Author of the publication

Applying of Adaptive Threshold Non-maximum Suppression to Pneumonia Detection.

, , , , , and . BIC-TA (2), volume 1160 of Communications in Computer and Information Science, page 518-528. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ELM-based gene expression classification with misclassification cost., , , , and . Neural Comput. Appl., 25 (3-4): 525-531 (2014)Deep learning based classification of multi-label chest X-ray images via dual-weighted metric loss., , , and . Comput. Biol. Medicine, (May 2023)BCVehis: A Blockchain-Based Service Prototype of Vehicle History Tracking for Used-Car Trades in China., , , and . IEEE Access, (2020)Segmentation of Blood and Bone Marrow Cell Images via Learning by Sampling., , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 336-345. Springer, (2009)Vote Parallel SVM: An Extension of Parallel Support Vector Machine., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1942-1947. IEEE, (2018)Evaluating Ensemble Learning Impact on Gene Selection for Automated Cancer Diagnosis., and . Precision Health and Medicine, volume 843 of Studies in Computational Intelligence, Springer, (2020)Color image segmentation by fixation-based active learning with ELM., , , and . Soft Comput., 16 (9): 1569-1584 (2012)Management of Cross-enterprise Processes based on a Service-oriented Workflow Framework., , and . SMC, page 4682-4687. IEEE, (2006)Dual Dictionary Learning for Mining a Unified Feature Subspace between Different Hyperspectral Image Scenes., , , , and . IGARSS, page 1096-1099. IEEE, (2019)Identity authentication based on trajectory characteristics of mobile devices., , , , and . J. Syst. Archit., (2021)