Dumagpi, J.K.[Joanna Kazzandra]
Co Author Listing * End-to-End Object Separation for Threat Detection in Large-Scale X-Ray Security Images
* New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images, A
Dumalski, A.[Andrzej]
Co Author Listing * Automatic Threat Detection for Historic Buildings in Dark Places Based on the Modified OptD Method
* Defect Detection of Historic Structures in Dark Places Based On The Point Cloud Analysis By Modified OPTD Method
* Determination of Terrain Profile from TLS Data by Applying Msplit Estimation
Includes: Dumalski, A.[Andrzej] Dumalski, A.
Duman, T.M.
Co Author Listing * Cooperative Precoding and Artificial Noise Design for Security Over Interference Channels
* Short Length Trellis-Based Codes for Gaussian Multiple-Access Channels
* Spectrally Efficient Alamouti Code Structure in Asynchronous Cooperative Systems
Dumane, V.A.
Co Author Listing * ROC analysis of ultrasound tissue characterization classifiers for breast cancer diagnosis
Dumas, B.[Bruno]
Co Author Listing * Intra-City Traffic Data Visualization: A Systematic Literature Review
Dumas, C.[Cedric]
Co Author Listing * Uninformative Frame Detection in Colonoscopy Through Motion, Edge and Color Features
Dumas, G.[Guillaume]
Co Author Listing * Automatic measure of imitation during social interaction: A behavioral and hyperscanning-EEG benchmark
Dumas, L.
Co Author Listing * 2d Sub-pixel Disparity Measurement Using Qpec / Medicis
* Ambiguity Concept In Stereo Matching Pipeline
* Ground Truth Generation and Disparity Estimation for Optical Satellite Imagery
Dumas, M.[Michel]
Co Author Listing * High Dynamic Range Imaging System for the Visually Impaired
Dumas, T.
Co Author Listing * Context-Adaptive Neural Network-Based Prediction for Image Compression
* Iterative Training of Neural Networks for Intra Prediction
Dumay, A.C.M.
Co Author Listing * Consistent inexact graph matching applied to labelling coronary segments in arteriograms
* Object Delineation in Noisy Images by a Modified Policy-Iteration Method