期刊文献+
共找到98篇文章
< 1 2 5 >
每页显示 20 50 100
Dismissing Doubts andClearing Away Confusions─Outline of Speech Delivered at the Seminar Initiatingthe Xia-Shang-Zhou Chronology Project, 16 May 1996
1
作者 宋健 《Social Sciences in China》 1997年第3期71-82,191,共13页
关键词 OBC May 1996 Outline of Speech Delivered at the Seminar Initiatingthe Xia-Shang-Zhou Chronology Project Dismissing Doubts andClearing Away confusions
原文传递
A method to predict rockburst using temporal trend test and its application
2
作者 Yarong Xue Zhenlei Li +5 位作者 Dazhao Song Xueqiu He Honglei Wang Chao Zhou Jianqiang Chen Aleksei Sobolev 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第3期909-923,共15页
Rockbursts have become a significant hazard in underground mining,underscoring the need for a robust early warning model to ensure safety management.This study presents a novel approach for rockburst prediction,integr... Rockbursts have become a significant hazard in underground mining,underscoring the need for a robust early warning model to ensure safety management.This study presents a novel approach for rockburst prediction,integrating the Mann-Kendall trend test(MKT)and multi-indices fusion to enable real-time and quantitative assessment of rockburst hazards.The methodology employed in this study involves the development of a comprehensive precursory index library for rockbursts.The MKT is then applied to analyze the real-time trend of each index,with adherence to rockburst characterization laws serving as the warning criterion.By employing a confusion matrix,the warning effectiveness of each index is assessed,enabling index preference determination.Ultimately,the integrated rockburst hazard index Q is derived through data fusion.The results demonstrate that the proposed model achieves a warning effectiveness of 0.563 for Q,surpassing the performance of any individual index.Moreover,the model’s adaptability and scalability are enhanced through periodic updates driven by actual field monitoring data,making it suitable for complex underground working environments.By providing an efficient and accurate basis for decision-making,the proposed model holds great potential for the prevention and control of rockbursts.It offers a valuable tool for enhancing safety measures in underground mining operations. 展开更多
关键词 ROCKBURST MICROSEISMICITY Early warning Mann-Kendall trend test Confusion matrix Multi-indices fusion
下载PDF
Risk assessment of rockburst using SMOTE oversampling and integration algorithms under GBDT framework
3
作者 WANG Jia-chuang DONG Long-jun 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第8期2891-2915,共25页
Rockburst is a common geological disaster in underground engineering,which seriously threatens the safety of personnel,equipment and property.Utilizing machine learning models to evaluate risk of rockburst is graduall... Rockburst is a common geological disaster in underground engineering,which seriously threatens the safety of personnel,equipment and property.Utilizing machine learning models to evaluate risk of rockburst is gradually becoming a trend.In this study,the integrated algorithms under Gradient Boosting Decision Tree(GBDT)framework were used to evaluate and classify rockburst intensity.First,a total of 301 rock burst data samples were obtained from a case database,and the data were preprocessed using synthetic minority over-sampling technique(SMOTE).Then,the rockburst evaluation models including GBDT,eXtreme Gradient Boosting(XGBoost),Light Gradient Boosting Machine(LightGBM),and Categorical Features Gradient Boosting(CatBoost)were established,and the optimal hyperparameters of the models were obtained through random search grid and five-fold cross-validation.Afterwards,use the optimal hyperparameter configuration to fit the evaluation models,and analyze these models using test set.In order to evaluate the performance,metrics including accuracy,precision,recall,and F1-score were selected to analyze and compare with other machine learning models.Finally,the trained models were used to conduct rock burst risk assessment on rock samples from a mine in Shanxi Province,China,and providing theoretical guidance for the mine's safe production work.The models under the GBDT framework perform well in the evaluation of rockburst levels,and the proposed methods can provide a reliable reference for rockburst risk level analysis and safety management. 展开更多
关键词 rockburst evaluation SMOTE oversampling random search grid K-fold cross-validation confusion matrix
下载PDF
Confusing Object Detection:A Survey
4
作者 Kunkun Tong Guchu Zou +5 位作者 Xin Tan Jingyu Gong Zhenyi Qi Zhizhong Zhang Yuan Xie Lizhuang Ma 《Computers, Materials & Continua》 SCIE EI 2024年第9期3421-3461,共41页
Confusing object detection(COD),such as glass,mirrors,and camouflaged objects,represents a burgeoning visual detection task centered on pinpointing and distinguishing concealed targets within intricate backgrounds,lev... Confusing object detection(COD),such as glass,mirrors,and camouflaged objects,represents a burgeoning visual detection task centered on pinpointing and distinguishing concealed targets within intricate backgrounds,leveraging deep learning methodologies.Despite garnering increasing attention in computer vision,the focus of most existing works leans toward formulating task-specific solutions rather than delving into in-depth analyses of methodological structures.As of now,there is a notable absence of a comprehensive systematic review that focuses on recently proposed deep learning-based models for these specific tasks.To fill this gap,our study presents a pioneering review that covers both themodels and the publicly available benchmark datasets,while also identifying potential directions for future research in this field.The current dataset primarily focuses on single confusing object detection at the image level,with some studies extending to video-level data.We conduct an in-depth analysis of deep learning architectures,revealing that the current state-of-the-art(SOTA)COD methods demonstrate promising performance in single object detection.We also compile and provide detailed descriptions ofwidely used datasets relevant to these detection tasks.Our endeavor extends to discussing the limitations observed in current methodologies,alongside proposed solutions aimed at enhancing detection accuracy.Additionally,we deliberate on relevant applications and outline future research trajectories,aiming to catalyze advancements in the field of glass,mirror,and camouflaged object detection. 展开更多
关键词 Confusing object detection mirror detection glass detection camouflaged object detection deep learning
下载PDF
Image encryption algorithm based on multiple chaotic systems and improved Joseph block scrambling
5
作者 Dingkang Mou Yumin Dong 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期248-257,共10页
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and... With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption. 展开更多
关键词 mersenne twister algorithm DNA coding confusion pixel XOR operation improved Joseph block scrambling
下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
6
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
下载PDF
Incidence and Risk Factors of Sub-syndromal Delirium in Patients after Cardiac Surgery
7
作者 Baoyi YANG Longti LI +3 位作者 Na WANG Yan ZHAN Lei CAO Rong WANG 《Medicinal Plant》 2024年第1期62-65,78,共5页
[Objectives]This study aimed to investigate the incidence and risk factors associated with SSD in patients following cardiac surgery.[Methods]A total of 378 patients who underwent cardiac surgery in Taihe Hospital wer... [Objectives]This study aimed to investigate the incidence and risk factors associated with SSD in patients following cardiac surgery.[Methods]A total of 378 patients who underwent cardiac surgery in Taihe Hospital were recruited and screened.Diagnosis of delirium was made using evaluation methods and DSM-5 criteria.SSD was defined as the presence of one or more core features of delirium without meeting the full diagnostic criteria.Statistical analysis included independent samples t-test for group comparisons and binary logistic regression analysis to identify independent risk factors for SSD after cardiac surgery.[Results]Among the 378 subjects,112(29.63%)had SSD,28(7.41%)had delirium,and the remaining 238 patients(62.96%)did not present with delirium.Univariate analysis revealed that age,APACHE II score,duration of aortic clamping,length of ICU stay,duration of sedation use,and daily sleep time were significant risk factors for the occurrence of SSD(P<0.05).Logistic regression analysis identified age>70 years old,APACHE II score>20 points,length of ICU stay>5 d,and duration of sedation use>24 h as independent risk factors for SSD after cardiac surgery(P<0.05).A functional model was fitted based on the analysis results of the binary logistic regression model,yielding the equation logit P=1.472X_(1)+2.213X_(2)+3.028X_(3)+1.306X_(4).[Conclusions]Comprehensive clinical assessment is crucial for patients undergoing cardiac surgery,and appropriate preventive measures should be taken for patients with identified risk factors.Close monitoring of the patient s consciousness should be implemented postoperatively,and timely interventions should be conducted.Further research should focus on model validation and optimization. 展开更多
关键词 Subsyndromal delirium Cardiac surgery PATIENT Confusion assessment method for intensive care units version(CAM-ICU)
下载PDF
Leaf epidermal characters of Lonicera japonica and Lonicera confuse and their ecology adaptation 被引量:3
8
作者 李强 余龙江 +3 位作者 邓艳 李为 栗茂腾 曹建华 《Journal of Forestry Research》 SCIE CAS CSCD 2007年第2期103-108,共6页
The leaf epidermis of Japanese honeysuckle (Lonicera japonica Thunb.) and Wild Honeysuckle (Lonicera confusa) in the genus of Flos Lonicerae were mainly observed by scanning electron microscopes (SEM) to study t... The leaf epidermis of Japanese honeysuckle (Lonicera japonica Thunb.) and Wild Honeysuckle (Lonicera confusa) in the genus of Flos Lonicerae were mainly observed by scanning electron microscopes (SEM) to study the characteristics of stomata, trichomes and dermal cell, etc.. The results showed that stoma exists only on the lower epidermis and its distribution is irregular, and leaf epidermis consist of epidermis cells, stoma complexes and bushy trichomes including glandular hair and non-glandular hair. On the upper epidermis, anticlinal wall caves in sinuous groove to countercheck the transpiration. Evidences from leaf morphological structures serve as another proof on drought-resistant mechanisms. Some strumaes distributing regularly are hypothesized as oxalic calcium on the lower epidermis under laser scanning confocal microscopy (LSCM) with Fluo-3/AM, which can increase their endurance to drought stress. Therefore, the above characteristics of Flos Lonicerae can reduce the loss of water and make Japanese honeysuckle and Wild Honeysuckle adapt to the droughty environment at Karst area in southwest China. However, there is some difference of the two species. From the SEM (Scanning Electron Microscopy) result, it is shown that on the upper epidermis, some glandular hair regularly present along the midrib of Japanese honeysuckle, but Wild Honeysuckle has no glandular hair on the upper epidermis, which can verify the relationships of Flos Lonicerae species and provide the significance for classification of Flos Lonicerae. 展开更多
关键词 Lonicera japonica Lonicera confuse Flos Lonicerae Dermal cell STOMATA TRICHOMES Ecology adaptation
下载PDF
Study on Extracting Information about Settlements Distribution in Western Jilin Province Based on Decision Tree Model 被引量:1
9
作者 连懿 陈圣波 +1 位作者 王亚楠 逄超 《Journal of Landscape Research》 2010年第2期92-95,共4页
With western Jilin Province as the study region, spectral characteristics and texture features of remote sensing images were taken as the classification basis to construct a Decision Tree Model and extract information... With western Jilin Province as the study region, spectral characteristics and texture features of remote sensing images were taken as the classification basis to construct a Decision Tree Model and extract information about settlements in western Jilin Province, and the manually-extracted information about settlements in western Jilin Province was evaluated by confusion matrix. The results showed that Decision Tree Model was convenient for extracting settlements information by integrating spectral and texture features, and the accuracy of such a method was higher than that of the traditional Maximum Liklihood Method, in addition, calculation methods of extracting settlements information by this mean were concluded. 展开更多
关键词 SETTLEMENTS TM Western Jilin Province Spectral characteristics Texture features Decision Tree Confusion matrix
下载PDF
Lessons learned from the past serving as a guide for the future---On a state harmonious development from Naipaurs novel A bend in the river
10
作者 马小强 陈容 《Sino-US English Teaching》 2009年第4期62-64,67,共4页
Naipaul's novel A bend in the river illustrates the social confusion and people's destitution and wasting time in African countries after their national independence. An important reason is the president's self-pub... Naipaul's novel A bend in the river illustrates the social confusion and people's destitution and wasting time in African countries after their national independence. An important reason is the president's self-publicity, tyrannical hess and destructiveness. Whereas the author's subjective suspicion is visible in democratic development of African countries. Indeed, in a country development, it is quite necessary to depend on its citizen, observing public feelings; controlling a state with science; benefiting citizen; utilizing resources; constructing homestead, intending creation with a harmonious and stable way. 展开更多
关键词 African countries social confusion people's destitution harmonious stableness scientific development
下载PDF
《英美文学选读》辅导(16)
11
作者 井卫华 《语言教育》 2002年第4期25-26,共2页
1.文学常识1.Modernism-It is a label loosely applied to theworks of certain writers of the late nineteenthand early twentieth centuries who investigatedthe structure and texture of literature andchallenged its CONVENTI... 1.文学常识1.Modernism-It is a label loosely applied to theworks of certain writers of the late nineteenthand early twentieth centuries who investigatedthe structure and texture of literature andchallenged its CONVENTIONS.The years from1910 to 1930 are often called the Era of Moder-nism,for there seems to have been in both 展开更多
关键词 英美文学 文学常识 texture label awareness SENTENCE CONFUSION RELIGIOUS FAVORITE PRAISE
下载PDF
Integrating vegetation indices and geo-environmental factors in GIS-based landslide-susceptibility mapping:using logistic regression 被引量:4
12
作者 Himasha D.ABEYSIRIWARDANA Pattiyage I.A.GOMES 《Journal of Mountain Science》 SCIE CSCD 2022年第2期477-492,共16页
This study aimed to assess the potential of in-situ measured soil and vegetation characteristics in landslide susceptibility analyses.First,data for eight independent variables,i.e.,soil moisture content,soil organic ... This study aimed to assess the potential of in-situ measured soil and vegetation characteristics in landslide susceptibility analyses.First,data for eight independent variables,i.e.,soil moisture content,soil organic content,compaction of soil(soil toughness),plant root strength,crop biomass,tree diameter at knee height,Shannon Wiener Index(SWI)for trees and herbs was assembled from field tests at two historic landslide locations:Aranayaka and Kurukudegama,Sri Lanka.An economical,finer resolution database was obtained as the field tests were not cost-prohibitive.The logistic regression(LR)analysis showed that soil moisture content,compaction of soil,SWI for trees and herbs were statistically significant at P<0.05.The variance inflation factors(VIFs)were computed to test for multicollinearity.VIF values(<2)confirmed the absence of multicollinearity between four independent variables in the LR model.Receiver Operating Characteristics(ROC)curve and Confusion Metrix(CM)methods were used to validate the model.In ROC analysis,areas under the curve of Success Rate Curve and Prediction Rate Curve were 84.5% and 96.6%,respectively,demonstrating the model’s excellent compatibility and predictability.According to the CM,the model demonstrated a 79.6% accuracy,63.6% precision,100% recall,and a F-measure of 77.8%.The model coefficients revealed that the vegetation cover has a more significant contribution to landslide susceptibility than soil characteristics.Finally,the susceptibility map,which was then classified as low,medium,and highly susceptible areas based on the natural breaks(Jenks)method,was generated using geographical information systems(GIS)techniques.All the historic landslide locations fell into the high susceptibility areas.Thus,validation of the model and inspection of the susceptibility map indicated that the in-situ soil and vegetation characteristics used in the model could be employed to demarcate historical landslide patches and identify landslide susceptible locations with high confidence. 展开更多
关键词 Landslide Susceptibility Slope stability GIS Logistic regression Area under the curve Confusion Metrix
下载PDF
A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system 被引量:3
13
作者 柴秀丽 甘志华 +2 位作者 路杨 张苗辉 陈怡然 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期76-88,共13页
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them.... Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional(4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes,and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication. 展开更多
关键词 genetic recombination memristive hyperchaotic system color image encryption CONFUSION DIFFUSION
下载PDF
Multi-Candidate Voting Model Based on Blockchain 被引量:3
14
作者 Dongliang Xu Wei Shi +1 位作者 Wensheng Zhai Zhihong Tian 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1891-1900,共10页
Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as i... Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as its need for a concurrent guaranteed trusted third party,should not be overlooked.With the advent of blockchain technology in recent years,its features such as decentralization,anonymity,and non-tampering have made it a good candidate in solving the problems that electronic voting faces.In this study,we propose a multi-candidate voting model based on the blockchain technology.With the introduction of an asymmetric encryption and an anonymity-preserving voting algorithm,votes can be counted without relying on a third party,and the voting results can be displayed in real time in a manner that satisfies various levels of voting security and privacy requirements.Experimental results show that the proposed model solves the aforementioned problems of electronic voting without significant negative impact from an increasing number of voters or candidates. 展开更多
关键词 Blockchain multi-candidate voting model VOTING voting anonymity confusion algorithm
下载PDF
Candidate Expansion Algorithm Based on WeightedSyllable Confusion Matrix for Mandarin LVCSR 被引量:2
15
作者 常凤香 李宝祥 +1 位作者 刘刚 郭军 《China Communications》 SCIE CSCD 2013年第7期104-112,共9页
The inclusion of more potentially correct words in the candidate sets is important to improve the accuracy of Large Vocabulary Continuous Speech Recognition (LVCSR). A candidate expansion algorithm based on the Weig... The inclusion of more potentially correct words in the candidate sets is important to improve the accuracy of Large Vocabulary Continuous Speech Recognition (LVCSR). A candidate expansion algorithm based on the Weighted Syllable Confusion Matrix (WSCM) is proposed. First, WSCM is derived from a confusion network. Then, the reeognised candidates in the confusion network is used to conjeeture the most likely correct words based on WSCM, after which, the conjectured words are combined with the recognised candidates to produce an expanded candidate set. Finally, a combined model having mutual information and a trigram language model is used to rerank the candidates. The experiments on Mandarin film data show that an improvement of 9.57% in the character correction rate is obtained over the initial recognition performance on those light erroneous utterances. 展开更多
关键词 speech recognition candidate expansion confusion matrix
下载PDF
Novel Active Learning Method for Speech Recognition 被引量:1
16
作者 Liu Gang Chen Wei Guo Jun 《China Communications》 SCIE CSCD 2010年第5期29-39,共11页
In speech recognition, acoustic modeling always requires tremendous transcribed samples, and the transcription becomes intensively time-consuming and costly. In order to aid this labor-intensive process, Active Learni... In speech recognition, acoustic modeling always requires tremendous transcribed samples, and the transcription becomes intensively time-consuming and costly. In order to aid this labor-intensive process, Active Learning (AL) is adopted for speech recognition, where only the most informative training samples are selected for manual annotation. In this paper, we propose a novel active learning method for Chinese acoustic modeling, the methods for initial training set selection based on Kullback-Leibler Divergence (KLD) and sample evaluation based on multi-level confusion networks are proposed and adopted in our active learning system, respectively. Our experiments show that our proposed method can achieve satisfying performances. 展开更多
关键词 active learning acoustic model speech recognition KLD confusion network
下载PDF
Vibration Based Tool Insert Health Monitoring Using Decision Tree and Fuzzy Logic 被引量:1
17
作者 Kundur Shantisagar R.Jegadeeshwaran +1 位作者 G.Sakthivel T.M.Alamelu Manghai 《Structural Durability & Health Monitoring》 EI 2019年第3期303-316,共14页
The productivity and quality in the turning process can be improved by utilizing the predicted performance of the cutting tools.This research incorporates condition monitoring of a non-carbide tool insert using vibrat... The productivity and quality in the turning process can be improved by utilizing the predicted performance of the cutting tools.This research incorporates condition monitoring of a non-carbide tool insert using vibration analysis along with machine learning and fuzzy logic approach.A non-carbide tool insert is considered for the process of cutting operation in a semi-automatic lathe,where the condition of tool is monitored using vibration characteristics.The vibration signals for conditions such as heathy,damaged,thermal and flank were acquired with the help of piezoelectric transducer and data acquisition system.The descriptive statistical features were extracted from the acquired vibration signal using the feature extraction techniques.The extracted statistical features were selected using a feature selection process through J48 decision tree algorithm.The selected features were classified using J48 decision tree and fuzzy to develop the fault diagnosis model for the improved predictive analysis.The decision tree model produced the classification accuracy as 94.78%with five selected features.The developed fuzzy model produced the classification accuracy as 94.02%with five membership functions.Hence,the decision tree has been proposed as a suitable fault diagnosis model for predicting the tool insert health condition under different fault conditions. 展开更多
关键词 Statistical features J48 decision tree algorithm confusion matrix fuzzy logic WEKA
下载PDF
A random forest algorithm based on similarity measure and dynamic weighted voting 被引量:1
18
作者 ZHAO Shu-xu MA Qin-jing LIU Li-jiao 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第3期277-284,共8页
The random forest model is universal and easy to understand, which is often used for classification and prediction. However, it uses non-selective integration and the majority rule to judge the final result, thus the ... The random forest model is universal and easy to understand, which is often used for classification and prediction. However, it uses non-selective integration and the majority rule to judge the final result, thus the difference between the decision trees in the model is ignored and the prediction accuracy of the model is reduced. Taking into consideration these defects, an improved random forest model based on confusion matrix (CM-RF)is proposed. The decision tree cluster is selectively constructed by the similarity measure in the process of constructing the model, and the result is output by using the dynamic weighted voting fusion method in the final voting session. Experiments show that the proposed CM-RF can reduce the impact of low-performance decision trees on the output result, thus improving the accuracy and generalization ability of random forest model. 展开更多
关键词 random forest confusion matrix similarity measure dynamic weighted voting
下载PDF
A Fast Recognition System for Isolated Printed Characters Using Center of Gravity and Principal Axis 被引量:1
19
作者 Ahmed M. Shaffie Galal A. Elkobrosy 《Applied Mathematics》 2013年第9期1313-1319,共7页
The purpose of this paper is to propose a new multi stage algorithm for the recognition of isolated characters. It was similar work done before using only the center of gravity (This paper is extended version of “A f... The purpose of this paper is to propose a new multi stage algorithm for the recognition of isolated characters. It was similar work done before using only the center of gravity (This paper is extended version of “A fast recognition system for isolated printed characters using center of gravity”, LAP LAMBERT Academic Publishing 2011, ISBN: 978-38465-0002-6), but here we add using principal axis in order to make the algorithm rotation invariant. In my previous work which is published in LAP LAMBERT, I face a big problem that when the character is rotated I can’t recognize the character. So this adds constrain on the document to be well oriented but here I use the principal axis in order to unify the orientation of the character set and the characters in the scanned document. The algorithm can be applied for any isolated character such as Latin, Chinese, Japanese, and Arabic characters but it has been applied in this paper for Arabic characters. The approach uses normalized and isolated characters of the same size and extracts an image signature based on the center of gravity of the character after making the character principal axis vertical, and then the system compares these values to a set of signatures for typical characters of the set. The system then provides the closeness of match to all other characters in the set. 展开更多
关键词 OCR Pattern Recognition CONFUSION Matrix Image SIGNATURE Word Segmentation CHARACTER FRAGMENTATION
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map 被引量:1
20
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部