-
2941
Data protection enhancement in smart grid communication: An efficient multi-layer encrypting approach based on chaotic techniques and steganography
Published 2024-12-01“…The encryption process involves hiding the data encrypted by a digital dictionary and the advanced encryption standard (AES) algorithm in an image. …”
Get full text
Article -
2942
Face Spoofing Detection with Stacking Ensembles in Work Time Registration System
Published 2025-07-01“…The ensemble comprises a convolutional neural network (CNN), a smartphone bezel-detection algorithm to identify faces displayed on electronic devices, a face context analysis module, and additional CNNs for image processing. …”
Get full text
Article -
2943
Application of support vector machine system introducing multiple submodels in data mining
Published 2024-12-01“…By introducing open-source tools such as OpenCV, image feature extraction can be performed on large-scale video data. …”
Get full text
Article -
2944
eLighthouse: Enhance Solar Power Coverage in Renewable Sensor Networks
Published 2013-11-01Get full text
Article -
2945
DeepISLES: a clinically validated ischemic stroke segmentation model from the ISLES'22 challenge
Published 2025-08-01Get full text
Article -
2946
RGB and Point Cloud-Based Intelligent Grading of Pepper Plug Seedlings
Published 2025-06-01“…Using these positions, the seedlings are segmented from both the RGB and 2D point cloud images. Subsequently, a deep learning-based leaf recognition algorithm processes the segmented RGB images to determine leaf count, while another deep learning-based algorithm segments the leaves in the 2D point cloud images to extract their spatial information. …”
Get full text
Article -
2947
A new dataset for measuring the performance of blood vessel segmentation methods under distribution shifts.
Published 2025-01-01“…Creating a dataset for training supervised machine learning algorithms can be a demanding task. This is especially true for blood vessel segmentation since one or more specialists are usually required for image annotation, and creating ground truth labels for just a single image can take up to several hours. …”
Get full text
Article -
2948
Enhancing transportation network intelligence through visual scene feature clustering analysis with 3D sensors and adaptive fuzzy control
Published 2024-12-01“…Firstly, we construct a feature extraction framework for visual scenes using 3D sensors and employ a series of feature processing operators to repair cracks and noise in the images. …”
Get full text
Article -
2949
Modelling and Estimation of Interior Orientation of Non-Metric Cameras using Artificial Intelligence
Published 2023-06-01“…These cameras were unavailable to perform traditional calibration processes or use images from unknown sources for image measuring. …”
Get full text
Article -
2950
Dataset of Centella Asiatica leaves for quality assessment and machine learning applicationsMendeley Data
Published 2024-12-01“…Moreover, it provides a valuable platform for testing and validating algorithms in areas such as image categorization and object detection. …”
Get full text
Article -
2951
Machine learning and deep learning in medicine and neuroimaging
Published 2023-06-01“…Machine learning is the subfield of artificial intelligence in which computers have the ability to learn and iteratively improve their performance without being explicitly programmed. Deep learning algorithms learn by processing the data with increasing levels of abstraction in each layer. …”
Get full text
Article -
2952
The Mode of Constructing Safe Trajectories of Motion of the Unmanned Aerial Vehicle while Monitoring Power Lines Considering the Influence of their Electromagnetic Fields
Published 2019-12-01“…This problem was solved with algorithms for photo- and video-imaging and determination of wire sag. …”
Get full text
Article -
2953
Fourier Features and Machine Learning for Contour Profile Inspection in CNC Milling Parts: A Novel Intelligent Inspection Method (NIIM)
Published 2024-09-01“…An algorithm generates a profile signature, extracting Fourier descriptor features from the contour profile to analyze form deviations compared to an image reference. …”
Get full text
Article -
2954
Map-Guided Coarse-to-Fine Lunar Rover Localization via Multiview Crater Matching
Published 2025-01-01“…The results demonstrate that, starting from an initial estimate with an error margin of less than 50 m, our method significantly enhances localization accuracy, achieving meter-level precision, with most results concentrated within approximately 2 m. Furthermore, the algorithm operates at a subsecond processing speed, which ensures its execution during the rover’s panoramic imaging phase between motion and stop, thereby satisfying the real-time localization requirements of actual mission scenarios.…”
Get full text
Article -
2955
-
2956
Using machine vision to determine the rotational forces of electric motors
Published 2024-06-01“…To improve the dynamic characteristics of the system, it is proposed to optimize image processing algorithms, use more powerful computing resources, implement hardware acceleration, and optimize the transmission of the video stream.…”
Get full text
Article -
2957
Research progress and prospect of key technologies of fruit target recognition for robotic fruit picking
Published 2024-12-01“…Here, we outline the research achievements and progress of traditional digital image processing methods by the researchers aiming at different disturbance factors in orchards and summarize the shortcomings of traditional digital image processing methods. …”
Get full text
Article -
2958
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…Therefore, how to realize digital media security effectively is becoming a challenging problem. A new image watermarking algorithm in hybrid transform domain was proposed. …”
Get full text
Article -
2959
A Combination of SHA-256 and DES for Visual Data Protection
Published 2025-05-01“…This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. …”
Get full text
Article -
2960
Extraction of Human Motion Information from Digital Video Based on 3D Poisson Equation
Published 2021-01-01“…Then, using the recognition algorithm of motion capture, after the above process, the three-dimensional model is obtained and matched with the model in the three-dimensional model database, the sequence with the smallest distance is calculated, and the corresponding skeleton is outputted as the results of action capture. …”
Get full text
Article