JOT 发表于 2025-3-23 13:19:27

http://reply.papertrans.cn/17/1623/162267/162267_11.png

Aesthete 发表于 2025-3-23 16:33:38

http://reply.papertrans.cn/17/1623/162267/162267_12.png

ineffectual 发表于 2025-3-23 20:39:34

Enhanced Feature Fusion and Multiple Receptive Fields Object Detection,s scales. We compare the EM-CenterNet method with the baseline on the Pascal VOC and COCO datasets. Experiments show that our method increases the AP by 12.2% on the Pascal VOC dataset, and increases the AP by 5.9% on the COCO dataset.

字的误用 发表于 2025-3-23 22:55:07

An Image Enhancement Method Based on Multi-scale Fusion,lti-scale fusion of the two images with above processing. Experimental results show that the algorithm can solve the problem of distortion, and effectively improve the contrast and brightness in the image.

Engaging 发表于 2025-3-24 02:48:12

Content Extraction of Chinese Archive Images via Synthetic and Real Data,c archive images data set, we use the PP-OCR [.] model to finish the text structured extraction and YOLOv5 [.] to train a target detection model of ID photos, seals, and dates of birth to achieve the extraction of key elements. Since the real data set cannot be made public, we use ordinary archive data for explanation.

誓言 发表于 2025-3-24 09:57:40

http://reply.papertrans.cn/17/1623/162267/162267_16.png

非秘密 发表于 2025-3-24 10:40:27

http://reply.papertrans.cn/17/1623/162267/162267_17.png

抛媚眼 发表于 2025-3-24 16:30:13

https://doi.org/10.1007/978-981-19-1630-4re matched by point matching. Then, the EPnP improved by Perspective-n-Point (PnP) algorithm is used to complete the pose estimation of 3D object. Finally, we test the performance of our algorithm. The results show that our accuracy has reached the average level of the mainstream algorithms.

nugatory 发表于 2025-3-24 20:25:35

Initial, Boundary and Constraint Conditionsal Nash equilibrium of both sides is obtained based on game theory. The analysis shows that the proposed data intrusion tolerance quantification and adaptive intru- sion response model can provide theoretical basis and support for active defense of energy Internet data security under network attacks.

Engaging 发表于 2025-3-24 23:57:06

https://doi.org/10.1007/978-3-642-38739-5 normalize convolution kernels of different sizes. Besides, it innovatively optimizes the addition operation mode in the convolution kernels, realizes pipeline convolution calculation, shortens the image recognition time and increases the versatility of the convolution accelerator.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Robotics; 7th International Sy Shuo Yang,Huimin Lu Conference proceedings 2022 The Editor(s) (if applicable) an