计算机应用最新文献

筛选
英文 中文
Oil adulteration detection with multi-label learning vector quantization: Oil adulteration detection with multi-label learning vector quantization 基于多标签学习向量量化的油掺假检测:基于多标签学习向量量化的油掺假检测
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03141
Jingbo Chen
{"title":"Oil adulteration detection with multi-label learning vector quantization: Oil adulteration detection with multi-label learning vector quantization","authors":"Jingbo Chen","doi":"10.3724/SP.J.1087.2013.03141","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03141","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3141-3143"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best viewpoints selection based on feature points detection: Best viewpoints selection based on feature points detection 基于特征点检测的最佳视点选择:基于特征点检测的最佳视点选择
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03172
Fan Zhu, Fenglei Yang
{"title":"Best viewpoints selection based on feature points detection: Best viewpoints selection based on feature points detection","authors":"Fan Zhu, Fenglei Yang","doi":"10.3724/SP.J.1087.2013.03172","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03172","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3172-3175"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved ant colony genetic optimization algorithm and its application: Improved ant colony genetic optimization algorithm and its application 改进蚁群遗传优化算法及其应用:改进蚁群遗传优化算法及其应用
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03111
Chuan-hui Liu
{"title":"Improved ant colony genetic optimization algorithm and its application: Improved ant colony genetic optimization algorithm and its application","authors":"Chuan-hui Liu","doi":"10.3724/SP.J.1087.2013.03111","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03111","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"42 1","pages":"3111-3113"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69944947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single instruction multiple data vectorization of non-normalized loops: Single instruction multiple data vectorization of non-normalized loops 非归一化循环的单指令多数据向量化:非归一化循环的单指令多数据向量化
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03149
Y. Hou, Rongcai Zhao, Wei Gao
{"title":"Single instruction multiple data vectorization of non-normalized loops: Single instruction multiple data vectorization of non-normalized loops","authors":"Y. Hou, Rongcai Zhao, Wei Gao","doi":"10.3724/SP.J.1087.2013.03149","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03149","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"6 1","pages":"3149-3154"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of encrypted function in malicious software: Identification of encrypted function in malicious software 恶意软件加密功能识别:恶意软件加密功能识别
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03239
Jia Cai, Qiang Wei, Yuefei Zhu
{"title":"Identification of encrypted function in malicious software: Identification of encrypted function in malicious software","authors":"Jia Cai, Qiang Wei, Yuefei Zhu","doi":"10.3724/SP.J.1087.2013.03239","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03239","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3239-3243"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-scale analysis for remote sensing target recognition 遥感目标识别的多尺度分析
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03190
Bo Shukui, Jing Yong-ju
{"title":"Multi-scale analysis for remote sensing target recognition","authors":"Bo Shukui, Jing Yong-ju","doi":"10.3724/SP.J.1087.2013.03190","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03190","url":null,"abstract":"To solve the problem that the features of a target change with the image resolution in target recognition, a multi-scale analysis of target recognition was provided in this paper. First, the multi-scale features of a target were analyzed based on mixed pixels in multi-resolution images. At different scale, the features of a target had different behaviors that were related to the proportion of mixed pixels in the target. Second, the structural differences of the target were analyzed and illustrated from the experiments of multi-scale target recognition. Last, the concept of \"dominating class\" was proposed based on the multi-scale analysis. The experimental results show that the shape and structural features change with scale of the image and large scale leads big change. This paper studies the target features from multi-scale images and provides guidance on image target recognition.","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3190-3192"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Bayesian learning for credit risk evaluation: Sparse Bayesian learning for credit risk evaluation 用于信用风险评估的稀疏贝叶斯学习:用于信用风险评估的稀疏贝叶斯学习
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03094
Taiyong Li, Huijun Wang, Jiang Wu, Zhiling Zhang, Changjie Tang
{"title":"Sparse Bayesian learning for credit risk evaluation: Sparse Bayesian learning for credit risk evaluation","authors":"Taiyong Li, Huijun Wang, Jiang Wu, Zhiling Zhang, Changjie Tang","doi":"10.3724/SP.J.1087.2013.03094","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03094","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3094-3096"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69944537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding: Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding 基于正交和不相关边缘邻域保持嵌入的人脸识别:基于正交和不相关边缘邻域保持嵌入的人脸识别
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03097
Dayao Chen, Xiuhong Chen
{"title":"Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding: Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding","authors":"Dayao Chen, Xiuhong Chen","doi":"10.3724/SP.J.1087.2013.03097","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03097","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3097-3101"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69944574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Further study on algebraic structure of RSA algorithm: Further study on algebraic structure of RSA algorithm RSA算法代数结构的进一步研究:RSA算法代数结构的进一步研究
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03244
Donglin Pei, Xu Li
{"title":"Further study on algebraic structure of RSA algorithm: Further study on algebraic structure of RSA algorithm","authors":"Donglin Pei, Xu Li","doi":"10.3724/SP.J.1087.2013.03244","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03244","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3244-3246"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69946003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultrasound image anisotropic diffusion de-speckling method based on Mallat-Zhong discrete wavelet transform wavelet 基于Mallat-Zhong离散小波变换的超声图像各向异性扩散去斑方法
计算机应用 Pub Date : 2013-11-26 DOI: 10.3724/SP.J.1087.2013.03201
Wu Shibin, Chen Bo, D. Wangli, G. Xiaoming
{"title":"Ultrasound image anisotropic diffusion de-speckling method based on Mallat-Zhong discrete wavelet transform wavelet","authors":"Wu Shibin, Chen Bo, D. Wangli, G. Xiaoming","doi":"10.3724/SP.J.1087.2013.03201","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03201","url":null,"abstract":"In view of speckle noise in ultrasound image, there are some disadvantages of traditional anisotropic diffusion methods, such as in-sufficient noise suppression and edge details preservation. A de-speckling method based on Mallat-Zhong Discrete Wavelet Transform( MZ-DWT) wavelet was proposed. The method used MZ-DWT wavelet and Expectation Maximization( EM) algorithm as the discrimination factor between homogeneous and edge regions, making it more accurately to control diffusion intensity and rate and achieving the noise suppression and details preservation. The experimental results show that, the proposed algorithm can better de-speckle while preserving image details and the performance of the method is better than the traditional anisotropic diffusion methods.","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3201-3203"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69946011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信