prosthesis 发表于 2025-3-27 00:19:57

A Novel Keypoints-Based Image Registration Method with Fully Convolutional Neural Networkty of key-points detection will greatly affect the performance of image registration. In this paper, we use the fully convolutional neural network to perform key-points detection and feature extraction on the image, which is applied to the registration. Experiments show that the proposed method achi

笨拙的我 发表于 2025-3-27 03:11:47

http://reply.papertrans.cn/17/1623/162277/162277_32.png

轻触 发表于 2025-3-27 08:17:40

http://reply.papertrans.cn/17/1623/162277/162277_33.png

esthetician 发表于 2025-3-27 09:28:39

Optimization and Parallelization of the Cosmological N-Body Simulation on Many-Core Processorsential problems, including the distribution of matter in the universe, the formation of galaxies, dark matter and dark energy, etc. [.]. Thus, the transplantation and application of the N-body simulation software on the Sunway TaihuLight platform are of great significance. In order to enhance the e

Budget 发表于 2025-3-27 15:43:42

http://reply.papertrans.cn/17/1623/162277/162277_35.png

为现场 发表于 2025-3-27 21:36:31

Chinese News Data Extraction System Based on Readability Algorithmalysis industry or to meet the data needs of artificial intelligence domain model training. The purpose of this article is to build an efficient data extraction system for Chinese news data collection. First, we will introduce the development of the field of network data collection, review the previ

Cpap155 发表于 2025-3-28 00:42:58

http://reply.papertrans.cn/17/1623/162277/162277_37.png

狗舍 发表于 2025-3-28 05:54:21

http://reply.papertrans.cn/17/1623/162277/162277_38.png

Grating 发表于 2025-3-28 08:26:33

http://reply.papertrans.cn/17/1623/162277/162277_39.png

daredevil 发表于 2025-3-28 12:08:31

A Robust Framework for High-Quality Voice Conversion with Conditional Generative Adversarial Networke of training speech data, but on a small dataset, DNN suffers from the overfitting problem, resulting in performance degradation. Recently, many generative adversarial network (GAN) based VC methods have been developed, which prove to be a promising approach. However, the quality and similarity of
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu