Abstract is missing.
- A Weak Target Enhancement Method in the Bearing Time RecordingJianfeng Tao. 1-6 [doi]
- Denoising of Smart-phone based Fringe Projection Image using Curvelet TransformPingzheng Wang, Mingguang Shan, Zhihu Yin. 7-11 [doi]
- An Adaptive Pointwise P-norm Regularization for Image DeconvolutionBinbin Ma, Xiyuan Hu, Silong Peng. 12-16 [doi]
- Self-Quotient Image based CNN: A Basic Image Processing assisting Convolutional Neural NetworkXingrun Xing, Min Dong, Cheng Bi, Lin Yang. 17-21 [doi]
- Research on Digital Animation Performance of Guanzhong Architectural Stone CarvingPeng Chen, Yuxiao Liu. 22-26 [doi]
- Image Segmentation Technology Based on Genetic AlgorithmChong Tan, Ying Sun 0004, Gongfa Li, Bo Tao, Shuang Xu, Fei Zeng. 27-31 [doi]
- An Automatic Analysis Method for Seabed Mineral Resources Based on Image Brightness EqualizationXinliang Ma, Zhiwei He, Jiye Huang, Yanhui Dong, ChuFeng you. 32-37 [doi]
- Hybrid CNNs: A Rotation Equivariant Framework for High Resolution Spherical ImagesWei Yu, Daren Zha, Nan Mu, Tianshu Fu. 38-42 [doi]
- Sparse Signal Recovery via Improved Sparse Adaptive Matching Pursuit AlgorithmLinyu Wang, Mingqi He, Jianhong Xiang. 43-48 [doi]
- A Series-parallel Mixed Structure FFT ProcessorHua Jiang, Wenkai Xu. 49-54 [doi]
- Finger Motion Estimation Based on Sparse Multi-Channel Surface Electromyography Signals Using Convolutional Neural NetworkKikuo Asai, Norio Takase. 55-59 [doi]
- An Improved Noise Elimination Model of EEG Based on Second Order Volterra FilterXia Wu, Yumei Zhang, Xiaojun Wu. 60-64 [doi]
- Hardware-accelerated Fast Lossless Compression Based on LZ4 AlgorithmJeehong Kim, Jundong Cho. 65-68 [doi]
- An Improved Blind Adaptive Beamforming CAB Algorithm Based on Fireworks Algorithm is PresentedJianhong Xiang, Junhao Wei, Hao Guo. 69-74 [doi]
- Brain Tumor Segmentation Using U-Net and Edge Contour EnhancementTe-Wei Ho, Huan Qi, Feipei Lai, Furen Xiao, Jin-Ming Wu. 75-79 [doi]
- Food Image Recognition for Price Calculation using Convolutional Neural NetworkMd. Jan Nordin, Ooi Wei Xin, Norshakirah Aziz. 80-85 [doi]
- Review: Genetic Algorithm Application in Gesture RecognitionMing-Chao Yu, Gongfa Li, Ying Sun 0004, Bo Tao, Shuang Xu, Fei Zeng. 86-90 [doi]
- Dynamic Fuzzy Inference System for Edge Detection of Stone InscriptionsJie Song, Jie Wang, Shanshan Li. 91-94 [doi]
- A Novel Method for Single Infrared Dim Small Target Detection Based on ROI extraction and Matrix RecoveryBin Xiong, Xinhan Huang, Min Wang 0002. 95-99 [doi]
- Face Recognition Based on FP-Growth Improved LBP OperatorSijie Long, Chengfeng Zheng, Canliu Wu, Tianyi Qi, Xiaojie Li, Yongsheng Zhu, Jingyi Liu, Jinwei Li, Jia Shuai, Zefeng Xie, Zhongyuan Chen, Hang Du. 100-103 [doi]
- Lingual and Acoustic Differences in EWE Oral and Nasal VowelsKowovi Comivi Alowonou, Jianguo Wei, Wenhuan Lu, Zhicheng Liu, Kiyoshi Honda, Jianwu Dang. 104-108 [doi]
- Study on the Drill of Maritime Rescue Oriented Modeling Method of Climate Background EnvironmentSha Chang, Xuyun Zhao, Bin Song, Yu Wang. 109-113 [doi]
- Vote-based Iris Detection SystemTong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Yik-Herng Khoo. 114-118 [doi]
- Color Watermarking based on DCT and YCbCr Color Space for Privacy Preservation in Smart CitiesLuis Rosales-Roldan, Angelina Espejel Trujillo, Mariko Nakano-Miyatake, Jinhui Chao. 119-123 [doi]
- Exploration and Mining of Multipurpose Cooperative Business DataJoventino T. Trinidad Jr. 124-127 [doi]
- Fast Auto-focusing in Dual-wavelength Digital Holography Using Critical SamplingXiaoxin Xie, Zhi Zhong. 128-132 [doi]
- Analyzing the Malnutrition Valuation on Legazpi City using Data AnalyticsRichard N. Monreal, Thelma D. Palaoag. 133-137 [doi]
- Embedding Based Cross-network User Identity Association TechnologyQianyuan Miao, Lei Wang, Dingyang Duan, Xiaobo Guo, Xiang Li. 138-143 [doi]
- Research on an Improved Algorithm of Professional Information Retrieval SystemHuajia Wang, Ruo Hu, Hong Xu. 144-146 [doi]
- Parametrized Garment Pattern Manipulation for the Men's SuitWonseop Lee, Hyeong-Seok Ko. 147-150 [doi]
- Applying the 3D Morphological Approach Using the Computer-Aided Product DesignTarek Ismail Mohamed. 151-156 [doi]
- Robustness Attacks on Video Watermarking Using Singular Value DecompositionGrace C.-W. Ting, Bok-Min Goi, Sze-Wei Lee. 157-162 [doi]