A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nuc...A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nucleus. Connected pixels on the circle were applied to compare the intensity value with the nucleus, with the membership function used to give the fuzzy result. The pixel with maximum information gain was chosen as the parent node to build a binary decision tree. Thus, the comer detector was derived. The pictures taken in Fengtai Railway Station in Beijing were used to test the method. The experimental results show that when the number of pixels on the test mask is chosen to be 9, best result can be obtained. The comer detector significantly outperforms existing detector in computational efficiency without sacrificing the quality and the method also provides high performance against Poisson noise and Gaussian blur.展开更多
The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a...The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.展开更多
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory...The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.展开更多
Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of opt...Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of optimal structural design of the complicated multi-parameter mechanical products.On the basis of analyzing the optimal design methods and the data mining principles,an improved iterative dichotomizer 3(ID3) algorithm is hereby put forth to bring out an optimal design information model integrated with the data mining technology as well as an optimal structural design system of complicated mechanical products based on the data mining principles.The system is demonstrated by the optimal structural design of the mainframe of the full face rock tunnel boring machine(TBM).An example shows that the data mining technology has fully tackled the issues of the optimal structural design of complicated mechanical products.展开更多
基金Project(J2008X011) supported by the Natural Science Foundation of Ministry of Railway and Tsinghua University,China
文摘A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nucleus. Connected pixels on the circle were applied to compare the intensity value with the nucleus, with the membership function used to give the fuzzy result. The pixel with maximum information gain was chosen as the parent node to build a binary decision tree. Thus, the comer detector was derived. The pictures taken in Fengtai Railway Station in Beijing were used to test the method. The experimental results show that when the number of pixels on the test mask is chosen to be 9, best result can be obtained. The comer detector significantly outperforms existing detector in computational efficiency without sacrificing the quality and the method also provides high performance against Poisson noise and Gaussian blur.
文摘The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.
基金Shanghai Education Commission Foundation for Excellent Young High Education Teachers,China(No.xqz05001No.YYY-07008)
文摘The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.
基金the 10th Five Years National Key Technical Equipment Development Project of China(No. ZZ02-03-03-01)
文摘Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of optimal structural design of the complicated multi-parameter mechanical products.On the basis of analyzing the optimal design methods and the data mining principles,an improved iterative dichotomizer 3(ID3) algorithm is hereby put forth to bring out an optimal design information model integrated with the data mining technology as well as an optimal structural design system of complicated mechanical products based on the data mining principles.The system is demonstrated by the optimal structural design of the mainframe of the full face rock tunnel boring machine(TBM).An example shows that the data mining technology has fully tackled the issues of the optimal structural design of complicated mechanical products.