Divakar Singh,Priyanka Singh,Riyanka Jena et al.
Divakar Singh et al.
The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or t...
Face mask detection and social distance monitoring system for COVID-19 pandemic [0.03%]
面向新冠肺炎疫情的口罩检测与社交距离监测系统
Iram Javed,Muhammad Atif Butt,Samina Khalid et al.
Iram Javed et al.
Coronavirus triggers several respirational infections such as sneezing, coughing, and pneumonia, which transmit humans to humans through airborne droplets. According to the guidelines of the World Health Organization, the spread of COVID-19...
Net activism and whistleblowing on YouTube: a text mining analysis [0.03%]
基于文本挖掘的YouTube网络活跃分子与告密者研究
Nicolas Turenne
Nicolas Turenne
Social media is more and more dominant in everyday life for people around the world. YouTube content is a resource that may be useful, in social computational science, for understanding key questions about society. Using this resource, we p...
Hao Yu,Jiaye Li,Zhaojiang Wu et al.
Hao Yu et al.
Crowdsourcing learning (Bonald and Combes 2016; Dawid and Skene, J R Stat Soc: Series C (Appl Stat), 28(1):20-28 1979; Karger et al. 2011; Li et al, IEEE Trans Knowl Data Eng, 28(9):2296-2319 2016; Liu et al. 2012; Schlagwein and Bjorn-Ande...
The effect of choosing optimizer algorithms to improve computer vision tasks: a comparative study [0.03%]
优化算法在计算机视觉任务中的应用效果研究:对比研究的方法及结论
Esraa Hassan,Mahmoud Y Shams,Noha A Hikal et al.
Esraa Hassan et al.
Optimization algorithms are used to improve model accuracy. The optimization process undergoes multiple cycles until convergence. A variety of optimization strategies have been developed to overcome the obstacles involved in the learning pr...
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map [0.03%]
基于增强的二维 Logistic 映射的纯图像相关半选择医学图像加密算法
Bin Zhang,Bahbibi Rahmatullah,Shir Li Wang et al.
Bin Zhang et al.
Modern medical examinations have produced a large number of medical images. It is a great challenge to transmit and store them quickly and securely. Existing solutions mainly use medical image encryption algorithms, but these encryption alg...
Recent developments on computer aided systems for diagnosis of diabetic retinopathy: a review [0.03%]
糖尿病视网膜病变计算机辅助诊断系统的新进展:综述研究
Shradha Dubey,Manish Dixit
Shradha Dubey
Diabetes is a long-term condition in which the pancreas quits producing insulin or the body's insulin isn't utilised properly. One of the signs of diabetes is Diabetic Retinopathy. Diabetic retinopathy is the most prevalent type of diabetes...
Osteoporosis diagnosis in knee X-rays by transfer learning based on convolution neural network [0.03%]
基于卷积神经网络迁移学习的膝关节X线骨质疏松症诊断方法研究
Insha Majeed Wani,Sakshi Arora
Insha Majeed Wani
Osteoporosis degrades the quality of bones and is the primary cause of fractures in the elderly and women after menopause. The high diagnostic and treatment costs urge the researchers to find a cost-effective diagnostic system to diagnose o...
A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms [0.03%]
基于增强型卷积神经网络和爬山算法的COVID-19 X光图像分类模型
Ashwini Kumar Pradhan,Debahuti Mishra,Kaberi Das et al.
Ashwini Kumar Pradhan et al.
The classification of medical images is significant among researchers and physicians for the early identification and clinical treatment of many disorders. Though, traditional classifiers require more time and effort for feature extraction ...
Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF [0.03%]
基于舒尔分解、LWT-DCT-SVD的DICOM图像鲁棒不可感知优化水印算法及其SURF认证方法
Divyanshu Awasthi,Vinay Kumar Srivastava
Divyanshu Awasthi
In this proposed work, a dual image watermarking algorithm is used to protect the data against copyright violations. In this work, the DICOM image is used as a host image. Two watermark images used are the MNNIT logo and the personal data o...