nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abnormal activity detection using shear transformed spatio-temporal regions at the surveillance network edge
|
George, Michael |
|
|
|
37-38 |
p. 27511-27532 |
artikel |
2 |
A brightness-preserving two-dimensional histogram equalization method based on two-level segmentation
|
Cao, Qingjie |
|
|
|
37-38 |
p. 27091-27114 |
artikel |
3 |
Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding
|
Chuang, Jun-Chou |
|
|
|
37-38 |
p. 28189-28205 |
artikel |
4 |
Advancing an in-memory computing for a multi-accent real-time voice frequency recognition modeling: a comprehensive study of models & mechanism
|
Tariq, Usman |
|
|
|
37-38 |
p. 27705-27720 |
artikel |
5 |
A fast CU size decision algorithm for VVC intra prediction based on support vector machine
|
Chen, Fen |
|
|
|
37-38 |
p. 27923-27939 |
artikel |
6 |
A modified method for image encryption based on chaotic map and genetic algorithm
|
Ghazvini, Mahdieh |
|
|
|
37-38 |
p. 26927-26950 |
artikel |
7 |
An AAC steganography scheme for adaptive embedding with distortion minimization model
|
Zhang, Zhenyu |
|
|
|
37-38 |
p. 27777-27790 |
artikel |
8 |
An airlight estimation method for image dehazing based on gray projection
|
Wang, Wencheng |
|
|
|
37-38 |
p. 27185-27203 |
artikel |
9 |
Analysis of traditional and modern image encryption algorithms under realistic ambience
|
Malik, Anjali |
|
|
|
37-38 |
p. 27941-27993 |
artikel |
10 |
An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling
|
Farwa, Shabieh |
|
|
|
37-38 |
p. 28225-28238 |
artikel |
11 |
An efficient single image haze removal algorithm for computer vision applications
|
Saxena, Gaurav |
|
|
|
37-38 |
p. 28239-28263 |
artikel |
12 |
A new approach for data stream classification: unsupervised feature representational online sequential extreme learning machine
|
Aydogdu, Ozge |
|
|
|
37-38 |
p. 27205-27227 |
artikel |
13 |
A new image segmentation method based on the ICSO-ISPCNN model
|
Liang, Jianhui |
|
|
|
37-38 |
p. 28131-28154 |
artikel |
14 |
A novel discrete image encryption algorithm based on finite algebraic structures
|
Shah, Dawood |
|
|
|
37-38 |
p. 28023-28042 |
artikel |
15 |
A novel hyper-chaotic image encryption with sparse-representation based compression
|
Karmakar, J |
|
|
|
37-38 |
p. 28277-28300 |
artikel |
16 |
A review on face recognition systems: recent approaches and challenges
|
Oloyede, Muhtahir O. |
|
|
|
37-38 |
p. 27891-27922 |
artikel |
17 |
A review on performance,security and various biometric template protection schemes for biometric authentication systems
|
Sarkar, Arpita |
|
|
|
37-38 |
p. 27721-27776 |
artikel |
18 |
A robust tracker integrating particle filter into correlation filter framework
|
Liu, Weirong |
|
|
|
37-38 |
p. 28431-28452 |
artikel |
19 |
A smart approach for fire prediction under uncertain conditions using machine learning
|
Sharma, Richa |
|
|
|
37-38 |
p. 28155-28168 |
artikel |
20 |
Attentive boundary aware network for multi-scale skin lesion segmentation with adversarial training
|
Wei, Zenghui |
|
|
|
37-38 |
p. 27115-27136 |
artikel |
21 |
Audio watermarking technique in frequency domain: comparative study MDCT Vs DCT
|
Bellaaj, Maha |
|
|
|
37-38 |
p. 27161-27184 |
artikel |
22 |
Automated malware recognition method based on local neighborhood binary pattern
|
Tuncer, Turker |
|
|
|
37-38 |
p. 27815-27832 |
artikel |
23 |
Automated optimized classification techniques for magnetic resonance brain images
|
Elkorany, Ahmed S. |
|
|
|
37-38 |
p. 27791-27814 |
artikel |
24 |
Automatic reconstruction of deleted AVI video files composed of scattered and corrupted fragments
|
Lee, Wan Yeon |
|
|
|
37-38 |
p. 28355-28367 |
artikel |
25 |
Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding
|
Huang, Huiqing |
|
|
|
37-38 |
p. 28065-28078 |
artikel |
26 |
Color image encryption based on discrete trinion Fourier transform and random-multiresolution singular value decomposition
|
Yao, Qijun |
|
|
|
37-38 |
p. 27555-27581 |
artikel |
27 |
Color vision deficiency datasets & recoloring evaluation using GANs
|
Li, Hongsheng |
|
|
|
37-38 |
p. 27583-27614 |
artikel |
28 |
Combining an information-maximization-based attention mechanism and illumination invariance theory for the recognition of green apples in natural scenes
|
Sun, Sashuang |
|
|
|
37-38 |
p. 28301-28327 |
artikel |
29 |
Convolutional neural networks for relevance feedback in content based image retrieval
|
Putzu, Lorenzo |
|
|
|
37-38 |
p. 26995-27021 |
artikel |
30 |
Correction to: A low delay rate control method for screen content coding
|
Tang, Tong |
|
|
|
37-38 |
p. 28475 |
artikel |
31 |
Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm
|
Huang, Rong |
|
|
|
37-38 |
p. 27483-27509 |
artikel |
32 |
Deep feature extraction and classification of breast ultrasound images
|
Kriti, |
|
|
|
37-38 |
p. 27257-27292 |
artikel |
33 |
Deep learning neural network for texture feature extraction in oral cancer: enhanced loss function
|
Bhandari, Bishal |
|
|
|
37-38 |
p. 27867-27890 |
artikel |
34 |
Deep siamese network for limited labels classification in source camera identification
|
Sameer, Venkata Udaya |
|
|
|
37-38 |
p. 28079-28104 |
artikel |
35 |
Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing
|
Zhang, Yu-lei |
|
|
|
37-38 |
p. 27075-27090 |
artikel |
36 |
Designing S-boxes triplet over a finite chain ring and its application in RGB image encryption
|
Jahangir, Saria |
|
|
|
37-38 |
p. 26885-26911 |
artikel |
37 |
Detection of Mesangial hypercellularity of MEST-C score in immunoglobulin A-nephropathy using deep convolutional neural network
|
Purwar, Shikha |
|
|
|
37-38 |
p. 27683-27703 |
artikel |
38 |
EEG based emotion recognition using fusion feature extraction method
|
Gao, Qiang |
|
|
|
37-38 |
p. 27057-27074 |
artikel |
39 |
Efficient vehicular content delivery
|
Cai, Shaohao |
|
|
|
37-38 |
p. 28043-28063 |
artikel |
40 |
Enhancing image retrieval for complex queries using external knowledge sources
|
Samih, Haitham |
|
|
|
37-38 |
p. 27633-27657 |
artikel |
41 |
Experimental analogy of different texture feature extraction techniques in image retrieval systems
|
Dhingra, Shefali |
|
|
|
37-38 |
p. 27391-27406 |
artikel |
42 |
Face recognition using non-negative matrix factorization with a single sample per person in a large database
|
Nikan, F. |
|
|
|
37-38 |
p. 28265-28276 |
artikel |
43 |
Fuzzy ELM for classification based on feature space
|
Chu, Yonghe |
|
|
|
37-38 |
p. 27439-27464 |
artikel |
44 |
HybridGAN: hybrid generative adversarial networks for MR image synthesis
|
Chen, Jia |
|
|
|
37-38 |
p. 27615-27631 |
artikel |
45 |
Image retrieval based on AND/OR-construction models
|
Huang, Yin-Fu |
|
|
|
37-38 |
p. 27293-27320 |
artikel |
46 |
MOTF: Multi-objective Optimal Trilateral Filtering based partial moving frame algorithm for image denoising
|
Rejeesh M R, |
|
|
|
37-38 |
p. 28411-28430 |
artikel |
47 |
Multi-scale dyadic filter modulation based enhancement and classification of medical images
|
Vidyarthi, Ankit |
|
|
|
37-38 |
p. 28105-28129 |
artikel |
48 |
Negotiation framework for group recommendation based on fuzzy computational model of trust and distrust
|
Choudhary, Nirmal |
|
|
|
37-38 |
p. 27337-27364 |
artikel |
49 |
Optimal wavelet transform using Oppositional Grey Wolf Optimization for video steganography
|
Suresh, Meenu |
|
|
|
37-38 |
p. 27023-27037 |
artikel |
50 |
Pain-attentive network: a deep spatio-temporal attention model for pain estimation
|
Huang, Dong |
|
|
|
37-38 |
p. 28329-28354 |
artikel |
51 |
Pedestrian localisation in the typical indoor environments
|
Kanrar, Soumen |
|
|
|
37-38 |
p. 27833-27866 |
artikel |
52 |
Potential of generative adversarial net algorithms in image and video processing applications– a survey
|
Sharma, Akanksha |
|
|
|
37-38 |
p. 27407-27437 |
artikel |
53 |
Pulse coupled neural network based on Harris hawks optimization algorithm for image segmentation
|
Jia, Heming |
|
|
|
37-38 |
p. 28369-28392 |
artikel |
54 |
Real-time tracking based on deep feature fusion
|
Pang, Yuhang |
|
|
|
37-38 |
p. 27229-27255 |
artikel |
55 |
Reversible data hiding in dual encrypted halftone images using matrix embedding
|
Sun, Yu-Xia |
|
|
|
37-38 |
p. 27659-27682 |
artikel |
56 |
RF channel management scheme for seamless multimedia service in 802.11 wireless networks
|
Jeon, Youchan |
|
|
|
37-38 |
p. 28207-28224 |
artikel |
57 |
Scene text detection using enhanced Extremal region and convolutional neural network
|
Naiemi, Fatemeh |
|
|
|
37-38 |
p. 27137-27159 |
artikel |
58 |
Semi-supervised learning for facial expression-based emotion recognition in the continuous domain
|
Choi, Dong Yoon |
|
|
|
37-38 |
p. 28169-28187 |
artikel |
59 |
Single target tracking via correlation filter and context adaptively
|
Bao, Hua |
|
|
|
37-38 |
p. 27465-27482 |
artikel |
60 |
Sketch-based facial recognition: a weighted component-based approach (WCBA)
|
Mangla, Fakhar Ullah |
|
|
|
37-38 |
p. 27533-27553 |
artikel |
61 |
Software HEVC video decoder: towards an energy saving for mobile applications
|
Sidaty, Naty |
|
|
|
37-38 |
p. 26861-26884 |
artikel |
62 |
Support vector machines based stereo matching method for advanced driver assistance systems
|
Kerkaou, Zakaria |
|
|
|
37-38 |
p. 27039-27055 |
artikel |
63 |
T-MAN: a neural ensemble approach for person re-identification using spatio-temporal information
|
Tagore, Nirbhay Kumar |
|
|
|
37-38 |
p. 28393-28409 |
artikel |
64 |
Two level data encoding approach for reversible data hiding in dual Stego images
|
Shaji, C. |
|
|
|
37-38 |
p. 26969-26993 |
artikel |
65 |
Video retrieval using salient foreground region of motion vector based extracted keyframes and spatial pyramid matching
|
Mallick, Ajay Kumar |
|
|
|
37-38 |
p. 27995-28022 |
artikel |
66 |
Voice liveness detection under feature fusion and cross-environment scenario
|
Garg, Sanjay |
|
|
|
37-38 |
p. 26951-26967 |
artikel |
67 |
Wavelet-Hadamard based blind image watermarking using genetic algorithm and decision tree
|
El Houby, Enas M. F. |
|
|
|
37-38 |
p. 28453-28474 |
artikel |
68 |
XwiseNet: action recognition with Xwise separable convolutions
|
Ling, Hefei |
|
|
|
37-38 |
p. 26913-26926 |
artikel |
69 |
Zero-shot recognition with latent visual attributes learning
|
Xie, Yurui |
|
|
|
37-38 |
p. 27321-27335 |
artikel |
70 |
Zone-based keyword spotting in Bangla and Devanagari documents
|
Bhunia, Ayan Kumar |
|
|
|
37-38 |
p. 27365-27389 |
artikel |