Endre søk
Link to record
Permanent link

Direct link
Helali Moghadam, MahshidORCID iD iconorcid.org/0000-0003-3354-1463
Publikasjoner (10 av 22) Visa alla publikasjoner
Helali Moghadam, M., Borg, M., Saadatmand, M., Mousavirad, S., Bohlin, M. & Lisper, B. (2024). Machine learning testing in an ADAS case study using simulation-integrated bio-inspired search-based testing. Journal of Software: Evolution and Process (5), Article ID e2591.
Åpne denne publikasjonen i ny fane eller vindu >>Machine learning testing in an ADAS case study using simulation-integrated bio-inspired search-based testing
Vise andre…
2024 (engelsk)Inngår i: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, nr 5, artikkel-id e2591Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

This paper presents an extended version of Deeper, a search-based simulation-integrated test solution that generates failure-revealing test scenarios for testing a deep neural network-based lane-keeping system. In the newly proposed version, we utilize a new set of bio-inspired search algorithms, genetic algorithm (GA), (Formula presented.) and (Formula presented.) evolution strategies (ES), and particle swarm optimization (PSO), that leverage a quality population seed and domain-specific crossover and mutation operations tailored for the presentation model used for modeling the test scenarios. In order to demonstrate the capabilities of the new test generators within Deeper, we carry out an empirical evaluation and comparison with regard to the results of five participating tools in the cyber-physical systems testing competition at SBST 2021. Our evaluation shows the newly proposed test generators in Deeper not only represent a considerable improvement on the previous version but also prove to be effective and efficient in provoking a considerable number of diverse failure-revealing test scenarios for testing an ML-driven lane-keeping system. They can trigger several failures while promoting test scenario diversity, under a limited test time budget, high target failure severity, and strict speed limit constraints. 

sted, utgiver, år, opplag, sider
John Wiley and Sons Ltd, 2024
Emneord
advanced driver assistance systems, deep learning, evolutionary computation, lane-keeping system, machine learning testing, search-based testing, Automobile drivers, Biomimetics, Budget control, Deep neural networks, Embedded systems, Genetic algorithms, Learning systems, Particle swarm optimization (PSO), Software testing, Case-studies, Lane keeping, Machine-learning, Software Evolution, Software process, Test scenario
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-65687 (URN)10.1002/smr.2591 (DOI)2-s2.0-85163167144 (Scopus ID)
Merknad

 Correspondence Address: M.H. Moghadam; Smart Industrial Automation, RISE Research Institutes of Sweden, Västerås, Stora Gatan 36, 722 12, Sweden;  

This work has been funded by Vinnova through the ITEA3 European IVVES ( https://itea3.org/project/ivves.html ) and H2020‐ECSEL European AIDOaRT ( https://www.aidoart.eu/ ) and InSecTT ( https://www.insectt.eu/ ) projects. Furthermore, the project received partially financial support from the SMILE III project financed by Vinnova, FFI, Fordonsstrategisk forskning och innovation under the grant number: 2019‐05871.

Tilgjengelig fra: 2023-08-10 Laget: 2023-08-10 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Dehlaghi Ghadim, A., Helali Moghadam, M., Balador, A. & Hansson, H. (2023). Anomaly Detection Dataset for Industrial Control Systems. IEEE Access, 11, 107982-107996
Åpne denne publikasjonen i ny fane eller vindu >>Anomaly Detection Dataset for Industrial Control Systems
2023 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 11, s. 107982-107996Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. This paper introduces the ’ICS-Flow’ dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment. The network data includes normal and anomalous network packets and flows captured from simulated ICS components and emulated networks, where the anomalies were applied to the system through various cyberattacks. We also proposed an open-source tool, ’ICSFlowGenerator,’ for generating network flow parameters from Raw network packets. The final dataset comprises over 25,000,000 raw network packets, network flow records, and process variable logs. The paper describes the methodology used to collect and label the dataset and provides a detailed data analysis. Finally, we implement several ML models, including the decision tree, random forest, and artificial neural network to detect anomalies and attacks, demonstrating that our dataset can be used effectively for training intrusion detection ML models.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers Inc., 2023
Emneord
Data mining; Decision trees; Feature extraction; Integrated circuits; Intrusion detection; Learning systems; Network security; Neural networks; Open systems; Anomaly detection; Anomaly detection dataset; Cyber-attacks; Features extraction; Industrial control systems; Integrated circuit modeling; Intrusion-Detection; Networks flows; Telecommunications traffic; Computer crime
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-67715 (URN)10.1109/ACCESS.2023.3320928 (DOI)2-s2.0-85173045898 (Scopus ID)
Forskningsfinansiär
EU, Horizon 2020
Merknad

This work has been partially supported by the H2020 ECSEL EU project Intelligent Secure Trustable Things (InSecTT).

Tilgjengelig fra: 2023-11-06 Laget: 2023-11-06 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Borg, M., Henriksson, J., Socha, K., Lennartsson, O., Sonnsjö Lönegren, E., Bui, T., . . . Helali Moghadam, M. (2023). Ergo, SMIRK is safe: a safety case for a machine learning component in a pedestrian automatic emergency brake system. Software quality journal, 31(2), 335
Åpne denne publikasjonen i ny fane eller vindu >>Ergo, SMIRK is safe: a safety case for a machine learning component in a pedestrian automatic emergency brake system
Vise andre…
2023 (engelsk)Inngår i: Software quality journal, ISSN 0963-9314, E-ISSN 1573-1367, Vol. 31, nr 2, s. 335-Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Integration of machine learning (ML) components in critical applications introduces novel challenges for software certification and verification. New safety standards and technical guidelines are under development to support the safety of ML-based systems, e.g., ISO 21448 SOTIF for the automotive domain and the Assurance of Machine Learning for use in Autonomous Systems (AMLAS) framework. SOTIF and AMLAS provide high-level guidance but the details must be chiseled out for each specific case. We initiated a research project with the goal to demonstrate a complete safety case for an ML component in an open automotive system. This paper reports results from an industry-academia collaboration on safety assurance of SMIRK, an ML-based pedestrian automatic emergency braking demonstrator running in an industry-grade simulator. We demonstrate an application of AMLAS on SMIRK for a minimalistic operational design domain, i.e., we share a complete safety case for its integrated ML-based component. Finally, we report lessons learned and provide both SMIRK and the safety case under an open-source license for the research community to reuse. © 2023, The Author(s).

sted, utgiver, år, opplag, sider
Springer, 2023
Emneord
Automotive demonstrator, Machine learning safety, Safety case, Safety standards
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-64234 (URN)10.1007/s11219-022-09613-1 (DOI)2-s2.0-85149021250 (Scopus ID)
Merknad

Open access funding provided by RISE Research Institutes of Sweden. This work was carried out within the SMILE III project financed by Vinnova, FFI, Fordonsstrategisk forskning och innovation under the grant number 2019-05871 and partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by Knut and Alice Wallenberg Foundation.

Tilgjengelig fra: 2023-03-20 Laget: 2023-03-20 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Mousavirad, S. J., Schaefer, G., Zhou, H. & Helali Moghadam, M. (2023). How effective are current population-based metaheuristic algorithms for variance-based multi-level image thresholding?. Knowledge-Based Systems, 272, Article ID 110587.
Åpne denne publikasjonen i ny fane eller vindu >>How effective are current population-based metaheuristic algorithms for variance-based multi-level image thresholding?
2023 (engelsk)Inngår i: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 272, artikkel-id 110587Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Multi-level image thresholding is a common approach to image segmentation where an image is divided into several regions based on its histogram. Otsu's method is the most popular method for this purpose, and is based on seeking for threshold values that maximise the between-class variance. This requires an exhaustive search to find the optimal set of threshold values, making image thresholding a time-consuming process. This is especially the case with increasing numbers of thresholds since, due to the curse of dimensionality, the search space enlarges exponentially with the number of thresholds. Population-based metaheuristic algorithms are efficient and effective problem-independent methods to tackle hard optimisation problems. Over the years, a variety of such algorithms, often based on bio-inspired paradigms, have been proposed. In this paper, we formulate multi-level image thresholding as an optimisation problem and perform an extensive evaluation of 23 population-based metaheuristics, including both state-of-the-art and recently introduced algorithms, for this purpose. We benchmark the algorithms on a set of commonly used images and based on various measures, including objective function value, peak signal-to-noise ratio, feature similarity index, and structural similarity index. In addition, we carry out a stability analysis as well as a statistical analysis to judge if there are significant differences between algorithms. Our experimental results indicate that recently introduced algorithms do not necessarily achieve acceptable performance in multi-level image thresholding, while some established algorithms are demonstrated to work better. 

sted, utgiver, år, opplag, sider
Elsevier B.V., 2023
Emneord
Image processing, Image segmentation, Metaheuristic algorithms, Multi-level thresholding, Optimisation, Biomimetics, Optimization, Signal to noise ratio, Image thresholding, Images processing, Images segmentations, Meta-heuristics algorithms, Multilevel thresholding, Multilevels, Optimisations, Optimization problems, Similarity indices, Threshold-value
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-64850 (URN)10.1016/j.knosys.2023.110587 (DOI)2-s2.0-85158041478 (Scopus ID)
Tilgjengelig fra: 2023-05-22 Laget: 2023-05-22 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Dehlaghi Ghadim, A., Balador, A., Helali Moghadam, M., Hansson, H. & Conti, M. (2023). ICSSIM — A framework for building industrial control systems security testbeds. Computers in industry (Print), 148, Article ID 103906.
Åpne denne publikasjonen i ny fane eller vindu >>ICSSIM — A framework for building industrial control systems security testbeds
Vise andre…
2023 (engelsk)Inngår i: Computers in industry (Print), ISSN 0166-3615, E-ISSN 1872-6194, Vol. 148, artikkel-id 103906Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

With the advent of the smart industry, Industrial Control Systems (ICS) moved from isolated environments to connected platforms to meet Industry 4.0 targets. The inherent connectivity in these services exposes such systems to increased cybersecurity risks. To protect ICSs against cyberattacks, intrusion detection systems (IDS) empowered by machine learning are used to detect abnormal behavior of the systems. Operational ICSs are not safe environments to research IDSs due to the possibility of catastrophic risks. Therefore, realistic ICS testbeds enable researchers to analyze and validate their IDSs in a controlled environment. Although various ICS testbeds have been developed, researchers’ access to a low-cost, extendable, and customizable testbed that can accurately simulate ICSs and suits security research is still an important issue. In this paper, we present ICSSIM, a framework for building customized virtual ICS security testbeds in which various cyber threats and network attacks can be effectively and efficiently investigated. This framework contains base classes to simulate control system components and communications. Simulated components are deployable on actual hardware such as Raspberry Pis, containerized environments like Docker, and simulation environments such as GNS-3. ICSSIM also offers physical process modeling using software and hardware in the loop simulation. This framework reduces the time for developing ICS components and aims to produce extendable, versatile, reproducible, low-cost, and comprehensive ICS testbeds with realistic details and high fidelity. We demonstrate ICSSIM by creating a testbed and validating its functionality by showing how different cyberattacks can be applied. © 2023 The Authors

sted, utgiver, år, opplag, sider
Elsevier B.V., 2023
Emneord
Cyberattack, Cybersecurity, Industrial control system, Network emulation, Testbed, Computer crime, Control systems, Costs, Cyber attacks, Intrusion detection, Network security, Abnormal behavior, Control system security, Cyber security, Cyber-attacks, Industrial control systems, Intrusion Detection Systems, Low-costs, Machine-learning, System components, Testbeds
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-64314 (URN)10.1016/j.compind.2023.103906 (DOI)2-s2.0-85151016386 (Scopus ID)
Merknad

 Correspondence Address: Dehlaghi-Ghadim, A.; RISE Research Institute of Sweden, Sweden; email: alireza.dehlaghi.ghadim@ri.se; Funding details: 876038; Funding details: Horizon 2020 Framework Programme, H2020; Funding details: Horizon 2020; Funding text 1: This work was supported by InSecTT (www.insectt.eu), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038. The JU receives support from the European Union's Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway. The document reflects only the authors’ views and the Commission is not responsible for any use that may be made of the information it contains. We would like to thank Westermo AB company for providing us with access to their test environment for conducting experiments on the physical setup.; Funding text 2: This work was supported by InSecTT ( www.insectt.eu ), which received funding from the KDT Joint Undertaking (JU) under grant agreement No 876038 . The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, Netherlands, Turkey, Belgium, Germany, Czech Republic, Denmark, Norway. The document reflects only the authors’ views and the Commission is not responsible for any use that may be made of the information it contains.

Tilgjengelig fra: 2023-05-05 Laget: 2023-05-05 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Abbas, M., Hamayouni, A., Helali Moghadam, M., Saadatmand, M. & Strandberg, P. E. (2023). Making Sense of Failure Logs in an Industrial DevOps Environment. In: Advances in Intelligent Systems and Computing book series (AISC,volume 1445): 20th International Conference on Information Technology New Generations. Paper presented at 20th International Conference on Information Technology New Generations (pp. 217-226). Springer International Publishing, 1445
Åpne denne publikasjonen i ny fane eller vindu >>Making Sense of Failure Logs in an Industrial DevOps Environment
Vise andre…
2023 (engelsk)Inngår i: Advances in Intelligent Systems and Computing book series (AISC,volume 1445): 20th International Conference on Information Technology New Generations, Springer International Publishing , 2023, Vol. 1445, s. 217-226Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Processing and reviewing nightly test execution failure logs for large industrial systems is a tedious activity. Furthermore, multiple failures might share one root/common cause during test execution sessions, and the review might therefore require redundant efforts. This paper presents the LogGrouper approach for automated grouping of failure logs to aid root/common cause analysis and for enabling the processing of each log group as a batch. LogGrouper uses state-of-art natural language processing and clustering approaches to achieve meaningful log grouping. The approach is evaluated in an industrial setting in both a qualitative and quantitative manner. Results show that LogGrouper produces good quality groupings in terms of our two evaluation metrics (Silhouette Coefficient and Calinski-Harabasz Index) for clustering quality. The qualitative evaluation shows that experts perceive the groups as useful, and the groups are seen as an initial pointer for root cause analysis and failure assignment.

sted, utgiver, år, opplag, sider
Springer International Publishing, 2023
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-67432 (URN)
Konferanse
20th International Conference on Information Technology New Generations
Tilgjengelig fra: 2023-09-28 Laget: 2023-09-28 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Strandberg, P. E., Söderman, D., Dehlaghi Ghadim, A., Leon, M., Markovic, T., Punnekkat, S., . . . Buffoni, D. (2023). The Westermo network traffic data set. Data in Brief, 50, Article ID 109512.
Åpne denne publikasjonen i ny fane eller vindu >>The Westermo network traffic data set
Vise andre…
2023 (engelsk)Inngår i: Data in Brief, E-ISSN 2352-3409, Vol. 50, artikkel-id 109512Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificial intelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack.

sted, utgiver, år, opplag, sider
Elsevier, 2023
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-66502 (URN)10.1016/j.dib.2023.109512 (DOI)
Tilgjengelig fra: 2023-09-05 Laget: 2023-09-05 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Helali Moghadam, M., Saadatmand, M., Borg, M., Bohlin, M. & Lisper, B. (2022). An autonomous performance testing framework using self-adaptive fuzzy reinforcement learning. Software quality journal, 127-159
Åpne denne publikasjonen i ny fane eller vindu >>An autonomous performance testing framework using self-adaptive fuzzy reinforcement learning
Vise andre…
2022 (engelsk)Inngår i: Software quality journal, ISSN 0963-9314, E-ISSN 1573-1367, s. 127-159Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Test automation brings the potential to reduce costs and human effort, but several aspects of software testing remain challenging to automate. One such example is automated performance testing to find performance breaking points. Current approaches to tackle automated generation of performance test cases mainly involve using source code or system model analysis or use-case-based techniques. However, source code and system models might not always be available at testing time. On the other hand, if the optimal performance testing policy for the intended objective in a testing process instead could be learned by the testing system, then test automation without advanced performance models could be possible. Furthermore, the learned policy could later be reused for similar software systems under test, thus leading to higher test efficiency. We propose SaFReL, a self-adaptive fuzzy reinforcement learning-based performance testing framework. SaFReL learns the optimal policy to generate performance test cases through an initial learning phase, then reuses it during a transfer learning phase, while keeping the learning running and updating the policy in the long term. Through multiple experiments in a simulated performance testing setup, we demonstrate that our approach generates the target performance test cases for different programs more efficiently than a typical testing process and performs adaptively without access to source code and performance models. © 2021, The Author(s).

sted, utgiver, år, opplag, sider
Springer, 2022
Emneord
Autonomous testing, Performance testing, Reinforcement learning, Stress testing, Test case generation, Automation, Computer programming languages, Testing, Transfer learning, Automated generation, Optimal performance, Performance Model, Performance testing framework, Performance tests, Simulated performance, Software systems, Software testing
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-52628 (URN)10.1007/s11219-020-09532-z (DOI)2-s2.0-85102446552 (Scopus ID)
Merknad

Funding text 1: This work has been supported by and received funding partially from the TESTOMAT, XIVT, IVVES and MegaM@Rt2 European projects.

Tilgjengelig fra: 2021-03-25 Laget: 2021-03-25 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Mousavirad, S., Helali Moghadam, M., Saadatmand, M., Chakrabortty, R., Schaefer, G. & Oliva, D. (2022). RWS-L-SHADE: An Effective L-SHADE Algorithm Incorporation Roulette Wheel Selection Strategy for Numerical Optimisation. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Volume 13224 LNCS, Pages 255 - 2682022: . Paper presented at 25th European Conference on the Applications of Evolutionary Computation, EvoApplications 2022Madrid20 April 2022 through 22 April 2022 (pp. 255-268). Springer Science and Business Media Deutschland GmbH
Åpne denne publikasjonen i ny fane eller vindu >>RWS-L-SHADE: An Effective L-SHADE Algorithm Incorporation Roulette Wheel Selection Strategy for Numerical Optimisation
Vise andre…
2022 (engelsk)Inngår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Volume 13224 LNCS, Pages 255 - 2682022, Springer Science and Business Media Deutschland GmbH , 2022, s. 255-268Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Differential evolution (DE) is widely used for global optimisation problems due to its simplicity and efficiency. L-SHADE is a state-of-the-art variant of DE algorithm that incorporates external archive, success-history-based parameter adaptation, and linear population size reduction. L-SHADE uses a current-to-pbest/1/bin strategy for mutation operator, while all individuals have the same probability to be selected. In this paper, we propose a novel L-SHADE algorithm, RWS-L-SHADE, based on a roulette wheel selection strategy so that better individuals have a higher priority and worse individuals are less likely to be selected. Our extensive experiments on the CEC-2017 benchmark functions and dimensionalities of 30, 50 and 100 indicate that RWS-L-SHADE outperforms L-SHADE.

sted, utgiver, år, opplag, sider
Springer Science and Business Media Deutschland GmbH, 2022
Emneord
CEC-2017 benchmark functions, Differential evolution, L-SHADE algorithm, Optimisation, Roulette wheel selection strategy, Global optimization, Wheels, Benchmark functions, CEC-2017 benchmark function, Differential evolution algorithms, Global optimization problems, Numerical optimizations, Optimisations, Roulette-wheel selections, State of the art, Population statistics
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-59243 (URN)10.1007/978-3-031-02462-7_17 (DOI)2-s2.0-85129308303 (Scopus ID)9783031024610 (ISBN)
Konferanse
25th European Conference on the Applications of Evolutionary Computation, EvoApplications 2022Madrid20 April 2022 through 22 April 2022
Tilgjengelig fra: 2022-06-13 Laget: 2022-06-13 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Mousavirad, S., Schaefer, G., Helali Moghadam, M., Saadatmand, M. & Pedram, M. (2021). A population-based automatic clustering algorithm for image segmentation. In: GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion: . Paper presented at 2021 Genetic and Evolutionary Computation Conference, GECCO 2021, 10 July 2021 through 14 July 2021 (pp. 1931-1936). Association for Computing Machinery, Inc
Åpne denne publikasjonen i ny fane eller vindu >>A population-based automatic clustering algorithm for image segmentation
Vise andre…
2021 (engelsk)Inngår i: GECCO 2021 Companion - Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, Inc , 2021, s. 1931-1936Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Clustering is one of the prominent approaches for image segmentation. Conventional algorithms such as k-means, while extensively used for image segmentation, suffer from problems such as sensitivity to initialisation and getting stuck in local optima. To overcome these, population-based metaheuristic algorithms can be employed. This paper proposes a novel clustering algorithm for image segmentation based on the human mental search (HMS) algorithm, a powerful population-based algorithm to tackle optimisation problems. One of the advantages of our proposed algorithm is that it does not require any information about the number of clusters. To verify the effectiveness of our proposed algorithm, we present a set of experiments based on objective function evaluation and image segmentation criteria to show that our proposed algorithm outperforms existing approaches.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, Inc, 2021
Emneord
automatic clustering, human mental search, image segmentation, optimisation, population-based algorithms, Evolutionary algorithms, Optimization, Automatic clustering algorithm, Conventional algorithms, K-means, Local optima, Meta heuristic algorithm, Number of clusters, Optimisation problems, Population-based algorithm, K-means clustering
HSV kategori
Identifikatorer
urn:nbn:se:ri:diva-55664 (URN)10.1145/3449726.3463148 (DOI)2-s2.0-85111017050 (Scopus ID)9781450383516 (ISBN)
Konferanse
2021 Genetic and Evolutionary Computation Conference, GECCO 2021, 10 July 2021 through 14 July 2021
Merknad

Funding text 1: This work has been supported by ITEA3 European IVVES project (https://itea3.org/project/ivves.html).

Tilgjengelig fra: 2021-08-09 Laget: 2021-08-09 Sist oppdatert: 2025-09-23bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0003-3354-1463
v. 2.47.0