All Articles

Investigation on the Excitation Function of Alpha Induced Reaction on 116-Cd in the Energy Range between 15 and 40 Mev

In this work, the alpha particle-induced reaction on Cadmium-116 in the energy range 20-40 MeV has been studied. The excitation function for the following reaction channels of this type have been studied in the energy range of 15 MeV-40 MeV are; 48-Cd-116(α, n) 50-Sn-119. This reaction has a total ...
More

Posted 1 month ago

HYBRID SCHEMES BASED ON WAVELET TRANSFORM AND CONVOLUTIONAL AUTO-ENCODER FOR IMAGE COMPRESSION

In recent years, image compression techniques have received a lot of attention from researchers as the number of images at hand keep growing. Digital Wavelet Transform is one of them that has been utilized in a wide range of applications and has shown its efficiency in image compression field. Moreo...
More

Posted 1 year ago

Convolutional Neural Network-Based Automated System for Dog Tracking and Emotion Recognition in Video Surveillance

This paper proposes a multi–convolutional neural network (CNN)-based system for the detection, tracking, and recognition of the emotions of dogs in surveillance videos. This system detects dogs in each frame of a video, tracks the dogs in the video, and recognizes the dogs’ emotions. The system ...
More

Posted 1 year ago

Memorable beginnings, but forgettable endings: Intrinsic scene memorability alters our subjective experience of time

Time is the fabric of experience — yet it is incredibly malleable in the mind of the observer: seeming to drag on, or fly right by at different moments. One of the most influential drivers of temporal distortions is attention, where heightened attention dilates subjective time. But an equally impo...
More

Posted 1 year ago

FitDepth: fast and lite 16-bit depth image compression algorithm

Abstract This article presents a fast parallel lossless technique and a lossy image compression technique for 16-bit single-channel images. Nowadays, such techniques are “a must” in robotics and other areas where several depth cameras are used. Since many of these algorithms need to be run in lo...
More

Posted 1 year ago

E2E-BPF microscope: Extended depth-of-field microscopy using learning-based implementation of binary phase filter and image deconvolution

Abstract Several image-based biomedical diagnoses require high-resolution imaging capabilities at large spatial scales. However, conventional microscopes exhibit an inherent trade-off between depth-of-field (DoF) and spatial resolution, and thus require objects to be refocused at each lateral locati...
More

Posted 1 year ago

Improving Chest X-ray Report Generation by Leveraging Text of Similar Images

Abstract Automatic medical report generation is the production of reports from radiology images that are grammatically correct and coherent. Encoder-decoder is the most common architecture for report generation, which has not achieved to a satisfactory performance because of the complexity of this t...
More

Posted 1 year ago

Robust Evidence C-Means Clustering Combining Spatial Information for Image Segmentation

Abstract Although evidence c-means clustering (ECM) based on evidence theory overcomes the limitations of fuzzy theory to some extent and improves the capability of fuzzy c-means clustering (FCM) to express and process the uncertainty of information, the ECM does not consider the spatial information...
More

Posted 1 year ago

Attention Inspiring Receptive-Fields Multi-Task Network via Self- supervised Learning for Violence Recognition

Abstract Generally, a large amount of training data is essential to train deep learning model for obtaining more accurate detection performance in computer vision domain. However, to collect and annotate datasets will lead to extensive cost. In this letter, we propose a self-supervised auxiliary tas...
More

Posted 1 year ago

Image-Based Malware Detection Using α-Cuts and Binary Visualisation

Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thanks to the adoption of Convolutional Neural Netw...
More

Posted 1 year ago

Showing Page 1 to 20