Showing 1,501 - 1,520 results of 20,631 for search '"Image"', query time: 0.09s Refine Results
  1. 1501
  2. 1502

    Visual Sensor Based Image Segmentation by Fuzzy Classification and Subregion Merge by Huidong He, Xiaoqian Mao, Wei Li, Linwei Niu, Genshe Chen

    Published 2017-01-01
    “…The extraction and tracking of targets in an image shot by visual sensors have been studied extensively. …”
    Get full text
    Article
  3. 1503
  4. 1504

    Retracted: Image Analysis System of Intelligent Smart Home Based on VR by Chengmin Zhou, Ting Huang, Liang Shuang

    Published 2020-01-01
    “…This research mainly discusses the research and application of VR-based smart home image analysis system. This research combines the intelligent design and implementation of the image analysis system of VR technology. …”
    Get full text
    Article
  5. 1505

    A quality assessment algorithm for no-reference images based on transfer learning by Yang Yang, Chang Liu, Hui Wu, Dingguo Yu

    Published 2025-01-01
    Subjects: “…Image quality assessment (IQA)…”
    Get full text
    Article
  6. 1506

    A New Nonlinear Diffusion Equation Model for Noisy Image Segmentation by Bo Chen, Xiao-Hui Zhou, Li-Wei Zhang, Jie Wang, Wei-Qiang Zhang, Chen Zhang

    Published 2016-01-01
    “…Image segmentation and image denoising are two important and fundamental topics in the field of image processing. …”
    Get full text
    Article
  7. 1507
  8. 1508
  9. 1509
  10. 1510

    David Lynch’s Los Angeles: Control and Liberation through the Cinematic Image by Jakob Jurisch

    Published 2024-12-01
    “…Arguably, one of America’s greatest cinematic surrealists, David Lynch, boasts a filmography concerned with iconography, the nature of kitsch, and what dark underbellies such images veil. In Lynch’s famous TV series Twin Peaks (1990-2017), the kitsch aspect of a local small-town murder mystery is connected to a surreal and ungraspable larger world of primordial darkness and incomprehensible nightmares, where consciousness and unconsciousness constantly inform upon one another, one cannot exist without the other. …”
    Get full text
    Article
  11. 1511

    Video Multiple Watermarking Technique Based on Image Interlacing Using DWT by Mohamed M. Ibrahim, Neamat S. Abdel Kader, M. Zorkany

    Published 2014-01-01
    “…This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. …”
    Get full text
    Article
  12. 1512
  13. 1513
  14. 1514

    Sequential MR Images and Radiographs of Epiphyseal Osteomyelitis in the Distal Femur of an Infant by Hitomi Hara, Toshihiro Akisue, Teruya Kawamoto, Masahiro Kurosaka

    Published 2013-01-01
    “…Magnetic resonance imaging (MRI) plays an important role in the diagnosis of osteomyelitis, especially during the early phase of the disease. …”
    Get full text
    Article
  15. 1515

    Rice Leaf Disease Image Enhancement Based on Improved CycleGAN by YAN Congkuan, ZHU Dequan, MENG Fankai, YANG Yuqing, TANG Qixing, ZHANG Aifang, LIAO Juan

    Published 2024-11-01
    “…This design effectively mitigated the potential loss of critical feature information during the image generation process, ensuring higher fidelity in the resulting images. …”
    Get full text
    Article
  16. 1516
  17. 1517

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  18. 1518
  19. 1519
  20. 1520

    Neutron imaging and molecular simulation of systems from methane and p-xylene by Martin Melčák, Tereza-Markéta Durďáková, Štěpán Tvrdý, Jonatan Šercl, Jong Min Lee, Pierre Boillat, Jan Heyda, Pavel Trtik, Ondřej Vopička

    Published 2025-01-01
    “…Abstract Bulk properties of two-phase systems comprising methane and liquid p-xylene were derived experimentally using neutron imaging and theoretically predicted using molecular dynamics (MD). …”
    Get full text
    Article