introduction
2 PFSP
2.1 Problem Description
2.2 Mathematical Model of PFSP
3 Algorithm Design
3.1 State
3.2 Action Space
3.3 Reward
3.4 Optimal Mixed Rule Strategies
3.5 Ddqn
3.6 DRL Algorithm Steps
4 Computational Results
4.1 Settings of Parameters
5 Computational Results
6 Conclusions and Future Research
References
Model Predictive Control for Voltage Regulation in Bidirectional Boost Converter
1 Introduction
2 Conventional Model Predictive Control
3 Proposed Model Predictive Control
4 Simulation Results
5 Conclusion
References
Fed-MT-ISAC: Federated Multi-task Inverse Soft Actor-Critic for Human-Like NPCs in the Metaverse Games
1 Introduction
2 Preliminaries
3 Method for Human-Like NPCs in the Metaverse Games
3.1 Policy Distillation Transfer
3.2 Dynamic-Aware Variational Transfer
4 Experiments
4.1 Experimental Setup
4.2 Results
5 Conclusions
References
Development of AUV Two-Loop Sliding Control System with Considering of Thruster Dynamic
1 Introduction
2 Description of Mathematical Models of AUV and Thruster
3 The Synthesis of the AUV Control System
3.1 The Synthesis of the AUV Velocity Control Loop
3.2 The Synthesis of the AUV Position Control Loop
4 The Research of AUV Control System
5 Conclusions
References
An Advanced Terminal Sliding Mode Controller for Robot Manipulators in Position Tracking Problem
1 Introduction
2 Preliminary Concepts and Problem Formulations
2.1 Preliminary Concepts
2.2 Dynamic Equation of n - DOF Manipulators
3 Proposed Controller Scheme
3.1 Proposed Sliding Mode Surface
3.2 Proposed Control Method
3.3 Stability Analysis
4 Control Performance
5 Conclusion
References
An Observer-Based Fixed Time Sliding Mode Controller for a Class of Second-Order Nonlinear Systems and Its Application to Robot Manipulators
1 Introduction
2 Preliminary Concepts and Problem Formulation
2.1 Preliminary Concepts
2.2 Problem Formulation
3 Design of the Proposed Controller
3.1 Design of a Fixed-Time Disturbance Observer
3.2 Design of a Fixed-Time Sliding Surface (FxSS)
3.3 Design of Observer-Based Fixed Time Sliding Mode Controller
4 Numerical Simulation Results and Discussion
5 Conclusion
References
A Robust Position Tracking Strategy for Robot Manipulators Using Adaptive Second Order Sliding Mode Algorithm and Nonsingular Sliding Mode Control
1 Introduction
2 Problem Formulation
3 Controller Design
3.1 Design of the NSSMC Algorithm
3.2 Design of AQSM Algorithm Based on NSSMC
4 Simulation Results
5 Conclusions
References
Intelligent Data Analysis and Prediction
A Hybrid Daily Carbon Emission Prediction Model Combining CEEMD, WD and LSTM
1 Introduction
2 Methods
2.1 Complementary Ensemble Empirical Mode Decomposition (CEEMD)
2.2 Wavelet Decomposition (WD)
2.3 Long Short Term Memory (LSTM)
2.4 The Process of the Proposed Model
3 Data Source and Evaluation Indicators
4 Empirical Analysis
4.1 Data Preprocessing
4.2 Comparative Experiments
5 Conclusion
References
A Hybrid Carbon Price Prediction Model Based on VMD and ELM Optimized by WOA
1 Introduction
2 Preliminaries
2.1 Variational Mode Decomposition (VMD)
2.2 Whale Optimization Algorithm (WOA)
2.3 Extreme Learning Machine (ELM)
3 The Proposed Model
4 Data Source and Evaluation Indicators
5 Empirical Analysis
5.1 Data Preprocessing Based on VMD
5.2 Data Preprocessing Based on EMD
5.3 Comparative Experiments
6 Conclusion
References
A Comparative Study of Autoregressive and Neural Network Models: Forecasting the GARCH Process
1 Introduction
2 Literature Review
3 Model Descriptions
3.1 AR-GARCH Models
3.2 MLP Models
4 Numerical Experiments
4.1 Modeling AR(1)-GARCH Process
4.2 Modeling AR(2)-GARCH Process
4.3 Modeling GARCH Process
4.4 Analysis
5 Conclusion
References
A Novel DCT-Based Video Steganography Algorithm for HEVC
1 Introduction
2 Theoretical Framework
2.1 Intra-frame Prediction
2.2 Intra-frame Distortion Drift
2.3 (7, 4) Hamming Code
3 Proposed Scheme
3.1 Embedding
3.2 Data Extraction
4 Experiments and Results Analyses
5 Conclusion
References
Dynamic Recurrent Embedding for Temporal Interaction Networks
1 Introduction
2 Related Works
3 Model
3.1 Problem Definition
3.2 Update the Node Embedding
3.3 Generate the Temporal Embedding
3.4 Training
4 Experiments
5 Conclusions
References
Deep Spatio-Temporal Attention Network for Click-Through Rate Prediction
1 Introduction
2 Related Work
3 Deep Spatio-Temporal Attention Network
3.1 Feature Representation
3.2 Self-attention Model
3.3 Interaction Attention
3.4 Fully Connected Layer
4 Experiments
4.1 Datasets and Metrics
4.2 Parameter Settings
4.3 Effectiveness
4.4 Analysis of Results
4.5 Effect of the Number of Hidden Layers
5 Conclusion
References
A Unified Graph Attention Network Based Framework for Inferring circRNA-Disease Associations
1 Introduction
2 Materials and Methods
2.1 Overview
2.2 Graph Construction
2.3 Feature Preprocessing
2.4 GAT Based Node Feature Learning
2.5 circRNA-Disease Association Predictors
3 Results
3.1 Benchmark Datasets
3.2 Evaluation Setup and Metrics
3.3 Quantitative Analysis of Our Proposed Method
3.4 Impact of Data Leak
3.5 Performance Comparison with Other Methods
3.6 Case Study
4 Discussion and Conclusion
References
Research on the Application of Blockchain Technology in the Evaluation of the “Five Simultaneous Development” Education System
1 Research Background
2 Blockchain Technology Application Trends
3 The Application of Blockchain Technology in the Evaluation and Application of the “Five Simultaneous Education” Education System
3.1 Main Content
3.2 The Reform Goal of This Paper
3.3 Key Issues to Be Addressed
3.4 Implementation Plan
4 Conclusion
References
Blockchain Adoption in University Archives Data Management
1 Introduction
2 Blockchain
2.1 Blockchain and Blockchain Technology
2.2 Features of Blockchain
3 The Application of Blockchain Technology in University Archives Data Management
3.1 Current Situation of Archival Data Management in Universities
3.2 Application Feasibility
3.3 Application Superiority
4 System Construction
4.1 Mode Selection
4.2 Frame Model
5 Conclusion
References
A Novel Two-Dimensional Histogram Shifting Video Steganography Algorithm for Video Protection in H.265/HEVC
1 Introduction
2 Related Technical Backgrounds
2.1 QDST Coefficients in H.265/HEVC
2.2 Histogram Modification Mechanism
3 Proposed Two-Dimensional Histogram Shifting Video Steganography Algorithm
4 Experimental Evaluation
5 Conclusion
References
Problems and Countermeasures in the Construction of Intelligent Government Under the Background of Big Data
1 Introduction
2 General Theory of Smart Government
2.1 The Concept of Smart Government
2.2 Value Orientation of Smart Government
2.3 Governance Framework of Smart Government
3 Problems in the Construction of Intelligent Government Under the Background of Big Data
3.1 Inadequate System Construction of Smart Government Governance
3.2 Big Data Core Technology is Still Lacking
3.3 Lack of Necessary Technical Supervision Mechanism
3.4 Failure to Construct Dynamic Network Collaborative Governance System
4 Countermeasures and Suggestions
4.1 Perfecting the Legislation of Open Government Big Data
4.2 Shared Development of Big Data and Related Technologies
4.3 Perfecting the Supervision System of Smart Government Governance System
4.4 Governance Mode of Innovation Dynamic Network Collaboration
5 Complimentary Close
References
Application of Auto-encoder and Attention Mechanism in Raman Spectroscopy
1 Introduction
2 Related Work
2.1 Raman Spectra of Single Component Glucose Medium
2.2 Spectrograms of Multi-component Mixtures
2.3 Auto-encoder
2.4 Attention Mechanism
3 Algorithm Design
4 Experiment
4.1 Traditional Methods and Neural Networks
4.2 Self-encoder and Attention Mechanism
5 Results and Discussion
References
Remaining Useful Life Prediction Based on Improved LSTM Hybrid Attention Neural Network
1 Introduction
2 Related Work
2.1 LSTM Network
2.2 Temporal Pattern Attention Mechanism
2.3 Improved LSTM Hybrid Attention Neural Network
3 Experiments
3.1 Dataset Introduction
3.2 Data Preprocessing
3.3 Performance Evaluation Metrics
3.4 Experimental Analysis
4 Conclusions
References
Medical Image Registration Method Based on Simulated CT
1 Introduction
2 Related Work
2.1 Laplace Support Vector Machine (LAPSVM)
2.2 Semi-supervised Classification Maximum Knowledge Utilization (SSC-EKE)
2.3 Medical Image Registration Based on Phase Difference
2.4 Pixel Weighted Average Image Fusion Algorithm
3 Experimental Details
3.1 Generate Analog CT
3.2 Image Registration
4 Experimental Results
4.1 Environment Configuration
4.2 A Subsection Sample
4.3 Evaluation of Results
5 Conclusion
References
Research on Quantitative Optimization Method Based on Incremental Optimization
1 Introduction
2 Related Work
3 Method
3.1 Problem Formulation
3.2 Progressive Optimization Mixed Precision Quantization
3.3 Model Structure
4 Experiment
4.1 Experimental Setup
4.2 CIFAR-100
4.3 ImageNet
5 Conclusion
References
An Improved Waste Detection and Classification Model Based on YOLOV5
1 Introduction
2 Related Research
2.1 Deep Learning
2.2 Object Detection
3 Algorithm Design
3.1 YOLOV5
3.2 ConvNeXt Block
3.3 Ghost Conv
4 Experiments and Analysis of Results
4.1 Datasets and Preprocessing
4.2 Metrics
4.3 Result
5 Conclusion
References
An Image Compression Method Based on Compressive Sensing and Convolution Neural Network for Massive Imaging Flow Cytometry Data
1 Introduction
2 Related Works
2.1 Compressive Sensing
2.2 Convolutional Neural Network
3 Image Compression Based on Compressive Sensing and CNN
3.1 Data Compression
3.2 Image Reconstruction
4 Experimental Results
4.1 Dataset
4.2 Experimental Setup
4.3 Performance Evaluation Index
4.4 Image Reconstruction Result
5 Conclusion
References
Intelligent Computing and Optimization
Optimization Improvement and Clustering Application Based on Moth-Flame Algorithm
1 Introduction
2 Basic Moth-Flame Optimization Algorithm
2.1 Position Update of Moths
2.2 Flame Adaptive Mechanism
2.3 Algorithmic Steps
3 Moth-Flame Optimization Algorithm Based on Grey Wolf Algorithm and Scaling Factor
3.1 Combined Grey Wolf Algorithm
3.2 Introduce Scaling Factor
3.3 Time Complexity of the Algorithm
4 Simulation Experiment and Its Result Analysis
4.1 Experimental Environment and Parameter Settings
4.2 Test Functions
4.3 Experimental Results and Analysis
5 Application in Clustering Problem
5.1 Algorithm Application Performance Test
6 Conclusion
References
Application of Improved Fruit Fly Optimization Algorithm in Three Bar Truss
1 Introduction
2 Preparations
3 A Improved Fruit Fly Optimization Algorithm
3.1 Exponential Growth Step
3.2 Logarithmic Optimization
3.3 Disturbance Coefficient
3.4 IFOA Algorithm
4 Simulation Experiment and Result Analysis
4.1 Experimental Design
4.2 Experimental Evaluation and Criteria
4.3 Experimental Results and Analysis
5 Application of IFOA in Structural Optimization Design
6 Conclusion
References
Adaptive Clustering by Fast Search and Find of Density Peaks
1 Introduction
2 Clustering by Fast Search and Find of Density Peaks
3 Adaptive Clustering by Fast Search and Find of Density Peaks
4 Experiments and Results
5 Conclusion and Future Work
References
A “Push-Pull” Workshop Logistics Distribution Under Single Piece and Small-Lot Production Mode
1 Introduction
2 Related Work
3 Problem Analysis
3.1 Problem Description
3.2 Design Thought
4 “Push-Pull” Workshop Logistics Distribution Model
4.1 Design Principle
4.2 Symbolic Representation
4.3 Calculation Process
5 Case Verification
5.1 Case Workshop and Verification Case Design Scheme
5.2 Analysis of Operation Results
6 Conclusion
References
Greedy Squirrel Search Algorithm for Large-Scale Traveling Salesman Problems
1 Introduction
2 The Basic Squirrel Search Algorithms
2.1 Foraging Behavior
3 Greedy Squirrels Search Algorithm for TSP
3.1 Description of TSP
3.2 The Framework of GSSA
3.3 Greedy Initialize
3.4 Greedy Crossover
3.5 Local Mutation Strategy
4 Experimental Studies
4.1 The Best Proportion of Initialized Individuals
4.2 Comparison of SSA and Improved Operator
4.3 Comparing with Latest Research
5 Conclusions
References
Multiple Populations-Based Whale Optimization Algorithm for Solving Multicarrier NOMA Power Allocation Strategy Problem
1 Introduction
2 The Basic WOA Algorithms
2.1 Encircling Prey
2.2 Bubble-Net Attacking Method (Exploitation Phase)
2.3 Search for Prey (Exploration Phase)
3 The Proposed FWOA
3.1 Multiple Populations
3.2 Weight Parameter
3.3 Improved Action Population Exploitation Mechanism
3.4 FWOA Framework
4 Simulations and Comparisons
4.1 Multicarrier NOMA Power Allocation Strategy Problem
4.2 Mathematical Model
4.3 Experimental Setting
4.4 Result Analysis
5 Conclusions
References
Complex-Valued Crow Search Algorithm for 0–1 KP Problem
1 Introduction
2 Crow Search Algorithm
3 Complex-Valued Crow Search Algorithm
3.1 Initialize the Complex-Valued Encoding Population
3.2 The Updating Method of CCSA
3.3 Fitness Function Value Calculation
4 CCSA Algorithm for Solving 0–1 KP Problem
4.1 Discretization Processing Method
4.2 The Algorithm Flowchart of CPBA
5 Simulation Experiments and Results Analysis
5.1 Low-Dimensional 0–1 KP
5.2 Medium-Dimensional 0–1 KP
5.3 High-Dimensional 0–1 KP
6 Conclusions
References
Discrete Artificial Electric Field Optimization Algorithm for Graph Coloring Problem
1 Introduction
2 Discrete Artificial Electric Field Optimization Algorithm
2.1 Discrete Position Representation
2.2 Fitness Function
2.3 Charged Particle Velocity Representation
2.4 Location Update
2.5 Local Search Operator
2.6 The Exchange Operator
3 Simulation Experiment and Result Analysis
3.1 Comparison of Each Algorithm Performance
3.2 Performance Verification of Real Map Coloring Problem
4 Conclusions
References
Automatic Shape Matching Using Improved Whale Optimization Algorithm with Atomic Potential Function
1 Introduction
2 Related Work
2.1 APM Model
2.2 Generating Potential Field
2.3 Edge Map Extraction Fitness
2.4 Geometric Transformation
2.5 Measure of Match Similarity
2.6 Search for Optimal Transformation
3 Whale Optimization Algorithm (WOA)
3.1 Encircling Prey
3.2 Special Bubble-Net Feeding Strategy
4 Our Proposed Improved WOA
5 IWOA with APM for Shape Matching
6 Simulation Experiment and Results Analysis
6.1 Parameter Setup
6.2 Experiment Results
7 Conclusions
References
Correction to: Bagging-AdaTSK: An Ensemble Fuzzy Classifier for High-Dimensional Data
Correction to: Chapter “Bagging-AdaTSK: An Ensemble Fuzzy Classifier for High-Dimensional Data” in: D.-S. Huang et al. (Eds.): Intelligent Computing Methodologies, LNAI 13395, https://doi.org/10.1007/978-3-031-13832-4_3
Author Index


📜 SIMILAR VOLUMES


Intelligent Computing Theories and Appli
✍ De-Shuang Huang (editor), Kang-Hyun Jo (editor), Junfeng Jing (editor), Prashan 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volum

Intelligent Computing Theories and Appli
✍ De-Shuang Huang (editor), Kang-Hyun Jo (editor), Junfeng Jing (editor), Prashan 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volum

Intelligent Computing Methodologies: 14t
✍ De-Shuang Huang (editor), M. Michael Gromiha (editor), Kyungsook Han (editor), A 📂 Library 📅 2018 🏛 Springer 🌐 English

<span><br>This book constitutes - in conjunction with the two-volume set LNCS 10954 and LNCS 10955 - the refereed proceedings of the 14th International Conference on Intelligent Computing, ICIC 2018, held in Wuhan, China, in August 2018. The 275 full papers and 72 short papers of the three proceedin

Intelligent Computing Theories and Appli
✍ De-Shuang Huang (editor), Kang-Hyun Jo (editor), Jianqiang Li (editor), Valeriya 📂 Library 📅 2021 🏛 Springer 🌐 English

This two-volume set of LNCS 12836 and LNCS 12837 constitutes - in conjunction with the volume LNAI 12838 - the refereed proceedings of the 17th International Conference on Intelligent Computing, ICIC 2021, held in Shenzhen, China in August 2021. The 192 full papers of the three proceedings volumes w

Intelligent Computing Theories and Appli
✍ De-Shuang Huang (editor), Kang-Hyun Jo (editor), Jianqiang Li (editor), Valeriya 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This two-volume set of LNCS 12836 and LNCS 12837 constitutes - in conjunction with the volume LNAI 12838 - the refereed proceedings of the 17th International Conference on Intelligent Computing, ICIC 2021, held in Shenzhen, China in August 2021. The 192 full papers of the three proceedings vol

Advances in Swarm Intelligence: 13th Int
✍ Ying Tan (editor), Yuhui Shi (editor), Ben Niu (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This two-volume set LNCS 13344 and 13345 constitutes the proceedings of the 13</span><span><sup>th</sup></span><span> International Conference on Advances in Swarm Intelligence, ICSI 2022, which took place in Xi’an, China, in July 2022. The theme of this year’s conference was “Serving Life