[3] Jiang L H, Yang R Y. Identification technique for the intrusion of airport enclosure based on double Mach-Zehnder interferometer[J]. Journal of Computers, 7, 1453-1459(2012).
[6] Tian M. Research and implement of algorithms for the fiber perimeter security system based on dual Mach-Zehnder[D]. Tianjin: Tianjin University(2017).
[8] Yao J Y, Zhang S, Wang Z et al[J]. Investigation of fiber-optic Michelson interferometer system Study on Optical Communications, 2007, 45-48.
[10] Bachu R G, Kopparthi S, Adapa B et al. Separation of voiced and unvoiced using zero crossing rate and energy of the speech signal. [C]//American Society for Engineering Education (ASEE) Zone Conference Proceedings, March 28-29, 2008, West Point, NY, USA. New York: IEEE, 1-7(2008).
[11] Boser B E, Guyon I M, Vapnik V N. A training algorithm for optimal margin classifiers. [C]//Proceedings of the fifth annual workshop on Computational learning theory-COLT'92, July 27-29, 1992, Pittsburgh, Pennsylvania, USA. New York: ACM, 144-152(1992).
[12] Cortes C, Vapnik V. Support-vector networks[J]. Machine Learning, 20, 273-297(1995).
[13] Schiilkop P B, Burgest C, Vapnik V. Extracting support data for a given task. [C]//Proceedings of the First International Conference on Knowledge Discovery and Data Mining, August 20-21, 1995, Montreal, Canada. New York: Association for Computing Machinery, 252-257(1995).