咨询与建议

限定检索结果

文献类型

  • 1,425 篇 会议
  • 163 篇 期刊文献

馆藏范围

  • 1,588 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 184 篇 电气工程
    • 116 篇 计算机科学与技术...
    • 84 篇 测绘科学与技术
    • 78 篇 控制科学与工程
    • 60 篇 信息与通信工程
    • 51 篇 仪器科学与技术
    • 30 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 21 篇 环境科学与工程(可...
    • 9 篇 航空宇航科学与技...
    • 6 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 水利工程
  • 105 篇 理学
    • 52 篇 地球物理学
    • 17 篇 地理学
    • 16 篇 系统科学
    • 9 篇 物理学
    • 7 篇 数学
    • 2 篇 大气科学
    • 2 篇 生物学
  • 72 篇 医学
    • 68 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 22 篇 农学
    • 22 篇 农业资源与环境
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 1,588 篇 change detection...
  • 203 篇 detection algori...
  • 189 篇 algorithm design...
  • 167 篇 layout
  • 146 篇 remote sensing
  • 144 篇 testing
  • 143 篇 object detection
  • 138 篇 image segmentati...
  • 133 篇 robustness
  • 130 篇 feature extracti...
  • 120 篇 detectors
  • 116 篇 data mining
  • 106 篇 image edge detec...
  • 103 篇 cameras
  • 101 篇 pixel
  • 100 篇 clustering algor...
  • 98 篇 computer science
  • 96 篇 signal processin...
  • 84 篇 video sequences
  • 81 篇 motion detection

机构

  • 7 篇 department of bi...
  • 6 篇 national laborat...
  • 5 篇 department of ge...
  • 5 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 army research la...
  • 4 篇 department of el...
  • 4 篇 image communicat...
  • 4 篇 department of el...
  • 3 篇 at and t researc...
  • 3 篇 swiss federal in...
  • 3 篇 queensland unive...
  • 3 篇 wuhan univ sch e...
  • 3 篇 department of el...
  • 3 篇 department of in...
  • 3 篇 department of el...
  • 3 篇 univ chinese aca...
  • 3 篇 univ ulsan sch e...

作者

  • 7 篇 wei li
  • 7 篇 w.a.c. fernando
  • 7 篇 venugopal v. vee...
  • 6 篇 hanqing lu
  • 6 篇 taposh banerjee
  • 6 篇 d.r. bull
  • 6 篇 licheng jiao
  • 6 篇 j.m. jenkins
  • 6 篇 shao-yi chien
  • 5 篇 l. bruzzone
  • 5 篇 c.n. canagarajah
  • 5 篇 liang-gee chen
  • 5 篇 banerjee taposh
  • 4 篇 huming zhu
  • 4 篇 yu-wen huang
  • 4 篇 l.a. dicarlo
  • 4 篇 jong-nam kim
  • 4 篇 i.v. nikiforov
  • 4 篇 liangpei zhang
  • 4 篇 won-hee kim

语言

  • 1,571 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"主题词=change detection algorithms"
1588 条 记 录,以下是951-960 订阅
排序:
Analysis of Belief Propagation for Non-Linear Problems: The Example of CDMA (or: How to Prove Tanaka's Formula)
Analysis of Belief Propagation for Non-Linear Problems: The ...
收藏 引用
IEEE (first ITW conference of the year) Information Theory Workshop (ITW)
作者: A. Montanari D. Tse Laboratoire de Physique Théorique de l'Ecole Normale Supérieure France Department of Electrical Engineering and Computer Science University of California USA
We consider the CDMA (code-division multiple-access) multi-user detection problem for binary signals and additive white gaussian noise. We propose a spreading sequences scheme based on random sparse signatures, and a ... 详细信息
来源: 评论
Impact of Bit-Width Specification on the Memory Hierarchy for a Real-Time Video Processing System  06
Impact of Bit-Width Specification on the Memory Hierarchy fo...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: B. Thornberg M. O'Nils Mid-Sweden University Sundsvall SWEDEN
Bit-width specification will affect the total memory storage requirement of a video processing system. However, what is not so obvious is that the bit-width specification will also affect the design of the memory hier... 详细信息
来源: 评论
A Highly Linear Direct-Conversion Transmit Mixer Transconductance Stage with Local Oscillation Feedthrough and I/Q Imbalance Cancellation Scheme
A Highly Linear Direct-Conversion Transmit Mixer Transconduc...
收藏 引用
IEEE International Conference on Solid-State Circuits (ISSCC)
作者: C.P. Lee A. Behzad Dayo Ojo M. Kappes S. Au Meng-An Pan K. Carter S. Tian Broadcom San Diego CA IQ-Analog San Diego CA Broadcom Irvine CA
A linear transconductance stage with process insensitive gain control and gain insensitive output offset current is proposed. A calibration scheme to remove the LO feedthrough (LOFT) and I/Q imbalance is also introduc... 详细信息
来源: 评论
Automated Anomaly detection Using Time-Variant Normal Profiling
Automated Anomaly Detection Using Time-Variant Normal Profil...
收藏 引用
Proceedings of the Biannual World Automation Congress
作者: Jung Yeop Kim Rex E. Gantenbein Utica College Utica NY USA University of Wurzburg Laramie WY USA
Anomaly detection provides automated detection of unauthorized intrusion into a computer system by creating a normal profile of the system's behavior, then raising an alert when the system's behavior does not ... 详细信息
来源: 评论
D1HT: a distributed one hop hash table  06
D1HT: a distributed one hop hash table
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: L.R. Monnerat C.L. Amorim Comput. & Syst. Eng. Fed. Univ. of Rio de Janeiro Brazil COPPE-Computer and Systems Engineering Federal University of Rio de Janeiro Brazil
Distributed hash tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in order to keep little routing information... 详细信息
来源: 评论
Robust abnormity detecting and tracking using correlation coefficient
Robust abnormity detecting and tracking using correlation co...
收藏 引用
International Conference on Multimedia Modeling (MMM)
作者: Jin Zheng Bo Li Chunlian Yao Digital Media Laboratory School of Computer Science and Engineerinlg Beihang University Beijing China
Abnormity detection based on computer vision is the foundation of high-level automatic surveillance that includes objects recognition, tracking and alarm etc. In this paper, a robust abnormity detection algorithm usin... 详细信息
来源: 评论
detection of Low Intensity DoS Attacks using Fuzzy Based Intrusion detection System
Detection of Low Intensity DoS Attacks using Fuzzy Based Int...
收藏 引用
International Conference on Electrical and Computer Engineering (ICECE)
作者: Habibullah Baig Farrukh Kamran Center for Advanced Studies in Engineering Pakistan
Detecting low intensity denial of service (DoS) attacks in minimum time with less false positives is challenging for network based intrusion detection systems. In this paper we propose a new fuzzy logic based approach... 详细信息
来源: 评论
Real-Time Approaches of Urban Vehicle Traffic Control
Real-Time Approaches of Urban Vehicle Traffic Control
收藏 引用
IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR
作者: T. S. Letia Department of Automation Technical University of Cluj Napoca Cluj-Napoca Romania
The classical approaches of intersection control are based on cycle periods. Instead of this, the current paper focuses on the lane periods and uses real-time scheduling algorithms to determine the moments of times wh... 详细信息
来源: 评论
A detection Algorithm for Maneuvering IR Point Target and Its Performance Evaluation
A Detection Algorithm for Maneuvering IR Point Target and It...
收藏 引用
IEEE/ASME International Conference on Mechtronic and Embedded Systems and Applications, MESA
作者: Feng-yun Zhu Shi-yin Qin School of Automation Science and Electrical Engineering BeiHang University Beijing China
An algorithm for detecting a maneuvering IR point target in complex background is proposed in this paper. It is based on frame change detection and the reverse phase feature of neighborhood (RPFN) of a maneuvering poi... 详细信息
来源: 评论
Vision-based Density detection of Traffic Flow in Urban Intersection in the Daytime
Vision-based Density Detection of Traffic Flow in Urban Inte...
收藏 引用
International Conference on ITS Telecommunications (ITST)
作者: Shengli Shi Jianmin Xu Zhong Qin School of Traffic and Communications South China University of Technology Guangzhou China
In urban intersection of intelligent control system, detection of rows of vehicles is essential to the control algorithm, and density estimation method and vision-based detection algorithm are presented in this paper ... 详细信息
来源: 评论