The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a...The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.展开更多
A novel algorithm of 3-D surface image registration is proposed. It makes use of the array information of 3-D points and takes vector/vertex-like features as the basis of the matching. That array information of 3-D po...A novel algorithm of 3-D surface image registration is proposed. It makes use of the array information of 3-D points and takes vector/vertex-like features as the basis of the matching. That array information of 3-D points can be easily obtained when capturing original 3-D images. The iterative least-mean-squared (LMS) algorithm is applied to optimizing adaptively the transformation matrix parameters. These can effectively improve the registration performance and hurry up the matching process. Experimental results show that it can reach a good subjective impression on aligned 3-D images. Although the algorithm focuses primarily on the human head model, it can also be used for other objects with small modifications.展开更多
A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nuc...A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nucleus. Connected pixels on the circle were applied to compare the intensity value with the nucleus, with the membership function used to give the fuzzy result. The pixel with maximum information gain was chosen as the parent node to build a binary decision tree. Thus, the comer detector was derived. The pictures taken in Fengtai Railway Station in Beijing were used to test the method. The experimental results show that when the number of pixels on the test mask is chosen to be 9, best result can be obtained. The comer detector significantly outperforms existing detector in computational efficiency without sacrificing the quality and the method also provides high performance against Poisson noise and Gaussian blur.展开更多
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces...Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.展开更多
The purpose of this paper is to develop a high speed detection scheme for moving and / or stationary point targets in a multitarget environment as registered in an IR image sequence. An iterative approximate 3-D line ...The purpose of this paper is to develop a high speed detection scheme for moving and / or stationary point targets in a multitarget environment as registered in an IR image sequence. An iterative approximate 3-D line searching algorithm based upon the geometric representation of lines (for non-maneuvering targets in space) in a 3-D space is derived. The convergency of the algorithm is proved. An analysis is performed of the theoretical detection performance of the algorithm. The statistical experiment results show high effectiveness and computational efficiency of the algorithm in the case of low SNR. The idea may be employed to satisfy the real-time processing requirement of an IR system.展开更多
Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of opt...Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of optimal structural design of the complicated multi-parameter mechanical products.On the basis of analyzing the optimal design methods and the data mining principles,an improved iterative dichotomizer 3(ID3) algorithm is hereby put forth to bring out an optimal design information model integrated with the data mining technology as well as an optimal structural design system of complicated mechanical products based on the data mining principles.The system is demonstrated by the optimal structural design of the mainframe of the full face rock tunnel boring machine(TBM).An example shows that the data mining technology has fully tackled the issues of the optimal structural design of complicated mechanical products.展开更多
In recent years,the three dimensional reconstruction of vascular structures in the field of medical research has been extensively developed.Several studies describe the various numerical methods to numerical modeling ...In recent years,the three dimensional reconstruction of vascular structures in the field of medical research has been extensively developed.Several studies describe the various numerical methods to numerical modeling of vascular structures in near-reality.However,the current approaches remain too expensive in terms of storage capacity.Therefore,it is necessary to find the right balance between the relevance of information and storage space.This article adopts two sets of human retinal blood vessel data in 3D to proceed with data reduction in the first part and then via 3D fractal reconstruction,recreate them in a second part.The results show that the reduction rate obtained is between 66%and 95%as a function of the tolerance rate.Depending on the number of iterations used,the 3D blood vessel model is successful at reconstruction with an average error of 0.19 to 5.73 percent between the original picture and the reconstructed image.展开更多
Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction withothers.Advanced information technologywhich employs artificial intelligence(AI...Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction withothers.Advanced information technologywhich employs artificial intelligence(AI) model has assisted in early identify ASD by using pattern detection.Recent advances of AI models assist in the automated identification andclassification of ASD, which helps to reduce the severity of the disease.This study introduces an automated ASD classification using owl searchalgorithm with machine learning (ASDC-OSAML) model. The proposedASDC-OSAML model majorly focuses on the identification and classificationof ASD. To attain this, the presentedASDC-OSAML model follows minmaxnormalization approach as a pre-processing stage. Next, the owl searchalgorithm (OSA)-based feature selection (OSA-FS) model is used to derivefeature subsets. Then, beetle swarm antenna search (BSAS) algorithm withIterative Dichotomiser 3 (ID3) classification method was implied for ASDdetection and classification. The design of BSAS algorithm helps to determinethe parameter values of the ID3 classifier. The performance analysis of theASDC-OSAML model is performed using benchmark dataset. An extensivecomparison study highlighted the supremacy of the ASDC-OSAML modelover recent state of art approaches.展开更多
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory...The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.展开更多
文摘The ID3 algorithm is a classical learning algorithm of decision tree in data mining.The algorithm trends to choosing the attribute with more values,affect the efficiency of classification and prediction for building a decision tree.This article proposes a new approach based on an improved ID3 algorithm.The new algorithm introduces the importance factor λ when calculating the information entropy.It can strengthen the label of important attributes of a tree and reduce the label of non-important attributes.The algorithm overcomes the flaw of the traditional ID3 algorithm which tends to choose the attributes with more values,and also improves the efficiency and flexibility in the process of generating decision trees.
文摘A novel algorithm of 3-D surface image registration is proposed. It makes use of the array information of 3-D points and takes vector/vertex-like features as the basis of the matching. That array information of 3-D points can be easily obtained when capturing original 3-D images. The iterative least-mean-squared (LMS) algorithm is applied to optimizing adaptively the transformation matrix parameters. These can effectively improve the registration performance and hurry up the matching process. Experimental results show that it can reach a good subjective impression on aligned 3-D images. Although the algorithm focuses primarily on the human head model, it can also be used for other objects with small modifications.
基金Project(J2008X011) supported by the Natural Science Foundation of Ministry of Railway and Tsinghua University,China
文摘A high-speed comer detection algorithm based on fuzzy ID3 decision tree was proposed. In the algorithm, the Bresenham circle with 3-pixel radius was used as the test mask, overlapping the candidate comers with the nucleus. Connected pixels on the circle were applied to compare the intensity value with the nucleus, with the membership function used to give the fuzzy result. The pixel with maximum information gain was chosen as the parent node to build a binary decision tree. Thus, the comer detector was derived. The pictures taken in Fengtai Railway Station in Beijing were used to test the method. The experimental results show that when the number of pixels on the test mask is chosen to be 9, best result can be obtained. The comer detector significantly outperforms existing detector in computational efficiency without sacrificing the quality and the method also provides high performance against Poisson noise and Gaussian blur.
文摘Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.
文摘The purpose of this paper is to develop a high speed detection scheme for moving and / or stationary point targets in a multitarget environment as registered in an IR image sequence. An iterative approximate 3-D line searching algorithm based upon the geometric representation of lines (for non-maneuvering targets in space) in a 3-D space is derived. The convergency of the algorithm is proved. An analysis is performed of the theoretical detection performance of the algorithm. The statistical experiment results show high effectiveness and computational efficiency of the algorithm in the case of low SNR. The idea may be employed to satisfy the real-time processing requirement of an IR system.
基金the 10th Five Years National Key Technical Equipment Development Project of China(No. ZZ02-03-03-01)
文摘Complicated mechanical products normally consist of multi-parameter mechanisms.The couplings between two tmechanisms are either strong or weak.The traditional optimal design methods cannot meet the requirements of optimal structural design of the complicated multi-parameter mechanical products.On the basis of analyzing the optimal design methods and the data mining principles,an improved iterative dichotomizer 3(ID3) algorithm is hereby put forth to bring out an optimal design information model integrated with the data mining technology as well as an optimal structural design system of complicated mechanical products based on the data mining principles.The system is demonstrated by the optimal structural design of the mainframe of the full face rock tunnel boring machine(TBM).An example shows that the data mining technology has fully tackled the issues of the optimal structural design of complicated mechanical products.
文摘In recent years,the three dimensional reconstruction of vascular structures in the field of medical research has been extensively developed.Several studies describe the various numerical methods to numerical modeling of vascular structures in near-reality.However,the current approaches remain too expensive in terms of storage capacity.Therefore,it is necessary to find the right balance between the relevance of information and storage space.This article adopts two sets of human retinal blood vessel data in 3D to proceed with data reduction in the first part and then via 3D fractal reconstruction,recreate them in a second part.The results show that the reduction rate obtained is between 66%and 95%as a function of the tolerance rate.Depending on the number of iterations used,the 3D blood vessel model is successful at reconstruction with an average error of 0.19 to 5.73 percent between the original picture and the reconstructed image.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project Under Grant Number(61/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R114)+1 种基金Princess Nourah bint Abdulrahman University,Riyadh,Saudi ArabiaThe authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR26).
文摘Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction withothers.Advanced information technologywhich employs artificial intelligence(AI) model has assisted in early identify ASD by using pattern detection.Recent advances of AI models assist in the automated identification andclassification of ASD, which helps to reduce the severity of the disease.This study introduces an automated ASD classification using owl searchalgorithm with machine learning (ASDC-OSAML) model. The proposedASDC-OSAML model majorly focuses on the identification and classificationof ASD. To attain this, the presentedASDC-OSAML model follows minmaxnormalization approach as a pre-processing stage. Next, the owl searchalgorithm (OSA)-based feature selection (OSA-FS) model is used to derivefeature subsets. Then, beetle swarm antenna search (BSAS) algorithm withIterative Dichotomiser 3 (ID3) classification method was implied for ASDdetection and classification. The design of BSAS algorithm helps to determinethe parameter values of the ID3 classifier. The performance analysis of theASDC-OSAML model is performed using benchmark dataset. An extensivecomparison study highlighted the supremacy of the ASDC-OSAML modelover recent state of art approaches.
基金Shanghai Education Commission Foundation for Excellent Young High Education Teachers,China(No.xqz05001No.YYY-07008)
文摘The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.