Results 11 to 20 of about 1,916,086 (289)

Enhanced Perception for Autonomous Driving Using Semantic and Geometric Data Fusion

open access: yesSensors, 2022
Environment perception remains one of the key tasks in autonomous driving for which solutions have yet to reach maturity. Multi-modal approaches benefit from the complementary physical properties specific to each sensor technology used, boosting overall ...
Horatiu Florea   +5 more
doaj   +1 more source

Graph Regularized Within-Class Sparsity Preserving Projection for Face Recognition

open access: yesInformation, 2015
As a dominant method for face recognition, the subspace learning algorithm shows desirable performance. Manifold learning can deal with the nonlinearity hidden in the data, and can project high dimensional data onto low dimensional data while preserving
Songjiang Lou   +3 more
doaj   +1 more source

SiamCAM: A Real-Time Siamese Network for Object Tracking with Compensating Attention Mechanism

open access: yesApplied Sciences, 2022
The Siamese-based object tracking algorithm regards tracking as a similarity matching problem. It determines the object location according to the response value of the object template to the search template.
Kai Huang   +4 more
doaj   +1 more source

Iris Recognition: The Consequences of Image Compression [PDF]

open access: yes, 2010
Iris recognition for human identification is one of the most accurate biometrics, and its employment is expanding globally. The use of portable iris systems, particularly in law enforcement applications, is growing.
Belcher, Craig   +3 more
core   +3 more sources

Image-free multi-character recognition [PDF]

open access: yesOptics Letters, 2022
The recently developed image-free sensing technique decouples semantic information directly from compressed measurements without image reconstruction, which maintains the advantages of both the light hardware and software. However, the existing attempts have failed to classify multi-semantic information with multiple targets in the practical fieldof ...
Liheng Bian   +3 more
openaire   +3 more sources

Person Re-Identification Based on DropEasy Method

open access: yesIEEE Access, 2019
Currently, majority of person re-identification (reID) technologies are network-constrained by Dropout regularization, which relies on the random zeroing out of some features to make these features more independent.
Huiyang Wang   +3 more
doaj   +1 more source

MemBrain: An Easy-to-Use Online Webserver for Transmembrane Protein Structure Prediction

open access: yesNano-Micro Letters, 2017
Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels, transporters, receptors.
Xi Yin   +4 more
doaj   +1 more source

A scale-adaptive object-tracking algorithm with occlusion detection

open access: yesEURASIP Journal on Image and Video Processing, 2020
The methods combining correlation filters (CFs) with the features of convolutional neural network (CNN) are good at object tracking. However, the high-level features of a typical CNN without residual structure suffer from the shortage of fine-grained ...
Yue Yuan   +4 more
doaj   +1 more source

CONFIGR: A Vision-Based Model for Long-Range Figure Completion [PDF]

open access: yes, 2007
CONFIGR (CONtour FIgure GRound) is a computational model based on principles of biological vision that completes sparse and noisy image figures. Within an integrated vision/recognition system, CONFIGR posits an initial recognition stage which identifies
Carpenter, Gail A.   +2 more
core   +2 more sources

Image Kernel for Recognition

open access: yes2008 9th International Conference on Signal Processing, 2008
Kernel-based methods have been widely used in pattern recognition. But traditional kernel functions can only process 1D vectors, while image data are often 2D matrices. This paper presents a new kernel function based on RBF kernel function for image target recognition.
XiaoKai, Zhu, Xiang, Li
openaire   +3 more sources

Home - About - Disclaimer - Privacy