MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection

被引:2
|
作者
Lin, Yanhong [1 ]
Huang, Shiguo [1 ]
Hong, Minglin [1 ]
Chen, Shiting [1 ]
Li, Xiaolin [1 ]
Lin, Dakun [1 ]
机构
[1] Fujian Agr & Forestry Univ, Lab Adv Software Technol & Applicat Agroforestry, Coll Comp & Informat Sci, Fuzhou 350002, Peoples R China
关键词
Feature selection; competitive swarm optimizer; Message-Digest Algorithm 5;
D O I
10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00178
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Feature selection plays a crucial role in machine learning. For evolutionary computation based feature selection, the same particles are repeatedly generated many times during the population iteration process, and recalculating the fitness values of these particles costs a large amount of computational resources. Therefore, it is necessary to find these particles fast and skip calculating their fitness to save computation resources. This paper proposes the combination of MD5 encryption algorithm and the competitive swarm optimizer (CSO) algorithm for feature selection. Every particle in the population generated by CSO is encoded with MD5 encryption algorithm. Then the HashMap algorithm is used to quickly search for the repetitive particles. Through MD5 coding and HashMap searching, the repetitive particles are found fast, and then the recalculation of the repeated particles are avoid. Experimental results show that our proposed algorithm significantly reduces the running time of feature selection for low-dimensional data, medium-dimensional data and high-dimensional data. Moreover, our algorithm does not change the framework of the competitive swarm optimization algorithm, only avoiding calculation of the repeatedly generated particles, and therefore does not influence the accuracy and the number of features by feature selection. Our algorithm can be widely applied to other computational intelligence methods.
引用
收藏
页码:1250 / 1254
页数:5
相关论文
共 50 条
  • [1] Feature selection based on hybridization of genetic algorithm and competitive swarm optimizer
    Ding, Ye
    Zhou, Kui
    Bi, Weihong
    [J]. SOFT COMPUTING, 2020, 24 (15) : 11663 - 11672
  • [2] Feature selection based on hybridization of genetic algorithm and competitive swarm optimizer
    Ye Ding
    Kui Zhou
    Weihong Bi
    [J]. Soft Computing, 2020, 24 : 11663 - 11672
  • [3] Binary Competitive Swarm Optimizer Approaches for Feature Selection
    Too, Jingwei
    Abdullah, Abdul Rahim
    Saad, Norhashimah Mohd
    [J]. COMPUTATION, 2019, 7 (02)
  • [4] Binary competitive swarm optimizer Algorithm for Feature Selection in Identification of Chinese Fir Family
    Huang, Shiguo
    Hong, Minglin
    Lin, Yanhong
    Li, Xiaolin
    Lin, Dakun
    [J]. 2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 1519 - 1523
  • [5] Enhancing MD5 Hash Algorithm using Symmetric Key Encryption
    Shakya, Aman
    Karna, Nitesh
    [J]. PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 18 - 22
  • [6] Optimization of Archive Information Management Considering MD5 Encryption Algorithm
    Xu, Wenxia
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 278 - 279
  • [7] The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking
    Wang Xijin
    Fan Linxiu
    [J]. INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1264 - 1269
  • [8] Feature selection for high-dimensional classification using a competitive swarm optimizer
    Gu, Shenkai
    Cheng, Ran
    Jin, Yaochu
    [J]. SOFT COMPUTING, 2018, 22 (03) : 811 - 822
  • [9] Feature selection for high-dimensional classification using a competitive swarm optimizer
    Shenkai Gu
    Ran Cheng
    Yaochu Jin
    [J]. Soft Computing, 2018, 22 : 811 - 822
  • [10] Encryption and Decryption using Password Based Encryption, MD5, and DES
    Dhany, Hanna Willa
    Izhari, Fahmi
    Fahmi, Hasanul
    Tulus
    Sutarman
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PUBLIC POLICY, SOCIAL COMPUTING AND DEVELOPMENT 2017 (ICOPOSDEV 2017), 2017, 141 : 293 - 298