咨询与建议

限定检索结果

文献类型

  • 195 篇 期刊文献
  • 154 篇 会议
  • 5 篇 学位论文
  • 2 册 图书
  • 1 篇 资讯

馆藏范围

  • 357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 274 篇 工学
    • 129 篇 电气工程
    • 101 篇 计算机科学与技术...
    • 55 篇 信息与通信工程
    • 30 篇 仪器科学与技术
    • 23 篇 控制科学与工程
    • 21 篇 软件工程
    • 18 篇 机械工程
    • 17 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 11 篇 交通运输工程
    • 9 篇 测绘科学与技术
    • 8 篇 材料科学与工程(可...
    • 7 篇 环境科学与工程(可...
    • 6 篇 光学工程
    • 6 篇 石油与天然气工程
    • 6 篇 网络空间安全
    • 5 篇 航空宇航科学与技...
  • 94 篇 理学
    • 45 篇 物理学
    • 17 篇 生物学
    • 14 篇 数学
    • 11 篇 化学
    • 10 篇 地球物理学
    • 6 篇 大气科学
    • 5 篇 天文学
  • 59 篇 医学
    • 45 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
    • 6 篇 中西医结合
    • 5 篇 特种医学
  • 28 篇 管理学
    • 24 篇 管理科学与工程(可...
  • 7 篇 农学
  • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 357 篇 detection algori...
  • 10 篇 detection algori...
  • 7 篇 deep learning
  • 7 篇 computer vision
  • 6 篇 computational co...
  • 6 篇 implantable card...
  • 6 篇 machine learning
  • 5 篇 object detection
  • 5 篇 signal detection
  • 5 篇 data mining
  • 5 篇 feature extracti...
  • 5 篇 detekční algorit...
  • 5 篇 inappropriate th...
  • 4 篇 simulation
  • 4 篇 fmcw radar
  • 4 篇 syndromic survei...
  • 4 篇 neural network
  • 4 篇 artificial intel...
  • 4 篇 community struct...
  • 4 篇 sensors

机构

  • 5 篇 brno university ...
  • 5 篇 harbin inst tech...
  • 4 篇 xi an jiao tong ...
  • 3 篇 iee sa basics & ...
  • 3 篇 univ appl sci la...
  • 2 篇 chengdu univ inf...
  • 2 篇 nanjing univ pos...
  • 2 篇 electrical eng. ...
  • 2 篇 wuhan univ sci &...
  • 2 篇 univ houston dep...
  • 2 篇 xian univ techno...
  • 2 篇 aoyama gakuin un...
  • 2 篇 naval res lab wa...
  • 2 篇 defence science ...
  • 2 篇 chengdu univ tec...
  • 2 篇 nanyang technol ...
  • 2 篇 univ geneva dept...
  • 2 篇 natl inst hlth s...
  • 2 篇 kanazawa univ co...
  • 2 篇 xidian univ natl...

作者

  • 6 篇 li lin
  • 5 篇 meng weixiao
  • 3 篇 chen silei
  • 3 篇 tchameni michell...
  • 3 篇 wang wei
  • 3 篇 diewald andreas ...
  • 3 篇 luecken volker
  • 3 篇 schroeder udo
  • 3 篇 hou huijun
  • 3 篇 li xingwen
  • 2 篇 jung w
  • 2 篇 karmakar nemai c...
  • 2 篇 yang qiang
  • 2 篇 xie zhimin
  • 2 篇 wang ping
  • 2 篇 wang shuliang
  • 2 篇 wang yuping
  • 2 篇 murray a
  • 2 篇 aijun fan
  • 2 篇 liu jun

语言

  • 331 篇 英文
  • 15 篇 其他
  • 7 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithm"
357 条 记 录,以下是311-320 订阅
排序:
Quick detection Model of Abnormal Low Price Bidding Behavior in Construction Project Bidding
Quick Detection Model of Abnormal Low Price Bidding Behavior...
收藏 引用
第七届工程管理国际学术研讨会
作者: Haizhu LI Wenze GAO Xuancang WANG School of Highway Chang'an University
The detection of abnormal low-price bidding behavior is one of the widely concerned problems in the field of construction project bidding. In practice, the method of setting abnormal quotation threshold based on exper... 详细信息
来源: 评论
Android malicious code detection and recognition based on depth learning
Android malicious code detection and recognition based on de...
收藏 引用
2017 4th International Conference on Machinery,Materials and Computer(MACMC 2017)
作者: YangJing Hubei University of Police
At present, most malicious code detection methods are based on the shallow machine learning model. These shallow machine learning methods are simple in the modeling process, and restrict the complex functions and clas... 详细信息
来源: 评论
Modeling of Wood Macrostructure in the Technology of Its Cutting  7th
Modeling of Wood Macrostructure in the Technology of Its Cut...
收藏 引用
7th International Conference on Industrial Engineering, ICIE 2021
作者: Isaev, S. Erenkov, O. Pacific National University 136 Tikhookeanskaya Street Khabarovsk680035 Russia
The work presents general approaches to the construction of the software and hardware stable complex. The complex is capable to detect textural annual rings of round timber with subsequent the object internal macrostr... 详细信息
来源: 评论
Overdose detection Among High-Risk Opioid Users Via a Wearable Chest Sensor in a Supervised Injecting Facility: Protocolfor an Observational Study
收藏 引用
JMIR RESEARCH PROTOCOLS 2024年 13卷 e57367页
作者: Tas, Basak Lawn, Will Jauncey, Marianne Bartlett, Mark Dietze, Paul O'Keefe, Daniel Clark, Nico Henderson, Bruce Cowan, Catriona Meredith, Osian Strang, John Kings Coll London Inst Psychiat Psychol & Neurosci Natl Addict Ctr Addiction Sci Bldg London SE5 8BB England Kings Coll London Inst Psychiat Psychol & Neurosci Dept Psychol London England Medically Supervised Injecting Ctr Sydney Australia Burnet Inst Dis Eliminat Melbourne Australia Royal Melbourne Hosp Melbourne Australia PneumoWave LTD Motherwell Scotland South London & Maudsley NHS Fdn Trust London England
Background: Opioid overdose is a global health crisis, affecting over 27 million individuals worldwide, with more than 100,000 drug overdose deaths in the United States in 2022-2023. This protocol outlines the develop... 详细信息
来源: 评论
Research on Safety Quality Monitoring algorithm of Assembled Building Construction Based on Neural Network Technology
Research on Safety Quality Monitoring Algorithm of Assembled...
收藏 引用
2023 International Conference on Integrated Intelligence and Communication Systems, ICIICS 2023
作者: Zhang, Shuaishuai Liu, Huan Wang, Huaizhu Shandong Polytechnic College Shandong China
With the continuous development of the city, prefabricated building has gradually become an important form of modern architecture, but at the same time, the construction safety of prefabricated building has increasing... 详细信息
来源: 评论
Study of Low-altitude Slow and Small Target detection on Radar
Study of Low-altitude Slow and Small Target Detection on Rad...
收藏 引用
2017 5th International Conference on Machinery,Materials and Computing Technology(ICMMCT 2017)
作者: Daoming Xu Hongwei Zhang Department of Electronic and Optics Engineering Ordnance Engineering College
Holding low-altitude, slow and small(LSS) target has become a difficulty and study hotspot in air defense warning. This paper firstly introduces the characteristics of the LSS-target and the practical significance and... 详细信息
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-326
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-326 by published by
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-736
收藏 引用
2016年
[Auto Generated] 1 Introduction 1 1.1 The BeBe System 1 2 Background 2 2.1 Computational architectures 2 2.2 Continuous speech 4 2.3 Phoneme models 6 2.4 Human speech recognition 6 2.5 Students learn phonemes 7 3 Desi... 详细信息
来源: 评论
The notion of "best predictors": An application to tornado prediction
收藏 引用
WEATHER AND FORECASTING 1999年 第6期14卷 1007-1016页
作者: Marzban, C Mitchell, ED Stumpf, GJ Univ Oklahoma Natl Severe Storms Lab Norman OK 73069 USA Univ Oklahoma Cooperat Inst Mesoscale & Meteorol Studies Norman OK 73069 USA Univ Oklahoma Dept Phys Norman OK 73069 USA
It is argued that the strength of a predictor is an ill-defined concept. At best, it is contingent on many assumptions, and, at worst, it is an ambiguous quantity. It is shown that many of the contingencies are met (o... 详细信息
来源: 评论
A Review of Cybersecurity Challenges in Smart Power Transformers
收藏 引用
IEEE ACCESS 2024年 12卷 193972-193996页
作者: Rahimpour, Hossein Tusek, Joe Musleh, Ahmed S. Liu, Boyu Abuadbba, Alsharif Phung, Toan Seneviratne, Aruna Univ New South Wales Sch Elect Engn & Telecommun Sydney NSW 2052 Australia Ampcontrol Warabrook NSW 2304 Australia CSIROs Data61 Marsfield NSW 2122 Australia Cyber Secur Cooperat Res Ctr Joondalup WA 6027 Australia
In the evolving landscape of critical infrastructure security, the increasing sophistication of cyber threats poses challenges, particularly to the power grid's new technology infrastructure. Despite traditionally... 详细信息
来源: 评论