咨询与建议

限定检索结果

文献类型

  • 4,427 篇 会议
  • 237 篇 期刊文献
  • 54 册 图书
  • 8 篇 学位论文
  • 3 篇 资讯

馆藏范围

  • 4,729 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,630 篇 工学
    • 1,501 篇 计算机科学与技术...
    • 893 篇 电气工程
    • 771 篇 软件工程
    • 465 篇 信息与通信工程
    • 331 篇 控制科学与工程
    • 291 篇 生物医学工程(可授...
    • 224 篇 光学工程
    • 210 篇 机械工程
    • 164 篇 电子科学与技术(可...
    • 141 篇 仪器科学与技术
    • 125 篇 生物工程
    • 90 篇 材料科学与工程(可...
    • 68 篇 测绘科学与技术
    • 58 篇 化学工程与技术
    • 32 篇 土木工程
    • 27 篇 建筑学
    • 25 篇 力学(可授工学、理...
  • 1,480 篇 理学
    • 926 篇 物理学
    • 657 篇 数学
    • 431 篇 统计学(可授理学、...
    • 228 篇 系统科学
    • 138 篇 生物学
    • 63 篇 化学
  • 755 篇 医学
    • 592 篇 临床医学
    • 218 篇 特种医学
    • 74 篇 基础医学(可授医学...
    • 44 篇 药学(可授医学、理...
  • 214 篇 管理学
    • 119 篇 管理科学与工程(可...
    • 103 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 24 篇 农学
  • 17 篇 法学
  • 13 篇 教育学
  • 11 篇 经济学
  • 10 篇 艺术学
  • 9 篇 文学
  • 2 篇 军事学

主题

  • 550 篇 image processing
  • 464 篇 image segmentati...
  • 385 篇 stochastic proce...
  • 371 篇 statistical anal...
  • 261 篇 feature extracti...
  • 230 篇 bayesian methods
  • 221 篇 image reconstruc...
  • 188 篇 signal processin...
  • 185 篇 image analysis
  • 142 篇 pixel
  • 135 篇 image restoratio...
  • 110 篇 statistics
  • 106 篇 image edge detec...
  • 104 篇 pattern recognit...
  • 104 篇 image coding
  • 103 篇 hidden markov mo...
  • 99 篇 noise reduction
  • 96 篇 image denoising
  • 95 篇 robustness
  • 94 篇 visualization

机构

  • 10 篇 school of electr...
  • 8 篇 indian statistic...
  • 7 篇 univ penn dept r...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 univ waterloo de...
  • 7 篇 univ michigan de...
  • 6 篇 nanyang technol ...
  • 6 篇 smart computer v...
  • 6 篇 computer vision ...
  • 5 篇 georgia inst tec...
  • 5 篇 microsoft resear...
  • 5 篇 carnegie mellon ...
  • 5 篇 signal and image...
  • 5 篇 peng cheng lab p...
  • 4 篇 google res mount...
  • 4 篇 texas a&m univ.
  • 4 篇 department of sy...
  • 4 篇 ivan kozhedub kh...
  • 4 篇 tokyo metropolit...

作者

  • 9 篇 landman bennett ...
  • 8 篇 vorapoj patanavi...
  • 8 篇 dougherty er
  • 8 篇 h. krim
  • 7 篇 yannick berthoum...
  • 7 篇 a.s. willsky
  • 7 篇 sang hwa lee
  • 6 篇 astola jaakko t.
  • 6 篇 prince jerry l.
  • 6 篇 umapada pal
  • 6 篇 alexander wong
  • 6 篇 udupa jk
  • 6 篇 nam ik cho
  • 6 篇 w. pieczynski
  • 6 篇 fessler jeffrey ...
  • 6 篇 w.c. karl
  • 6 篇 pesquet jean-chr...
  • 6 篇 pal umapada
  • 6 篇 jong-il park
  • 6 篇 pieczynski w

语言

  • 4,600 篇 英文
  • 87 篇 其他
  • 31 篇 中文
  • 13 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=Conference on Statistical and Stochastic Methods for Image Processing"
4729 条 记 录,以下是1081-1090 订阅
排序:
Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance  18
Robustness and Discrimination Oriented Hashing Combining Tex...
收藏 引用
26th ACM Multimedia conference (MM)
作者: Huang, Ziqing Liu, Shiguang Tianjin Univ Sch Comp Sci & Technol Tianjin Peoples R China
image hashing is a novel technology of multimedia processing with wide applications. Robustness and discrimination are two of the most important objectives of image hashing. Different from existing hashing methods wit... 详细信息
来源: 评论
Analytical Realization of the EM Algorithm for Emission Positron Tomography  17th
Analytical Realization of the EM Algorithm for Emission Posi...
收藏 引用
17th International conference on Artificial Intelligence and Soft Computing (ICAISC)
作者: Cierniak, Robert Dobosz, Piotr Pluta, Piotr Filutowicz, Zbigniew Czestochowa Tech Univ Inst Computat Intelligence Armii Krajowej 36 PL-42200 Czestochowa Poland Univ Social Sci Inst Informat Technol PL-90113 Lodz Poland Clark Univ Worcester MA 01610 USA
The presented paper describes an analytical iterative approach to reconstruction problem for positron emission tomography (PET). The reconstruction problem is formulated taking into consideration the statistical prope... 详细信息
来源: 评论
A micro-control capture images technology for the finger vein recognition based on adaptive image segmentation
收藏 引用
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND processing SYSTEMS 2018年 第10期24卷 4165-4178页
作者: Chiu, Chih-Cheng Liu, Tung-Kuan Lu, Weu-Ting Chen, Wen-Ping Chou, Jyh-Horng Natl Kaohsiung First Univ Sci & Technol Coll Engn PhD Program Engn Sci & Technol Kaohsiung Taiwan Natl Kaohsiung First Univ Sci & Technol Dept Mech & Automat Engn Kaohsiung Taiwan Kaohsiung Med Univ Grad Inst Clin Med Kaohsiung Taiwan Natl Kaohsiung Univ Appl Sci Dept Elect Engn Kaohsiung Taiwan Kaohsiung Med Univ Dept Healthcare Adm & Med Informat Kaohsiung Taiwan
The advantages of finger-vein recognition, compared to other biometric recognition technology commonly enlisted in identification needs such as ATM and door security, are uniqueness and living recognition, and so it h... 详细信息
来源: 评论
Photorealistic Style Transfer via Wavelet Transforms
Photorealistic Style Transfer via Wavelet Transforms
收藏 引用
International conference on Computer Vision (ICCV)
作者: Jaejun Yoo Youngjung Uh Sanghyuk Chun Byeongkyu Kang Jung-Woo Ha Clova AI Research NAVER Corp.
Recent style transfer models have provided promising artistic results. However, given a photograph as a reference style, existing methods are limited by spatial distortions or unrealistic artifacts, which should not h... 详细信息
来源: 评论
PoseFix: Model-agnostic General Human Pose Refinement Network
PoseFix: Model-agnostic General Human Pose Refinement Networ...
收藏 引用
IEEE/CVF conference on Computer Vision and Pattern Recognition
作者: Gyeongsik Moon Ju Yong Chang Kyoung Mu Lee Department of ECE ASRI Seoul National University Department of EI Kwangwoon University
Multi-person pose estimation from a 2D image is an essential technique for human behavior understanding. In this paper, we propose a human pose refinement network that estimates a refined pose from a tuple of an input... 详细信息
来源: 评论
Hierarchical Sparse Reconstruction Based Multi-feature Saliency for Target Detection in SAR images
Hierarchical Sparse Reconstruction Based Multi-feature Salie...
收藏 引用
Asian and Pacific conference on Synthetic Aperture Radar (APSAR)
作者: Lu Li Lan Du Zhaocheng Wang National Laboratory of Radar Signal Processing Xidian University Xi'an China
The utilization of clutter information is useful for target detection. However, the clutter statistical modeling, used in conventional constant false alarm rate (CFAR) methods, is usually difficult for a real syntheti...
来源: 评论
Feature Selection approach using KNN supervised learning for Content-Based image Retrieval
Feature Selection approach using KNN supervised learning for...
收藏 引用
First International conference of Intelligent Computing and Engineering (ICOICE)
作者: Fahd A. Alqasemi Hamza Q. Alabbasi Fathi G. Sabeha Ahmed Alawadhi Sanad Kahlid Ammar Zahary University of Science and Technology Yemen Sana'a Yemen Faculty of computer and IT Sana'a University And Faculty of Engineering and IT Azal University for Human Development Sana'a Yemen
Digital images have a serious influence over all the world, since, images have a very tangible importance, which impacts several people needs, this gave image retrieval researches this importance. So, Content-based im... 详细信息
来源: 评论
Open Source Dataset and Machine Learning Techniques for Automatic Recognition of Historical Graffiti  1
收藏 引用
25th International conference on Neural Information processing (ICONIP)
作者: Gordienko, Nikita Gang, Peng Gordienko, Yuri Zeng, Wei Alienin, Oleg Rokovyi, Oleksandr Stirenko, Sergii Natl Tech Univ Ukraine Igor Sikorsky Kyiv Polytech Inst Kiev Ukraine Huizhou Univ Sch Informat Sci & Technol Huizhou Peoples R China
Machine learning techniques are presented for automatic recognition of the historical letters (XI-XVIII centuries) carved on the stoned walls of St. Sophia cathedral in Kyiv (Ukraine). A new image dataset of these car... 详细信息
来源: 评论
image encryption using chaotic 3-D Arnold’s cat map and logistic map  2nd
Image encryption using chaotic 3-D Arnold’s cat map and log...
收藏 引用
2nd International conference on Computer Vision and image processing, CVIP 2017
作者: Musanna, Farhan Rani, Asha Kumar, Sanjeev Department of Mathematics IIT Roorkee Roorkee India Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee247667 India
image encryption is different from that of traditional texts or binary data because of some inherent properties of images such as large data capacity, i.e., enormous size and high redundancy (statistical and psycho-vi... 详细信息
来源: 评论
statistical Bayesian method for reliability evaluation based on ADT data  2
Statistical Bayesian method for reliability evaluation based...
收藏 引用
2nd International conference on Reliability Engineering (ICRE)
作者: Lu, Dawei Wang, Lizhi Sun, Yusheng Wang, Xiaohong Beihang Univ Sch Reliabil & Syst Engn Beijing Peoples R China Beihang Univ Unmanned Syst Inst Beijing Peoples R China
Accelerated degradation testing (ADT) is frequently conducted in the laboratory to predict the products' reliability under normal operating conditions. Two kinds of methods, degradation path models and stochastic ... 详细信息
来源: 评论