{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:34:56Z","timestamp":1730248496152,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740345","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:40:55Z","timestamp":1478796055000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Improving the Classifier Performance in Detecting People Based on Denoising Wavelet Transform"],"prefix":"10.1109","author":[{"given":"Lina","family":"Chato","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Latifi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2006.1689629"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref13","article-title":"Computer Vision Using Local Binary Patterns","author":"pietik\u00e4inen","year":"2011","journal-title":"Springer London"},{"key":"ref14","article-title":"Wavelet based image denoising technique","author":"sachin","year":"2011","journal-title":"International Journal of Advanced Computer Science and Applications 2 3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5121\/sipij.2015.6206"},{"key":"ref16","article-title":"Handbook: Wavelets and Their Applications","author":"michel","year":"2007","journal-title":"Iste London"},{"key":"ref17","article-title":"Medical image denoising in the wavelet domain using haar and DB3 filtering","author":"sidh","year":"2012","journal-title":"International Refereed Journal of Engineering and Science 1 1"},{"article-title":"Wavelets","year":"2006","author":"andreas","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-48551-6_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2015.7125357"},{"key":"ref3","first-page":"118","article-title":"Application of Kalman estimation techniques with fuzzy logic to a synchro digitizer","volume":"12","author":"sa'id","year":"2012","journal-title":"Iraqi Journal of Computers Communication and Control & Systems Engineering"},{"key":"ref6","first-page":"59","article-title":"Image denoising based on wavelet for IR images corrupted by Gaussian, Poisson & impulse noises","volume":"13","author":"islam","year":"0","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref5","first-page":"2319","article-title":"Medical image denoising in the wavelet domain using Haar and DB3 filtering","volume":"1","author":"sidhul","year":"2012","journal-title":"International Refereed Journal of Engineering and Science (IRJES)"},{"key":"ref8","article-title":"Multiple Moving Objects Detection and Tracking Using Discrete Wavelet Transform","author":"hsia","year":"2011","journal-title":"Biomedical Applications of the Discrete Wavelet Transform"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.091"},{"key":"ref2","first-page":"7432","article-title":"Application of wavelet techniques in ECG signal processing: an overview","volume":"3","author":"nagendra","year":"2011","journal-title":"International Journal of Engineering Science and Technology (IJEST)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.15676\/ijeei.2012.4.2.9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref20","article-title":"Denoising by Soft Thresholding","volume":"41","author":"donoho","year":"1992","journal-title":"IEEE Transactions on Information Theory"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740345.pdf?arnumber=7740345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T12:38:13Z","timestamp":1481114293000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7740345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740345","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}