期刊文献+
共找到868篇文章
< 1 2 44 >
每页显示 20 50 100
CONSTRUCTION OF SOME KIESSWETTER-LIKE FUNCTIONS-THE CONTINUOUS BUT NON-DIFFERENT-IABLE FUNCTION DEFINED BY QUINARY DECIMAL 被引量:1
1
作者 TieYong YangGuangjun 《Analysis in Theory and Applications》 2004年第1期58-68,共11页
In this paper, we construct some continuous but non-differentiable functions defined by quinary dec-imal, that are Kiesswetter-like functions. We discuss their properties, then investigate the Hausdorff dimensions of ... In this paper, we construct some continuous but non-differentiable functions defined by quinary dec-imal, that are Kiesswetter-like functions. We discuss their properties, then investigate the Hausdorff dimensions of graphs of these functions and give a detailed proof. 展开更多
关键词 Kiesswetter-like functions continuous but non-differentiable quinary decimal iterated function system inequality Hausdorff dimension
在线阅读 下载PDF
Automatic Classification of Swedish Metadata Using Dewey Decimal Classification:A Comparison of Approaches 被引量:2
2
作者 Koraljka Golub Johan Hagelback Anders Ardo 《Journal of Data and Information Science》 CSCD 2020年第1期18-38,共21页
Purpose:With more and more digital collections of various information resources becoming available,also increasing is the challenge of assigning subject index terms and classes from quality knowledge organization syst... Purpose:With more and more digital collections of various information resources becoming available,also increasing is the challenge of assigning subject index terms and classes from quality knowledge organization systems.While the ultimate purpose is to understand the value of automatically produced Dewey Decimal Classification(DDC)classes for Swedish digital collections,the paper aims to evaluate the performance of six machine learning algorithms as well as a string-matching algorithm based on characteristics of DDC.Design/methodology/approach:State-of-the-art machine learning algorithms require at least 1,000 training examples per class.The complete data set at the time of research involved 143,838 records which had to be reduced to top three hierarchical levels of DDC in order to provide sufficient training data(totaling 802 classes in the training and testing sample,out of 14,413 classes at all levels).Findings:Evaluation shows that Support Vector Machine with linear kernel outperforms other machine learning algorithms as well as the string-matching algorithm on average;the string-matching algorithm outperforms machine learning for specific classes when characteristics of DDC are most suitable for the task.Word embeddings combined with different types of neural networks(simple linear network,standard neural network,1 D convolutional neural network,and recurrent neural network)produced worse results than Support Vector Machine,but reach close results,with the benefit of a smaller representation size.Impact of features in machine learning shows that using keywords or combining titles and keywords gives better results than using only titles as input.Stemming only marginally improves the results.Removed stop-words reduced accuracy in most cases,while removing less frequent words increased it marginally.The greatest impact is produced by the number of training examples:81.90%accuracy on the training set is achieved when at least 1,000 records per class are available in the training set,and 66.13%when too few records(often less than A Comparison of Approaches100 per class)on which to train are available—and these hold only for top 3 hierarchical levels(803 instead of 14,413 classes).Research limitations:Having to reduce the number of hierarchical levels to top three levels of DDC because of the lack of training data for all classes,skews the results so that they work in experimental conditions but barely for end users in operational retrieval systems.Practical implications:In conclusion,for operative information retrieval systems applying purely automatic DDC does not work,either using machine learning(because of the lack of training data for the large number of DDC classes)or using string-matching algorithm(because DDC characteristics perform well for automatic classification only in a small number of classes).Over time,more training examples may become available,and DDC may be enriched with synonyms in order to enhance accuracy of automatic classification which may also benefit information retrieval performance based on DDC.In order for quality information services to reach the objective of highest possible precision and recall,automatic classification should never be implemented on its own;instead,machine-aided indexing that combines the efficiency of automatic suggestions with quality of human decisions at the final stage should be the way for the future.Originality/value:The study explored machine learning on a large classification system of over 14,000 classes which is used in operational information retrieval systems.Due to lack of sufficient training data across the entire set of classes,an approach complementing machine learning,that of string matching,was applied.This combination should be explored further since it provides the potential for real-life applications with large target classification systems. 展开更多
关键词 LIBRIS Dewey decimal Classification Automatic classification Machine learning Support Vector Machine Multinomial Naive Bayes Simple linear network Standard neural network 1D convolutional neural network Recurrent neural network Word embeddings String matching
在线阅读 下载PDF
A New Evolutionary Algorithm Based on the Decimal Coding
3
作者 Dong Wen-yong, Li Yuan-xiang, Zheng Bo-jin, Zen San-you, Zhang Jin-bo State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072,Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2002年第2期150-156,共7页
Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functio... Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functions. In this paper a new Decimal Coding Strategy (DCS), which is convenient for space division and alterable precision, was proposed, and the theory analysis of its implicit parallelism and convergence was also discussed. We also redesign several genetic operators for the decimal code. In order to utilize the historial information of the existing individuals in the process of evolution and avoid repeated exploring, the strategies of space shrinking and precision alterable, are adopted. Finally, the evolutionary algorithm based on decimal coding (DCEAs) was applied to the optimization of functions, the optimization of parameter, mixed-integer nonlinear programming. Comparison with traditional GAs was made and the experimental results show that the performances of DCEAS are better than the tradition GAs. 展开更多
关键词 evolutionary algorithm function optimize genetic algorithm decimal coding CLC number TP 301.6
在线阅读 下载PDF
Search for Monic Irreducible Polynomials with Decimal Equivalents of Polynomials over Galois Field <I>GF</I>(<I>p<sup>q</sup></I>)
4
作者 Sankhanil Dey Ranjan Ghosh 《Open Journal of Discrete Mathematics》 2018年第1期21-33,共13页
Substitution boxes or S-boxes play a significant role in encryption and de-cryption of bit level plaintext and cipher-text respectively. Irreducible Poly-nomials (IPs) have been used to construct 4-bit or 8-bit substi... Substitution boxes or S-boxes play a significant role in encryption and de-cryption of bit level plaintext and cipher-text respectively. Irreducible Poly-nomials (IPs) have been used to construct 4-bit or 8-bit substitution boxes in many cryptographic block ciphers. In Advance Encryption Standard, the ele-ments of 8-bit S-box have been obtained from the Multiplicative Inverse (MI) of elemental polynomials (EPs) of the 1st IP over Galois field GF(28) by adding an additive element. In this paper, a mathematical method and the algorithm of the said method with the discussion of the execution time of the algorithm, to obtain monic IPs over Galois field GF(pq) have been illustrated with example. The method is very similar to polynomial multiplication of two polynomials over Galois field GF(pq) but has a difference in execution. The decimal equivalents of polynomials have been used to identify Basic Polynomials (BPs), EPs, IPs and Reducible polynomials (RPs). The monic RPs have been determined by this method and have been cancelled out to produce monic IPs. The non-monic IPs have been obtained with multiplication of α where?α∈ GF(pq)?and assume values from 2 to (p &#8722;1) to monic IPs. 展开更多
关键词 Finite FIELDS GALOIS FIELDS Irreducible POLYNOMIALS decimal EQUIVALENTS
在线阅读 下载PDF
Fast Signed-Digit Multi-operand Decimal Adders
5
作者 Jeff Rebacz Erdal Oruklu Jafar Saniie 《Circuits and Systems》 2011年第3期225-236,共12页
Decimal arithmetic is desirable for high precision requirements of many financial, industrial and scientific applications. Furthermore, hardware support for decimal arithmetic has gained momentum with IEEE 754-2008, w... Decimal arithmetic is desirable for high precision requirements of many financial, industrial and scientific applications. Furthermore, hardware support for decimal arithmetic has gained momentum with IEEE 754-2008, which standardized decimal floating-point. This paper presents a new architecture for two operand and multi-operand signed-digit decimal addition. Signed-digit architectures are advantageous because there are no carry-propagate chains. The proposed signed-digit adder reduces the critical path delay by parallelizing the correction stage inherent to decimal addition. For performance evaluation, we synthesize and compare multiple unsigned and signed-digit multi-operand decimal adder architectures on 0.18μm CMOS VLSI technology. Synthesis results for 2, 4, 8, and 16 operands with 8 decimal digits provide critical data in determining each adder's performance and scalability. 展开更多
关键词 Computer ARITHMETIC decimal ARITHMETIC Signed-Digit Multi-operand ADDER BCD
在线阅读 下载PDF
颅骨切除减压治疗恶性大脑中动脉梗死试验(DECIMAL) 被引量:1
6
作者 曲东锋 《国外医学(脑血管疾病分册)》 2004年第4期281-281,共1页
试验状态:从2003年11月开始,已纳入18例患者。试验目的:评价偏侧颅骨切除减压和硬膜成形术在恶性大脑中动脉(MCA)区梗死患者中的作用。试验设计:多中心随机对照试验。
关键词 颅骨切除减压 外科治疗 恶性大脑动脉梗死 试验 decimal 硬膜成形术
暂未订购
Dissociated neural potential for processing strategies between decimals and fractions
7
作者 Lin Pingting Zhu Yanmei +2 位作者 Zhang Li Bai Yi Wang Haixian 《Journal of Southeast University(English Edition)》 EI CAS 2021年第4期379-387,共9页
The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decim... The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decimal strategies in magnitude processing of nonsymbolic entities and symbolic numbers.The experimental results show that continuous entities elicit stronger left-lateralized anterior N2 in decimals,while discretized ones elicit more significant right-lateralized posterior N2 in fractions during the identification stage.On the other hand,decimals elicit stronger N2 over the left-lateralized fronto-central sites while fractions elicit the more profound P2 over the right-lateralized fronto-central sites and N2 at biparietal regions during the semantic access stage.Hence,for nonsymbolic entity processing,alignments of decimals and continuous entities activate the phonological network,while alignments of fractions and discretized entities trigger the visuospatial regions.For symbolic numbers processing,exact strategies with rote arithmetic retrieval in verbal format are used in decimal processing,while approximate strategies with complex magnitude processing in a visuospatial format are used in fraction processing. 展开更多
关键词 decimal FRACTION exact strategy approximate strategy event-related potential(ERP) P2 N2
在线阅读 下载PDF
TWIDDLE FACTOR MERGED TIME-DECIMAL FFT ALGORITHM AND THE SOFTWARE IMPLEMENTATION FOR TWIDDLE FACTOR MERGED FFT ALGORITHM
8
作者 许蔚 陈宗骘 《Journal of Electronics(China)》 1989年第1期1-9,共9页
Martens proposed a highly efficient and simply formed DFT algorithm——RCFA,whose efficien-cy is comparable with that of WFTA or that of PFA,and whose structure is similar to that of FFT.Theauthors have proved that,in... Martens proposed a highly efficient and simply formed DFT algorithm——RCFA,whose efficien-cy is comparable with that of WFTA or that of PFA,and whose structure is similar to that of FFT.Theauthors have proved that,in the case of radix 2,the RCFA is exactly equivalent to the twiddle factor mergedfrequency-decimal FFT algorithm.The twiddle factor merged time-decimal FFT algorithm is providedin this paper.Thus,in any case,the FFT algorithm used currently can be replaced by the more efficientalgorithm——the twiddle factor merged FFT algorithm,with exactly the same external property and thesimilar internal structure.Also in this paper,the software for implementing the twiddle factor merged FFTalgorithm(TMFFT)is provided. 展开更多
关键词 FFT Time-decimal Frequency-decimal Twiddle FACTOR MERGING SOFTWARE implementation
在线阅读 下载PDF
Exercises of Decimals
9
作者 钱怡凡 《疯狂英语(双语世界)》 2019年第2期31-34,共4页
关键词 Exercises of decimals
在线阅读 下载PDF
对流密码Decim^(v2)差分故障攻击
10
作者 陈浩 王韬 刘会英 《小型微型计算机系统》 CSCD 北大核心 2015年第1期150-155,共6页
针对Decimv2流密码现有故障攻击方法未有效利用Decimv2非线性布尔函数差分特性导致攻击复杂度高的问题,提出一种改进的差分故障攻击方法,该方法充分利用Decimv2非线性布尔函数的差分特性,通过在Decimv2线性反馈移位寄存器LFSR中注入面... 针对Decimv2流密码现有故障攻击方法未有效利用Decimv2非线性布尔函数差分特性导致攻击复杂度高的问题,提出一种改进的差分故障攻击方法,该方法充分利用Decimv2非线性布尔函数的差分特性,通过在Decimv2线性反馈移位寄存器LFSR中注入面向比特的随机故障,构建算法内部状态的线性方程组,并对方程组进行求解恢复初始密钥K.实验结果表明,平均2个故障注入可恢复全部80比特初始密钥,所需密钥流为144比特,整个攻击计算复杂度由现有的O(242.5)减小为O(238.95).此外,该攻击方法可以为其他流密码差分故障攻击提供一定的参考. 展开更多
关键词 差分故障攻击 非线性布尔函数 流密码 decimv2密码
在线阅读 下载PDF
百年来我国小学数学课程分数与小数内容的演变研究——基于课程标准(教学大纲)的分析
11
作者 李鹏 宋运明 《课程·教材·教法》 北大核心 2026年第2期114-121,共8页
分数和小数是小学数学课程中的传统、经典内容,对培育小学生多方面的学科核心素养具有重要价值。从年级分布、编排顺序、课程组织和内容要求四个维度,对百年来我国小学数学课程文件中的分数与小数内容进行分析比较,发现:起始年级“早晚... 分数和小数是小学数学课程中的传统、经典内容,对培育小学生多方面的学科核心素养具有重要价值。从年级分布、编排顺序、课程组织和内容要求四个维度,对百年来我国小学数学课程文件中的分数与小数内容进行分析比较,发现:起始年级“早晚交替”,所处年级较为集中;编排顺序持续调整,交替学习“交替出现”;分数和小数关联变强,“螺旋结构”愈加明晰;内容容量逐渐变少,运算要求不断降低。建议从综合考量教学顺序、关注核心概念教学进阶、有效使用螺旋式组织形式、准确把握内容容量要求等方面加强对新教材的理解及高质量教学实施。 展开更多
关键词 小学数学课程 分数与小数 编排顺序 螺旋结构 内容要求
在线阅读 下载PDF
Machine learning-based gray-level co-occurrence matrix signature for predicting lymph node metastasis in undifferentiated-type early gastric cancer 被引量:7
12
作者 Xin Wei Xue-Jiao Yan +4 位作者 Yu-Yan Guo Jie Zhang Guo-Rong Wang Arsalan Fayyaz Jiao Yu 《World Journal of Gastroenterology》 SCIE CAS 2022年第36期5338-5350,共13页
BACKGROUND The most important consideration in determining treatment strategies for undifferentiated early gastric cancer(UEGC)is the risk of lymph node metastasis(LNM).Therefore,identifying a potential biomarker that... BACKGROUND The most important consideration in determining treatment strategies for undifferentiated early gastric cancer(UEGC)is the risk of lymph node metastasis(LNM).Therefore,identifying a potential biomarker that predicts LNM is quite useful in determining treatment.AIM To develop a machine learning(ML)-based integral procedure to construct the LNM gray-level co-occurrence matrix(GLCM)prediction model.METHODS We retrospectively selected 526 cases of UEGC confirmed through pathological examination after radical gastrectomy without endoscopic treatment in four tertiary hospitals between January 2015 to December 2021.We extracted GLCM-based features from grayscale images and applied ML to the classification of candidate predictive variables.The robustness and clinical utility of each model were evaluated based on the following factors:Receiver operating characteristic curve(ROC),decision curve analysis,and clinical impact curve.RESULTS GLCM-based feature extraction significantly correlated with LNM.The top 7 GLCM-based factors included inertia value 0°(IV_0),inertia value 45°(IV_45),inverse gap 0°(IG_0),inverse gap 45°(IG_45),inverse gap full angle(IG_all),Haralick 30°(Haralick_30),Haralick full angle(Haralick_all),and Entropy.The areas under the ROC curve(AUCs)of the random forest classifier(RFC)model,support vector machine,eXtreme gradient boosting,artificial neural network,and decision tree ranged from 0.805[95%confidence interval(CI):0.258-1.352]to 0.925(95%CI:0.378-1.472)in the training set and from 0.794(95%CI:0.237-1.351)to 0.912(95%CI:0.355-1.469)in the testing set,respectively.The RFC(training set:AUC:0.925,95%CI:0.378-1.472;testing set:AUC:0.912,95%CI:0.355-1.469)model that incorporates Entropy,Haralick_all,Haralick_30,IG_all,IG_45,IG_0,and IV_45 had the highest predictive accuracy.CONCLUSION The evaluation results indicate that the method of selecting radiological and textural features becomes more effective in the LNM discrimination against UEGC patients.Additionally,the MLbased prediction model developed using the RFC can be used to derive treatment options and identify LNM,which can hence improve clinical outcomes. 展开更多
关键词 Undifferentiated early gastric cancer Machine learning Lymph node metastasis gray-level cooccurrence matrix Feature selection Prediction
暂未订购
Automatic Identification of Butterfly Species Based on Gray-Level Co-occurrence Matrix Features of Image Block 被引量:4
13
作者 XUE Ankang LI Fan XIONG Yin 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第2期220-225,共6页
In recent years, automatic identification of butterfly species arouses more and more attention in different areas. Because most of their larvae are pests, this research is not only meaningful for the popularization of... In recent years, automatic identification of butterfly species arouses more and more attention in different areas. Because most of their larvae are pests, this research is not only meaningful for the popularization of science but also important to the agricultural production and the environment. Texture as a notable feature is widely used in digital image recognition technology; for describing the texture, an extremely effective method, graylevel co-occurrence matrix(GLCM), has been proposed and used in automatic identification systems. However,according to most of the existing works, GLCM is computed by the whole image, which likely misses some important features in local areas. To solve this problem, this paper presents a new method based on the GLCM features extruded from three image blocks, and a weight-based k-nearest neighbor(KNN) search algorithm used for classifier design. With this method, a butterfly classification system works on ten butterfly species which are hard to identify by shape features. The final identification accuracy is 98%. 展开更多
关键词 automatic identification butterfly species gray-level co-occurrence matrix(GLCM) features of image block
原文传递
On design of efficient comb decimator with improved response 被引量:1
14
作者 刘全 Gao Jun Huang Gaoming 《High Technology Letters》 EI CAS 2012年第2期202-207,共6页
A three-part comb decimator is presented in this paper, for the applications with severe requirements of circuit performance and frequency response. Based on the modified prime factorization method and multistage poly... A three-part comb decimator is presented in this paper, for the applications with severe requirements of circuit performance and frequency response. Based on the modified prime factorization method and multistage polyphase decomposition, an efficient non-recursive structure for the cascaded integrator-comb (CIC) decimation filter is derived. Utilizing this structure as the core part, the proposed comb decimator can not only loosen the decimation ratio's limitation, but also balance the tradeoff among the overall power consumption, circuit area and maximum speed. Further, to improve the frequency response of the comb decimator, a cos-prefilter is introduced as the preprocessing part for increasing the aliasing rejection, and an optimum sin-based filter is used as the compensation part for decreasing the passband droop. 展开更多
关键词 comb decimator cascaded integrator-comb (CIC) filter prime factorization polyphase decomposition
在线阅读 下载PDF
Perfect Reconstructable Decimated One-Dimensional Empirical Mode Decomposition Filter Banks
15
作者 Min-Sung Koh Esteban Rodriguez-Marek 《Journal of Electronic Science and Technology》 CAS 2014年第2期196-200,共5页
This paper introduces decimated filter banks for the one-dimensional empirical mode decomposition (1D-EMD). These filter banks can provide perfect reconstruction and allow for an arbitrary tree structure. Since the ... This paper introduces decimated filter banks for the one-dimensional empirical mode decomposition (1D-EMD). These filter banks can provide perfect reconstruction and allow for an arbitrary tree structure. Since the EMD is a data driven decomposition, it is a very useful analysis instrument for non-stationary and non-linear signals. However, the traditional 1D-EMD has the disadvantage of expanding the data. Large data sets can be generated as the amount of data to be stored increases with every decomposition level. The 1D-EMD can be thought as having the structure of a single dyadic filter. However, a methodology to incorporate the decomposition into any arbitrary tree structure has not been reported yet in the literature. This paper shows how to extend the 1D-EMD into any arbitrary tree structure while maintaining the perfect reconstruction property. Furthermore, the technique allows for downsampling the decomposed signals. This paper, thus, presents a method to minimize the data-expansion drawback of the 1D-EMD by using decimation and merging the EMD coefficients. The proposed algorithm is applicable for any arbitrary tree structure including a full binary tree structure. 展开更多
关键词 decimated empirical mode decomposition filter banks perfect reconstruction
在线阅读 下载PDF
An optimized infinite time-evolving block decimation algorithm for lattice systems
16
作者 许军军 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第4期171-174,共4页
The infinite time-evolving block decimation algorithm(i TEBD)provides an efficient way to determine the ground state and dynamics of the quantum lattice systems in the thermodynamic limit.In this paper we suggest an o... The infinite time-evolving block decimation algorithm(i TEBD)provides an efficient way to determine the ground state and dynamics of the quantum lattice systems in the thermodynamic limit.In this paper we suggest an optimized way to take the i TEBD calculation,which takes advantage of additional reduced decompositions to speed up the calculation.The numerical calculations show that for a comparable computation time our method provides more accurate results than the traditional i TEBD,especially for lattice systems with large on-site degrees of freedom. 展开更多
关键词 time-evolving block decimation matrix product states spin models symmetry-protected topological states
原文传递
Optically Controllable Gray-Level Diffraction from a BCT Photonic Crystal Based on Azo Dye-Doped HPDLC
17
作者 Shing-Trong Wu Chung-Hung Liu +2 位作者 Jui-Hsiang Liu Ming-Hsien Li Andy Ying-Guey Fuh 《Optics and Photonics Journal》 2014年第10期288-295,共8页
We investigated optically controllable gray-level diffraction from a body-centered tetragonal photonic crystal that was based on an azo-dye-doped holographic polymer dispersed liquid crystal. The sample is fabricated ... We investigated optically controllable gray-level diffraction from a body-centered tetragonal photonic crystal that was based on an azo-dye-doped holographic polymer dispersed liquid crystal. The sample is fabricated by use of two-beam interference with multi-exposure. Bichromatic pumping beams at various intensities were used to pump the sample to change the concentration of the cis isomer and, in turn, modulate the effective index of the photonic crystals as well as their diffraction intensity. Three pumping processes were utilized to produce gray-level switching of diffractive light. This study demonstrates the optimum gray-level to be 15-level of up-step and down-step. The simulation of the diffraction intensity under bichromatic pumping sources was also studied. 展开更多
关键词 All Optically Control gray-level Photonic CRYSTALS HPDLC
暂未订购
Machine learning prediction model for gray-level co-occurrence matrix features of synchronous liver metastasis in colorectal cancer
18
作者 Kai-Feng Yang Sheng-Jie Li +1 位作者 Jun Xu Yong-Bin Zheng 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第6期1571-1581,共11页
BACKGROUND Synchronous liver metastasis(SLM)is a significant contributor to morbidity in colorectal cancer(CRC).There are no effective predictive device integration algorithms to predict adverse SLM events during the ... BACKGROUND Synchronous liver metastasis(SLM)is a significant contributor to morbidity in colorectal cancer(CRC).There are no effective predictive device integration algorithms to predict adverse SLM events during the diagnosis of CRC.AIM To explore the risk factors for SLM in CRC and construct a visual prediction model based on gray-level co-occurrence matrix(GLCM)features collected from magnetic resonance imaging(MRI).METHODS Our study retrospectively enrolled 392 patients with CRC from Yichang Central People’s Hospital from January 2015 to May 2023.Patients were randomly divided into a training and validation group(3:7).The clinical parameters and GLCM features extracted from MRI were included as candidate variables.The prediction model was constructed using a generalized linear regression model,random forest model(RFM),and artificial neural network model.Receiver operating characteristic curves and decision curves were used to evaluate the prediction model.RESULTS Among the 392 patients,48 had SLM(12.24%).We obtained fourteen GLCM imaging data for variable screening of SLM prediction models.Inverse difference,mean sum,sum entropy,sum variance,sum of squares,energy,and difference variance were listed as candidate variables,and the prediction efficiency(area under the curve)of the subsequent RFM in the training set and internal validation set was 0.917[95%confidence interval(95%CI):0.866-0.968]and 0.09(95%CI:0.858-0.960),respectively.CONCLUSION A predictive model combining GLCM image features with machine learning can predict SLM in CRC.This model can assist clinicians in making timely and personalized clinical decisions. 展开更多
关键词 Colorectal cancer Synchronous liver metastasis gray-level co-occurrence matrix Machine learning algorithm Prediction model
暂未订购
Elegant and Practical Method of Fir Decimation Using Comb Filters in the Field of Digital Signal Processing
19
作者 S. Arun Kumar P. Ganesh Kumar 《Circuits and Systems》 2016年第9期2476-2488,共14页
This paper deals with the technology of using comb filters for FIR Decimation in Digital Signal Processing. The process of decreasing the sampling frequency of a sampled signal is called decimation. In the usage of de... This paper deals with the technology of using comb filters for FIR Decimation in Digital Signal Processing. The process of decreasing the sampling frequency of a sampled signal is called decimation. In the usage of decimating filters, only a portion of the out-of-pass band frequencies turns into the pass band, in systems wherein different parts operate at different sample rates. A filter design, tuned to the aliasing frequencies all of which can otherwise steal into the pass band, not only provides multiple stop bands but also exhibits computational efficiency and performance superiority over the single stop band design. These filters are referred to as multiband designs in the family of FIR filters. The other two special versions of FIR filter designs are Halfband and Comb filter designs, both of which are particularly useful for reducing the computational requirements in multirate designs. The proposed method of using Comb FIR decimation procedure is not only efficient but also opens up a new vista of simplicity and elegancy to compute Multiplications per Second (MPS) and Additions per Second (APS) for the desired filter over and above the half band designs. 展开更多
关键词 decimATION MULTIBAND Halfband Comb Filter MPS APS Multirate Signal Processing
在线阅读 下载PDF
上一页 1 2 44 下一页 到第
使用帮助 返回顶部