Author of the publication

A registration algorithm for the infrared and visible images of apple based on active contour model.

, , , , , , , and . Vis. Comput., 40 (4): 2833-2855 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT information sharing security mechanism based on blockchain technology., , , , and . Future Gener. Comput. Syst., (2019)One Secure Attribute-Based Proxy Signature., , and . Wireless Personal Communications, 103 (2): 1273-1283 (2018)Provable secure attribute-based proxy signature., , , and . J. Intell. Fuzzy Syst., 38 (1): 337-343 (2020)A registration algorithm for the infrared and visible images of apple based on active contour model., , , , , , , and . Vis. Comput., 40 (4): 2833-2855 (April 2024)MSF-CSPNet: A Specially Designed Backbone Network for Faster R-CNN., , , , , and . IEEE Access, (2024)A secure cross-domain interaction scheme for blockchain-based intelligent transportation systems., , , , , and . PeerJ Comput. Sci., (2023)Secure Attribute-based Threshold Signature without a Trusted Central Authority., and . J. Comput., 7 (12): 2899-2905 (2012)A hierarchical game approach on real-time navigation scheduling of agricultural harvesters., , , , and . Comput. Electron. Agric., (2019)Application of improved multidimensional spatial data mining algorithm in agricultural informationization., , , and . J. Intell. Fuzzy Syst., 38 (2): 1359-1369 (2020)Analysis of Socket Communication Technology Based on Machine Learning Algorithms Under TCP/IP Protocol in Network Virtual Laboratory System., , , , and . IEEE Access, (2019)