Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- intrusion detection 3 Treffer
- biometrics 2 Treffer
- machine learning 2 Treffer
- bag of words 1 Treffer
- classification 1 Treffer
-
24 weitere Werte:
- cloud computing 1 Treffer
- driving safety 1 Treffer
- eeg 1 Treffer
- eye detection 1 Treffer
- eye tracking 1 Treffer
- feature extraction 1 Treffer
- genetic algorithm 1 Treffer
- haar-like 1 Treffer
- hadoop 1 Treffer
- independent component analysis 1 Treffer
- iris recognition 1 Treffer
- kalman 1 Treffer
- k-means clustering 1 Treffer
- multi-modal 1 Treffer
- network intrusion 1 Treffer
- network security 1 Treffer
- pca 1 Treffer
- power battery 1 Treffer
- rough set theory 1 Treffer
- score level fusion 1 Treffer
- state of health 1 Treffer
- tf-idf 1 Treffer
- video sequence 1 Treffer
- zernike moment 1 Treffer
Sprache
Inhaltsanbieter
13 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 263-276academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 151-158academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 269-280academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 47-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 331-346academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 153-162academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 125-134academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 99-112academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 227-242academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 31-40academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 363-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 65-74academicJournalZugriff: