咨询与建议

限定检索结果

文献类型

  • 1,649 篇 会议
  • 71 篇 期刊文献

馆藏范围

  • 1,720 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,437 篇 工学
    • 813 篇 电气工程
    • 446 篇 计算机科学与技术...
    • 175 篇 测绘科学与技术
    • 162 篇 电子科学与技术(可...
    • 152 篇 仪器科学与技术
    • 129 篇 材料科学与工程(可...
    • 94 篇 航空宇航科学与技...
    • 82 篇 生物医学工程(可授...
    • 78 篇 软件工程
    • 67 篇 信息与通信工程
    • 60 篇 控制科学与工程
    • 25 篇 机械工程
    • 15 篇 光学工程
    • 6 篇 交通运输工程
    • 5 篇 环境科学与工程(可...
    • 5 篇 安全科学与工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 土木工程
  • 1,369 篇 理学
    • 1,320 篇 物理学
    • 160 篇 数学
    • 29 篇 化学
    • 15 篇 天文学
    • 14 篇 大气科学
    • 11 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 4 篇 海洋科学
  • 543 篇 医学
    • 439 篇 临床医学
    • 106 篇 特种医学
    • 22 篇 基础医学(可授医学...
  • 11 篇 管理学
    • 10 篇 管理科学与工程(可...
  • 5 篇 农学
  • 2 篇 法学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,720 篇 detection and tr...
  • 638 篇 sensors
  • 475 篇 image processing
  • 428 篇 algorithm develo...
  • 327 篇 target detection
  • 293 篇 image segmentati...
  • 248 篇 data modeling
  • 182 篇 error analysis
  • 179 篇 cameras
  • 170 篇 feature extracti...
  • 168 篇 visualization
  • 163 篇 image filtering
  • 162 篇 signal processin...
  • 161 篇 neural networks
  • 144 篇 signal to noise ...
  • 142 篇 video
  • 133 篇 databases
  • 132 篇 computer simulat...
  • 129 篇 binary data
  • 121 篇 radar

机构

  • 13 篇 carnegie mellon ...
  • 9 篇 univ chicago dep...
  • 9 篇 lockheed martin ...
  • 8 篇 naval surface wa...
  • 8 篇 nichols research...
  • 8 篇 univ connecticut...
  • 7 篇 jet propulsion l...
  • 6 篇 univ new orleans...
  • 6 篇 suny/buffalo
  • 6 篇 univ. of califor...
  • 6 篇 us army res lab ...
  • 6 篇 air force wright...
  • 5 篇 harvard univ.
  • 5 篇 environm res ins...
  • 5 篇 colorado state u...
  • 5 篇 naval research l...
  • 5 篇 texas instrument...
  • 5 篇 hughes aircraft ...
  • 5 篇 wright state uni...
  • 5 篇 res lab adelphi ...

作者

  • 15 篇 mahalanobis a
  • 15 篇 casasent d
  • 13 篇 bar-shalom yaako...
  • 8 篇 willett peter
  • 8 篇 healey g
  • 8 篇 mahler r
  • 7 篇 ranney k
  • 7 篇 bar-shalom y
  • 7 篇 blair wd
  • 6 篇 ravichandran g
  • 6 篇 gader pd
  • 6 篇 chen xinjia
  • 6 篇 nasrabadi nasser...
  • 5 篇 shen zk
  • 5 篇 zurbrick l
  • 5 篇 pan xiaochuan
  • 5 篇 meola joseph
  • 5 篇 romeo kevin
  • 5 篇 nguyen l
  • 5 篇 frigui hichem

语言

  • 1,701 篇 英文
  • 19 篇 其他
检索条件"主题词=Detection and tracking algorithms"
1720 条 记 录,以下是731-740 订阅
排序:
In-flight refinement of the radiometric, spectral, and spatial calibration of the Atmospheric Infrared Sounder (AIRS)
In-flight refinement of the radiometric, spectral, and spati...
收藏 引用
Conference on Earth Observing Systems VIII
作者: Gaiser, SL Aumann, HH Gregorich, DT Hearty, TJ CALTECH Jet Prop Lab Pasadena CA 91109 USA
The current performance of AIRS radiometric, spectral, and spatial calibration algorithms are described. Radiometric accuracy is validated to tenths of a kelvin. Spectral stability is better than 0.5% of the spectral ... 详细信息
来源: 评论
Using sensor networks and data fusion for early detection of active worms
Using sensor networks and data fusion for early detection of...
收藏 引用
Conference on Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II
作者: Berk, VH Gray, RS Bakos, G Dartmouth Coll Thayer Sch Engn Inst Secur Technol Studies Hanover NH 03755 USA
Identification of an Internet worm is a manual process where security analysts must observe and analyze unusual activity on multiple firewalls, intrusion-detection systems or hosts. A worm might not be positively iden... 详细信息
来源: 评论
Simple Image Processing with MMW cameras
Simple Image Processing with MMW cameras
收藏 引用
Conference on Passive Millimeter-Wave Imaging Technology VI and Radar Sensor Technology VII
作者: Pergande, A Benson, P Anderson, L Lockheed Martin Missiles & Fire Control Orlando FL 32819 USA
Millimeter wave cameras can have limited pixel count and image uniformity problems. While these may be expected to improve as detector technology advances, presently available simple image processing algorithms can pr... 详细信息
来源: 评论
Machine vision image analysis capability for image intensifier tubes and systems
Machine vision image analysis capability for image intensifi...
收藏 引用
Conference on Low-Light-Level and Real-Time Imaging Systems, Components and Applications
作者: Alsman, D Paul, C Sartor, M USN Ctr Surface Warfare Crane Div Crane IN 47522 USA
The Image Intensifier Tube (IIT) is the most critical component within a night vision device. Acquisition, production, test and evaluation of image intensifier tubes can be greatly enhanced by the application of machi... 详细信息
来源: 评论
Regularization in the synthesis of host-based anomaly detectors
Regularization in the synthesis of host-based anomaly detect...
收藏 引用
Conference on System Diagnosis and Prognosis: Security and Condition Monitoring Issues III
作者: Michael, CC Cigital Labs Sterling VA 20166 USA
The goal of host-based intrusion detection is to detect attacks against a sin-le information system. Many host-based intrusion detector systems - especially those that use anomaly detection - use training data to synt... 详细信息
来源: 评论
Independent component analysis (ICA) and Self-Organizing Map (SOM) approach to multi detection system for network intruders.
Independent component analysis (ICA) and Self-Organizing Map...
收藏 引用
Conference on Independent Component Analyses, Wavelets, and Neural Networks
作者: Abdi, AM Harold, S George Washington Univ Dept Elect Engn Washington DC 20052 USA
With the growing rate of interconnection among computer systems, network security is becoming a real challenge. Intrusion detection System (IDS) is designed to protect the availability, confidentiality and integrity o... 详细信息
来源: 评论
Viterbi-based data association techniques for target tracking
Viterbi-based data association techniques for target trackin...
收藏 引用
Conference on Signal Processing, Sensor Fusion, and Target Recognition XII
作者: Gad, A Farooq, M Royal Mil Coll Canada Dept Elect & Comp Engn Kingston ON K7K 7B4 Canada
The research in multitarget tracking has mainly focused on the development and implementation of efficient data association algorithms with acceptable performance. The Viterbi Data Association (VDA) algorithm has prov... 详细信息
来源: 评论
Robust SAR ATR via set-valued classifiers: New results
Robust SAR ATR via set-valued classifiers: New results
收藏 引用
Conference on Signal Processing, Sensor Fusion, and Target Recognition XII
作者: Hoffman, J Mahler, R Ravichandran, R Mehra, R Musick, S Lockheed Martin Tact Syst Eagan MN USA
"Robust identification" in SAR ATR refers to the problem of determining target identity despite the confounding effects of "extended operating conditions" (EOCs). EOCs axe statistically uncharacter... 详细信息
来源: 评论
Binary matrices, decomposition and multiply-add architectures
Binary matrices, decomposition and multiply-add architecture...
收藏 引用
Conference on Image Processing - algorithms and Systems II
作者: Sarukhanyan, H Agaian, S Astola, J Egiazarian, K NAS Armenia Inst Informat & Automat Problems Yerevan Armenia
Binary matrices or (+/-1)-matrices have found numerous applications in coding, signal processing, and communications. In this paper, a general and efficient algorithm of decomposition of binary matrices is developed. ... 详细信息
来源: 评论
Developing a CFAR filter for detecting point targets using a dynamic programming algorithm
Developing a CFAR filter for detecting point targets using a...
收藏 引用
Conference on Signal and Data Processing of Small Targets
作者: Madar, H Avishai, T Succary, R Rotman, SR Ben Gurion Univ Negev Dept Elect & Comp Engn IL-84105 Beer Sheva Israel
A method to detect and track point targets in infrared imagery is briefly described. The final output of the algorithm is a single image containing scores related to the probability of a target being located at any pa... 详细信息
来源: 评论