期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Multi-Label Chinese Comments Categorization: Comparison of Multi-Label Learning Algorithms 被引量:4
1
作者 Jiahui He Chaozhi Wang +2 位作者 Hongyu Wu Leiming Yan Christian Lu 《Journal of New Media》 2019年第2期51-61,共11页
Multi-label text categorization refers to the problem of categorizing text througha multi-label learning algorithm. Text classification for Asian languages such as Chinese isdifferent from work for other languages suc... Multi-label text categorization refers to the problem of categorizing text througha multi-label learning algorithm. Text classification for Asian languages such as Chinese isdifferent from work for other languages such as English which use spaces to separate words.Before classifying text, it is necessary to perform a word segmentation operation to converta continuous language into a list of separate words and then convert it into a vector of acertain dimension. Generally, multi-label learning algorithms can be divided into twocategories, problem transformation methods and adapted algorithms. This work will usecustomer's comments about some hotels as a training data set, which contains labels for allaspects of the hotel evaluation, aiming to analyze and compare the performance of variousmulti-label learning algorithms on Chinese text classification. The experiment involves threebasic methods of problem transformation methods: Support Vector Machine, Random Forest,k-Nearest-Neighbor;and one adapted algorithm of Convolutional Neural Network. Theexperimental results show that the Support Vector Machine has better performance. 展开更多
关键词 Multi-label classification Chinese text classification problem transformation adapted algorithms
下载PDF
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
2
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm
3
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
PARAMETERS OPTIMIZATION OF CONTINUOUS WAVELET TRANSFORM AND ITS APPLICATION IN ACOUSTIC EMISSION SIGNAL ANALYSIS OF ROLLING BEARING 被引量:7
4
作者 ZHANG Xinming HE Yongyong HAO Rujiang CHU Fulei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第2期104-108,共5页
Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of ... Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of scale selection in CWT is discussed. Based on genetic algorithm, an optimization strategy for the waveform parameters of the mother wavelet is proposed with wavelet entropy as the optimization target. Based on the optimized waveform parameters, the wavelet scalogram is used to analyze the simulated acoustic emission (AE) signal and real AE signal of rolling bearing. The results indicate that the proposed method is useful and efficient to improve the quality of CWT. 展开更多
关键词 Rolling bearing Fault diagnosis Acoustic emission (AE) Continuous wavelet transform (CWT) Genetic algorithm
下载PDF
Implementing Classical Hadamard Transform Algorithm by Continuous Variable Cluster State 被引量:1
5
作者 王宇 苏琦 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第7期19-23,共5页
Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classic... Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently. 展开更多
关键词 Implementing Classical Hadamard Transform Algorithm by Continuous Variable Cluster State
下载PDF
A Time-Frequency Associated MUSIC Algorithm Research on Human Target Detection by Through-Wall Radar 被引量:1
6
作者 Xianyu Dong Wu Ren +2 位作者 Zhenghui Xue Xuetian Wang Weiming Li 《Journal of Beijing Institute of Technology》 EI CAS 2022年第1期123-130,共8页
In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can b... In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can be used to monitor the status and the location information of human targets behind the wall.However,the detection is out of order when classical MUSIC al-gorithm is applied to estimate the direction of arrival.In order to solve the problem,a time-fre-quency associated MUSIC algorithm suitable for through-wall detection and based on S-band stepped frequency continuous wave(SFCW)radar is researched.By associating inverse fast Fouri-er transform(IFFT)algorithm with MUSIC algorithm,the power enhancement of the target sig-nal is completed according to the distance calculation results in the time domain.Then convert the signal to the frequency domain for direction of arrival(DOA)estimation.The simulations of two-dimensional human target detection in free space and the processing of measured data are com-pleted.By comparing the processing results of the two algorithms on the measured data,accuracy of DOA estimation of proposed algorithm is more than 75%,which is 50%higher than classical MUSIC algorithm.It is verified that the distance and angle of human target can be effectively de-tected via proposed algorithm. 展开更多
关键词 through-wall radar multiple signal classification(MUSIC)algorithm inverse fast Four-ier transform(IFFT)algorithm target detection
下载PDF
Multiscale anisotropic diffusion for ringing artifact suppression in geophysical deconvolution data
7
作者 Boxin Zuo Xiangyun Hu Meixia Geng 《Earthquake Science》 CSCD 2016年第4期215-220,共6页
Ringing artifact degradations always appear in the deconvolution of geophysical data. To address this problem, we propose a postprocessing approach to suppress ringing artifacts that uses a novel anisotropic diffusion... Ringing artifact degradations always appear in the deconvolution of geophysical data. To address this problem, we propose a postprocessing approach to suppress ringing artifacts that uses a novel anisotropic diffusion based on a stationary wavelet transform (SWT) algorithm. In this paper, we discuss the ringing artifact suppression problem and analyze the characteristics of the deconvolu- tion ringing artifact. The deconvolution data containing ringing artifacts are decomposed into different SWT sub- bands for analysis, and a new multiscale adaptive aniso- tropic filter is developed to suppress these degradations. Finally, we demonstrate the performance of the proposed method and describe the experiments in detail. 展开更多
关键词 DECONVOLUTION Ringing artifacts Anisotropicdiffusion Stationary wavelet transform algorithm Multiscale
下载PDF
Combined Economic and Emission Power Dispatch Control Using Substantial Augmented Transformative Algorithm
8
作者 T.R.Manikandan Venkatesan Thangavelu 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期431-447,共17页
The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,the... The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,thereby meeting the lack of system equality and inequality constraints.Economic and emissions dispatching has become a primary and significant concern in power system networks.Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations.The optimal power allocation to generators serves as a solution to this problem.Emission dispatch reduces emissions while ignoring economic considerations.A collective strategy known as Combined Economic and Emission Dispatch is utilized to resolve the above-mentioned problems and investigate the trade-off relationship between fuel cost and emissions.Consequently,this work manages the Substantial Augmented Transformative Algorithm(SATA)to take care of the Combined Economic Emission Dispatch Problem(CEEDP)of warm units while fulfilling imperatives,for example,confines on generator limit,diminish the fuel cost,lessen the emission and decrease the force misfortune.SATA is a stochastic streamlining process that relies upon the development and knowledge of swarms.The goal is to minimize the total fuel cost of fossil-based thermal power generation units that generate and cause environmental pollution.The algorithm searches for solutions in the search space from the smallest to the largest in the case of forwarding search.The simulation of the proposed system is developed using MATLAB Simulink software.Simulation results show the effectiveness and practicability of this method in terms of economic and emission dispatching issues.The performance of the proposed system is compared with existing Artificial Bee Colony-Particle Swarm Optimization(ABC-PSO),Simulated Annealing(SA),and Differential Evolution(DE)methods.The fuel cost and gas emission of the proposed system are 128904$/hr and 138094.4652$/hr. 展开更多
关键词 Economic emission DISPATCH fuel cost substantial augmented transformative algorithm
下载PDF
A Program Study of the Union of Semilattices on the Set of Subsets of Grids of Waterloo Language
9
作者 Mikhail E. Abramyan Boris F. Melnikov 《Journal of Applied Mathematics and Physics》 2023年第5期1459-1470,共12页
The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of non... The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of nondeterministic finite automata NFALib implemented by one of the authors in C#, as well as statistical methods for analyzing algorithms. The results are regularities obtained when considering semilattices on a set of subsets of grids of the Waterloo language. It follows from the results obtained that the minimum covering automaton equivalent to the Waterloo automaton can be obtained by adding one additional to the minimum covering set of grids. . 展开更多
关键词 Nondeterministic Finite Automata Universal Automaton Basic Automaton Grid Covering Automaton Equivalent Transformation algorithms Water-loo Automaton
下载PDF
Application of 3D Projection Profilometry in the High Speed Impaction Surface Deformation Measurement Research
10
作者 Eryi Hu 《Journal of Signal and Information Processing》 2020年第4期103-115,共13页
In order to study the strength of the composite material plate problems, need to adopt a nondestructive testing method to obtain the specimen surface under the effect of high-speed impact regularity of shape. The proj... In order to study the strength of the composite material plate problems, need to adopt a nondestructive testing method to obtain the specimen surface under the effect of high-speed impact regularity of shape. The projection profilometry was used to measure the surface profile or the full field deformation. Furtherly, by using the Fourier transform algorithm, there is only one frame of captured image</span><span style="font-family:Verdana;"> which</span><span style="font-family:Verdana;"> is needed in the measurement, so that it can be introduced into the high speed impaction procedure measurement. An experimental system, which was contained with an impact setup and the projection profilometry measurement part, was constructed for the impaction action characteristic research. The metallic impact object can be launched by a gas gun or a spin fan, respectively. The detected object </span><span style="font-family:Verdana;">is</span><span style="font-family:Verdana;"> manufactured by composite materials. In order to increase the surface deformation measurement accuracy, the calibration method and the error was discussed with different calibration specimen. And then, the proposed profilometry measurement method is proved by the gas gun and spin fan projectile test. The surface deformation of the manufactured composite plates and fan case are measured in the impaction procedure. So that the impact action details can be described much more clearly than the traditional video monitoring method. 展开更多
关键词 Projection Profilometry Fourier Transform Algorithm Deformation Measurement Impaction Monitoring
下载PDF
Reliability of electric vehicle charging infrastructure:A cross-lingual deep learning approach 被引量:2
11
作者 Yifan Liu Azell Francis +8 位作者 Catharina Hollauer M.Cade Lawson Omar Shaikh Ashley Cotsman Khushi Bhardwaj Aline Banboukian Mimi Li Anne Web Omar Isaac Asensio 《Communications in Transportation Research》 2023年第1期81-91,共11页
Vehicle electrification has emerged as a global strategy to address climate change and emissions externalities from the transportation sector.Deployment of charging infrastructure is needed to accelerate technology ad... Vehicle electrification has emerged as a global strategy to address climate change and emissions externalities from the transportation sector.Deployment of charging infrastructure is needed to accelerate technology adoption;however,managers and policymakers have had limited evidence on the use of public charging stations due to poor data sharing and decentralized ownership across regions.In this article,we use machine learning based classifiers to reveal insights about consumer charging behavior in 72 detected languages including Chinese.We investigate 10 years of consumer reviews in East and Southeast Asia from 2011 to 2021 to enable infrastructure evaluation at a larger geographic scale than previously available.We find evidence that charging stations at government locations result in higher failure rates with consumers compared to charging stations at private points of interest.This evidence contrasts with predictions in the U.S.and European markets,where the performance is closer to parity.We also find that networked stations with communication protocols provide a relatively higher quality of charging services,which favors policy support for connectivity,particularly for underserved or remote areas. 展开更多
关键词 Electric vehicles Consumer behavior Charging infrastructure Public policy Machine learning Natural language processing transformer algorithms
原文传递
A novel image fusion algorithm based on bandelet transform 被引量:9
12
作者 屈小波 闫敬文 +2 位作者 谢国富 朱自谦 陈本刚 《Chinese Optics Letters》 SCIE EI CAS CSCD 2007年第10期569-572,共4页
A novel image fusion algorithm based on bandelet transform is proposed. Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges effici... A novel image fusion algorithm based on bandelet transform is proposed. Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges efficiently in image fusion. For reconstructing the fused image, the maximum rule is used to select source images' geometric flow and bandelet coefficients. Experimental results indicate that the bandelet-based fusion algorithm represents the edge and detailed information well and outperforms the wavelet-based and Laplacian pyramid-based fusion algorithms, especially when the abundant texture and edges are contained in the source images. 展开更多
关键词 A novel image fusion algorithm based on bandelet transform
原文传递
A novel 3780-point FFT processor scheme for the time domain synchronous OFDM system
13
作者 Ji-nan LENG Lei XIE +1 位作者 Hui-fang CHEN Kuang WANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第12期1021-1030,共10页
The 3780-point FFT is a main component of the time domain synchronous OFDM (TDS-OFDM) system and the key technology in the Chinese Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) national standard. Sinc, e ... The 3780-point FFT is a main component of the time domain synchronous OFDM (TDS-OFDM) system and the key technology in the Chinese Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) national standard. Sinc, e 3780 is not a power of 2, the classical radix-2 or radix-4 FFT algorithm cannot be applied directly. Hence, the Winograd Fourier transform algorithm (WFTA) and the Good-Thomas prime factor algorithm (PFA) are used to implement the 3780-point FFT processor. However, the structure based on WFTA and PFA has a large computational complexity and requires many DSPs in hardware implementation. In this paper, a novel 3780-point FFT processor scheme is proposed, in which a 60x63 iterative WFTA architecture with different mapping methods is imported to replace the PFA architecture, and an optimized CoOrdinate Rotation Digital Computer (CORDIC) module is used for the twiddle factor multiplications. Compared to the traditional scheme, our proposed 3780-point FFT processor scheme reduces the number of multiplications by 45% at the cost of 1% increase in the number of additions. All DSPs are replaced by the optimized CORDIC module and ROM. Simulation results show that the proposed 3780-point FFT processing scheme satisfies the requirement of the DMB-T standard, and is an efficient architecture for the TDS-OFDM system. 展开更多
关键词 3780 CoOrdinate Rotation Digital Computer (CORDIC) Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) FFT Time domain synchronous OFDM (TDS-OFDM) Winograd Fourier transform algorithm (WFTA)
原文传递
Trabecular spacing estimation based on quadratic transformation algorithm
14
作者 XU Yiwen HOU Li +4 位作者 SHU Xiao WU Guangli LIU Chengcheng XU Kailiang TA De'an 《Chinese Journal of Acoustics》 CSCD 2015年第2期177-185,共9页
The quadratic transformation method is proposed to estimate the trabecular spac- ing (Tb.Sp), an important index for osteoporosis diagnosis. The performance of this algorithm was investigated by scatter model, two-d... The quadratic transformation method is proposed to estimate the trabecular spac- ing (Tb.Sp), an important index for osteoporosis diagnosis. The performance of this algorithm was investigated by scatter model, two-dimension finite difference time domain (2D-FDTD) simulation and in vitro experiments of bovine cancellous bone specimens. Comparing with the other four methods autoregressive cepstrum (AR), adaptive filter- autoregressive cepstral (AFAR), inverse filter-autoregressive eepstrum (InvAR), and simplified inverse filter tracking (SIFT), quadratic transformation is much more stable and accurate. The results demonstrated that quadratic transformation is a great algorithm for Tb.SD estimation. 展开更多
关键词 FDTD SIFT Trabecular spacing estimation based on quadratic transformation algorithm
原文传递
A Numerical Algorithm for Arbitrary Real-Order Hankel Transform
15
作者 YANG Yonglin LI Xing +1 位作者 DING Shenghu WANG Wenshuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期26-34,共9页
The Hankel transform is widely used to solve various engineering and physics problems,such as the representation of electromagnetic field components in the medium,the representation of dynamic stress intensity factors... The Hankel transform is widely used to solve various engineering and physics problems,such as the representation of electromagnetic field components in the medium,the representation of dynamic stress intensity factors,vibration of axisymmetric infinite membrane and displacement intensity factors which all involve this type of integration.However,traditional numerical integration algorithms cannot be used due to the high oscillation characteristics of the Bessel function,so it is particularly important to propose a high precision and efficient numerical algorithm for calculating the integral of high oscillation.In this paper,the improved Gaver-Stehfest(G-S)inverse Laplace transform method for arbitrary real-order Bessel function integration is presented by using the asymptotic characteristics of the Bessel function and the accumulation of integration,and the optimized G-S coefficients are given.The effectiveness of the algorithm is verified by numerical examples.Compared with the linear transformation accelerated convergence algorithm,it shows that the G-S inverse Laplace transform method is suitable for arbitrary real order Hankel transform,and the time consumption is relatively stable and short,which provides a reliable calculation method for the study of electromagnetic mechanics,wave propagation,and fracture dynamics. 展开更多
关键词 Hankel transform large argument approximate expression of the Bessel function linear transformation accelerated convergence algorithm(LTACA) G-S inverse Laplace transform method(G-SILTM)
原文传递
THE MULTIPLICATIVE COMPLEXITY AND ALGORITHM OF THE GENERALIZED DISCRETE FOURIER TRANSFORM(GFT)
16
作者 Y.H. Zeng(7th Department, National University of Defence Technology, Changsha, China) 《Journal of Computational Mathematics》 SCIE CSCD 1995年第4期351-356,共6页
In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a l... In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a length 2t real GFT(a,b)(a = +/-1/2, b = +/-1/2) is 2(t+1) - 2. Practical algorithms which meet the lower bounds of multiplications are given. 展开更多
关键词 DCT II THE MULTIPLICATIVE COMPLEXITY AND ALGORITHM OF THE GENERALIZED DISCRETE FOURIER TRANSFORM Math GFT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部