首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
决明子指纹图谱数据库的实现与应用   总被引:2,自引:0,他引:2  
利用Microsoft Visual Foxpro 6.0软件开发出决明子指纹图谱数据库,以存储和管理指纹图谱数据,并利用数学方法对指纹数据分析处理.该数据库针对中药复杂组分的分析、鉴定,建立相似度评价系统,具备数据录入、参数设置、指纹图谱集及标准指纹谱的动态生成、差异率表及相似度检验、相似度评价统计图及报表、数据备份与数据输出等功能,实现了数据的标准化和动态更新.系统采用面向对象的设计方法作为开发工具,系统界面清晰,操作简便.实践证明,应用数据库跟踪和控制决明子的质量有效,并可在其它中药质量控制领域应用.  相似文献   

2.
建立了10种药血竭的红外光谱、荧光光谱指纹图谱,并把图谱信息进行数据化及数据标准化处理;利用相关系数定量地对10种血竭的光谱指纹图谱进行了相似性评价;在此基础上用系统聚类分析法定性地对这10种样品进行了分类和鉴别,从而建立了一种基于中药血竭光谱指纹图谱的模式识别方法。为中药血竭的质量评价和分类鉴别提供了一个很好的方法和思路。  相似文献   

3.
基于数据预处理的板蓝根注射液指纹图谱模式识别   总被引:1,自引:0,他引:1  
中药色谱指纹图谱具有成分复杂、图谱基线和成分保留时间易受外界因素干扰等特点.本文对获得的色谱指纹图谱进行基线校正和色谱峰保留时间校正的数据预处理,不需色谱峰的积分,直接用各色谱信号的全谱数据评价相似度、主成分投影分析和谱系聚类分析,将各厂家的注射液样本正确分类并检出其中的异常样本,为处理和评价中药色谱指纹图谱数据,提供客观、便捷的方法.  相似文献   

4.
基于主灵敏度矢量回归评价中药色谱指纹图谱   总被引:2,自引:2,他引:0  
基于主灵敏度矢量稳健主成分回归(RPPSV)和蒙特卡罗交互检验(MCCV)方法对29个不同来源的银杏提取物和33个不同产地的灯盏花提取物的色谱指纹图谱进行质量评价,分别定性判断出银杏样本数据集中的7个异常样本和灯盏花样本数据集中的4个异常洋本。与相关系数法相比,RPPSV具有更好的异常样本检测能力,但是两者评价指纹图谱的结果基本是一致的。  相似文献   

5.
鱼腥草注射液指纹图谱数据库系统的实现与应用   总被引:2,自引:0,他引:2  
建立中药色谱指纹图谱的目的在于全面反映中药所含内在化学和生物成分的种类与数量,考虑到如何全面完整地利用指纹图谱的信息来为中药质量控制提供依据,提出采用数据库来存储和管理指纹图谱数据,并利用化学计量学中的数据预处理手段和模式分析等方法对指纹数据进行分析处理。本文讨论了利用MATLAB开放式可扩充体系结构,开发出鱼腥草注射液指纹图谱数据库系统的构想和设计思想,实现数据的标准化和动态更新、标准指纹谱的动态生成、相似度检验、化学模式分析、特征物质峰的查找等功能。该数据库具有操作简便,界面友好、功能强大等特点。实践证明,通过该数据有系统的应用可以有效跟踪产品质量,可广泛应用于鱼腥草注射液的质量控制。  相似文献   

6.
利用指纹图谱相似度评价中药质量时,色谱指纹图谱样本的数量有限。小样本条件下指纹图谱相似度值的分布难以满足正态分布或近似正态分布,不适合直接利用传统的区间估计方法来确定相似度的阈值。本文利用Bootstrap方法扩增样本,建立了小样本条件下的指纹图谱相似度阈值确定方法,并通过3个具体实例说明指纹图谱相似度阈值确定的具体过程。首先通过Bootstrap方法扩增样本,然后利用单侧区间估计方法确定相似度下限,得到相似度的阈值。以上3个实例说明了用该方法建立中药指纹图谱相似度阈值的合理性和可行性。此方法适用于由不同相似度计算方法所得相似度值。本文从理论、技术和应用的角度阐述了确定中药指纹图谱相似度阈值的方法,该方法将对指纹图谱技术的推广应用产生积极作用。  相似文献   

7.
一种新的计算中药指纹图谱相似度方法与实现   总被引:2,自引:0,他引:2  
提出和实现了一种新的计算中药指纹图谱相似度的方法;算法在对中药指纹图谱全谱计算夹角余弦系数的基础上,对指纹图谱的特征峰计算共有峰的折线重合率,经过加权重计算而得到更为准确的指纹图谱相似度值;文中提出的方法具有兼顾全局匹配和局部比较的优点,在算法实现具有简单易于编程的特点,而且计算结果更加接近实际情况,因而具有很强的实用性;最后对三组田基黄中药样本的指纹图谱原始信号和校正后的信号采用文中方法计算相似度,实验结果表明了该方法的可行性和优越性.  相似文献   

8.
为了解决复杂体系分析、仪器分析大数据挖掘,以及跨仪器平台数据整合等分析化学各分支领域中的复杂应用问题,设计开发了ChemPattern一站式化学计量学分析软件系统。通过标准数据接口技术实现了可用于色谱、质谱、光谱和核磁共振波谱所获得的各类高维、高分辨海量数据的信号处理分系统,包括LC-HRMS解卷积、分子特征匹配、DART-MS指纹图谱、色谱峰保留时间校正及共有模式建模等功能。并基于高性能并行计算和大规模数据可视化技术,提供对多元统计、校正模型、模式识别及人工智能等众多化学计量学应用的支持。最后,对分析系统的可靠性进行了验证。该系统已成功用于中药指纹图谱、食品安全快速筛查及代谢组学等分析领域并取得了较传统定性、定量方法更为全面和灵敏的分析结果,具有较好的应用前景。  相似文献   

9.
化学计量学在秦艽指纹图谱最佳检测波长选择中的应用   总被引:1,自引:1,他引:0  
目的:确定中药秦艽HPLC指纹图谱最佳的检测波长。方法:借助于化学计量学信息的提取与处理,建立色谱峰数目、相对峰面积之和以及平均分离度的经验参数CE,以衡量色谱分离的质量,并与色谱峰面积、保留时间与理论塔板数的信息进行比较。结果:两个指标均能如实反映不同检测条件下,秦艽化学特征指纹图谱的分离质量。结论:新建参数CE可客观评价同一检测条件、不同检测波长下,得到中药化学特征指纹图谱的分离质量。  相似文献   

10.
利用傅里叶变换红外光谱,测定了35个来自青海省不同产地的枸杞样品的红外光谱。常规和小波变换的方法对红外光谱原始数据进行了预处理。对不同产地枸杞药材进行红外光谱指纹鉴别,并以质量最好的S1样品作为参考,建立枸杞的对照红外指纹图谱,采用相关系数法和夹角余弦法计算样品红外指纹图谱与对照指纹图谱的相似度。7批样品中,质量较好的红外指纹图谱与对照指纹图谱的相似度(夹角余弦法)均在0.99以上,其它的相似度均在0.99以下。进一步,聚类分析将7份样品聚为枸杞主产地与非主产地两大类及枸杞制品类,验证了相似度分析的结果。不同产地枸杞的红外指纹图谱可以用于药材的质量评价,其相似度值的大小可作为枸杞药材产地鉴别和质量评价。  相似文献   

11.
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is still an open problem. Extracting features out of poor quality prints is the most challenging problem faced in this area. This paper introduces a new approach for fingerprint enhancement based on short time Fourier transform (STFT) Analysis. STFT is a well-known technique in signal processing to analyze non-stationary signals. Here we extend its application to 2D fingerprint images. The algorithm simultaneously estimates all the intrinsic properties of the fingerprints such as the foreground region mask, local ridge orientation and local ridge frequency. Furthermore we propose a probabilistic approach of robustly estimating these parameters. We experimentally compare the proposed approach to other filtering approaches in literature and show that our technique performs favorably.  相似文献   

12.
A comprehensive metrics validation methodology is proposed that has six validity criteria, which support the quality functions assessment, control, and prediction, where quality functions are activities conducted by software organizations for the purpose of achieving project quality goals. Six criteria are defined and illustrated: association, consistency, discriminative power, tracking, predictability, and repeatability. The author shows that nonparametric statistical methods such as contingency tables play an important role in evaluating metrics against the validity criteria. Examples emphasizing the discriminative power validity criterion are presented. A metrics validation process is defined that integrates quality factors, metrics, and quality functions  相似文献   

13.
A system has been developed that can simulate human print quality assessments for simple prints. It consists of an image analysis system and a neural network trained in differentiating between different quality prints. Humans were used to assess the print quality of a series of images of different tones, produced by a variety of printing processes. An image analysis system was employed to collect and pre-process raw image data from the prints. A neural network employing supervised learning was then used to produce computer models of the assessments. The image analysis system and neural network models were subsequently employed to predict the observer assessments for a further set of prints that had not undergone the supervised learning procedure. In the prediction trial, the system correctly classified 23 out of 24 prints.  相似文献   

14.
学生评估教师教学质量系统的设计与研究   总被引:1,自引:0,他引:1  
通过分析学生评估教师教学质量的现状,收集本校各单位的材料,综合各方面的要求和意见,采用当前流行的.NET技术,开发了基于B/S和C/S模式的学生评估教师教学质量系统,着重介绍了系统的设计方案、设计方法和技巧,以及系统的功能和特点等。  相似文献   

15.
The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Several cases of fingerprint obfuscation have been reported in the press. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly. The main contributions of this paper are: 1) compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing AFIS, 2) investigating the impact of fingerprint alteration on the accuracy of a commercial fingerprint matcher, 3) classifying the alterations into three major categories and suggesting possible countermeasures, 4) developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae distribution, and 5) evaluating the proposed technique and the NFIQ algorithm on a large database of altered fingerprints provided by a law enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need to further pursue this problem.  相似文献   

16.
This paper presents a new fingerprint singular point detection method that is type-distinguishable and applicable to various fingerprint images regardless of their resolutions. The proposed method detects singular points by analyzing the shapes of the local directional fields of a fingerprint image. Using the predefined rules, all types of singular points (upper core, lower core, and delta points) can be extracted accurately and delineated in terms of the type of singular points. In case of arch-type fingerprints there exists no singular point, but reference points for arch-type fingerprints are required to be detected for registration. Therefore, we propose a new reference point detection method for arch-type fingerprints as well. The result of the experiments on the two public databases (FVC2000 2a, FVC2002 2a) with different resolutions demonstrates that the proposed method has high accuracy in locating each types of singular points and detecting the reference points of arch-type fingerprints without regard to their image resolutions.  相似文献   

17.
Weaver  A.C. 《Computer》2006,39(2):96-97
In this age of digital impersonation, biometric techniques are being used increasingly as a hedge against identity theft. The premise is that a biometric - a measurable physical characteristic or behavioral trait - is a more reliable indicator of identity than legacy systems such as passwords and PINs. There are three general ways to identify yourself to a computer system, based on what you know, what you have, or who you are. Biometrics belong to the "who you are" class and can be subdivided into behavioral and physiological approaches. Behavioral approaches include signature recognition, voice recognition, keystroke dynamics, and gait analysis. Physiological approaches include fingerprints; iris and retina scans; hand, finger, face, and ear geometry; hand vein and nail bed recognition; DNA; and palm prints. In this article, we focus on the two most popular biometric techniques: fingerprints and iris scans.  相似文献   

18.
针对模糊C-均值聚类算法对初始化分类参数的选择比较敏感而导致分类结果差异性较大的不足,提出了基于互包含度的有效性函数进行数据分类效果好坏的评价。实验结果表明,本文定义的分类效果评价方法是可行的。  相似文献   

19.
Formal specification methods are being used to improve the quality of written specifications and to eliminate errors at an early stage of software development. The detection of errors in a specification generally requires that the specification be compared against some loosely defined real-world concepts. A criterion for evaluating the quality of a model-oriented specifications is introduced and the problems associated with specifications which do not meet this criterion are explained. These problems are particularly troublesome when reusable software components are being specified or when a bottom-up implementation strategy is being used  相似文献   

20.
针对模糊C-均值聚类算法对初始化分类参数的选择比较敏感而导致分类结果差异性较大的不足,提出基于模糊C-均值聚类目标函数相对权重系数的偏导函数进行数据分类效果好坏的评价。实验结果表明,该文定义的分类效果评价方法是可行的。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号