Alert button
Picture for Karel Horak

Karel Horak

Alert button

Varroa destructor detection on honey bees using hyperspectral imagery

Add code
Bookmark button
Alert button
Mar 21, 2024
Zina-Sabrina Duma, Tomas Zemcik, Simon Bilik, Tuomas Sihvonen, Peter Honec, Satu-Pia Reinikainen, Karel Horak

Figure 1 for Varroa destructor detection on honey bees using hyperspectral imagery
Figure 2 for Varroa destructor detection on honey bees using hyperspectral imagery
Figure 3 for Varroa destructor detection on honey bees using hyperspectral imagery
Figure 4 for Varroa destructor detection on honey bees using hyperspectral imagery
Viaarxiv icon

Raspberry Pi Bee Health Monitoring Device

Add code
Bookmark button
Alert button
Apr 27, 2023
Jakub Nevlacil, Simon Bilik, Karel Horak

Figure 1 for Raspberry Pi Bee Health Monitoring Device
Figure 2 for Raspberry Pi Bee Health Monitoring Device
Figure 3 for Raspberry Pi Bee Health Monitoring Device
Figure 4 for Raspberry Pi Bee Health Monitoring Device
Viaarxiv icon

Towards Phytoplankton Parasite Detection Using Autoencoders

Add code
Bookmark button
Alert button
Mar 15, 2023
Simon Bilik, Daniel Baktrakhanov, Tuomas Eerola, Lumi Haraguchi, Kaisa Kraft, Silke Van den Wyngaert, Jonna Kangas, Conny Sjöqvist, Karin Madsen, Lasse Lensu, Heikki Kälviäinen, Karel Horak

Figure 1 for Towards Phytoplankton Parasite Detection Using Autoencoders
Figure 2 for Towards Phytoplankton Parasite Detection Using Autoencoders
Figure 3 for Towards Phytoplankton Parasite Detection Using Autoencoders
Figure 4 for Towards Phytoplankton Parasite Detection Using Autoencoders
Viaarxiv icon

Machine Learning and Computer Vision Techniques in Bee Monitoring Applications

Add code
Bookmark button
Alert button
Jul 29, 2022
Simon Bilik, Ondrej Bostik, Lukas Kratochvila, Adam Ligocki, Matej Poncak, Tomas Zemcik, Milos Richter, Ilona Janakova, Petr Honec, Karel Horak

Figure 1 for Machine Learning and Computer Vision Techniques in Bee Monitoring Applications
Figure 2 for Machine Learning and Computer Vision Techniques in Bee Monitoring Applications
Figure 3 for Machine Learning and Computer Vision Techniques in Bee Monitoring Applications
Figure 4 for Machine Learning and Computer Vision Techniques in Bee Monitoring Applications
Viaarxiv icon

SIFT and SURF based feature extraction for the anomaly detection

Add code
Bookmark button
Alert button
Mar 24, 2022
Simon Bilik, Karel Horak

Figure 1 for SIFT and SURF based feature extraction for the anomaly detection
Figure 2 for SIFT and SURF based feature extraction for the anomaly detection
Figure 3 for SIFT and SURF based feature extraction for the anomaly detection
Figure 4 for SIFT and SURF based feature extraction for the anomaly detection
Viaarxiv icon

Feature space reduction as data preprocessing for the anomaly detection

Add code
Bookmark button
Alert button
Mar 13, 2022
Simon Bilik, Karel Horak

Figure 1 for Feature space reduction as data preprocessing for the anomaly detection
Figure 2 for Feature space reduction as data preprocessing for the anomaly detection
Figure 3 for Feature space reduction as data preprocessing for the anomaly detection
Viaarxiv icon

Visual diagnosis of the Varroa destructor parasitic mite in honeybees using object detector techniques

Add code
Bookmark button
Alert button
Feb 26, 2021
Simon Bilik, Lukas Kratochvila, Adam Ligocki, Ondrej Bostik, Tomas Zemcik, Matous Hybl, Karel Horak, Ludek Zalud

Figure 1 for Visual diagnosis of the Varroa destructor parasitic mite in honeybees using object detector techniques
Figure 2 for Visual diagnosis of the Varroa destructor parasitic mite in honeybees using object detector techniques
Figure 3 for Visual diagnosis of the Varroa destructor parasitic mite in honeybees using object detector techniques
Figure 4 for Visual diagnosis of the Varroa destructor parasitic mite in honeybees using object detector techniques
Viaarxiv icon

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Add code
Bookmark button
Alert button
Apr 22, 2020
Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy

Figure 1 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 2 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 3 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 4 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Viaarxiv icon