-
2841
FPGA Programming Challenges When Estimating Power Spectral Density and Autocorrelation in Coherent Doppler Lidar Systems for Wind Sensing
Published 2025-02-01“…Both signal pre-processing algorithms are initially developed as logic designs and compiled using the Xilinx System Generator toolset to produce a hardware VLSI image. …”
Get full text
Article -
2842
A multi-layer Internet of things database schema for online-to-offline systems
Published 2016-08-01“…This leads to increased complexity in data storage and querying, especially for spatial–temporal data processing in online-to-offline systems. In this article, first, we design a multi-layer Internet of things database schema to meet the diverse requirements through fusing spatial data with texts, images, and videos transferred from the sensors of the Internet of things networks. …”
Get full text
Article -
2843
Design of an Automatic Defect Identification Method Based ECPT for Pneumatic Pressure Equipment
Published 2018-01-01“…Experimental results are provided to demonstrate the capabilities and benefits (i.e., reducing the processing time) of the proposed algorithm in automatic defect identification.…”
Get full text
Article -
2844
Breast lesion classification via colorized mammograms and transfer learning in a novel CAD framework
Published 2025-07-01“…Abstract Medical imaging sciences and diagnostic techniques for Breast Cancer (BC) imaging have advanced tremendously, particularly with the use of mammography images; however, radiologists may still misinterpret medical images of the breast, resulting in limitations and flaws in the screening process. …”
Get full text
Article -
2845
An improved Harris corner detection method for honeycomb structures
Published 2025-04-01“…Structural defects and cell irregularity significantly impact the performance and safety of honeycomb structures. Thus, various image processing techniques have been employed to evaluate the cell shape and detect structural defects within these structures. …”
Get full text
Article -
2846
A New Distributed Type-2 Fuzzy Logic Method for Efficient Data Science Models of Medical Informatics
Published 2020-01-01“…The great challenge in the medicine field is to provide a scalable image processing model, which integrates the computing processing requirements and computing-aided medical decision making. …”
Get full text
Article -
2847
An optimized domain-specific shrimp detection architecture integrating conditional GAN and weighted ensemble learning
Published 2025-07-01“…Deep learning is used to analyze the image patterns and to recognize the objects. The detection process includes the creation of labels with bounding boxes, and it will be evaluated by using accuracy scores. …”
Get full text
Article -
2848
Asymptotic Analysis of Shearlet Transfom for Inpainting
Published 2018-12-01“…Supply of missing data, also known as inpainting, is an important application of image processing.Wavelets are commonly used for inpainting algorithms. …”
Get full text
Article -
2849
Grasp Detection under Occlusions Using SIFT Features
Published 2021-01-01“…There are two key steps for the proposed method in the process of grasping occluded object: generating template information and grasp detection using the matching algorithm. …”
Get full text
Article -
2850
-
2851
Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane
Published 2025-07-01“…Informatizing 149,780 images curated on the DeviantArt and Bēhance platforms from 2010 to 2020, we analyze the relationship between local information in the C-H space and multi-level image features generated by a deep neural network and a feature extraction algorithm. …”
Get full text
Article -
2852
Sistem Pengolahan Citra Digital untuk Menentukan Bobot Sapi Menggunakan Metode Titik Berat
Published 2018-11-01“…This article represented the second stages of the research to determine the weight of cows from the image acquisition. Consequently, at this second stage has been focused on the selection of the cow weighting formula and the proposed algorithm to determine the weight from the result of images that had been processed in the early stages. …”
Get full text
Article -
2853
PYTHON INTERFACE DESIGN FOR MICROPHOTOGRAPHY ANALYSIS:APPLICATION TO EVALUATE THE HEMORHEOLOGICAL ACTIVITY OF QUERCETIN
Published 2024-12-01“…The usability criteria of the GUI based on the TkInter library are aimed at non-expert users. The image processing algorithms are contained in the OpenCV2 library, which uses pre-trained neural networks. …”
Get full text
Article -
2854
Efficient Deep Learning Models Revolutionize Doctor’s Training for Point-of-Care Ultrasound
Published 2025-01-01“…We applied preprocessing techniques, including standardized image sizes and background removal, to reduce interference, and post-processing techniques, including adding filters to refine small effusion regions. …”
Get full text
Article -
2855
Snow Depth Extraction From Time‐Lapse Imagery Using a Keypoint Deep Learning Model
Published 2024-07-01“…We demonstrate that, especially when trained using a subset of site‐specific data, a keypoint detection model can accelerate snow pole automation. This algorithm brings the hydrology community one step closer to a generalized snow pole detection model, and we call for a future model that integrates across time‐lapse images from additional locations.…”
Get full text
Article -
2856
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
2857
Aberration correction in 3D transthoracic echocardiography
Published 2024-12-01“…The purpose of this article is to quantitatively and qualitatively analyze the effect of a commercially available aberration correction algorithm on clinically acquired 3D transthoracic echocardiography (3D TTE) images. …”
Get full text
Article -
2858
Development of an Automated Crack Detection System for Port Quay Walls Using a Small General-Purpose Drone and Orthophotos
Published 2025-07-01“…The system employs the YOLOR (You Only Learn One Representation) object detection algorithm, enhanced by two novel image processing techniques—overlapping tiling and pseudo-altitude slicing—to overcome the resolution limitations of low-cost cameras. …”
Get full text
Article -
2859
Soil Burn Severity Assessment Using Sentinel-2 and Radiometric Measurements
Published 2024-12-01Get full text
Article -
2860
Estimation of Wind Turbine Blade Icing Volume Based on Binocular Vision
Published 2024-12-01“…Therefore, this paper proposes a non-contact ice volume estimation method based on binocular vision and improved image processing algorithms. The method employs a stereo matching algorithm that combines dynamic windows, multi-feature fusion, and reordering, integrating gradient, color, and other information to generate matching costs. …”
Get full text
Article