dblp: ICAIP 2017 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


ICAIP 2017: Bangkok, Thailand

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Object Detection and Pattern Recognition

Facun Zhang, Lijun Cui, Huaijun Wang:
Research on Children's Fall Detection by Characteristic Operator. 1-5

Ali Suryaperdana Agoes
, Zhencheng Hu, Nobutomo Matsunaga
:
Fine Tuning Based SqueezeNet for Vehicle Classification. 14-18

Shuai Fan, Ye Li, Zhen Yan, Lili Guo, Xianfeng Wang:
Vegetation Recognition based on Deep Learning with Feature Fusion. 19-23

Zusheng Chen, Daofang Zhang:
Road Marking Recognition Based on Gaussian-Hermite Moment. 24-27

Yanqiu Li, Fuji Ren, Min Hu, Xiaohua Wang:
A Fusion Decision Method Based on the Dynamic Fuzzy Density Assignment. 28-32

Min Hu, Wendi Teng, Yaona Zheng, Keke Zhang:
Method of Age Estimation Based on ML-GMM Feature and Double Layers Estimation Model. 33-38

Sajjad Seifozzakerini, Wei-Yun Yau, Kezhi Mao
:
Effect of Inhibitory Window on Event-Based Hough Transform for Multiple Lines Detection. 39-44
System Imaging and Simulation

Tzren-Ru Chou, Chi-Heng Hsieh:
Multispectral Imaging Based on Natural Neighbor Interpolation with Rendering under Various Illuminations. 45-49

Yupeng Chen, Yulin Xiang, Xiang Liu, Hao Zhan, Li Zhang:
Integrated Algorithm for Images Sequence Source of Spinning Mirror Volumetric Display. 54-57

Ruchire Eranga Wijesinghe, Hee-Young Jung, Mansik Jeon, Jeehyun Kim:
Optical Imaging Technique based Non-Destructive Volumetric Analysis for Biological and Industrial Materials. 58-61
Image Security and Encryption

Veena Mayya
, Aparna Nayak
:
Parallel Implementation of Rotation Visual Cryptography on GPU using CUDA. 62-65

Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System. 66-71

Wannida Sae-Tang, Hitoshi Kiya:
A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange. 72-77
Computer Vision and Image Processing

Yuichi Nonaka, Daisuke Yoshida, Takashi Yokota, Madoka Hasegawa, Kanemitsu Ootsu:
Image Denoising Based on Human Visual Characteristics. 78-84

Deepank Agarwal, Chirag Bhatia, Mithun Sai, Preety Singh, Rohit Hinduja:
A Comparison between Image Metadata and Visual Features to Classify Social Media Images. 85-89

Dmitry A. Konovalov
, Jose A. Domingos, C. Bajema, Ronald D. White, Dean R. Jerry
:
Ruler Detection for Automatic Scaling of Fish Images. 90-95

Boran Sekeroglu
, Adnan Khashman:
Performance Evaluation of Binarization Methods for Document Images. 96-102

Yongming Yang, Zhenzhou Wang:
An Efficient and Robust Stripe Extraction Method for Structured Light Measurement System. 103-107

Linh Tao, Tinh Nguyen, Hiroshi Hasegawa:
Parameter-Free Global Hybrid Point Based Range Image Registration. 108-112

Yingbo Zhou, Ifeoma Nwogu
:
Learning to Generate High Resolution Images with Bilateral Adversarial Networks. 113-117
Software Design and Development

Noel B. Linsangan
, Sandra Tirol:
Automation of Quantification Activities of Semiconductor: Backend Process Using Binary Search Algorithm. 118-122

Larry A. Vea, Miguel Ramon D. Mesina, Regine P. Toriaga, Nicole Joseph D. Padlan:
Development of an Intelligent Agent that Detects Student's Negative Affect while Making a Computer Program. 123-128

Junho Jeong
, Yunsik Son, Seman Oh:
The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness. 129-134

Saad B. Alotaibi:
ETDC: An Efficient Technique to Cleanse Data in the Data Warehouse. 135-138

Rajender Singh Chhillar
, Sonal Gahlot:
An Evolution of Software Metrics: A Review. 139-143

Elior Vila, Galia Novakova
, Diana Todorova:
Automation Testing Framework for Web Applications with Selenium WebDriver: Opportunities and Threats. 144-150

Muhammad Ali Fauzi
, Djoko Cahyo Utomo
, Budi Darma Setiawan, Eko Sakti Pramukantoro:
Automatic Essay Scoring System Using N-Gram and Cosine Similarity for Gamification Based E-Learning. 151-155

Heba A. Nassar, Aysh Alhroob
, Ayad Tareq Imam
:
An Algorithmic Approach for Sketching Sequence Diagram (AASSD). 156-160

Abdul Wahid Khan
, Muhammad Imran:
A Comparative Study of Critical Challenges of Outsourcing Contract Management Identified through SLR and Empirical Study. 161-164
Computer and Information Engineering

Masayuki Abe, Kiyoshi Nosu:
Video and Utterance Analysis of Male University Students Making Origami. 165-168

Pan Hu, Zhiyuan Wan:
Research on Virtual Assembly Sequence Optimization based on Genetic Algorithm. 169-173

Mariam Ibrahim Hamood Al-Karaawi, Huimin Ma
, Essam Fuoad Rasheed
:
The Role of the IT Capability and Knowledge Management in Product Design. 174-178

Fadratul Hafinaz Hassan
, Najihah Ibrahim
, Hoo Wah Kit, Rosni Abdullah:
Incorporating Genetic Algorithm Operators in Optimization Spatial Layout Design. 179-183

Santi Ritthiron, Arisara Jiamsanguanwong
:
Usability Evaluation of the University Library Network's Website Using an Eye-Tracking Device. 184-188

Mohammed A. Al-Sharafi
, Ruzaini Abdullah Arshah
, Emad A. Abu-Shanab
:
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level. 189-194

Hael Al-bashiri
, Mansoor Abdullateef Abdulgabber
, Awanis M. Romli, Fadhl Hujainah
:
Collaborative Filtering Similarity Measures: Revisiting. 195-200

Jaewoo Chung, HaRim Jung, Ung-Mo Kim:
An Efficient Top-K Query Processing Method for Location Based Services. 201-204

Supannada Chotipant:
A System for Research Community Annotation. 205-209

Shuting Zhi, Xiaoge Li
, Jinan Zhang, Xian Fan, Liping Du, Zhongyang Li:
Aspects Opinion Mining Based on Word Embedding and Dependency Parsing. 210-215

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






