咨询与建议

限定检索结果

文献类型

  • 1,425 篇 会议
  • 163 篇 期刊文献

馆藏范围

  • 1,588 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 184 篇 电气工程
    • 116 篇 计算机科学与技术...
    • 84 篇 测绘科学与技术
    • 78 篇 控制科学与工程
    • 60 篇 信息与通信工程
    • 51 篇 仪器科学与技术
    • 30 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 21 篇 环境科学与工程(可...
    • 9 篇 航空宇航科学与技...
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 水利工程
  • 105 篇 理学
    • 52 篇 地球物理学
    • 17 篇 地理学
    • 16 篇 系统科学
    • 9 篇 物理学
    • 7 篇 数学
    • 2 篇 大气科学
    • 2 篇 生物学
  • 72 篇 医学
    • 68 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 22 篇 农学
    • 22 篇 农业资源与环境
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,588 篇 change detection...
  • 203 篇 detection algori...
  • 189 篇 algorithm design...
  • 167 篇 layout
  • 146 篇 remote sensing
  • 144 篇 testing
  • 143 篇 object detection
  • 138 篇 image segmentati...
  • 133 篇 robustness
  • 130 篇 feature extracti...
  • 120 篇 detectors
  • 116 篇 data mining
  • 106 篇 image edge detec...
  • 103 篇 cameras
  • 101 篇 pixel
  • 100 篇 clustering algor...
  • 98 篇 computer science
  • 96 篇 signal processin...
  • 84 篇 video sequences
  • 81 篇 motion detection

机构

  • 7 篇 department of bi...
  • 6 篇 national laborat...
  • 5 篇 department of ge...
  • 5 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 army research la...
  • 4 篇 department of el...
  • 4 篇 image communicat...
  • 4 篇 department of el...
  • 3 篇 at and t researc...
  • 3 篇 swiss federal in...
  • 3 篇 queensland unive...
  • 3 篇 wuhan univ sch e...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of el...
  • 3 篇 univ chinese aca...
  • 3 篇 univ ulsan sch e...

作者

  • 7 篇 wei li
  • 7 篇 w.a.c. fernando
  • 7 篇 venugopal v. vee...
  • 6 篇 hanqing lu
  • 6 篇 taposh banerjee
  • 6 篇 d.r. bull
  • 6 篇 licheng jiao
  • 6 篇 j.m. jenkins
  • 6 篇 shao-yi chien
  • 5 篇 l. bruzzone
  • 5 篇 c.n. canagarajah
  • 5 篇 liang-gee chen
  • 5 篇 banerjee taposh
  • 4 篇 huming zhu
  • 4 篇 yu-wen huang
  • 4 篇 l.a. dicarlo
  • 4 篇 jong-nam kim
  • 4 篇 i.v. nikiforov
  • 4 篇 liangpei zhang
  • 4 篇 won-hee kim

语言

  • 1,571 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"主题词=change detection algorithms"
1588 条 记 录,以下是841-850 订阅
排序:
Fast Reliable Multi-Scale Motion Region detection in Video Processing
Fast Reliable Multi-Scale Motion Region Detection in Video P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiangbo Lu Gauthier Lafruit Francky Catthoor IMEC Multimedia Group Leuven Belgium Department of Electrical Engineering University of Leuven Belgium
Motion region detection is an important vision topic usually tackled by a background subtraction principle, which has some practical restrictions. We hence propose a multi-scale motion region detection technique that ... 详细信息
来源: 评论
Secret Key Estimation for Image Sequential Steganograph in Transform Domain
Secret Key Estimation for Image Sequential Steganograph in T...
收藏 引用
IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference
作者: Xiangyang Luo Daoshun Wang Ping Wang Fenlin Liu Institute of Information Science and Technology Zhengzhou China Department of Computer Science and Technology Tsinghua University Beijing China
Trivedi et al. presented an effective LMP (locally most powerful) method (2005) to estimate the secret key for sequential steganography in mid- and high-frequency of DCT domain. In this paper, we proposed an improved ... 详细信息
来源: 评论
Probabilistic Sensor Deployment in Wireless Sensor Network: A New Approach
Probabilistic Sensor Deployment in Wireless Sensor Network: ...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Md. Obaidur Rahman Md. Abdur Razzaque Choong Seon Hong Networking Lab Department of Computer Engineering Kyung Hee University South Korea
Wireless sensor network has the two major tasks: sensing & detecting of any event over a sensing region. Quality of network coverage entirely depends upon the success of these tasks. Network coverage can be degrad... 详细信息
来源: 评论
Effectiveness of Hierarchical Heavy Hitter Identification for Intrusion detection
Effectiveness of Hierarchical Heavy Hitter Identification fo...
收藏 引用
IEEE International Conference on Multi Topic
作者: Saba Pervez Uppal Sara Tahir Butt Asim Karim Department of Computer Science Lahore University of Management Sciences Pakistan School of Computer Science Carnegie Mellon University USA
Network traffics volume is employed extensively for monitoring and identification of traffic patterns. A straight forward approach that maintains the volume for all flows and their aggregations is computationally intr... 详细信息
来源: 评论
Multi-Camera Scene Analysis using an Object-Centric Continuous Distribution Hidden Markov Model
Multi-Camera Scene Analysis using an Object-Centric Continuo...
收藏 引用
IEEE International Conference on Image Processing
作者: Murtaza Taj Andrea Cavallaro Multimedia and Vision Group-Queen Mary University of London UK
We propose a multi-camera event detection framework that can operate on a common ground plane as well as on the image plane. The proposed event detector is based on an object-centric state modeling that uses a continu... 详细信息
来源: 评论
A Hybrid BIST Scheme for Multiple Heterogeneous Embedded Memories
A Hybrid BIST Scheme for Multiple Heterogeneous Embedded Mem...
收藏 引用
The 16th Asian Test Symposium(第十六届亚洲测试学术会议)
作者: Li-Ming Denq Cheng-Wen Wu Department of Electrical Engineering National Tsing Hua University Hsinchu Taiwan 30013
It is common that an SOC contains hundreds or even thousands of heterogeneous embedded memories. Many of these embedded memories have wide data words, leading to high routing penalty from the BIST circuits. Previous B... 详细信息
来源: 评论
A Novel Normalized Cross-Correlation Based Echo-Path change Detector
A Novel Normalized Cross-Correlation Based Echo-Path Change ...
收藏 引用
IEEE Region 5 Annual Technical Conference
作者: Mohammad Asif Iqbal Steven L. Grant University of Missouri Rolla Rolla MO USA
A double-talk detector is used to freeze acoustic echo canceller's (AEC) filter adaptation during periods of near-end speech. Increased sensitivity towards double-talk results in declaring echo-path changes as dou... 详细信息
来源: 评论
Research on Network Traffic Anomaly detection Algorithm
Research on Network Traffic Anomaly Detection Algorithm
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Jun Lv Tong Li Xing Li Academy of Armored Forces Engineering Beijing China China Education and Research Network Tsinghua University Beijing China
Network traffic anomaly detection is a difficult problem in network management. This paper proposed the wavelet generalized likelihood ratio WGLR) algorithm and the error performance detection (EPD) algorithm to solve... 详细信息
来源: 评论
Binary Document Images Authentication by Thinning Digital Patterns
Binary Document Images Authentication by Thinning Digital Pa...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Chu-Hsing Lin Wen-Kui Chang Yu-Ying Lin Lun-Yuen Cheng Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan
As most documents have been digitized and transmitted over the Internet, it becomes very crucial to protect the integrity of them. Integrity is the process of ensuring that a document is changed by unauthorized users.... 详细信息
来源: 评论
Audiovisual Tracking Using STAC Sensors
Audiovisual Tracking Using STAC Sensors
收藏 引用
ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC
作者: Huiyu Zhou Murtaza Taj Andrea Cavallaro Multimedia and Vision Group Queen Mary University of London London UK
In this paper we present an audiovisual tracking algorithm using a stereo audio and cycloptic vision (STAC) sensor. A STAC sensor is composed of a single camera mounted between two microphones. Target localization is ... 详细信息
来源: 评论