Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Intelligent Computing Theories and

Application 17th International


Conference ICIC 2021 Shenzhen China
August 12 15 2021 Proceedings Part I
Lecture Notes in Computer Science
Book 12836 2nd Edition Katharina Rein
Visit to download the full and correct content document:
https://ebookmeta.com/product/intelligent-computing-theories-and-application-17th-int
ernational-conference-icic-2021-shenzhen-china-august-12-15-2021-proceedings-par
t-i-lecture-notes-in-computer-science-book-12836-2nd-edition-kat/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Intelligent Computing Theories and Application 17th


International Conference ICIC 2021 Shenzhen China
August 12 15 2021 Proceedings Part III Lecture Notes in
Computer Science De-Shuang Huang (Editor)
https://ebookmeta.com/product/intelligent-computing-theories-and-
application-17th-international-conference-icic-2021-shenzhen-
china-august-12-15-2021-proceedings-part-iii-lecture-notes-in-
computer-science-de-shuang-huang-editor/

Intelligent Computing Theories and Application 17th


International Conference ICIC 2021 Shenzhen China
August 12 15 2021 Proceedings Part I 1st Edition De-
Shuang Huang (Editor)
https://ebookmeta.com/product/intelligent-computing-theories-and-
application-17th-international-conference-icic-2021-shenzhen-
china-august-12-15-2021-proceedings-part-i-1st-edition-de-shuang-
huang-editor/

Intelligent Computing Theories and Application 17th


International Conference ICIC 2021 Shenzhen China
August 12 15 2021 Proceedings Part II 1st Edition De-
Shuang Huang
https://ebookmeta.com/product/intelligent-computing-theories-and-
application-17th-international-conference-icic-2021-shenzhen-
china-august-12-15-2021-proceedings-part-ii-1st-edition-de-
shuang-huang/

Web and Big Data: 5th International Joint Conference,


APWeb-WAIM 2021, Guangzhou, China, August 23–25, 2021,
Proceedings, Part I (Lecture Notes in Computer Science)
Leong Hou U (Editor)
https://ebookmeta.com/product/web-and-big-data-5th-international-
joint-conference-apweb-waim-2021-guangzhou-china-
august-23-25-2021-proceedings-part-i-lecture-notes-in-computer-
Image and Graphics 11th International Conference ICIG
2021 Haikou China August 6 8 2021 Proceedings Part III
Lecture Notes in Computer Science 12890 Yuxin Peng
(Editor)
https://ebookmeta.com/product/image-and-graphics-11th-
international-conference-icig-2021-haikou-china-
august-6-8-2021-proceedings-part-iii-lecture-notes-in-computer-
science-12890-yuxin-peng-editor/

Advances in Swarm Intelligence 12th International


Conference ICSI 2021 Qingdao China July 17 21 2021
Proceedings Part I Lecture Notes in Computer Science
12689 Ying Tan (Editor)
https://ebookmeta.com/product/advances-in-swarm-
intelligence-12th-international-conference-icsi-2021-qingdao-
china-july-17-21-2021-proceedings-part-i-lecture-notes-in-
computer-science-12689-ying-tan-editor/

Advances in Visual Computing 16th International


Symposium ISVC 2021 Virtual Event October 4 6 2021
Proceedings Part I Lecture Notes in Computer Science
George Bebis
https://ebookmeta.com/product/advances-in-visual-computing-16th-
international-symposium-isvc-2021-virtual-event-
october-4-6-2021-proceedings-part-i-lecture-notes-in-computer-
science-george-bebis/

Advances in Cryptology CRYPTO 2021 41st Annual


International Cryptology Conference CRYPTO 2021 Virtual
Event August 16 20 2021 Proceedings Part III Lecture
Notes in Computer Science 12827 Tal Malkin (Editor)
https://ebookmeta.com/product/advances-in-cryptology-
crypto-2021-41st-annual-international-cryptology-conference-
crypto-2021-virtual-event-august-16-20-2021-proceedings-part-iii-
lecture-notes-in-computer-science-12827-tal-malkin/

Knowledge Science, Engineering and Management: 14th


International Conference, KSEM 2021, Tokyo, Japan,
August 14–16, 2021, Proceedings, Part II (Lecture Notes
in Computer Science, 12816) 1st Edition Han Qiu
(Editor)
https://ebookmeta.com/product/knowledge-science-engineering-and-
management-14th-international-conference-ksem-2021-tokyo-japan-
august-14-16-2021-proceedings-part-ii-lecture-notes-in-computer-
De-Shuang Huang · Kang-Hyun Jo ·
Jianqiang Li · Valeriya Gribova ·
Vitoantonio Bevilacqua (Eds.)
LNCS 12836

Intelligent Computing
Theories and Application
17th International Conference, ICIC 2021
Shenzhen, China, August 12–15, 2021
Proceedings, Part I
Lecture Notes in Computer Science 12836

Founding Editors
Gerhard Goos
Karlsruhe Institute of Technology, Karlsruhe, Germany
Juris Hartmanis
Cornell University, Ithaca, NY, USA

Editorial Board Members


Elisa Bertino
Purdue University, West Lafayette, IN, USA
Wen Gao
Peking University, Beijing, China
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Gerhard Woeginger
RWTH Aachen, Aachen, Germany
Moti Yung
Columbia University, New York, NY, USA
More information about this subseries at http://www.springer.com/series/7409
De-Shuang Huang Kang-Hyun Jo
• •

Jianqiang Li Valeriya Gribova


• •

Vitoantonio Bevilacqua (Eds.)

Intelligent Computing
Theories and Application
17th International Conference, ICIC 2021
Shenzhen, China, August 12–15, 2021
Proceedings, Part I

123
Editors
De-Shuang Huang Kang-Hyun Jo
Tongji University University of Ulsan
Shanghai, China Ulsan, Korea (Republic of)
Jianqiang Li Valeriya Gribova
Shenzhen University Far Eastern Branch of the Russian Academy
Shenzhen, China of Sciences
Vladivostok, Russia
Vitoantonio Bevilacqua
Polytechnic University of Bari
Bari, Italy

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-030-84521-6 ISBN 978-3-030-84522-3 (eBook)
https://doi.org/10.1007/978-3-030-84522-3
LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© Springer Nature Switzerland AG 2021


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

The International Conference on Intelligent Computing (ICIC) was started to provide


an annual forum dedicated to the emerging and challenging topics in artificial intelli-
gence, machine learning, pattern recognition, bioinformatics, and computational biol-
ogy. It aims to bring together researchers and practitioners from both academia and
industry to share ideas, problems, and solutions related to the multifaceted aspects of
intelligent computing.
ICIC 2021, held in Shenzhen, China, during August 12–15, 2021, constituted the
17th International Conference on Intelligent Computing. It built upon the success of
ICIC 2020 (Bari, Italy), ICIC 2019 (Nanchang, China), ICIC 2018 (Wuhan, China),
ICIC 2017 (Liverpool, UK), ICIC 2016 (Lanzhou, China), ICIC 2015 (Fuzhou, China),
ICIC 2014 (Taiyuan, China), ICIC 2013 (Nanning, China), ICIC 2012 (Huangshan,
China), ICIC 2011 (Zhengzhou, China), ICIC 2010 (Changsha, China), ICIC 2009
(Ulsan, South Korea), ICIC 2008 (Shanghai, China), ICIC 2007 (Qingdao, China),
ICIC 2006 (Kunming, China), and ICIC 2005 (Hefei, China).
This year, the conference concentrated mainly on the theories and methodologies as
well as the emerging applications of intelligent computing. Its aim was to unify the
picture of contemporary intelligent computing techniques as an integral concept that
highlights the trends in advanced computational intelligence and bridges theoretical
research with applications. Therefore, the theme for this conference was “Advanced
Intelligent Computing Technology and Applications”. Papers that focused on this
theme were solicited, addressing theories, methodologies, and applications in science
and technology.
ICIC 2021 received 458 submissions from authors in 21 countries and regions. All
papers went through a rigorous peer-review procedure and each paper received at least
three review reports. Based on the review reports, the Program Committee finally
selected 192 high-quality papers for presentation at ICIC 2021, which are included in
three volumes of proceedings published by Springer: two volumes of Lecture Notes in
Computer Science (LNCS) and one volume of Lecture Notes in Artificial Intelligence
(LNAI).
This volume of LNCS includes 71 papers.
The organizers of ICIC 2021, including Tongji University and Shenzhen University,
China, made an enormous effort to ensure the success of the conference. We hereby
would like to thank all the ICIC 2021 organizers, the members of the Program
Committee, and the referees for their collective effort in reviewing and soliciting the
papers. We would like to thank Ronan Nugent, executive editor from Springer, for his
frank and helpful advice and guidance throughout as well as his continuous support in
publishing the proceedings. In particular, we would like to thank all the authors for
contributing their papers. Without the high-quality submissions from the authors, the
success of the conference would not have been possible. Finally, we are especially
vi Preface

grateful to the International Neural Network Society and the National Science Foun-
dation of China for their sponsorship.

August 2021 De-Shuang Huang


Kang-Hyun Jo
Jianqiang Li
Valeriya Gribova
Vitoantonio Bevilacqua
Organization

General Co-chairs
De-Shuang Huang Tongji University, China
Zhong Ming Shenzhen University, China

Program Committee Co-chairs


Kang-Hyun Jo University of Ulsan, South Korea
Jianqiang Li Shenzhen University, China
Valeriya Gribova Far Eastern Branch of Russian Academy of Sciences,
Russia

Organizing Committee Co-chairs


Qiuzhen Lin Shenzhen University, China
Cheng Wen Luo Shenzhen University, China

Organizing Committee Members


Lijia Ma Shenzhen University, China
Jie Chen Shenzhen University, China
Jia Wang Shenzhen University, China
Changkun Jiang Shenzhen University, China
Junkai Ji Shenzhen University, China
Zun Liu Shenzhen University, China

Award Committee Co-chairs


Ling Wang Tsinghua University, China
Abir Hussain Liverpool John Moores University, UK

Tutorial Co-chairs
Kyungsook Han Inha University, South Korea
Prashan Premaratne University of Wollongong, Australia

Publication Co-chairs
Vitoantonio Bevilacqua Polytechnic of Bari, Italy
Phalguni Gupta Indian Institute of Technology Kanpur, India
viii Organization

Special Session Co-chairs


Michal Choras University of Science and Technology in Bydgoszcz,
Poland
Hong-Hee Lee University of Ulsan, South Korea

Special Issue Co-chairs


M. Michael Gromiha Indian Institute of Technology Madras, India
Laurent Heutte Université de Rouen, France
Hee-Jun Kang University of Ulsan, South Korea

International Liaison Co-chair


Prashan Premaratne University of Wollongong, Australia

Workshop Co-chairs
Yoshinori Kuno Saitama University, Japan
Jair Cervantes Canales Autonomous University of Mexico State, Mexico

Publicity Co-chairs
Chun-Hou Zheng Anhui University, China
Dhiya Al-Jumeily Liverpool John Moores University, UK

Exhibition Contact Co-chairs


Qiuzhen Lin Shenzhen University, China

Program Committee
Mohd Helmy Abd Wahab Universiti Tun Hussein Onn Malaysia, Malaysia
Nicola Altini Polytechnic University of Bari, Italy
Waqas Bangyal University of Gujrat, Pakistan
Wenzheng Bao Xuzhou University of Technology, China
Antonio Brunetti Polytechnic University of Bari, Italy
Domenico Buongiorno Politecnico di Bari, Italy
Hongmin Cai South China University of Technology, China
Nicholas Caporusso Northern Kentucky University, USA
Jair Cervantes Autonomous University of Mexico State, Mexico
Chin-Chih Chang Chung Hua University, Taiwan, China
Zhanheng Chen Shenzhen University, China
Wen-Sheng Chen Shenzhen University, China
Xiyuan Chen Southeast University, China
Organization ix

Wei Chen Chengdu University of Traditional Chinese Medicine,


China
Michal Choras University of Science and Technology in Bydgoszcz,
Poland
Angelo Ciaramella Università di Napoli, Italy
Guojun Dai Hangzhou Dianzi University, China
Weihong Deng Beijing University of Posts and Telecommunications,
China
YanRui Ding Jiangnan University, China
Pu-Feng Du Tianjing University, China
Jianbo Fan Ningbo University of Technology, China
Zhiqiang Geng Beijing University of Chemical Technology, China
Lejun Gong Nanjing University of Posts and Telecommunications,
China
Dunwei Gong China University of Mining and Technology, China
Wenyin Gong China University of Geosciences, China
Valeriya Gribova Far Eastern Branch of Russian Academy of Sciences,
Russia
Michael Gromiha Indian Institute of Technology Madras, India
Zhi-Hong Guan Huazhong University of Science and Technology,
China
Ping Guo Beijing Normal University, China
Fei Guo Tianjin University, China
Phalguni Gupta Indian Institute of Technology Kanpur, India
Kyungsook Han Inha University, South Korea
Fei Han Jiangsu University, China
Laurent Heutte Université de Rouen Normandie, France
Jian Huang University of Electronic Science and Technology
of China, China
Chenxi Huang Xiamen University, China
Abir Hussain Liverpool John Moores University, UK
Qinghua Jiang Harbin Institute of Technology, China
Kanghyun Jo University of Ulsan, South Korea
Dah-Jing Jwo National Taiwan Ocean University, Taiwan, China
Seeja K R Indira Gandhi Delhi Technical University for Women,
India
Weiwei Kong Xi’an University of Posts and Telecommunications,
China
Yoshinori Kuno Saitama University, Japan
Takashi Kuremoto Nippon Institute of Technology, Japan
Hong-Hee Lee University of Ulsan, South Korea
Zhen Lei Institute of Automation, CAS, China
Chunquan Li Harbin Medical University, China
Bo Li Wuhan University of Science and Technology, China
Xiangtao Li Jilin University, China
x Organization

Hao Lin University of Electronic Science and Technology


of China, China
Juan Liu Wuhan University, China
Chunmei Liu Howard University, USA
Bingqiang Liu Shandong University, China
Bo Liu Academy of Mathematics and Systems Science, CAS,
China
Bin Liu Beijing Institute of Technology, China
Zhi-Ping Liu Shandong University, China
Xiwei Liu Tongji University, China
Haibin Liu Beijing University of Technology, China
Jin-Xing Liu Qufu Normal University, China
Jungang Lou Huzhou University, China
Xinguo Lu Hunan University, China
Xiaoke Ma Xidian University, China
Yue Ming Beijing University of Posts and Telecommunications,
China
Liqiang Nie Shandong University, China
Ben Niu Shenzhen University, China
Marzio Pennisi University of Eastern Piedmont Amedeo Avogadro,
Italy
Surya Prakash IIT Indore, India
Prashan Premaratne University of Wollongong, Australia
Bin Qian Kunming University of Science and Technology, China
Daowen Qiu Sun Yat-sen University, China
Mine Sarac Stanford University, USA
Xuequn Shang Northwestern Polytechnical University, China
Evi Sjukur Monash University, Australia
Jiangning Song Monash University, Australia
Chao Song Harbin Medical University, China
Antonino Staiano Parthenope University of Naples, Italy
Fabio Stroppa Stanford University, USA
Zhan-Li Sun Anhui University, China
Xu-Qing Tang Jiangnan University, China
Binhua Tang Hohai University, China
Joaquin Torres-Sospedra UBIK Geospatial Solutions S.L., Spain
Shikui Tu Shanghai Jiao Tong University, China
Jian Wang China University of Petroleum, China
Ling Wang Tsinghua University, China
Ruiping Wang Institute of Computing Technology, CAS, China
Xuesong Wang China University of Mining and Technology, China
Rui Wang National University of Defense Technology, China
Xiao-Feng Wang Hefei University, China
Shitong Wang Jiangnan University, China
Bing Wang Anhui University of Technology, China
Jing-Yan Wang New York University Abu Dhabi, Abu Dhabi
Organization xi

Dong Wang University of Jinan, China


Gai-Ge Wang Ocean University of China, China
Yunhai Wang Shandong University, China
Ka-Chun Wong City University of Hong Kong, Hong Kong, China
Hongjie Wu Suzhou University of Science and Technology, China
Junfeng Xia Anhui University, China
Shunren Xia Zhejiang University, China
Yi Xiong Shanghai Jiao Tong University, China
Zhenyu Xuan University of Texas at Dallas, USA
Bai Xue Institute of Software, CAS, China
Shen Yin Harbin Institute of Technology, China
Xiao-Hua Yu California Polytechnic State University, USA
Naijun Zhan Institute of Software, CAS, China
Bohua Zhan Institute of Software, CAS, China
Fa Zhang Institute of Computing Technology, CAS, China
JunQi Zhang Tongji University, China
Le Zhang Sichuan University, China
Wen Zhang Huazhong Agricultural University, China
Zhihua Zhang Beijing Institute of Genomics, CAS, China
Shixiong Zhang Xidian University, China
Qi Zhao University of Science and Technology of Liaoning,
China
Yongquan Zhou Guangxi University for Nationalities, China
Fengfeng Zhou Jilin University, China
Shanfeng Zhu Fudan University, China
Quan Zou University of Electronic Science and Technology
of China, China

Additional Reviewers

Nureize Arbaiy Shutao Mei Na Cheng


Shingo Mabu Jing Jiang Menglu Li
Farid Garcia Lamont Yuelin Sun Zhenhao Guo
Lianming Zhang Haicheng Yi Limin Jiang
Xiao Yu Suwen Zhao Kun Zhan
Shaohua Li Xin Hong Cheng-Hsiung Chiang
Yuntao Wei Ziyi Chen Yuqi Wang
Jinglong Wu Hailin Chen Bahattin Karakaya
Weichiang Hong Xiwei Tang Tejaswini Mallavarapu
Sungshin Kim Shulin Wang Jun Li
Chen Li Di Zhang Sheng Yang
Tianhua Guan Sijia Zhang Laurent Heutte
xii Organization

Pufeng Du Zuguo Yu Chuanxing Liu


Atif Mehmood Jun Yuan Panpan Song
Jonggeun Kim Punam Kumari Joao Sousa
Eun Kyeong Kim Bowei Zhao Wenying He
Hansoo Lee X. J. Chen Ming Chen
Yiqiao Cai Takashi Kurmeoto Puneet Gupta
Wuritu Yang Pallavi Pandey Ziqi Zhang
Weitao Sun Yan Zhou Davide Nardone
Guihua Tao Mascot Wang Liangxu Liu
Jinzhong Zhang Chenhui Qiu Huijian Han
Wenjie Yi Haizhou Wu Qingjun Zhu
Lingyun Huang Lulu Zuo Hongluan Zhao
Chao Chen Juan Wang Rey-Sern Lin
Jiangping He Rafal Kozik Hung-Chi Su
Wei Wang Wenyan Gu Conghua Xie
Jin Ma Shiyin Tan Caitong Yue
Liang Xu Yaping Fang Li Yan
Vitoantonio Bevilacqua Alexander Moopenn Tuozhong Yao
Huan Liu Xiuxiu Ren Xuzhao Chai
Lei Deng Aniello Castiglione Zhenhu Liang
Di Liu Qiong Wu Yu Lu
Zhongrui Zhang Junyi Chen Jing Sun
Qinhu Zhang Meineng Wang Hua Tang
Yanyun Qu Xiaorui Su Liang Cheng
Jinxing Liu Jianping Yu Puneet Rawat
Shravan Sukumar Lizhi Liu Kulandaisamy A.
Long Gao Junwei Luo Jun Zhang
Yifei Wu Yuanyuan Wang Egidio Falotico
Tianhua Jiang Xiaolei Zhu Peng Chen
Lixiang Hong Jiafan Zhu Cheng Wang
Tingzhong Tian Yongle Li Jing Li
Yijie Ding Xiaoyin Xu He Chen
Junwei Wang Shiwei Sun Giacomo Donato Cascarano
Zhe Yan Hongxuan Hua Shaohua Wan
Rui Song Shiping Zhang Cheng Chen
S. A. K. Bangyal Xiangtian Yu Jie Li
Giansalvo Cirrincione Angelo Riccio Ruxin Zhao
Xiancui Xiao Yuanpeng Xiong Jiazhou Chen
X. Zheng Jing Xu Guoliang Xu
Vincenzo Randazzo Chienyuan Lai Congxu Zhu
Huijuan Zhu Guo-Feng Fan Deng Li
Dongyuan Li Zheng Chen Piyush Joshi
Jingbo Xia Renzhi Cao Syed Sadaf Ali
Boya Ji Ronggen Yang Kuan Li
Manilo Monaco Zhongming Zhao Teng Wan
Xiaohua Yu Yongna Yuan Hao Liu
Organization xiii

Yexian Zhang Lianrong Pu Zhenqing Ye


Xu Qiao Di Wang Zijing Wang
Lingchong Zhong Fangping Wan Lida Zhu
Wenyan Wang Renmeng Liu Xionghui Zhou
Xiaoyu Ji Jiancheng Zhong Jia-Xiang Wang
Weifeng Guo Yinan Guo Gongxin Peng
Yuchen Jiang Lujie Fang Junbo Liang
Van-Dung Hoang Ying Zhang Linjing Liu
Yuanyuan Huang Yinghao Cao Xiangeng Wang
Zaixing Sun Xhize Wu Y. M. Nie
Honglin Zhang Chao Wu Sheng Ding
Yu-Jie He Ambuj Srivastava Laksono Kurnianggoro
Rong Hu Prabakaran R. Minxia Cheng
Youjie Yao Xingquan Zuo Meiyi Li
Naikang Yu Jiabin Huang Qizhi Zhu
Giulia Russo Jingwen Yang Pengchao Li
Dian Liu Qianying Liu Ming Xiao
Cheng Liang Tongchi Zhou Guangdi Liu
Iyyakutti Iyappan Ganapathi Xinyan Liang Jing Meng
Mingon Kang Xiaopeng Jin Kang Xu
Xuefeng Cui Yumeng Liu Cong Feng
Hao Dai Junliang Shang Arturo Yee
Geethan Mendiz Shanghan Li Kazunori Onoguchi
Brendan Halloran Jianhua Zhang Hotaka Takizawa
Yue Li Wei Zhang Suhang Gu
Qianqian Shi Han-Jing Jiang Zhang Yu
Zhiqiang Tian Kunikazu Kobayashi Bin Qin
Ce Li Shenglin Mu Yang Gu
Yang Yang Jing Liang Zhibin Jiang
Jun Wang Jialing Li Chuanyan Wu
Ke Yan Zhe Sun Wahyono Wahyono
Hang Wei Wentao Fan Kaushik Deb
Yuyan Han Wei Lan Alexander Filonenko
Hisato Fukuda Josue Espejel Cabrera Van-Thanh Hoang
Yaning Yang José Sergio Ruiz Castilla Ning Guo
Lixiang Xu Rencai Zhou Deng Chao
Yuanke Zhou Moli Huang Jian Liu
Shihui Ying Yong Zhang Sen Zhang
Wenqiang Fan Joaquín Torres-Sospedra Nagarajan Raju
Zhao Li Xingjian Chen Kumar Yugandhar
Zhe Zhang Saifur Rahaman Anoosha Paruchuri
Xiaoying Guo Olutomilayo Petinrin Lei Che
Zhuoqun Xia Xiaoming Liu Yujia Xi
Na Geng Lei Wang Ma Haiying
Xin Ding Xin Xu Huanqiang Zeng
Balachandran Manavalan Najme Zehra Hong-Bo Zhang
xiv Organization

Yewang Chen Weilin Deng Chunyan Fan


Sama Ukyo Xu Zhou Jie Zhao
Akash Tayal Shuyuan Wang Yuchen Zhang
Ru Yang Rabia Shakir Jianwei Yang
Junning Gao Haotian Xu Wenrui Zhao
Jianqing Zhu Zekang Bian Di Wu
Haizhou Liu Shuguang Ge Chao Wang
Nobutaka Shimada Hong Peng Fuyi Li
Yuan Xu Thar Baker Guangsheng Wu
Shuo Jiang Siguo Wang Yuchong Gong
Minghua Zhao Jianqing Chen Weitai Yang
Jiulong Zhang Chunhui Wang Yanan Wang
Shui-Hua Wang Xiaoshu Zhu Bo Chen
Sandesh Gupta Yongchun Zuo Binbin Pan
Nadia Siddiqui Hyunsoo Kim Chunhou Zheng
Syeda Shira Moin Areesha Anjum Bowen Song
Ruidong Li Shaojin Geng Guojing Wu
Mauro Castelli He Yongqiang Weiping Liu
Ivanoe De Falco Mario Camana Laura Jalili
Antonio Della Cioppa Long Chen Xing Chen
Kamlesh Tiwari Jialin Lyu Xiujuan Lei
Luca Tiseni Zhenyang Li Marek Pawlicki
Ruizhi Fan Tian Rui Hao Zhu
Grigorios Skaltsas Duygun Erol Barkana Wang Zhanjun
Mario Selvaggio Huiyu Zhou Mohamed Alloghani
Xiang Yu Yichuan Wang Yu Hu
Huajuan Huang Eray A. Baran Baohua Wang
Vasily Aristarkhov Jiakai Ding Hanfu Wang
Zhonghao Liu Dehua Zhang Hongle Xie
Lichuan Pan Insoo Koo Guangming Wang
Zhongying Zhao Yudong Zhang Fuchun Liu
Atsushi Yamashita Zafaryab Haider Farid Garcia-Lamont
Ying Xu Vladimir Shakhov Hengyue Shi
Wei Peng Daniele Leonardis Po Yang
Haodi Feng Byungkyu Park Wen Zheng Ma
Jin Zhao Elena Battini Jianxun Mi
Shunheng Zhou Radzi Ambar Michele Scarpiniti
Changlong Gu Noraziah Chepa Yasushi Mae
Xiangwen Wang Liang Liang Haoran Mo
Zhe Liu Ling-Yun Dai Gaoyuan Liang
Pi-Jing Wei Xiongtao Zhang Pengfei Cui
Haozhen Situ Sobia Pervaiz Iqbal Yoshinori Kobayashi
Xiangtao Chen Fang Yang Kongtao Chen
Hui Tang Si Liu Feng Feng
Akio Nakamura Natsa Kleanthous Wenli Yan
Antony Lam Zhen Shen Zhibo Wang
Organization xv

Ying Qiao Zichang Tan Xiang Li


Qiyue Lu Fengcui Qian Yuanpeng Zhang
Dong Li Xianming Li Dewu Ding
Heqi Wang Jing Wang Jiaxuan Liu
Tony Hao Yuexin Zhang Zhenyu Tang
Chenglong Wei Fan Wang Zhize Wu
My Ha Le Yanyu Li Zhihao Huang
Yu Chen Qi Pan Yu Feng
Naida Fetic Jiaxin Chen Chen Zhang
Bing Sun Yuhan Hao Min Liu
Zhenzhong Chu Xiaokang Wang Baiying Lei
Meijing Li Jiekai Tang Jiaming Liu
Wentao Chen Wen Jiang Xiaochuan Jing
Mingpeng Zheng Nan Li Francesco Berloco
Zhihao Tang Zhengwen Li Shaofei Zang
Li Keng Liang Yuanyuan Yang Shenghua Feng
Alberto Mazzoni Wenbo Chen Xiaoqing Gu
Liang Chen Wenchong Luo Jing Xue
Meng-Meng Yin Jiang Xue Junqing Zhu
Yannan Bin Xuanying Zhang Wenqiang Ji
Wasiq Khan Lianlian Zhong Muhamad Dwisnanto Putro
Yong Wu Liu Xiaolin Li-Hua Wen
Juanjuan Shi Difei Liu Zhiwen Qiang
Shiting Sun Bowen Zhao Chenchen Liu
Xujing Yao Bowen Xue Juntao Liu
Wenming Wu Churong Zhang Yang Miao
Na Zhang Xing Xing Zhang Yan Chen
Anteneh Birga Yang Guo Xiangyu Wang
Yipeng Lv Lu Yang Cristina Juárez
Qiuye Wang Jinbao Teng Ziheng Rong
Adrian Trueba Yupei Zhang Jing Lu
Ao Liu Keyu Zhong Lisbeth Rodriguez Mazahua
Bifang He Mingming Jiang Rui Yan
Jun Pang Chen Yong Yuhang Zhou
Jie Ding Haidong Shao Huiming Song
Shixuan Guan Weizhong Lin Li Ding
Boheng Cao Leyi Wei Alma Delia Cuevas
Bingxiang Xu Ravi Kant Kumar Zixiao Pan
Lin Zhang Jogendra Garain Yuchae Jung
Mengya Liu Teressa Longjam Chunfeng Mi
Xueping Lv Zhaochun Xu Guixin Zhao
Hee-Jun Kang Zhirui Liao Yuqian Pu
Yuanyuan Zhang Qifeng Wu Hongpeng Ynag
Jin Zhang Nanxuan Zhou Yan Pan
Lin Chen Song Gu Rinku Datta Rakshit
Runshan Xie Bin Li Ming-Feng Ge
xvi Organization

Mingliang Xue Jiatong Li Francesco Fontanella


Fahai Zhong Enda Jiang Rahul Kumar
Shan Li Yichen Sun Alessandra Scotto di Freca
Qingwen Wu Yanyuan Qin Nicole Cilia
Tao Li Chengwei Ai Annunziata Paviglianiti
Liwen Xie Kang Li Jacopo Ferretti
Daiwei Li Jhony Heriberto Giraldo Zuluaga Pietro Barbiero
Yuzhen Han Waqas Haider Bangyal Seong-Jae Kim
Fengqiang Li Tingting Dan Jing Yang
Chenggang Lai Haiyan Wang Dan Yang
Shuai Liu Dandan Lu Dongxue Peng
Cuiling Huang Bin Zhang Wenting Cui
Wenqiang Gu Cuco Cristanno Wenhao Chi
Haitao Du Antonio Junior Spoleto Ruobing Liang
Bingbo Cui Zhenghao Shi Feixiang Zhou
Yang Lei Ya Wang Jijia Kang
Xiaohan Sun Shuyi Zhang Huawei Huang
Inas Kadhim Xiaoqing Li Peng Li
Jing Feng Yajun Zou Yunfeng Zhao
Xin Juan Chuanlei Zhang Xiaoyan Hu
Hongguo Zhao Berardino Prencipe Li Guo
Masoomeh Mirrashid Feng Liu Lei Du
Jialiang Li Yongsheng Dong Xia-An Bi
Yaping Hu Rong Fei Xiuquan Du
Xiangzhen Kong Zhen Wang Ping Zhu
Mixiao Hou Jun Sang Young-Seob Jeong
Zhen Cui Jun Wu Han-Gyu Kim
Na Yu Xiaowen Chen Dongkun Lee
Meiyu Duan Hong Wang Jonghwan Hyeon
Baoping Yuan Daniele Malitesta Chae-Gyun Lim
Umarani Jayaraman Fenqiang Zhao Dingna Duan
Guanghui Li Xinghuo Ye Shiqiang Ma
Lihong Peng Hongyi Zhang Mingliang Dou
Fabio Bellavia Xuexin Yu Jansen Woo
Giosue’ Lo Bosco Xujun Duan Shanshan Hu
Zhen Chen Xing-Ming Zhao Hai-Tao Li
Jiajie Xiao Jiayan Han Francescomaria Marino
Chunyan Liu Weizhong Lu Jiayi Ji
Yue Zhao Frederic Comby Jun Peng
Yuwen Tao Taemoon Seo Shirley Meng
Nuo Yu Sergio Cannata Lucia Ballerini
Liguang Huang Yong-Wan Kwon Haifeng Hu
Duy-Linh Nguyen Heng Chen Jingyu Hou
Kai Shang Min Chen
Wu Hao Qing Lei
Contents – Part I

Evolutionary Computation and Learning

Multi-objective Optimization-Based Task Offloading and Power Control


for Mobile Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yidan Chen, Xueyi Wang, Lianbo Ma, and Ping Zhou

An Evolutionary Neuron Model with Dendritic Computation


for Classification and Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Cheng Tang, Zhenyu Song, Yajiao Tang, Huimei Tang, Yuxi Wang,
and Junkai Ji

An Improved Genetic Algorithm for Distributed Job Shop


Scheduling Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Sihan Wang, Xinyu Li, Liang Gao, and Lijian Wang

An Improved Teaching-Learning-Based Optimization for Multitask


Optimization Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Wei Guo, Feng Zou, Debao Chen, Hui Liu, and Siyu Cao

Emotion Recognition from Facial Expressions Using a Genetic Algorithm


to Feature Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Laura Jalili, Jair Cervantes, Farid García-Lamont, and Adrián Trueba

An Efficient Competitive Swarm Optimizer for Solving Large-Scale


Multi-objective Optimization Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Yongfeng Li, Lingjie Li, Qiuzhen Lin, and Zhong Ming

KGT: An Application Mapping Algorithm Based on Kernighan–Lin


Partition and Genetic Algorithm for WK-Recursive NoC Architecture . . . . . . 86
Hong Zhang and Xiaojun Wang

Evolutionary Algorithms for Applications of Biological Networks:


A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Gufeng Liu, Qunfeng Liu, Lijia Ma, and Zengyang Shao

Computational Prediction of Protein-Protein Interactions in Plants Using


Only Sequence Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Jie Pan, Changqing Yu, Liping Li, Zhuhong You, Zhonghao Ren,
Yao Chen, and Yongjian Guan
xviii Contents – Part I

Image and Signal Processing

A Diabetic Retinopathy Classification Method Based on Novel


Attention Mechanism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Jinfan Zou, Xiaolong Zhang, and Xiaoli Lin

A Comparable Study on Dimensionality Reduction Methods


for Endmember Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Guangyi Chen and Wenfang Xie

Hyperspectral Image Classification with Locally Linear Embedding,


2D Spatial Filtering, and SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Guang Yi Chen, Wen Fang Xie, and Shen-En Qian

A Hierarchical Retrieval Method Based on Hash Table


for Audio Fingerprinting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Tianhao Li, Maoshen Jia, and Xuan Cao

Automatic Extraction of Document Information Based on OCR and Image


Registration Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Shen Ran, Hu Ruoyun, Ding Qi, and Jin Liangfeng

Using Simplified Slime Mould Algorithm for Wireless Sensor Network


Coverage Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Yuanye Wei, Yongquan Zhou, Qifang Luo, and Jian Bi

Super-Large Medical Image Storage and Display Technology Based


on Concentrated Points of Interest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Jun Yan, Yuli Wang, Haiou Li, Weizhong Lu, and Hongjie Wu

Person Re-identification Based on Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . 209


Bo Song, Xinfeng Zhang, Tianyu Zhu, Bowen Ren, and Maoshen Jia

A Robust and Automatic Recognition Method of Pointer Instruments


in Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Jian-Xun Mi, Xu-Dong Wang, Qing-Yun Yang, and Xin Deng

Partial Distillation of Deep Feature for Unsupervised Image Anomaly


Detection and Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Qian Wan, Liang Gao, Lijian Wang, and Xinyu Li

Speech Recognition Method for Home Service Robots Based


on CLSTM-HMM Hybrid Acoustic Model . . . . . . . . . . . . . . . . . . . . . . . . . 251
Chenxin Zhao, Xiaohua Wang, and Lei Zhang

Serialized Local Feature Representation Learning for Infrared-Visible


Person Re-identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Sizhe Wan, Changan Yuan, Xiao Qin, and Hongjie Wu
Contents – Part I xix

A Novel Decision Mechanism for Image Edge Detection . . . . . . . . . . . . . . . 274


Junfeng Jing, Shenjuan Liu, Chao Liu, Tian Gao, Weichuan Zhang,
and Changming Sun

Rapid Earthquake Assessment from Satellite Imagery Using RPN


and Yolo v3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Sanjeeb Prasad Panday, Saurav Lal Karn, Basanta Joshi, Aman Shakya,
and Rom Kant Pandey

Attention-Based Deep Multi-scale Network for Plant Leaf Recognition . . . . . 302


Xiao Qin, Yu Shi, Xiao Huang, Huiting Li, Jiangtao Huang,
Changan Yuan, and Chunxia Liu

Information Security

Short Video Users’ Personal Privacy Leakage and Protection Measures . . . . . 317
Haiyu Wang

An Efficient Video Steganography Method Based on HEVC . . . . . . . . . . . . 327


Si Liu, Yunxia Liu, Cong Feng, and Hongguo Zhao

Analysis on the Application of Blockchain Technology in Ideological


and Political Education in Universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Shanshan Gu

Parallel Security Video Streaming in Cloud Server Environment . . . . . . . . . . 346


Mi-Young Kang

An Efficient Video Steganography Scheme for Data Protection


in H.265/HEVC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Hongguo Zhao, Menghua Pang, and Yunxia Liu

A Robust Lossless Steganography Method Based on H.264/AVC . . . . . . . . . 369


Shuyang Liu

Research on Application of Blockchain Technology in Higher Education


in China. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Cong Feng and Si Liu

Neural Networks

Multi-class Text Classification Model Based on Weighted Word Vector


and BiLSTM-Attention Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Hao Wu, Zhuangzhuang He, Weitao Zhang, Yunsheng Hu, Yunzhi Wu,
and Yi Yue
xx Contents – Part I

Fault Diagnosis Based on Unsupervised Neural Network in Tennessee


Eastman Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Wei Mu, Aihua Zhang, Zinan Su, and Xing Huo

Constraint Interpretable Double Parallel Neural Network and Its


Applications in the Petroleum Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Yunqi Jiang, Huaqing Zhang, Jian Wang, Kai Zhang, and Nikhil R. Pal

Alcoholism Detection via 5-Layer Customized Convolution


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Lijia Deng

A Heterogeneous 1D Convolutional Architecture for Urban


Photovoltaic Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Alvaro Valderrama, Carlos Valle, Marcelo Ibarra, and Hector Allende

Adversarial Attacks and Defenses in Deep Learning: A Survey. . . . . . . . . . . 450


Chengyu Wang, Jia Wang, and Qiuzhen Lin

Pattern Recognition

Fine-Grained Recognition of Crop Pests Based on Capsule Network


with Attention Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Xianfeng Wang, Xuqi Wang, Wenzhun Huang, and Shanwen Zhang

Small Object Recognition Based on the Generative Adversarial Network


and Multi-instance Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Lin Zhiyong

Deep Learning Based Semantic Page Segmentation of Document Images


in Chinese and English . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Yajun Zou and Jinwen Ma

Non-central Student-t Mixture of Student-t Processes for Robust Regression


and Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
Xiaoyan Li and Jinwen Ma

Multi-class Tissue Classification in Colorectal Cancer with Handcrafted


and Deep Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Nicola Altini, Tommaso Maria Marvulli, Mariapia Caputo,
Eliseo Mattioli, Berardino Prencipe, Giacomo Donato Cascarano,
Antonio Brunetti, Stefania Tommasi, Vitoantonio Bevilacqua,
Simona De Summa, and Francesco Alfredo Zito

Plant Leaf Recognition Network Based on Fine-Grained


Visual Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Wenhui Liu, Changan Yuan, Xiao Qin, and Hongjie Wu
Contents – Part I xxi

Anomaly Detection Based on Video Prediction and Latent


Space Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Shuanggen Fan and Yanxiang Chen

A Robust Distance Regularized Potential Function for Level Set Image


Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Le Zou, Qian-Jing Huang, Zhi-Ze Wu, Liang-Tu Song,
and Xiao-Feng Wang

Label Similarity Based Graph Network for Badminton


Activity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Ya Wang, Guowen Pan, Jinwen Ma, Xiangchen Li, and Albert Zhong

MITT: Musical Instrument Timbre Transfer Based on the Multichannel


Attention-Guided Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Huayuan Chen and Yanxiang Chen

Classification of Benign-Malignant Pulmonary Nodules Based


on Multi-view Improved Dense Network . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Li-Hua Shen, Xin-Hao Wang, Min-Xiang Gao, and Bo Li

Deep Convolution Neural Network Based Research on Recognition


of Mine Vehicle Head and Tail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Junqiang Li, Chao Wang, Lin Cui, Zhiwei Zhang, Wenquan Tian,
Zhenggao Pan, Wanli Zhang, Xiaoying Yang, and Guolong Chen

Compact Finite-State Super Transducers for Grapheme-to-Phoneme


Conversion in Highly Inflected Languages . . . . . . . . . . . . . . . . . . . . . . . . . 606
Žiga Golob, Boštjan Vesnicer, Mario Žganec, Vitomir Štruc,
Simon Dobrišek, and Jerneja Žganec Gros

Swarm Intelligence and Optimization

An Improved SMA Algorithm for Solving Global Optimization Problems . . . 619


Heng-wei Guo, Hong-yan Sang, Jun-qing Li, Yu-yan Han, Biao Zhang,
and Lei-lei Meng

An Improved Chicken Swarm Optimization Algorithm


with Fireworks Factor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Baofeng Zheng, Xiuxi Wei, and Huajuan Huang

An Improved Lagrangian Relaxation Algorithm for Solving the Lower


Bound of Production Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Nai-Kang Yu, Rong Hu, Bin Qian, and Ling Wang
xxii Contents – Part I

Multidimensional Estimation of Distribution Algorithm for Distributed


No-Wait Flow-Shop Scheduling Problem with Sequence-Independent
Setup Times and Release Dates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Sen Zhang, Rong Hu, Bin Qian, Zi-Qi Zhang, and Ling Wang

Hybrid Whale Optimization Algorithm for Solving Green Open Vehicle


Routing Problem with Time Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Wen Jiang, Rong Hu, Bin Qian, Nai-Kang Yu, and Bo Liu

Hybrid Grey Wolf Optimizer for Vehicle Routing Problem with Multiple
Time Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Nan Li, Rong Hu, Bin Qian, Nai-Kang Yu, and Ling Wang

Spatial Prediction of Stock Opening Price Based on Improved Whale


Optimized Twin Support Vector Regression . . . . . . . . . . . . . . . . . . . . . . . . 694
Huajuan Huang, Xiuxi Wei, and Yongquan Zhou

Channel Assignment Algorithm Based on Discrete BFO for Wireless


Monitoring Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Na Xia, Lin-Mei Luo, Hua-Zheng Du, Pei-Pei Wang, Yong-Tang Yu,
and Ji-Wen Zhang

A Multi-objective Particle Swarm Optimization Algorithm Embedded with


Maximum Fitness Function for Dual-Resources Constrained Flexible Job
Shop Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Jing Zhang and Jing Jie

An Improved Firefly Algorithm for Generalized Traveling


Salesman Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
Yu Huang, Xifan Yao, and Junjie Jiang

Virtual Reality and Human-Computer Interaction

User Study on an Online-Training System of Activity in Daily Life


for the Visually Impaired . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Hotaka Takizawa, Koji Kainou, and Mayumi Aoyagi

Person Property Estimation Based on 2D LiDAR Data Using Deep


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Mahmudul Hasan, Riku Goto, Junichi Hanawa, Hisato Fukuda,
Yoshinori Kuno, and Yoshinori Kobayashi

Detection of Pointing Position by Omnidirectional Camera. . . . . . . . . . . . . . 774


Yuuichiro Shiratori and Kazunori Onoguchi

Optimization of Low-Speed Dual Rotor Axial Flux Generator Design


Through Electromagnetic Modelling and Simulation . . . . . . . . . . . . . . . . . . 786
P. Premaratne, M. Q. Abdullah, I. J. Kadhim, B. Halloran, and P. J. Vial
Contents – Part I xxiii

A Lightweight Attention Fusion Module for Multi-sensor 3-D


Object Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 802
Li-Hua Wen, Ting-Yue Xu, and Kang-Hyun Jo

Regression-Aware Classification Feature for Pedestrian Detection


and Tracking in Video Surveillance Systems . . . . . . . . . . . . . . . . . . . . . . . 816
Xuan-Thuy Vo, Tien-Dat Tran, Duy-Linh Nguyen, and Kang-Hyun Jo

Efficient Face Detector Using Spatial Attention Module in Real-Time


Application on an Edge Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Muhamad Dwisnanto Putro, Duy-Linh Nguyen, and Kang-Hyun Jo

Non-tactile Thumb Tip Measurement System for Encouraging


Rehabilitation After Surgery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842
Erika Aoki, Tadashi Matsuo, and Nobutaka Shimada

Real-Time Prediction of Future 3D Pose of Person Using RGB-D Camera


for Personalized Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Yasushi Mae, Akihisa Nagata, Kaori Tsunoda, Tomokazu Takahashi,
Masato Suzuki, Yasuhiko Arai, and Seiji Aoyagi

ROS2-Based Distributed System Implementation for Logging Indoor


Human Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Kyohei Yoshida, Tadashi Matsuo, and Nobutaka Shimada

The Virtual Camera Path in 3D Animation . . . . . . . . . . . . . . . . . . . . . . . . . 874


Jingjing Tang, Liang Song, Jiabao Zeng, and Juncong Lin

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883


Contents – Part II

Intelligent Computing in Computer Vision

BIDGAN: Blind Image Deblurring with Improved CycleGAN


and Frequency Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yina Zhou, Caiwang Zhang, and Xiaoyong Ji

Emotional Interaction Computing of Actors in the Mass Incidents . . . . . . . . . 18


Yi-yi Wang and Fan-liang Bu

Multi Spatial Convolution Block for Lane Lines Semantic Segmentation . . . . 31


Yan Wu, Feilin Liu, Wei Jiang, and Xinneng Yang

VISFF: An Approach for Video Summarization Based on Feature Fusion . . . 42


Wei-Dong Tian, Xiao-Yu Cheng, Bin He, and Zhong-Qiu Zhao

Understanding Safety Based on Urban Perception . . . . . . . . . . . . . . . . . . . . 54


Felipe Moreno-Vera

Recognition of Multiple Panamanian Watermelon Varieties Based


on Feature Extraction Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Javier E. Sánchez-Galán, Anel Henry, Fatima Rangel, Emmy Sáez,
Kang-Hyun Jo, and Danilo Cáceres-Hernández

STDA-inf: Style Transfer for Data Augmentation Through In-data Training


and Fusion Inference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Tao Hong, Yajun Zou, and Jinwen Ma

Abnormal Driving Detection Based on Human Pose Estimation and Facial


Key Points Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Zihao Ye, Qize Wu, Xinxin Zhao, Jiajun Zhang, Wei Yu, and Chao Fan

Uncertainty-Guided Pixel-Level Contrastive Learning for Biomarker


Segmentation in OCT Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Yingjie Bai, Xiaoming Liu, Bo Li, and Kejie Zhou

Virtual Piano System Based on Monocular Camera . . . . . . . . . . . . . . . . . . . 112


Yajing Wang and Liang Song

Wall-Following Navigation for Mobile Robot Based on Random Forest


and Genetic Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Peipei Wu, Menglin Fang, and Zuohua Ding
xxvi Contents – Part II

A Study of Algorithms for Controlling the Precision of Bandwidth


in EMI Pre-testing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Shenglan Wu, Wenjing Hu, and Fang Zhang

Intelligent Control and Automation

Flight Control for 6-DOF Quadrotor via Sliding Mode Integral Filter . . . . . . 145
Zinan Su, Aihua Zhang, and Shaoshao Wang

An Enhanced Finite-Control-Set Model Predictive Control Strategy


for PWM Rectifiers with Filter Inductance Mismatch. . . . . . . . . . . . . . . . . . 161
Van-Tien Le, Huu-Cong Vu, and Hong-Hee Lee

Deep Integration Navigation Technique Based on Strong Tracking


UKF Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Cheng Xuwei, Zhang Zaitian, Ren Haoyu, Qiu Fengqi,
and Chen Jianzhou

The Application of Theoretical Variance#1 Method and Lifting Wavelet


for Optic Gyroscopes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Cheng Xuwei, Li Yuan, Zhou Min, Yan Zitong, and Xie Can

Proposing a Novel Fixed-Time Non-singular Terminal Sliding Mode


Surface for Motion Tracking Control of Robot Manipulators . . . . . . . . . . . . 194
Anh Tuan Vo, Thanh Nguyen Truong, Hee-Jun Kang, and Tien Dung Le

A Neural Terminal Sliding Mode Control for Tracking Control of Robotic


Manipulators in Uncertain Dynamical Environments . . . . . . . . . . . . . . . . . . 207
Thanh Nguyen Truong, Anh Tuan Vo, Hee-Jun Kang, and Tien Dung Le

Fuzzy PID Controller for Accurate Power Sharing and Voltage Restoration
in DC Microgrids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Duy-Long Nguyen and Hong-Hee Lee

Sensor-Less Contact Force Estimation in Physical Human-Robot


Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Quang Dan Le and Hee-Jun Kang

Model-Free Continuous Fuzzy Terminal Sliding Mode Control


for Second-Order Nonlinear Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Van-Cuong Nguyen, Phu-Nguyen Le, and Hee-Jun Kang

Deep Q-learning with Explainable and Transferable Domain Rules . . . . . . . . 259


Yichuan Zhang, Junkai Ren, Junxiang Li, Qiang Fang, and Xin Xu

Influence of Interference and Noise on Indoor Localization Systems . . . . . . . 274


Huy Q. Tran, Chuong Nguyen Thien, and Cheolkeun Ha
Contents – Part II xxvii

Exploration of Smart Medical Technology Based on Intelligent


Computing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Sijia Wang and Yizhang Jiang

Blockchain Based Trusted Identity Authentication in Ubiquitous Power


Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Yiming Guo, Xi Chen, Shuang Tian, Le Yang, Xiao Liang, Jie Lian,
Dianwei Jin, Aleksei Balabontsev, and Zhihong Zhang

Intelligent Modeling Technologies for Smart Cities

A YOLOv3-Based Learning Strategy for Vehicle-Thrown-Waste


Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Zhichao Dai and Zhaoliang Zheng

Research on Chinese Word Segmentation Based on Conditional


Random Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Chao Fan and Yu Li

Knowledge Discovery and Data Mining

Financial Distress Detection and Interpretation


with Semi-supervised System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Xiaoqing Zhu, Fangfang Liu, and Zhihua Niu

Solving Online Food Delivery Problem via an Effective Hybrid Algorithm


with Intelligent Batching Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Xing Wang, Ling Wang, Shengyao Wang, Yang Yu, Jing-fang Chen,
and Jie Zheng

Graph Semantics Based Neighboring Attentional Entity Alignment


for Knowledge Graphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Hanchen Wang, Jianfeng Li, and Tao Luo

An Improved CF Tree Clustering Based on Tissue-Like P System . . . . . . . . 368


Qian Liu and Xiyu Liu

Classification Method of Power Consumption Periods Based on Typical


Daily Load Curve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Yuhang Qiu, Dexin Li, Xin Liu, Chang Liu, Shang Wang, and Tao Peng

A Data Processing Method for Load Data of Electric Boiler


with Heat Reservoir. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Feng Xiao, Zhenyuan Li, Baoju Li, Chang Liu, Yuhang Qiu,
Shang Wang, and Tao Peng
xxviii Contents – Part II

Aggregate Model for Power Load Forecasting Based on Conditional


Autoencoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Yuhang Qiu, Yong Sun, Chang Liu, Baoju Li, Shang Wang,
and Tao Peng

Geographical Entity Community Discovery Based on Semantic Similarity . . . 417


Miao Yu, Zhanquan Wang, Yajie Pang, and Yesheng Xu

Many-To-Many Chinese ICD-9 Terminology Standardization Based


on Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Yijia Liu, Shasha Li, Jie Yu, Yusong Tan, Jun Ma, and Qingbo Wu

Chinese Word Sense Disambiguation Based on Classification . . . . . . . . . . . . 442


Chao Fan and Yu Li

Research on the Authorship of Dream of the Red Chamber Based


on Link Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Chao Fan and Yu Li

Span Representation Generation Method in Entity-Relation


Joint Extraction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Yongtao Tang, Jie Yu, Shasha Li, Bin ji, Yusong Tan, and Qingbo Wu

Machine Learning

Prediction of Railway Freight Customer Churn Based on Deep Forest . . . . . . 479


Danni Liu, Xinfeng Zhang, Yongle Shi, and Hui Li

Multi-view of Data for Auto Judge Model in Online Dispute Resolution . . . . 490
Qinhua Huang and Weimin Ouyang

Multi-task Learning with Riemannian Optimization . . . . . . . . . . . . . . . . . . . 499


Tian Cai, Liang Song, Guilin Li, and Minghong Liao

Audio-Visual Salient Object Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510


Shuaiyang Cheng, Liang Song, Jingjing Tang, and Shihui Guo

Research on Deep Neural Network Model Compression Based


on Quantification Pruning and Huffmann Encoding . . . . . . . . . . . . . . . . . . . 522
Cong Wei, Zhiyong Lu, Zhiyong Lin, and Chong Zhong

Extreme Learning Machine Based on Double Kernel Risk-Sensitive Loss


for Cancer Samples Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
Zhen-Xin Niu, Liang-Rui Ren, Rong Zhu, Xiang-Zhen Kong,
Ying-Lian Gao, and Jin-Xing Liu
Contents – Part II xxix

Delay to Group in Food Delivery System: A Prediction Approach . . . . . . . . 540


Yang Yu, Qingte Zhou, Shenglin Yi, Huanyu Zheng, Shengyao Wang,
Jinghua Hao, Renqing He, and Zhizhao Sun

Variational EM Algorithm for Student-t Mixtures of Gaussian Processes . . . . 552


Xiangyang Guo, Xiaoyan Li, and Jinwen Ma

Ensemble Learning with Resampling for Imbalanced Data . . . . . . . . . . . . . . 564


Firuz Kamalov, Ashraf Elnagar, and Ho Hon Leung

Dual-Channel Recalibration and Feature Fusion Method for Liver


Image Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Tingting Niu, Xiaolong Zhang, Chunhua Deng, and Ruoqin Chen

Research on Path Planning Algorithm for Mobile Robot Based on Improved


Reinforcement Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Junwei Liu, Aihua Zhang, and Yang Zhang

OnSum: Extractive Single Document Summarization Using Ordered


Neuron LSTM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Xue Han, Qing Wang, Zhanheng Chen, Lun Hu, and Pengwei Hu

Diagnosing COVID-19 on Limited Data: A Comparative Study of Machine


Learning Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Rita Zgheib, Firuz Kamalov, Ghazar Chahbandarian,
and Osman El Labban

An Inverse QSAR Method Based on Decision Tree


and Integer Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
Kouki Tanaka, Jianshen Zhu, Naveed Ahmed Azam, Kazuya Haraguchi,
Liang Zhao, Hiroshi Nagamochi, and Tatsuya Akutsu

A Link-Based Ensemble Cluster Approach for Identification


of Cell Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Xinguo Lu, Yan Gao, Daoxu Tang, and Yue Yuan

A Defect Detection Method for Diverse Texture Fabric Based


on CenterNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Wenjing Kong, Huanhuan Zhang, Junfeng Jing, and Mingyang Shi

Accelerating Deep Reinforcement Learning via Hierarchical State Encoding


with ELMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Tao Tang, Qiang Fang, Xin Xu, and Yujun Zeng

Mal_PCASVM: Malonylation Residues Classification with Principal


Component Analysis Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . 681
Tong Meng, Yuehui Chen, Wenzheng Bao, and Yi Cao
xxx Contents – Part II

Theoretical Computational Intelligence and Applications

The Influence of Sliding Windows Based on MM-6mAPred to Identify


DNA N6-Methyladenine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Wenzhen Fu, Yixin Zhong, Wenzheng Bao, and Yi Cao

RF_Bert: A Classification Model of Golgi Apparatus Based


on TAPE_BERT Extraction Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Qingyu Cui, Wenzheng Bao, Yi Cao, Bin Yang, and Yuehui Chen

PointPAVGG: An Incremental Algorithm for Extraction of Points’


Positional Feature Using VGG on Point Clouds . . . . . . . . . . . . . . . . . . . . . 718
Yanzhao Shi, Chongyu Zhang, Xiaohui Zhang, Kai Wang,
Yumeng Zhang, and Xiuyang Zhao

Predicting Course Score for Undergrade Students Using Neural Networks . . . 732
Ming Liu, Zhuohui Li, Runyuan Sun, and Na Zhang

Classification of Heart Sounds Using MFCC and CNN . . . . . . . . . . . . . . . . 745


Kai Wang and Kang Chen

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757


Contents – Part III

Artificial Intelligence in Real World Applications

Task-Oriented Snapshot Network Construction of Stock Market . . . . . . . . . . 3


Jiancheng Sun, Yunfan Hu, Zhinan Wu, Huimin Niu, and Si Chen

Analysis of Elimination Algorithm Based on Curve Self-intersection . . . . . . . 12


Qingyue Bai and Junrui Yue

Towards AI-Based Reaction and Mitigation for e-Commerce - the


ENSURESEC Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Marek Pawlicki, Rafał Kozik, Damian Puchalski, and Michał Choraś

Arabic Light Stemmer Based on ISRI Stemmer . . . . . . . . . . . . . . . . . . . . . 32


Dhafar Hamed Abd, Wasiq Khan, Khudhair Abed Thamer,
and Abir J. Hussain

Biomedical Informatics Theory and Methods

Predicting miRNA-Disease Associations via a New MeSH Headings


Representation of Diseases and eXtreme Gradient Boosting . . . . . . . . . . . . . 49
Bo-Ya Ji, Zhu-Hong You, Lei Wang, Leon Wong, Xiao-Rui Su,
and Bo-Wei Zhao

Social Media Adverse Drug Reaction Detection Based on Bi-LSTM


with Multi-head Attention Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Xuqi Wang, Wenzhun Huang, and Shanwen Zhang

HOMC: A Hierarchical Clustering Algorithm Based on Optimal Low Rank


Matrix Completion for Single Cell Analysis . . . . . . . . . . . . . . . . . . . . . . . . 66
Xiaoqing Cheng, Chang Yan, Hao Jiang, and Yushan Qiu

mzMD: A New Storage and Retrieval System for Mass


Spectrometry Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Runmin Yang, Jingjing Ma, Shu Zhang, Yu Zheng, Lusheng Wang,
and Daming Zhu

Drug-Target Interaction Prediction via Multiple Output Graph


Convolutional Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Qing Ye, Xiaolong Zhang, and Xiaoli Lin
xxxii Contents – Part III

Inversion of k-Nearest Neighbours Algorithm for Extracting SNPs


Discriminating Human Populations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Haihua Gu and Xiaojun Ding

ComPAT: A Comprehensive Pathway Analysis Tools . . . . . . . . . . . . . . . . . 109


Xiaojie Su, Chao Song, Chenchen Feng, Yu Gao, Ziyu Ning,
Qiuyu Wang, Jiaxin Chen, Yuexin Zhang, Ling Wei, Xinyuan Zhou,
and Chunquan Li

Incorporating Knowledge Base for Deep Classification of Fetal


Heart Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Changping Ji, Min Fang, Jie Chen, Muhammad Umair Raza,
and Jianqiang Li

Review of Methods for Data Collection Experiments with People


with Dementia and the Impact of COVID-19 . . . . . . . . . . . . . . . . . . . . . . . 132
Matthew Harper, Fawaz Ghali, Abir Hussain, and Dhiya Al-Jumeily

KGRN: Knowledge Graph Relational Path Network for Target Prediction


of TCM Prescriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Zhuo Gong, Naixin Zhang, and Jieyue He

Challenges in Data Capturing and Collection for Physiological Detection


of Dementia-Related Difficulties and Proposed Solutions . . . . . . . . . . . . . . . 162
Matthew Harper, Fawaz Ghali, Abir Hussain, and Dhiya Al-Jumeily

Exploring Multi-scale Temporal and Spectral CSP Feature for Multi-class


Motion Imagination Task Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Jian-Xun Mi, Rong-Feng Li, and Guo Chen

Gingivitis Detection by Wavelet Energy Entropy and Linear


Regression Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Yan Yan

Decomposition-and-Fusion Network for HE-Stained Pathological


Image Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Rui Yan, Jintao Li, S. Kevin Zhou, Zhilong Lv, Xueyuan Zhang,
Xiaosong Rao, Chunhou Zheng, Fei Ren, and Fa Zhang

Complex Diseases Informatics

A Novel Approach for Predicting Microbe-Disease Associations


by Structural Perturbation Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Yue Liu and Shu-Lin Wang
Contents – Part III xxxiii

A Reinforcement Learning-Based Model for Human MicroRNA-Disease


Association Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Linqian Cui, You Lu, Qiming Fu, Jiacheng Sun, Xiao Xu, Yijie Ding,
and Hongjie Wu

Delineating QSAR Descriptors to Explore the Inherent Properties


of Naturally Occurring Polyphenols, Responsible for Alpha-Synuclein
Amyloid Disaggregation Scheming Towards Effective Therapeutics
Against Parkinson’s Disorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Chandrasekhar Gopalakrishnan, Caixia Xu, Pengyong Han,
Rajasekaran Ramalingam, and Zhengwei Li

Study on the Mechanism of Cistanche in the Treatment of Colorectal


Cancer Based on Network Pharmacology . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Yuan Dong, Caixia Xu, Chenxia Ren, Pengyong Han, Fei Ren,
Zhengwei Li, and Zibai Wei

A Novel Hybrid Machine Learning Approach Using Deep Learning


for the Prediction of Alzheimer Disease Using Genome Data . . . . . . . . . . . . 253
A. Alatrany, A. Hussain, J. Mustafina, and D. Al-Jumeily

Prediction of Heart Disease Probability Based on Various Body Function . . . 267


Wentian Yin, Yanwen Yao, Yujian Gu, Wenzheng Bao,
and Honglin Cheng

Classification of Pulmonary Diseases from X-ray Images Using


a Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Adrian Trueba Espinosa, Jessica Sánchez-Arrazola, Jair Cervantes,
and Farid García-Lamont

Predicting LncRNA-Disease Associations Based on Tensor


Decomposition Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Xinguo Lu, Yue Yuan, Guanyuan Chen, Jinxin Li, and Kaibao Jiang

AI in Skin Cancer Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301


Haya Al-Askar, Rasul Almurshedi, Jamila Mustafina, Dhiya Al-Jumeily,
and Abir Hussain

miRNA-Disease Associations Prediction Based on Neural


Tensor Decomposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Yi Liu, Jiawei Luo, and Hao Wu

Gene Regulation Modeling and Analysis

SHDC: A Method of Similarity Measurement Using Heat Kernel Based


on Denoising for Clustering scRNA-seq Data . . . . . . . . . . . . . . . . . . . . . . . 327
Jian-ping Zhao, Hai-yun Wang, and Chun-Hou Zheng
xxxiv Contents – Part III

Research on RNA Secondary Structure Prediction Based on MLP. . . . . . . . . 336


Weizhong Lu, Xiaoyi Chen, Yu Zhang, Hongjie Wu, Jiawei Shen,
Nan Zhou, and Yijie Ding

Inference of Gene Regulatory Network from Time Series Expression Data


by Combining Local Geometric Similarity and Multivariate Regression . . . . . 345
Guangyi Chen and Zhi-Ping Liu

Deep Convolution Recurrent Neural Network for Predicting RNA-Protein


Binding Preference in mRNA UTR Region . . . . . . . . . . . . . . . . . . . . . . . . 356
Zhen Shen, YanLing Shao, and Lin Yuan

Joint Association Analysis Method to Predict Genes Related


to Liver Cancer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Lin Yuan and Zhen Shen

A Hybrid Deep Neural Network for the Prediction of In-Vivo Protein-DNA


Binding by Combining Multiple-Instance Learning . . . . . . . . . . . . . . . . . . . 374
Yue Zhang, Yuehui Chen, Wenzheng Bao, and Yi Cao

Using Deep Learning to Predict Transcription Factor Binding Sites


Combining Raw DNA Sequence, Evolutionary Information and
Epigenomic Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Youhong Xu, Qinghu Zhang, Zhanheng Chen, Changan Yuan, Xiao Qin,
and Hongjie Wu

An Abnormal Gene Detection Method Based on Selene. . . . . . . . . . . . . . . . 396


Qiang Zhang and Yizhang Jiang

A Method for Constructing an Integrative Network of Competing


Endogenous RNAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Seokwoo Lee, Wook Lee, Shulei Ren, and Kyungsook Han

Intelligent Computing in Computational Biology

Detection of Drug-Drug Interactions Through Knowledge Graph


Integrating Multi-attention with Capsule Network . . . . . . . . . . . . . . . . . . . . 423
Xiao-Rui Su, Zhu-Hong You, Hai-Cheng Yi, and Bo-Wei Zhao

SCEC: A Novel Single-Cell Classification Method Based on Cell-Pair


Ensemble Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Wei Fan, Haonan Peng, Siyin Luo, Chujie Fang, and Yuanyuan Li

ICNNMDA: An Improved Convolutional Neural Network


for Predicting MiRNA-Disease Associations . . . . . . . . . . . . . . . . . . . . . . . . 445
Rui-Kang Ni, Zhen Gao, and Cun-Mei Ji
Contents – Part III xxxv

DNA-GCN: Graph Convolutional Networks for Predicting


DNA-Protein Binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Yuhang Guo, Xiao Luo, Liang Chen, and Minghua Deng

Weighted Nonnegative Matrix Factorization Based on Multi-source Fusion


Information for Predicting CircRNA-Disease Associations . . . . . . . . . . . . . . 467
Meineng Wang, Xuejun Xie, Zhuhong You, Leon Wong, Liping Li,
and Zhanheng Chen

ScSSC: Semi-supervised Single Cell Clustering Based on 2D Embedding . . . 478


Naile Shi, Yulin Wu, Linlin Du, Bo Liu, Yadong Wang, and Junyi Li

SNEMO: Spectral Clustering Based on the Neighborhood


for Multi-omics Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Qi Guan, Jianping Zhao, and Chunhou Zheng

Covid-19 Detection by Wavelet Entropy and Jaya . . . . . . . . . . . . . . . . . . . . 499


Wei Wang

An Ensemble Learning Algorithm for Predicting HIV-1 Protease


Cleavage Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Zhenfeng Li, Pengwei Hu, and Lun Hu

RWRNCP: Random Walking with Restart Based Network Consistency


Projection for Predicting miRNA-Disease Association . . . . . . . . . . . . . . . . . 522
Ming-Wen Zhang, Yu-Tian Wang, Zhen Gao, Lei Li, Jian-Cheng Ni,
and Chun-Hou Zheng

MELPMDA: A New Method Based on Matrix Enhancement and Label


Propagation for Predicting miRNA-Disease Association . . . . . . . . . . . . . . . . 536
Zhen-Wei Zhang, Zhen Gao, Chun-Hou Zheng, Yu-Tian Wang,
and Su-Min Qi

Prognostic Prediction for Non-small-Cell Lung Cancer Based on Deep


Neural Network and Multimodal Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Zhong-Si Zhang, Fei Xu, Han-Jing Jiang, and Zhan-Heng Chen

Drug-Target Interactions Prediction with Feature Extraction Strategy Based


on Graph Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
Aoxing Li, Xiaoli Lin, Minqi Xu, and Haiping Yu

CNNEMS: Using Convolutional Neural Networks to Predict Drug-Target


Interactions by Combining Protein Evolution and Molecular
Structures Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Xin Yan, Zhu-Hong You, Lei Wang, and Peng-Peng Chen
xxxvi Contents – Part III

A Multi-graph Deep Learning Model for Predicting


Drug-Disease Associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Bo-Wei Zhao, Zhu-Hong You, Lun Hu, Leon Wong, Bo-Ya Ji,
and Ping Zhang

Predicting Drug-Disease Associations Based on Network


Consistency Projection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Qiang Zhang, Zonglan Zuo, Rui Yan, Chunhou Zheng, and Fa Zhang

An Efficient Computational Method to Predict Drug-Target Interactions


Utilizing Matrix Completion and Linear Optimization Method . . . . . . . . . . . 603
Xinguo Lu, Fang Liu, Jinxin Li, Keren He, Kaibao Jiang,
and Changlong Gu

Protein Structure and Function Prediction

Protein-Protein Interaction Prediction by Integrating Sequence Information


and Heterogeneous Network Representation . . . . . . . . . . . . . . . . . . . . . . . . 617
Xiao-Rui Su, Zhu-Hong You, Zhan-Heng Chen, Hai-Cheng Yi,
and Zhen-Hao Guo

DNA-Binding Protein Prediction Based on Deep Learning Feature Fusion . . . 627


Shixuan Guan, Tengsheng Jiang, Weizhong Lu, Qiming Fu, Haiou Li,
and Hongjie Wu

Membrane Protein Identification via Multiple Kernel Fuzzy SVM . . . . . . . . . 634


Weizhong Lu, Jiawei Shen, Yuqing Qian, Hongjie Wu, Yijie Ding,
and Xiaoyi Chen

Golgi Protein Prediction with Deep Forest . . . . . . . . . . . . . . . . . . . . . . . . . 647


Yanwen Yao, Yujian Gu, Wenzheng Bao, Lei Zhang, and Yonghong Zhu

Prediction of Protein-Protein Interaction Based on Deep Learning Feature


Representation and Random Forest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Wenzheng Ma, Wenzheng Bao, Yi Cao, Bin Yang, and Yuehui Chen

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663


Evolutionary Computation
and Learning
Multi-objective Optimization-Based Task
Offloading and Power Control for Mobile Edge
Computing

Yidan Chen, Xueyi Wang, Lianbo Ma(B) , and Ping Zhou

Northeastern University, Shenyang 110169, China

Abstract. With the rapid development of technologies such as IoT and 5G, the
Internet industry has undergone significant changes and posed new challenges to
the traditional computing model. Mobile edge computing (MEC) is considered as
an effective solution to the challenge. However, as mobile devices generally have
limited computing power and battery storage to cope with the increasing latency-
sensitive and computationally intensive tasks, how to allocate computation and
communication resources in the edge cloud to improve the quality of service
(QoS) for mobile users is a challenging research. In this paper, we first formulate
the optimization model of multi-user offloading and transmitted power control,
aiming to reduce the energy consumption, task delay and price cost of mobile
devices in a multi-channel wireless interference environment. Then we propose a
multi-objective optimization algorithm based on theoretical analysis of the model
and design a multi-objective offloading strategy based on NSGA-II. Our approach
is able to obtain best trade-off among energy consumption, task delay and price.
Experimental results on test instances shows the effectiveness and efficiency of
our proposed algorithm.

Keywords: Mobile edge computing · Task offloading · Multi-objective


optimization · Genetic algorithm · Hybrid coding · NSGA - II

1 Introduction
In recent years, cloud computing and wireless communication technologies have made
rapid progress. With the continuous growth of devices connected to wireless networks,
a large amount of data has been generated along the network edge [1]. At the same time,
with the evolution of innovative applications such as face recognition [2], intelligent
driving [3] and virtual reality [4], users have also put forward higher demands for service
quality. The majority of these applications are high energy computation, computation-
intensive and latency-sensitive [5], which are hard to accomplish on mobile devices
with limited computing power and battery storage. This greatly limits the development
of emerging industries.
Mobile cloud computing (MCC) systems have been proposed to address the compu-
tational power issue so that mobile devices can make the most of the strong computing
power of cloud to reduce the local computational pressure, resulting in lower latency of

© Springer Nature Switzerland AG 2021


D.-S. Huang et al. (Eds.): ICIC 2021, LNCS 12836, pp. 3–17, 2021.
https://doi.org/10.1007/978-3-030-84522-3_1
4 Y. Chen et al.

task execution [6]. However, geographic location and network condition can also cause
high latency during data transmission, and those latency-sensitive tasks such as work-
flow applications are likely to be impossible to complete. To further reduce latency and
ensure these tasks can be executed smoothly, fog computing [7–9] has been proposed as
a new research area. Cisco defines that fog computing as complementing cloud comput-
ing can migrate tasks to execute in the network edge. Edge computing is similar to fog
computing, their terms are usually used interchangeably. MEC has received a high level
of attention in recent years, and it reduces task latency and local energy consumption of
mobile devices by building edge servers between the cloud and edge devices [10–12].
However, there are still many challenges in designing effective MEC systems [13].
To maximize the efficacy of the MEC system, we need to consider which user tasks
should be offloaded to the edge and also decide on the optimal transmission power for
offloading. In addition, the energy consumption, time delays and possible additional
costs of task execution in the edge cloud also need to be considered in the system
design. Most of the existing MEC methods focus on the study of a single objective and
rarely consider multi-objective optimization. Swarm intelligence algorithms such as ant
colony algorithm [14], bee colony algorithm [15] bring new ideas to solve multi-objective
optimization problems.
Therefore, we detailed study the above problems and propose an efficient computa-
tion offloading scheme in MEC, while the corresponding optimal transmission power is
given. Our main contributions include:

• We jointly consider two problems of computation offloading and transmitted power


control. The former of these is an integer programming and the latter is linear
programming.
• We ensure that the energy consumption, time delay and cost in MEC are kept at
the lowest level, which greatly enhances the user experience and satisfies the user
psychology.
• We propose a multi-objective evolutionary optimization algorithm based on NSGA-
II to solve this joint optimization problem. Extensive simulations and comparative
experiments have shown that our algorithm can provide a superior offloading strategy
and transmitted power for mobile users.

The rest of this paper is organized as follows. In Sect. 2 we summarize the rele-
vant work. Section 3 describes the system model. Then, we propose the multi-objective
computation offloading and transmitted power algorithm in Sect. 4. Section 5 gives
simulation study to verify the performance of our proposed algorithm. Finally, Sect. 6
outlines the conclusion and describes our future work.

2 Related Work

In recent years, researchers have proposed multiple offloading schemes. Some of these
studies focus on minimizing energy consumption. [16] proposed a joint radio resource
allocation and offloading decision optimization to minimize the energy consumption.
Xu et al. [17] considered data compression while solving the computation offloading and
Multi-objective Optimization-Based Task Offloading 5

resource allocation problems to optimize the energy consumption. Yu et al. [18] proposed
a novel mobile-aware partial offloading algorithm to dynamically calculate the amount
of offloaded data using short-term mobile user’s movement prediction, which minimizes
the energy consumption while satisfying the delay constraint. Zhang et al. [19] schedule
mobile services based on the particle swarm optimization algorithm (PSO) to minimize
the total energy consumption of mobile devices.
Similarly, certain studies have worked on minimizing task latency. The delay mini-
mization problem in a multi-user system with communication resources and computation
resources allocation was studied by Ren et al. [20]. [21] given extra consideration to the
problem of user mobility to minimize the task delay in MEC.
Some studies also consider energy consumption and task latency at the same time, but
these studies tend to combine the two sub-problems into a single problem. [22] exploited
the finite property of sensors to minimize processing delays and energy consumption
of tasks in IoT. Since the wireless communication situation can have an impact on
the data transmission process, Liu et al. [23] considered transmission power control
while designing the offloading decision. Similar to the above, [24] proposed solutions
in ultra-dense networks [25].
With the rapid development of multi-objective evolutionary optimization algorithms
[26], these are often used to solve practical application problems. A multi-objective
computation offloading approach was designed in [27] for workflow applications. In
[28], an evolutionary algorithm is designed to find the best trade-offs between energy
consumption and task processing delay. The optimization of joint energy consumption,
processing delay, and price cost are further discussed in [29]. However, none of them
consider the impact of transmission power on system performance.

3 System Model

In this section, we first introduce the MEC model as illustrated in Fig. 1. We assume that
system consists of N mobile devices and one edge could server located at the edge of
the network such as a radio base station, where each mobile device has a computation-
intensive task waiting to be processed. These tasks can be performed locally or offloaded
to the adjacent edge cloud. Next, the communication model, the computation model and
the cost model are detailed described.

3.1 Network Model

Let U = {u1 , u2 , · · · , uN } be the set of mobile devices. Tn = (sn , cn , tn ) denotes the


task of user, where sn represents the size of the task Tn , i.e., the input data and associated
processing code, cn represents computation amount of the task Tn (e.g., the CPU cycles
needed in total to accomplish the task), and tn represents the maximum acceptable
delay in completing the task. The actual execution time of the task must not exceed the
maximum limit given. We describe the edge cloud as b, which has better computing
power and storage space than mobile devices.
6 Y. Chen et al.

Mobile Edge Cloud

Mobile Devices
Fig. 1. Illustration of the multi-user MEC system in a multi-channel wireless environment.

3.2 Communication Model


Similar to many earlier studies such as [23] and [24], we divide the channel bandwidth
B into M orthogonal sub-channels, denoted by SC = {1, 2, . . . , M }. Mobile devices can
select any sub-channel to offload their task to the edge cloud, or choose to execute it
locally. Let xn = {0, 1} stand for the offloading decision variable of the user un , xn = 0
denotes that the user un selects to solve the task locally, and xn = 1 shows the task should
be offloaded through selected sub-channel scn ∈ SC. Transmission power of the mobile
user un during offloading is denoted by yn . Let hn stands for the channel gain between
the user un and the edge cloud.
When xn = 1, the user uplink data rate can be expressed as follows:
yn hn
rnul = B log2 (1 +  ) (1)
σ2 + i∈U \{n}:sci =scn yi hi

where σ 2 denotes the background noise power. When mobile user un choose to compute
the task locally, the transmission power should be denoted by yn = 0, there is no need
to allocate the transmission power. From the above formula, we can see that as the
transmitted power yn increases, the uplink data rate rul n increases accordingly. However,

if the yn is too large, it will cause interference to other user tasks transmitted through the
same sub-channel.
Then the transmitted delay of mobile user un during offloading can be given by:
sn
tnt = (2)
rnul
Multi-objective Optimization-Based Task Offloading 7

Likewise, we can express the transmitted energy consumption of user un by:


yn sn
εnt = ul (3)
rn
Because the size of the result of user tasks calculation is typically smaller than the
offloaded data [23], the transmitted delay of the processing results is ignored.

3.3 Computation Model


The user can decide whether to perform its task locally or in the edge based on the local
hardware and current network environment.
Local Computing. Let fnL denotes the computation capability of user un , its size
depends on the local computation capability. The local execution time of computation
task Tn can be represented as:
cn
tnexe,L = L (4)
fn
In addition to execution latency, the energy consumption in local computing is also
a very important measurement in MEC systems. According to [26], the energy con-
sumption for a CPU cycle can be expressed as κ(fnL )2 , where κ is a coefficient related
to the hardware architecture. So, the energy consumption during local execution of
computation task Tn can be represented as:
εnexe,L = κ(fnL )2 cn (5)
in order to simplify the notation, we write κ(fnL )2 as ρn , so the above equation can be
simplified as εnexe,L = ρn cn .
From (4) and (5), we can discover there is the higher CPU computing capability
fnL of this task Tn , the shorter execution delay of the task Tn , but the higher the local
energy consumption. Given the limited energy stored locally on mobile devices, exces-
sive energy consumption may make the user experience worse. It is therefore necessary
to offload computation-intensive tasks to the edge cloud for execution.
Mobile Edge Computing. For mobile edge computing, we describe the allocated com-
puting resource from b to user un as fnC . Then the edge cloud execution delay can be
given by:
cn
tnexe,C = C (6)
fn

3.4 Cost Model


If the mobile user un offload its task to b for execution, it must pay to the edge cloud
providers, with the cost denoted by rn , and if not, it will not have to pay this price. As
shown below:

0 xn = 0
rn = (7)
d xn = 1
8 Y. Chen et al.

4 Multi-objective Computation Offloading Algorithm Based


on NSGA-II in MEC (MOPCA)

In this section, we demonstrate a scheme which considers computation resource and


communication resource allocation of the edge cloud b. Firstly, we formulate a multi-
objective optimization problem with constraints, then give the basic steps of the
computation offloading method.

4.1 Objective Functions

Aiming at the limited wireless communication resources in the system, the limited battery
storage and the limited computing resources in mobile devices. We mainly study the
following three problems:

1. Task Placement Problem. We need to determine whether the mobile users’ tasks will
be executed locally or offloaded to the edge cloud. This is a binary decision problem.
2. Resource Allocation Problem. When the mobile user decides to offload, we have to
determine how the edge cloud allocates communication resources and computation
resources.
3. Transmission Power Control Problem. When the mobile user decides to offload, we
have to determine how the mobile device determines the appropriate transmission
power.

The objective of joint optimization problem is to minimize the energy consumption


and task delay of mobile devices, as well as the total cost with meeting these constraints.
It can be formulated by:


N
minimize E= [(1 − xi )εiexe,L + xi εit ] (8a)
i=1


N
minimize T= [(1 − xi )tiexe,L + xi tit + xi tiexe,C ] (8b)
i=1


N
minimize C= [xi ri ] (8c)
i=1

subject to xi ∈ {0, 1}, ∀i = 1, . . . , N . (8d)

0 ≤ yi ≤ pmax , ∀i = 1, . . . , N . (8e)

sci ∈ {1, 2, · · · , M }, ∀i = 1, . . . , N . (8f)

yi = 0, ∀xi = 0. (8g)
Multi-objective Optimization-Based Task Offloading 9

Di ≤ ti , ∀i = 1, . . . , N . (8h)

where pmax stand for the maximum transmission power, and Dn = (1−xn )tnexe,L +xn tnt +
xn tnexe,C denotes the task delay spent on the actual execution of task Tn . We let E define
the energy consumption of mobile devices, let T define the computation delay of task,
and use C define the total cost of all mobile users. It’s worth noting that each task’s time
delay for completion must not exceed its given upper limit.
The joint optimization problem is a multi-objective hybrid coding problem, and is
difficult to solve directly. In what follow, we utilize NSGA-II [30] to solve this problem.
Multi-objective optimization algorithms have advantages in solving large-scale high-
dimensional problems [31]. Compared with other multi-objective genetic algorithms,
NSGA-II has the advantages of fast operation and good convergence of the solution set.

4.2 The Main Steps of MOPCA

We design the MOPCA method in Algorithm 1. The populations are first generated
randomly and calculated the fitness functions. Then, fast non-dominated sorting is used
to stratify the individuals, and then the crowding distance of each individual is calculated
to better distinguish the individuals’ strengths and weaknesses. Finally, we generate
new populations by binary tournament selection, crossover and mutation operations,
after several iterations, until the termination condition is satisfied, which are described
below:

Encoding. In this paper, genes in genetic algorithm stand for the offloading strategy for
computational tasks, and multiple genes make up a complete individual, representing a
solution to the optimization problem. In order to simultaneously consider the sub-channel
selection during task offloading, for encoding we combine the offloading decision and
channel selection into a single integer encoding, denoted by xn = {0} ∪ SC in the range
of {0, 1, · · · , M }, and the corresponding power variable yn is a floating point variable in
[0, pmax ], a hybrid coding is used for the above two variables. The hybrid encoded gene
string contains two types of variables, which is encoded as shown in Fig. 2. The former
is coded in integer and the latter is coded in floating point, as shown by V = [xn , yn ]. A
set of candidate solutions constitutes (individuals) a population.

0 1 ... M floating point

xn yn
Fig. 2. Gene string by hybrid coding.
10 Y. Chen et al.

Fitness Functions and Constraints. The Fitness functions are the indicators used to
determine the degree of merit of individuals in a group and is indicated by the formulas
(8a), (8b) and (8c). The three equations represent the energy consumption, the total
latency, and the total cost of mobile devices, respectively. Constraints are given by (8d),
(8e), (8f), (8g) and (8h). This means that the actual completion delay of a task cannot
exceed the upper limit of the delay for that task, while the transmission power cannot
exceed the maximum value for that mobile device.

Initialization. In NSGA-II, an initial population P0 with population size Npop is first


generated randomly according to the designed genetic coding, and parameters such as
the number of iterations, crossover probability and mutation probability are determined.
To speed up convergence, tasks in mobile devices with low local processing power are
executed at the edge as much as possible during initialization in our approach (Line 1).

Fast Non-dominated Sorting. Fast non-dominance sorting refers to the stratification of


populations based on the level of non-inferior solutions of individuals in the population.
The specific process is traversing the entire population, with the number of dominated
individuals per individual and the set of solutions dominated by that individual calculated
until the population rank is fully divided (Line 5).

Crowding Distance Calculation. In order to be able to sort individuals in the same


layer, the crowding distance of each individual needs to be calculated. The crowding
distance can be found by calculating the sum of the distance differences between two
individuals adjacent to it on each sub-objective function, as given by:


F
P[i]dis tan ce = P[i]E + P[i]T + P[i]C = (|E[i + 1] − E[i − 1]|)
f =1
(9)

F 
F
+ (|T [i + 1] − T [i − 1]|) + (|C[i + 1] − C[i − 1]|)
f =1 f =1

where E[i+1], T [i+1] and C[i+1] represent the offloading strategy si+1 to the functions
(8a), (8b) and (8c), respectively.

Elitist Retention Strategy. To prevent the Pareto optimal individuals of the current
population from being lost in the next generation, resulting in the genetic algorithm
not converging to the global optimal solution, an elitist retention strategy is used. First,
the parent population Ci and the offspring population Di are synthesized into a new
population Ri (Line 4). Then the whole layer is put into the parent population Ci+1 in
the order from lowest to highest according to the Pareto rank until the individuals in a
certain layer cannot all be put in (Line 6–9), subsequently, they are arranged in order
from largest according to the crowding distance of the individuals and put into the parent
population Ci+1 in turn until Ci+1 is filled (Line 10–12).

Selection, Crossover and Mutation. Using binary tournaments as a method of select-


ing operations. The detailed steps are to first select half of the Npop individuals at random,
Another random document with
no related content on Scribd:
THE INDIAN AT HOME

An Indian in his native costume is a subject artists are glad to paint,—


tanned buckskin trousers with the buckskin fringe down the outside
seams; buckskin moccasins with colored porcupine quills neatly
woven into the leather in regular patterns, and a heavy blanket or
buffalo robe over his shoulders, hanging nearly to the ground. But the
paint upon his face is his chief pride.

A traveler, in 1835, was taking a trip up the Mississippi. He espied an


Indian on the forward deck who was making his toilet, apparently
unaware that a paleface was watching the process.

The traveler gives this account: “The Indian had secured at Fort
Snelling, near St. Paul, a bit of broken looking-glass, and there he sat
on deck, painting his face and neck. A daub of the brightest red paint
went down the line marking the parting of his hair. [32]

“He worried and worked as much over the daubs on his cheeks as
some very civilized girls would over a naughty curl. First, a daub of
yellow with red at the edge; then red on the yellow, and yellow on the
red, until his eye was satisfied.

“In the tuft of hair on his crown he stuck an eagle feather; the mirror
showed it was not in a becoming place. Out it came and was poised
at a different angle. Still, it was not just the style he wanted, and out it
came again. At last it stood straight up, and the dandy finished his
toilet.

“Such a self-satisfied air did he put on when paint, feather, and


blanket had been arranged to his liking! Perhaps some daughter of
the Dakotas was the cause of all this patient study of the art of
dressing; but I cannot dream of Hiawatha ever belittling himself to
take so long a time with feathers and paint.”

It seemed strange to the traveler for the Indian to take so much pains
with the colors of paint and the place where he put them upon his
face, but it is now known that each color has its meaning with them.
The Indians paint their faces very differently when they are going on the warpath. The warriors of
each nation have their own fashion of painting their faces and bodies.

The war chiefs have a very noble look when they come out with their feather war bonnets
reaching from [33]the crowns of their heads down to their feet. Their bearing is dignified; their
faces are earnest and solemn; and each one treads the earth as a king.
Indian women are sometimes very handsome when young; but the quantity of colored earth they
use as paint does not hide half the dirt upon their faces. They wear blankets and buckskin skirts,
and make a pretty picture if the wigwam is in the background. Many of the babies have a
decidedly Japanese look and are attractive little creatures, as babies are apt to be.

The Indian squaw is a good helpmate to her husband. His work is to hunt; her work is at home in
the teepee, where he can find rest and food after his hunting. An Indian brave will not do his
squaw’s work, and his squaw does not wish her brave to be different from other men.

The Indian pony seems like a part of the family. He is not petted nor fed like the Arabian horse,
but is just as necessary to his master’s happiness. Indian ponies know what little food and what
no food mean. The rank prairie grass is usually easy for them to get, but sometimes it is burned
off. The pony must search for his own food in summer or winter.

The Indian pony or cayuse sometimes carries a load under which a donkey could hardly move;
but he takes his own gait, and keeps it too. He is suited by [34]inherited years of hard work to his
master and his home. The Indian pony is thought to be descended from the horses brought to
America by the Spanish explorers.

The dogs belonging to an Indian camp or village are numerous and often nearly starved.
Whenever a stranger makes his appearance, his coming is announced by furious barks and
howls of these hungry sentinels. The white hunter has reason to dread the attacks of these dogs,
for they are much like the coyotes and wolves of the forests. Unless his gun is ready, or their
masters call them back, it is usually best for the stranger to find refuge in a tree; but the braves,
squaws, and children give the white visitor a kind welcome as soon as they know that his visit is
friendly. [35]

[Contents]
MEANING OF INDIAN TOTEMS AND NAMES

An Indian, while hunting, followed a bear a long way into the forest. The rain
came and he was lost, so he cut the bark from a tree and made with his
tomahawk a picture of a fox. He put a ring under one foot in the picture. He
belonged to the Fox tribe and had been lost one day. He made more such
marks on the trees as he went on.

Another hunter from the same tribe found him after three days. He had
trailed him by the little marks on the trees; by bent twigs and branches; by
his footprints in the mud or sand. He knew the lost one was very weak and
hungry, for the last fox picture had three circles to show that he had been
lost three days, and other marks to show that he had shot nothing. An
untrained white hunter would not have seen one sign of the lost Indian. [36]

If the Fox Indian had been asked why he used the fox picture, he would
have said, if ready to talk: “My grandfather was a fox.” This would mean to
us that his totem or first ancestor was a fox.

Other tribes believe they are descended from bears, wolves, cranes, or
other creatures. They nearly all have their totems, or sign-pictures. We write
our names with letters; they use pictures. It is their coat-of-arms. Our
names also have meanings.

The tall, curiously carved totem poles of Alaska are really carved family
histories. Where two or more animals are pictured on one pole it shows the
marriage or other union of different bands to which the family belongs.
These totem poles are usually put up before each native house. The
natives will not sell them, for they are valuable family records.

A Dakota warrior shot an arrow into the sky; the clouds parted just as his
arrow turned to fall. He was thought to have shot the clouds; he was called
Hole-in-the-sky.

Old Chief Sleepy-eye had a bright mind, but his eyelids did not serve him
well; hence his name.

In some tribes the little ones are named after the first object that is seen, as
Buffalo Horn, White Pony, Lame Dog, and names that are sometimes better but more often seem
to us not so good.
Alaskan Totem Poles

From a Photograph

The Sioux have names for their boys or girls [38]according to their order of birth. The first boy is
called Chaska, until by some feat of bravery he changes it himself. The second son is Harpam;
his next brother is Hapeda; the fourth son is Chatun; and the fifth boy has the name of Harka all
ready for him.

The first girl has the musical name of Winona, and her next younger sister takes the name of
Harpan. Harpstena will be the name of the third girl baby. Waska and Weharka are for the fourth
and fifth girls of a family, and other names are provided for a greater number of children.
The Indians have titles and descriptive names for the white people whom they know. A certain
military surgeon who has been among them and has keen, dark eyes and gray hair is always
called Gray Eagle. Their senses are trained to observe very keenly, and they quickly know each
person. Perhaps the paleface might be startled if he understood the name they gave him.

Some Indian tribes call the horse Foot-with-one-toe. Few white Americans would have noticed
the horse’s foot so closely. [39]

[Contents]
THE INDIAN NAMES FOR THE MONTHS OR MOONS

he moon goes through its changes from new


moon to new moon in twenty-eight days. The
Indians reckon their time of year by these
changes in the Night Sun, as they call the
moon.

Tribes living in different parts of America have


various names for the months, which they call
Moons. They all keep their calendar hung in
the sky, and it is never lost for any length of
time. They have given these moons names
after what interests them most.

One nation has named them in the following


way. The month in our calendar is also given,
so that you can easily guess the Indian’s
reason for his name for the month.

January The Cold Moon.


February The Snow Moon.
March The Green Moon.
April The Moon of Plants.
May The Moon of Flowers.
June The Hot Moon.[40]
July The Moon of the Deer.
August The Sturgeon Moon.
September The Fruit Moon.
October The Traveling Moon.
November The Beaver Moon.
December The Hunting Moon.

If you were spending the year among the Sioux or Dakotas, little Winona might tell you that
January is the Hard Moon.

February is when the braves and the boys take their dogs and hunt the raccoon; hence, they call
it the ’Coon Moon.

The Sioux have lived for a long time in the north. They know the effect of the bright sunshine of
March when it shines upon the snowdrifts. It is called the Moon of Snow-blindness.

April is the Egg Moon. It is the moon when the wild geese lay their eggs, and the Indians gather
them for food. The next time you watch the dark triangle of wild geese flying northward, you can
say it is near the time of the Egg Moon of the Dakotas.

May is the Planting Moon. What! You did not know that the copper-colored people planted
anything? Oh, yes, they do! Remember our maize, or Indian corn, is one great gift from them.

June has the prettiest name. Bright, beautiful June that we all love. It is the Strawberry Moon. The
[41]luscious wild strawberries are more delicate in flavor than any grown in the gardens. The wild
Indian has many dainties.

July, our red-white-and-blue month, is their Moon of Red Lilies. Has it ever been your good
fortune to see a vast tract of land covered with these gorgeous wild tiger-lilies? O Moon of Red
Lilies, how beautiful you make our western prairies! In this same moon the wild cherry is ripe, and
many tribes know it as the Cherry Moon.

August is the Ripe Moon. Have you ever heard of the Harvest Moon? Is not that nearly the same
name? Seeds from thistle and the milkweed are filling the air with their downy carriers. Wild
grasses and grains are ready for the gatherers, and the maize will shortly be ready for the
harvest.

While at Lake Superior, some time ago, we saw Chippewa Indians in their birch-bark canoes,
anchored in what seemed to be a very reedy bay. We found out that the bay was filled with wild
rice instead of reeds and rushes. It was the time of their wild-rice gathering. Two moons are given
names referring to wild rice: September is the Ripe-rice Moon; October is often called the Harvest
Moon. With plenty of maize and wild rice the winter is not dreaded. The Indian puts away his
winter stores with much the same care that his white brother uses; he stores corn in pits [42]that
he digs in the earth. He could learn this from the squirrel.

November is the Moon of Michabo, or Indian Summer. Michabo is another name for Menabozho,
the Chippewa Indian’s manitou friend; he has given them this second summer of the year, they
believe.

December is the Moon of Dropping Horns. The deer lose their long antlers about this time, and
the Indians can find them in the forests where the deer trails are.

The Indians have twelve moons in their year, the same number that we have in our calendar. [43]
Mokis ready for a Sacred Dance

From a Photograph

[44]

[Contents]
CUSTOMS OF KICKAPOO, SEMINOLE, AND OTHER TRIBES

The Kickapoo Indians first lived in what is now Illinois. Their present home is in the Indian
Territory. One of their peculiar customs is that they have a tribe whipper who makes his weekly
rounds with his whip to punish children, and in this way the parents save themselves from the
pain of inflicting punishment upon their children. Indians dislike rudeness or noisy behavior when
there should be quiet. Fire-water, as they call whiskey, makes them forget the manners their
parents taught them.

Many of the Seminole Indians live in the Everglades of Florida. They are a tall, dignified,
intelligent race, and resent the visits of white people unless it is shown that the visitor is a friend,
for they have been driven to these Everglades by reason of conquering whites. They live in
roofed huts and cultivate several kinds of crops. They once owned rich lands in upper Florida and
Alabama. Their language is said to be very musical. [45]

The Cherokee and Natchez tribes once lived in Mississippi and Louisiana. They were very wise in
war and had many things which they manufactured in times of peace. They carved curious shell
ornaments, which are often found in southern mounds.

The Flathead Indians of the west bind a piece of stiff board upon the forehead of their papooses.
The child’s head flattens as it grows, and he carries his race mark through life.

The Blackfoot Indians were so called because during a retreat the burnt prairie grass stained their
moccasins as black as the blackest cayuse or pony.

The term Digger Indians has been given to various tribes conquered and driven from their fishing
and hunting grounds. They live almost wholly upon roots of weeds or the few insects and small
animals found in the plains of eastern Utah and the surrounding country. The stronger tribes will
not let them fish in lake or stream, and their whole life is miserable.

The Indians of California were originally very brave and warlike, but the remnants of the tribes are
broken in spirit and seem broken-hearted. Those which have drifted or have been driven by
whites and red men into the peninsula of southern California are much like the Diggers.

The different tribes and nations scattered over America seemed to have known much about
metals, [46]although they used stone arrow points and stone axes when the first explorers visited
their homes.

The copper mines of Lake Superior show yet where the Indians have mined in them. Gold and
silver ornaments were used in many tribes to decorate the braves and their squaws. Shells were
carved with sharp tools and used as ornaments, or cut small into wampum.

Arrowheads were of flint or jasper and were made by the arrow makers of the tribe. It is said each
nation had its own shape of arrowhead. Some preferred very small points; some chose the larger
ones.
The early races of white people in all ancient lands used stone for many purposes. This first
period has been called the Stone Age; this was followed by the Copper Age; then came the Iron
Age. The Indians do not seem to have used iron before white men came, and were living in what
history would call the Stone Age. [47]

[Contents]
THE INDIANS WHO LIVE IN BRICK HOUSES

The native Indians of the southwestern part of the United States were much more civilized when
discovered than the wandering tribes in other parts of the country. They have built adobe houses
for many centuries. These houses of mud, brick, and hewn timbers cannot be removed like the
wigwams, teepees, or wickiups of the other tribes. The Spaniards named these Indians Pueblos,
for pueblo is the Spanish word for village. There are twenty-seven Pueblo towns.

The Pueblos are a peaceful people. They have had time to invent things that astonish the white
men who have seen only the Indians of the wandering tribes.

The pueblo of Zuñi is in New Mexico, about two hundred miles southeast of Santa Fé. This Indian
town was sought for by Coronado and his Spanish soldiers. They had heard marvelous stories of
the silver, gold, and jewels owned by the red people living north of Mexico; but the Pueblos were
brave as well as wise, and the history of that Spanish expedition is sad reading.

The town of Zuñi is built upon a hill, about forty feet above the bank of the river Zuñi; it covers
about [48]fifteen acres. The town is like a great beehive, for the houses are merely rooms built one
over the other, each family living in a few small rooms which are reached by means of ladders.
Some houses are only two stories high, while others are fully five stories. The wealthier Indians
live in the lower houses, except the official whose duty it is to give the orders of the governor from
the housetop. He lives with his family in rooms near the roof. These Zuñi houses are built around
two plazas, or squares, with several streets and covered ways to connect them with the other
parts of the town. The mesa called Thunder Mountain, upon which similar homes were built by
them in ancient times, is very near their peaceful village.

Cliff-dwellings have been found that are entirely deserted, built by a very ancient people of whom
we know little. Curious relics of dishes, cloth, and ornaments are found in these cliff-dwellings, but
no one knows how many centuries since the empty houses were filled with living people, and no
one knows why they were deserted. Some have thought the Zuñis are the descendants of this
lost race; others think them to be like the mound-builders.

The Zuñi Indians weave handsome wool blankets in handmade looms. They invented these
looms themselves. They sell or trade these blankets to Indians of many other tribes. [49]
Three-storied Pueblo Houses in Oraibi

From a Photograph

[50]

The Zuñi and other Pueblos make very good dishes of red clay. Their common cooking ware is
much like the dishes seen in wigwams. They make handsome pitchers, vases, and table dishes
of a brown color. They understand the working and coloring of clay, and the value of the different
kinds. They make a common black ware, which is sometimes used instead of the red ware.

Their very best work is of a cream-white color, and the vases and dishes are handsomely
decorated with colored borders and pictures. Many travelers have brought home fine specimens
of Zuñi dishes, for their town is not far from the railroad.

The Navajos live near the Zuñis. Their hogans, or homes, are not so well made as the Zuñis’
adobe houses; they are low adobe huts. The Navajos find time and have the skill to do some very
good work in metals, although their tools are rude. They make some use of iron, but their best
work is shown in the making and carving of ornaments and other articles of silver. They also have
invented hand looms and are blanket weavers.

All the Pueblos make handsome water-tight baskets of elegant shape from the fibers of the yucca
plant. This plant, sometimes called the Spanish bayonet, from its sharp-pointed leaves, grows to
a great size on the plains. The Pueblos color the fibers in some manner [51]and weave handsome
borders of black, white, or yellow into their baskets. These are used for flour or meal holders, or
for holding water, and are called ollas.

They grind their maize or other grain by hand between stones. They raise turkeys, and, as they
are good weavers, they sometimes use the turkey feathers in weaving a downy cloth.
The Apaches live near the Pueblos and are well known for their love of the warpath. They are not
Village Indians, yet are noted for their fine basket weaving. They use the willows found in their
country instead of the yucca fibers.

The different tribes of Pueblos often use stone axes. It is believed that these are not made by
them but were found in the deserted cliff-dwellers’ homes.

These Village Indians make use of a plant called soaproot, the root of which will make water foam
and will cleanse one’s skin the same as the white man’s soap. The Indian who lives in a teepee
does not know the use of soap and is not anxious for a bath.

White people have lived for years among the Zuñi and other Pueblos and have found them
patient, kind, and intelligent. Some of these whites have returned and have written books about
the people of whose home life they have learned so much.

Some of the habits of the Navajos are very odd. After the death of one of their tribe, his house, or
[52]hogan, is pulled down; if this is not done, every one who enters it fears danger.

A Navajo will not look into the face of the mother of his wife; when they talk together he looks on
the ground or in another direction. It is said a Navajo once forgot himself and, looking up, became
blind. They believe that the souls of the women of their tribe enter fish when they leave this world;
and they rarely eat fish for that reason. Indian customs and manners are taught to their children
with just as much earnestness as white people teach their little ones.

All the Pueblos make curious images or dolls of clay. These may possibly be idols, but are not
always, for both old and young sometimes play with them as toys. They are a religious people.
They believe in a Great Spirit and in a future life. Their forms of worship are very strange and
sometimes cruel.

The tribes called Pueblos of New Mexico are not included with those which continue to live in the
twenty-seven Pueblo towns, for whatever may have been their customs in past centuries, they
are now very different from the Village Indians, who still live and worship after the manner of their
ancestors. [53]
Moki Maiden in Native Costume

From a Photograph

[54]

[Contents]
THE MOKI INDIANS

The Moki Indians live in pueblos the same as the Zuñi people. Their name is also spelled Moqui
and Hopi. The Moki pueblo of Walpi is in Arizona. It is at the end of a mesa or plateau which rises
abruptly seven hundred feet above the desert. It is here that the great snake dance is held each
alternate autumn.

The Moki weave blankets and cloth for dresses, which they exchange with other Pueblos for
ponies, turquoise beads, and silver ornaments for neck or hair.

The Moki maidens, like those of a few other tribes, do not leave their straight black hair hanging
down their backs. These maidens put up their locks in huge puffs over each ear. These puffs are
to represent squash blossoms. The married women braid their hair and sometimes fasten it in a
knot at the back of the head.

All the water used in this elevated pueblo is carried up the seven hundred feet in clay ollas by the
women. It is like a scene in Asia to see them gathered at evening about the springs at the foot of
the mesa. [55]

The Mokis are a very devout people, and their young men are taught daily in the kivas, or secret
rooms, by the wise old men all the sacred rites and wisdom of their fathers.

Interior of Kiva with Sacred Altar

Among the Mokis the kiva, or estufa, as the Spanish call it, is underground; among the Zuñis it is
above the ground, but entered at the top by a ladder. In it is a sacred flat altar, usually surrounded
by prayer-sticks called bahos. These sticks have a feather fastened at the top, to show that
prayer rises.

These bahos are always planted two or three times a year by the water ways, to do reverence to
the water god who shows himself in the lightning. They believe [56]a serpent is the form lightning
takes when on earth; hence the pictures of these on the prayer-sticks, and sometimes on the
sides of rocks.

There is an order of nuns among the Pueblos called Ko-Ko. These go to the springs in the early
morning and place the bahos in the banks, so that rain may come on the corn, beans, and
pumpkins which have been planted. No one dares to remove one baho.

The Moki Indians have stories of Coronado’s people, who battled with them in 1540. [57]

[Contents]
DAKOTA OR SIOUX

The name the French gave the fierce, strong Dakotas is Sioux, which is the way they pronounced
the name given them by their Algonquin neighbors. This has become the name of the people, and
Dakota is the language which they speak.

They are divided into many bands, each with a chief for a leader. His friends and relatives move
their teepees wherever this chief thinks best on the land the Great Father in Washington has
reserved for them.

They are very brave and have many wise men among them. The chiefs of the bands are always
ready to follow what the head chief of the nation commands. The head chief has learned that the
Great Father in Washington has more warriors than he, and so the Sioux are not sent on the
warpath any more.

The buffalo and antelope are gone from the prairie. There is not meat enough in the woods, and
the warlike Sioux has now to come to the Indian agency to get his rations. It is a fine sight to see
the teepees of the bands when they have gathered at the agency. Even [58]here they show their
respect to the head chief and his followers, for his teepees are placed in the center of the camp.
The greatest chief comes next, and so on, till the weakest band places its teepees last.

The Sioux who have been long in the south do not speak like their northern relatives. For
example, they say Lakota instead of Dakota. The northern bands laugh at their southern brothers,
and think they have been trying to become different. Many Sioux boys and girls are in the schools
at the agencies learning to write and to read in English. They are very quick to learn and can
draw very well.

The Sioux women make such beautiful beadwork that a white woman thought it wise to teach
them to make lace of the choicest kind. The young squaws and some of the Indian boys have
learned to make this rare point lace with care and wonderful neatness. They cannot use it; but the
money they get for it buys food and clothes for them and their relatives. [59]

[Contents]
INDIAN GAMES

he Dakotas play their ball


games in the hot moons
of the summer and in the
cold moons of the winter.
The prairies give wide
room for the games in
summer, and the ice on
the many lakes serves as
winter ball grounds for
them.

Large spaces are


needed, for there are
many players. There is only one ball, but there are as many bats as players. The bats are about
thirty inches long, with a loop at the lower end; this is laced across with deer sinew, to make a
pocket in which the ball is caught and thrown.

The center of the ball ground is chosen. Stakes are set many feet away from the center, on
opposite sides, as the bounds for the game. Two parties of equal numbers are chosen. Each
party chooses its own leader or chief. [60]

The chief of one side drops his ball into the pocket of his bat and tosses it toward the center
ground between the stakes. Both sides rush toward the place where the ball may fall, each brave
hoping he may be the lucky one to catch it; whoever gets the ball tosses it with his bat into the air
toward his side of the grounds. Then the screaming, howling mob of players tears across the field
to the place where the ball may fall again. The ball is thrown and contended for until one side
succeeds in throwing it beyond the bounds of the opposite party.

The prizes for the winning side have hung all this time on the prize pole; and dangling in the air,
waiting the finish of the game, are the knives, tomahawks, blankets, moccasins, fine buffalo and
deerskin robes which the winners will divide among themselves. Indian girls play the same game
and with nearly as much vigor and skill as their brothers.

Always, at these games, the old men and squaws sit or stand at the outside of the ball ground, a
mass of interested spectators.

The ball game in some form, it seems, has been the national game on American soil since before
American history began.

The plum-stone game was and is yet played by the northern Indian tribes. The Dakotas call it
kansoo­kootaype, which simply means “shooting plum-stones.” [61]Each plum-stone is painted
black on one side and red on the other side. The stones are also cut on one side to make them of
different value according to the meaning of the marks cut.
These black and red stones are put into a large shallow dish of clay or metal. The dish is struck
against the nearest object with a sharp blow. The stones fall black or red side up, and the betting
on the number of black or red stones makes the game.

It is pure gambling. The prizes are valuable,—furs, clothing, food, everything goes in the
excitement of the game. An Indian may be beggared in a minute.

Father Hennepin describes the excitement of the game in his Descriptions of Louisiana,
published in Paris in 1683. This book is a description of his travels at that time in the valley of the
Mississippi to the Falls of St. Anthony and beyond. Father Hennepin said:

“There are some so given to the game that they will gamble away even their greatcoat. Those
who conduct the game scream at the top of their voices when they rattle the platter; and they
strike their shoulders so hard as to make themselves black and blue with the blow.”

The Indian boys have their pony races and running matches. They play much like white boys, but
with more cruelty. [62]

[Contents]
SIOUX AND CHIPPEWAS OF MINNESOTA

he Iroquois drove the Chippewas, or Ojibways,


from their hunting grounds and from fishing in
many waters in central New York; as the
bands increased and more needed food, many
started westward, and Chippewa names of
lakes and rivers mark their progress toward
the Mississippi. They made a long halt at the
Sault Ste. Marie, for many fish were in these
waters, but there was no place to plant their
corn. They built their wigwam fires farther
westward each year, until they reached what is
now northern Minnesota. Here they found the
Dakotas, or Sioux, had possession of the
beautiful lake region, which was so nearly like
the country by the River of Islands in the east.

The Chippewas had no wish to go back, and


their warriors and chiefs were too brave to
think that even the fierce western tribes could
conquer them. They built their wigwams on islands and points of land projecting into the lake, for
these made good places of [63]landing for their birch-bark canoes, and also gave them a better
chance to watch for their enemies than in the thick forests of pine, birch, and cedar.

Each band of Chippewas has yet many stories to tell of the terrible battles with the “nadoway-
sioux,” as the French trappers and hunters call the Algonquin word which means “hidden
enemies.” This warfare began years before the time of our war of the Revolution and did not end
for nearly a century. The Chippewas fought for their new home very bravely, and the Sioux were
just as brave in trying to hold what they believed to be the center of the world and nearest like the
Happy Hunting Grounds of the future life. There is a very extensive view of the Mississippi at its
junction with the Minnesota which is called by the Indians Mendota, or the “gathering of the
waters.” The contending tribes fought fiercely to hold or to obtain this place, for here these red
men, with their love for the beautiful in nature, had decided was where many of their gods liked
best to stay. The building of Fort Snelling at this point and the arrival of white men put a stop to
the battles, and neither tribe could claim Mendota.

The Great Father in Washington made a treaty with the Chippewas whereby they hold much of
their hard-won lake region as long as they keep their treaty promises; now that there is peace
between the Indian [64]nations they are willing to admit that each had many heroes in war and
council.

During the conflict a trader attempted to bargain with the Sioux for furs, after having had dealings
with a band of Chippewas. This band, wild with fury at what they called the trader’s treachery,
broke open his storehouse and destroyed or took all his stores of furs and other articles. They

You might also like