CASIA OpenIR

浏览/检索结果: 共12条,第1-10条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Application of a decomposed support vector machine algorithm in pedestrian detection from a moving vehicle 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 无, 页码: 662-663
作者:  Qiao, H;  Wang, FY;  Cao, XB;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:182/0  |  提交时间:2015/11/06
  
A reinforcement learning based radial-bassis function network control system 期刊论文
ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 1, PROCEEDINGS, 2005, 卷号: 3496, 期号: ?, 页码: 640-645
作者:  Li, JN;  Yi, JQ;  Zhao, DB;  Xi, GC;  Wang, J;  Liao, X;  Yi, Z
浏览  |  Adobe PDF(214Kb)  |  收藏  |  浏览/下载:192/54  |  提交时间:2015/11/06
Radial-basis Function  Reinforcement Learning  
A secured mobile phone based ton embedded fingerprint recognition systems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 2005, 页码: 549-553
作者:  Chen, XJ;  Tian, J;  Su, Q;  Yang, X;  Wang, FY;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tian, Jie
浏览  |  Adobe PDF(227Kb)  |  收藏  |  浏览/下载:337/120  |  提交时间:2015/11/06
Embedded Fingerprint  
Gabor feature selection for face recognition using improved AdaBoost learning 期刊论文
ADVANCES IN BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 卷号: 3781, 页码: 39-49
作者:  Shen, LL;  Bai, L;  Bardsley, D;  Wang, YS;  Li, SZ;  Sun, Z;  Tan, T;  Pankanti, S;  Chollet, G;  Zhang, D
收藏  |  浏览/下载:182/0  |  提交时间:2015/11/06
An agent-based framework for a traffic security management system 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 1, 页码: 660-661
作者:  Tang, SM;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tang, Shuming
浏览  |  Adobe PDF(622Kb)  |  收藏  |  浏览/下载:271/78  |  提交时间:2015/11/06
Automatic Incidentdetection  Forecast  Nonparametricregression Algorithms  State Vectors  Traffic Incidents  
A framework for global monitoring and security assistance based on IPv6 and multimedia data mining techniques 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 658-659
作者:  Gong, XY;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:184/0  |  提交时间:2015/11/06
An agent-based holonic architecture for reconfigurable manufacturing systems 期刊论文
ADVANCES IN NATURAL COMPUTATION, PT 3, PROCEEDINGS, 2005, 卷号: 3612, 页码: 622-627
作者:  Wang, F;  Hou, ZG;  Xu, D;  Tan, M;  Wang, L;  Chen, K;  Ong, YS
收藏  |  浏览/下载:189/0  |  提交时间:2015/11/06
Principal component analysis (PCA) for data fusion and navigation of mobile robots 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 610-611
作者:  Hou, ZG;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:156/0  |  提交时间:2015/11/06
Application of cooperative co-evolution in pedestrian detection systems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 无, 页码: 664-665
作者:  Cao, XB;  Qiao, H;  Wang, FY;  Zhang, XZ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:174/0  |  提交时间:2015/11/06
  
Some marginal learning algorithms for unsupervised problems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 395-401
作者:  Tao, Q;  Wu, GW;  Wang, FY;  Wang, J;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:120/0  |  提交时间:2015/11/06