Coronation 发表于 2025-3-23 12:26:23

http://reply.papertrans.cn/24/2326/232530/232530_11.png

Autobiography 发表于 2025-3-23 14:27:54

http://reply.papertrans.cn/24/2326/232530/232530_12.png

perjury 发表于 2025-3-23 21:48:48

,Identification of Lung Cancer Nodules from CT Images Using 2D Convolutional Neural Networks,oach is to introduce computer-aided-diagnosis systems. Recently, deep learning approaches have outperformed other classification methods. In this paper, we use 2D convolutional neural networks to detect malignant nodules from CT scan images. We use modified . for the identification of lung cancer. .

infatuation 发表于 2025-3-24 02:09:59

A Pixel Dependent Adaptive Gamma Correction Based Image Enhancement Technique,lgorithms to increase colour accuracy, which have a number of drawbacks. This paper aims to formulate a novel approach to contrast correct through the use of indigenous pixel values of each individual channel. Allowing the gamma correction algorithm to have a larger pixel dependant intercept aids in

钱财 发表于 2025-3-24 04:14:26

http://reply.papertrans.cn/24/2326/232530/232530_15.png

sebaceous-gland 发表于 2025-3-24 08:58:37

TextUnet: Text Segmentation Using U-net,aning to the images they are extracted from. Text extraction from images comprises of three steps: Text Localization, Text Segmentation and Text Recognition. The intermediary step - text segmentation - plays a key role in determining the efficiency of the entire process as the quality of segmentatio

staging 发表于 2025-3-24 11:32:48

A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques,s the need of the hour in healthcare industry which can address and learn all the major causes of heart related issues before its actual occurrence. Therefore, accurate and quick prediction of HD is necessary in order to reduce the mortality rate. There are lots of risk factors associated with HD. T

Dealing 发表于 2025-3-24 15:57:31

http://reply.papertrans.cn/24/2326/232530/232530_18.png

得意人 发表于 2025-3-24 22:57:33

Impact of Security in Blockchain Based Real Time Applications,me highly secure cryptographic techniques as well as intrusion detection systems emerged to solve such issues. Because of centralization many of the time it has been recorded that intrusion within the system occurred and people bears huge loss of financial and confidential data. In this paper, it is

Amplify 发表于 2025-3-25 00:59:37

Conference proceedings 2022binatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments..
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Computational Intelligence in Pattern Recognition; Proceedings of CIPR Asit Kumar Das,Janmenjoy Nayak,Danilo Pelusi Conference proceedings