Search For:

Displaying 1-14 out of 14 total
Modelling and Prediction of the CNY Exchange Rate Using RBF Neural Network
Found in: Business Intelligence and Financial Engineering, International Conference on
By Zhaocheng Liu, Ziran Zheng, Xiyu Liu, Gongxi Wang
Issue Date:July 2009
pp. 38-41
The CNY exchange rates can be viewed as financial time series which are charactered by high uncertainty, nonlinearity and time-varying behavior. Predictions for exchange rates of GBP-CNY and USD-CNY were carried respectively by means of RBF neural network ...
 
A lattice based evolution scheme with applications to design optimization
Found in: International Conference on Computer Supported Cooperative Work in Design
By Xiyu Liu, Hong Liu
Issue Date:April 2009
pp. 728-733
Design optimization is a multi-modal and complex problem which can not be treated successfully in scalar optimizer, such as evolutionary techniques. For typical genetic algorithms, most generalizations and variations do not spread to vector valued fitness ...
 
A Stroke-Based Textual Password Authentication Scheme
Found in: Education Technology and Computer Science, International Workshop on
By Ziran Zheng, Xiyu Liu, Lizi Yin, Zhaocheng Liu
Issue Date:March 2009
pp. 90-95
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alterna...
 
Searching Nonlinear Systems by Multi-population Differential Evolution
Found in: International Conference on Natural Computation
By Xiyu Liu, Yanli Liu, Zongli Wang, Yan Meng
Issue Date:October 2008
pp. 356-361
Nonlinear problems are arising more and more often in searching for an approximate solution. One of these nonlinear problems is the boundary value problem. Most researches focus on the existence of positive solutions with the help of nonlinear analysis too...
 
A New CLARANS Algorithm Based on Particle Swarm Optimization
Found in: Computer and Information Technology, International Conference on
By Xiyu Liu, Hong Liu
Issue Date:September 2006
pp. 12
CLARANS is an efficient and effective clustering method especially in spatial data mining. It is applicable to locate objects with polygon shape. Inspired by its randomized searching nature, and based on the standard particle swarm optimization PSO) algori...
 
Generative Design Supported by Tree Based Genetic Algorithm
Found in: Computer and Information Technology, International Conference on
By Hong Liu, Xiyu Liu
Issue Date:September 2006
pp. 267
This paper presents a novel computational approach that uses tree based genarative algorithm to generate design. This approach is illustrated by a reading lamp design example, which uses general mathematical expressions and tree-based genetic algorithm to ...
 
A Binary Particle Swarm Optimization Based on Proportion Probability
Found in: Business Intelligence and Financial Engineering, International Conference on
By Enxiu Chen, Zhenliang Pan, Yi Sun, Xiyu Liu
Issue Date:August 2010
pp. 15-19
Particle swarm optimization (PSO), as a novel computational intelligence technique, has succeeded in many continuous problems. But in discrete or binary version there are still some difficulties. In this paper a novel binary PSO is proposed. This algorithm...
 
Prediction of Railway Passenger Traffic Volume Based on Neural Tree Model
Found in: Intelligent Computation Technology and Automation, International Conference on
By Feng Qi, Xiyu Liu, Yinghong Ma
Issue Date:October 2009
pp. 370-373
The railway passenger traffic volume(RPTV) forecast can offer scientific basis for the establishment of policy and making of transportation development plan. This paper applies the neural tree model for predicting the railway passenger traffic volume. The ...
 
Multi-colony Ant Algorithm Using Both Repulsive Operator and Pheromone Crossover Based on Multi-optimum for TSP
Found in: Business Intelligence and Financial Engineering, International Conference on
By Enxiu Chen, Xiyu Liu
Issue Date:July 2009
pp. 69-73
This paper presents a modified multi-colony ant algorithm, based upon a pheromone arithmetic crossover and a repulsive operator. Iteration of this algorithm can avoid some stagnating states of basic ant colony optimization. An important mechanism of this a...
 
A Revised Ant Clustering Algorithm with Obstacle Constraints
Found in: Computer Science and Information Engineering, World Congress on
By Jianhua Qu, Xiyu Liu
Issue Date:April 2009
pp. 679-683
Clustering of spatial data in the presence of obstacles has a wide application. It is an important research topic in the spatial data mining. This paper discusses the problem of spatial clustering with obstacles constraints and presents a revised method na...
 
Differential Evolutionary CLARANS on Manifold
Found in: Computer Science and Information Engineering, World Congress on
By Xiyu Liu, Yinghong Ma
Issue Date:April 2009
pp. 631-635
The purpose of this paper is to propose new clustering technique on manifolds. This is achieved mainly with the help of tangent spaces that are determined by manifold learning. We embed a new searching algorithm based on differential evolution (DE). We pre...
 
An Improved Multi-particle Swarm Co-evolution Algorithm
Found in: International Conference on Natural Computation
By Kun Yao, Feifei Li, Xiyu Liu
Issue Date:August 2007
pp. 58-62
Illumined by phenomenon of co-evolution in nature, particle swarm optimization is combined with co-evolution, in this paper, an improved multi-particle swarm co-evolution algorithm is presented. In the process of evolution, particles not only have to excha...
 
A Quick Ant Clustering Algorithm
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jianhua Qu, Xiyu Liu
Issue Date:August 2007
pp. 722-725
No summary available.
 
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Found in: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation (GEC '09)
By Fengming Liu, Mingchun Zheng, Wenyin Zhang, Xiyu Liu, Yongsheng Ding, Yu Liu
Issue Date:June 2009
pp. 70-73
With the application of peer-to-peer network, how to promote cooperation between peers has gotten more and more important. Most of traditional security technologies can not be applied in P2P network very well to promote the cooperation because of the speci...
     
 1