[1] |
CHEN Zuozan, XU Bing, DING Xiaojun, GAN Jingzhong.
Natural Scene Text Recognition Based on Encoder-Decoder Framework with Dual Supervision Mechanism
[J]. Computer Engineering and Applications, 2022, 58(6): 128-133.
|
[2] |
LIU Yanju, YI Xinhai, LI Yange, ZHANG Huiyu, LIU Yanzhong.
Application of Scene Text Recognition Technology Based on Deep Learning:A Survey
[J]. Computer Engineering and Applications, 2022, 58(4): 52-63.
|
[3] |
CHEN Yaya, LIU Quanxiang, WANG Kaili, YI Yaohua.
Historical Chinese Seal Text Recognition Based on ResNet and Transfer Learning
[J]. Computer Engineering and Applications, 2022, 58(10): 125-131.
|
[4] |
ZHAO Fan, ZHANG Lin, WEN Zhiquan, YANG Linlin, LIN Guangfeng.
Direct and Efficient Natural Scene Chinese Character Approaching Spotting Method
[J]. Computer Engineering and Applications, 2021, 57(6): 159-167.
|
[5] |
WANG Deqing, Wushouer·Silamu, XU Miaomiao.
Review of Research on Scene Text Recognition Technology
[J]. Computer Engineering and Applications, 2020, 56(18): 1-15.
|
[6] |
QIU Ningjia, SHEN Zhuorui, WANG Hui, WANG Peng.
Semi-supervised Learning Optimization Algorithm for Communication Spam Text Recognition
[J]. Computer Engineering and Applications, 2020, 56(17): 121-128.
|
[7] |
WANG Zhe, YANG Pengfei, YANG Yaru, YAO Rong, YANG Xiong, LI Haifang.
Multi-Feature Fusion Based Deep Network for Image Semantic Recognition
[J]. Computer Engineering and Applications, 2019, 55(24): 141-146.
|
[8] |
YIN Fang1,2, ZHENG Liang1, CHEN Tiantian1.
Chinese text localization based on Adaboost algorithm in natural images
[J]. Computer Engineering and Applications, 2017, 53(4): 200-204.
|
[9] |
WU Xueyan, WANG Shuihua, ZHANG Yudong.
Survey on theory and application of k-Nearest-Neighbors algorithm
[J]. Computer Engineering and Applications, 2017, 53(21): 1-7.
|
[10] |
CHEN Pei, CHENG Zhongzhen, XU Peng, YANG Yongjie.
Intelligent monitoring system for aluminum production
[J]. Computer Engineering and Applications, 2017, 53(14): 222-226.
|
[11] |
GUI Yajun1, WU Xiaopei1, ZHANG Chao1, LV Zhao1, WAN Mengshi1, WANG Yingguan2.
Indoor intelligent monitoring system with fusion of audio and video
[J]. Computer Engineering and Applications, 2017, 53(1): 220-226.
|
[12] |
LUO Jun, WANG Hong, LI Wensheng.
Research on eventual consistency of NoSQL database based on vector clocks model
[J]. Computer Engineering and Applications, 2013, 49(23): 100-102.
|
[13] |
FAN Yutao1, SU Guiping2.
Formal analysis method suitable to security protocols with timestamp
[J]. Computer Engineering and Applications, 2012, 48(36): 116-120.
|
[14] |
ZHANG Xiaoliang,JIN Cong,GUO Jinglei.
Copyright protection scheme for determining scope of tamper person
[J]. Computer Engineering and Applications, 2011, 47(5): 111-113.
|
[15] |
QI Xin,ZHANG Chun-ming.
Research of replica consistency model based on timestamp for data grids
[J]. Computer Engineering and Applications, 2010, 46(4): 104-106.
|