Table of Contents
|
Intelligent Information Processing IX Zhongzhi Shi, Eunika Mercier-Laurent, Jiuyong Li |
Front Matter |
Machine Learning
|
Public Opinion Clustering for Hot Event Based on BR-LDA Model Ningning Ni, Caili Guo, Zhimin Zeng |
3-11 |
Improved Ensemble Extreme Learning Machine Regression Algorithm Meiyi Li, Weibiao Cai, Xingwang Liu |
12-19 |
A K-AP Clustering Algorithm Based on Manifold Similarity Measure Hongjie Jia, Liangjun Wang, Heping Song, Qirong Mao, Shifei Ding |
20-29 |
Multi-view Restricted Boltzmann Machines with Posterior Consistency Ding Shifei, Zhang Nan, Zhang Jian |
30-39 |
Mass-Based Density Peaks Clustering Algorithm Ding Ling, Xu Xiao |
40-48 |
Deep Learning
|
Forward Learning Convolutional Neural Network Hong Hu, Xin Hong, Dan Hou, Zhongzhi Shi |
51-61 |
A Deep Learning Approach Based on CSP for EEG Analysis Wenchao Huang, Jinchuang Zhao, Wenli Fu |
62-70 |
Automatic Driving Decision Algorithm Based on Multi-dimensional Deep Space-Time Network Jianguo Zhang, Jianghua Yuan, Hanzhong Pan, Qing Ma, Yong Yu |
71-79 |
Tourist Attraction Recommendation Based on Knowledge Graph Phatpicha Yochum, Liang Chang, Tianlong Gu, Manli Zhu, Weitao Zhang |
80-85 |
Multi-agent System
|
Elite Opposition-Based Selfish Herd Optimizer Shengqi Jiang, Yongquan Zhou, Dengyun Wang, Sen Zhang |
89-98 |
The Effects of Fixed-Strategy Agents on Local Convention Emergence in Multi-agent Systems Tim Borglund, Shuyue Hu, Ho-Fung Leung |
99-108 |
A Multi-agent Framework that Facilitates Decoupled Agent Functioning Dave Russell, Elizabeth Ehlers |
109-119 |
Design and Implementation of Smart Home Cloud System Based on Kinect Xuebin Tang, Jinchuang Zhao, Wenbei Li, Bin Feng |
120-126 |
Neural Computing and Swarm Intelligence
|
Attribute Grid Computer Based on Qualitative Mapping for Artificial Intelligence Jiali Feng |
129-139 |
A Byproduct of a Differentiable Neural Network—Data Weighting from an Implicit Form to an Explicit Form Tongfeng Sun |
140-149 |
A Simplex Method-Based Salp Swarm Algorithm for Numerical and Engineering Optimization Dengyun Wang, Yongquan Zhou, Shengqi Jiang, Xin Liu |
150-159 |
Energy Conservation for Wireless Mesh Networks: A PSO Approach with Throughput-Energy Consumption Scheme Using Solar Energy Zhe Wang, Taoshen Li, Jin Ye, Zhihui Ge |
160-169 |
Natural Language Processing
|
Short Text Feature Extraction via Node Semantic Coupling and Graph Structures Huifang Ma, Xiaoqian Liu, Lan Ma, Yulin Hu |
173-182 |
PWA-PEM for Latent Tree Model and Hierarchical Topic Detection Zhuchen Liu, Hao Chen, Jie Li, Yanhua Yu |
183-191 |
Improved Louvain Method for Directed Networks Lei Li, Xiangchun He, Guanghui Yan |
192-203 |
A Detail Preserving Vector Median Filter Based on Texture Analysis Ying Pan, Shihui Wang |
204-209 |
Recommendation System
|
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu |
213-222 |
An Improved Recommender for Travel Itineraries Yajie Gu, Jing Zhou, Shouxun Liu |
223-235 |
Constrained Probabilistic Matrix Factorization with Neural Network for Recommendation System Guoyong Cai, Nannan Chen |
236-246 |
Cooperative Filtering Program Recommendation Algorithm Based on User Situations and Missing Values Estimation Jian Dong, Ruichun Tang, Geqiang Lian |
247-258 |
Social Computing
|
Towards a Modeling Framework of Social Contexts, Roles and Relations for Acquiring Role-Specific Rules Ya Wang, Zhenzhen Gu, Yuefei Sui, Cungen Cao |
261-273 |
Microblog Hot Event Detection Based on Restart Random Walk and Modularity Xiaohong Li, Jiheng Gong, Yuyin Ma, Huifang Ma, Na Qin |
274-283 |
Immersive Virtual Reality Utilizing Hand Gesture Capture as a Replacement for Traditional Controls James Gibson, Duncan Coulter |
284-293 |
Using System Dynamics for Predicting an Organization’s Procurement Performance M. Abolbashari, A. Zakeri, E. Chang |
294-299 |
Business Intelligence and Security
|
A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram Shaowei Zhang, Long Li, Liang Chang, Tianlong Gu, Huadong Liu |
303-310 |
KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment Youchang Xu, Ningjiang Chen, Ruwei Huang, Hanlin Zhang |
311-320 |
A Customer Segmentation Model Based on Affinity Propagation Algorithm and Improved Genetic K-Means Algorithm Meiyang Zhang, Zili Zhang, Shi Qiu |
321-327 |
Personal Credit Risk Assessment Based on Stacking Ensemble Model Maoguang Wang, Jiayu Yu, Zijian Ji |
328-333 |
Pattern Recognition
|
A Replay Speech Detection Algorithm Based on Sub-band Analysis Lang Lin, Rangding Wang, Yan Diqun |
337-345 |
Hybrid Pyramid U-Net Model for Brain Tumor Segmentation Xiangmao Kong, Guoxia Sun, Qiang Wu, Ju Liu, Fengming Lin |
346-355 |
Image Semantic Description Based on Deep Learning with Multi-attention Mechanisms Jian Yang, Zuqiang Meng |
356-362 |
Bayesian Linear Regression Model for Curve Fitting Michael Li |
363-372 |
Image Understanding
|
A Texture Synthesis Steganography Scheme Based on Super-Pixel Structure and SVM Weiyi Wei, Chengfeng A, Lizhao Wang, Huifang Ma |
375-383 |
The Design and Implementation of the Curved Road Radar Early-Warning System Jun Wen, Guoen Wei, Runfa Zhu |
384-393 |
Application of Skin Color Model in Image Segmentation Wei Wei, Tianyong Li, Jinfu Wei, Detian Zen, Weimin Ning |
394-401 |
Gait Recognition Based on EMG Information with Multiple Features Yueying Cao, Farong Gao, Liling Yu, Qingshan She |
402-411 |
A Web-Based Platform for Segmentation of Abdominal Organs on CT Images Xiaoxia Ning, Xuejun Zhang, Qianmei Yang |
412-420 |
An Insider Threat Detection Method Based on User Behavior Analysis Wei Jiang, Yuan Tian, Weixin Liu, Wenmao Liu |
421-429 |
Obstacle Detection and Tracking Based on Multi-sensor Fusion Shuyao Cui, Dianxi Shi, Chi Chen, Yaru Kang |
430-436 |
Non-uniform Noise Image Denoising Based on Non-local Means Jiaxin Li, Jing Hu, Min Wei, Bin Zhang, Yanfang Wang |
437-445 |