期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
A Novel Method of Heart Failure Prediction Based on DPCNN-XGBOOST Model 被引量:4
1
作者 Yuwen Chen Xiaolin Qin +1 位作者 Lige Zhang Bin Yi 《Computers, Materials & Continua》 SCIE EI 2020年第10期495-510,共16页
The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors... The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors such as doctors’knowledge and experience.The accuracy is difficult to guarantee and has a serious lag.In this paper,a mixture prediction model is proposed for perioperative adverse events of heart failure,which combined with the advantages of the Deep Pyramid Convolutional Neural Networks(DPCNN)and Extreme Gradient Boosting(XGBOOST).The DPCNN was used to automatically extract features from patient’s diagnostic texts,and the text features were integrated with the preoperative examination and intraoperative monitoring values of patients,then the XGBOOST algorithm was used to construct the prediction model of heart failure.An experimental comparison was conducted on the model based on the data of patients with heart failure in southwest hospital from 2014 to 2018.The results showed that the DPCNN-XGBOOST model improved the predictive sensitivity of the model by 3%and 31%compared with the text-based DPCNN Model and the numeric-based XGBOOST Model. 展开更多
关键词 Deep pyramid convolutional neural networks extreme gradient boosting heart failure prediction
在线阅读 下载PDF
Spectral properties and geometric interpretation of R-filters
2
作者 冷拓 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2009年第1期109-120,共12页
By applying the Fourier analysis, we study the spectral properties of R- filters. Further, we prove that R-filters are a generalization of least squares polynomial adjustment, and we give the geometric interpretation ... By applying the Fourier analysis, we study the spectral properties of R- filters. Further, we prove that R-filters are a generalization of least squares polynomial adjustment, and we give the geometric interpretation of R-filters. 展开更多
关键词 R-filter HP-filter spectral properties Fourier analysis Hess-matrix operator theory
在线阅读 下载PDF
The Majorization Order on Monomials and Termination of the Successive Difference Substitutions
3
作者 Jia XU Yong YAO 《Journal of Mathematical Research with Applications》 CSCD 2015年第2期229-236,共8页
We introduce a concept for the majorization order on monomials. With the help of this order, we derive a necessary condition on the positive termination of a general successive difference substitution algorithm (KSDS... We introduce a concept for the majorization order on monomials. With the help of this order, we derive a necessary condition on the positive termination of a general successive difference substitution algorithm (KSDS) for an input form f. 展开更多
关键词 successive difference substitution algorithm majorization order on monomials TERMINATION positive semi-definite form
原文传递
End-to-end verifiable electronic voting scheme of blockchain based on random linear block code
4
作者 Liu Ting Cui Zhe +1 位作者 Pu Hongquan Peng Xingyi 《High Technology Letters》 EI CAS 2020年第1期25-33,共9页
Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.F... Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting. 展开更多
关键词 RANDOM linear block code(RLBC) ELECTRONIC voting(e-voting) blockchain CONSENSUS END-TO-END verifiable
在线阅读 下载PDF
Single bitmap block truncation coding of color images using hill climbing algorithm
5
作者 Zhang Lige Qin Xiaolin +2 位作者 Li Qing Peng Haoyue Hou Yu 《High Technology Letters》 EI CAS 2019年第4期355-363,共9页
In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Fi... In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Firstly,the incoming color image is partitioned into non-overlapping blocks and each block is encoded using the W-plane method to get an initial common bitmap and quantization values.Then,the hill climbing algorithm is applied to optimize an initial common bitmap and generate a near-optimized common bitmap.Finally,the quantization values are recalculated by the near-optimized common bitmap and the considered color image is reconstructed block by block through the common bitmap and the new quantization values.Since the processing of each image block in SBBTC is independent and identical,parallel computing is applied to reduce the time consumption of this scheme.The simulation results show that the proposed scheme has better visual quality and time consumption than those of the reference SBBTC schemes. 展开更多
关键词 block truncation coding(BTC) common bitmap parallel computing hill climbing algorithm
在线阅读 下载PDF
EXISTENCE OF CLOSED ORBITS FOR A DIFFERENTIAL EQUATION MODEL CONCERNING MULTI-MOLECULE REACTIONS
6
作者 张伟年 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1993年第6期589-596,共8页
The existence of closed orbits for the biochemical reaction model was discussed. It was also pointed out that the equation has no closed orbits or has stable limit cycles arising from Hopf bifurcations under a certain... The existence of closed orbits for the biochemical reaction model was discussed. It was also pointed out that the equation has no closed orbits or has stable limit cycles arising from Hopf bifurcations under a certain condition. 展开更多
关键词 BIOCHEMISTRY Mathematical techniques
在线阅读 下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
7
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6G communications UAV systems
在线阅读 下载PDF
AdaptForever:Elastic and Mutual Learning for Continuous NLP Task Mastery
8
作者 Ke Chen Cheng Peng +4 位作者 Xinyang He Jiakang Sun Xu Liu Xiaolin Qin Yong Zhong 《Computers, Materials & Continua》 2025年第3期4003-4019,共17页
In natural language processing(NLP),managing multiple downstream tasks through fine-tuning pre-trained models often requires maintaining separate task-specific models,leading to practical inefficiencies.To address thi... In natural language processing(NLP),managing multiple downstream tasks through fine-tuning pre-trained models often requires maintaining separate task-specific models,leading to practical inefficiencies.To address this challenge,we introduce AdaptForever,a novel approach that enables continuous mastery of NLP tasks through the integration of elastic and mutual learning strategies with a stochastic expert mechanism.Our method freezes the pre-trained model weights while incorporating adapters enhanced with mutual learning capabilities,facilitating effective knowledge transfer from previous tasks to new ones.By combining Elastic Weight Consolidation(EWC)for knowledge preservation with specialized regularization terms,AdaptForever successfully maintains performance on earlier tasks while acquiring new capabilities.Experimental results demonstrate that AdaptForever achieves superior performance across a continuous sequence of NLP tasks compared to existing parameter-efficient methods,while effectively preventing catastrophic forgetting and enabling positive knowledge transfer between tasks. 展开更多
关键词 Adapter-tuning large language model pre-trained language model parameter-efficient fine tuning continue learning mutual learning mixture of expert
在线阅读 下载PDF
A new optimization algorithm based on chaos 被引量:19
9
作者 LU Hui-juan ZHANG Huo-ming MA Long-hua 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期539-542,共4页
In this article, some methods are proposed for enhancing the converging velocity of the COA (chaos optimization algorithm) based on using carrier wave two times, which can greatly increase the speed and efficiency of ... In this article, some methods are proposed for enhancing the converging velocity of the COA (chaos optimization algorithm) based on using carrier wave two times, which can greatly increase the speed and efficiency of the first carrier wave’s search for the optimal point in implementing the sophisticated searching during the second carrier wave is faster and more accurate. In addition, the concept of using the carrier wave three times is proposed and put into practice to tackle the multi-variables opti- mization problems, where the searching for the optimal point of the last several variables is frequently worse than the first several ones. 展开更多
关键词 Chaos optimization algorithm (COA) Carrier wave two times Multi-variables optimization Carrier wave triple frequency
在线阅读 下载PDF
Carrier frequency and symbol rate estimation based on cyclic spectrum 被引量:5
10
作者 CAO Sisi ZHANG Weiyan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期37-44,共8页
Carrier frequency and symbol rate estimation are the main contents of parameter estimation,which is the basis of modulation recognition and further processing of signals especially in non-cooperative communication.Wit... Carrier frequency and symbol rate estimation are the main contents of parameter estimation,which is the basis of modulation recognition and further processing of signals especially in non-cooperative communication.With the development of wireless communication,the signal transmission environment has become increasingly bad,causing more difficulties in parameter estimation.It is well known that the signal cycle spectrum is robust to noises and signal parameters are closely related.In practice,it is impossible to calculate the cyclic spectrum of infinite length data signals.When using finite length data to obtain a cycle spectrum,the truncation noise is induced,resulting in interference.It is necessary to overcome the influence of noises in order to improve the detection ability of discrete spectral lines.An improved method of the discrete spectral line extraction algorithm is proposed by reflecting the amplitude advantage of discrete spectral lines through salient features of continuous noises in discrete spectral line neighborhood. 展开更多
关键词 digital modulation signal carrier frequency symbol rate cyclic spectrum noise control
在线阅读 下载PDF
An improved algorithm for weighting keywords in web documents 被引量:1
11
作者 孙双 贺樑 +1 位作者 杨静 顾君忠 《Journal of Shanghai University(English Edition)》 CAS 2008年第3期235-239,共5页
In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of t... In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of the TF*IDF, TFC and ITC algorithms in order to make it more appropriate for web documents. Meanwhile, the presented algorithm is applied to improved vector space model (IVSM). A real system has been implemented for calculating semantic similarities of web documents. Four experiments have been carried out. They are keyword weight calculation, feature item selection, semantic similarity calculation, and WKWA time performance. The results demonstrate accuracy of keyword weight, and semantic similarity is improved. 展开更多
关键词 improved vector space model (IVSM) representation feature feature item keyword weight semantic similarity
在线阅读 下载PDF
IMHD-ST: an Algorithm for 3-Dimensional Spatial-Temporal Trajectory Matching 被引量:1
12
作者 Shao Fei Gu Junzhong 《China Communications》 SCIE CSCD 2010年第6期128-140,共13页
With the development of mobile technology, Internet and GIS, LBS plays an important role in various applications. From the perspective of LBS, it is one of the main tasks of matching 3-dimensional spatial-temporal tra... With the development of mobile technology, Internet and GIS, LBS plays an important role in various applications. From the perspective of LBS, it is one of the main tasks of matching 3-dimensional spatial-temporal trajectories. We present an interpoiation based Modified Hausdorff Distance algorithm for 3-dimensional spatial-temporal Trajectory Matching (IMHD-ST). It adopts interpolation algorithm to shield the impact to the distance between trajectories due to different position updating porices, sampling granularity, initial position and so on in Moving Object Database (MOD). Besides, it uses MHD to deal with the implicit spatial information and structural information of weighted position updating points in various trajectories and reflects the discrepancy of moving results through the spatial distance between trajectories. In addition, it adopts temporal distance corresponding to the spatial distance between trajectories to reflect the differences including direction, speed and so on during moving process. The experimental results show that the algorithrn can reflect the trajectory similarity between 3-dimensional mobile objects more correctly, accurately and robustly. 展开更多
关键词 Hausdorff distance moving object TRAJECTORY SIMILARITY
在线阅读 下载PDF
Feature Selection Method by Applying Parallel Collaborative Evolutionary Genetic Algorithm 被引量:1
13
作者 Hao-Dong Zhu Hong-Chan Li +1 位作者 Xiang-Hui Zhao Yong Zhong 《Journal of Electronic Science and Technology》 CAS 2010年第2期108-113,共6页
Feature selection is one of the important topics in text classification. However, most of existing feature selection methods are serial and inefficient to be applied to massive text data sets. In this case, a feature ... Feature selection is one of the important topics in text classification. However, most of existing feature selection methods are serial and inefficient to be applied to massive text data sets. In this case, a feature selection method based on parallel collaborative evolutionary genetic algorithm is presented. The presented method uses genetic algorithm to select feature subsets and takes advantage of parallel collaborative evolution to enhance time efficiency, so it can quickly acquire the feature subsets which are more representative. The experimental results show that, for accuracy ratio and recall ratio, the presented method is better than information gain, x2 statistics, and mutual information methods; the consumed time of the presented method with only one CPU is inferior to that of these three methods, but the presented method is supe rior after using the parallel strategy. 展开更多
关键词 Index Terms-Feature selection genetic algorithm parallel collaborative evolutionary text mining.
在线阅读 下载PDF
Fast Sentiment Analysis Algorithm Based on Double Model Fusion 被引量:1
14
作者 Zhixing Lin Like Wang +1 位作者 Xiaoli Cui Yongxiang Gu 《Computer Systems Science & Engineering》 SCIE EI 2021年第1期175-188,共14页
Nowadays,as the number of textual data is exponentially increasing,sentiment analysis has become one of the most significant tasks in natural language processing(NLP)with increasing attention.Traditional Chinese senti... Nowadays,as the number of textual data is exponentially increasing,sentiment analysis has become one of the most significant tasks in natural language processing(NLP)with increasing attention.Traditional Chinese sentiment analysis algorithms cannot make full use of the order information in context and are inefficient in sentiment inference.In this paper,we systematically reviewed the classic and representative works in sentiment analysis and proposed a simple but efficient optimization.First of all,FastText was trained to get the basic classification model,which can generate pre-trained word vectors as a by-product.Secondly,Bidirectional Long Short-Term Memory Network(Bi-LSTM)utilizes the generated word vectors for training and then merges with FastText to make comprehensive sentiment analysis.By combining FastText and Bi-LSTM,we have developed a new fast sentiment analysis,called FAST-BiLSTM,which consistently achieves a balance between performance and speed.In particular,experimental results based on the real datasets demonstrate that our algorithm can effectively judge sentiments of users’comments,and is superior to the traditional algorithm in time efficiency,accuracy,recall and F1 criteria. 展开更多
关键词 Sentiment analysis model fusion Bi-LSTM FastText
在线阅读 下载PDF
On Hardy-type integral inequalities
15
作者 冷拓 冯勇 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2013年第10期1297-1304,共8页
The Hardy integral inequality is one of the most important inequalities in analysis. The present paper establishes some new Copson-Pachpatte (C-P) type inequalities, which are the generalizations of the Hardy integr... The Hardy integral inequality is one of the most important inequalities in analysis. The present paper establishes some new Copson-Pachpatte (C-P) type inequalities, which are the generalizations of the Hardy integral inequalities on binary functions. 展开更多
关键词 Hardy inequality Holder inequality Copson inequality Izumi inequality Pachpatte inequality
在线阅读 下载PDF
Indian summer monsoon rainfall (ISMR) forecasting using time series data: A fuzzy-entropy-neuro based expert system
16
作者 Pritpal Singh 《Geoscience Frontiers》 SCIE CAS CSCD 2018年第4期1243-1257,共15页
This study presents a model to forecast the Indian summer monsoon rainfall(ISMR)(June-September)based on monthly and seasonal time scales. The ISMR time series data sets are classified into two parts for modeling ... This study presents a model to forecast the Indian summer monsoon rainfall(ISMR)(June-September)based on monthly and seasonal time scales. The ISMR time series data sets are classified into two parts for modeling purposes, viz.,(1) training data set(1871-1960), and(2) testing data set(1961-2014).Statistical analyzes reflect the dynamic nature of the ISMR, which couldn't be predicted efficiently by statistical and mathematical based models. Therefore, this study suggests the usage of three techniques,viz., fuzzy set, entropy and artificial neural network(ANN). Based on these techniques, a novel ISMR time series forecasting model is designed to deal with the dynamic nature of the ISMR. This model is verified and validated with training and testing data sets. Various statistical analyzes and comparison studies demonstrate the effectiveness of the proposed model. 展开更多
关键词 Indian summer monsoon rainfall(ISMR) Fuzzy set ENTROPY Artificial neural network(ANN) Forecasting
在线阅读 下载PDF
A novel approach to authenticated group key transfer protocol based on AG codes
17
作者 Yuan Dezhai Peng Xingyi +1 位作者 Liu Ting Cui Zhe 《High Technology Letters》 EI CAS 2019年第2期129-136,共8页
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to... Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security. 展开更多
关键词 group key transfer protocol erasure code AG codes non-repeatability CONFIDENTIALITY AUTHENTICATION
在线阅读 下载PDF
Dynamic Analogical Association Algorithm Based on Manifold Matching for Few-Shot Learning
18
作者 Yuncong Peng Xiaolin Qin +2 位作者 Qianlei Wang Boyi Fu Yongxiang Gu 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1233-1247,共15页
At present,deep learning has been well applied in many fields.However,due to the high complexity of hypothesis space,numerous training samples are usually required to ensure the reliability of minimizing experience ri... At present,deep learning has been well applied in many fields.However,due to the high complexity of hypothesis space,numerous training samples are usually required to ensure the reliability of minimizing experience risk.Therefore,training a classifier with a small number of training examples is a challenging task.From a biological point of view,based on the assumption that rich prior knowledge and analogical association should enable human beings to quickly distinguish novel things from a few or even one example,we proposed a dynamic analogical association algorithm to make the model use only a few labeled samples for classification.To be specific,the algorithm search for knowledge structures similar to existing tasks in prior knowledge based on manifold matching,and combine sampling distributions to generate offsets instead of two sample points,thereby ensuring high confidence and significant contribution to the classification.The comparative results on two common benchmark datasets substantiate the superiority of the proposed method compared to existing data generation approaches for few-shot learning,and the effectiveness of the algorithm has been proved through ablation experiments. 展开更多
关键词 Few-shot learning manifold matching analogical association data generation
在线阅读 下载PDF
A REVIEW AND PROSPECT OF READABLE MACHINE PROOFS FOR GEOMETRY THEOREMS 被引量:3
19
作者 Jianguo JIANG Jingzhong ZHANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第4期802-820,共19页
After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable ... After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable machine proofs for geometry theorems which include search methods, coordinate-free methods, and formal logic methods. Some critical issues about these approaches are also discussed. Furthermore, the authors propose three further research directions for the readable machine proofs for geometry theorems, including geometry inequalities, intelligent geometry softwares and machine learning. 展开更多
关键词 Automated geometry reasoning coordinate-free method formal logic method geometric inequality intelligent geometry software machine learning mechanical theorem proving readable machine proof search method.
原文传递
A class of mechanically decidable problems beyond Tarski's model 被引量:2
20
作者 Lu YANG Yong FENG Yong YAO 《Science China Mathematics》 SCIE 2007年第11期1611-1620,共10页
By means of dimension-decreasing method and cell-decomposition,a practical algorithm is proposed to decide the positivity of a certain class of symmetric polynomials,the numbers of whose elements are variable.This is ... By means of dimension-decreasing method and cell-decomposition,a practical algorithm is proposed to decide the positivity of a certain class of symmetric polynomials,the numbers of whose elements are variable.This is a class of mechanically decidable problems beyond Tarski model.To implement the algorithm,a program nprove written in maple is developed which can decide the positivity of these polynomials rapidly. 展开更多
关键词 symmetric polynomial inequality cell-decomposition Tarski's sentence Tarski's model mechanically decidable problem
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部