Results 21 to 30 of about 379,717 (269)
No-Reference Image Quality Assessment Based on Edge Pattern Feature in the Spatial Domain
This paper proposes a general-purpose no-reference image quality assessment (NR-IQA) method that investigates the image’s structure information from a new aspect, i.e., the characteristic of image edge profiles that depict the directional property
Wenting Shao, Xuanqin Mou
doaj +1 more source
SiamCCF: Siamese visual tracking via cross‐layer calibration fusion
Siamese networks have attracted wide attention in visual tracking due to their competitive accuracy and speed. However, the existing Siamese trackers usually leverage a fixed linear aggregation of feature maps, which does not effectively fuse the ...
Si Chen +5 more
doaj +1 more source
One-Shot Distributed Generalized Eigenvalue Problem (DGEP): Concept, Algorithm and Experiments
This paper focuses on the design of a distributed algorithm for generalized eigenvalue problems (GEPs) in one-shot communication. Since existing distributed methods for eigenvalue decomposition cannot be applied to GEP, a general one-shot distributed GEP
Kexin Lv +4 more
doaj +1 more source
Image Recognition CAPTCHAs [PDF]
CAPTCHAs are tests that distinguish humans from software robots in an online environment [3,14,7]. We propose and implement three CAPTCHAs based on naming images, distinguishing images, and identifying an anomalous image out of a set. Novel contributions include proposals for two new CAPTCHAs, the first user study on image recognition CAPTCHAs, and a ...
Monica Chew, J. D. Tygar
openaire +1 more source
The extraction of activation vectors (or deep features) from the fully connected layers of a convolutional neural network (CNN) model is widely used for remote sensing image (RSI) representation.
Na Liu +4 more
doaj +1 more source
Mask-Refined R-CNN: A Network for Refining Object Details in Instance Segmentation
With the rapid development of flexible vision sensors and visual sensor networks, computer vision tasks, such as object detection and tracking, are entering a new phase.
Yiqing Zhang, Jun Chu, Lu Leng, Jun Miao
doaj +1 more source
Reinforced Palmprint Reconstruction Attacks in Biometric Systems
Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT.
Yue Sun, Lu Leng, Zhe Jin, Byung-Gyu Kim
doaj +1 more source
Two-Level Wavelet-Based Convolutional Neural Network for Image Deblurring
Image deblurring aims to restore the latent sharp image from the blurred one. In recent years, some learning-based image deblurring methods have achieved significant advances.
Yeyun Wu, Pan Qian, Xiaofeng Zhang
doaj +1 more source
Perception of image perceptions is one of the most important features of every person. With the help of our eyesight, we can perceive the world around us, acquiring information about our surroundings and recognize different objects in them. Thanks to the recipes of our eye, we can capture it clear information and transferred information to the brain ...
Adámek, Milan +4 more
openaire +2 more sources
Human protein subcellular location prediction can provide critical knowledge for understanding a protein’s function. Since significant progress has been made on digital microscopy, automated image-based protein subcellular location classification is ...
Fan Yang, Ying-Ying Xu, Hong-Bin Shen
doaj +1 more source

