Author of the publication

Real-Time Key Frame Extraction in a Low Lighting Condition.

, , , and . ISNN, volume 10878 of Lecture Notes in Computer Science, page 601-610. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Examination Paper Scores Calculation and Grades Analysis Based on OpenCV., , and . PRCV (3), volume 13536 of Lecture Notes in Computer Science, page 334-345. Springer, (2022)Image Recognition Using Local Features Based NNSC Model., , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 190-199. Springer, (2017)Image Super-resolution Reconstruction Utilizing the Combined Method of K-SVD and RAMP., , and . ICIC (1), volume 8588 of Lecture Notes in Computer Science, page 466-472. Springer, (2014)A Novel Ensemble Algorithm for Tumor Classification., , , , , and . ISNN (2), volume 7952 of Lecture Notes in Computer Science, page 292-298. Springer, (2013)Noise removal using a novel non-negative sparse coding shrinkage technique., , , and . Neurocomputing, 69 (7-9): 874-877 (2006)Inferring Transcriptional Modules from Microarray and ChIP-Chip Data Using Penalized Matrix Decomposition., , , and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 252-259. Springer, (2013)Background Subtraction with Superpixel and k-means., , , and . ICIC (2), volume 10955 of Lecture Notes in Computer Science, page 108-112. Springer, (2018)Dispersion constraint based non-negative sparse coding algorithm., , and . Neurocomputing, (2016)Real-Time Key Frame Extraction in a Low Lighting Condition., , , and . ISNN, volume 10878 of Lecture Notes in Computer Science, page 601-610. Springer, (2018)Depth Estimation of Face Images Based on the Constrained ICA Model., and . IEEE Trans. Inf. Forensics Secur., 6 (2): 360-370 (2011)