期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
应用计算机模式识别技术研究微量元素与健康的关系 被引量:5
1
作者 余煜棉 李增禧 《广东微量元素科学》 CAS 1995年第12期1-9,共9页
介绍了微量元素检测数据的一般统计方法,着重推荐应用计算机模式识别技术统计数据。文中介绍计算机模式识别技术的原理和作者应用该技术在微量元素科学的研究中取得的部分成果。
关键词 计算机模式识别技术 微量元素 人体健康 数据统计
下载PDF
计算机模式识别技术在图书馆的应用研究 被引量:1
2
作者 赵迎春 《黑龙江科技信息》 2016年第14期186-186,共1页
各项科技的发展为社会的众多行业提供了很大的便利,尤其是计算机科技技术的发展对图书馆中的管理方面。计算机的技术手段具有多种多样性,这些技术手段会使得图书馆的管理和其他方面的应用能够顺利的进行。在现在计算机技术手段中,现在... 各项科技的发展为社会的众多行业提供了很大的便利,尤其是计算机科技技术的发展对图书馆中的管理方面。计算机的技术手段具有多种多样性,这些技术手段会使得图书馆的管理和其他方面的应用能够顺利的进行。在现在计算机技术手段中,现在社会上在最常见就是计算机图像模式识别技术,这种技术在很大的程度上具备能对图书进行修复的特点,这些对现在社会上的图书馆管理起到非常重要的作用。 展开更多
关键词 计算机模式识别技术 图书馆 数字图书资料 图像模式识别
下载PDF
补益中药材药效计算机分类法研究 被引量:2
3
作者 郑育平 《广东微量元素科学》 CAS 2004年第3期31-36,共6页
根据计算机模式识别法的马氏 (Mahalanobis)距离判别法原理 ,用VisualBasic语言编制应用程序软件系统 ,对补气、补阳、补阴和补血等四类补益中药材中的十二种矿物元素谱进行分类判别研究。当选择Sr、Cr、Co、Ni、Mn、Cu、Zn、Fe、Na、C... 根据计算机模式识别法的马氏 (Mahalanobis)距离判别法原理 ,用VisualBasic语言编制应用程序软件系统 ,对补气、补阳、补阴和补血等四类补益中药材中的十二种矿物元素谱进行分类判别研究。当选择Sr、Cr、Co、Ni、Mn、Cu、Zn、Fe、Na、Ca等元素为特征参量 ,将药材中这些无机元素含量值作为客观指标 ,可准确地对四类补益药进行分类鉴别。训练样本的学习准确识别率为 94 7%,待判补益中药的准确预报率为 90 4%。本法为使用客观的检测指标 ,对中药材药效进行分类、鉴别提供了新的途径。 展开更多
关键词 补益中药材 矿物元素 计算机模式识别技术 药效分类判别
下载PDF
牌照识别技术在福建省高速公路联网收费中的应用
4
作者 沈钦忠 《中国交通信息产业》 2003年第3期93-96,共4页
福建省自1994年6月开工建设全省第一条高速公路--泉(州)-厦(门)高速公路以来,至2002年12月己建成通车的高速公路共584公里,其中国道主干线同(江)三(亚)线福建段的北起福(州)宁(德)高速公路的漳湾站,南至漳(州)诏(安)高速公路的闽粤交界... 福建省自1994年6月开工建设全省第一条高速公路--泉(州)-厦(门)高速公路以来,至2002年12月己建成通车的高速公路共584公里,其中国道主干线同(江)三(亚)线福建段的北起福(州)宁(德)高速公路的漳湾站,南至漳(州)诏(安)高速公路的闽粤交界处的主线站,全长共540余公里(分7个路段、39个收费站)的高速公路,己全部实现非接触式IC卡"一卡通"联网收费.福宁高速公路的漳湾至闽浙交界的主线站约132公里的高速公路,将于今年6月底通车,届时同三福建段高速公路全线约660多公里将全部开通,全省高速公路通车里程将达到720公里.根据福建省高速公路建设总体规划,至2017年,全省将建成"三纵四横"总长约3230公里的高速公路网. 展开更多
关键词 牌照识别技术 福建 高速公路 联网收费系统 系统结构 识别原理 计算机模式识别技术 工作流程 补偿方案 车道监控摄像机 识别单元 识别方式
下载PDF
彩色图像/视频的两点三次Hermite插值技术及在情报可视化中的应用 被引量:2
5
作者 朱学芳 《情报杂志》 CSSCI 北大核心 2002年第12期8-10,共3页
计算机图像模式识别技术的发展 ,加上情报学对图像 视频等较大信息量的快速存储、检索、应用要求 ,使得图像处理技术在情报可视化中有越来越广泛的应用。本文叙述基于两点三次Hermite插值的技术实现及针对数字图像信号特点应用问题 ,... 计算机图像模式识别技术的发展 ,加上情报学对图像 视频等较大信息量的快速存储、检索、应用要求 ,使得图像处理技术在情报可视化中有越来越广泛的应用。本文叙述基于两点三次Hermite插值的技术实现及针对数字图像信号特点应用问题 ,全部用VC ++6 .0编程实现Hermite插值重构算法 ,并有效地应用于实际的BMP格式的彩色数字图像文件、AVI格式的彩色数字视频文件的重构和放大显示 ;分析方法、实现程序可用于其它格式的彩色数字图像 视频文件插值重构和放大显示 ;可以应用于信息可视化中图像尺度的变换 ,以便在较小的尺度上 ,快速地检索、显示和浏览图像 展开更多
关键词 计算机图像模式识别技术 彩色图像/视频 HERMITE插值 情报可视化
下载PDF
SEMI-FRAGILE WATERMARKING ALGORITHM FOR IMAGE TAMPERS LOCALIZATION AND RECOVERY 被引量:2
6
作者 Jiang Xuemei Liu Quan 《Journal of Electronics(China)》 2008年第3期343-351,共9页
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localizat... Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery. 展开更多
关键词 Image authentication Tamper localization Image recovery Semi-fragile watermark
下载PDF
BFA BASED NEURAL NETWORK FOR IMAGE COMPRESSION 被引量:4
7
作者 Chu Ying Mi Hua +2 位作者 Ji Zhen Shao Zibo Q. H. Wu 《Journal of Electronics(China)》 2008年第3期405-408,共4页
A novel Bacterial Foraging Algorithm (BFA) based neural network is presented for image compression. To improve the quality of the decompressed images, the concepts of reproduction, elimination and dispersal in BFA are... A novel Bacterial Foraging Algorithm (BFA) based neural network is presented for image compression. To improve the quality of the decompressed images, the concepts of reproduction, elimination and dispersal in BFA are firstly introduced into neural network in the proposed algorithm. Extensive experiments are conducted on standard testing images and the results show that the pro- posed method can improve the quality of the reconstructed images significantly. 展开更多
关键词 Bacterial Foraging Algorithm (BFA) Artificial Neural Network (ANN) Back Propagation(BP) Image compression
下载PDF
A ROBUST EYE LOCALIZATION ALGORITHM FOR FACE RECOGNITION 被引量:2
8
作者 Zhang Wencong Li Xin Yao Peng Li Bin Zhuang Zhenquan 《Journal of Electronics(China)》 2008年第3期337-342,共6页
The accuracy of face alignment affects greatly the performance of a face recognition system. Since the face alignment is usually conducted using eye positions, the algorithm for accurate eye lo- calization is essentia... The accuracy of face alignment affects greatly the performance of a face recognition system. Since the face alignment is usually conducted using eye positions, the algorithm for accurate eye lo- calization is essential for the accurate face recognition. In this paper, an algorithm is proposed for eye localization. First, the proper AdaBoost detection is adaptively trained to segment the region based on the special gray distribution in the region. After that, a fast radial symmetry operator is used to pre- cisely locate the center of eyes. Experimental results show that the method can accurately locate the eyes, and it is robust to the variations of face poses, illuminations, expressions, and accessories. 展开更多
关键词 Eye localization ADABOOST Fast radial symmetry
下载PDF
Unsupervised Color-texture Image Segmentation
9
作者 郁生阳 张艳 +1 位作者 王永刚 杨杰 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期71-75,共5页
The measure J in J value segmentation (JSEG) fails to represent the discontinuity of color, which degrades the robustness and discrimination of JSEG. An improved approach for JSEG algorithm was proposed for unsupervis... The measure J in J value segmentation (JSEG) fails to represent the discontinuity of color, which degrades the robustness and discrimination of JSEG. An improved approach for JSEG algorithm was proposed for unsupervised color-texture image segmentation. The texture and photometric invariant edge information were combined, which results in a discriminative measure for color-texture homogeneity. Based on the image whose pixel values are values of the new measure, region growing-merging algorithm used in JSEG was then employed to segment the image. Finally, experiments on a variety of real color images demonstrate performance improvement due to the proposed method. 展开更多
关键词 color-texture segmentation J value segmentation (JSEG) photometric color invariance edge detection region growing
下载PDF
The Recognition of Silk Fabric Defects Based on Biorthogonal Wavelet Analysis and SOM Neural Network
10
作者 刘建立 左保齐 《Journal of Donghua University(English Edition)》 EI CAS 2007年第3期313-316,325,共5页
A feasible approach for the recognition of silk fabric defects based on wavelet transform and SOM neural network is proposed in this paper, the indispensable processes of which are defect images denoising and enhancem... A feasible approach for the recognition of silk fabric defects based on wavelet transform and SOM neural network is proposed in this paper, the indispensable processes of which are defect images denoising and enhancement, image edge detection, feature extraction and defects identification. Both geometrical and textmal feature parmnete~ are extracted from the edge image and the enhanced defect image, and utilize SOM neural network to recognize the common defects which silk fabrics have, including warplacking, weft-lacking, double weft, loom bars, oil-stains. Experimental resets show the advantages with high identification correctness and high inspection speed. 展开更多
关键词 silk fabrics defect recognition waveletanalysis neural network
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部