Item talk:Q168587
From geokb
{
"OpenAlex": { "cited_by_count": 33486, "created_date": "2024-01-23", "description": "This cluster of papers covers topics related to digital image processing, artificial neural networks, and their applications in various fields such as cryptography, machine learning, computer vision, and data security. The use of MATLAB for digital image processing and the application of artificial neural networks for tasks like face recognition and traffic sign recognition are also prominent in this cluster.", "display_name": "Digital Image Processing and Artificial Neural Networks", "domain": { "id": "https://openalex.org/domains/3", "display_name": "Physical Sciences" }, "field": { "id": "https://openalex.org/fields/17", "display_name": "Computer Science" }, "id": "https://openalex.org/T13674", "ids": { "openalex": "https://openalex.org/T13674", "wikipedia": "https://en.wikipedia.org/wiki/Digital_image_processing" }, "keywords": [ "Digital Image Processing", "Artificial Neural Networks", "MATLAB", "Cryptography", "Machine Learning", "Computer Vision", "Big Data", "Face Recognition", "Data Security", "Traffic Sign Recognition" ], "siblings": [ { "id": "https://openalex.org/T12072", "display_name": "Active Learning in Machine Learning Research" }, { "id": "https://openalex.org/T12761", "display_name": "Adaptation to Concept Drift in Data Streams" }, { "id": "https://openalex.org/T10237", "display_name": "Advanced Cryptographic Schemes and Protocols" }, { "id": "https://openalex.org/T11307", "display_name": "Advances in Transfer Learning and Domain Adaptation" }, { "id": "https://openalex.org/T11689", "display_name": "Adversarial Robustness in Deep Learning Models" }, { "id": "https://openalex.org/T11512", "display_name": "Anomaly Detection in High-Dimensional Data" }, { "id": "https://openalex.org/T12805", "display_name": "Application of Fuzzy Cognitive Maps in Modeling" }, { "id": "https://openalex.org/T11975", "display_name": "Application of Genetic Programming in Machine Learning" }, { "id": "https://openalex.org/T13734", "display_name": "Artificial Intelligence and Expert Systems" }, { "id": "https://openalex.org/T13904", "display_name": "Artificial Intelligence and Technology Innovation" }, { "id": "https://openalex.org/T12260", "display_name": "Artificial Intelligence in Education and Technology" }, { "id": "https://openalex.org/T12128", "display_name": "Artificial Intelligence in Service Industry" }, { "id": "https://openalex.org/T10906", "display_name": "Artificial Intelligence Planning and Reasoning" }, { "id": "https://openalex.org/T12380", "display_name": "Authorship Attribution and User Profiling in Text" }, { "id": "https://openalex.org/T12262", "display_name": "Automated Detection of Hate Speech and Offensive Language" }, { "id": "https://openalex.org/T13083", "display_name": "Automatic Keyword Extraction from Textual Data" }, { "id": "https://openalex.org/T13629", "display_name": "Automatic Text Simplification and Readability Assessment" }, { "id": "https://openalex.org/T10639", "display_name": "Autonomic Computing and Self-Adaptive Systems" }, { "id": "https://openalex.org/T13623", "display_name": "Compilation and Analysis of Spoken Language Corpora" }, { "id": "https://openalex.org/T10951", "display_name": "Cryptanalysis of Block Ciphers and Hash Functions" }, { "id": "https://openalex.org/T11130", "display_name": "Cryptography and Error-Correcting Codes" }, { "id": "https://openalex.org/T13851", "display_name": "Cyberbiosecurity and Legal Implications of AI Technology" }, { "id": "https://openalex.org/T13898", "display_name": "Cybernetics and Information Theory" }, { "id": "https://openalex.org/T10637", "display_name": "Data Clustering Techniques and Algorithms" }, { "id": "https://openalex.org/T13702", "display_name": "Deep Learning Applications in Healthcare" }, { "id": "https://openalex.org/T12131", "display_name": "Deep Learning for Wireless Signal Classification" }, { "id": "https://openalex.org/T10862", "display_name": "Deep Learning in Medical Image Analysis" }, { "id": "https://openalex.org/T13559", "display_name": "Development and Application of Expert Systems" }, { "id": "https://openalex.org/T12031", "display_name": "Dialogue Act Modeling for Spoken Language Systems" }, { "id": "https://openalex.org/T11902", "display_name": "Effectiveness of Intelligent Tutoring Systems" }, { "id": "https://openalex.org/T14175", "display_name": "Enhancing E-Learning with Intelligent Agents and Analytics" }, { "id": "https://openalex.org/T13514", "display_name": "Experience-Based Knowledge Representation and Management" }, { "id": "https://openalex.org/T12026", "display_name": "Explainable Artificial Intelligence" }, { "id": "https://openalex.org/T13935", "display_name": "Fuzzy Computing and Intelligent Systems" }, { "id": "https://openalex.org/T11574", "display_name": "Game Artificial Intelligence Research" }, { "id": "https://openalex.org/T12814", "display_name": "Gaussian Processes in Machine Learning" }, { "id": "https://openalex.org/T11273", "display_name": "Graph Neural Network Models and Applications" }, { "id": "https://openalex.org/T11652", "display_name": "Handling Imbalanced Data in Classification Problems" }, { "id": "https://openalex.org/T14351", "display_name": "Inductive Modeling in Scientific Research" }, { "id": "https://openalex.org/T14413", "display_name": "Knowledge Base Graph Embedding for Visual Question Answering" }, { "id": "https://openalex.org/T11424", "display_name": "Language-based Information Flow Security" }, { "id": "https://openalex.org/T11303", "display_name": "Learning and Inference in Bayesian Networks" }, { "id": "https://openalex.org/T12535", "display_name": "Learning with Noisy Labels in Machine Learning" }, { "id": "https://openalex.org/T11010", "display_name": "Logic Programming and Knowledge Representation" }, { "id": "https://openalex.org/T13018", "display_name": "Machine Learning for Earthquake Early Warning Systems" }, { "id": "https://openalex.org/T11598", "display_name": "Machine Learning for Internet Traffic Classification" }, { "id": "https://openalex.org/T12157", "display_name": "Machine Learning for Mineral Prospectivity Mapping" }, { "id": "https://openalex.org/T14064", "display_name": "Machine Learning in Smart Healthcare" }, { "id": "https://openalex.org/T11276", "display_name": "Machine Learning Methods for Solar Radiation Forecasting" }, { "id": "https://openalex.org/T10456", "display_name": "Methods and Techniques for Agent-Based Modeling" }, { "id": "https://openalex.org/T11901", "display_name": "Model-Based Clustering with Mixture Models" }, { "id": "https://openalex.org/T11550", "display_name": "Multi-label Text Classification in Machine Learning" }, { "id": "https://openalex.org/T10028", "display_name": "Natural Language Processing" }, { "id": "https://openalex.org/T10320", "display_name": "Neural Network Fundamentals and Applications" }, { "id": "https://openalex.org/T14381", "display_name": "Neuro-Symbolic Networks in Automation and Robotics" }, { "id": "https://openalex.org/T11612", "display_name": "Optimization Methods in Machine Learning" }, { "id": "https://openalex.org/T13567", "display_name": "Optimization of Big Data Processing and Analysis" }, { "id": "https://openalex.org/T10711", "display_name": "Particle Filtering and Nonlinear Estimation Methods" }, { "id": "https://openalex.org/T12611", "display_name": "Photonic Reservoir Computing for Neural Computation" }, { "id": "https://openalex.org/T10764", "display_name": "Privacy-Preserving Techniques for Data Analysis and Machine Learning" }, { "id": "https://openalex.org/T10126", "display_name": "Program Analysis and Verification Techniques" }, { "id": "https://openalex.org/T10682", "display_name": "Quantum Computing and Simulation" }, { "id": "https://openalex.org/T10020", "display_name": "Quantum Information and Computation" }, { "id": "https://openalex.org/T10462", "display_name": "Reinforcement Learning Algorithms" }, { "id": "https://openalex.org/T14335", "display_name": "Robotics Programming Education for Students" }, { "id": "https://openalex.org/T13650", "display_name": "Scientific Computing and Data Analysis with Python" }, { "id": "https://openalex.org/T10215", "display_name": "Semantic Web and Ontology Development" }, { "id": "https://openalex.org/T10664", "display_name": "Sentiment Analysis and Opinion Mining" }, { "id": "https://openalex.org/T10201", "display_name": "Speech Recognition Technology" }, { "id": "https://openalex.org/T13398", "display_name": "Statistical Computing and Data Analysis in R" }, { "id": "https://openalex.org/T10181", "display_name": "Statistical Machine Translation and Natural Language Processing" }, { "id": "https://openalex.org/T10100", "display_name": "Swarm Intelligence Optimization Algorithms" }, { "id": "https://openalex.org/T11269", "display_name": "Text Compression and Indexing Algorithms" }, { "id": "https://openalex.org/T13062", "display_name": "Theoretical Framework of Cognitive Informatics and Computational Intelligence" }, { "id": "https://openalex.org/T12676", "display_name": "Theory and Applications of Extreme Learning Machines" }, { "id": "https://openalex.org/T10820", "display_name": "Type-2 Fuzzy Logic Systems and Applications" } ], "subfield": { "id": "https://openalex.org/subfields/1702", "display_name": "Artificial Intelligence" }, "updated_date": "2024-08-19T06:07:45.295340", "works_count": 38603, "oa_id": "T13674" }
}