Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 239-241.
• Pattern Recognition & Image Processing • Previous Articles Next Articles
ZHOU Jian, XU Hai-qin
CLC Number:
[1]贾云得.机器视觉[M].北京:科学出版社,2000. [2]袁春兰,熊宗龙,周雪花,等.基于Sobel算子的图像边缘检测研究.激光与红外,2009,39(1):85-87. [3]解欢庆.改进的蚁群算法在图像边缘检测中的应用研究.兰州:兰州大学,2011. [4]AJENAGHUGHRURE I B,OGINI NICHOLAS O,ONYEKELI C O.Optimum Fuzzy based Image Edge Detection Algorithm[J].I.J.Image,Graphics and Signals Processing,2017(4):44-45. [5]XIE S N,TU Z W.Holistically-Nested Edge Detection[C]∥ The IEEE International Conference on Computer Vision (ICCV).2015:1395-1403. [6]COMANICIU D,MEER P.Mean Shift:A Robust Approach Toward Feature Space Analysis [J].IEEE Transactions on Pattern Analysis and Machine Intelligence (S0162-8828),2002,24(5):603-619. [7]李大威,徐立鸿,吴阳,等.一种迭代的核密度估计视觉目标检测算法.系统仿真学报,2013,25(3):558-564. [8]CHU C Y,HENDERSON D J,PARMETER C F.On discrete Epanechnikov kernel functions[J].Computational Statistics and Data Analysis,2017,116. |
[1] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[2] | XU Ru-li, HUANG Zhang-can, XIE Qin-qin, LI Hua-feng, ZHAN Hang. Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy [J]. Computer Science, 2022, 49(6): 231-237. |
[3] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
[4] | ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344. |
[5] | XIN Yuan-xue, SHI Peng-fei, XUE Rui-yang. Moving Object Detection Based on Region Extraction and Improved LBP Features [J]. Computer Science, 2021, 48(7): 233-237. |
[6] | ZHOU Jun, WANG Shuai, LIU Fan-yi. Research on Iris Recognition Algorithm Based on Wavelet Packet Decomposition [J]. Computer Science, 2021, 48(6A): 57-62. |
[7] | LIU Feng, WANG Yi-fan, YANG Jie, ZHOU Ai-min, QI Jia-yin. Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS [J]. Computer Science, 2021, 48(11): 46-53. |
[8] | WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65. |
[9] | WANG Xue-bing. Minimum Storage Regenerating Code with Variable Parameters [J]. Computer Science, 2020, 47(6A): 305-309. |
[10] | PENG Hao and HE Li-fang. Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm [J]. Computer Science, 2020, 47(6A): 220-225. |
[11] | CAO Yi-qin, DUAN Ye-yu, WU Dan. 2D-Otsu Rail Defect Image Segmentation Method Based on WFSOA [J]. Computer Science, 2020, 47(5): 154-160. |
[12] | CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49. |
[13] | LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232. |
[14] | DONG Chen, JI Shu-ting, ZHANG Hao-yu, LI Lei. Operational Visual Multi-secret Sharing Scheme for Threshold Structure [J]. Computer Science, 2020, 47(10): 322-326. |
[15] | ZHOU Yue-yong,CHENG Jiang-hua,LIU Tong,WANG Yang,CHEN Ming-hui. Review of Road Extraction for High-resolution SAR Images [J]. Computer Science, 2020, 47(1): 124-135. |
|