咨询与建议

限定检索结果

文献类型

  • 1,425 篇 会议
  • 162 篇 期刊文献

馆藏范围

  • 1,587 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 389 篇 工学
    • 183 篇 电气工程
    • 116 篇 计算机科学与技术...
    • 83 篇 测绘科学与技术
    • 78 篇 控制科学与工程
    • 60 篇 信息与通信工程
    • 51 篇 仪器科学与技术
    • 30 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 21 篇 环境科学与工程(可...
    • 9 篇 航空宇航科学与技...
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 水利工程
  • 104 篇 理学
    • 51 篇 地球物理学
    • 17 篇 地理学
    • 16 篇 系统科学
    • 9 篇 物理学
    • 7 篇 数学
    • 2 篇 大气科学
    • 2 篇 生物学
  • 71 篇 医学
    • 67 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 22 篇 农学
    • 22 篇 农业资源与环境
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,587 篇 change detection...
  • 203 篇 detection algori...
  • 189 篇 algorithm design...
  • 167 篇 layout
  • 146 篇 remote sensing
  • 144 篇 testing
  • 143 篇 object detection
  • 138 篇 image segmentati...
  • 134 篇 robustness
  • 129 篇 feature extracti...
  • 120 篇 detectors
  • 116 篇 data mining
  • 106 篇 image edge detec...
  • 103 篇 cameras
  • 101 篇 pixel
  • 100 篇 clustering algor...
  • 98 篇 computer science
  • 96 篇 signal processin...
  • 84 篇 video sequences
  • 81 篇 motion detection

机构

  • 7 篇 department of bi...
  • 6 篇 national laborat...
  • 5 篇 department of ge...
  • 5 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 army research la...
  • 4 篇 department of el...
  • 4 篇 image communicat...
  • 4 篇 department of el...
  • 3 篇 at and t researc...
  • 3 篇 swiss federal in...
  • 3 篇 queensland unive...
  • 3 篇 wuhan univ sch e...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of el...
  • 3 篇 univ chinese aca...
  • 3 篇 univ ulsan sch e...

作者

  • 7 篇 wei li
  • 7 篇 w.a.c. fernando
  • 7 篇 venugopal v. vee...
  • 6 篇 hanqing lu
  • 6 篇 taposh banerjee
  • 6 篇 d.r. bull
  • 6 篇 licheng jiao
  • 6 篇 j.m. jenkins
  • 6 篇 shao-yi chien
  • 5 篇 l. bruzzone
  • 5 篇 c.n. canagarajah
  • 5 篇 liang-gee chen
  • 5 篇 banerjee taposh
  • 4 篇 huming zhu
  • 4 篇 yu-wen huang
  • 4 篇 l.a. dicarlo
  • 4 篇 jong-nam kim
  • 4 篇 i.v. nikiforov
  • 4 篇 liangpei zhang
  • 4 篇 won-hee kim

语言

  • 1,570 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"主题词=Change Detection Algorithms"
1587 条 记 录,以下是1381-1390 订阅
Detecting and estimating parameter jumps using ladder algorithms and likelihood ratio tests
Detecting and estimating parameter jumps using ladder algori...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: A. Brandt FB ET Datenverarbeitun Bundeswehr University of Munich Neubiberg Germany
The problem of recursive identification of autoregressive processes which are subject to parameter jumps of unknown magnitude occurring at unknown times is addressed. A sequential procedure for tracking the parameters... 详细信息
来源: 评论
Storm tracking in Doppler radar images
Storm tracking in Doppler radar images
收藏 引用
IEEE International Conference on Image Processing
作者: D. Krezeski R.E. Mercer J.L. Barron P. Joe H. Zhang Department of Computer Science University of Western Ontario London ONT Canada Atmospheric Environment Service King City Radar Station Toronto ONT Canada
An automated tracking algorithm for Doppler radar storms is presented. Potential storms in Doppler radar images are hypothesized as regions of high water density (high intensity in the radar images) using a merge-and-... 详细信息
来源: 评论
On the combined use of sketches and CUSUM for Anomaly detection
On the combined use of sketches and CUSUM for Anomaly Detect...
收藏 引用
International Conference on Computing and Network Communications (CoCoNet)
作者: Christian Callegari Stefano Giordano Michele Pagano CNIT and Dept. of Information Engineering University of Pisa Italy
Anomaly-based Intrusion detection is a key research topic in network security due to its ability to face unknown attacks and new security threats. Moreover, new solutions should cope with scalability issues derived fr... 详细信息
来源: 评论
Finding the hidden path: time bounds for all-pairs shortest paths
Finding the hidden path: time bounds for all-pairs shortest ...
收藏 引用
Annual IEEE Symposium on Foundations of Computer Science
作者: D.R. Karger D. Koller S.J. Phillips Department of Computer Science University of Stanford Stanford CA USA
The all-pairs shortest paths problem in weighted graphs is investigated. An algorithm called the hidden paths algorithm, which finds these paths in time O(m*+n n/sup 2/ log n), where m* is the number of edges particip... 详细信息
来源: 评论
Intrusion detection oriented distributed negative selection algorithm
Intrusion detection oriented distributed negative selection ...
收藏 引用
International Conference on Neural Information Processing
作者: Wenjian Luo Xianbin Cao Jiying Wang Xufa Wang Department of Computer Science and Technology University of Science and Technology Hefei Anhui China Department of Electronic Science and Technology University of Science and Technology Hefei Anhui China
The negative selection algorithm proposed by Forrest et al. (1994) is a very significant change detection algorithm based on the generation process of T-Cells process in biological system. But when negative selection ... 详细信息
来源: 评论
Secret Key Estimation for Image Sequential Steganograph in Transform Domain
Secret Key Estimation for Image Sequential Steganograph in T...
收藏 引用
IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference
作者: Xiangyang Luo Daoshun Wang Ping Wang Fenlin Liu Institute of Information Science and Technology Zhengzhou China Department of Computer Science and Technology Tsinghua University Beijing China
Trivedi et al. presented an effective LMP (locally most powerful) method (2005) to estimate the secret key for sequential steganography in mid- and high-frequency of DCT domain. In this paper, we proposed an improved ... 详细信息
来源: 评论
Actively Adaptive Multi-Armed Bandit Based Beam Tracking for mmWave MIMO Systems
Actively Adaptive Multi-Armed Bandit Based Beam Tracking for...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Ashim Kumar Arghyadip Roy Ratnajit Bhattacharjee Dept. of Electronics and Electrical Engineering Indian Institute of Technology Guwahati India Mehta Family School of Data Science and Artificial Intelligence (MFSDSAI) Indian Institute of Technology Guwahati India Dept. of Electronics and Electrical Engineering & MFSDSAI Indian Institute of Technology Guwahati India
Beam tracking methods are instrumental for efficient use of the multi-gigahertz bandwidth available at mmWave frequencies. In this paper, we propose a Multi-armed Bandit (MAB) based Reinforcement Learning (RL) algorit... 详细信息
来源: 评论
Object detection with vector quantized binary features
Object detection with vector quantized binary features
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: J. Krumm Intelligent Systems & Robotics Center Sandia National Laboratories Albuquerque NM USA
This paper presents a new algorithm for detecting objects in images, one of the fundamental tasks of computer vision. The algorithm extends the representational efficiency of eigenimage methods to binary features, whi... 详细信息
来源: 评论
Parameter estimation and event detection in a simple model of respiratory mechanics
Parameter estimation and event detection in a simple model o...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: T.H. Nguyen J.H. Strickl T.C. Jannett Cardiopulmonary Corporation Milford CT USA Department of Electrical and Computer Engineering University of Alabama Birmingham Birmingham AL USA
This paper describes a simulation study of model-based respiratory parameter tracking and event detection. An improved model of respiratory system mechanics was formulated to incorporate separate inspiratory mid expir... 详细信息
来源: 评论
A fuzzy reasoning based approach for ARMA order selection
A fuzzy reasoning based approach for ARMA order selection
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: M. Haseyama M. Emura H. Kitajima School of Engineering Hokkaido University Sapporo Japan
A fuzzy reasoning based approach for ARMA order selection is discussed in this paper. The proposed method attempts to select the optimal ARMA order of a time-varying ARMA model. This method improves model validity-cri... 详细信息
来源: 评论