Search alternatives:
image » images (Expand Search)
Showing 1 - 20 results of 1,303 for search 'image construction algorithms', query time: 0.17s Refine Results
  1. 1

    Construction of multi-style face models based on artistic image generation algorithms by Xu Zhaoyi

    Published 2025-08-01
    “…In response to the issues of insufficient clarity and data processing capabilities in the current face model construction process, a method for constructing multi-style face models based on artistic image generation algorithms is proposed. …”
    Get full text
    Article
  2. 2
  3. 3

    Experimental studies of radar image construction algorithms for propellers and measurement method for repetition frequencies of the blades by S. R. Heister, T. T. Nguyen

    Published 2019-06-01
    “…The radar image construction algorithms for propellers of aerial vehicles belonging to the classes «helicopter» and «propeller-driven aircraft» were proposed in [1]. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Characterization of PET image using global and local entropy by Igor Fagner Vieira

    Published 2015-05-01
    “…The main application of this approach will be for, among other things, to construct pathological phantoms from PET images for dosimetry applications.…”
    Get full text
    Article
  8. 8
  9. 9

    Mathematical Modeling and Recursive Algorithms for Constructing Complex Fractal Patterns by Abror Shavkatovich Buriboev, Djamshid Sultanov, Zulaykho Ibrohimova, Heung Seok Jeon

    Published 2025-02-01
    “…In this paper, we present mathematical geometric models and recursive algorithms to generate and design complex patterns using fractal structures. …”
    Get full text
    Article
  10. 10
  11. 11

    The Comparison of Diffeomorphic Images Based on the Construction of Persistent Homology by Sergey N. Chukanov

    Published 2019-09-01
    “…The paper considers algorithms for constructing sets of barcodes for comparing diffeomorphic images, which are real values taken by persistent homology. …”
    Get full text
    Article
  12. 12

    Gamma norm minimization based image denoising algorithm by Hongyan WANG, Tuo WANG, Mian PAN, Zumin WANG

    Published 2020-10-01
    “…Focusing on the issue of rather poor denoising performance of the traditional kernel norm minimization based method caused by the biased approximation of kernel norm to rank function,based on the low-rank theory,a gamma norm minimization based image denoising algorithm was developed.The noisy image was firstly divided into some overlapping patches via the proposed algorithm,and then several non-local image patches most similar to the current image patch were sought adaptively based on the structural similarity index to form the similar image patch matrix.Subsequently,the non-convex gamma norm could be exploited to obtain unbiased approximation of the matrix rank function such that the low-rank denoising model could be constructed.Finally,the obtained low-rank denoising optimization issue could be tackled on the basis of singular value decomposition,and therefore the denoised image patches could be re-constructed as a denoised image.Simulation results demonstrate that,compared to the existing state-of-the-art PID,NLM,BM3D,NNM,WNNM,DnCNN and FFDNet algorithms,the developed method can eliminate Gaussian noise more considerably and retrieve the original image details rather precisely.…”
    Get full text
    Article
  13. 13
  14. 14

    Image zero-watermarking algorithm based on region of interest by ZHANG Li-bao, MA Xin-yue, CHEN Qi

    Published 2009-01-01
    “…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
    Get full text
    Article
  15. 15

    Image zero-watermarking algorithm based on region of interest by ZHANG Li-bao, MA Xin-yue, CHEN Qi

    Published 2009-01-01
    “…Based on ROI, a new watermarking algorithm was proposed.First, ROI was selected.Then, the wavelet transform was executed and ROI mask was constructed.Finally, the zero-watermarking was designed for the wavelet coefficients in ROI mask.The experimental results show that the zero-watermarking is more robust in the new algorithm than others that are not designed for ROI when the ROI of image is decoded at higher quality than the background.Additionally, the new algorithm can ensure ROI not to be disturbed by the watermarking information because of the zero-watermarking.…”
    Get full text
    Article
  16. 16

    Research on the Object Detection Algorithm Based on Fisheye Image by GAO Qun, ZHU Jun, WANG Qianqian, CAO Jie, XU Chao

    Published 2019-01-01
    “…It uses the feature pyramid structure to detect multi-scale objects, and combines the rotation and distortion characteristics of the fisheye to optimize the algorithm and directly detects the objects from the original fisheye image. …”
    Get full text
    Article
  17. 17

    Infrared image monitoring algorithm for converter valve equipment by Jiashui Dai, Fali Tan, Yi Jiang, Yunlong Liang, Kangquan Lin, Kai Tong

    Published 2025-03-01
    “…In this study, according to the requirements of infrared image monitoring of the converter valve, the infrared image monitoring algorithm system of the converter valve equipment based on the improved YOLOv8n target detection model is constructed. …”
    Get full text
    Article
  18. 18

    Image denoising algorithm based on multi-channel GAN by Hongyan WANG, Xiao YANG, Yanchao JIANG, Zumin WANG

    Published 2021-03-01
    “…Aiming at the issue that the noise generated during image acquisition and transmission would degrade the ability of subsequent image processing, a generative adversarial network (GAN) based multi-channel image denoising algorithm was developed.The noisy color image could be separated into red-green-blue (RGB) three channels via the proposed approach, and then the denoising could be implemented in each channel on the basis of an end-to-end trainable GAN with the same architecture.The generator module of GAN was constructed based on the U-net derivative network and residual blocks such that the high-level feature information could be extracted effectively via referring to the low-level feature information to avoid the loss of the detail information.In the meantime, the discriminator module could be demonstrated on the basis of fully convolutional neural network such that the pixel-level classification could be achieved to improve the discrimination accuracy.Besides, in order to improve the denoising ability and retain the image detail as much as possible, the composite loss function could be depicted by the illustrated denoising network based on the following three loss measures, adversarial loss, visual perception loss, and mean square error (MSE).Finally, the resultant three-channel output information could be fused by exploiting the arithmetic mean method to obtain the final denoised image.Compared with the state-of-the-art algorithms, experimental results show that the proposed algorithm can remove the image noise effectively and restore the original image details considerably.…”
    Get full text
    Article
  19. 19

    CONSTRUCTING METAMORPHOSIS OF IMAGES FOR THE OBJECTS ON THE BASIS OF SOLVING EULER-POINCARE EQUATIONS by S. V. Leichter

    Published 2017-08-01
    “…The considered problem of comparing two images can be used for constructing optimal metamorphosis of images, when there is no exact correspondence between the target image and the final image of the diffeomorphism. …”
    Get full text
    Article
  20. 20

    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction by M. Mohammed Ibrahim, R. Venkatesan, Nasir Ali, Muhammad Imran Qureshi, Hafiz Muhammad Afzal Siddiqui, Fikadu Tesgera Tolasa, Suhad Ali Osman Abdallah

    Published 2025-04-01
    “…Abstract With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge. Most of the existing hash algorithms cannot meet the requirements of security, efficiency, and adaptability in cryptographic applications based on an image. …”
    Get full text
    Article