咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 924 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,161 篇 工学
    • 1,138 篇 电气工程
    • 912 篇 计算机科学与技术...
    • 679 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 161 篇 软件工程
    • 159 篇 机械工程
    • 118 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 84 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 14 篇 光学工程
    • 14 篇 水利工程
  • 266 篇 理学
    • 80 篇 系统科学
    • 50 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 171 篇 医学
    • 112 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,379 篇 detection algori...
  • 773 篇 detectors
  • 772 篇 feature extracti...
  • 627 篇 algorithm design...
  • 586 篇 object detection
  • 531 篇 image edge detec...
  • 404 篇 testing
  • 378 篇 robustness
  • 333 篇 cameras
  • 308 篇 computer science
  • 296 篇 accuracy
  • 288 篇 monitoring
  • 277 篇 data mining
  • 272 篇 computational mo...
  • 254 篇 image segmentati...
  • 240 篇 clustering algor...
  • 234 篇 signal to noise ...
  • 202 篇 electrocardiogra...
  • 199 篇 change detection...
  • 197 篇 signal processin...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,310 篇 英文
  • 36 篇 中文
  • 28 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithms"
7379 条 记 录,以下是4471-4480 订阅
排序:
On the use of memory for detecting musical notes in polyphonic piano music
On the use of memory for detecting musical notes in polyphon...
收藏 引用
European Conference on Circuit Theory and Design, ECCTD
作者: Giovanni Costantini Massimiliano Todisco Renzo Perfetti Department of Electronic Engineering University of Roma Tor Vergata Rome Italy Institute of Acoustics O. M. Corbino Rome Italy Department of Electronic and Information Engineering University of Perugia Perugia Italy
Music transcription consists in transforming the musical content of audio data into a symbolic representation. The objective of this study is to investigate a transcription system for polyphonic piano. The proposed me... 详细信息
来源: 评论
Detecting security anomalies from internet traffic using the MA-RMSE algorithms
Detecting security anomalies from internet traffic using the...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Breno Pinto Varin Khera Chun Che Fung Computer Security Incident Response Team Brasil Telecom Brasilia Brazil Nokia Siemens Networks Inc. Australia School of Information Technology Murdoch University Australia
Many detection techniques against worms, denial of service attacks and botnets on the Internet have been developed. It is difficult to detect these threats if the malicious traffic has insufficient intensity, which is... 详细信息
来源: 评论
Real World Routing Using Virtual World Information
Real World Routing Using Virtual World Information
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Pan Hui Nishanth Sastry Decutsche Teleckom Laboratories Germany University of Cambridge UK
In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant Networks (DTN). We extract community stru... 详细信息
来源: 评论
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems
A Trust-Based Detecting Mechanism against Profile Injection ...
收藏 引用
2009 Third IEEE International Conference on Secure Integration and Reliability Improvement SSIRI 2009(第三届IEEE安全软件集成及可信性改进国际会议)
作者: Chuliang Weng Qiang Zhang Yuan Luo Minglu Li Computer Science and Engineering Department Shanghai Jiao Tong University Shanghai China 200240 Computer Science and Engineering Department Shanghai Jiao Tong University Shanghai China200240
Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also, recommendation could be employed in the virtual mach... 详细信息
来源: 评论
Detecting novel business blogs
Detecting novel business blogs
收藏 引用
International Conference on Information, Communications and Signal Processing
作者: Hongyao Liang Flora S. Tsai Agus T. Kwee School of Electrical & Electronic Engineering Nanyang Technological University Singapore Singapore
Nowadays, blogs have become a popular way for people and organizations to publish news and information to the public, as well as advertise their products. Certain information contained in the blogs represent business ... 详细信息
来源: 评论
Building recognition from aerial images combining segmentation and shadow
Building recognition from aerial images combining segmentati...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Keyan Ren Hanxu Sun Qingxuan Jia Jianbo Shi Department of Automation University of Posts and Telecommunications Beijing China Computer & Information Science University of Pennsylvania Philadelphia PA USA
We propose a novel building detection algorithm for processing high-resolution aerial images. Our algorithm exploits the building-shadow geometric relationship according to lighting models, making it suitable to detec... 详细信息
来源: 评论
A Method of Multi-tone Jamming Suppression in FHCPM Systems
A Method of Multi-tone Jamming Suppression in FHCPM Systems
收藏 引用
2009国际通信电路与系统学术会议(ICCCAS 2009)(2009 International Conference on Communications,Circuits and Systems)
作者: Geng Wang Qiang Li Xiyun Zhu Shaoqian Li National Key Lab of Communication University of Electronic Science and Technology of China Chengdu R.P.China
The performance of an iterative decoding and noncoherent demodulating algorithm to suppress the multi-tone jamming (MTJ) in FH-CPM systems is studied in this paper. To reduce the complexity of the demodulator, an iter... 详细信息
来源: 评论
Evaluation of Quality of Protection Adding HVM in Wireless Network
Evaluation of Quality of Protection Adding HVM in Wireless N...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Sun-Hee Lim Hyeon-Seung Kim Seunghwan Yun Jin-Woong Cho Okyeon Yi Jongin Lim School of Information Management and Security Korea University South Korea Korea Electronics and Technology Institute South Korea Department of Mathematics Kookmin University South Korea
As wireless network cannot dispense with a proper security measure due to its inborn vulnerability, a new security measure has been developed with an advent of new wireless network technology. Each security measure pr... 详细信息
来源: 评论
Novel graph-based algorithms for interference cancellation in CDMA systems
Novel graph-based algorithms for interference cancellation i...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
作者: Alan Barbieri Giulio Colavolpe Dario Fertonani Amina Piemontese SPADiC Laboratory Dipartimento di Ingegneria dell Informazione Università di Parma Parma Italy
We consider soft-input soft-output detection over linear channels impaired by additive white Gaussian noise. For this general model, which describes a large variety of scenarios, novel detection algorithms are derived... 详细信息
来源: 评论
Survey on microgrids: Analysis of technical limitations to carry out new solutions
Survey on microgrids: Analysis of technical limitations to c...
收藏 引用
European Conference on Power Electronics and Applications
作者: Alvaro Llaria Octavian Curea Jaime Jimenez Haritza Camblong Estia Recherche Ecole Supérieure des Technologies Industrielles Avancées Technopôle Izarbel Bidart France Departamento de Electrónica y Telecomunicaciones UPV/EHU Bilbao Spain
Microgrids (MGs) are one of the most promising electrical systems for the next years. Since the definition of the MG paradigm by the first time, the investigation in this area is growing continuously and there are num... 详细信息
来源: 评论