ARTÍCULO
TITULO

SHORT PAPERS - Video and Image Sequence Analysis - An Integrated Bayesian Approach to Layer Extraction from Image Sequences

Torr    
P H S    
Szeliski    
R    
Anandan    
P    

Resumen

No disponible

 Artículos similares

       
 
Jinseo Choi, Donghyeok An and Donghyun Kang    
With the advancement of deep learning (DL), researchers and engineers in the marine industry are exploring the application of DL technologies to their specific applications. In general, the accuracy of inference using DL technologies is significantly dep... ver más

 
Yu Tang, Zhiqin He, Qinmu Wu, Xiao Wang and Yuhang Wang    
The scoliosis report is a diagnosis made by the clinician looking at X-ray images of the spine. However, with numerous images, writing the report can be time-consuming and error-prone. Therefore, this paper proposes an automatic generation model of the e... ver más
Revista: Applied Sciences

 
Georgios Venitourakis, Christoforos Vasilakis, Alexandros Tsagkaropoulos, Tzouma Amrou, Georgios Konstantoulakis, Panagiotis Golemis and Dionysios Reisis    
Aiming at effectively improving photovoltaic (PV) park operation and the stability of the electricity grid, the current paper addresses the design and development of a novel system achieving the short-term irradiance forecasting for the PV park area, whi... ver más
Revista: Information

 
In-Hoi Koo, Keon-Hyeong Lee, Min-Su Kim, Hyung-Seok Han, Holak Kim and Jeong-Yeol Choi    
Fuel injection and mixing affect the characteristics of detonation initiation and propagation, as well as the propulsion performance of rotating detonation engine (RDE). A study on the injector is carried out in the present investigation. A rectangular-s... ver más
Revista: Aerospace

 
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed    
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h... ver más
Revista: Applied Sciences