期刊文献+
共找到571篇文章
< 1 2 29 >
每页显示 20 50 100
Malus’ Law Derived from Deterministic Particle Behavior
1
作者 Peter Schuttevaar 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第3期958-966,共9页
A polarized beam of energy is usually interpreted as a set of particles, all having the same polarization state. Difference in behavior between the one and the other particle is then explained by a number of counter-i... A polarized beam of energy is usually interpreted as a set of particles, all having the same polarization state. Difference in behavior between the one and the other particle is then explained by a number of counter-intuitive quantum mechanical concepts like probability distribution, superposition, entanglement and quantized spin. Alternatively, I propose that a polarized beam is composed of a set of particles with a cosine distribution of polarization angles within a polarization area. I show that Malus’ law for the intensity of a beam of polarized light can be derived in a straightforward manner from this distribution. I then show that none of the above-mentioned counter-intuitive concepts are necessary to explain particle behavior and that the ontology of particles, passing through a polarizer, can be easily and intuitively understood. I conclude by formulating some questions for follow-up research. 展开更多
关键词 Quantum Mechanics BELL Malus Law SUPERPOSITION ENTANGLEMENT Quantum Fields Spin hidden Variables LOCALITY NON-LOCALITY
下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
2
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN hidden Variables Bell’s Inequality Violation Spin Entanglement
下载PDF
Deciphering the Hidden Secrets between the Early Skin Wrinkling & the Metabolic (X) Syndrome with the Possible Reversal of This Process at the Molecular Level
3
作者 Dalal Alsaadoun 《Journal of Cosmetics, Dermatological Sciences and Applications》 2024年第1期45-68,共24页
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ... The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. . 展开更多
关键词 COLLAGEN Skin Wrinkling Glycation Hyper-Insulinemia hidden Obesity Vis-ceral Fat Inflammatory Cytokines
下载PDF
Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models
4
作者 Virgile Simé Nyassi Franklin Tchakounté +3 位作者 Blaise Omer Yenké Duplex Elvis Houpa Danga Magnuss Dufe Ngoran Jean Louis Kedieng Ebongue Fendji 《Journal of Intelligent Learning Systems and Applications》 2024年第3期274-315,共42页
This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more ... This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach. 展开更多
关键词 Social Engineering hidden Markov Model Vishing Voice Mining
下载PDF
A Path Integral Generalization of Bell Local Hidden Variable Models for Unstable Particles 被引量:2
5
作者 Gianpaolo Bei 《Journal of Applied Mathematics and Physics》 2021年第10期2430-2438,共9页
We discuss the problem of the generalization of Bell local hidden variable models for unstable particles as nucleons or decaying quantum bound states. We propose to extend the formalism of real deterministic hidden va... We discuss the problem of the generalization of Bell local hidden variable models for unstable particles as nucleons or decaying quantum bound states. We propose to extend the formalism of real deterministic hidden variables in the complex domain, in analogy with the quantum Gamow ket formalism, and we introduce a time dependent classical probability density distribution by which we implement hidden time dependence in the quantum expectation values. We suggest therefore a classical framework which may recover by asymptotic temporal limits the standard Bell stationary quantum statistical averages. Endly we discuss the possible relevance of our proposal for general non-isolated quantum systems in noninertial frames and the consequent dynamic effects of vacuum instabilities on E.P.R tests and Q.M. ensemble statistical averages. 展开更多
关键词 Entangled Unstable particles Complex hidden Variables Path Dependent Expectation Values Time Dependent Bell Inequalities
下载PDF
Labeling Line Drawings with Hidden-Part-Drawn of Planar Object with Trihedral Vertices 被引量:1
6
作者 GAO Man-tun CAI Xu-peng 《Computer Aided Drafting,Design and Manufacturing》 2015年第2期1-13,共13页
Although line drawings consist of only line segments on a plane, they convey much information about the three-dimensional object structures. For a computer interpreting line drawings, some intelligent mechanism is req... Although line drawings consist of only line segments on a plane, they convey much information about the three-dimensional object structures. For a computer interpreting line drawings, some intelligent mechanism is required to extract three-dimensional information from the two-dimensional line drawings. In this paper, a new labeling theory and method are proposed for the two-dimensional line drawing with hidden-part-draw of a three-dimensional planar object with trihedral vertices. Some rules for labeling line drawing are established. There are 24 kinds of possible junctions for line drawing with hidden-part-draw, in which there are 8 possible Y and 16 W junctions. The three problems are solved that Sugihara's line drawing labeling technique exists. By analyzing the projections of the holes in manifold planar object, we have put forward a labeling method for the line drawing. Our labeling theory and method can discriminate between correct and incorrect hidden-part-draw natural line drawings. The hidden-part-draw natural line drawings can be labeled correctly by our labeling theory and method, whereas the labeling theory of Sugihara can only label the hidden-part-draw unnatural line drawings in which some visible lines must be drawn as hidden lines, and some invisible lines must be drawn as continuous lines. 展开更多
关键词 image understanding line drawing LABELING JUNCTION line drawing with hidden-part-drawn planar object
下载PDF
Switchable hidden spin polarization and negative Poisson's ratio in two-dimensional antiferroelectric wurtzite crystals
7
作者 Zhuang Ma Jingwen Jiang +8 位作者 Gui Wang Peng Zhang Yiling Sun Zhengfang Qian Jiaxin Zheng Wen Xiong Fei Wang Xiuwen Zhang Pu Huang 《Journal of Semiconductors》 EI CAS CSCD 2023年第12期72-80,共9页
Two-dimensional(2D)antiferroelectric materials have raised great research interest over the last decade.Here,we reveal a type of 2D antiferroelectric(AFE)crystal where the AFE polarization direction can be switched by... Two-dimensional(2D)antiferroelectric materials have raised great research interest over the last decade.Here,we reveal a type of 2D antiferroelectric(AFE)crystal where the AFE polarization direction can be switched by a certain degree in the 2D plane.Such 2D functional materials are realized by stacking the exfoliated wurtzite(wz)monolayers with“self-healable”nature,which host strongly coupled ferroelasticity/antiferroelectricity and benign stability.The AFE candidates,i.e.,Zn X and Cd X(X=S,Se,Te),are all semiconductors with direct bandgap atΓpoint,which harbors switchable antiferroelectricity and ferroelasticity with low transition barriers,hidden spin polarization,as well as giant in-plane negative Poisson's ratio(NPR),enabling the co-tunability of hidden spin characteristics and auxetic magnitudes via AFE switching.The 2D AFE wz crystals provide a platform to probe the interplay of 2D antiferroelectricity,ferroelasticity,NPR,and spin effects,shedding new light on the rich physics and device design in wz semiconductors. 展开更多
关键词 wurtzite crystal MULTIFERROICS hidden spin polarization negative Poisson's ratio
下载PDF
Existence of hidden attractors in nonlinear hydro-turbine governing systems and its stability analysis
8
作者 赵鹏翀 卫皓娟 +3 位作者 徐振坤 陈帝伊 许贝贝 王雨萌 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期220-228,共9页
This work studies the stability and hidden dynamics of the nonlinear hydro-turbine governing system with an output limiting link,and propose a new six-dimensional system,which exhibits some hidden attractors.The param... This work studies the stability and hidden dynamics of the nonlinear hydro-turbine governing system with an output limiting link,and propose a new six-dimensional system,which exhibits some hidden attractors.The parameter switching algorithm is used to numerically study the dynamic behaviors of the system.Moreover,it is investigated that for some parameters the system with a stable equilibrium point can generate strange hidden attractors.A self-excited attractor with the change of its parameters is also recognized.In addition,numerical simulations are carried out to analyze the dynamic behaviors of the proposed system by using the Lyapunov exponent spectra,Lyapunov dimensions,bifurcation diagrams,phase space orbits,and basins of attraction.Consequently,the findings in this work show that the basins of hidden attractors are tiny for which the standard computational procedure for localization is unavailable.These simulation results are conducive to better understanding of hidden chaotic attractors in higher-dimensional dynamical systems,and are also of great significance in revealing chaotic oscillations such as uncontrolled speed adjustment in the operation of hydropower station due to small changes of initial values. 展开更多
关键词 nonlinear hydro-turbine governing systems hidden attractors basin of attraction Lyapunov exponent spectrum
下载PDF
Reliability and validity of the hidden hunger assessment scale in China-revised for high school students
9
作者 Ning Zhang Minao Wang +6 位作者 Yuchen Zhang Huake Cao Yang Yang Yuhang Shi Yang Pei Feixiang Yang Yinan Du 《Global Health Journal》 2023年第2期110-116,共7页
Objective:Hidden hunger remains a severe public health problem that affects millions of people worldwide.In China,challenges related to dietary imbalance and hidden hunger persist.Micronutrient inadequacy deserves mor... Objective:Hidden hunger remains a severe public health problem that affects millions of people worldwide.In China,challenges related to dietary imbalance and hidden hunger persist.Micronutrient inadequacy deserves more attention among adolescents,given its vital role in their growth and development;however,this problem appears to have been largely ignored.High school students,in particular,are often at a high risk of hidden hunger but have limited assessment tools available.Therefore,this study aims to revise the hidden hunger assessment scale for high school students(HHAS-HSS)in China and assess its reliability and validity.Methods:Based on a literature review,expert consultation,pre-experiment,and formal survey,a hidden hunger assessment scale was revised for high school students.The formal survey involved 9336 high school students in 11 of the 16 cities in Anhui Province,China,and 9038 valid questionnaires were collected and included in the analysis.The item analysis,internal consistency reliability,test-retest reliability,content validity,exploratory factor analysis,and confirmatory factor analysis of the HHAS-HSS were examined.Results:The HHAS-HSS included a total of 4 dimensions and 12 items:"vegetables and food diversity"(three items),"fruits and dairy products"(three items),"micronutrient-dense foods"(four items),and"health condition and eating habits"(two items).The results showed a Cronbach's alpha of 0.758,a split-half reliability of 0.829,and a test-retest reliability of o.793,indicating good internal consistency.Using the Bartlett's test and Kaiser-Meyer-Olkin test(KMO)to test the exploratory factor analysis presented a four-factor model of the HHAS-HSS,the KMO0 value was 0.820(P<0.001),which indicated the possibility for factor confirmatory factor analysis.Using the maximum variance rotation method,four factors were obtained,and the cumulative variance explained rate was 57.974%.Confirmatory factor analysis also supported the division of the scale into four dimensions,and the fitting indices were x^(2)=1417.656,x^(2)/df=29.534,goodness-of-fit index=0.974,adjusted goodnessof-fit index=0.958,parsimonious goodness-of-fit index=0.600,normed fit index=0.938,incremental fit index=0.940,Tucker-Lewis index=0.917,comparative fit index=0.939,and root mean square error of approximation=0.056.Except for x^(2)/df,all the indices reached the fitting standard,and the above results showed that the construct validity of the scale reached an acceptable level.Conclusions:The HHAS-HSS has good validity and reliability for Chinese high school students.It is a convenient self-report measure of hidden hunger risk. 展开更多
关键词 hidden hunger Reliability and validity Assessment scale High school student MICRONUTRIENTS
下载PDF
Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
10
作者 Zaid Abdulsalam Ibrahim Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第7期939-956,共18页
Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems... Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems. Moreover, such systems create security issues whileefficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT datamore secure and reliable in various cloud storage services. Cloud-assisted IoTssuffer from two privacy issues: access policies (public) and super polynomialdecryption times (attributed mainly to complex access structures). We havedeveloped a CP-ABE scheme in alignment with a Hidden HierarchyCiphertext-Policy Attribute-Based Encryption (HH-CP-ABE) access structure embedded within two policies, i.e., public policy and sensitive policy.In this proposed scheme, information is only revealed when the user’sinformation is satisfactory to the public policy. Furthermore, the proposedscheme applies to resource-constrained devices already contracted tasks totrusted servers (especially encryption/decryption/searching). Implementingthe method and keywords search resulted in higher access policy privacy andincreased security. The new scheme introduces superior storage in comparisonto existing systems (CP-ABE, H-CP-ABE), while also decreasing storage costsin HH-CP-ABE. Furthermore, a reduction in time for key generation canalso be noted.Moreover, the scheme proved secure, even in handling IoT datathreats in the Decisional Bilinear Diffie-Hellman (DBDH) case. 展开更多
关键词 Bilinear Diffie-Hellman(DBDH) Internet of Things(IoT) Ciphertext-Policy Attribute-Based Encryption(CP-ABE) hidden Hierarchy CP-ABE(HH-CP-ABE)
下载PDF
Application of"Six Thinking Hats"in the Investigation and Improvement of Hidden Dangers in Food Safety
11
作者 Peng WAN Zhen ZHAO +3 位作者 Guoyan WEN Yunshuang FU Cuizhi LI Zhiyong LU 《Asian Agricultural Research》 2023年第10期20-22,共3页
With the development of economy,people's living standards are constantly improving,and the requirements for food safety are getting higher and higher.The Food Safety Law stipulates that enterprises should implemen... With the development of economy,people's living standards are constantly improving,and the requirements for food safety are getting higher and higher.The Food Safety Law stipulates that enterprises should implement the main responsibility of food safety,and the investigation and improvement of food safety hazards plays an important role in improving the food safety management level of enterprises and reducing food safety risks.This paper combines the innovative thinking mode of six thinking hats with food safety,discusses the application mode of six thinking hats in food safety investigation and improvement,and hopes to improve food safety level through this way. 展开更多
关键词 Six thinking hats Food safety hidden danger investigation and improvement
下载PDF
Hidden Hearing Loss: Causes, Current Knowledge, and Future Directions
12
作者 Alexandra Jalkh 《International Journal of Otolaryngology and Head & Neck Surgery》 2023年第3期107-123,共17页
Introduction: Hidden hearing loss (HHL) is a type of auditory disorder that affects the auditory neural processing and hearing sensitivity in subjects with normal hearing thresholds. Unlike central auditory processing... Introduction: Hidden hearing loss (HHL) is a type of auditory disorder that affects the auditory neural processing and hearing sensitivity in subjects with normal hearing thresholds. Unlike central auditory processing disorders, HHL happens when the cochlea (the peripheral auditory organ) is affected. There are several known risk factors to HHL which includes noise exposure, ototoxic drugs, and peripheral neuropathies, and age. Recent studies have shed light on this type of hearing loss, its etiology, prevalence, and how it can affect the auditory acuity in humans. Methods: This paper covers the current research regarding HHL, its causes, the different mechanisms involved in this disorder, and the diagnosis and potential treatments related to it. We will delve deeply into different researches concerning HHL. 4 articles from 285 were selected focusing on normal hearing individuals with bad speech intelligibility were discussed in this paper. In addition, articles discussing the effects of noise exposure on hearing impaired individuals were not considered as this study solely aims to focus on normal hearing sensitivity individuals with HHL, resulting in 4 articles from 285. Results: Numerous literatures over the decades have suggested that HHL is due to the degeneration of cochlear ribbon synapses, or hair cells synapses without hair cell damage. Their association with HHL was noted several times through this study, whether we were studying the effect of noise exposure, of age, or of ototoxicity. In all cases, no significant hair cell damage was observed, and normal thresholds were recovered. However, a decline in the amplitude of Auditory Brainstem Response (ABR) peak I from auditory nerve (AN) responses in noise exposed subjects and a decline in compound action potential (CAP) was measured when certain drugs were applied to the round window of Guinea pigs. Conclusion: Most studies, have proven that cochlear synaptophysin is the major contributor to noise induced, age, and ototoxic related HHL. There are several audiometric tests that were used to help identify HHL including Puretone audiometry in background noise, ABR, CAP, Distortion Product Otoacoustic Emission (DPOAE). 展开更多
关键词 hidden Hearing Loss Speech Testing Speech Intelligibility Noise Induced Hearing Loss OTOTOXICITY Schwan’s Cells Ablation
下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
13
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
14
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 hidden WEB 爬虫 启发式算法
下载PDF
Ontology mapping based on hidden Markov model 被引量:2
15
作者 尹康银 宋自林 徐平 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期389-393,共5页
The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov mode... The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively. 展开更多
关键词 ontology heterogeneity ontology mapping hidden Markov model semantic web
下载PDF
TONE MODELING BASED ON HIDDEN CONDITIONAL RANDOM FIELDS AND DISCRIMINATIVE MODEL WEIGHT TRAINING 被引量:1
16
作者 黄浩 朱杰 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期43-50,共8页
The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and d... The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and duration features. When the tone model is integrated into continuous speech recognition, the discriminative model weight training (DMWT) is proposed. Acoustic and tone scores are scaled by model weights discriminatively trained by the minimum phone error (MPE) criterion. Two schemes of weight training are evaluated and a smoothing technique is used to make training robust to overtraining problem. Experiments show that the accuracies of tone recognition and large vocabulary continuous speech recognition (LVCSR) can be improved by the HCRFs based tone model. Compared with the global weight scheme, continuous speech recognition can be improved by the discriminative trained weight combinations. 展开更多
关键词 speech recognition MODELS hidden conditional random fields minimum phone error
下载PDF
Hidden Web信息获取 被引量:3
17
作者 陈珂 陈小英 徐科 《计算机时代》 2007年第5期54-56,共3页
如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站... 如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值。文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息。 展开更多
关键词 hidden Web hidden WEB爬虫 静态链接 搜索引擎 采样策略
下载PDF
Differential colour-ring loss among Dalmatian Pelican(Pelecanus crispus) colonies and its consequence on survival estimates
18
作者 Anastasios Bounas Giorgos Catsadorakis +3 位作者 Dionyssia Hatzilacou Theodoros Naziridis Jocelyn Champagnon Alain J.Crivelli 《Avian Research》 SCIE CSCD 2024年第1期66-71,共6页
The analysis of bird ringing data often comes with some potential sources of error and bias,as ring wear and/or loss could affect mark-recapture analyses and produce erroneous estimates of survival.Furthermore,ring we... The analysis of bird ringing data often comes with some potential sources of error and bias,as ring wear and/or loss could affect mark-recapture analyses and produce erroneous estimates of survival.Furthermore,ring wear and loss rates may differ between and within species based on the habitat they use or the species’ life-history traits and behaviour as well as the type of the ring.In this study we use resighting data from a long-term double marking experiment to directly estimate the rate of colour-ring loss among different Dalmatian Pelican colonies over time,evaluate any possible factors that could contribute to differential ring loss and assess how it may bias the results of mark-resighting analyses.Based on 14,849 resightings from 1275 individuals and using multi-state continuous-time hidden Markov models(HMMs) we showed that probability of ring loss was markedly different among colonies,ranging from 0.10 to 0.42 within the first year of marking,whereas the cumulative probability of losing a ring after ten years ranged 0.64 to 0.99.These rates are among the highest estimated when compared to previous studies in waterbirds.Our approach assessing the intra-specific variance in ring loss provided several factors potentially involved,such as the use of glue and the fledgling age accuracy and we could further hypothesise the effect of environmental factors.Finally,our results showed that ring loss can be a significant challenge for the assessment of the species’ population dynamics using mark-recapture methods as survival was consistently underestimated when not accounting for ring loss and varied significantly among different colonies. 展开更多
关键词 Bias Capture-mark-recapture Colour-ring Double-marking hidden Markov models
下载PDF
UAMP-Based Delay-Doppler Channel Estimation for OTFS Systems
19
作者 Li Zhongjie Yuan Weijie +2 位作者 Guo Qinghua Wu Nan Zhang Ji 《China Communications》 SCIE CSCD 2024年第10期1-15,共15页
Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular net... Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular networks. In this paper, we study the issues of DD channel estimation for OTFS in the presence of fractional Doppler. We first propose a channel estimation algorithm with both low complexity and high accuracy based on the unitary approximate message passing(UAMP), which exploits the structured sparsity of the effective DD domain channel using hidden Markov model(HMM). The empirical state evolution(SE) analysis is then leveraged to predict the performance of our proposed algorithm. To refine the hyperparameters in the proposed algorithm,we derive the update criterion for the hyperparameters through the expectation-maximization(EM) algorithm. Finally, Our simulation results demonstrate that our proposed algorithm can achieve a significant gain over various baseline schemes. 展开更多
关键词 channel estimation hidden Markov model(HMM) orthogonal time frequency space(OTFS) unitary approximate message passing(UAMP)
下载PDF
Optimal state and branch sequence based parameter estimation of continuous hidden Markov model
20
作者 俞璐 吴乐南 谢钧 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期136-140,共5页
A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering use... A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering used in the segmental K-means algorithm to determineoptimal state and branch sequences. Based on the optimal sequence, parameters are estimated withmaximum-likelihood as objective functions. Comparisons with the traditional Baum-Welch and segmentalK-means algorithms on various aspects, such as optimal objectives and fundamentals, are made. Allthree algorithms are applied to face recognition. Results indicate that the proposed algorithm canreduce training time with comparable recognition rate and it is least sensitive to the training set.So its average performance exceeds the other two. 展开更多
关键词 continuous hidden Markov model optimal state and branch sequence MAXIMUMLIKELIHOOD CONVERGENCE viterbi algorithm
下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部