default search action
ICAIP 2017: Bangkok, Thailand
- Proceedings of the International Conference on Advances in Image Processing, ICAIP 2017, Bangkok, Thailand, August 25-27, 2017. ACM 2017, ISBN 978-1-4503-5295-6
Object Detection and Pattern Recognition
- Facun Zhang, Lijun Cui, Huaijun Wang:
Research on Children's Fall Detection by Characteristic Operator. 1-5 - Yongli Xu, Wei Xiong, Jia Liu:
A New Ship Target Detection Algorithm Based on SVM in High Resolution SAR Images. 6-13 - Ali Suryaperdana Agoes, Zhencheng Hu, Nobutomo Matsunaga:
Fine Tuning Based SqueezeNet for Vehicle Classification. 14-18 - Shuai Fan, Ye Li, Zhen Yan, Lili Guo, Xianfeng Wang:
Vegetation Recognition based on Deep Learning with Feature Fusion. 19-23 - Zusheng Chen, Daofang Zhang:
Road Marking Recognition Based on Gaussian-Hermite Moment. 24-27 - Yanqiu Li, Fuji Ren, Min Hu, Xiaohua Wang:
A Fusion Decision Method Based on the Dynamic Fuzzy Density Assignment. 28-32 - Min Hu, Wendi Teng, Yaona Zheng, Keke Zhang:
Method of Age Estimation Based on ML-GMM Feature and Double Layers Estimation Model. 33-38 - Sajjad Seifozzakerini, Wei-Yun Yau, Kezhi Mao:
Effect of Inhibitory Window on Event-Based Hough Transform for Multiple Lines Detection. 39-44
System Imaging and Simulation
- Tzren-Ru Chou, Chi-Heng Hsieh:
Multispectral Imaging Based on Natural Neighbor Interpolation with Rendering under Various Illuminations. 45-49 - Wei Dong, Tao Guo, Qi Chen:
A Matlab Tool for SAR Imaging Simulation of Ships. 50-53 - Yupeng Chen, Yulin Xiang, Xiang Liu, Hao Zhan, Li Zhang:
Integrated Algorithm for Images Sequence Source of Spinning Mirror Volumetric Display. 54-57 - Ruchire Eranga Wijesinghe, Hee-Young Jung, Mansik Jeon, Jeehyun Kim:
Optical Imaging Technique based Non-Destructive Volumetric Analysis for Biological and Industrial Materials. 58-61
Image Security and Encryption
- Veena Mayya, Aparna Nayak:
Parallel Implementation of Rotation Visual Cryptography on GPU using CUDA. 62-65 - Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System. 66-71 - Wannida Sae-Tang, Hitoshi Kiya:
A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange. 72-77
Computer Vision and Image Processing
- Yuichi Nonaka, Daisuke Yoshida, Takashi Yokota, Madoka Hasegawa, Kanemitsu Ootsu:
Image Denoising Based on Human Visual Characteristics. 78-84 - Deepank Agarwal, Chirag Bhatia, Mithun Sai, Preety Singh, Rohit Hinduja:
A Comparison between Image Metadata and Visual Features to Classify Social Media Images. 85-89 - Dmitry A. Konovalov, Jose A. Domingos, C. Bajema, Ronald D. White, Dean R. Jerry:
Ruler Detection for Automatic Scaling of Fish Images. 90-95 - Boran Sekeroglu, Adnan Khashman:
Performance Evaluation of Binarization Methods for Document Images. 96-102 - Yongming Yang, Zhenzhou Wang:
An Efficient and Robust Stripe Extraction Method for Structured Light Measurement System. 103-107 - Linh Tao, Tinh Nguyen, Hiroshi Hasegawa:
Parameter-Free Global Hybrid Point Based Range Image Registration. 108-112 - Yingbo Zhou, Ifeoma Nwogu:
Learning to Generate High Resolution Images with Bilateral Adversarial Networks. 113-117
Software Design and Development
- Noel B. Linsangan, Sandra Tirol:
Automation of Quantification Activities of Semiconductor: Backend Process Using Binary Search Algorithm. 118-122 - Larry A. Vea, Miguel Ramon D. Mesina, Regine P. Toriaga, Nicole Joseph D. Padlan:
Development of an Intelligent Agent that Detects Student's Negative Affect while Making a Computer Program. 123-128 - Junho Jeong, Yunsik Son, Seman Oh:
The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness. 129-134 - Saad B. Alotaibi:
ETDC: An Efficient Technique to Cleanse Data in the Data Warehouse. 135-138 - Rajender Singh Chhillar, Sonal Gahlot:
An Evolution of Software Metrics: A Review. 139-143 - Elior Vila, Galia Novakova, Diana Todorova:
Automation Testing Framework for Web Applications with Selenium WebDriver: Opportunities and Threats. 144-150 - Muhammad Ali Fauzi, Djoko Cahyo Utomo, Budi Darma Setiawan, Eko Sakti Pramukantoro:
Automatic Essay Scoring System Using N-Gram and Cosine Similarity for Gamification Based E-Learning. 151-155 - Heba A. Nassar, Aysh Alhroob, Ayad Tareq Imam:
An Algorithmic Approach for Sketching Sequence Diagram (AASSD). 156-160 - Abdul Wahid Khan, Muhammad Imran:
A Comparative Study of Critical Challenges of Outsourcing Contract Management Identified through SLR and Empirical Study. 161-164
Computer and Information Engineering
- Masayuki Abe, Kiyoshi Nosu:
Video and Utterance Analysis of Male University Students Making Origami. 165-168 - Pan Hu, Zhiyuan Wan:
Research on Virtual Assembly Sequence Optimization based on Genetic Algorithm. 169-173 - Mariam Ibrahim Hamood Al-Karaawi, Huimin Ma, Essam Fuoad Rasheed:
The Role of the IT Capability and Knowledge Management in Product Design. 174-178 - Fadratul Hafinaz Hassan, Najihah Ibrahim, Hoo Wah Kit, Rosni Abdullah:
Incorporating Genetic Algorithm Operators in Optimization Spatial Layout Design. 179-183 - Santi Ritthiron, Arisara Jiamsanguanwong:
Usability Evaluation of the University Library Network's Website Using an Eye-Tracking Device. 184-188 - Mohammed A. Al-Sharafi, Ruzaini Abdullah Arshah, Emad A. Abu-Shanab:
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level. 189-194 - Hael Al-bashiri, Mansoor Abdullateef Abdulgabber, Awanis M. Romli, Fadhl Hujainah:
Collaborative Filtering Similarity Measures: Revisiting. 195-200 - Jaewoo Chung, HaRim Jung, Ung-Mo Kim:
An Efficient Top-K Query Processing Method for Location Based Services. 201-204 - Supannada Chotipant:
A System for Research Community Annotation. 205-209 - Shuting Zhi, Xiaoge Li, Jinan Zhang, Xian Fan, Liping Du, Zhongyang Li:
Aspects Opinion Mining Based on Word Embedding and Dependency Parsing. 210-215
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.