咨询与建议

限定检索结果

文献类型

  • 1,425 篇 会议
  • 159 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 385 篇 工学
    • 179 篇 电气工程
    • 116 篇 计算机科学与技术...
    • 82 篇 测绘科学与技术
    • 77 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 50 篇 仪器科学与技术
    • 30 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 21 篇 环境科学与工程(可...
    • 8 篇 航空宇航科学与技...
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 水利工程
  • 103 篇 理学
    • 50 篇 地球物理学
    • 17 篇 地理学
    • 16 篇 系统科学
    • 9 篇 物理学
    • 7 篇 数学
    • 2 篇 大气科学
    • 2 篇 生物学
  • 70 篇 医学
    • 66 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 22 篇 农学
    • 22 篇 农业资源与环境
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,584 篇 change detection...
  • 203 篇 detection algori...
  • 189 篇 algorithm design...
  • 167 篇 layout
  • 146 篇 remote sensing
  • 144 篇 testing
  • 142 篇 object detection
  • 138 篇 image segmentati...
  • 134 篇 robustness
  • 129 篇 feature extracti...
  • 120 篇 detectors
  • 116 篇 data mining
  • 106 篇 image edge detec...
  • 103 篇 cameras
  • 101 篇 pixel
  • 100 篇 clustering algor...
  • 98 篇 computer science
  • 95 篇 signal processin...
  • 84 篇 video sequences
  • 81 篇 motion detection

机构

  • 7 篇 department of bi...
  • 6 篇 national laborat...
  • 5 篇 department of ge...
  • 5 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 army research la...
  • 4 篇 department of el...
  • 4 篇 image communicat...
  • 4 篇 department of el...
  • 3 篇 at and t researc...
  • 3 篇 swiss federal in...
  • 3 篇 queensland unive...
  • 3 篇 wuhan univ sch e...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of el...
  • 3 篇 univ chinese aca...
  • 3 篇 univ ulsan sch e...

作者

  • 7 篇 wei li
  • 7 篇 w.a.c. fernando
  • 7 篇 venugopal v. vee...
  • 6 篇 hanqing lu
  • 6 篇 taposh banerjee
  • 6 篇 d.r. bull
  • 6 篇 licheng jiao
  • 6 篇 j.m. jenkins
  • 6 篇 shao-yi chien
  • 5 篇 l. bruzzone
  • 5 篇 c.n. canagarajah
  • 5 篇 liang-gee chen
  • 5 篇 banerjee taposh
  • 4 篇 huming zhu
  • 4 篇 yu-wen huang
  • 4 篇 l.a. dicarlo
  • 4 篇 jong-nam kim
  • 4 篇 i.v. nikiforov
  • 4 篇 liangpei zhang
  • 4 篇 won-hee kim

语言

  • 1,567 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"主题词=Change Detection Algorithms"
1584 条 记 录,以下是1441-1450 订阅
排序:
Dynamic model selection with its applications to computer security
Dynamic model selection with its applications to computer se...
收藏 引用
IEEE (first ITW conference of the year) Information Theory Workshop (ITW)
作者: Y. Maruyama K. Yamanishi NEC Corporation Limited Kawasaki Kanagawa Japan
In recent years there has been increased interest in detecting anomalies in network traffic data/audit logs for computer security. With the appearance of a masquerader, for example, any new anomalous behavior pattern ... 详细信息
来源: 评论
Binary Document Images Authentication by Thinning Digital Patterns
Binary Document Images Authentication by Thinning Digital Pa...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Chu-Hsing Lin Wen-Kui Chang Yu-Ying Lin Lun-Yuen Cheng Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan
As most documents have been digitized and transmitted over the Internet, it becomes very crucial to protect the integrity of them. Integrity is the process of ensuring that a document is changed by unauthorized users.... 详细信息
来源: 评论
detection of Low Intensity DoS Attacks using Fuzzy Based Intrusion detection System
Detection of Low Intensity DoS Attacks using Fuzzy Based Int...
收藏 引用
International Conference on Electrical and Computer Engineering (ICECE)
作者: Habibullah Baig Farrukh Kamran Center for Advanced Studies in Engineering Pakistan
Detecting low intensity denial of service (DoS) attacks in minimum time with less false positives is challenging for network based intrusion detection systems. In this paper we propose a new fuzzy logic based approach... 详细信息
来源: 评论
Imprecisions Diagnostic in Source Code Deltas
Imprecisions Diagnostic in Source Code Deltas
收藏 引用
International Mining Software Repositories, MSR
作者: Guillermo de la Torre Romain Robbes Alexandre Bergel DCC University of Chile Santiago Chile SwSE Research Group Free University of Bozen-Bolzano Bolzano Italy
Beyond a practical use in code review, source code change detection (SCCD) is an important component of many mining software repositories (MSR) approaches. As such, any error or imprecision in the detection may result... 详细信息
来源: 评论
Three-dimensional indoor localization in Non Line of Sight UWB channels
Three-dimensional indoor localization in Non Line of Sight U...
收藏 引用
IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
作者: Jens Schroeder Stefan Galler Kyandoghere Kyamakya Thomas Kaiser Institute of Communications Engineering (IKT) Leibniz University Hannover Germany Institute for Smart System-Technologies Alpen-Adria University of Klagenfurt Austria
The problem of indoor localization is lately gaining high interest in research and industry. In this context, Ultra-Wideband has the capability of fulfilling the task of precise localization. Non Line of Sight (NLOS) ... 详细信息
来源: 评论
Multi-Scale Rank-Permutation change Localization
Multi-Scale Rank-Permutation Change Localization
收藏 引用
IEEE Conference on Aerospace
作者: Neil H. W. Eklund Xiao Hu One Research Circle General Electric Global Research Schenectady NY USA
Prediction of equipment remaining useful life (RUL) is of considerable economic benefit to industry, by permitting the avoidance of unscheduled downtime and costly secondary damage. detection of change is an important... 详细信息
来源: 评论
Spatio-temporal joint probability images for video segmentation
Spatio-temporal joint probability images for video segmentat...
收藏 引用
IEEE International Conference on Image Processing
作者: Ze-Nian Li Jie Wei School of Computing Science Simon Fraser University Burnaby Canada Department of Computer Science City College City University of New York New York NY USA
In this paper we propose a novel video segmentation algorithm that is capable of reliably detecting both types of dissolves in addition to cuts and wipes based on the analysis of the spatio-temporal behavior of joint ... 详细信息
来源: 评论
Robust abnormity detecting and tracking using correlation coefficient
Robust abnormity detecting and tracking using correlation co...
收藏 引用
International Conference on Multimedia Modeling (MMM)
作者: Jin Zheng Bo Li Chunlian Yao Digital Media Laboratory School of Computer Science and Engineerinlg Beihang University Beijing China
Abnormity detection based on computer vision is the foundation of high-level automatic surveillance that includes objects recognition, tracking and alarm etc. In this paper, a robust abnormity detection algorithm usin... 详细信息
来源: 评论
Segmentation of fractal network traffic with wavelets and log-likelihood statistics
Segmentation of fractal network traffic with wavelets and lo...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: D. Rincon S. Sallent Escola Politècnica Superior de Castelldefels Universitat Politècnica de Catalunya (UPC) Barcelona Spain
Network traffic exhibits long-range dependence (LRD). The estimators of LRD parameters based on the discrete wavelet transform (DWT) are the best in terms of efficiency and accuracy. These estimators do not consider n... 详细信息
来源: 评论
Video Segmentation with Model-Based Sprite Generation for Panning Surveillance Cameras
Video Segmentation with Model-Based Sprite Generation for Pa...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Der-Chun Cherng Shao-Yi Chien Media IC and System Lab Graduate Institute of Electronics Engineering and Department of Electrical Engineering National Taiwan University Taipei Taiwan
Video segmentation is one of the most important techniques for advanced video surveillance systems. Most of the existing video segmentation algorithms suffer from high computational complexity to achieve acceptable re... 详细信息
来源: 评论