作者机构:
[汪彦] School of Software, Central South University, Changsha, 410083, China;[涂立; 汪彦] School of Information and Electronic Engineering, Hunan City University, Yiyang, 413000, China
通讯机构:
School of Software, Central South University, Changsha, China
作者机构:
[张弛; 王加阳] School of Information Science and Engineering, Central South University, Changsha, China;[涂立; 张弛] School of Information Science and Engineering, Hunan City University, Yiyang, China
通讯机构:
School of Information Science and Engineering, Central South University, Changsha, China
关键词:
蚁群算法(ACA);轮盘赌;信息素;差分演化;灾变
摘要:
针对传统的蚂蚁算法容易出现早熟和停滞现象,提出一种新型蚂蚁算法(new ant colony algorithm,NACA),即将转移规则、全局信息素灾变规则和局部混合调整信息素规则。选择几个典型TSP问题进行实验。研究结果表明:新型蚂蚁算法一方面提高了算法种群的多样性,同时将轮盘赌算子利用到城市转移规则中,有利于提高算法的收敛速度;另一方面,将种群个体的差分信息应用于局部信息素更新规则中,有利于搜索全局解;最后灾变算子避免算法陷入局部最优,而达到全局最优。新型的蚁群算法具有更强的搜索全局最优解的能力以及更好的稳定性和收敛性,同时为解决其他优化问题提供新的思路。
期刊:
Journal of Chemical and Pharmaceutical Research,2014年6(2):580-588 ISSN:0975-7384
作者机构:
[Tu, Li; Zhang, Chi] School of Information Science and Engineering, Hunan City University, Yiyang, Hunan, China;[Xie, Chuan] Department of Fundamental Medical, Clinical Laboratory, Yiyang Medical College, Yiyang, Hunan, China
摘要:
The stability of discrete Hopfield neural networks not only has an important theoretical significance, but also is the foundation of the applications of the networks. Security of the algorithm is discussed.ANN originated has been applied in all aspects of life and production, especially in intelligent control, nonlinear function approximation and environmental parameters forecast assessment. Be similar to the human's brain mechanism, a neural network complete the tasks by the process of learning (training) and use (associative memories). Normally, the neural network can be assured used only after thorough study. According to the dynamic characteristics of the interconnections between nerve cells in Hopfield network, this paper discusses the application of Hopfield network model in gene diagnosis, points out the network problems and puts forward the solutions.
期刊:
Lecture Notes in Electrical Engineering,2014年163:1211-1216 ISSN:1876-1100
通讯作者:
Tu, Li(tulip1907@163.com)
作者机构:
[Li Tu; Chi Zhang] Department of Computer Science, Hunan City University, Yiyang, Hunan 413000, China
会议名称:
2012年控制与信息国际会议
会议时间:
2012-09-21
会议地点:
中国重庆
摘要:
In this paper an improved Hopfield neural network algorithm was given,the applicable conditions of Hopfield neural network models of memory storage is greater than the storage capacity of the perfect
作者机构:
[涂立] School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China;[张应征] Department of Information and Engineering, Hunan Engineering Polytechnic, Changsha 410004, China;[涂立; 贾丽媛; 张弛] School of Information Science and Engineering, Hunan City University, Yiyang 413000, China
通讯机构:
School of Computer Science and Technology, Huazhong University of Science and Technology, China
期刊:
Journal of Chemical and Pharmaceutical Research,2014年6(6):2583-2592 ISSN:0975-7384
通讯作者:
Huang, Xuehua
作者机构:
[Jia, Liyuan; Huang, Xuehua; Li, Tu] School of Information Science and Engineering, Hunan City University, Yiyang, Hunan, China;[Xie, Chuan] Department of Fundamental Medical and Clinial Loboratory, Yiyang Medical College, Yiyang, Hunan, China
期刊:
Journal of Chemical and Pharmaceutical Research,2014年6(3):1312-1319 ISSN:0975-7384
通讯作者:
Zhang, C.
作者机构:
[Jia, Liyuan; Zhang, Chi; Li, Tu] School of Information Science and Engineering, Hunan City University, Yiyang, Hunan, China;[Xie, Chuan] Department of Fundamental Medical and Clinical Laboratory, Yiyang Medical College, Yiyang, Hunan, China
摘要:
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a novel method to encrypt a gray image based on Arnold transform and Kent mapping. It is a digital medical image encryption algorithm, dual scrambling that based on chaos of pixel position and pixel values. The results of experimental and the statistical analysis show that the histogram of the encryped image is fairly uniform and significantly different from the histogram of the original image. The algorithm improves the traditional image encryption algorithm of image scrambling based on chaos, and it is valid and has good performance.
期刊:
Lecture Notes in Electrical Engineering,2014年163:1941-1946 ISSN:1876-1100
通讯作者:
Tu, Li(tulip1907@163.com)
作者机构:
[Li Tu; Jianjun Wu] Center of Network, Hunan City University, Yiyang, Hunan 413000, China;[Li Tu] Department of Computer Science, Hunan City University, Yiyang, Hunan 413000, China
会议名称:
2012年控制与信息国际会议
会议时间:
2012-09-21
会议地点:
中国重庆
摘要:
This paper mainly studies the scrambling technology of digital image;discussing the image hashing algorithm based on Joseph Traverse. This paper explains the image encryption process based on Josephus
期刊:
Journal of Chemical and Pharmaceutical Research,2014年6(7):2073-2082 ISSN:0975-7384
通讯作者:
Tu, L.
作者机构:
[Jia, Liyuan; Tu, L.] School of Information Science and Engineering, Hunan City University, Yiyang, Hunan, China;[Huang, Xuehua; Zhang, Yingzheng] Department of Information and Engineering, Hunan Engineering Polytechnic, Changsha, Hunan, China
作者机构:
[Song, Juanjuan] Hunan City Univ, Sch Chem & Environm Engn, Yiyang 413000, Hunan, Peoples R China.;[Tu, Li] Hunan City Univ, Sch Informat Sci & Engn, Yiyang 413000, Hunan, Peoples R China.
会议名称:
2012 International Conference on Ecology,Waste Recycling,and Environment(ICEWE 2012)
会议时间:
2012-01-01
会议地点:
Macao,China
会议主办单位:
[Song, Juanjuan] Hunan City Univ, Sch Chem & Environm Engn, Yiyang 413000, Hunan, Peoples R China.^[Tu, Li] Hunan City Univ, Sch Informat Sci & Engn, Yiyang 413000, Hunan, Peoples R China.
会议论文集名称:
Advances in Biomedical Engineering
关键词:
modified diatomite;stibium;adsorption
摘要:
With increasing the degree of state environmental protection, the comprehensive treatment of waste water containing stibium has become a new subject in stibium industry.In this study,we modified diatomite with calcium carbonate,and adsorptived waste water containing stibium using these modified diatomite.Then we explored the quality of modified diatomite,initial concentration,initial pH value,temperature and adsorpting time on adsorption. The adsorption isotherm of stibium fits Langmuir equation.The result shows that the modified diatomite has good adsorption on waste water containing stibium.
期刊:
Lecture Notes in Electrical Engineering,2012年141 LNEE(VOL. 1):565-570 ISSN:1876-1100
通讯作者:
Tu, L.(tulip1907@163.com)
作者机构:
[Li Tu] Department of Computer Science, Hunan City University, Hunan, Yiyang 413000, China;[Juanjuan Song] Department of Chemical and Environmental Engineering, Hunan City University, Hunan, Yiyang 413000, China
会议名称:
2011 International Conference on Future Communication, Computing, Control and Management(ICF4C 2011)
期刊:
Advances in Information Sciences and Services,2012年4(23):282-289 ISSN:1976-3700
通讯作者:
Li, T.(tulip1903@163.com)
作者机构:
[Zhang, Chi; Li, Tu] School of Information Science and Engeering, Hunan City University, Yiyang, Hunan 413000, China;[Liu, Gang] CSR Zhuzhou Electric CO., LTD, Zhuzhou, Hunan 412000, China;[Hu, Juan] School of Computing Science, Hunan Institute of Science and Technology, Yueyang, Hunan 414000, China
通讯机构:
[Li, T.] S;School of Information Science and Engeering, , Yiyang, Hunan 413000, China
关键词:
Image encryption;Insect population model;Logistic map
摘要:
This paper presents a novel image encryption scheme based on Arnold mapping and Logistic mapping.It is a digital image encryption algorithm,dual scrambling that based on chaos of pixel position and pixel value. First we separated the three channels of a RGB mode image, then transformed them into 3 two dimensional grey images. respectively scramblinged these gray images of the three colour channels or changed their gray value by different methods,finally combined the three ciphertext into a RGB mode image.The results of experiment simulation show that the key space is large enough to resist the brute-force attack,the ciphertext varies sensitively with any minimal changes of the initial secret key and the plaintext. The algorithm improves the traditional image encryption algorithm of image scrambling based on chaos, and it is valid and has good performance.
期刊:
International Journal of Digital Content Technology and its Applications,2012年6(14):487-494 ISSN:1975-9339
通讯作者:
Tu, L.(tulip1903@163.com)
作者机构:
[Tu, Li] School of Information Science and Engineering, Hunan City University, Yiyang, 413008, China;[Liu, Gang] CSR Zhuzhou Electric CO.LTD, Zhuzhou 412000, China;[Hu, Juan] School of Computing Science, Hunan Institute of Science and Technology, Yueyang, Hunan 414000,, China;[Jin, Huixia] School of Physics and Telecom Engineering, Hunan City University, Yiyang, 413008, China
摘要:
This key technique is to solve the issue of mutual trust establishment between different PKI domains in the future wireless network development for clients. Without Certificate Authority, By adopting threshold scheme, a new roaming hand-off authentication scheme between the different trusted domains in multi-hop wireless network is proposed, then we described and analyzed the process of cross certificate being issued and the steps of roaming hand-off authentication from node leaving former network to joining in new network. and it can provide an efficient method for node's roaming hand-off and secure communication, it has strong flexibility and security, and is comparatively adaptable to the characteristics of wireless network. This technique can be widely used in future progress of wireless network.
期刊:
International Journal of Advancements in Computing Technology,2012年4(15):31-37 ISSN:2005-8039
通讯作者:
Li, T.(tulip1903@163.com)
作者机构:
[Hui, Ge] Department of Fine Arts, Heze University, China;[Li, Tu] School of Information Science and Engineering, Hunan City University, China
通讯机构:
[Li, T.] S;School of Information Science and Engineering, China
关键词:
Robust;Singular value decomposition;Watermark
摘要:
In order to obtain unification between the robustness and invisibility of watermarking images, under the condition of the same quality of watermark, the more robustness of for anti-interference and noises in image processing can be obtained. Improved watermarking algorithm for color image based on quick block singular value decomposition is proposed. SVD transformation preserves both one-way and non-symmetric properties. This watermarking algorithm is purposed to embed the watermark by both of the U and D components of improved SVD. Experiments and attacks test show that the algorithm has good robustness. Furthermore, the extracted watermark can still be easily identified after tampering.