咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 925 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,162 篇 工学
    • 1,138 篇 电气工程
    • 909 篇 计算机科学与技术...
    • 678 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 160 篇 机械工程
    • 160 篇 软件工程
    • 119 篇 电子科学与技术(可...
    • 107 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 83 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 15 篇 水利工程
    • 14 篇 光学工程
  • 265 篇 理学
    • 80 篇 系统科学
    • 50 篇 地球物理学
    • 49 篇 物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 169 篇 医学
    • 110 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,380 篇 detection algori...
  • 773 篇 detectors
  • 766 篇 feature extracti...
  • 632 篇 algorithm design...
  • 585 篇 object detection
  • 532 篇 image edge detec...
  • 397 篇 testing
  • 372 篇 robustness
  • 333 篇 cameras
  • 307 篇 computer science
  • 292 篇 accuracy
  • 286 篇 monitoring
  • 280 篇 data mining
  • 273 篇 computational mo...
  • 254 篇 image segmentati...
  • 235 篇 signal to noise ...
  • 235 篇 clustering algor...
  • 200 篇 change detection...
  • 196 篇 pixel
  • 195 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,309 篇 英文
  • 36 篇 中文
  • 30 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithms"
7380 条 记 录,以下是691-700 订阅
排序:
Classroom Automation System Using Human detection Based on YOLO Algorithm and IoT Technology
Classroom Automation System Using Human Detection Based on Y...
收藏 引用
Electrical and Information Technology (IEIT), International Conference on
作者: Mazaya Muhammad T. S. El Syaff Vincentius Jason Samhadi Brahmantya Aji Pramudita School of Electrical Engineering Telkom University Bandung Indonesia The University Center of Excellence for Intelligent Sensing-IoT Telkom University Bandung Indonesia
Classroom is an important facility in the school or university to be utilized as a learning space and lessons happen. Students and teachers meet in the classroom on a daily, with different schedules. Hence, every clas... 详细信息
来源: 评论
A Real-time detection Algorithm Based On Improved Nanodet For Shaft Parts
A Real-time Detection Algorithm Based On Improved Nanodet Fo...
收藏 引用
International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC
作者: Yuhan Wang Yifei Wu School of Automation Nanjing University of Science and Technology Nanjing China
Aiming at the problems of excessive parameter amount, slow speed and low accuracy of traditional mechanical parts target detection model, a real-time shaft parts detection algorithm based on improved Nanodet is propos... 详细信息
来源: 评论
E-DDoS: An Evaluation System for DDoS Attack detection
E-DDoS: An Evaluation System for DDoS Attack Detection
收藏 引用
International Conference on Network Protocols
作者: Kaiwen Chi Xiaohui Xie Yannan Hu Dongyang Zhao Yuming Xie Liang Zhang Yong Cui Department of Computer Science and Technology Tsinghua University Beijing China Zhongguancun Laboratory Beijing China AI4NET Lab Huawei Technologies Company Ltd Beijing China
Research in the area of Distributed Denial of Service (DDoS) attack detection is of paramount importance in the field of network security. Many existing studies employ static evaluation methods that fail to account fo... 详细信息
来源: 评论
Single-Frame Infrared Point Target detection Based on YOLO-v5
Single-Frame Infrared Point Target Detection Based on YOLO-v...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Bendong Zhao Fengshun Lu Xingzhi Hu Mingjie Li Jianqi Lai China Aerodynamics Research and Development Center Mianyang Sichuan China
In order to solve the problem of target detection in infrared images, a single-frame infrared point target detection method based on YOLO-v5 is proposed. Firstly, the problems and difficulties of single-frame infrared... 详细信息
来源: 评论
Reducing Unfairness in Distributed Community detection
Reducing Unfairness in Distributed Community Detection
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Hao Zhang Malith Jayaweera Bin Ren Yanzhi Wang Sucheta Soundarajan Syracuse University Northeastern University William & Mary
Big graph data mining and processing have emerged as a crucial area of study. Distributed graph frameworks are commonly employed to process such big graph data in various applications. These frameworks have proven to ... 详细信息
来源: 评论
Research on Policy Conflict detection Technology Based on Interdomain Interconnection
Research on Policy Conflict Detection Technology Based on In...
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Daqiu Wang Liangyu Dong Ziyi Wang Peijun Chen Weiruo Pu Yixiang Li Nuclear Power Institute of China Chengdu China China Industrial Control Systems Cyber Emergency Response Team Beijing China
Security policies can effectively maintain the order of interconnection between domains and secure access. However, with the expansion of network scale and the increasing number of policies, the problem of policy conf... 详细信息
来源: 评论
Research on an Intelligent Obstacle detection Algorithm for High Voltage Lines Based on Improved YoLo Algorithm
Research on an Intelligent Obstacle Detection Algorithm for ...
收藏 引用
Power Electronics, Computer Applications (ICPECA), IEEE International Conference on
作者: Yanghong Qin School of Artificial Intelligence Chongqing Three Gorges Vocational College Chongqing China
In this paper, an intelligent obstacle detection method based on improved YOLO (You Only Look Once) algorithm is proposed to improve the efficiency and safety of automated inspection of high-voltage transmission line ... 详细信息
来源: 评论
Reputation-Based Classification for Malicious User detection in Cognitive Radio Networks
Reputation-Based Classification for Malicious User Detection...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Ashutosh Nath Tiwari Ankit Chouhan Ashok Parmar Kamal Captain Sardar Vallabhbhai National Institute of Technology Surat India
Cognitive radio technology has advanced beyond traditional radio systems to efficiently utilize underutilized spectrum. In cognitive radio, cooperative secondary users (CSUs) engage in cooperative spectrum sensing (CS... 详细信息
来源: 评论
Traffic Sign detection Algorithm Based on Improved YOLOv7
Traffic Sign Detection Algorithm Based on Improved YOLOv7
收藏 引用
Computer Engineering and Intelligent Communications (ISCEIC), International Symposium on
作者: Haodong Wang Xindong Zhang College of Electronic Science and Engineering Jilin University Changchun China
With the development of autonomous driving, people have more requirements for traffic sign detection technology, and it is very important to accurately identify the traffic signs roadside for people's safety. In v... 详细信息
来源: 评论
Anomaly detection Algorithm for Multivariate Complex Data Based on Deep Neural Network
Anomaly Detection Algorithm for Multivariate Complex Data Ba...
收藏 引用
Artificial Intelligence, Internet and Digital Economy (ICAID), International Conference on
作者: Guangzhi Deng Haikun Wu Wen He Sheng Ding Qingqing Pan Zekun Ma State Grid Yinchuan Electric Power Supply Company Yinchuan Ningxia
The conventional data anomaly detection structure is mostly single target execution, and the detection efficiency is relatively low, resulting in an increase in the final false detection rate. Therefore, the design an... 详细信息
来源: 评论