11 results on '"Xiping He"'
Search Results
2. Broad Learning Model Based on Enhanced Features Learning
- Author
-
Qingmei Zhou and Xiping He
- Subjects
Computer Science::Machine Learning ,General Computer Science ,business.industry ,Computer science ,Deep learning ,improved model ,Perspective (graphical) ,General Engineering ,small samples ,Machine learning ,computer.software_genre ,enhanced features ,mapped features ,General Materials Science ,Broad learning model ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,Feature learning ,lcsh:TK1-9971 ,Network model - Abstract
With the continuous development of deep learning, its drawbacks are also beginning to appear. As an alternative to deep learning, broad learning is emerging. However, the level of broad learning model is shallow, so feature learning is not sufficient. In order to solve two problems of small samples whose dimensions are not very high in network model training, it cannot be adequately trained in the deep learning model and the features of input data cannot be fully learned in the broad learning model. This paper attempts to add a hidden layer on the enhancement nodes of the broad learning model and do shallow learning for the enhanced features to learn the hierarchical features again. This improved broad learning model also provides a new idea for solving the problem of small samples. From the perspective of regression and classification, this paper proves that for small samples whose dimensions are not very high, the effect of the improved broad learning model is better than that of the original broad learning model and also proves that the improved broad learning model has a good ability of application. This shows that the broad learning model based on enhanced features learning has the necessity and feasibility of further research.
- Published
- 2019
3. More General QAM Complementary Sequences
- Author
-
Fanxin Zeng, Xiping He, Sheng Lu, Guixin Xuan, Yanni Peng, Zhenyu Zhang, Guojun Li, and Li Yan
- Subjects
QAM ,Complementary sequences ,Computer science ,Applied Mathematics ,Signal Processing ,Peak envelope power ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,02 engineering and technology ,Electrical and Electronic Engineering ,Computer Graphics and Computer-Aided Design ,Algorithm - Published
- 2018
- Full Text
- View/download PDF
4. Finger-vein image quality evaluation based on the representation of grayscale and binary image
- Author
-
Huafeng Qin, Xiping He, and Ziran Chen
- Subjects
Biometrics ,Computer Networks and Communications ,Computer science ,Image quality ,media_common.quotation_subject ,0211 other engineering and technologies ,02 engineering and technology ,Grayscale ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Quality (business) ,Computer vision ,Reliability (statistics) ,media_common ,021110 strategic, defence & security studies ,Radon transform ,business.industry ,Binary image ,body regions ,Hardware and Architecture ,cardiovascular system ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Software - Abstract
In this paper, we propose a novel quality assessment of finger-vein images for quality control in the enrollment and authentication of a finger-vein verification system. First, a Radon transform based model is employed to assess the quality of a finger-vein grayscale image. Second, to assess the quality of a finger-vein binary image, we further proposed three evaluation functions to measure the connectivity, smoothness and reliability of the binary version of the finger-vein image. Finally, the scores from the finer-vein binary images are fused with these from finger-vein grayscale images to improve the performance. Experimental results show that our approach can effectively identify the low quality finger-vein images, which is also helpful in improving the performance of the finger-vein verification system. We also show that instead of choosing the images with the highest quality as the enrollment templates, using the templates with the mid-range quality would achieve better performance with respect to improvement of varication accuracy.
- Published
- 2017
- Full Text
- View/download PDF
5. An approach for monitoring sand mining based on sound feature
- Author
-
Xiping He and Qingmei Zhou
- Subjects
Sand mining ,geography ,geography.geographical_feature_category ,business.industry ,Computer science ,Feature (computer vision) ,Pattern recognition ,Artificial intelligence ,business ,Sound (geography) - Abstract
In order to strengthen the management of sand excavation in river courses and prevent the occurrence of illegal sand mining activities, this paper proposes an approach for monitoring sand mining based on sound. Firstly, Mel Frequency Cepstral Coefficients (MFCCs) abstractor and Autoencoder are combined to extract features of every frame of a sound sequence, and then each frame of the sound sequence is classified by a specific classifier. Finally a voting strategy is used among the frames to determine the final category of the sound sequence. Experiments show that whether the classifier is SVM, KNN, or BP neural network, the result of combined features is better than the result of features extracted by the MFCC abstractor. Therefore, it is feasible to use the artificial intelligence method based on sound features extracted through MFCC abstractor and Autoencoder to monitor sand mining.
- Published
- 2020
- Full Text
- View/download PDF
6. Finger-Vein Verification Based on Multi-Features Fusion
- Author
-
Lan Qin, Huafeng Qin, Xiping He, Lian Xue, Chengbo Yu, and Xinyuan Liang
- Subjects
Scheme (programming language) ,Support Vector Machine ,Databases, Factual ,Biometrics ,Matching (graph theory) ,ComputingMethodologies_SIMULATIONANDMODELING ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-invariant feature transform ,orientation encoding ,finger-vein ,personal identification ,scale invariant feature transform ,multi-features fusion ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,Fingers ,Image Processing, Computer-Assisted ,Humans ,lcsh:TP1-1185 ,Computer vision ,Electrical and Electronic Engineering ,Instrumentation ,computer.programming_language ,Fusion ,Orientation (computer vision) ,business.industry ,Pattern recognition ,Atomic and Molecular Physics, and Optics ,Support vector machine ,Identification (information) ,ROC Curve ,Biometric Identification ,Artificial intelligence ,business ,computer - Abstract
This paper presents a new scheme to improve the performance of finger-vein identification systems. Firstly, a vein pattern extraction method to extract the finger-vein shape and orientation features is proposed. Secondly, to accommodate the potential local and global variations at the same time, a region-based matching scheme is investigated by employing the Scale Invariant Feature Transform (SIFT) matching method. Finally, the finger-vein shape, orientation and SIFT features are combined to further enhance the performance. The experimental results on databases of 426 and 170 fingers demonstrate the consistent superiority of the proposed approach.
- Published
- 2013
- Full Text
- View/download PDF
7. Image Encryption Based on Chaotic Modulation of Wavelet Coefficients
- Author
-
Xiping He and Qionghua Zhang
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Chaotic ,Wavelet transform ,Cryptography ,Image processing ,computer.file_format ,Encryption ,Wavelet ,Computer Science::Multimedia ,JPEG 2000 ,Codec ,Computer vision ,Artificial intelligence ,business ,computer ,Algorithm ,Computer Science::Cryptography and Security - Abstract
This paper is aimed at the image encryption scheme applicable to JPEG2000 codec. Firstly, two chaotic maps are suggested and their statistic characteristics are also analyzed. Secondly, to accomplish a controllable visual effect of encrypted image, a visual quality control model is presented, and on the basis of which, a chaotic image encryption scheme is constructed by chaotically modulating the randomly selected approximate coefficients at the coarsest level in wavelet domain. Then, the security and efficiency of the algorithm are analyzed. Finally, the experiment results illustrate that the proposed algorithms are credible, secure, efficient, and practical for JPSEC.
- Published
- 2008
- Full Text
- View/download PDF
8. Image denoising and comparison by improving threshold based on the dyadic wavelet transform
- Author
-
Xiping He, Li Xia, Bin Fang, and Zheng-Hong Huang
- Subjects
Discrete wavelet transform ,Computer science ,business.industry ,Stationary wavelet transform ,Second-generation wavelet transform ,Wavelet transform ,Pattern recognition ,Non-local means ,Wavelet packet decomposition ,Wavelet ,Computer Science::Computer Vision and Pattern Recognition ,Computer vision ,Video denoising ,Artificial intelligence ,business - Abstract
Based on the characteristic of dyadic wavelet transform to image denoising , this paper presents that denoising precision can be improved by the way that adopting different thresholds according to the different scales of the wavelet coefficients of image and noise to establish the self-adjusted layered threshold function which adapts to it and reconstruct the wavelet. The experiment shows that by the method above the effect of image denoising is obviously superior to that of fixed threshold.
- Published
- 2007
- Full Text
- View/download PDF
9. Concept Based Text Classification Using Labeled and Unlabeled Data
- Author
-
Ping Gu, Qingsheng Zhu, and Xiping He
- Subjects
Boosting (machine learning) ,Ensemble forecasting ,business.industry ,Computer science ,Supervised learning ,Pattern recognition ,Document clustering ,Ontology (information science) ,Machine learning ,computer.software_genre ,Naive Bayes classifier ,Bayes' theorem ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial intelligence ,business ,computer ,Natural language - Abstract
Recent work has shown improvements in text clustering and classification by integrating conceptual features extracted from background knowledge. In this paper we address the problem of text classification with labeled data and unlabeled data. We propose a Latent Bayes Ensemble model based on word-concept mapping and transductive boosting method. With the knowledge extracted from ontologies, we hope to improve the classification accuracy even with large amounts of unlabeled documents. We conducted several experiments on two well-known corpora and the results are compared with Naive Bayes and TSVM classifiers.
- Published
- 2006
- Full Text
- View/download PDF
10. A NEURAL NETWORK-BASED COLOR DOCUMENT SEGMENTATION APPROACH
- Author
-
Qingsheng Zhu, Yunfeng Li, and Xiping He
- Subjects
Document segmentation ,Artificial neural network ,business.industry ,Segmentation-based object categorization ,Computer science ,Scale-space segmentation ,Pattern recognition ,Artificial intelligence ,Image segmentation ,business - Published
- 2005
- Full Text
- View/download PDF
11. A New Chaos-Based Encryption Method for Color Image.
- Author
-
Guoying Wang, Peters, James F., Skowron, Andrzej, Yiyu Yao, Xiping He, Qingsheng Zhu, and Ping Gu
- Abstract
The methods of conventional encryption cannot be applicable to images for the resistance to statistic attack, differential attack and grey code attack. In this paper, the confusion is improved in terms of chaotic permutation with ergodic matrix, and the diffusion is implemented through a new chaotic dynamic system incorporated with a S-box algebraic operation and a 'XOR plus mod' operation, which greatly enhances the practical security of the system with a little computational expense, and a key scheme is also proposed. Experimental and theoretical results also show that our scheme is efficient and very secure. Keywords: Chaotic map,ergodic matrix,S-box, confusion, diffusion, attack, encryption. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.