We propose a computing model in which individuals can automatically adjust their interaction intensity with their mentor according to the learning effect.This model is designed to investigate the cooperative dynamics ...We propose a computing model in which individuals can automatically adjust their interaction intensity with their mentor according to the learning effect.This model is designed to investigate the cooperative dynamics of the spatial prisoner's dilemma.More specifically,when the cumulative payoff of a learner is more than his reference earning,he will strengthen his interaction with his mentor;otherwise,he will reduce it.The experimental results indicate that this mechanism can improve the emergence of cooperation in a networked population and that the driving coefficient of interaction intensity plays an important role in promoting cooperation.Interestingly,under a certain social dilemma condition,there exists a minimal driving coefficient that leads to optimal cooperation.This occurs due to a positive feedback effect between the individual's satisfaction frequency and the number of effective neighbors.Moreover,we find that the experimental results are in accord with theoretical predictions obtained from an extension of the classical pair-approximation method.Our conclusions obtained by considering relationships with mentors can provide a new perspective for future investigations into the dynamics of evolutionary games within structured populations.展开更多
Based on the analysis of the characteristics of synthetic aperture radar (SAR) images, a new edge detection method is proposed. The wedgelet transform is introduced into the area of SAR image speckle reduction for i...Based on the analysis of the characteristics of synthetic aperture radar (SAR) images, a new edge detection method is proposed. The wedgelet transform is introduced into the area of SAR image speckle reduction for it can provide a nearly optimal representation for images in the horizon class. The wedgelet filter has good ability in keeping edge and speckle reduction. Then, a ratio edge detector is applied after a process of speckle reduction. The experimental results show that the method outperforms substantially others visually.展开更多
The degradation of AlGaN/GaN high electron mobility transistors (HEMTs) has a close relationship with a model of traps in AlGaN barriers as a result of high electric field. We mainly discuss the impacts of strong el...The degradation of AlGaN/GaN high electron mobility transistors (HEMTs) has a close relationship with a model of traps in AlGaN barriers as a result of high electric field. We mainly discuss the impacts of strong electrical field on the AlGaN barrier thickness of AlGaN/GaN HEMTs. It is found that the device with a thin AlGaN barrier layer is more easily degraded. We study the degradation of four parameters, i.e. the gate series resistance RGate, channel resistance R channel, gate current IG,off at VGS=-5 and VDS=0.1 V, and drain current ID,max at VGS=2 and VDS=5 V. In addition, the degradation mechanisms of the device electrical parameters are also investigated in detail.展开更多
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica...In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.展开更多
In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable univer...In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.展开更多
This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstr...This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstracts four elements, namely, antigen, antibody, reaction rules among antibodies, and driving algorithm describing how the rules are applied to antibodies, to simulate the process of immune response. Some reaction rules including clonal selection rules, immunological memory rules and immune regulation rules are introduced. Using the theorem of Markov chain, it is proofed that the new model is convergent. The experimental study on the optimal approximation of a stable linear system and an unstable one show that the approximate models searched by the new model have better performance indices than those obtained by some existing algorithms including the differential evolution algorithm and the multi-agent genetic algorithm.展开更多
A directional filter algorithm for intensity synthetic aperture radar (SAR) image based on nonsubsampled contourlet transform (NSCT) and immune clonal selection (ICS) is presented. The proposed filter mainly foc...A directional filter algorithm for intensity synthetic aperture radar (SAR) image based on nonsubsampled contourlet transform (NSCT) and immune clonal selection (ICS) is presented. The proposed filter mainly focuses on exploiting different features of edges and noises by NSCT. Furthermore, ICS strategy is introduced to optimize threshold parameter and amplify parameter adaptively. Numerical experiments on real SAR images show that there are improvements in both visual effects and objective indexes.展开更多
A novel image retrieval approach based on color features and anisotropic directional information is proposed for content based image retrieval systems (CBIR). The color feature is described by the color histogram ...A novel image retrieval approach based on color features and anisotropic directional information is proposed for content based image retrieval systems (CBIR). The color feature is described by the color histogram (CH), which is translation and rotation invariant. However, the CH does not contain spatial information which is very important for the image retrieval. To overcome this shortcoming, the subband energy of the lifting directionlet transform (L-DT) is proposed to describe the directional information, in which L-DT is characterized by multi-direction and anisotropic basis functions compared with the wavelet transform. A global similarity measure is designed to implement the fusion of both color feature and anisotropic directionality for the retrieval process. The retrieval experiments using a set of COREL images demonstrate that the higher query precision and better visual effect can be achieved.展开更多
Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel repre...Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel representation, qubit antibodies in the antibody population are updated by applying a new chaos update strategy. A quantitative metric is used for testing the convergence to the Pareto-optimal front. Simulation results on the 0/1 knapsack problems show that the new algorithm, in most cases, is more effective.展开更多
The three-dimensional sensor networks are supposed to be deployed for many applications. So it is signifi-cant to do research on the problems of coverage and target detection in three-dimensional sensor networks. In t...The three-dimensional sensor networks are supposed to be deployed for many applications. So it is signifi-cant to do research on the problems of coverage and target detection in three-dimensional sensor networks. In this paper, we introduced Clifford algebra in 3D Euclidean space, developed the coverage model of 3D sensor networks based on Clifford algebra, and proposed a method for detecting target moving. With Clif-ford Spinor, calculating the target moving formulation is easier than traditional methods in sensor node’s coverage area.展开更多
The performance of the classical clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, clustering method with...The performance of the classical clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, clustering method with Projection Pursuit dimension reduction based on Immune Clonal Selection Algorithm (ICSA-PP) is proposed in this paper. Projection pursuit strategy can maintain consistent Euclidean distances between points in the low-dimensional embeddings where the ICSA is used to search optimizing projection direction. The proposed algorithm can converge quickly with less iteration to reduce dimension of some high-dimensional datasets, and in which space, K-mean clustering algorithm is used to partition the reduced data. The experiment results on UCI data show that the presented method can search quicker to optimize projection direction than Genetic Algorithm (GA) and it has better clustering results compared with traditional linear dimension reduction method for Principle Component Analysis (PCA).展开更多
The problem of high similarity in homework has troubled teachers with time. Previous plagiarism detection systems are mainly realized by string matching which has a limitation, i.e., image homework cannot be detected....The problem of high similarity in homework has troubled teachers with time. Previous plagiarism detection systems are mainly realized by string matching which has a limitation, i.e., image homework cannot be detected. To this issue, we propose a new method of plagiarism detection in homework. First,we get fingerprint features of image homework by converting text homework into images. Then, we use image hashing algorithm and hamming distance to calculate the similarity of these features. Finally, we perform the empirical study on course of Computer Network Experiment, the test shows that our method not only reliably keeps the detection speedily, but also consistently ensures precision and false positive rate.展开更多
Numerous studies have confirmed that electromagnetic disturbances before earthquakes can be observed by satellites.In this study,we use the C-value method that includes the acoustic whistle signature;pre-seismic ionos...Numerous studies have confirmed that electromagnetic disturbances before earthquakes can be observed by satellites.In this study,we use the C-value method that includes the acoustic whistle signature;pre-seismic ionospheric electromagnetic disturbance signals were acquired based on the CSES-01 satellite electric field data,and the maximum value of C in the earthquake preparation zones increased continuously from 2.0 three days before the earthquake and reached a maximum weight of 3.0 on the day of the earthquake,after the earthquake,it gradually decreased and recovered to about 2.0;its the C values fluctuated between-2 and 3,it is different from the C values range-2–12 of the previous seismic case study using the DEMETER satellite,which may be related to the orbital altitude and revisit period of the satellite.Then,the C values were normalized,and the time series analysis of the obtained θ values were done,and the results showed that:In the pregnant zone,the background variation of the disturbance amplitude θ is within 2σ,and the maximum disturbance amplitude of θ starts to increase gradually from the seventh period(one period of 5 days,i.e.,35–39 days before the earthquake),it reached 2σ by the fourth preseismic cycle(20–24 days before the earthquake),and then dropped sharply to about 1.5σ in the third pre-seismic cycle(15–19days before the earthquake),after two cycles of increase,the θ over the epicenter reached a maximum of 2.1σ at the time of the earthquake(combining the time of the earthquake and the satellite flight characteristics,the epicenter period is defined as January25-January 29,2020,and this defines the study time period line),and the θ decreases to within 2 times the standard range after the earthquake;The negative value of the disturbance amplitude θ in the central region of the pregnant seismic zone during the earthquake shows the transient energy release process.Through comparison,the θ values obtained by normalization based on the C-value method takes into account the variation of the background field,and the result can better reflect the energy change of the ionospheric field before the earthquakes.展开更多
With the advent of the information age, it will be more troublesome to search for a lot of relevant knowledge to find the information you need. Text reasoning is a very basic and important part of multi-hop question a...With the advent of the information age, it will be more troublesome to search for a lot of relevant knowledge to find the information you need. Text reasoning is a very basic and important part of multi-hop question and answer tasks. This paper aims to study the integrity, uniformity, and speed of computational intelligence inference data capabilities. That is why multi-hop reasoning came into being, but it is still in its infancy, that is, it is far from enough to conduct multi-hop question and answer questions, such as search breadth, process complexity, response speed, comprehensiveness of information, etc. This paper makes a text comparison between traditional information retrieval and computational intelligence through corpus relevancy and other computing methods. The study finds that in the face of multi-hop question and answer reasoning, the reasoning data that traditional retrieval methods lagged behind in intelligence are about 35% worse. It shows that computational intelligence would be more complete, unified, and faster than traditional retrieval methods. This paper also introduces the relevant points of text reasoning and describes the process of the multi-hop question answering system, as well as the subsequent discussions and expectations.展开更多
Entity resolution (ER) is the problem of identi- fying and grouping different manifestations of the same real world object. Algorithmic approaches have been developed where most tasks offer superior performance unde...Entity resolution (ER) is the problem of identi- fying and grouping different manifestations of the same real world object. Algorithmic approaches have been developed where most tasks offer superior performance under super- vised learning. However, the prohibitive cost of labeling training data is still a huge obstacle for detecting duplicate query records from online sources. Furthermore, the unique combinations of noisy data with missing elements make ER tasks more challenging. To address this, transfer learning has been adopted to adaptively share learned common structures of similarity scoring problems between multiple sources. Al- though such techniques reduce the labeling cost so that it is linear with respect to the number of sources, its random sam- piing strategy is not successful enough to handle the ordinary sample imbalance problem. In this paper, we present a novel multi-source active transfer learning framework to jointly select fewer data instances from all sources to train classi- fiers with constant precision/recall. The intuition behind our approach is to actively label the most informative samples while adaptively transferring collective knowledge between sources. In this way, the classifiers that are learned can be both label-economical and flexible even for imbalanced or quality diverse sources. We compare our method with the state-of-the-art approaches on real-word datasets. Our exper- imental results demonstrate that our active transfer learning algorithm can achieve impressive performance with far fewerlabeled samples for record matching with numerous and var- ied sources.展开更多
Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, Clonal Strategy Algorithm based on the Immune Memory (CSAIM), is proposed in...Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, Clonal Strategy Algorithm based on the Immune Memory (CSAIM), is proposed in this paper. The algorithm realizes the evolution of antibody population and the evolution of memory unit at the same time, and by using clonal selection operator, the global optimal computation can be combined with the local searching. According to antibody-antibody (Ab-Ab) affinity and antibody-antigen (Ab-Ag) affinity, the algorithm can allot adaptively the scales of memory unit and antibody population. It is proved theoretically that CSAIM is convergent with probability 1. And with the computer simulations of eight benchmark functions and one instance of traveling salesman problem (TSP), it is shown that CSAIM has strong abilities in having high convergence speed, enhancing the diversity of the population and avoiding the premature convergence to some extent.展开更多
Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its f...Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its fitness values of current dominated individuals are assigned as the values of a custom distance measure, termed as Ab-Ab affinity, between the dominated individuals and one of the nondominated individuals found so far. According to the values of Ab-Ab affinity, all dominated individuals (antibodies) are divided into two kinds, subdominant antibodies and cryptic antibodies. Moreover, local search only applies to the subdominant antibodies, while the cryptic antibodies are redundant and have no function during local search, but they can become subdominant (active) antibodies during the subsequent evolution. Furthermore, a new immune operation, clonal proliferation is provided to enhance local search. Using the clonal proliferation operation, IDCMA reproduces individuals and selects their improved maturated progenies after local search, so single individuals can exploit their surrounding space effectively and the newcomers yield a broader exploration of the search space. The performance comparison of IDCMA with MISA, NSGA-Ⅱ, SPEA, PAES, NSGA, VEGA, NPGA, and HLGA in solving six well-known multiobjective function optimization problems and nine multiobjective 0/1 knapsack problems shows that IDCMA has a good performance in converging to approximate Pareto-optimal fronts with a good distribution.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant No.61963013).
文摘We propose a computing model in which individuals can automatically adjust their interaction intensity with their mentor according to the learning effect.This model is designed to investigate the cooperative dynamics of the spatial prisoner's dilemma.More specifically,when the cumulative payoff of a learner is more than his reference earning,he will strengthen his interaction with his mentor;otherwise,he will reduce it.The experimental results indicate that this mechanism can improve the emergence of cooperation in a networked population and that the driving coefficient of interaction intensity plays an important role in promoting cooperation.Interestingly,under a certain social dilemma condition,there exists a minimal driving coefficient that leads to optimal cooperation.This occurs due to a positive feedback effect between the individual's satisfaction frequency and the number of effective neighbors.Moreover,we find that the experimental results are in accord with theoretical predictions obtained from an extension of the classical pair-approximation method.Our conclusions obtained by considering relationships with mentors can provide a new perspective for future investigations into the dynamics of evolutionary games within structured populations.
文摘Based on the analysis of the characteristics of synthetic aperture radar (SAR) images, a new edge detection method is proposed. The wedgelet transform is introduced into the area of SAR image speckle reduction for it can provide a nearly optimal representation for images in the horizon class. The wedgelet filter has good ability in keeping edge and speckle reduction. Then, a ratio edge detector is applied after a process of speckle reduction. The experimental results show that the method outperforms substantially others visually.
基金Supported by the National Natural Science Foundation of China under Grant No 60736033.
文摘The degradation of AlGaN/GaN high electron mobility transistors (HEMTs) has a close relationship with a model of traps in AlGaN barriers as a result of high electric field. We mainly discuss the impacts of strong electrical field on the AlGaN barrier thickness of AlGaN/GaN HEMTs. It is found that the device with a thin AlGaN barrier layer is more easily degraded. We study the degradation of four parameters, i.e. the gate series resistance RGate, channel resistance R channel, gate current IG,off at VGS=-5 and VDS=0.1 V, and drain current ID,max at VGS=2 and VDS=5 V. In addition, the degradation mechanisms of the device electrical parameters are also investigated in detail.
基金This paper is supported by National Natural Science Foundation (No. 60871093, 60872126) and National Defense Prediction Foundation (No. 9140C80002080C80), Guangdong Province Natural Science Foundation (No.8151806001000002)
基金the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534)Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX)。
文摘In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.
基金Project supported by the National Science Foundation of Sichuan Province (Grant No. 2022NSFSC0534)the Central Guidance on Local Science and Technology Development Fund of Sichuan Province (Grant No. 22ZYZYTS0064)+1 种基金the Chengdu Key Research and Development Support Program (Grant No. 2021-YF09-0016-GX)the Key Project of Sichuan Normal University (Grant No. XKZX-02)。
文摘In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.
基金supported by the National Natural Science Foundation of China(Grant Nos,60133010 and 60372045)the Graduate Innovation Fund of Xidian University(Grant No.05004),
文摘This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstracts four elements, namely, antigen, antibody, reaction rules among antibodies, and driving algorithm describing how the rules are applied to antibodies, to simulate the process of immune response. Some reaction rules including clonal selection rules, immunological memory rules and immune regulation rules are introduced. Using the theorem of Markov chain, it is proofed that the new model is convergent. The experimental study on the optimal approximation of a stable linear system and an unstable one show that the approximate models searched by the new model have better performance indices than those obtained by some existing algorithms including the differential evolution algorithm and the multi-agent genetic algorithm.
基金supported by National Natural Science Foundationof China (No. 60802061)Natural Science Research Item of the Education Department of Henan Province (No. 2008B510001)Innovation Scientists and Technicians Troop Construction Projects of Henan Province (No. 084100510012)
文摘A directional filter algorithm for intensity synthetic aperture radar (SAR) image based on nonsubsampled contourlet transform (NSCT) and immune clonal selection (ICS) is presented. The proposed filter mainly focuses on exploiting different features of edges and noises by NSCT. Furthermore, ICS strategy is introduced to optimize threshold parameter and amplify parameter adaptively. Numerical experiments on real SAR images show that there are improvements in both visual effects and objective indexes.
基金supported by the National High Technology Research and Development Program of China (863 Program) (2007AA12Z1362007AA12Z223)+2 种基金the National Basic Research Program of China (973Program) (2006CB705707)the National Natural Science Foundation of China (60672126, 60607010)the Program for Cheung Kong Scholars and Innovative Research Team in University (IRT0645)
文摘A novel image retrieval approach based on color features and anisotropic directional information is proposed for content based image retrieval systems (CBIR). The color feature is described by the color histogram (CH), which is translation and rotation invariant. However, the CH does not contain spatial information which is very important for the image retrieval. To overcome this shortcoming, the subband energy of the lifting directionlet transform (L-DT) is proposed to describe the directional information, in which L-DT is characterized by multi-direction and anisotropic basis functions compared with the wavelet transform. A global similarity measure is designed to implement the fusion of both color feature and anisotropic directionality for the retrieval process. The retrieval experiments using a set of COREL images demonstrate that the higher query precision and better visual effect can be achieved.
基金Supported by the National High Technology Research and Development Program of China under Grant No 2009AA12Z210, the China Postdoctoral Science Foundation under Grant Nos 20080431228, 20090451369 and 200801426, the Natural Science Foundation of Shaanxi Province under Grant No 2009JQ8015, the National Natural Science Foundation of China under Grant Nos 60703108, 60703107 and 60803098.
文摘Based on the concept and principles of quantum computing and the principle of the immune clonal selection, a new algorithm for multi-objective 0/1 knapsack problems is introduced. In the algorithm, for the novel representation, qubit antibodies in the antibody population are updated by applying a new chaos update strategy. A quantitative metric is used for testing the convergence to the Pareto-optimal front. Simulation results on the 0/1 knapsack problems show that the new algorithm, in most cases, is more effective.
文摘The three-dimensional sensor networks are supposed to be deployed for many applications. So it is signifi-cant to do research on the problems of coverage and target detection in three-dimensional sensor networks. In this paper, we introduced Clifford algebra in 3D Euclidean space, developed the coverage model of 3D sensor networks based on Clifford algebra, and proposed a method for detecting target moving. With Clif-ford Spinor, calculating the target moving formulation is easier than traditional methods in sensor node’s coverage area.
基金Supported by the National Natural Science Foundation of China (No. 61003198, 60703108, 60703109, 60702062,60803098)the National High Technology Development 863 Program of China (No. 2008AA01Z125, 2009AA12Z210)+1 种基金the China Postdoctoral Science Foundation funded project (No. 20090460093)the Provincial Natural Science Foundation of Shaanxi, China (No. 2009JQ8016)
文摘The performance of the classical clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, clustering method with Projection Pursuit dimension reduction based on Immune Clonal Selection Algorithm (ICSA-PP) is proposed in this paper. Projection pursuit strategy can maintain consistent Euclidean distances between points in the low-dimensional embeddings where the ICSA is used to search optimizing projection direction. The proposed algorithm can converge quickly with less iteration to reduce dimension of some high-dimensional datasets, and in which space, K-mean clustering algorithm is used to partition the reduced data. The experiment results on UCI data show that the presented method can search quicker to optimize projection direction than Genetic Algorithm (GA) and it has better clustering results compared with traditional linear dimension reduction method for Principle Component Analysis (PCA).
文摘The problem of high similarity in homework has troubled teachers with time. Previous plagiarism detection systems are mainly realized by string matching which has a limitation, i.e., image homework cannot be detected. To this issue, we propose a new method of plagiarism detection in homework. First,we get fingerprint features of image homework by converting text homework into images. Then, we use image hashing algorithm and hamming distance to calculate the similarity of these features. Finally, we perform the empirical study on course of Computer Network Experiment, the test shows that our method not only reliably keeps the detection speedily, but also consistently ensures precision and false positive rate.
基金supported by the National Natural Science Foundation of China (Grant No. 42104159)the APSCO Earthquake Project (Phase Ⅱ)+1 种基金ISSI-BJ International Team (Grant No. 2019-33)Dragon 5 Cooperation Proposal (Grant No. #59308)。
文摘Numerous studies have confirmed that electromagnetic disturbances before earthquakes can be observed by satellites.In this study,we use the C-value method that includes the acoustic whistle signature;pre-seismic ionospheric electromagnetic disturbance signals were acquired based on the CSES-01 satellite electric field data,and the maximum value of C in the earthquake preparation zones increased continuously from 2.0 three days before the earthquake and reached a maximum weight of 3.0 on the day of the earthquake,after the earthquake,it gradually decreased and recovered to about 2.0;its the C values fluctuated between-2 and 3,it is different from the C values range-2–12 of the previous seismic case study using the DEMETER satellite,which may be related to the orbital altitude and revisit period of the satellite.Then,the C values were normalized,and the time series analysis of the obtained θ values were done,and the results showed that:In the pregnant zone,the background variation of the disturbance amplitude θ is within 2σ,and the maximum disturbance amplitude of θ starts to increase gradually from the seventh period(one period of 5 days,i.e.,35–39 days before the earthquake),it reached 2σ by the fourth preseismic cycle(20–24 days before the earthquake),and then dropped sharply to about 1.5σ in the third pre-seismic cycle(15–19days before the earthquake),after two cycles of increase,the θ over the epicenter reached a maximum of 2.1σ at the time of the earthquake(combining the time of the earthquake and the satellite flight characteristics,the epicenter period is defined as January25-January 29,2020,and this defines the study time period line),and the θ decreases to within 2 times the standard range after the earthquake;The negative value of the disturbance amplitude θ in the central region of the pregnant seismic zone during the earthquake shows the transient energy release process.Through comparison,the θ values obtained by normalization based on the C-value method takes into account the variation of the background field,and the result can better reflect the energy change of the ionospheric field before the earthquakes.
文摘With the advent of the information age, it will be more troublesome to search for a lot of relevant knowledge to find the information you need. Text reasoning is a very basic and important part of multi-hop question and answer tasks. This paper aims to study the integrity, uniformity, and speed of computational intelligence inference data capabilities. That is why multi-hop reasoning came into being, but it is still in its infancy, that is, it is far from enough to conduct multi-hop question and answer questions, such as search breadth, process complexity, response speed, comprehensiveness of information, etc. This paper makes a text comparison between traditional information retrieval and computational intelligence through corpus relevancy and other computing methods. The study finds that in the face of multi-hop question and answer reasoning, the reasoning data that traditional retrieval methods lagged behind in intelligence are about 35% worse. It shows that computational intelligence would be more complete, unified, and faster than traditional retrieval methods. This paper also introduces the relevant points of text reasoning and describes the process of the multi-hop question answering system, as well as the subsequent discussions and expectations.
文摘Entity resolution (ER) is the problem of identi- fying and grouping different manifestations of the same real world object. Algorithmic approaches have been developed where most tasks offer superior performance under super- vised learning. However, the prohibitive cost of labeling training data is still a huge obstacle for detecting duplicate query records from online sources. Furthermore, the unique combinations of noisy data with missing elements make ER tasks more challenging. To address this, transfer learning has been adopted to adaptively share learned common structures of similarity scoring problems between multiple sources. Al- though such techniques reduce the labeling cost so that it is linear with respect to the number of sources, its random sam- piing strategy is not successful enough to handle the ordinary sample imbalance problem. In this paper, we present a novel multi-source active transfer learning framework to jointly select fewer data instances from all sources to train classi- fiers with constant precision/recall. The intuition behind our approach is to actively label the most informative samples while adaptively transferring collective knowledge between sources. In this way, the classifiers that are learned can be both label-economical and flexible even for imbalanced or quality diverse sources. We compare our method with the state-of-the-art approaches on real-word datasets. Our exper- imental results demonstrate that our active transfer learning algorithm can achieve impressive performance with far fewerlabeled samples for record matching with numerous and var- ied sources.
文摘Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, Clonal Strategy Algorithm based on the Immune Memory (CSAIM), is proposed in this paper. The algorithm realizes the evolution of antibody population and the evolution of memory unit at the same time, and by using clonal selection operator, the global optimal computation can be combined with the local searching. According to antibody-antibody (Ab-Ab) affinity and antibody-antigen (Ab-Ag) affinity, the algorithm can allot adaptively the scales of memory unit and antibody population. It is proved theoretically that CSAIM is convergent with probability 1. And with the computer simulations of eight benchmark functions and one instance of traveling salesman problem (TSP), it is shown that CSAIM has strong abilities in having high convergence speed, enhancing the diversity of the population and avoiding the premature convergence to some extent.
基金the National Natural Science Foundation of China(Grant Nos.60703107 and 60703108)the National High Technology Research and Development Program(863 Program) of China(Grant No.2006AA01Z107)+1 种基金the National Basic Research Program(973 Program) of China(Grant No.2006CB705700)the Program for Cheung Kong Scholars and Innovative Research Team in University(Grant No.IRT0645)
文摘Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its fitness values of current dominated individuals are assigned as the values of a custom distance measure, termed as Ab-Ab affinity, between the dominated individuals and one of the nondominated individuals found so far. According to the values of Ab-Ab affinity, all dominated individuals (antibodies) are divided into two kinds, subdominant antibodies and cryptic antibodies. Moreover, local search only applies to the subdominant antibodies, while the cryptic antibodies are redundant and have no function during local search, but they can become subdominant (active) antibodies during the subsequent evolution. Furthermore, a new immune operation, clonal proliferation is provided to enhance local search. Using the clonal proliferation operation, IDCMA reproduces individuals and selects their improved maturated progenies after local search, so single individuals can exploit their surrounding space effectively and the newcomers yield a broader exploration of the search space. The performance comparison of IDCMA with MISA, NSGA-Ⅱ, SPEA, PAES, NSGA, VEGA, NPGA, and HLGA in solving six well-known multiobjective function optimization problems and nine multiobjective 0/1 knapsack problems shows that IDCMA has a good performance in converging to approximate Pareto-optimal fronts with a good distribution.