scispace - formally typeset
Search or ask a question
Author

Ying Chen

Bio: Ying Chen is an academic researcher from Nanchang Hangkong University. The author has contributed to research in topics: Iris recognition & Segmentation. The author has an hindex of 6, co-authored 26 publications receiving 297 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper develops a GWO variant enhanced with a covariance matrix adaptation evolution strategy (CMAES), levy flight mechanism, and orthogonal learning (OL) strategy named GWOCMALOL, which could reach higher classification accuracy and fewer feature selections than other optimization algorithms.
Abstract: This research’s genesis is in two aspects: first, a guaranteed solution for mitigating the grey wolf optimizer’s (GWO) defect and deficiencies. Second, we provide new open-minding insights and deep views about metaheuristic algorithms. The population-based GWO has been recognized as a popular option for realizing optimal solutions. Despite the popularity, the GWO has structural defects and uncertain performance and has certain limitations when dealing with complex problems such as multimodality and hybrid functions. This paper tries to overhaul the shortcomings of the original process and develops a GWO variant enhanced with a covariance matrix adaptation evolution strategy (CMAES), levy flight mechanism, and orthogonal learning (OL) strategy named GWOCMALOL. The algorithm uses the levy flight mechanism, orthogonal learning strategy, and CMAES to bring more effective exploratory inclinations. We conduct numerical experiments based on various functions in IEEE CEC2014. It is also compared with 10 other algorithms with competitive performances, 7 improved GWO variants, and 11 advanced algorithms. Moreover, for more systematic data analysis, Wilcoxon signed-rank test is used to evaluate the results further. Experimental results show that the GWOCMALOL algorithm is superior to other algorithms in terms of convergence speed and accuracy. The proposed GWO-based version is discretized into a binary tool through the transformation function. We evaluate the performance of the new feature selection method based on 24 UCI data sets.​ Experimental results show that the developed algorithm performs better than the original technique, and the defects are resolved. Besides, we could reach higher classification accuracy and fewer feature selections than other optimization algorithms. A narrative web service at http://aliasgharheidari.com will offer the required data and material about this work.

215 citations

Journal ArticleDOI
TL;DR: Results for every optimization task demonstrate that LSEOFOA can provide a high-performance and self-assured tradeoff between exploration and exploitation, and overall research findings show that the proposed model is superior in terms of classification accuracy, Matthews correlation coefficient, sensitivity, and specificity.

212 citations

Journal ArticleDOI
TL;DR: Zhang et al. as mentioned in this paper proposed an end-to-end unified framework based on deep learning that does not include normalization in order to achieve improved accuracy in iris segmentation and recognition.

39 citations

Journal ArticleDOI
TL;DR: An improved three-factor user authentication scheme is proposed to overcome those flaws utilizing password, smart card, and biometric feature and is suitable for practical application in WMSN.
Abstract: As wireless communication technology and semiconductor technology developed fast, the wireless medical sensor networks (WMSNs) have been applied to the modern health-care area at large. The physiological data can be obtained by medical sensor nodes deployed in the patient’s body and sent to the special devices of the health professionals through wireless communication. Thus, the status of a patient is monitored by the health professional in that way. However, there are still two important issues that how to guarantee secure communication and protect the privacy of the patient for the reason of the open feature of wireless communication. In this paper, initially, an improved three-factor user authentication scheme is proposed to overcome those flaws utilizing password, smart card, and biometric feature. Furthermore, formal security analysis shows that the proposed scheme defends against various security pitfalls. Finally, the comparison results with other surviving relevant schemes show that our scheme is more efficient in terms of computational cost, communication cost, and estimated time. Therefore, the proposed scheme is suitable for practical application in WMSN.

27 citations

Journal ArticleDOI
TL;DR: An architecture based on CNNs combined with dense blocks for iris segmentation, referred to as a dense-fully convolutional network (DFCN), and adopt some popular optimizer methods, such as batch normalization (BN) and dropout.
Abstract: Iris segmentation algorithms are of great significance in complete iris recognition systems, and directly affect the iris verification and recognition results. However, the conventional iris segmentation algorithms have poor adaptability and are not sufficiently robust when applied to noisy iris databases captured under unconstrained conditions. In addition, there are currently no large iris databases; thus, the iris segmentation algorithms cannot maximize the benefits of convolutional neural networks (CNNs). The main work of this paper is as follows: first, we propose an architecture based on CNNs combined with dense blocks for iris segmentation, referred to as a dense-fully convolutional network (DFCN), and adopt some popular optimizer methods, such as batch normalization (BN) and dropout. Second, because the public ground-truth masks of the CASIA-Interval-v4 and IITD iris databases do not include the labeled eyelash regions, we label these regions that occlude the iris regions using the Labelme software package. Finally, the promising results of experiments based on the CASIA-Interval-v4, IITD, and UBIRIS.V2 iris databases captured under different conditions reveal that the iris segmentation network proposed in this paper outperforms all of the conventional and most of the CNN-based iris segmentation algorithms with which we compared our algorithm’s results in terms of various metrics, including the accuracy, precision, recall, f1 score, and nice1 and nice2 error scores, reflecting the robustness of our proposed network.

26 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This open-source population-based optimization technique called Hunger Games Search is designed to be a standard tool for optimization in different areas of artificial intelligence and machine learning with several new exploratory and exploitative features, high performance, and high optimization capacity.
Abstract: A recent set of overused population-based methods have been published in recent years. Despite their popularity, most of them have uncertain, immature performance, partially done verifications, similar overused metaphors, similar immature exploration and exploitation components and operations, and an insecure tradeoff between exploration and exploitation trends in most of the new real-world cases. Therefore, all users need to extensively modify and adjust their operations based on main evolutionary methods to reach faster convergence, more stable balance, and high-quality results. To move the optimization community one step ahead toward more focus on performance rather than change of metaphor, a general-purpose population-based optimization technique called Hunger Games Search (HGS) is proposed in this research with a simple structure, special stability features and very competitive performance to realize the solutions of both constrained and unconstrained problems more effectively. The proposed HGS is designed according to the hunger-driven activities and behavioural choice of animals. This dynamic, fitness-wise search method follows a simple concept of “Hunger” as the most crucial homeostatic motivation and reason for behaviours, decisions, and actions in the life of all animals to make the process of optimization more understandable and consistent for new users and decision-makers. The Hunger Games Search incorporates the concept of hunger into the feature process; in other words, an adaptive weight based on the concept of hunger is designed and employed to simulate the effect of hunger on each search step. It follows the computationally logical rules (games) utilized by almost all animals and these rival activities and games are often adaptive evolutionary by securing higher chances of survival and food acquisition. This method's main feature is its dynamic nature, simple structure, and high performance in terms of convergence and acceptable quality of solutions, proving to be more efficient than the current optimization methods. The effectiveness of HGS was verified by comparing HGS with a comprehensive set of popular and advanced algorithms on 23 well-known optimization functions and the IEEE CEC 2014 benchmark test suite. Also, the HGS was applied to several engineering problems to demonstrate its applicability. The results validate the effectiveness of the proposed optimizer compared to popular essential optimizers, several advanced variants of the existing methods, and several CEC winners and powerful differential evolution (DE)-based methods abbreviated as LSHADE, SPS_L_SHADE_EIG, LSHADE_cnEpSi, SHADE, SADE, MPEDE, and JDE methods in handling many single-objective problems. We designed this open-source population-based method to be a standard tool for optimization in different areas of artificial intelligence and machine learning with several new exploratory and exploitative features, high performance, and high optimization capacity. The method is very flexible and scalable to be extended to fit more form of optimization cases in both structural aspects and application sides. This paper's source codes, supplementary files, Latex and office source files, sources of plots, a brief version and pseudocode, and an open-source software toolkit for solving optimization problems with Hunger Games Search and online web service for any question, feedback, suggestion, and idea on HGS algorithm will be available to the public at https://aliasgharheidari.com/HGS.html .

529 citations

Journal ArticleDOI
TL;DR: This study attempts to go beyond the traps of metaphors and introduce a novel metaphor-free population-based optimization based on the mathematical foundations and ideas of the Runge Kutta (RK) method widely well-known in mathematics.
Abstract: The optimization field suffers from the metaphor-based “pseudo-novel” or “fancy” optimizers. Most of these cliche methods mimic animals' searching trends and possess a small contribution to the optimization process itself. Most of these cliche methods suffer from the locally efficient performance, biased verification methods on easy problems, and high similarity between their components' interactions. This study attempts to go beyond the traps of metaphors and introduce a novel metaphor-free population-based optimization method based on the mathematical foundations and ideas of the Runge Kutta (RK) method widely well-known in mathematics. The proposed RUNge Kutta optimizer (RUN) was developed to deal with various types of optimization problems in the future. The RUN utilizes the logic of slope variations computed by the RK method as a promising and logical searching mechanism for global optimization. This search mechanism benefits from two active exploration and exploitation phases for exploring the promising regions in the feature space and constructive movement toward the global best solution. Furthermore, an enhanced solution quality (ESQ) mechanism is employed to avoid the local optimal solutions and increase convergence speed. The RUN algorithm's efficiency was evaluated by comparing with other metaheuristic algorithms in 50 mathematical test functions and four real-world engineering problems. The RUN provided very promising and competitive results, showing superior exploration and exploitation tendencies, fast convergence rate, and local optima avoidance. In optimizing the constrained engineering problems, the metaphor-free RUN demonstrated its suitable performance as well. The authors invite the community for extensive evaluations of this deep-rooted optimizer as a promising tool for real-world optimization. The source codes, supplementary materials, and guidance for the developed method will be publicly available at different hubs at http://imanahmadianfar.com and http://aliasgharheidari.com/RUN.html .

429 citations

01 Dec 2015
TL;DR: TensorFlow 2.0 in ActionTensor Flow 1.x Deep Learning Cookbook machine Learning with TensorFlow, Second EditionTensor flow 2 Pocket PrimerProgramming with Tensing, Tensor Flow Machine Learning Projects, and Hands-On Neural Networks.
Abstract: TensorFlow 2.0 in ActionTensorFlow 1.x Deep Learning CookbookMachine Learning with TensorFlow 1.xMachine Learning with TensorFlow, Second EditionTensorFlow 2 Pocket PrimerProgramming with TensorFlowTensorFlow Machine Learning ProjectsHands-On Neural Networks with TensorFlow 2.0TensorFlow for Deep LearningTensor Flow Pocket PrimerNatural Language Processing with TensorFlowTensorFlow: Powerful Predictive Analytics with TensorFlowHands-On Convolutional Neural Networks with TensorFlowTensorFlow 2.0 Computer Vision CookbookIntelligent Mobile Projects with TensorFlowLearning TensorFlow.jsDeep Learning with TensorFlow 2 and KerasLearning TensorFlowTensorFlow 2 Pocket ReferenceMachine Learning Using TensorFlow CookbookTensorFlow 2.0 Quick Start GuideTensorFlow Machine Learning CookbookLearn TensorFlow 2.0Learn TensorFlow in 24 HoursHands-On Computer Vision with TensorFlow 2Mastering Computer Vision with TensorFlow 2.xPro Deep Learning with TensorFlowHands-On Machine Learning with TensorFlow.jsTensorFlow for Deep LearningTinyMLLearning TensorFlow.jsDeep Learning with TensorFlow 2 and Keras Second EditionDeep Learning with TensorFlowMastering TensorFlow 1.xAdopting TensorFlow for Real-World AITensorFlow For DummiesArtificial Intelligence with PythonHands-On Machine Learning with Scikit-Learn, Keras, and TensorFlowLearn TensorFlow EnterpriseThe TensorFlow Workshop

306 citations

Journal ArticleDOI
TL;DR: The Colony Predation Algorithm (CPA) as mentioned in this paper is based on the corporate predation of animals in nature and utilizes a mathematical mapping following the strategies used by animal hunting groups, such as dispersing prey, encircling prey, supporting the most likely successful hunter, and seeking another target.

263 citations

Journal ArticleDOI
TL;DR: In this paper, a new deep learning (DL) model based on the transfer-learning (TL) technique is developed to efficiently assist in the automatic detection and diagnosis of the BC suspected area based on two techniques namely 80-20 and cross-validation.
Abstract: Breast cancer (BC) is one of the primary causes of cancer death among women. Early detection of BC allows patients to receive appropriate treatment, thus increasing the possibility of survival. In this work, a new deep-learning (DL) model based on the transfer-learning (TL) technique is developed to efficiently assist in the automatic detection and diagnosis of the BC suspected area based on two techniques namely 80–20 and cross-validation. DL architectures are modeled to be problem-specific. TL uses the knowledge gained during solving one problem in another relevant problem. In the proposed model, the features are extracted from the mammographic image analysis- society (MIAS) dataset using a pre-trained convolutional neural network (CNN) architecture such as Inception V3, ResNet50, Visual Geometry Group networks (VGG)-19, VGG-16, and Inception-V2 ResNet. Six evaluation metrics for evaluating the performance of the proposed model in terms of accuracy, sensitivity, specificity, precision, F-score, and area under the ROC curve (AUC) has been chosen. Experimental results show that the TL of the VGG16 model is powerful for BC diagnosis by classifying the mammogram breast images with overall accuracy, sensitivity, specificity, precision, F-score, and AUC of 98.96%, 97.83%, 99.13%, 97.35%, 97.66%, and 0.995, respectively for 80–20 method and 98.87%, 97.27%, 98.2%, 98.84%, 98.04%, and 0.993 for 10-fold cross-validation method.

118 citations