Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Presents recent research in Genetic and Evolutionary Computing Proceedings of the 8th International Conference on Genetic and Evolutionary Computing ICGEC 2014 held in, Nanchang China, October 18-20, 2014 Written by experts in the field This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at ICGEC 2014, the 8th International Conference on Genetic and Evolutionary Computing. The conference this year was technically co-sponsored by Nanchang Institute of Technology in China, Kaohsiung University of Applied Science in Taiwan, and VSB-Technical University of Ostrava. ICGEC 2014 is held from 18-20 October 2014 in Nanchang, China. Nanchang is one of is the capital of Jiangxi Province in southeastern China, located in the north-central portion of the province. As it is bounded on the west by the Jiuling Mountains, and on the east by Poyang Lake, it is famous for its scenery, rich history and cultural sites. Because of its central location relative to the Yangtze and Pearl River Delta regions, it is a major railroad hub in Southern China. The conference is intended as an international forum for the researchers and professionals in all areas of genetic and evolutionary computing. Content Level » Research Keywords » Computational Intelligence - Evolutionary Computing - Genetic Computing - ICGEC 2014 - Intelligent Systems Related subjects » Artificial Intelligence - Computational Intelligence and Complexity

Author(s): Hui Sun, Ching-Yu Yang, Chun-Wei Lin, Jeng-Shyang Pan, Vaclav Snasel, Ajith Abraham
Series: Advances in Intelligent Systems and Computing + 329
Edition: 2015
Publisher: Springer
Year: 2014

Language: English
Pages: C, XVI, 428

Part I: Nature Inspired Constrained Optimization
Artificial Bee Colony Using Opposition-Based Learning
1 Introduction
2 ABC Algorithm
3 Artificial Bee Colony Using Opposition-Based Learning
4 Experimental Verifications
5 Conclusions
References
Theorem of Existence and Uniqueness of Fixed Points of Monotone Operators
1 Introduction and Definition
2 Main Conclusions
References
Adaptive Sampling Detection Based Immune Optimization Approach and Its Application to Chance Constrained Programming
1 Introduction
2 Problem Statement and Preliminaries
3 Adaptive Sampling Detection for Chance Constraints
4 Algorithm Formulation and Design
5 Numerical Experiments
6 Conclusions
References
Characteristic Analysis and Management of Human Resource in EPC Project
1 Introduction
2 The Characteristics of Human Resource in EPC Mode
3 Management towards Different Characteristics in HR
4 Conclusion
References
Hybrid Particle Swarm Optimization with Bat Algorithm
1 Introduction
2 Related Work
3 The Proposed Hybrid PSO with BA
4 Experimental Results
5 Conclusion
References
Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing
1 Introduction
2 Related Work
3 Our Proposed Method
4 Experimental Results and Analysis
5 Conclusion
References
Command Center Operation Miss Root Cause Analysis
1 Introduction
2 Root Cause Analysis
3 Consider Alternative Solutions While Building Consensus
4 Develop Consensus and Test Ideas for Effectiveness
5 Conclusion
References
Part II: Recent Advances on Evolutionary OptimizationTechnologies
A New Cat Swarm Optimization with Adaptive Parameter Control
1 Introduction
2 Cat Swarm Optimization
3 Parameter Analysis of
4 Proposed Approach
5 Simulation Results
6 Conclusion
References
Multi-objective Nondominated Sorting Invasive Weed Optimization Algorithm for the Permanent Magnet Brushless Direct Current Motor Design
1 Introduction
2 Multi-objective Nondominated Sorting Invasive Weed Optimization
3 PMBLDC Motor Design Using NSIWO
4 Results
5 Conclusions
References
An Evolutionary Approach to Tower of Hanoi Problem
1 Introduction
2 Proposed Method
3 Evolutionary Algorithm
4 Experimental Results
5 Conclusion
References
Multipopulational Metaheuristic Approaches to Real-Parameter Optimization
1 Introduction
2 Parallel Metaheuristics
3 Metaheuristic Algorithms for Real-Parameter Optimization
4 Experiments
5 Conclusions
References
Evolved Bat Algorithm for Solving the Economic Load Dispatch Problem
1 Introduction
2 Economic Load Dispatch Problem
3 Meta-heuristic Evolved Bat-Inspired Algorithm
4 Proposed EBA for Solving the Economic Dispatch Problem
5 Experimental Results
6 Conclusion
References
A Simple and Accurate Global Optimizer for Continuous Spaces Optimization
1 Introduction
2 The Ebb-Tide-Fish Algorithm
3 Benchmark Function for Optimization
4 Simulation Results of the Proposed Algorithm
5 Conclusion and Future Work
References
Spatial Evolutionary Algorithm for Large-Scale Groundwater Management
1 Introduction
2 Spatial Evolutionary Algorithm (SEA)
3 Illustration Example
4 Discussion and Conclusions
References
Part III:Wearable Computing and Intelligent Data Hiding
Block-Based Colour Image Steganography Using Smart Pixel-Adjustment
1 Introduction
2 The Proposed Method
3 Experimental Results
4 Conclusion
References
A Sport Recognition Method with Utilizing Less Motion Sensors
1 Introduction
2 System Architecture
3 Proposed Methods
4 Experimental Results
5 Conclusions
References
Information Hiding Based on Binary Encoding Methods and Linear Transformation Scrambling Techniques
1 Introduction
2 Linear Transformation Scrambling Techniques for Encoding Images
3 Binary Encoding Methods for Hiding Linear- Transformation-Scrambled Matrices
4 Simulations
5 Discussions
6 Conclusions
References
Dispersed Data Hiding Using Hamming Code with Recovery Capability
1 Introduction
2 Dispersed Data Hiding Using Hamming Code
3 Experimental Result
4 Conclusion
References
16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction Mechanism
1 Introduction
2 Related Works
3 Proposed Method
4 Experimental Results
5 Conclusion
References
A Quality Improving Scheme for VQ Decompressed Image Based on DCT
1 Introduction
2 Related Works
3 ProposedMethod
4 Experiment Results
5 Conclusion
References
Research of Image Enhancement Algorithm Based on Multi-scale Retinex
1 Introduction
2 Algorithm Research
2.2
3 Experiment and Discussion
4 Conclusion
References
The HRV Analysis on e-Book Reading
1 Introduction
2 Experimental Design
3 Data Analysis
4 Discussion
5 Conclusion
References
Part IV: Image Processing and Intelligent Applications
Modified Choice Function Heuristic Selection for the Multidimensional Knapsack Problem
1 Introduction
2 Selection Hyper-Heuristics and
Heuristic Selection
3 The Multidimensional Knapsack Problem
4 Experimental Framework and Parameters
5 Computational Results
6 Conclusions
References
A Distributed Computational Model of State of Consciousness
1 Introduction
2 Related Work
3 Model of Consciousness and State Dynamics
4 Experimental Evaluation
5 Conclusion
References
Rotation Invariant Texture Classification Using Principal Direction Estimation
1 Introduction
2 Backgrounds
3 The Proposed Patch_Orientation Method
4 Experimental Results
5 Conclusion
References
An Improved Spatial Histogram and Particle Filter Face Tracking
1 Introduction
2 Similarity Measure Method of a Non-uniform Spatial Histogram
3 Particle Filter
4 Face Tracking Method Based on Improved Spatial Histogram and Particle Filter
5 Experimental Analysis
6 Conclusions
References
Joint Encoding of Multi-scale LBP for Infrared Face Recognition
1 Introduction
2 Local Binary Patterns Representation
3 Joint Encoding of Multi-scale LBP Representation
4 Infrared Face Recognition Method
5 Experimental Results
6 Conclusions
References
Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost
1 Introduction
2 AdaBoost Basic Principle
3 Driving Behavior Analysis System
4 Experimental Results and Analysis
5 Conclusion
References
The Study and Application of IT Projects Management and Control Model for Enterprise Group
1 Introduction
2 The Circumstance of Application of CMMI
3 PRINCE2 Project Management Methodology
4 PRINCE2 & CMMI ‘s Projects of Group Control Model
5 Conclusion
References
Part V: Intelligent Multimedia Tools and Applications
A Data Hiding Method for Image Retargeting
1 Introduction
2 Background Knowledge
3 Proposed Method
4 Experimental Results
5 Conclusion and Remark
References
Rendering 3D Solid Model
1 Introduction
2 The Proposed Method
3 Experimental Results
Greedy Active Contour Detection for Median Nerve on Strain Sonographic Images
1 Introduction
2 The Proposed Contour Detection Model
3 Experiment Result
4 Discussion and Conclusion
References
One Decomposition Method of Concept Lattice
1 Introduction
2 Preliminary
3 The Decomposition Method of Concept Lattice
4 Example
5 Conclusion
References
The Evaluation Method for Enterprise Group Information Planning and Implementation Based on PDCA Cycle
1 Introduction
2 The Current Evaluation Method
3 Introduction of EIP Model
4 Comprehensive Evaluation Indicators
5 Experimental Results
6 Summary
References
A New Look into Web Page Ranking Systems
1 Introduction
2 Briefly about Web Page Ranking System
3 Analogies between Web Page Rank Queueing Theory and Water Storage Systems
4 Some Simulated Results
5 Conclusions
References
Seismic Qualification of Telecommunication System in Nuclear Power Plant
1 Introduction
2 Test Specimen
3 Test Method
4 Acceptance Criteria
5 Conclusion
References
Part VI: Technologies for Next-Generation NetworkEnvironments
A Virtual Network Guard System Based on Cloud Computing Environments
1 Introduction
2 Background
3 Attack Model
4 Design Architecture
5 Performance Analysis
6 Conclusion
References
Towards SQL Injection Attacks Detection Mechanism Using Parse Tree
1 Introduction
2 The Proposed Mechanism
3 Experimental Results
4 Conclusion
References
No-Reference Image Quality Assessment in Spatial Domain
1 Introduction
2 The Proposed Method
3 Experiments
4 Conclusion
References
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things
1 Introduction
2 Related Work
3 Cyber Physical Adaptive Security Framework for IoT
4 Simulation and Analysis
5 Conclusion
References
Accurate Recommendation Based on Opinion Mining
1 Introduction
2 Related Works
3 Methodology
4 Conclusions and Future Work
References
Reliability Analysis on Parallel System with N Element Obeying Exponential Distribution
1 Introduction
2 Model Analysis
3 Conclussion
References
The Research of Private Network Secure Interconnection Scheme in Large-Scaled Enterprises
1 Introduction
2 Example for Private Network
3 General Scheme Design
4 Conclusion
References
Author Index