標(biāo)題: Titlebook: Computational Vision and Robotics; Proceedings of ICCVR Ishwar K. Sethi Conference proceedings 2015 Springer India 2015 Automation and Robo [打印本頁(yè)] 作者: panache 時(shí)間: 2025-3-21 19:31
書目名稱Computational Vision and Robotics影響因子(影響力)
書目名稱Computational Vision and Robotics影響因子(影響力)學(xué)科排名
書目名稱Computational Vision and Robotics網(wǎng)絡(luò)公開(kāi)度
書目名稱Computational Vision and Robotics網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Computational Vision and Robotics被引頻次
書目名稱Computational Vision and Robotics被引頻次學(xué)科排名
書目名稱Computational Vision and Robotics年度引用
書目名稱Computational Vision and Robotics年度引用學(xué)科排名
書目名稱Computational Vision and Robotics讀者反饋
書目名稱Computational Vision and Robotics讀者反饋學(xué)科排名
作者: 愉快么 時(shí)間: 2025-3-21 20:49 作者: 橢圓 時(shí)間: 2025-3-22 00:25
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/c/image/233214.jpg作者: 不真 時(shí)間: 2025-3-22 07:50 作者: 占線 時(shí)間: 2025-3-22 12:47
Inner Product Spaces over a Field,BF, inverse multi-quadratic RBF and Gaussian RBF for the reconstruction of blurred images. Simulations and mathematical comparisons show that Gaussian RBF gives better result with respect to the other RBF methods for images reconstruction in artificial neural network.作者: Firefly 時(shí)間: 2025-3-22 14:25
https://doi.org/10.1007/978-1-4614-5811-1?W each. For efficient energy management, a charging system is designed. The charging is independent of the vehicle movement. Two batteries are used so that one is charging, while other is discharging. A charge controller is also designed so as to provide direct power supply to the connected load in case both batteries fail.作者: Firefly 時(shí)間: 2025-3-22 19:38 作者: forager 時(shí)間: 2025-3-23 00:55 作者: 刀鋒 時(shí)間: 2025-3-23 01:25 作者: lethargy 時(shí)間: 2025-3-23 07:24 作者: 煩憂 時(shí)間: 2025-3-23 11:20
https://doi.org/10.1007/978-94-017-3194-2process of automatically discovering useful information in knowledgebase. It also provides capabilities to predict the outcome of future solutions. Case-based reasoning is a tool or method to predict error level with respect to LOC and development time in software module. This paper presents some ne作者: 暖昧關(guān)系 時(shí)間: 2025-3-23 16:13 作者: 險(xiǎn)代理人 時(shí)間: 2025-3-23 20:57 作者: osteoclasts 時(shí)間: 2025-3-23 22:45 作者: 話 時(shí)間: 2025-3-24 05:23 作者: Agility 時(shí)間: 2025-3-24 07:44 作者: CROAK 時(shí)間: 2025-3-24 14:20 作者: heterodox 時(shí)間: 2025-3-24 17:30 作者: groggy 時(shí)間: 2025-3-24 20:35 作者: capsule 時(shí)間: 2025-3-25 01:16 作者: 清唱?jiǎng)?nbsp; 時(shí)間: 2025-3-25 06:36 作者: ANTIC 時(shí)間: 2025-3-25 07:45
Inner Product Spaces over a Field,BF, inverse multi-quadratic RBF and Gaussian RBF for the reconstruction of blurred images. Simulations and mathematical comparisons show that Gaussian RBF gives better result with respect to the other RBF methods for images reconstruction in artificial neural network.作者: Chemotherapy 時(shí)間: 2025-3-25 13:07
Scalable Key Distribution Schemes,tep in the process of iris recognition is accurate iris localization. As it significantly affect the further processing of feature extraction and template matching stages. Traditional algorithms work efficiently and accurately in localizing iris from eye images taken in constrained environmental con作者: 個(gè)阿姨勾引你 時(shí)間: 2025-3-25 19:13 作者: thalamus 時(shí)間: 2025-3-25 23:33 作者: Corroborate 時(shí)間: 2025-3-26 03:48
Comparative Analysis of Image Deblurring with Radial Basis Functions in Artificial Neural Network,BF, inverse multi-quadratic RBF and Gaussian RBF for the reconstruction of blurred images. Simulations and mathematical comparisons show that Gaussian RBF gives better result with respect to the other RBF methods for images reconstruction in artificial neural network.作者: Contort 時(shí)間: 2025-3-26 06:23 作者: 填滿 時(shí)間: 2025-3-26 10:28 作者: 胎兒 時(shí)間: 2025-3-26 12:40 作者: Valves 時(shí)間: 2025-3-26 19:06
Machine Learning and Its Application in Software Fault Prediction with Similarity Measures, have used different similarity measures to find the best method that increases the correctness. The present work is also credited through introduction of some new terms such as coefficient of efficiency, i.e., developer’s ability and normalizer. In order to obtain the result, we have used indigenou作者: 翻動(dòng) 時(shí)間: 2025-3-26 21:49
Multiscale Local Binary Patterns for Facial Expression-Based Human Emotion Recognition,tested with benchmark dataset from JAFFE facial expression database. The experimental results of the proposed techniques are effective toward facial expression recognition and outperform other methods.作者: AROMA 時(shí)間: 2025-3-27 02:32
Development of a New Algorithm Based on SVD for Image Watermarking,t, we propose to encrypt and embed the singular values of the watermark image instead of original singular values. RSA algorithm has been used for the encryption process. Peak signal-to-noise ratio (PSNR) is used to measure the imperceptibility of the proposed schemes. The simulation result shows it作者: Fillet,Filet 時(shí)間: 2025-3-27 06:10
Nonlinear System Identification Using Clonal Particle Swarm Optimization-based Functional Link Artipaces are enlarged, and the diversity of the cloned particles is increased to avoid trapping in local minima. The simulation study reveals the superiority of the proposed C-PSO-based FLANN model, in terms of the convergence rate, over other competitive networks. The performance comparison is also ca作者: Repatriate 時(shí)間: 2025-3-27 12:56 作者: 喚醒 時(shí)間: 2025-3-27 17:32 作者: 類型 時(shí)間: 2025-3-27 21:48 作者: Explosive 時(shí)間: 2025-3-27 22:27
https://doi.org/10.1007/978-94-017-3194-2 have used different similarity measures to find the best method that increases the correctness. The present work is also credited through introduction of some new terms such as coefficient of efficiency, i.e., developer’s ability and normalizer. In order to obtain the result, we have used indigenou作者: extinguish 時(shí)間: 2025-3-28 02:59 作者: Arthritis 時(shí)間: 2025-3-28 09:14
Conclusions: The Politics of Symbolism,t, we propose to encrypt and embed the singular values of the watermark image instead of original singular values. RSA algorithm has been used for the encryption process. Peak signal-to-noise ratio (PSNR) is used to measure the imperceptibility of the proposed schemes. The simulation result shows it作者: 微粒 時(shí)間: 2025-3-28 12:41
The Symbolic Regimes and Nation Building,paces are enlarged, and the diversity of the cloned particles is increased to avoid trapping in local minima. The simulation study reveals the superiority of the proposed C-PSO-based FLANN model, in terms of the convergence rate, over other competitive networks. The performance comparison is also ca作者: 鼓掌 時(shí)間: 2025-3-28 18:16
Conference proceedings 2015age Fusion, CT and MRI Image Fusion based on Stationary Wavelet Transform. The book also covers articles from applications of soft computing techniques such as Target Searching and Tracking using Particle Swarm Optimization, PSO-based Functional Artificial Neural Network, etc. The book also covers a作者: 鞠躬 時(shí)間: 2025-3-28 19:48 作者: Sedative 時(shí)間: 2025-3-28 23:36
Use of Different Features for Emotion Recognition Using MLP Network,tempt is taken to recognise two classes of speech emotions as high arousal like angry and surprise and low arousal like sad and bore. Linear prediction coefficients (LPC), linear prediction cepstral coefficient (LPCC), Mel frequency cepstral coefficient (MFCC) and perceptual linear prediction (PLP) 作者: 結(jié)果 時(shí)間: 2025-3-29 04:36
Rectangular Array Languages Generated by a Petri Net, labeled with catenation rule is enabled to fire only when all the input places of the transition have the same array as token. In Column row catenation Petri net structure, the firing rules differ. A transition labeled with catenation rule is enabled to fire even when different input places of the 作者: 碎片 時(shí)間: 2025-3-29 10:55 作者: 臨時(shí)抱佛腳 時(shí)間: 2025-3-29 12:04 作者: 洞察力 時(shí)間: 2025-3-29 18:05
Various Strategies and Technical Aspects of Data Mining: A Theoretical Approach,acting interest from not only researchers but also from the commercial world. The utility of data mining in commerce is more interesting than perhaps research areas. This has also raised many debates such as rights of privacy, legality and ethics, and rights to non-disclosure of information. It has 作者: 導(dǎo)師 時(shí)間: 2025-3-29 20:08
CBDF-Based Target Searching and Tracking Using Particle Swarm Optimization, to reach up to target without collide with obstacle, or it may be used in the places where some source is needed to find. Here nature inspired PSO algorithm is used to solve this problem with the help of multi robot system. Use of multi robots will find the target fast. Here new concept clustering 作者: 打包 時(shí)間: 2025-3-30 02:37
Real-Time Noise Canceller Using Modified Sigmoid Function RLS Algorithm,rmed using TMS320C6713 processor with code composer studio (CCS) v3.1. The performance of RLS and MSRLS algorithms is evaluated and compared for noisy signals with car noise, F16 noise, and babble noise at ?5, 0, and 5?dB SNR levels. The proposed MSRLS algorithm has shown a maximum of 2.03?dB improv作者: 外露 時(shí)間: 2025-3-30 07:45
Multiscale Local Binary Patterns for Facial Expression-Based Human Emotion Recognition,acial expression recognition and presented a system framework. The framework consists of three modules: image processing, facial features extraction, and facial expression recognition. The face preprocessing component is implemented by cropping the facial area from images. The detected face is downs作者: 偉大 時(shí)間: 2025-3-30 10:25 作者: 草率男 時(shí)間: 2025-3-30 15:55 作者: Seizure 時(shí)間: 2025-3-30 20:31
A Steganography Scheme Using SVD Compressed Cover Image,of steganography technique is to use any meaningful uncompressed multimedia like image or video as a carrier. The Internet comprises limited channel bandwidth so multimedia data like image or video are considered as a compressed form before their transmission through Internet. So in this paper, we h作者: 在駕駛 時(shí)間: 2025-3-30 21:35 作者: elucidate 時(shí)間: 2025-3-31 03:36
Multi-robot Area Exploration Using Particle Swarm Optimization with the Help of CBDF-based Robot Scng field for researches. This paper presents a new method for multi-robot area exploration. Here, first the environment is divided into partition. In each partition, the robot is deployed randomly. Each partition is explored separately by robot. For the movement of robots, well-known particle swarm 作者: recession 時(shí)間: 2025-3-31 08:55
,R–D Optimization of EED-based Compressed Image Using Linear Regression, The performance is driven by the trade-off between rate (R), distortion (D), and complexity of the coding algorithm. This piece of work deals with the simple yet effective method of image-dependent R–D optimization by optimizing the cost function of the constrained Lagrangian multiplier. A simple l作者: deviate 時(shí)間: 2025-3-31 09:54 作者: aerobic 時(shí)間: 2025-3-31 13:36
A Hybrid Approach for Iris Recognition in Unconstrained Environment,tep in the process of iris recognition is accurate iris localization. As it significantly affect the further processing of feature extraction and template matching stages. Traditional algorithms work efficiently and accurately in localizing iris from eye images taken in constrained environmental con作者: 飛行員 時(shí)間: 2025-3-31 17:49 作者: 托運(yùn) 時(shí)間: 2025-4-1 00:39 作者: Clinch 時(shí)間: 2025-4-1 04:16 作者: 談判 時(shí)間: 2025-4-1 06:58 作者: 緊張過(guò)度 時(shí)間: 2025-4-1 10:32 作者: 先兆 時(shí)間: 2025-4-1 14:50 作者: Concrete 時(shí)間: 2025-4-1 22:23
The Symbolic Regimes and Nation Building,cret message was embedded into compressed image components where the coefficients were not selected in sequence order. So in the proposed work, a straightforward message extraction process will not be applicable. We have tested the proposed scheme on some standard test images and satisfactory results were achieved.