咨询与建议

限定检索结果

文献类型

  • 680 篇 会议
  • 309 篇 期刊文献
  • 35 册 图书
  • 21 篇 学位论文
  • 1 篇 专利

馆藏范围

  • 1,046 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 680 篇 工学
    • 363 篇 计算机科学与技术...
    • 237 篇 电气工程
    • 128 篇 软件工程
    • 98 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 58 篇 电子科学与技术(可...
    • 55 篇 仪器科学与技术
    • 53 篇 机械工程
    • 47 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 23 篇 测绘科学与技术
    • 18 篇 生物工程
    • 14 篇 交通运输工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 土木工程
    • 12 篇 环境科学与工程(可...
    • 8 篇 建筑学
  • 232 篇 理学
    • 122 篇 物理学
    • 64 篇 数学
    • 24 篇 生物学
    • 22 篇 系统科学
    • 14 篇 统计学(可授理学、...
    • 11 篇 地球物理学
    • 7 篇 化学
    • 7 篇 天文学
  • 107 篇 医学
    • 81 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 13 篇 特种医学
  • 54 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
  • 14 篇 农学
  • 7 篇 艺术学
  • 6 篇 法学
  • 3 篇 文学
  • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 208 篇 image processing
  • 80 篇 image segmentati...
  • 71 篇 signal processin...
  • 60 篇 feature extracti...
  • 47 篇 image color anal...
  • 42 篇 cameras
  • 42 篇 algorithm design...
  • 40 篇 real-time system...
  • 40 篇 image reconstruc...
  • 38 篇 algorithms
  • 37 篇 image edge detec...
  • 32 篇 computer vision
  • 29 篇 graphics process...
  • 26 篇 field programmab...
  • 23 篇 hardware
  • 22 篇 computer archite...
  • 22 篇 visualization
  • 21 篇 classification a...
  • 21 篇 image quality
  • 20 篇 optimization

机构

  • 3 篇 tianjin normal u...
  • 3 篇 samara national ...
  • 3 篇 fraunhofer inst ...
  • 3 篇 institute of ima...
  • 3 篇 univ publ navarr...
  • 3 篇 nanyang technol ...
  • 2 篇 bialystok tech u...
  • 2 篇 华中科技大学
  • 2 篇 medical engineer...
  • 2 篇 北京交通大学
  • 2 篇 sandia natl labs...
  • 2 篇 departure of com...
  • 2 篇 college of compu...
  • 2 篇 georgia inst tec...
  • 2 篇 university of te...
  • 2 篇 air force res la...
  • 2 篇 national aerospa...
  • 2 篇 tufts univ dept ...
  • 2 篇 auckland univ te...
  • 2 篇 university of pi...

作者

  • 4 篇 yang jie
  • 4 篇 agaian sos
  • 3 篇 jimenez edward s...
  • 3 篇 bustince humbert...
  • 3 篇 marchuk v.i.
  • 3 篇 wetzstein gordon
  • 3 篇 voronin v.v.
  • 3 篇 millie pant
  • 3 篇 gonzalez-hidalgo...
  • 2 篇 tanaka deniol
  • 2 篇 henning t.
  • 2 篇 bonnefoy m.
  • 2 篇 samavedham laksh...
  • 2 篇 jia zhenhong
  • 2 篇 hagelberg j.
  • 2 篇 koch martin a.
  • 2 篇 egiazarian k.o.
  • 2 篇 marius mircea ba...
  • 2 篇 moeller-nilsson ...
  • 2 篇 wildi f.

语言

  • 1,003 篇 英文
  • 35 篇 中文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 俄文
检索条件"任意字段=Image Processing: Algorithms and Systems XIV 2016"
1046 条 记 录,以下是71-80 订阅
排序:
A component-driven distributed framework for real-time video dehazing
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2018年 第9期77卷 11259-11276页
作者: Wang, Meihua Mai, Jiaming Liang, Yun Cai, Ruichu Fu, Tom Zhengjia Zhang, Zhenjie South China Agr Univ Coll Math & Informat Guangzhou Guangdong Peoples R China Guangdong Univ Technol Sch Comp Sci & Technol Guangzhou Guangdong Peoples R China Illinois Singapore Pte Ltd Adv Digital Sci Ctr Singapore Singapore
Traditional dehazing techniques, as a well studied topic in image processing, are now widely used to eliminate the haze effects from individual images. However, the state-of-the-art dehazing algorithms may not provide... 详细信息
来源: 评论
Secure Surveillance Framework for IoT systems Using Probabilistic image Encryption
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2018年 第8期14卷 3679-3689页
作者: Muhammad, Khan Hamza, Rafik Ahmad, Jamil Lloret, Jaime Wang, Haoxiang Baik, Sung Wook Sejong Univ Digital Contents Res Inst Intelligent Media Lab Seoul 143747 South Korea Univ Batna 2 Dept Comp Sci Batna 05078 Algeria Univ Politecn Valencia Inst Inves Gest Integrada Zonas Costeras E-46022 Valencia Spain GoPercept Lab Ithaca NY USA Cornell Univ Ithaca NY 14853 USA
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by intelligent integration of video summarization and image encryption. First, an efficient video summarization method is used t... 详细信息
来源: 评论
Adaptive threshold method for recovered images of FMT
收藏 引用
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS image SCIENCE AND VISION 2018年 第2期35卷 256-261页
作者: Yi, Huangjian Wei, Hongna Peng, Jinye Hou, Yuqing He, Xiaowei Northwest Univ Sch Informat Sci & Technol Xian 710069 Shaanxi Peoples R China
This paper proposes a post-processing strategy for recovered images of fluorescence molecular tomography. A threshold value is adaptively obtained from the recovered images without external interference, which is obje... 详细信息
来源: 评论
image steganography using uncorrelated color space and its application for security of visual contents in online social networks
收藏 引用
FUTURE GENERATION COMPUTER systems-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 86卷 951-960页
作者: Muhammad, Khan Sajjad, Muhammad Mehmood, Irfan Rho, Seungmin Baika, Sung Wook Sejong Univ Intelligent Media Lab Digital Contents Res Inst Coll Elect & Informat Engn Seoul South Korea Islamia Coll Peshawar Dept Comp Sci Digital Image Proc Lab Peshawar Pakistan Sejong Univ Dept Comp Sci & Engn Seoul South Korea Sungkyul Univ Dept Media Software Anyang South Korea
image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to on... 详细信息
来源: 评论
Edge Computing Framework for Cooperative Video processing in Multimedia IoT systems
收藏 引用
IEEE TRANSACTIONS ON MULTIMEDIA 2018年 第5期20卷 1126-1139页
作者: Long, Changchun Cao, Yang Jiang, Tao Zhang, Qian Huazhong Univ Sci & Technol Sch Elect Informat & Commun Wuhan 430074 Hubei Peoples R China Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Peoples R China
Multimedia Internet-of-Things (IoT) systems have been widely used in surveillance, automatic behavior analysis and event recognition, which integrate image processing, computer vision, and networking capabilities. In ... 详细信息
来源: 评论
2D Logistic-Sine-coupling map for image encryption
收藏 引用
SIGNAL processing 2018年 149卷 148-161页
作者: Hua, Zhongyun Jin, Fan Xu, Binxuan Huang, Hejiao Harbin Inst technol Shenzhen Grad Sch Sch Comp Sci & Technol Shenzhen 518055 Peoples R China
image encryption is a straightforward strategy to protect digital images by transforming images into un-recognized ones. The chaos theory is a widely used technology for image encryption as it has many significant pro... 详细信息
来源: 评论
Internal Fusion Functions
收藏 引用
IEEE TRANSACTIONS ON FUZZY systems 2018年 第2期26卷 487-503页
作者: Paternain, Daniel Campion, Maria Jesus Mesiar, Radko Perfilieva, Irina Bustince, Humberto Univ Publ Navarra Dept Automat & Computac Pamplona 31006 Spain Univ Publ Navarra Inst Smart Cities Pamplona 31006 Spain Univ Publ Navarra Dept Matemat Pamplona 31006 Spain Univ Publ Navarra Inst Adv Res Business & Econ Pamplona 31006 Spain Univ Ostrava Inst Res & Applicat Fuzzy Modelling NSC IT4Innovat CZ-70103 Ostrava Czech Republic Slovak Univ Technol Bratislava Dept Math & Descript Geometry Fac Civil Engn Bratislava 81107 Slovakia
In this paper, we investigate a mechanism for fusing a set of inputs (values) in such a way that the procedure does not create new information during the process. In order to do so, we introduce internal fusion functi... 详细信息
来源: 评论
Efficient image Secret Sharing Using Parallel processing for Row-Wise Encoding and Decoding  3rd
Efficient Image Secret Sharing Using Parallel Processing for...
收藏 引用
3rd International Conference on Intelligent Computing and Applications (ICICA)
作者: Patil, Sonali D. Pimpri Chinchwad Coll Engn Dept Comp Engn Pune 411044 Maharashtra India
Secret sharing plays a vital role in secure transmission of secret information in the form of images. Majority of the secret sharing algorithms are build using Lagrange's Interpolation due its information theoreti... 详细信息
来源: 评论
Monitoring and Detection of Combustible Gas Leakage by Using Infrared Imaging
Monitoring and Detection of Combustible Gas Leakage by Using...
收藏 引用
IEEE International Conference on Imaging systems and Techniques (IST)
作者: Liu, Binglu Ma, Haocheng Zheng, Xiaoping Peng, Lihui Xiao, Anshan Tsinghua Univ Dept Automat Beijing Peoples R China Res Inst Safety Engn State Key Lab Safety & Control Chem Qingdao Peoples R China
In this paper, an infrared thermal imaging system is developed for combustible gas leakage monitoring and detection. The related imaging processing and gas leakage detection algorithms are presented. The gas leakage m... 详细信息
来源: 评论
A critique of some rough approximations of the DCT  22
A critique of some rough approximations of the DCT
收藏 引用
Signal processing - algorithms, Architectures, Arrangements, and Applications (SPA)
作者: Parfieniuk, Marek Park, Sang Yoon Bialystok Tech Univ Fac Comp Sci Wiejska 45a PL-15351 Bialystok Poland Myongji Univ Dept Elect Engn Yongin 17058 South Korea
Recently, rough approximations of the Discrete Cosine Transform (DCT) have been proposed that can be implemented as multiplier-less, low-area, and low-power circuits. Promoters of such algorithms considered simpler an... 详细信息
来源: 评论