Results 231 to 240 of about 2,240,353 (293)
Screening test for early detection of myopia based on hybrid images. [PDF]
Tommasi F +5 more
europepmc +1 more source
MSSA: memory-driven and simplified scaled attention for enhanced image captioning. [PDF]
Hossain MA +5 more
europepmc +1 more source
Visually grounded emotion regulation via diffusion models and user-driven reappraisal. [PDF]
Pinzuti E +2 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Psychiatric Services, 1985
Although they have not yet profoundly affected the clinical practice of psychiatry, five new imaging techniques--computed tomography, brain electrical activity mapping, cerebral blood flow techniques, positron emission tomography, and nuclear magnetic resonance--show promise for furthering knowledge of the pathophysiology, diagnosis, and treatment of ...
R P, Brown, B, Kneeland
openaire +2 more sources
Although they have not yet profoundly affected the clinical practice of psychiatry, five new imaging techniques--computed tomography, brain electrical activity mapping, cerebral blood flow techniques, positron emission tomography, and nuclear magnetic resonance--show promise for furthering knowledge of the pathophysiology, diagnosis, and treatment of ...
R P, Brown, B, Kneeland
openaire +2 more sources
Image encryption: Generating visually meaningful encrypted images
Information Sciences, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Long Bao, Yicong Zhou
openaire +2 more sources
AHFE International, 2022
Malware plays a critical role in breaching computer systems. Cybersecurity research has primarily focused on malware detection. Detection methods are currently up against fundamental limits in theoretical computer science. The purpose of visual image authentication is to create Artificial Intelligence (AI) problems that are easy for humans to ...
openaire +1 more source
Malware plays a critical role in breaching computer systems. Cybersecurity research has primarily focused on malware detection. Detection methods are currently up against fundamental limits in theoretical computer science. The purpose of visual image authentication is to create Artificial Intelligence (AI) problems that are easy for humans to ...
openaire +1 more source
Interpreting visual images, individually
Trends in Cognitive Sciences, 2002Visual images seem picture-like, but is this epiphenomenal or does it reflect a functional aspect of how they are represented in the brain? Visualising ambiguous pictures – those with more than one interpretation – provides one method for examining this issue.
openaire +2 more sources
2020
This paper intends to highlight a solution that has been obtained by the amalgamation of machine learning and brain image visualization. This solution has been presented to improve the comprehension of a brain’s logical proficiency to recognize and visualize objects and elements by means of noise, movements, and possible through emotions as well.
Anson Antony +3 more
openaire +1 more source
This paper intends to highlight a solution that has been obtained by the amalgamation of machine learning and brain image visualization. This solution has been presented to improve the comprehension of a brain’s logical proficiency to recognize and visualize objects and elements by means of noise, movements, and possible through emotions as well.
Anson Antony +3 more
openaire +1 more source

