參考文獻 |
[1] E. S. Lubana and R. P. Dick, "Digital Foveation: An Energy-Aware Machine Vision Framework," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11, pp. 2371-2380, Nov. 2018.
[2] T. Parakontan and W. Sawangsri, "Development of the Machine Vision System for Automated Inspection of Printed Circuit Board Assembl," 2019 3rd International Conference on Robotics and Automation Sciences (ICRAS), 2019, pp. 244-248.
[3] Yihong Xu and G. Nagy, "Prototype extraction and adaptive OCR," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 12, pp. 1280-1296, Dec. 1999.
[4] IBM, Endicott chronology,1961-1969:
https://www.ibm.com/ibm/history/exhibits/endicott/endicott_chronology1960.html
[5] T. Nasir, M. K. Malik and K. Shahzad, "MMU-OCR-21: Towards End-to-End Urdu Text Recognition Using Deep Learning," in IEEE Access.
[6] S. S. Lee, M. Shishibori and C. Y. Han, "Compression of Search Range of VP-Tree for Multimedia Data Retrieval Applications," 2012 Data Compression Conference, 2012, pp. 403-403.
[7] C. Gupta, G. Ozsoyoglu and Z. M. Ozsoyoglu, "Efficient k-word proximity search," 2009 24th International Symposium on Computer and Information Sciences, 2009, pp. 123-128.
[8] J. Tan et al., "3D-GLCM CNN: A 3-Dimensional Gray-Level Co-Occurrence Matrix-Based CNN Model for Polyp Classification via CT Colonography," in IEEE Transactions on Medical Imaging, vol. 39, no. 6, pp. 2013-2024, June 2020.
[9] Narayanan, Natarajan & Govindarajan, Suresh Kumar. (2014). Spatial moment analysis of solute transport with Langmuir sorption in a fracture-skin-matrix coupled system. Journal of King Saud University - Engineering Sciences. 23. 10.1016/j.jksues
.2014.04.003.
[10] L. Friedman and O. V. Komogortsev, "Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2528-2536, Oct. 2019.
[11] Á. Z. Kaló and M. L. Sipos, "Key-Value Pair Searhing System via Tesseract OCR and Post Processing," 2021 IEEE 19th World Symposium on Applied Machine Intelligence and Informatics (SAMI), 2021, pp. 000461-000464.
[12] S. S. Al-Amri, N. Kalyankar, and S. Khamitkar, "Image segmentation by using edge detection", International journal on computer science and engineering, vol. 2, no. 3, pp. 804-807, 2010.
[13] B. Su, S. Lu and C. L. Tan, "Combination of Document Image Binarization Techniques," 2011 International Conference on Document Analysis and Recognition, 2011, pp. 22-26.
[14] S. Allegretti, F. Bolelli and C. Grana, "Optimized Block-Based Algorithms to Label Connected Components on GPUs," in IEEE Transactions on Parallel and Distributed Systems, vol. 31, no. 2, pp. 423-438, 1 Feb. 2020.
[15] J. Meng, W. Zhang and C. Ma, "Classifying algorithm for watermarks based on mathematical morphology," 2018 Chinese Control And Decision Conference (CCDC), 2018, pp. 2985-2988.
[16] G. Bouleux, M. Dugast and E. Marcon, "Information Topological Characterization of Periodically Correlated Processes by Dilation Operators," in IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6484-6495, Oct. 2019.
[17] M. K. Mahto, K. Bhatia and R. K. Sharma, "Combined horizontal and vertical projection feature extraction technique for Gurmukhi handwritten character recognition," 2015 International Conference on Advances in Computer Engineering and Applications, 2015, pp. 59-65.
[18] F. Ma, X. -Y. Jing, X. Zhu, Z. Tang and Z. Peng, "True-Color and Grayscale Video Person Re-Identification," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 115-129, 2020.
[19] N. A. Golilarz, H. Gao, W. Ali and M. Shahid, "Hyper-Spectral Remote Sensing Image De-Noising with Three Dimensional Wavelet Transform Utilizing Smooth Nonlinear Soft Thresholding Function," 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2018, pp. 142-146.
[20] M. Rakhshanfar and M. A. Amer, "Low-Frequency Image Noise Removal Using White Noise Filter," 2018 25th IEEE International Conference on Image Processing (ICIP), 2018, pp. 3948-3952.
[21] A. Jiménez-Sánchez, G. Silva-Navarro and F. Beltrán-Carbajal, "Structural analysis of superficial cracks on structural elements," 2019 16th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2019, pp. 1-6.
[22] Y. Jung, J. Ko, S. Bae, Y. Kang, H. -S. Lee and D. Kim, "Effective Surface Texturing of Diamond-Wire-Sawn Multicrystalline Silicon Wafers Via Crystallization of the Native Surface Amorphous Layer," in IEEE Journal of Photovoltaics, vol. 11, no. 1, pp. 43-49, Jan. 2021, doi: 10.1109/JPHOTOV.2020.3035122.
[23] H. Esponda, E. Vázquez, M. A. Andrade and B. K. Johnson, "A Setting-Free Differential Protection for Power Transformers Based on Second Central Moment," in IEEE Transactions on Power Delivery, vol. 34, no. 2, pp. 750-759, April 2019.
[24] J. Flusser, T. Suk, J. Boldyš and B. Zitová, "Projection Operators and Moment Invariants to Image Blurring," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 37, no. 4, pp. 786-802, 1 April 2015, doi: 10.1109/TPAMI.2014.2353644.
[25] B. Zheng, H. Gao, X. Ma and X. Zhang, "Graph Partition Based on Dimensionless Similarity and Its Application to Fault Diagnosis," in IEEE Access, vol. 9, pp. 35573-35583, 2021.
[26] C. A. Rabbath, N. Hori and N. Lechevin, "Convergence of sampled-data models in digital redesign," in IEEE Transactions on Automatic Control, vol. 49, no. 5, pp. 850-855, May 2004.
[27] S. Eghbali, H. Ashtiani and L. Tahvildari, "Online Nearest Neighbor Search Using Hamming Weight Trees," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 7, pp. 1729-1740, 1 July 2020.
[28] Y. A. Malkov and D. A. Yashunin, "Efficient and Robust Approximate Nearest Neighbor Search Using Hierarchical Navigable Small World Graphs," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 4, pp. 824-836, 1 April 2020.
[29] W. Zhang, X. Chen, Y. Liu and Q. Xi, "A Distributed Storage and Computation k-Nearest Neighbor Algorithm Based Cloud-Edge Computing for Cyber-Physical-Social Systems," in IEEE Access, vol. 8, pp. 50118-50130, 2020.
[30] X. Gao and G. Li, "A KNN Model Based on Manhattan Distance to Identify the SNARE Proteins," in IEEE Access, vol. 8, pp. 112922-112931, 2020.
[31] P. Tabaghi, I. Dokmanić and M. Vetterli, "Kinetic Euclidean Distance Matrices," in IEEE Transactions on Signal Processing, vol. 68, pp. 452-465, 2020
[32] H. Q. Dinh, X. Wang and P. Maneejuk, "On the Hamming Distance of Repeated-Root Cyclic Codes of Length 6ps," in IEEE Access, vol. 8, pp. 39946-39958, 2020.
[33] Z. Liu, F. Chen and S. Duan, "Distributed Fast Supervised Discrete Hashing," in IEEE Access, vol. 7, pp. 90003-90011, 2019.
[34] J. K. Uhlmann, "Satisfying general proximity / similarity queries with metric trees," Information Processing Letters, vol. 40, no. 4, pp. 175-179, 1991/11/25/ 1991.
[35] J. P. Coon, M. Badiu, Y. Liu, F. Yarkin and S. Dang, "Binary-Tree Encoding for Uniform Binary Sources in Index Modulation Systems," in IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 6, pp. 1270-1285, Oct. 2019.
[36] S. Dai, L. Li and Z. Li, "Modeling Vehicle Interactions via Modified LSTM Models for Trajectory Prediction," in IEEE Access, vol. 7, pp. 38287-38296, 2019.
[37] R. David, "Grafcet: a powerful tool for specification of logic controllers," IEEE Transactions on Control Systems Technology, vol. 3, no. 3, pp. 253-268, 1995. |