咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithms"
7403 条 记 录,以下是251-260 订阅
排序:
Active Speaker detection Using Audio, Visual, and Depth Modalities: A Survey
收藏 引用
IEEE ACCESS 2024年 12卷 96617-96634页
作者: Robi, Siti Nur Aisyah Mohd Ariffin, Muhammad Atiff Zakwan Mohd Izhar, Mohd Azri Mohd Ahmad, Norulhusna Kaidi, Hazilah Mad UTM Fac Artificial Intelligence Kuala Lumpur 54100 Malaysia
The rapid progress of multimodal signal processing in recent years has cleared the way for novel applications in human-computer interaction, surveillance, and telecommunication. Active Speaker detection (ASD) is a cri... 详细信息
来源: 评论
C2I-CAT: Class-to-Image Cross Attention Transformer for Out-of-Distribution detection
收藏 引用
IEEE ACCESS 2024年 12卷 62793-62803页
作者: Chung, Jaeho Cho, Seokho Choi, Hyunjun Jo, Daeung Jung, Yoonho Choi, Jin Young Seoul Natl Univ Automation & Syst Res Inst ASRI Dept Elect & Comp Engn Seoul 08826 South Korea Medintech Seoul 03100 South Korea Samsung Adv Inst Technol SAIT Samsung Elect Suwon 16678 South Korea
In our work, we have empirically found that Vision Transformer (ViT) could not extract object-centric features when applied to out-of-distribution (OOD) detection. To make object-centric attention, we design an additi... 详细信息
来源: 评论
Lightweight detection Model RM-LFPN-YOLO for Rebar Counting
收藏 引用
IEEE ACCESS 2024年 12卷 3936-3947页
作者: Liu, Haodong Cheng, Wansheng Li, Chunwei Xu, Yaowen Fan, Song Univ Sci & Technol Liaoning Sch Elect & Informat Engn Anshan 114051 Liaoning Peoples R China
In this study, we propose a novel lightweight detection model for rebar counting, which is rectified mobilenet lightweight feature pyramid network based on YOLO (RM-LFPN-YOLO). The model incorporates a lightweight bac... 详细信息
来源: 评论
Enhancing DDoS Attack detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model
收藏 引用
IEEE ACCESS 2024年 12卷 51630-51649页
作者: Alashhab, Abdussalam Ahmed Zahid, Mohd Soperi Isyaku, Babangida Elnour, Asma Abbas Nagmeldin, Wamda Abdelmaboud, Abdelzahir Abdullah, Talal Ali Ahmed Maiwada, Umar Danjuma Alasmarya Islamic Univ Fac Informat Technol Dept Comp Sci Zliten Libya Univ Teknol PETRONAS Dept Comp & Informat Sci Seri Iskandar 32610 Malaysia Sule Lamido Univ Fac Comp & Informat Technol Dept Comp Sci Kano 700271 Jigawa Nigeria King Khalid Univ Appl Coll Comp Dept Girls Sect Muhayel 62529 Aseer Saudi Arabia Prince Sattam Bin Abdulaziz Univ Coll Comp Engn & Sci Dept Informat Syst Al Kharj 11942 Saudi Arabia Sultan Qaboos Univ Humanities Res Ctr Seeb Oman
Software Defined Networks (SDN) offer dynamic reconfigurability and scalability, revolutionizing traditional networking. However, countering Distributed Denial of Service (DDoS) attacks remains a formidable challenge ... 详细信息
来源: 评论
Lightweight YOLOv8 for Wheat Head detection
收藏 引用
IEEE ACCESS 2024年 12卷 66214-66222页
作者: Fang, Chen Yang, Xiang Guilin Univ Technol Coll Comp Sci & Engn Guilin 541006 Guangxi Peoples R China
Accurate real-time observations of wheat head growth are crucial for effective agricultural management. However, the dense distribution of wheat heads often leads to severe overlap in imagery. Existing target detectio... 详细信息
来源: 评论
Automated detection of Spinal Lesions From CT Scans via Deep Transfer Learning
收藏 引用
IEEE ACCESS 2024年 12卷 65310-65322页
作者: Camisa, Andrea Montanari, Giovanni Testa, Andrea Falzetti, Luigi Avnet, Sofia Baldini, Nicola Notarstefano, Giuseppe Helsing London W1T 3BL England Salcef Grp I-00138 Rome Italy Univ Bologna Dept Elect Elect & Informat Engn I-40126 Bologna Italy IRCCS Ist Ortoped Rizzoli Biomed Sci & Technol & Nanobiotechnol Lab I-40136 Bologna Italy Univ Bologna Dept Biomed & Neuromotor Sci I-40126 Bologna Italy
Convolutional Neural Networks are being increasingly applied to the detection of anomalies in Computed Tomographies (CTs). The goal of this paper is to implement an automated Computer-Aided detection (CADe) system for... 详细信息
来源: 评论
Overcoming the Challenges of Long-Tail Distribution in Nighttime Vehicle detection
收藏 引用
IEEE INTELLIGENT SYSTEMS 2024年 第2期39卷 51-60页
作者: Zhang, Houwang Chan, Leanne Lai Hang City Univ Hong Kong Dept Elect Engn Hong Kong 999077 Peoples R China City Univ Hong Kong Elect Engn Hong Kong 999077 Peoples R China
As the basic task of an intelligent transportation system, nighttime vehicle detection is associated with many challenges. Existing methods usually ignore the significant challenges that arise from imbalanced class di... 详细信息
来源: 评论
Guided Attention and Joint Loss for Infrared Dim Small Target detection
收藏 引用
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 2024年 62卷
作者: Tong, Yunfei Liu, Jing Fu, Zhiling Wang, Zhe Yang, Hai Niu, Saisai Tan, Qinyan East China Univ Sci & Technol Minist Educ Key Lab Smart Mfg Energy Chem Proc Shanghai 200237 Peoples R China East China Univ Sci & Technol Dept Comp Sci & Engn Shanghai 200237 Peoples R China China Aerosp Sci & Technol Corp Shanghai Aerosp Control Technol Inst Shanghai 201109 Peoples R China China Aerosp Sci & Technol Corp Res & Dev Ctr Infrared Detect Technol Shanghai 201109 Peoples R China
Infrared dim small target (IDST) detection is of great significance in security surveillance and disaster relief. However, the complex background interference and tiny targets in infrared images keep it still a long-t... 详细信息
来源: 评论
BotFence: A Framework for Network-Enriched Botnet detection and Response With SmartNICs
收藏 引用
IEEE ACCESS 2024年 12卷 114878-114893页
作者: Seo, Hyunmin Shin, Seungwon Lee, Seungsoo Korea Adv Inst Sci & Technol Sch Elect Engn Daejeon 34141 South Korea Incheon Natl Univ Dept Comp Sci & Engn Incheon 22012 South Korea
The scale of botnet attacks is on the rise, yet traditional network security systems are inadequate to effectively respond to these threats, primarily due to high false positive rates and the extensive manpower requir... 详细信息
来源: 评论
Using Graph Attention Networks in Healthcare Provider Fraud detection
收藏 引用
IEEE ACCESS 2024年 12卷 132786-132800页
作者: Mardani, Shahla Moradi, Hadi Univ Tehran Coll Engn Sch Elect & Comp Engn Tehran 111554563 Iran SKKU Intelligent Syst Res Inst Suwon 16419 South Korea
Healthcare fraud increases healthcare expenses for insurers, premiums for policyholders, and dissatisfaction of legitimate patients and causes severe damage to the health system. Therefore, it is critically important ... 详细信息
来源: 评论