CASIA OpenIR

Browse/Search Results:  1-10 of 10 Help

Selected(0)Clear Items/Page:    Sort:
Simulation for Decentralized Motion Control of Multi-agent Flocking and Collaboration 会议论文
INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE), 2011
Authors:  Fan, CC;  Yang, GD;  Li, E;  Liang, ZZ
Favorite  |  View/Download:35/0  |  Submit date:2015/08/19
Image-Based Visual Servoing of an Inspection Robot for Power Transmission Lines 会议论文
INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE), 2011
Authors:  Yang, GD;  Fan, CC;  Zhao, DZ;  Li, E;  Liang, ZZ
Favorite  |  View/Download:38/0  |  Submit date:2015/08/19
An Embedded Vision System for a Power Transmission Line Inspection Robot 会议论文
INTELLIGENT ROBOTICS AND APPLICATIONS, PROCEEDINGS, 2009
Authors:  Lei, WY;  Li, E;  Yang, GD;  Fan, CC;  Jing, FS;  Liang, ZZ
Favorite  |  View/Download:35/0  |  Submit date:2015/08/19
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:33/0  |  Submit date:2015/11/06
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:39/0  |  Submit date:2015/11/06
Homeland Security  Intelligence  Information  
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:52/0  |  Submit date:2015/11/06
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:40/0  |  Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  Favorite  |  View/Download:38/6  |  Submit date:2015/11/07
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
Authors:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
View  |  Adobe PDF(109Kb)  |  Favorite  |  View/Download:68/22  |  Submit date:2015/11/08
Novel Identity Authentication  
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
Authors:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  Favorite  |  View/Download:39/6  |  Submit date:2015/11/07