咨询与建议

限定检索结果

文献类型

  • 1,425 篇 会议
  • 159 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 385 篇 工学
    • 179 篇 电气工程
    • 116 篇 计算机科学与技术...
    • 82 篇 测绘科学与技术
    • 77 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 50 篇 仪器科学与技术
    • 30 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 21 篇 环境科学与工程(可...
    • 8 篇 航空宇航科学与技...
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 水利工程
  • 103 篇 理学
    • 50 篇 地球物理学
    • 17 篇 地理学
    • 16 篇 系统科学
    • 9 篇 物理学
    • 7 篇 数学
    • 2 篇 大气科学
    • 2 篇 生物学
  • 70 篇 医学
    • 66 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 22 篇 农学
    • 22 篇 农业资源与环境
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,584 篇 change detection...
  • 203 篇 detection algori...
  • 189 篇 algorithm design...
  • 167 篇 layout
  • 146 篇 remote sensing
  • 144 篇 testing
  • 142 篇 object detection
  • 138 篇 image segmentati...
  • 134 篇 robustness
  • 129 篇 feature extracti...
  • 120 篇 detectors
  • 116 篇 data mining
  • 106 篇 image edge detec...
  • 103 篇 cameras
  • 101 篇 pixel
  • 100 篇 clustering algor...
  • 98 篇 computer science
  • 95 篇 signal processin...
  • 84 篇 video sequences
  • 81 篇 motion detection

机构

  • 7 篇 department of bi...
  • 6 篇 national laborat...
  • 5 篇 department of ge...
  • 5 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 army research la...
  • 4 篇 department of el...
  • 4 篇 image communicat...
  • 4 篇 department of el...
  • 3 篇 at and t researc...
  • 3 篇 swiss federal in...
  • 3 篇 queensland unive...
  • 3 篇 wuhan univ sch e...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of el...
  • 3 篇 univ chinese aca...
  • 3 篇 univ ulsan sch e...

作者

  • 7 篇 wei li
  • 7 篇 w.a.c. fernando
  • 7 篇 venugopal v. vee...
  • 6 篇 hanqing lu
  • 6 篇 taposh banerjee
  • 6 篇 d.r. bull
  • 6 篇 licheng jiao
  • 6 篇 j.m. jenkins
  • 6 篇 shao-yi chien
  • 5 篇 l. bruzzone
  • 5 篇 c.n. canagarajah
  • 5 篇 liang-gee chen
  • 5 篇 banerjee taposh
  • 4 篇 huming zhu
  • 4 篇 yu-wen huang
  • 4 篇 l.a. dicarlo
  • 4 篇 jong-nam kim
  • 4 篇 i.v. nikiforov
  • 4 篇 liangpei zhang
  • 4 篇 won-hee kim

语言

  • 1,567 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"主题词=Change Detection Algorithms"
1584 条 记 录,以下是1431-1440 订阅
排序:
Person tracking on a mobile robot with heterogeneous inter-characteristic feedback
Person tracking on a mobile robot with heterogeneous inter-c...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Juhyun Lee Peter Stone Department of Computer Sciences University of Texas Austin USA
For a mobile robot that interacts with humans such as a home assistant or a tour guide robot, tracking a particular person among multiple persons is a fundamental, yet challenging task. Uniquely identifying characteri... 详细信息
来源: 评论
SOFTWARE DEVELOPMENT TO SPEED UP DISASTER MANAGEMENT WITH REMOTE SENSING
SOFTWARE DEVELOPMENT TO SPEED UP DISASTER MANAGEMENT WITH RE...
收藏 引用
IEEE International Geoscience and Remote Sensing Symposium
作者: Stephane Briere David Dubois Richard Lepage Ecole de technologie supérieure Montréal Québec Canada
When a disaster occurs, earth observation specialists must analyze a considerable amount of images as quickly as possible to help rescue teams or to make on-the-fly decisions. As there is currently no remote sensing s... 详细信息
来源: 评论
Reactive Knowledge Management
Reactive Knowledge Management
收藏 引用
International Conference on Data Engineering
作者: Stefano Ceri Anna Bernasconi Alessia Gagliardi Politecnico di Milano Milano Italy
Today's large knowledge graphs are conceived mainly for supporting search and e-commerce within large companies such as Google or Amazon, with well-crafted knowledge creation rules. Our recent experience of the CO... 详细信息
来源: 评论
Content-based video abstraction
Content-based video abstraction
收藏 引用
IEEE International Conference on Image Processing
作者: B. Gunsel A.M. Tekalp Department of Electrical Engineering and Center for Electronic Imaging Systems University of Rochester Rochester NY USA
The paper addresses automatic scene change detection, key frame selection, and similarity ranking which constitute the main steps of a content based video abstraction system. Unlike other methods, the proposed algorit... 详细信息
来源: 评论
A Hybrid BIST Scheme for Multiple Heterogeneous Embedded Memories
A Hybrid BIST Scheme for Multiple Heterogeneous Embedded Mem...
收藏 引用
The 16th Asian Test Symposium(第十六届亚洲测试学术会议)
作者: Li-Ming Denq Cheng-Wen Wu Department of Electrical Engineering National Tsing Hua University Hsinchu Taiwan 30013
It is common that an SOC contains hundreds or even thousands of heterogeneous embedded memories. Many of these embedded memories have wide data words, leading to high routing penalty from the BIST circuits. Previous B... 详细信息
来源: 评论
detection of agricultural chemicals using a lipid membrane sensor
Detection of agricultural chemicals using a lipid membrane s...
收藏 引用
IEEE SENSORS
作者: Y. Naito H. Ikezaki A. Taniguchi K. Toko Anritsu Corporation Atsugi-shi Kanagawa-Pref. JAPAN Kyushu University Fukuoka-shi Fukuoka-Pref. JAPAN
Describes a measurement method to detect ppm level of noncharged agricultural chemicals using a lipid/polymer membrane sensor within five minutes. In the case of this new measurement method, non-charged toxic substanc... 详细信息
来源: 评论
A Novel Normalized Cross-Correlation Based Echo-Path change Detector
A Novel Normalized Cross-Correlation Based Echo-Path Change ...
收藏 引用
IEEE Region 5 Annual Technical Conference
作者: Mohammad Asif Iqbal Steven L. Grant University of Missouri Rolla Rolla MO USA
A double-talk detector is used to freeze acoustic echo canceller's (AEC) filter adaptation during periods of near-end speech. Increased sensitivity towards double-talk results in declaring echo-path changes as dou... 详细信息
来源: 评论
Research on Network Traffic Anomaly detection Algorithm
Research on Network Traffic Anomaly Detection Algorithm
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Jun Lv Tong Li Xing Li Academy of Armored Forces Engineering Beijing China China Education and Research Network Tsinghua University Beijing China
Network traffic anomaly detection is a difficult problem in network management. This paper proposed the wavelet generalized likelihood ratio WGLR) algorithm and the error performance detection (EPD) algorithm to solve... 详细信息
来源: 评论
Dynamic model selection with its applications to computer security
Dynamic model selection with its applications to computer se...
收藏 引用
IEEE (first ITW conference of the year) Information Theory Workshop (ITW)
作者: Y. Maruyama K. Yamanishi NEC Corporation Limited Kawasaki Kanagawa Japan
In recent years there has been increased interest in detecting anomalies in network traffic data/audit logs for computer security. With the appearance of a masquerader, for example, any new anomalous behavior pattern ... 详细信息
来源: 评论
D1HT: a distributed one hop hash table  06
D1HT: a distributed one hop hash table
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: L.R. Monnerat C.L. Amorim Comput. & Syst. Eng. Fed. Univ. of Rio de Janeiro Brazil COPPE-Computer and Systems Engineering Federal University of Rio de Janeiro Brazil
Distributed hash tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in order to keep little routing information... 详细信息
来源: 评论