14 results on '"Shoulin Yin"'
Search Results
2. A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network
- Author
-
Xiaowei Wang, Lin Teng, Jiachi Wang, Shoulin Yin, and Hang Li
- Subjects
Normalization (statistics) ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Intrusion detection system ,Convolutional neural network ,Constant false alarm rate ,Hardware and Architecture ,Feature (computer vision) ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Artificial intelligence ,Electrical and Electronic Engineering ,Representation (mathematics) ,business - Abstract
Network intrusion detection (NID) is an important method for network system administrators to detect various security holes. The performance of traditional NID methods can be affected when unknown or new attacks are detected. Compared with other machine learning methods, the intrusion detection method based on convolutional neural network (CNN) can significantly improve the accuracy of classification, but the convergence speed and generalization ability of CNN are not ideal in model training process resulting in a low true rate and a high false alarm rate. To solve the above problems, this paper proposes a deep multi-scale convolutional neural network (DMCNN) for network intrusion detection. Different levels of features in a large number of high-dimensional unlabeled original data are extracted by different scales convolution kernel. And the learning rate of network structure is optimized by batch normalization method to obtain the optimal feature representation of the raw data. We use NSL-KDD dataset as the benchmark thus we can compare the performance of our proposed method with other existing works. This dataset includes two testing sets which are the first one is KDDTest+ while the second one is $$\text {KDDTest}^{-21}$$ which is more difficult to be classified. The experimental results reveal that the AC and TPR are higher through our DMCNN model. Especially, in terms of DOS, the AC appropriately reaches to 98%. DMCNN has a high intrusion detection accuracy and a low false alarm rate, which overcomes the limitations of using the traditional detection methods and makes the new approach an attractive one for practical intrusion detection.
- Published
- 2020
3. Active contour modal based on density-oriented BIRCH clustering method for medical image segmentation
- Author
-
Desheng Liu, Hang Li, Shahid Karim, and Shoulin Yin
- Subjects
Active contour model ,Iterative and incremental development ,Computer Networks and Communications ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Image segmentation ,Hardware and Architecture ,Feature (computer vision) ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Segmentation ,Noise (video) ,Artificial intelligence ,business ,Cluster analysis ,Software - Abstract
Currently, medical image segmentation has attracted more attention from researchers, which can assist in medical diagnosis. However, in the process of traditional medical image segmentation, it is sensitive to the initial contour and noise, which is difficult to deal with the weak edge image, complex iterative process. In this paper, we propose a new medical image segmentation method, which adopts density-oriented BIRCH (balanced iterative reducing and clustering using hierarchies) clustering method to modify active contour model and improve the robustness of noise. The BIRCH is a multi-stage clustering method using clustering feature tree. The improved model can effectively deal with the gray non-uniformity of real medical images. And we also introduce a new energy function in active contour model to make the contour curve approach to the edge, and finally stay at the edge of the image to complete the object segmentation. Experimental results show that this new model can overcome the influence of complex background on medical image segmentation and improve the speed and accuracy of medical segmentation results.
- Published
- 2020
4. A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption
- Author
-
Xiaowei Wang, Shoulin Yin, Muhammad Shafiq, Asif Ali Laghari, Shahid Karim, Omar Cheikhrouhou, Wajdi Alhakami, and Habib Hamam
- Subjects
Nonlinear Sciences::Chaotic Dynamics ,Article Subject ,Computer Networks and Communications ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Information Systems ,Computer Science::Cryptography and Security - Abstract
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The chaotic system is characterized by randomness and ergodicity, which has advantages over traditional encryption algorithms in image encryption processing. A novel V-net convolutional neural network (CNN) based on four-dimensional hyperchaotic system for medical image encryption is presented in this study. Firstly, the plaintext medical images are processed into 4D hyperchaotic sequence images, including image segmentation, chaotic system processing, and pseudorandom sequence generation. Then, V-net CNN is used to train chaotic sequences to eliminate the periodicity of chaotic sequences. Finally, the chaotic sequence image is diffused to change the raw image pixel to realize the encryption processing. Simulation test analysis demonstrates that the proposed algorithm has better effect, robustness, and plaintext sensitivity.
- Published
- 2022
- Full Text
- View/download PDF
5. FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction
- Author
-
Lin Teng, Yulong Qiao, Muhammad Shafiq, Gautam Srivastava, Abdul Rehman Javed, Thippa Reddy Gadekallu, and Shoulin Yin
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2023
6. An improved particle swarm optimization algorithm used for BP neural network and multimedia course-ware evaluation
- Author
-
Tianhua Liu and Shoulin Yin
- Subjects
Mathematical optimization ,Multimedia ,Artificial neural network ,Computer Networks and Communications ,Computer science ,020209 energy ,Computer Science::Neural and Evolutionary Computation ,Process (computing) ,Particle swarm optimization ,02 engineering and technology ,computer.software_genre ,Course (navigation) ,Rate of convergence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Algorithm ,computer ,Software - Abstract
The original BP neural network has some disadvantages, such as slow convergence speed, low precision, which is easy to fall into local minimum value. So this paper proposes an improved particle swarm optimization (PSO) algorithm to optimize BP neural network. In this new algorithm, PSO uses improved adaptive acceleration factor and improved adaptive inertia weight to improve the initial weight value and threshold value of BP neural network. And we give the detailed improved process. At the end, simulation results show that the new algorithm can improve convergence rate and precision of prediction of BP neural network, which reduces the error of prediction. At the end, we use multimedia evaluation model to verify the new method’s performance.
- Published
- 2016
7. Region search based on hybrid convolutional neural network in optical remote sensing images
- Author
-
Shahid Karim, Ye Zhang, and Shoulin Yin
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Big data ,Real-time computing ,0211 other engineering and technologies ,General Engineering ,020206 networking & telecommunications ,02 engineering and technology ,Convolutional neural network ,lcsh:QA75.5-76.95 ,Remote sensing (archaeology) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Electronic computers. Computer science ,business ,021101 geological & geomatics engineering - Abstract
Currently, big data is a new and hot issue. Particularly, the rapid growth of the Internet of Things causes a sharp growth of data. Enormous amounts of networking sensors are continuously collecting and transmitting data to be stored and processed in the cloud, including remote sensing data, environmental data, and geographical data. And region is regarded as the very important object in remote sensing data, which is mainly researched in this article. Region search is a crucial task in remote sensing process, especially for military area and civilian fields. It is difficult to fast search region accurately and achieve generalizability of the regions’ features due to the complex background information, as well as the smaller size. Especially, when processing region search in large-scale remote sensing image, detailed information as the feature can be extracted in inner region. To overcome the above difficulty region search task, we propose an accurate and fast region search in optical remote sensing images under cloud computing environment, which is based on hybrid convolutional neural network. The proposed region search method partitioned into four processes. First, fully convolutional network is adopted to produce all the candidate regions that contain the possible object regions. This process avoids exhaustive search for input images. Then, the features of all candidate regions are extracted by a fast region-based convolutional neural network structure. Third, we design a new difficult sample mining method for the training process. At the end, in order to improve the region search precision, we use an iterative bounding box regression algorithm to normalize the detected bounding boxes, in which the regions contain candidate objects. The proposed algorithm is evaluated on optical remote sensing images acquired from Google Earth. Finally, we conduct the experiments, and the obtained results show that the proposed region search method constantly achieves better results regardless of the type of images tested. Compared with traditional region search methods, such as region-based convolutional neural network and newest feature extraction frameworks, our proposed methods show better robustness with complex context semantic information and backgrounds.
- Published
- 2019
8. Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter
- Author
-
Shoulin Yin, Hang Li, and Lin Teng
- Subjects
Scale (ratio) ,Computer Networks and Communications ,Computer science ,Mathematical analysis ,020206 networking & telecommunications ,02 engineering and technology ,Curvature ,Filter (video) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Dual tree ,Pyramid (image processing) ,Electrical and Electronic Engineering ,Image denoising - Published
- 2017
9. Distributed Searchable Asymmetric Encryption
- Author
-
Lin Teng, Jie Liu, and Shoulin Yin
- Subjects
Key Wrap ,Control and Optimization ,Plaintext-aware encryption ,Computer Networks and Communications ,Computer science ,Encryption ,computer.software_genre ,Computer security ,Disk encryption hardware ,Public-key cryptography ,Watermarking attack ,Multiple encryption ,Email encryption ,Filesystem-level encryption ,Ciphertext ,Electrical and Electronic Engineering ,business.industry ,Client-side encryption ,Disk encryption theory ,Deterministic encryption ,Disk encryption ,Hardware and Architecture ,Probabilistic encryption ,Signal Processing ,56-bit encryption ,Key (cryptography) ,40-bit encryption ,Keyfile ,Attribute-based encryption ,Link encryption ,On-the-fly encryption ,business ,computer ,Information Systems - Abstract
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria—Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security.
- Published
- 2016
10. Mutual Coupling Optimization of Compact Microstrip Array Antenna
- Author
-
Shoulin Yin, Jingrui Pei, and Lin Teng
- Subjects
Coupling ,Patch antenna ,Engineering ,Control and Optimization ,Computer Networks and Communications ,business.industry ,HFSS ,020209 energy ,020206 networking & telecommunications ,02 engineering and technology ,Microstrip array antenna ,Topology ,law.invention ,Antenna array ,Microstrip antenna ,Hardware and Architecture ,law ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Dipole antenna ,Electrical and Electronic Engineering ,Antenna (radio) ,business ,Information Systems - Abstract
In this paper, we perfect the mutual coupling of compact microstrip array antenna by designing a new defected ground structure. When the resonant frequency is 2.45GHz, array element spacing is 0.1 times of free space wavelength, we introduce new defected ground structure into antenna array. Then we use HFSS to make simulation and compare the changing of antenna's parameters before and after adding defected ground structure. The results demonstrate that the parameters representing mutual coupling in new model can reduce by 30dB, which effectively perfects the mutual coupling of compact microstrip array antenna.
- Published
- 2016
11. An Improved Chaos Electromagnetism Mechanism Algorithm for Path Optimization Problem
- Author
-
Jie Liu, Lin Teng, and Shoulin Yin
- Subjects
Mathematical optimization ,Control and Optimization ,Meta-optimization ,Optimization problem ,Computer Networks and Communications ,Chaotic ,Particle swarm optimization ,Hardware and Architecture ,Signal Processing ,Path (graph theory) ,Expectation–maximization algorithm ,Electrical and Electronic Engineering ,Difference-map algorithm ,Algorithm ,Information Systems ,FSA-Red Algorithm ,Mathematics - Abstract
As we all know, traditional electromagnetism mechanism (EM) algorithm has the disadvantage with low solution precision, lack of mining ability and easily falling into precocity. This paper proposes a new chaos electromagnetism mechanism algorithm combining chaotic mapping with limited storage Quasi-Newton Method (EM-CMLSQN). Its main idea is that it adopts limit quasi-Newton operator to replace the local optimization operator in EM algorithm for local searching in the late of algorithm. In the process of algorithm, the chaos mapping is introduced into optimization processes, and it generates new individuals to jump out of local to maintain the population diversity according to characteristics of chaos mapping random traversal. Finally, the experiments show that the new algorithm can effectively jump out of local optimal solution through comparing three continuous space test functions. The new algorithm has obvious advantages in terms of convergence speed compared to traditional EM algorithm, in addition, it is more accuracy than particle swarm optimization (PSO) algorithm. We compare the new chaos electromagnetism mechanism algorithm with ant colony optimization (ACO) algorithm, PSO algorithm, the results represent that new scheme can obtain the optimal path in the path optimization process, which shows that the new method has better applicability in the discrete domain problem.
- Published
- 2016
12. Improved UFIR Tracking Algorithm for Maneuvering Target
- Author
-
Jinfeng Wang, Tianhua Liu, and Shoulin Yin
- Subjects
0209 industrial biotechnology ,Noise power ,Engineering ,Control and Optimization ,Finite impulse response ,Computer Networks and Communications ,business.industry ,Process (computing) ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,Filter (signal processing) ,Kalman filter ,Tracking (particle physics) ,Noise ,020901 industrial engineering & automation ,Hardware and Architecture ,Control theory ,Motion estimation ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Algorithm ,Information Systems - Abstract
Maneuvering target tracking is a target motion estimation problem, which can describe the irregular target maneuvering motion. It has been widely used in the field of military and civilian applications. In the maneuvering target tracking, the performance of Kalman filter(KF) and its improved algorithms depend on the accuracy of process noise statistical properties. If there exists deviation between process noise model and the actual process, it will generate the phenomenon of estimation error increasing. Unbiased finite impulse response(UFIR) filter does not need priori knowledge of noise statistical properties in the filtering process. The existing UFIR filters have the problem that generalized noise power gain(GNPG) does not change with measurement of innovation. We propose an improved UFIR filter based on measurement of innovation with ratio dynamic adaptive adjustment at adjacent time. It perfects the maneuvering detect-ability. The simulation results show that the improved UFIR filter has the best filtering effect than KF when process noise is not accurate.
- Published
- 2016
13. A New Electrode Regulator System Identification of Arc Furnace Based on Time-Variant Nonlinear-Linear-Nonlinear Model
- Author
-
Shoulin Yin, Jinfeng Wang, and Xueying Wang
- Subjects
Engineering ,Control and Optimization ,Basis (linear algebra) ,Computer Networks and Communications ,business.industry ,System identification ,Regulator ,Process (computing) ,Arc (geometry) ,Nonlinear system ,Hardware and Architecture ,Control theory ,Signal Processing ,Electrode ,Electrical and Electronic Engineering ,business ,Information Systems ,Electric arc furnace - Abstract
In this paper, we express arc furnace electrode regulator system as a time-variant nonlinear-linear-nonlinear model. On this basis, we propose an online identification method based on nonlinear-linear-nonlinear model system. This new scheme solves the problem of model variation and prediction precision decline causing by time-varying of arc characteristic. In order to dispose the difficulty of parameters separation in the online identification process, this new method adopts the mind of update the parameters of linear parts and nonlinear parts respectively. It realizes the parameters separation of system effectively. Simulation results show that this method can track the changes of arc characteristics effectively. That it achieves the aim of real-time monitoring and controlling system parameters.
- Published
- 2016
14. An improved Mamdani Fuzzy Neural Networks Based on PSO Algorithm and New Parameter Optimization
- Author
-
Xinyuan Hu, Lei Meng, and Shoulin Yin
- Subjects
Mathematical optimization ,Control and Optimization ,Fuzzy rule ,Fuzzy clustering ,Fuzzy classification ,Neuro-fuzzy ,Computer Networks and Communications ,Computer Science::Neural and Evolutionary Computation ,020208 electrical & electronic engineering ,Particle swarm optimization ,02 engineering and technology ,ComputingMethodologies_PATTERNRECOGNITION ,Local optimum ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Fuzzy set operations ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Gradient descent ,Information Systems ,Mathematics - Abstract
As we all know, the parameter optimization of Mamdani model has a defect of easily falling into local optimum. To solve this problem, we propose a new algorithm by constructing Mamdani Fuzzy neural networks. This new scheme uses fuzzy clustering based on particle swarm optimization(PSO) algorithm to determine initial parameter of Mamdani Fuzzy neural networks. Then it adopts PSO algorithm to optimize model's parameters. At the end, we use gradient descent method to make a further optimization for parameters. Therefore, we can realize the automatic adjustment, modification and perfection under the fuzzy rule. The experimental results show that the new algorithm improves the approximation ability of Mamdani Fuzzy neural networks.
- Published
- 2016
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.