咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 19 篇 会议
  • 1 册 图书

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 19 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 9 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 软件工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 机械工程
    • 1 篇 水利工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 3 篇 生物学
    • 2 篇 数学
    • 2 篇 地球物理学
    • 1 篇 天文学
    • 1 篇 地理学
  • 4 篇 医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 临床医学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 农学

主题

  • 40 篇 dtw algorithm
  • 3 篇 dynamic time war...
  • 3 篇 speech recogniti...
  • 3 篇 biometrics
  • 2 篇 euclidean distan...
  • 2 篇 matlab
  • 2 篇 online signature...
  • 2 篇 dynamic time war...
  • 2 篇 gesture recognit...
  • 2 篇 time warp simula...
  • 2 篇 two stage fusion
  • 2 篇 user interfaces
  • 2 篇 heuristic algori...
  • 1 篇 semg
  • 1 篇 global positioni...
  • 1 篇 fixed range
  • 1 篇 l.r.
  • 1 篇 march
  • 1 篇 optimal path
  • 1 篇 road vehicles

机构

  • 1 篇 bursa tech univ ...
  • 1 篇 dr sns rajalaksh...
  • 1 篇 zhengzhou univ s...
  • 1 篇 islamic azad uni...
  • 1 篇 pohang univ sci ...
  • 1 篇 school of electr...
  • 1 篇 putian univ coll...
  • 1 篇 queens univ belf...
  • 1 篇 pohang univ sci ...
  • 1 篇 univ wroclaw ins...
  • 1 篇 changjiang water...
  • 1 篇 department of el...
  • 1 篇 hanshou cty nat ...
  • 1 篇 anhui agr univ s...
  • 1 篇 state grid jiang...
  • 1 篇 jan kochanowski ...
  • 1 篇 guangdong pharma...
  • 1 篇 chaoyang city ec...
  • 1 篇 china univ min &...
  • 1 篇 intelligent reco...

作者

  • 1 篇 stachura micha l
  • 1 篇 jiao huimin
  • 1 篇 jinguang zhu
  • 1 篇 aghajan hamid
  • 1 篇 chen xuanchi
  • 1 篇 han guoqiang
  • 1 篇 senthildevi k. a...
  • 1 篇 guan guorui
  • 1 篇 bastanfard azam
  • 1 篇 zhu zhengyu
  • 1 篇 hang yuan
  • 1 篇 andaluz víctor h...
  • 1 篇 sun keshuang
  • 1 篇 yu junkang
  • 1 篇 feng xia
  • 1 篇 jiang wen
  • 1 篇 park young-deok
  • 1 篇 chicaiza fernand...
  • 1 篇 wang chuan
  • 1 篇 zhu xiangyang

语言

  • 38 篇 英文
  • 2 篇 其他
检索条件"主题词=DTW Algorithm"
40 条 记 录,以下是31-40 订阅
排序:
Gesture Recognition with Low Quality Signal over Low Energy Bluetooth 4.0
Gesture Recognition with Low Quality Signal over Low Energy ...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Zhao, Yang Laflen, J. Brandon GE Global Res Ctr Sensor & Signal Analyt Lab Niskayuna NY 12309 USA
Accelerometer-based gesture recognition enables natural user interaction of handheld tools with PC and other devices. Dynamic time warping (dtw) can achieve high recognition accuracy and does not require extensive tra... 详细信息
来源: 评论
Social Activity Recognition and Recommendation based on Mobile Sound Sensing
Social Activity Recognition and Recommendation based on Mobi...
收藏 引用
IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC)
作者: Yang, Yao Guo, Bin Yu, Zhiwen He, Huilei Northwestern Polytech Univ Sch Software & Microelect Xian 710072 Peoples R China Northwestern Polytech Univ Sch Comp Sci Xian Peoples R China
Nowadays, as social activities in the real world are getting more and more popular, it is important to understand the social interaction features and the social contexts of users (meetings, social gatherings, etc.) to... 详细信息
来源: 评论
An EMG-based Handwriting Recognition through Dynamic Time Warping
An EMG-based Handwriting Recognition through Dynamic Time Wa...
收藏 引用
32nd Annual International Conference of the IEEE Engineering-in-Medicine-and-Biology-Society (EMBC 10)
作者: Huang, Gan Zhang, Dingguo Zheng, Xidian Zhu, Xiangyang Shanghai Jiao Tong Univ State Key Lab Mech Syst & Vibrat Shanghai 200240 Peoples R China
In this paper, an electromyography (EMG)-based handwriting recognition method was proposed for a latent tendency of natural user interface. The subjects wrote the characters at a normal speed, and six channels of EMG ... 详细信息
来源: 评论
On the Privacy of Encrypted Skype Communications
On the Privacy of Encrypted Skype Communications
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Dupasquier, Benoit Burschka, Stefan McLaughlin, Kieran Sezer, Sakir Queens Univ Belfast Ctr Secure Informat Technol CSIT Belfast Antrim North Ireland
The privacy of voice over IP (VoIP) systems is achieved by compressing and encrypting the sampled data. This paper investigates in detail the leakage of information from Skype, a widely used VoIP application. In this ... 详细信息
来源: 评论
Utterance Verification On dtw Based Speech Recognition Using Likelihood
Utterance Verification On DTW Based Speech Recognition Using...
收藏 引用
The 2010 International Conference on Computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Qian Liu Zhang-qin Huang Yi-bin Hou Rui Chen Embedded Software System Institute Beijing University of Technology Beijing China
Utterance verification provides the speech recognition system a user-friendly interaction. However, smallvocabulary system using dtw algorithm cannot afford HMM based utterance verification. So, to equip the dtw based... 详细信息
来源: 评论
Different role of friction and normal force for force-based signature verification
Different role of friction and normal force for force-based ...
收藏 引用
2nd International Congress on Image and Signal Processing
作者: Jiao, Huimin Wang, Dangxiao Zhang, Yuru Beihang Univ State Key Lab Virtual Real Technol & Syst Beijing 100191 Peoples R China
Compared with trajectory-based verification, force signal verification is a new approach in signature verification, which is expected to provide higher security. In order to understand which components of force signal... 详细信息
来源: 评论
Adult movie filtering based dtw and neural network
Adult movie filtering based DTW and neural network
收藏 引用
2008 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2008
作者: Cho, Jungik Lee, Yilltayung Yonsei University Seoul Korea Republic of
In recent year, there has been a dynamic increase in the availability of video material. This paper will suggest two methods to distinguish between general contents and adult contents by analyzing the audio informatio... 详细信息
来源: 评论
Fusion of global and local information for an on-line signature verification system
Fusion of global and local information for an on-line signat...
收藏 引用
7th International Conference on Machine Learning and Cybernetics
作者: Liu, Ning-Ning Wang, Yun-Hong Beihang Univ Sch Engn & Comp Sci Intelligent Recognit & Image Proc Lab Beijing 100083 Peoples R China
In this paper, an on-line signature verification system exploiting local and global information using two-stage fusion is presented. At the first stage, global information is extracted as 13-dimensional vector and rec... 详细信息
来源: 评论
FUSION OF GLOBAL AND LOCAL INFORMATION FOR AN ON-LINE SIGNATURE VERIFICATION SYSTEM
FUSION OF GLOBAL AND LOCAL INFORMATION FOR AN ON-LINE SIGNAT...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: NING-NING LIU YUN-HONG WANG Intelligent Recognition and Image Processing Laboratory School of Computer Science and Engineering Beihang University Beijing 100083 China
In this paper, an on-line signature verification system exploiting local and global information using two-stage fusion is presented. At the first stage, global information is extracted as I3-dimensional vector and rec... 详细信息
来源: 评论
SPEAKER-INDEPENDENT RECOGNITION OF ISOLATED WORDS USING CONCATENATED NEURAL NETWORKS
收藏 引用
International Journal of Pattern Recognition and Artificial Intelligence 1991年 第5期5卷 693-714页
作者: CHUNG-HSIEN WU JHING-FA WANG CHAUG-CHING HUANG JAU-YIEN LEE Department of Electrical Engineering National Cheng Kung University Tainan Taiwan R.O.C.
A speaker-independent isolated word recognizer is proposed. It is obtained by concatenating a Bayesian neural network and a Hopfield time-alignment network. In this system, the Bayesian network outputs the a posterior... 详细信息
来源: 评论