咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 925 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,162 篇 工学
    • 1,138 篇 电气工程
    • 909 篇 计算机科学与技术...
    • 678 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 160 篇 机械工程
    • 160 篇 软件工程
    • 119 篇 电子科学与技术(可...
    • 107 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 83 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 15 篇 水利工程
    • 14 篇 光学工程
  • 265 篇 理学
    • 80 篇 系统科学
    • 50 篇 地球物理学
    • 49 篇 物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 169 篇 医学
    • 110 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,380 篇 detection algori...
  • 773 篇 detectors
  • 766 篇 feature extracti...
  • 632 篇 algorithm design...
  • 585 篇 object detection
  • 532 篇 image edge detec...
  • 397 篇 testing
  • 372 篇 robustness
  • 333 篇 cameras
  • 307 篇 computer science
  • 292 篇 accuracy
  • 286 篇 monitoring
  • 280 篇 data mining
  • 273 篇 computational mo...
  • 254 篇 image segmentati...
  • 235 篇 signal to noise ...
  • 235 篇 clustering algor...
  • 200 篇 change detection...
  • 196 篇 pixel
  • 195 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,309 篇 英文
  • 36 篇 中文
  • 30 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithms"
7380 条 记 录,以下是4401-4410 订阅
排序:
An Effective Surveillance System Using Thermal Camera
An Effective Surveillance System Using Thermal Camera
收藏 引用
International Conference on Signal Acquisition and Processing, ICSAP
作者: Wai Kit Wong Poi Ngee Tan Chu Kiong Loo Way Soong Lim Faculty of Engineering and Technology Multimedia University Malaysia
Thermography, or thermal visualization is a type of infrared visualization. Thermographic cameras are used in many heavy factories like metal recycling factories, wafer production factories and etc for monitoring the ... 详细信息
来源: 评论
A robust spike and wave algorithm for detecting seizures in a genetic absence seizure model
A robust spike and wave algorithm for detecting seizures in ...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Petros Xanthopoulos Chang-Chia Liu Jicong Zhang Eric R. Miller S. P. Nair Basim M. Uthman Kevin Kelly Panos M. Pardalos Industrial and Systems Engineering Department University of Florida Gainesville FL USA Department of Neurosurgery Johns Hopkins University Baltimore MD USA Allegheny General Hospital Allegheny Singer Research Institute Pittsburgh PA USA Weill Cornell Medical College Doha Qatar
Animal models are used extensively in basic epilepsy research. In many studies, there is a need to accurately score and quantify all epileptic spike and wave discharges (SWDs) as captured by electroencephalographic (E... 详细信息
来源: 评论
Failure Control in Multipath Route Tracing
Failure Control in Multipath Route Tracing
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: D. Veitch B. Augustin R. Teixeira T. Friedman ARC Special Centre of Ultra-Broadband Information Networks (CUBIN) an affiliated program of National ICT Australia (NICTA) University of Melbourne Australia LIP6 Laboratory University of Pierre and Marie Curie-Paris VI CNRS Paris France
Traceroute is widely used to report the path packets take between two Internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption - that there is only a single such path. We speci... 详细信息
来源: 评论
A low complex and efficient coexistence approach for non-coherent multiband impulse radio UWB
A low complex and efficient coexistence approach for non-coh...
收藏 引用
IEEE Princeton Section Sarnoff Symposium
作者: Hanns-Ulrich Dehner Micha Linde Rainer Moorfeld Holger Jakel Dennis Burgkhardt Friedrich Jondral Adolf Finger Institut f ür Nachrichtentechnik Universität Karlsruhe Karlsruhe Germany Communications Laboratory Dresden University of Technology Dresden Germany
When bringing a high data rate multiband impulse radio UWB system to the market it has to coexist with other already existing UWB technologies such as multiband OFDM UWB. This paper analyzes the interference impact of... 详细信息
来源: 评论
Cyclostationary multitone beacon signal for opportunistic spectrum access
Cyclostationary multitone beacon signal for opportunistic sp...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
作者: Hanwen Cao Qipeng Cai Joao Paulo Miranda Thomas Kaiser Institute of Communications Technology Leibniz University Hannover Hanover Germany
Cognitive radio is a promising solution to the problem of spectrum scarcity by means of allowing secondary radio networks access the spectrum opportunistically. One of the most important issues in cognitive radio is h... 详细信息
来源: 评论
Analyzing and resolving anomalies in firewall security policies based on propositional logic
Analyzing and resolving anomalies in firewall security polic...
收藏 引用
IEEE International Conference on Multi Topic
作者: Mohsen Rezvani Ramtin Aryan Department of IT & Computer Engineering Shahrood University of Technology Shahrood Iran
Firewalls are essential components in network security solutions. In order to implement correct security policy, the anomalies in firewall rules should be analyzed carefully, especially in enterprise network. In this ... 详细信息
来源: 评论
A Neyman-Pearson approach to estimating the number of endmembers
A Neyman-Pearson approach to estimating the number of endmem...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Joshua Broadwater Amit Banerjee Applied Physics Laboratory Johns Hopkins University Laurel MD USA
In this paper, we present a new method for estimating the number of endmembers for identification of materials in hyperspectral imagery. Unlike previous approaches, the proposed algorithm utilizes the Neyman-Pearson f... 详细信息
来源: 评论
A New Algorithm for Removal of High-Density Salt and Pepper Noises
A New Algorithm for Removal of High-Density Salt and Pepper ...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Wei Li Yanxia Sun Shengjian Chen Department of Computer Science North China Electric Power University Beijing China
To improve the performance of high-density salt and pepper noise denoising, a new detail preserving median filter algorithm is proposed in this paper. The method replaces only corrupted pixels by either the trimmed me... 详细信息
来源: 评论
Detecting spatio-temporal outliers with kernels and statistical testing
Detecting spatio-temporal outliers with kernels and statisti...
收藏 引用
International Conference on Geoinformatics
作者: James P. Rogers Daniel Barbara Carlotta Domeniconi U.S. Army Engineer Research and Development Center Alexandria VA USA CS Department George Mason University Fairfax VA USA
Outlier detection is the discovery of points that are exceptional when compared with a set of observations that are considered normal. Such points are important since they often lead to the discovery of exceptional ev... 详细信息
来源: 评论
A Novel Method for Boundary Condition Computation in Soft Tissue Deformation
A Novel Method for Boundary Condition Computation in Soft Ti...
收藏 引用
Computer Science and Information Engineering, CSIE, WRI World Congress on FLAGGED
作者: Shengzheng Wang Jie Yang Kai Xie Merchant Marine College Shanghai Maritime University Shanghai China Institute of Image Processing & Pattern Recognition Shanghai Jiaotong University Shanghai China The Methodist Hospital Research Institute Cornell university Houston TX USA
Simulating the soft tissue deformation based on bone-related planning is one of the most difficult issues in generating realistic motion of soft tissues. The difficulty of this problem arises from unclear boundary con... 详细信息
来源: 评论