Search

Your search keyword '"IMAGE processing"' showing total 930 results
930 results on '"IMAGE processing"'

Search Results

1. Knowledge Graphs.

2. Multi-granulation fuzzy rough sets based on overlap functions with a new approach to MAGDM.

3. Multi-granulation fuzzy rough sets based on overlap functions with a new approach to MAGDM.

4. A combination of large eddy simulation and physics-informed machine learning to predict pore-scale flow behaviours in fibrous porous media: A case study of transient flow passing through a surgical mask.

5. The role of image and video processing.

6. Salient detection via the fusion of background-based and multiscale frequency-domain features.

7. A New Approach to Descriptors Generation for Image Retrieval by Analyzing Activations of Deep Neural Network Layers.

8. Lightweight Deep Neural Network for Joint Learning of Underwater Object Detection and Color Conversion.

9. Characterizing Approximate Adders and Multipliers for Mitigating Aging and Temperature Degradations.

10. Deep locally linear embedding network.

11. Learning Deep Context-Sensitive Decomposition for Low-Light Image Enhancement.

12. PRODUCTS OF THE YEAR.

13. Distributivity characterization of idempotent uni-nullnorms and overlap or grouping functions.

14. A lightweight feature activation guided multi-receptive field attention network for light compensation.

15. SYEnet: Simple yet effective network for palmprint recognition.

16. Variable precision fuzzy rough sets based on overlap functions with application to tumor classification.

17. Halide: Decoupling Algorithms from Schedules for High-Performance Image Processing.

18. An Energy-Efficient Approximate Divider Based on Logarithmic Conversion and Piecewise Constant Approximation.

19. Approximate Multipliers Using Static Segmentation: Error Analysis and Improvements.

20. 2D eπ-map for image encryption.

21. A Class of Directional Zero-Phase 2D Filters Designed Using Analytical Approach.

22. A Mobile Platform for Movement Tracking Based on a Fast-Execution-Time Optical-Flow Algorithm.

23. Enabling technologies for image and video processing.

24. Small perturbations are enough: Adversarial attacks on time series prediction.

25. Machine Learning for Structure Determination in Single-Particle Cryo-Electron Microscopy: A Systematic Review.

26. Hierarchical fuzzy inference based on Bandler-Kohout subproduct.

27. A new application of fractional derivatives for predicting human glioblastoma multiforme tumor growth.

28. Constructing overlap functions on bounded posets via multiplicative generators.

29. Quantum Image Clipping - Algorithms, Analysis, and Applications.

30. ICGNet: An intensity-controllable generation network based on covering learning for face attribute synthesis.

31. Robust weapon detection in dark environments using Yolov7-DarkVision.

32. On discrete quasi-overlap functions.

33. Leveraging Negative Capacitance CNTFETs for Image Processing: An Ultra-Efficient Ternary Image Edge Detection Hardware.

34. Neuro-inspired edge feature fusion using Choquet integrals.

35. Multi-objective evolutionary 3D face reconstruction based on improved encoder–decoder network.

36. Aggregation of fuzzy quasi-metrics.

37. Automated Design Approximation to Overcome Circuit Aging.

38. QHSL: A quantum hue, saturation, and lightness color model.

39. Accuracy-Configurable Radix-4 Adder With a Dynamic Output Modification Scheme.

40. Lattice-valued overlap and quasi-overlap functions.

41. Image robust adaptive steganography adapted to lossy channels in open social networks.

42. A Two-Stage Operand Trimming Approximate Logarithmic Multiplier.

43. Do Remote Camera Arrangements and Image Capture Settings Improve Individual Identification of Golden Eagles?

44. Watermarking Deep Neural Networks in Image Processing.

45. Convolution Engine: Balancing Efficiency and Flexibility in Specialized Computing.

46. Scene Understanding by Labeling Pixels.

47. Binary handwriting image enhancement by directional field-guided morphology.

48. Binary handwriting image enhancement by directional field-guided morphology.

49. An encrypted coverless information hiding method based on generative models.

50. Black-box adversarial attacks by manipulating image attributes.

Catalog

Books, media, physical & digital resources