Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Adjusted cluster assumption and pairwise constraints jointly based semi-supervised classification method
HUANG Hua, ZHENG Jiamin, QIAN Pengjiang
Journal of Computer Applications    2018, 38 (11): 3119-3126.   DOI: 10.11772/j.issn.1001-9081.2018041220
Abstract384)      PDF (1174KB)(448)       Save
When samples from different classes over classification boundary are seriously overlapped, cluster assumption may not well reflect the real data distribution, so that semi-supervised classification methods based cluster assumption may yield even worse performance than their supervised counterparts. For the above unsafe semi-supervised classification problem, an Adjusted Cluster Assumption and Pairwise Constraints Jointly based Semi-Supervised Support Vector Machine classification method (ACA-JPC-S3VM) was proposed. On the one hand, the distances of individual unlabeled instances to the distribution boundary were considered in learning, which alleviated the degradation of the algorithm performance in such cases to some extent. On the other hand, the information of pairwise constraints was introduced to the algorithm to make up for its insufficient use of supervision information. The experimental results on the UCI dataset show that the performance of ACA-JPC-S3VM method would never be lower than that of SVM (Support Vector Machine), and the average accuracy is 5 percentage points higher than that of SVM when the number of labeled samples is 10. The experimental results on the image classification dataset show that the semi-supervised classification methods such as TSVM (Transductive SVM) have different degrees of unsafety learning (similar or worse performance than SVM) while ACA-JPC-S3VM can learn safely. Therefore, ACA-JPC-S3VM has better safety and correctness.
Reference | Related Articles | Metrics
Speech endpoint detection based on critical band and energy entropy
ZHANG Ting HE Ling HUANG Hua LIU Xiaoheng
Journal of Computer Applications    2013, 33 (01): 175-178.   DOI: 10.3724/SP.J.1087.2013.00175
Abstract838)      PDF (605KB)(574)       Save
The accuracy of the speech endpoint detection has a direct impact on the precision of speech recognition, synthesis, enhancement, etc. To improve the effectiveness of speech endpoint detection, an algorithm based on critical band and energy entropy was proposed. It took full advantage of the frequency distribution of human auditory characteristics, and divided the speech signals according to critical bands. Combined with the different distribution of energy entropy of each critical band of the signals respectively in the speech segments and noise segments, speech endpoint detection under different background noises was completed. The experimental results indicate that the average accuracy of the newly proposed algorithm is 1.6% higher than the traditional short-time energy algorithm. The proposed method can achieve the detection of speech endpoint under various noise environment of low Signal to Noise Ratio (SNR).
Reference | Related Articles | Metrics
Hybrid artificial fish swarm algorithm for global optimization problems
HUANG Hua-Juan Yong-quan ZHOU
Journal of Computer Applications   
Abstract1585)      PDF (625KB)(909)       Save
Based on the Powell algorithm and Adaptive Artificial Fish Swarm Algorithm (AAFSA), a hybrid artificial fish swarm algorithm (AAFSA-Powell) for global optimization problems was presented by inserting Powell algorithm into AAFSA. As a local search operator, Powell algorithm has strong local search ability, whereas artificial fish swarm algorithm has global convergence. Therefore, the hybrid algorithm is capable of improving the global search ability of the algorithm, as well as reducing the computational burden. The numerical experimental results show that the algorithm can converge quickly with high adjustment.
Related Articles | Metrics
Text zero-watermarking algorithm based on chaotic mapping
CHENG Yu-zhu,SUN Xing-ming,HUANG Hua-jun
Journal of Computer Applications    2005, 25 (12): 2753-2754.  
Abstract1723)      PDF (690KB)(1476)       Save
A novel text zero-watermarking algorithm based on chaotic mapping was brought forward.The features of presented method are as follows: First,there are no modifications to the text document among the process of watermarking embedding,thus the watermarking is perceptually invisible.Second,the watermarking is robust against copying,cutting and formatted modifying.Third,the watermarking can be detected only by using a secret key and doesn’t need the original text.
Related Articles | Metrics