咨询与建议

限定检索结果

文献类型

  • 1,981 篇 会议
  • 92 篇 期刊文献
  • 28 册 图书
  • 5 篇 学位论文

馆藏范围

  • 2,106 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,453 篇 工学
    • 941 篇 计算机科学与技术...
    • 558 篇 电气工程
    • 325 篇 软件工程
    • 303 篇 信息与通信工程
    • 250 篇 控制科学与工程
    • 126 篇 测绘科学与技术
    • 111 篇 仪器科学与技术
    • 94 篇 航空宇航科学与技...
    • 67 篇 机械工程
    • 62 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 30 篇 生物医学工程(可授...
    • 29 篇 土木工程
    • 28 篇 建筑学
    • 28 篇 交通运输工程
    • 26 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 24 篇 材料科学与工程(可...
    • 14 篇 生物工程
    • 14 篇 网络空间安全
  • 657 篇 理学
    • 466 篇 物理学
    • 137 篇 数学
    • 56 篇 系统科学
    • 48 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 化学
  • 229 篇 医学
    • 224 篇 临床医学
  • 130 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 13 篇 军事学
  • 8 篇 经济学
  • 6 篇 农学
  • 4 篇 法学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 400 篇 sensor fusion
  • 176 篇 data fusion
  • 146 篇 wireless sensor ...
  • 118 篇 sensor data fusi...
  • 102 篇 sensors
  • 92 篇 image fusion
  • 83 篇 target tracking
  • 75 篇 information fusi...
  • 71 篇 sensor systems
  • 58 篇 sensor phenomena...
  • 58 篇 signal processin...
  • 53 篇 cameras
  • 52 篇 neural networks
  • 51 篇 clustering algor...
  • 47 篇 monitoring
  • 46 篇 surveillance
  • 46 篇 sensor networks
  • 45 篇 feature extracti...
  • 44 篇 robot sensing sy...
  • 44 篇 image processing

机构

  • 10 篇 syracuse univ de...
  • 6 篇 usn res lab wash...
  • 5 篇 university of ca...
  • 5 篇 penn state univ ...
  • 5 篇 fordham univ rob...
  • 4 篇 univ liverpool d...
  • 4 篇 21st century sys...
  • 4 篇 wright state uni...
  • 4 篇 school of logist...
  • 4 篇 nova res inc ale...
  • 4 篇 drexel univ dept...
  • 3 篇 clemson univ dep...
  • 3 篇 syracuse univ sy...
  • 3 篇 univ porto fac e...
  • 3 篇 villanova univ c...
  • 3 篇 xidian univ sch ...
  • 3 篇 battelle mem ins...
  • 3 篇 naval res lab wa...
  • 3 篇 warsaw univ tech...
  • 3 篇 univ calif los a...

作者

  • 14 篇 blasch erik
  • 11 篇 varshney pk
  • 9 篇 lyons damian m.
  • 9 篇 solaiman b
  • 8 篇 bosse eloi
  • 7 篇 hall david l.
  • 7 篇 hanebeck uwe d.
  • 6 篇 dasarathy bv
  • 6 篇 goebel k
  • 6 篇 dasarathy belur ...
  • 6 篇 aarabi p
  • 5 篇 nicholson d
  • 5 篇 nelson bn
  • 5 篇 llinas j
  • 5 篇 shirkhodaie amir
  • 5 篇 valin pierre
  • 5 篇 graham jacob l.
  • 5 篇 petrovic v
  • 5 篇 rimland jeffrey ...
  • 4 篇 hickman duncan l...

语言

  • 2,018 篇 英文
  • 72 篇 其他
  • 13 篇 中文
  • 3 篇 土耳其文
检索条件"任意字段=Conference on Sensor Fusion - Architectures, Algorithms, and Applications"
2106 条 记 录,以下是1151-1160 订阅
排序:
Embedding reactive hardware agents into heterogeneous sensor networks
Embedding reactive hardware agents into heterogeneous sensor...
收藏 引用
作者: Tapia, Dante I. Alonso, Ricardo S. Rodríguez, Sara De Paz, Juan F. González, Angélica Corchado, Juan M. Department of Informatics University of Salamanca Salamanca Spain
Information fusion systems can be improved by developing solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Wireless sensor Networks is a key technology for gather... 详细信息
来源: 评论
Revisiting key-swapping collusion attack on distributed sensor networks
Revisiting key-swapping collusion attack on distributed sens...
收藏 引用
4th International conference on sensor Technologies and applications, sensorCOMM 2010
作者: Tran, Thanh Dai Agbinya, Johnson I. Faculty of Engineering and Information Technology University of Technology Sydney Sydney NSW 2007 Australia
Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susceptible to key-swapping collusion attack aiming to subvert crucial applications that require cooperative efforts, e.g... 详细信息
来源: 评论
A wavelet-based demosaicking algorithm for embedded applications
A wavelet-based demosaicking algorithm for embedded applicat...
收藏 引用
2010 conference on Design and architectures for Signal and Image Processing, DASIP2010
作者: Courroux, Sébastien Guyetant, Stéphane Chevobbe, Stéphane Paindavoine, Michel CEA LIST Embedded Computing Laboratory Gif-sur-Yvette F-91191 France LEAD Laboratory Université de Bourgogne 21000 Dijon France
This paper presents an alternative to the spatial reconstruction of the sampled color filter array acquired through a digital image sensor. A demosaicking operation has to be applied to the raw image to recover the fu... 详细信息
来源: 评论
Learning a Detection Map for a Network of Unattended Ground sensors
Learning a Detection Map for a Network of Unattended Ground ...
收藏 引用
conference on Unattended Ground, Sea, and Air sensor Technologies and applications XII
作者: Koch, Mark W. Nguyen, Hung D. Sandia Natl Labs Albuquerque NM 87158 USA
We have developed algorithms to automatically learn a detection map of a deployed sensor field for a virtual presence and extended defense (VPED) system without apriori knowledge of the local terrain. The VPED system ... 详细信息
来源: 评论
Temporal fusion for De-Noising of RGB Video Received from Small UAV's
Temporal Fusion for De-Noising of RGB Video Received from Sm...
收藏 引用
conference on Airborne Intelligence, Surveillance, Reconnaissance (ISR) Systems and applications VII
作者: Fischer, Amber D. Hildebrand, Kyle J. 21st Century Syst Inc Honolulu HI 96819 USA
Monitoring video data sources received from UAVs is especially challenging because of the quality of the video received. Due to the individual characteristics of the unmanned platform and the changing environment, the... 详细信息
来源: 评论
CPHD filtering with unknown probability of detection
CPHD filtering with unknown probability of detection
收藏 引用
conference on Signal Processing, sensor fusion, and Target Recognition XIX
作者: Mahler, Ronald El-Fallah, Adel Lockheed Martin MS2 Eagan MN 55121 USA Sci Syst Co Inc Huntsville AL USA
The conventional PHD and CPHD filters presume that the probability p(D)(x) that a measurement will be collected from a target with state-vector x (the state-dependent probability of detection) is known a priori. Howev... 详细信息
来源: 评论
Homeland Security Application of the Army Soft Target Exploitation and fusion (STEF) System
Homeland Security Application of the Army Soft Target Exploi...
收藏 引用
conference on sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IX
作者: Antony, Richard T. Karakowski, Joseph A. SAIC 488 Long Mt Rd Washington VA 22747 USA US Army RDEC Ft Monmouth NJ 07703 USA
A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challe... 详细信息
来源: 评论
A novel DVS algorithm for distributed fusion sensor system
A novel DVS algorithm for distributed fusion sensor system
收藏 引用
2010 International conference on Advances in Computer Engineering, ACE 2010
作者: Sreenivaas, V.L. Gayathri, S. Sharat, Dwibhashi Swathi, S. Harish, P. RMKEC ElE Dept. Chennai India RMDEC IT Dept. Chennai India RCET EEE Dept. Bhilai Chattisgarh India
Distributed fusion sensor system will enable the reliable monitoring and control of a variety of applications for remote environment monitoring. The sensors have to be designed in a highly integrated fashion, optimizi... 详细信息
来源: 评论
An urban environment simulation framework for evaluating novel distributed radiation detection architectures
An urban environment simulation framework for evaluating nov...
收藏 引用
2010 10th IEEE International conference on Technologies for Homeland Security, HST 2010
作者: King, Michael J. Harris, Bernard Toolin, Maurice DuBord, Regina M. Skowronski, Victor J. LuSoto, Martin A. Estep, Robert J. Brennan, Sean M. Cosofret, Bogdan R. Shokhirev, Kirill N. Raytheon Integrated Defense Systems Tewksbury MA 01876 United States Los Alamos National Laboratory Los Alamos NM 87545 United States Physical Sciences Inc. Andover MA 01810 United States
Protection of large and complex urban areas from radiological threats may be improved by employing a network of distributed radiation detectors. Among the many considerations involved in designing such a system are de... 详细信息
来源: 评论
Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks
Neural methods based on modified reputation rules for detect...
收藏 引用
conference on Evolutionary and Bio-Inspired Computation - Theory and applications IV
作者: Hortos, William S. ACERT Orlando FL 32819 USA
Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical ... 详细信息
来源: 评论