期刊文献+
共找到1,046篇文章
< 1 2 53 >
每页显示 20 50 100
Learning compact binary code based on multiple heterogeneous features
1
作者 左欣 罗立民 +1 位作者 沈继锋 于化龙 《Journal of Southeast University(English Edition)》 EI CAS 2013年第4期372-378,共7页
A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples ... A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples in the feature space to boost the performance of each weak classifier in the asymmetric boosting framework. Then, the weak classifier based on a novel linear discriminate analysis (LDA) algorithm which is learned from the subspace of heterogeneous features is integrated into the framework. Finally, the proposed method deals with each bit of the code sequentially, which utilizes the samples misclassified in each round in order to learn compact and balanced code. The heterogeneous information from different modalities can be effectively complementary to each other, which leads to much higher performance. The experimental results based on the two public benchmarks demonstrate that this method is superior to many of the state- of-the-art methods. In conclusion, the performance of the retrieval system can be improved with the help of multiple heterogeneous features and the compact hash codes which can be learned by the imbalanced learning method. 展开更多
关键词 hashing code linear discriminate analysis asymmetric boosting heterogeneous feature
在线阅读 下载PDF
Augmented Deep Multi-Granularity Pose-Aware Feature Fusion Network for Visible-Infrared Person Re-Identification 被引量:3
2
作者 Zheng Shi Wanru Song +1 位作者 Junhao Shan Feng Liu 《Computers, Materials & Continua》 SCIE EI 2023年第12期3467-3488,共22页
Visible-infrared Cross-modality Person Re-identification(VI-ReID)is a critical technology in smart public facilities such as cities,campuses and libraries.It aims to match pedestrians in visible light and infrared ima... Visible-infrared Cross-modality Person Re-identification(VI-ReID)is a critical technology in smart public facilities such as cities,campuses and libraries.It aims to match pedestrians in visible light and infrared images for video surveillance,which poses a challenge in exploring cross-modal shared information accurately and efficiently.Therefore,multi-granularity feature learning methods have been applied in VI-ReID to extract potential multi-granularity semantic information related to pedestrian body structure attributes.However,existing research mainly uses traditional dual-stream fusion networks and overlooks the core of cross-modal learning networks,the fusion module.This paper introduces a novel network called the Augmented Deep Multi-Granularity Pose-Aware Feature Fusion Network(ADMPFF-Net),incorporating the Multi-Granularity Pose-Aware Feature Fusion(MPFF)module to generate discriminative representations.MPFF efficiently explores and learns global and local features with multi-level semantic information by inserting disentangling and duplicating blocks into the fusion module of the backbone network.ADMPFF-Net also provides a new perspective for designing multi-granularity learning networks.By incorporating the multi-granularity feature disentanglement(mGFD)and posture information segmentation(pIS)strategies,it extracts more representative features concerning body structure information.The Local Information Enhancement(LIE)module augments high-performance features in VI-ReID,and the multi-granularity joint loss supervises model training for objective feature learning.Experimental results on two public datasets show that ADMPFF-Net efficiently constructs pedestrian feature representations and enhances the accuracy of VI-ReID. 展开更多
关键词 Visible-infrared person re-identification multi-granularity feature learning modality
在线阅读 下载PDF
Robust Speech Recognition System Using Conventional and Hybrid Features of MFCC,LPCC,PLP,RASTA-PLP and Hidden Markov Model Classifier in Noisy Conditions 被引量:7
3
作者 Veton Z.Kepuska Hussien A.Elharati 《Journal of Computer and Communications》 2015年第6期1-9,共9页
In recent years, the accuracy of speech recognition (SR) has been one of the most active areas of research. Despite that SR systems are working reasonably well in quiet conditions, they still suffer severe performance... In recent years, the accuracy of speech recognition (SR) has been one of the most active areas of research. Despite that SR systems are working reasonably well in quiet conditions, they still suffer severe performance degradation in noisy conditions or distorted channels. It is necessary to search for more robust feature extraction methods to gain better performance in adverse conditions. This paper investigates the performance of conventional and new hybrid speech feature extraction algorithms of Mel Frequency Cepstrum Coefficient (MFCC), Linear Prediction Coding Coefficient (LPCC), perceptual linear production (PLP), and RASTA-PLP in noisy conditions through using multivariate Hidden Markov Model (HMM) classifier. The behavior of the proposal system is evaluated using TIDIGIT human voice dataset corpora, recorded from 208 different adult speakers in both training and testing process. The theoretical basis for speech processing and classifier procedures were presented, and the recognition results were obtained based on word recognition rate. 展开更多
关键词 Speech Recognition Noisy Conditions feature Extraction Mel-Frequency Cepstral Coefficients Linear Predictive Coding Coefficients Perceptual Linear Production RASTA-PLP Isolated Speech Hidden Markov Model
在线阅读 下载PDF
A SEMI-OPEN-LOOP CODING MODE SELECTION ALGORITHM BASED ON EFM AND SELECTED AMR-WB+ FEATURES
4
作者 Hong Ying Zhao Shenghui Kuang Jingming 《Journal of Electronics(China)》 2009年第2期274-278,共5页
To solve the problems of the AMR-WB+(Extended Adaptive Multi-Rate-WideBand) semi-open-loop coding mode selection algorithm,features for ACELP(Algebraic Code Excited Linear Prediction) and TCX(Transform Coded eXcitatio... To solve the problems of the AMR-WB+(Extended Adaptive Multi-Rate-WideBand) semi-open-loop coding mode selection algorithm,features for ACELP(Algebraic Code Excited Linear Prediction) and TCX(Transform Coded eXcitation) classification are investigated.11 classifying features in the AMR-WB+ codec are selected and 2 novel classifying features,i.e.,EFM(Energy Flatness Measurement) and stdEFM(standard deviation of EFM),are proposed.Consequently,a novel semi-open-loop mode selection algorithm based on EFM and selected AMR-WB+ features is proposed.The results of classifying test and listening test show that the performance of the novel algorithm is much better than that of the AMR-WB+ semi-open-loop coding mode selection algorithm. 展开更多
关键词 Speech/Audio Semi-open-loop coding mode selection features selection Energy Flat-ness Measurement(EFM)
在线阅读 下载PDF
Integrated Multi-featured Android Malicious Code Detection
5
作者 Qing Yu Hui Zhao 《国际计算机前沿大会会议论文集》 2019年第1期215-216,共2页
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integra... To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection, an Android malicious code detection mechanism is proposed based on integrated learning on the basis of dynamic and static detection. Considering three types of Android behavior characteristics, a three-layer hybrid algorithm was proposed. And it combined the malicious code detection based on digital signature to improve the detection efficiency. The digital signature of the known malicious code was extracted to form a malicious sample library. The authority that can reflect Android malicious behavior, API call and the running system call features were also extracted. An expandable hybrid discriminant algorithm was designed for the above three types of features. The algorithm was tested with machine learning method by constructing the optimal classifier suitable for the above features. Finally, the Android malicious code detection system was designed and implemented based on the multi-layer hybrid algorithm. The experimental results show that the system performs Android malicious code detection based on the combination of signature and dynamic and static features. Compared with other related work, the system has better performance in execution efficiency and detection rate. 展开更多
关键词 MALICIOUS code featurE Optimal algorithm
在线阅读 下载PDF
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
6
作者 Shouheng Tuo YanLing Zhu +1 位作者 Jiangkun Lin Jiewei Jiang 《Quantitative Biology》 2025年第1期127-141,共15页
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as extensive training durations,limited sample sizes,and inadequate generalization capabilities.To address these issues,we present AMHF-TP,an advanced method for MFTP recognition that utilizes attention mechanisms and multi-granularity hierarchical features to enhance performance.The AMHF-TP is composed of four key components:a migration learning module that leverages pretrained models to extract atomic compositional features of MFTP sequences;a convolutional neural network and selfattention module that refine feature extraction from amino acid sequences and their secondary structures;a hypergraph module that constructs a hypergraph for complex similarity representation between MFTP sequences;and a hierarchical feature extraction module that integrates multimodal peptide sequence features.Compared with leading methods,the proposed AMHF-TP demonstrates superior precision,accuracy,and coverage,underscoring its effectiveness and robustness in MFTP recognition.The comparative analysis of separate hierarchical models and the combined model,as well as with five contemporary models,reveals AMHFTP’s exceptional performance and stability in recognition tasks. 展开更多
关键词 deep learning hypergraph multifunctional therapeutic peptides multi-granularity hierarchical features
原文传递
基于自编码神经网络高阶特征提取的温室环境因子高维数据压缩方法
7
作者 冷令 王琳 +3 位作者 吕金洪 李浩欣 吴伟斌 高婷 《中国农机化学报》 北大核心 2026年第1期252-257,共6页
针对温室环境数据的维度高、冗余性强,导致数据处理存在压缩比低和峰值信噪比较高的问题,提出基于自编码神经网络高阶特征提取的温室环境因子高维数据压缩方法。应用改进回归方程,填补温室环境因子数据中的缺失值,针对深度自编码神经网... 针对温室环境数据的维度高、冗余性强,导致数据处理存在压缩比低和峰值信噪比较高的问题,提出基于自编码神经网络高阶特征提取的温室环境因子高维数据压缩方法。应用改进回归方程,填补温室环境因子数据中的缺失值,针对深度自编码神经网络的内部协变量迁移现象,加入自适应平衡层,结合小批量梯度下降法,构建深度自适应平衡自编码神经网络,提取温室环境因子高阶特征,基于矢量量化思想,判断相对误差,通过实施新码书计算,获得各划分的质心,根据码书训练结果,设计高维数据压缩方法。结果表明,当数据量超过50 GB时,所设计方法的压缩比下降0.7个百分点,降幅为3.8%,整体压缩性能表现优异;峰值信噪比随着采样率变大并未大幅下降,仅降低4 dB,降幅为7.5%,压缩峰值信噪比具备更优的重建保真度。该方法具有更高的压缩比且有效降低信噪比,对提高温室管理的智能化水平具有借鉴价值。 展开更多
关键词 改进回归方程 自编码神经网络 高阶特征提取 温室环境因子 高维数据压缩
在线阅读 下载PDF
QR Code在多种类物体识别与操作中的应用 被引量:12
8
作者 穴洪涛 田国会 +1 位作者 李晓磊 路飞 《山东大学学报(工学版)》 CAS 2007年第6期25-30,共6页
提出了一种基于QR Code的多种类物体识别和操作方法.家庭环境下物体种类繁多,形状各种各样,颜色也不尽相同,使用传统的图像处理的方法很难将目标物从背景图像中准确地分割出来.针对不同物体设计相应的QR Code标签,将对物体的识别转化为... 提出了一种基于QR Code的多种类物体识别和操作方法.家庭环境下物体种类繁多,形状各种各样,颜色也不尽相同,使用传统的图像处理的方法很难将目标物从背景图像中准确地分割出来.针对不同物体设计相应的QR Code标签,将对物体的识别转化为对QR Code标签的识别,可以大大减小计算量,提高识别精度和速度;同时还能够将足够多的操作信息(如抓取力、抓取位置等)记录在QR Code中,方便机器人实现对物品的准确操作;QRCode标签的定位由训练的基于Haar-like特征的层叠推进分类器检测实时图像来实现,实验表明该方法可以快速识别出目标物,具有很好的适用性和鲁棒性. 展开更多
关键词 物体识别 图像处理 快速响应矩阵码 类海尔特征
在线阅读 下载PDF
Surface reconstruction of complex contour lines based on chain code matching technique 被引量:1
9
作者 姜晓彤 《Journal of Southeast University(English Edition)》 EI CAS 2005年第4期432-435,共4页
A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman'... A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman' s code. Symbolic string matching technique is applied to establish a correspondence between the two consecutive contours. The surface is composed of the pieces reconstructed from the correspondence points. Experimental results show that the proposed method exhibits a good behavior for the quality of surface reconstruction and its time complexity is proportional to mn where m and n are the numbers of vertices of the two consecutive slices, respectively. 展开更多
关键词 chain code string matching surface reconstruction local shape feature
在线阅读 下载PDF
宫颈癌组织LncRNA HOTTIP表达及其与临床病理特征、生存预后的关系分析
10
作者 马晓明 闫谨 马煜磊 《医学理论与实践》 2026年第1期26-30,47,共6页
目的:探讨宫颈癌组织长链非编码核糖核酸(LncRNA)同源异形盒A远端转录本(HOTTIP)表达及其与临床病理特征、生存预后的关系。方法:选取2019年2月—2023年4月我院145例宫颈癌患者为研究对象。收集手术切除的宫颈癌组织及癌旁组织,采用实... 目的:探讨宫颈癌组织长链非编码核糖核酸(LncRNA)同源异形盒A远端转录本(HOTTIP)表达及其与临床病理特征、生存预后的关系。方法:选取2019年2月—2023年4月我院145例宫颈癌患者为研究对象。收集手术切除的宫颈癌组织及癌旁组织,采用实时荧光定量聚合酶链反应(RT-qPCR)法检测LncRNA HOTTIP相对表达量并比较。比较不同临床病理特征患者癌组织LncRNA HOTTIP相对表达量。自出院当天持续随访至2024年4月或死亡,按照生存预后情况分为生存组、死亡组,比较2组临床资料,采用Cox回归法分析生存预后的影响因素,并进行Kaplan-Meier生存分析。结果:共脱落10例,最终纳入135例;宫颈癌组织LncRNA HOTTIP相对表达量高于癌旁组织(P<0.05);相较于病理类型鳞癌、国际妇产科联盟(FIGO)Ⅰ~Ⅱ期、肿瘤中/高分化、无神经侵犯及无脉管癌栓患者,病理类型非鳞癌、FIGOⅢ~Ⅳ期、肿瘤低/未分化、神经侵犯及脉管癌栓患者的癌组织LncRNA HOTTIP相对表达量升高(P<0.05);随访9~58个月,中位数39(20,46)个月,死亡率为38.52%(52/135);FIGOⅢ~Ⅳ期、肿瘤低/未分化、神经侵犯、脉管癌栓及癌组织LncRNA HOTTIP高表达是宫颈癌患者死亡的独立危险因素(P<0.05);Kaplan-Meier生存分析显示,FIGOⅢ~Ⅳ期、肿瘤低/未分化、神经侵犯、脉管癌栓及癌组织LncRNA HOTTIP高表达患者的生存率低于FIGOⅠ~Ⅱ期、肿瘤中/高分化、无神经侵犯、无脉管癌栓及癌组织LncRNA HOTTIP低表达患者(P<0.05)。结论:宫颈癌患者癌组织LncRNA HOTTIP相对表达量升高,癌组织LncRNA HOTTIP相对表达量不仅与病理类型、FIGO分期、肿瘤分化程度、神经侵犯及脉管癌栓密切相关,且为生存预后的影响因素。 展开更多
关键词 宫颈癌 长链非编码核糖核酸 同源异形盒A远端转录本 临床病理特征 生存预后
暂未订购
Impulse feature extraction method for machinery fault detection using fusion sparse coding and online dictionary learning 被引量:7
11
作者 Deng Sen Jing Bo +2 位作者 Sheng Sheng Huang Yifeng Zhou Hongliang 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第2期488-498,共11页
Impulse components in vibration signals are important fault features of complex machines. Sparse coding (SC) algorithm has been introduced as an impulse feature extraction method, but it could not guarantee a satisf... Impulse components in vibration signals are important fault features of complex machines. Sparse coding (SC) algorithm has been introduced as an impulse feature extraction method, but it could not guarantee a satisfactory performance in processing vibration signals with heavy background noises. In this paper, a method based on fusion sparse coding (FSC) and online dictionary learning is proposed to extract impulses efficiently. Firstly, fusion scheme of different sparse coding algorithms is presented to ensure higher reconstruction accuracy. Then, an improved online dictionary learning method using FSC scheme is established to obtain redundant dictionary and it can capture specific features of training samples and reconstruct the sparse approximation of vibration signals. Simulation shows that this method has a good performance in solving sparse coefficients and training redundant dictionary compared with other methods. Lastly, the proposed method is further applied to processing aircraft engine rotor vibration signals. Compared with other feature extraction approaches, our method can extract impulse features accurately and efficiently from heavy noisy vibration signal, which has significant supports for machinery fault detection and diagnosis. 展开更多
关键词 Dictionary learning Fault detection Impulse feature extraction Information fusion Sparse coding
原文传递
Feature Representation for Facial Expression Recognition Based on FACS and LBP 被引量:9
12
作者 Li Wang Rui-Feng Li +1 位作者 Ke Wang Jian Chen 《International Journal of Automation and computing》 EI CSCD 2014年第5期459-468,共10页
In expression recognition, feature representation is critical for successful recognition since it contains distinctive information of expressions. In this paper, a new approach for representing facial expression featu... In expression recognition, feature representation is critical for successful recognition since it contains distinctive information of expressions. In this paper, a new approach for representing facial expression features is proposed with its objective to describe features in an effective and efficient way in order to improve the recognition performance. The method combines the facial action coding system(FACS) and 'uniform' local binary patterns(LBP) to represent facial expression features from coarse to fine. The facial feature regions are extracted by active shape models(ASM) based on FACS to obtain the gray-level texture. Then, LBP is used to represent expression features for enhancing the discriminant. A facial expression recognition system is developed based on this feature extraction method by using K nearest neighborhood(K-NN) classifier to recognize facial expressions. Finally, experiments are carried out to evaluate this feature extraction method. The significance of removing the unrelated facial regions and enhancing the discrimination ability of expression features in the recognition process is indicated by the results, in addition to its convenience. 展开更多
关键词 Local binary patterns (LBP) facial expression recognition active shape models (ASM) facial action coding system (FACS) feature representation
原文传递
Digital signature systems based on smart card and fingerprint feature 被引量:3
13
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
在线阅读 下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
14
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
在线阅读 下载PDF
IrisCodeNet:虹膜特征编码网络 被引量:5
15
作者 贾丁丁 沈文忠 《计算机工程与应用》 CSCD 北大核心 2022年第10期185-192,共8页
使用有效的特征提取算法对虹膜纹理进行准确的表达是虹膜识别技术的关键。基于虹膜识别任务的特殊性,提出了用于虹膜特征编码的网络模型IrisCodeNet。该网络架构使用了改进的BasicBlock,并结合了可以扩大决策边界的损失函数AM-Softmax(a... 使用有效的特征提取算法对虹膜纹理进行准确的表达是虹膜识别技术的关键。基于虹膜识别任务的特殊性,提出了用于虹膜特征编码的网络模型IrisCodeNet。该网络架构使用了改进的BasicBlock,并结合了可以扩大决策边界的损失函数AM-Softmax(additive margin softmax)。为了获取最佳的虹膜识别效果,对AM-Softmax的参数设置、虹膜图像预处理输入形式、数据增强方式、网络输入尺寸做了细致的研究。实验结果表明:使用IrisCodeNet训练得到的特征提取器在CASIA-Iris-Thousand、CASIA-Iris-Distance、IITD虹膜数据库上进行测试,所评估的等错误率(equal error rate,EER)和正确接受率(true acceptance rate,TAR)均远远超过了广泛应用的传统算法。特别地,IrisCodeNet无需传统的虹膜归一化或精确的虹膜分割步骤依然取得了极好的识别效果。并且使用Grad-CAM(gradient-weighted class activation mapping)算法进行了可视化分析,结果表明该网络框架有效地关注了虹膜纹理信息,从而证明了IrisCodeNet具有较强的虹膜纹理特征提取能力。 展开更多
关键词 虹膜识别 特征编码 图像预处理 AM-Softmax Grad-CAM
在线阅读 下载PDF
A Novel Algorithm of Error Check and Code Generation for Structured Flowchart
16
作者 Mingcheng Qu Naigang Cui +1 位作者 Xianghu Wu Yongchao Tao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第4期18-30,共13页
Structured flowchart( SFC) and Automatic code generation based on SFC( CG-SFC) have been widely used in software requirements,design and testing phases. Some CG-SFC tools such as Rhapsody have the ability to build flo... Structured flowchart( SFC) and Automatic code generation based on SFC( CG-SFC) have been widely used in software requirements,design and testing phases. Some CG-SFC tools such as Rhapsody have the ability to build flowchart and generate code,but they do not check whether a given flowchart is correct or structural. For unstructured error ‘goto'statements will be generated randomly. We proposed three algorithms and some error recognition criteria to solve those problems. Structure recognition algorithm can recognize Selection,While/for and do-while structures. Error recognition algorithm incorporating criteria can check all the errors. At last,we develop a CG-SFC system,and compared with existing Rhapsody,it shows that the proposed algorithms are correct and effective. 展开更多
关键词 STRUCTURED flowchart code generation ERROR CHECK featurE RECOGNITION
在线阅读 下载PDF
Feature Extraction of Fabric Defects Based on Complex Contourlet Transform and Principal Component Analysis 被引量:1
17
作者 吴一全 万红 叶志龙 《Journal of Donghua University(English Edition)》 EI CAS 2013年第4期282-286,共5页
To extract features of fabric defects effectively and reduce dimension of feature space,a feature extraction method of fabric defects based on complex contourlet transform (CCT) and principal component analysis (PC... To extract features of fabric defects effectively and reduce dimension of feature space,a feature extraction method of fabric defects based on complex contourlet transform (CCT) and principal component analysis (PCA) is proposed.Firstly,training samples of fabric defect images are decomposed by CCT.Secondly,PCA is applied in the obtained low-frequency component and part of highfrequency components to get a lower dimensional feature space.Finally,components of testing samples obtained by CCT are projected onto the feature space where different types of fabric defects are distinguished by the minimum Euclidean distance method.A large number of experimental results show that,compared with PCA,the method combining wavdet low-frequency component with PCA (WLPCA),the method combining contourlet transform with PCA (CPCA),and the method combining wavelet low-frequency and highfrequency components with PCA (WPCA),the proposed method can extract features of common fabric defect types effectively.The recognition rate is greatly improved while the dimension is reduced. 展开更多
关键词 fabric defects feature extraction complex contourlet transform(CCT) principal component analysis(PCA)CLC number:TP391.4 TS103.7Document code:AArticle ID:1672-5220(2013)04-0282-05
在线阅读 下载PDF
Multi-Index Image Retrieval Hash Algorithm Based on Multi-View Feature Coding
18
作者 Rong Duan Junshan Tan +3 位作者 Jiaohua Qin Xuyu Xiang Yun Tan N.eal NXiong 《Computers, Materials & Continua》 SCIE EI 2020年第12期2335-2350,共16页
In recent years,with the massive growth of image data,how to match the image required by users quickly and efficiently becomes a challenge.Compared with single-view feature,multi-view feature is more accurate to descr... In recent years,with the massive growth of image data,how to match the image required by users quickly and efficiently becomes a challenge.Compared with single-view feature,multi-view feature is more accurate to describe image information.The advantages of hash method in reducing data storage and improving efficiency also make us study how to effectively apply to large-scale image retrieval.In this paper,a hash algorithm of multi-index image retrieval based on multi-view feature coding is proposed.By learning the data correlation between different views,this algorithm uses multi-view data with deeper level image semantics to achieve better retrieval results.This algorithm uses a quantitative hash method to generate binary sequences,and uses the hash code generated by the association features to construct database inverted index files,so as to reduce the memory burden and promote the efficient matching.In order to reduce the matching error of hash code and ensure the retrieval accuracy,this algorithm uses inverted multi-index structure instead of single-index structure.Compared with other advanced image retrieval method,this method has better retrieval performance. 展开更多
关键词 HASHING multi-view feature large-scale image retrieval feature coding feature matching
在线阅读 下载PDF
A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
19
作者 Li Li Qing Zhang Youran Kong 《Computers, Materials & Continua》 SCIE EI 2024年第7期801-818,共18页
Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families ... Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code. 展开更多
关键词 Malicious code variant traceability feature reuse lightweight neural networks code visualization attention mechanism
在线阅读 下载PDF
Multi-Level Feature-Based Ensemble Model for Target-Related Stance Detection
20
作者 Shi Li Xinyan Cao Yiting Nan 《Computers, Materials & Continua》 SCIE EI 2020年第10期777-788,共12页
Stance detection is the task of attitude identification toward a standpoint.Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during highe... Stance detection is the task of attitude identification toward a standpoint.Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during higher-level abstracting.Moreover,because the target is not always mentioned in the text,most methods have ignored target information.In order to solve these problems,we propose a neural network ensemble method that combines the timing dependence bases on long short-term memory(LSTM)and the excellent extracting performance of convolutional neural networks(CNNs).The method can obtain multi-level features that consider both local and global features.We also introduce attention mechanisms to magnify target information-related features.Furthermore,we employ sparse coding to remove noise to obtain characteristic features.Performance was improved by using sparse coding on the basis of attention employment and feature extraction.We evaluate our approach on the SemEval-2016Task 6-A public dataset,achieving a performance that exceeds the benchmark and those of participating teams. 展开更多
关键词 ATTENTION sparse coding multi-level features ensemble model
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部