期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A hyperspectral image endmember extraction algorithm based on generalized morphology
1
作者 王东辉 杨秀坤 赵岩 《Optoelectronics Letters》 EI 2014年第5期387-390,共4页
Generalized morphological operator can generate less statistical bias in the output than classical morphological operator. Comprehensive utilization of spectral and spatial information of pixels, an endmember extracti... Generalized morphological operator can generate less statistical bias in the output than classical morphological operator. Comprehensive utilization of spectral and spatial information of pixels, an endmember extraction algorithm based on generalized morphology is proposed. For the limitations of morphological operator in the pixel arrangement rule and replacement criteria, the reference pixel is introduced. In order to avoid the cross substitution phenomenon at the boundary of different object categories in the image, an endmember is extracted by calculating the generalized opening-closing(GOC) operator which uses the modified energy function as a distance measure. The algorithm is verified by using simulated data and real data. Experimental results show that the proposed algorithm can extract endmember automatically without prior knowledge and achieve relatively high extraction accuracy. 展开更多
关键词 extraction Morphology PIXELS Spectroscopy Comprehensive utilizations Endmember extraction algorithms extraction accuracy Generalized morphological operators Hyper spectral images Morphological operator Object categories Spatial informations
原文传递
L-Tree Match: A New Data Extraction Model and Algorithm for Huge Text Stream with Noises 被引量:4
2
作者 邓绪斌 朱扬勇 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第6期763-773,共11页
In this paper, a new method, named as L-tree match, is presented for extracting data from complex data sources. Firstly, based on data extraction logic presented in this work, a new data extraction model is constructe... In this paper, a new method, named as L-tree match, is presented for extracting data from complex data sources. Firstly, based on data extraction logic presented in this work, a new data extraction model is constructed in which model components are structurally correlated via a generalized template. Secondly, a database-populating mechanism is built, along with some object-manipulating operations needed for flexible database design, to support data extraction from huge text stream. Thirdly, top-down and bottom-up strategies are combined to design a new extraction algorithm that can extract data from data sources with optional, unordered, nested, and/or noisy components. Lastly, this method is applied to extract accurate data from biological documents amounting to 100GB for the first online integrated biological data warehouse of China. 展开更多
关键词 data extraction data model extraction algorithm regular expression WRAPPER
原文传递
A Novel Immune System Model and Its Application to Network Intrusion Detection 被引量:2
3
作者 LingJun CaoYang +1 位作者 YinJian-hua HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期393-398,共6页
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I... Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model. 展开更多
关键词 Key words network Intrusion Detection System 5 Immune System self profile automated self profile extraction algorithm
下载PDF
Optimization and Control of Extractive Distillation with Heat Integration for Separating Benzene/Cyclohexane Mixtures 被引量:3
4
作者 Li Lumin Tu Yangqin +2 位作者 Guo Lianjie Sun Lanyi Tian Yuanyu 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2016年第4期117-127,共11页
In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extracti... In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extractive distillation process is established to achieve minimum energy requirement using the multi-objective genetic algorithm, and the results show that energy saving for this heat integration process is 15.7%. Finally, the control design is performed to investigate the system's dynamic performance, and three control structures are studied. The pressure-compensated temperature control scheme is proposed based on the first two control structures, and the dynamic responses reveal that the feed disturbances in both flow rate and benzene composition can be mitigated well. 展开更多
关键词 extractive distillation heat integration optimization genetic algorithm dynamic simulation
下载PDF
Development of anti-phishing browser based on random forest and rule of extraction framework
5
作者 Mohith Gowda HR Adithya MV +1 位作者 Gunesh Prasad S Vinay S 《Cybersecurity》 CSCD 2020年第1期267-280,共14页
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person ma... Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36%in the identification of phishing websites in realtime. 展开更多
关键词 Phishing attack Machine learning Intelligent browser engine Rule of extraction algorithm Browser architecture
原文传递
Development of anti-phishing browser based on random forest and rule of extraction framework
6
作者 Mohith Gowda HR Adithya MV +1 位作者 Gunesh Prasad S Vinay S 《Cybersecurity》 2018年第1期879-892,共14页
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person ma... Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information,such as login credentials and credit and debit card information,etc.It is carried out by a person masquerading as an authentic individual.To protect web users from these attacks,various anti-phishing techniques are developed,but they fail to protect the user from these attacks in various ways.In this paper,we propose a novel technique to identify phishing websites effortlessly on the client side by proposing a novel browser architecture.In this system,we use the rule of extraction framework to extract the properties or features of a website using the URL only.This list consists of 30 different properties of a URL,which will later be used by the Random Forest Classification machine learning model to detect the authenticity of the website.A dataset consisting of 11,055 tuples is used to train the model.These processes are carried out on the client-side with the help of a redesigned browser architecture.Today Researches have come up with machine learning frameworks to detect phishing sites,but they are not in a state to be used by individuals having no technical knowledge.To make sure that these tools are accessible to every individual,we have improvised and introduced detection methods into the browser architecture named as‘Embedded Phishing Detection Browser’(EPDB),which is a novel method to preserve the existing user experience while improving the security.The newly designed browser architecture introduces a special segment to perform phishing detection operations in real-time.We have prototyped this technique to ensure maximum security,better accuracy of 99.36% in the identification of phishing websites in realtime. 展开更多
关键词 Phishing attack Machine learning Intelligent browser engine Rule of extraction algorithm Browser architecture
原文传递
A stall diagnosis method based on entropy feature identification in axial compressors
7
作者 Yang Liu Juan Du +3 位作者 Jichao Li Yang Xu Junqiang Zhu Chaoqun Nie 《International Journal of Mechanical System Dynamics》 2023年第1期73-84,共12页
A stall diagnosis method based on the entropy feature extraction algorithm is developed in axial compressors.The reliability of the proposed method is determined and a parametric sensitivity analysis is experimentally... A stall diagnosis method based on the entropy feature extraction algorithm is developed in axial compressors.The reliability of the proposed method is determined and a parametric sensitivity analysis is experimentally conducted for two different types of compressor stall diagnoses.A collection of time‐resolved pressure sensors is mounted circumferentially and along the chord direction to measure the dynamic pressure on the casing.Results show that the stall and prestall precursor embedded in the dynamic pressures are identified through nonlinear feature perturbation extraction using the entropy feature extraction algorithm.Further analysis demonstrates that the prestall precursor with the peak entropy value is related to the unsteady tip leakage flow for the spike‐type stall diagnosis.The modal wave inception with increasing amplitude is identified by the considerable increase of the entropy value.The flow field in the tip region indicates that the modal wave corresponds to the flow separation in the suction side of the rotor blade.The warning time is 100–300 rotor revolutions for both types of stall diagnoses,which is beneficial for stall control in different axial compressors.Moreover,a parametric study of the embedding dimension m,similar tolerance n,similar radius r,and data length N in the fuzzy entropy method is conducted to determine the optimal parameter setting for stall diagnosis.The stall warning based on the entropy feature extraction algorithm provides a new stall diagnosis approach in the axial compressor with different stall types.This stall warning can also be adopted as an online stability monitoring index when using the concept of active stall control. 展开更多
关键词 stall diagnosis entropy feature extraction algorithm fuzzy approximate entropy axial compressor
原文传递
Measurement of particle size based on digital imaging technique
8
作者 陈红 唐洪武 +2 位作者 刘云 王浩 刘贵平 《Journal of Hydrodynamics》 SCIE EI CSCD 2013年第2期242-248,共7页
To improve the analysis methods for the measurement of the sediment particle sizes with a wide distribution and of irregular shapes, a sediment particle image measurement, an analysis system, and an extraction algorit... To improve the analysis methods for the measurement of the sediment particle sizes with a wide distribution and of irregular shapes, a sediment particle image measurement, an analysis system, and an extraction algorithm of the optimal threshold based on the gray histogram peak values are proposed. Recording the pixels of the sediment particles by labeling them, the algorithm can effectively separate the sediment particle images from the background images using the equivalent pixel circles with the same diameters to represent the sediment particles. Compared with the laser analyzer for the case of blue plastic sands, the measurement results of the system are shown to be reasonably similar. The errors are mainly due to the small size of the particles and the limitation of the apparatus. The measurement accuracy can be improved by increasing the Charge-Coupled Devices (CCD) camera resolution. The analysis method of the sediment particle images can provide a technical support for the rapid measurement of the sediment particle size and its distribution. 展开更多
关键词 particle size extraction algorithm of optimal threshold equivalent circle transformation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部