搜索资源列表
On the Energy Detection of Unknown Signals Over Fading Channels
- On the Energy Detection of Unknown Signals Over Fading ChannelsAbstract—This letter addresses the problem of energy detection of an unknown signal over a multipath channel. It starts with the no-diversity case, and presents some alternative closed-fo
comparison
- comparison of iris and face detection
3D_Object_Detection
- A Statistical Method for 3D Object Detection Applied to Faces and Cars.
Tracking_and_Object_Classification_for_Automated_S
- O.Javed and M.Shah. 《Tracking and object classification for automated surveillance》. 这篇英文文献是有关运动目标检测跟踪及其分类的文章。该文利用“人体运动的周期性”,把运动目标分为人、人群、机动车。具有较强的参考价值。-O. Javed and M. Shah. " Tracking and object classification for automated surveillance" .
paper01
- A FFT-based partial matched filter (PMF) acquisition threshold setting method for fast GPS acquisition is presented. Normal distribution and numerical fitting technique instead of real decision variable (DV) distribution are used in derivatio
face_detection_documentation
- Documentation about Face detection (with neural networks)
DistributedIntrusionDetection
- Distributed Intrusion Detection for network
Mul-Obj-Tracking
- A paper on A Detection Based Multiple Object Tracking Method
SpontaneousEmotionalFacialExpressionDetection
- 三维人脸识别的经典文章,三维人脸表情引用次数极多的经典论文-Spontaneous Emotional Facial Expression Detection Index Terms—affective computing, facial expression, one-class classification, emotion recognition
vehicles_detecting_and_tracking
- 运动车辆检测与目标跟踪研究毕业答辩PPT-Moving Vehicle Detection and Tracking of graduates to reply PPT
sift1
- 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题, 借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制 遮盖的篡改操作。 -Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-proc
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
ids
- For anomaly detection
Pedestrian-Detection
- 一份解析关于智能车辆的行人检测技术研究,是入门接触的不错的资料-Analysis of a pedestrian on the intelligent vehicle detection technology, is a good entry information contact
Crowd-Detection
- 最新顶级会议ECCV2010关于拥挤检测的文章-Crowd Detection with a Multiview SamplerECCV2010ge1
Dr.Dhyaa-Background-Subtraction-for-Detection-and
- dissertation about moving object detection and tracking
Real-time-detection-of-negative
- 同相牵引供电系统旨在实现电能质量的综合补偿。提出了一种基于同步坐标变换的电流检测方法,能实时准确地检测 出负载电流的基波正序有功分量、基波正序无功分量、基波负序分量以及谐波分量,为综合补偿提供了基础。电能质量的补 偿力度与设备容量之间存在非线性关系。提出补偿度的概念,并给出补偿度与电能质量参数的关系,通过给定电能质量期望 参数,实时调整负序、谐波以及无功补偿度,使得综合潮流控制器容量在各电能质量补偿参数之间得到实时优化配置,从而 实现同相供电系统容量优化满意补偿。理论推导和仿真结
software-vulnerability-detection
- 基于二进制文件的漏洞挖掘关键技术研究,博士论文-research on binary-executable-oriented software vulnerability detection, doctor thesis
Energy-Detection-of-Unknown-Deterministic-Signals
- most important paper in energy detection and alla paper refer to it
EDGE-DETECTION
- 整理好的一些关于 图像边缘检测 的论文-collect some papers about image edge detection