Showing 2,841 - 2,860 results of 3,925 for search '(image OR images) processing algorithm', query time: 0.20s Refine Results
  1. 2841

    FPGA Programming Challenges When Estimating Power Spectral Density and Autocorrelation in Coherent Doppler Lidar Systems for Wind Sensing by Sameh Abdelazim, David Santoro, Fred Moshary

    Published 2025-02-01
    “…Both signal pre-processing algorithms are initially developed as logic designs and compiled using the Xilinx System Generator toolset to produce a hardware VLSI image. …”
    Get full text
    Article
  2. 2842

    A multi-layer Internet of things database schema for online-to-offline systems by Hongming Cai, Shuai Luan, Lihong Jiang, Nazaraf Shah, Ray Farmer, Kuo-Ming Chao, Boyi Xu

    Published 2016-08-01
    “…This leads to increased complexity in data storage and querying, especially for spatial–temporal data processing in online-to-offline systems. In this article, first, we design a multi-layer Internet of things database schema to meet the diverse requirements through fusing spatial data with texts, images, and videos transferred from the sensors of the Internet of things networks. …”
    Get full text
    Article
  3. 2843

    Design of an Automatic Defect Identification Method Based ECPT for Pneumatic Pressure Equipment by Bo Zhang, YuHua Cheng, Chun Yin, Xuegang Huang, Sara Dadras, Hadi Malek

    Published 2018-01-01
    “…Experimental results are provided to demonstrate the capabilities and benefits (i.e., reducing the processing time) of the proposed algorithm in automatic defect identification.…”
    Get full text
    Article
  4. 2844

    Breast lesion classification via colorized mammograms and transfer learning in a novel CAD framework by Abbas Ali Hussein, Morteza Valizadeh, Mehdi Chehel Amirani, Sedighe Mirbolouk

    Published 2025-07-01
    “…Abstract Medical imaging sciences and diagnostic techniques for Breast Cancer (BC) imaging have advanced tremendously, particularly with the use of mammography images; however, radiologists may still misinterpret medical images of the breast, resulting in limitations and flaws in the screening process. …”
    Get full text
    Article
  5. 2845

    An improved Harris corner detection method for honeycomb structures by Pengfei Zheng, Wilson Byiringiro, Weiwei Xie, Zhengkai Jiang, Can Cui, Yongjun Wu

    Published 2025-04-01
    “…Structural defects and cell irregularity significantly impact the performance and safety of honeycomb structures. Thus, various image processing techniques have been employed to evaluate the cell shape and detect structural defects within these structures. …”
    Get full text
    Article
  6. 2846

    A New Distributed Type-2 Fuzzy Logic Method for Efficient Data Science Models of Medical Informatics by Fatéma Zahra Benchara, Mohamed Youssfi

    Published 2020-01-01
    “…The great challenge in the medicine field is to provide a scalable image processing model, which integrates the computing processing requirements and computing-aided medical decision making. …”
    Get full text
    Article
  7. 2847

    An optimized domain-specific shrimp detection architecture integrating conditional GAN and weighted ensemble learning by L. Ravi Kumar, Ravi Kumar Tata, T. R. Mahesh, Endris Mohammed Ali

    Published 2025-07-01
    “…Deep learning is used to analyze the image patterns and to recognize the objects. The detection process includes the creation of labels with bounding boxes, and it will be evaluated by using accuracy scores. …”
    Get full text
    Article
  8. 2848

    Asymptotic Analysis of Shearlet Transfom for Inpainting by Süleyman Çetinkaya, Cüneyt Yazıcı, Hülya Kodal Sevindir

    Published 2018-12-01
    “…Supply of missing data, also known as inpainting, is an important application of image processing.Wavelets are commonly used for inpainting algorithms. …”
    Get full text
    Article
  9. 2849

    Grasp Detection under Occlusions Using SIFT Features by Zhaojun Ye, Yi Guo, Chengguang Wang, Haohui Huang, Genke Yang

    Published 2021-01-01
    “…There are two key steps for the proposed method in the process of grasping occluded object: generating template information and grasp detection using the matching algorithm. …”
    Get full text
    Article
  10. 2850
  11. 2851

    Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane by Seunghwan Kim, Byunghwee Lee, Wonjae Lee

    Published 2025-07-01
    “…Informatizing 149,780 images curated on the DeviantArt and Bēhance platforms from 2010 to 2020, we analyze the relationship between local information in the C-H space and multi-level image features generated by a deep neural network and a feature extraction algorithm. …”
    Get full text
    Article
  12. 2852

    Sistem Pengolahan Citra Digital untuk Menentukan Bobot Sapi Menggunakan Metode Titik Berat by Ahmad Mustafid, Shofwatul 'Uyun

    Published 2018-11-01
    “…This article represented the second stages of the research to determine the weight of cows from the image acquisition. Consequently, at this second stage has been focused on the selection of the cow weighting formula and the proposed algorithm to determine the weight from the result of images that had been processed in the early stages. …”
    Get full text
    Article
  13. 2853

    PYTHON INTERFACE DESIGN FOR MICROPHOTOGRAPHY ANALYSIS:APPLICATION TO EVALUATE THE HEMORHEOLOGICAL ACTIVITY OF QUERCETIN by P.Buszniez, M. Gómez, H. V. Castellini, B.D. Riquelme

    Published 2024-12-01
    “…The usability criteria of the GUI based on the TkInter library are aimed at non-expert users. The image processing algorithms are contained in the OpenCV2 library, which uses pre-trained neural networks. …”
    Get full text
    Article
  14. 2854

    Efficient Deep Learning Models Revolutionize Doctor’s Training for Point-of-Care Ultrasound by Hsin-Hung Chou, Yi-Chung Chang, Wan-Ching Lien, Lung-Chun Lin, Xing-Zheng Lin, Ting-En Hsu, Yueh-Ping Liu, Li Liu, Yen-Ting Chan, Feng-Sen Kuan

    Published 2025-01-01
    “…We applied preprocessing techniques, including standardized image sizes and background removal, to reduce interference, and post-processing techniques, including adding filters to refine small effusion regions. …”
    Get full text
    Article
  15. 2855

    Snow Depth Extraction From Time‐Lapse Imagery Using a Keypoint Deep Learning Model by C. M. Breen, W. R. Currier, C. Vuyovich, Z. Miao, L. R. Prugh

    Published 2024-07-01
    “…We demonstrate that, especially when trained using a subset of site‐specific data, a keypoint detection model can accelerate snow pole automation. This algorithm brings the hydrology community one step closer to a generalized snow pole detection model, and we call for a future model that integrates across time‐lapse images from additional locations.…”
    Get full text
    Article
  16. 2856

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  17. 2857

    Aberration correction in 3D transthoracic echocardiography by Svein-Erik Måsøy, Bastien Dénarié, Anders Sørnes, Espen Holte, Bjørnar Grenne, Torvald Espeland, Erik Andreas Rye Berg, Ole Marius Hoel Rindal, Wayne Rigby, Tore Bjåstad

    Published 2024-12-01
    “…The purpose of this article is to quantitatively and qualitatively analyze the effect of a commercially available aberration correction algorithm on clinically acquired 3D transthoracic echocardiography (3D TTE) images. …”
    Get full text
    Article
  18. 2858

    Development of an Automated Crack Detection System for Port Quay Walls Using a Small General-Purpose Drone and Orthophotos by Daiki Komi, Daisuke Yoshida, Tomohito Kameyama

    Published 2025-07-01
    “…The system employs the YOLOR (You Only Learn One Representation) object detection algorithm, enhanced by two novel image processing techniques—overlapping tiling and pseudo-altitude slicing—to overcome the resolution limitations of low-cost cameras. …”
    Get full text
    Article
  19. 2859
  20. 2860

    Estimation of Wind Turbine Blade Icing Volume Based on Binocular Vision by Fangzheng Wei, Zhiyong Guo, Qiaoli Han, Wenkai Qi

    Published 2024-12-01
    “…Therefore, this paper proposes a non-contact ice volume estimation method based on binocular vision and improved image processing algorithms. The method employs a stereo matching algorithm that combines dynamic windows, multi-feature fusion, and reordering, integrating gradient, color, and other information to generate matching costs. …”
    Get full text
    Article