咨询与建议

限定检索结果

文献类型

  • 6,401 篇 会议
  • 953 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,179 篇 工学
    • 1,119 篇 电气工程
    • 919 篇 计算机科学与技术...
    • 662 篇 信息与通信工程
    • 271 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 100 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 285 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 35 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 179 篇 医学
    • 120 篇 临床医学
    • 28 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,359 篇 detection algori...
  • 756 篇 detectors
  • 738 篇 feature extracti...
  • 621 篇 algorithm design...
  • 569 篇 object detection
  • 528 篇 image edge detec...
  • 382 篇 testing
  • 361 篇 robustness
  • 329 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 275 篇 data mining
  • 258 篇 computational mo...
  • 255 篇 image segmentati...
  • 254 篇 accuracy
  • 234 篇 signal to noise ...
  • 231 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 194 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,280 篇 英文
  • 38 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection algorithms"
7359 条 记 录,以下是271-280 订阅
排序:
Automatic Tuning of MST Segmentation of Mammograms for Registration and Mass detection algorithms
Automatic Tuning of MST Segmentation of Mammograms for Regis...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Mariusz Bajger Fei Ma Murk J. Bottema School of Computer Science Engineering and Mathematics Flinders University Adelaide SA Australia
A technique utilizing an entropy measure is developed for automatically tuning the segmentation of screening mammograms by minimum spanning trees (MST). The lack of such technique has been a major obstacle in previous... 详细信息
来源: 评论
Design of adaptive detection algorithms for surveillance radar
Design of adaptive detection algorithms for surveillance rad...
收藏 引用
IEEE International Conference on Radar
作者: W.L. Melvin J.R. Guerci M.J. Callahan M.C. Wicks Georgia Tech Research Institute Georgia Institute of Technology Atlanta GA USA Dejense Advanced Research Projects Agency Arlington VA USA US Air Force Research Laboratory Rome NY USA
Multidimensional adaptive signal processing algorithms are vital components of advanced radar systems, improving detection and throughput performance by exploiting signal diversity. Our focus in this paper centers on ... 详细信息
来源: 评论
Performance Analysis of Learning-based Intent Drift detection algorithms in Next Generation Networks
Performance Analysis of Learning-based Intent Drift Detectio...
收藏 引用
IEEE Latin-American Conference on Communications, LATINCOM
作者: Chukwuemeka Muonagor Mounir Bensalem Admela Jukan Technical University of Braunschweig Germany
Intent-Based Networking (IBN) is a known concept for enabling the autonomous configuration and self-adaptation of networks. One of the major issues in IBN is maintaining the applied intent due to the effects of drifts... 详细信息
来源: 评论
Impact of Evolutionary Community detection algorithms for Edge Selection Strategies
Impact of Evolutionary Community Detection Algorithms for Ed...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Paolo Barsocchi Stefano Chessa Luca Foschini Dimitri Belli Michele Girolami Istituto di Scienza e Tecnologie dell'Informazione ISTI-CNR National Council of Research Pisa Italy Dell'Informazione ISTI-CNR University of Pisa Italy University of Bologna Bologna Italy University of Pisa Italy
The combination of the edge computing paradigm with Mobile CrowdSensing (MCS) is a promising approach. However, the selection of the proper edge nodes is a crucial aspect that greatly affects the performance of the ex... 详细信息
来源: 评论
Comparative Research of Dynamic Target detection algorithms Based on Static Background
Comparative Research of Dynamic Target Detection Algorithms ...
收藏 引用
Progress in Electromagnetic Research Symposium (PIERS)
作者: Chao Li Song Ran Lan Lin Tongji University Shanghai China
Dynamic target detection is a process of capturing moving objects in videos. detection results are affected by various factors that limit the algorithms’ further development. For example, mutual occlusion between obj... 详细信息
来源: 评论
Review and Comparison of QRS detection algorithms for Arrhythmia Diagnosis
Review and Comparison of QRS Detection Algorithms for Arrhyt...
收藏 引用
IEEE International Conference on Signal Processing, Computing and Control (ISPCC)
作者: Kirti Harsh Sohal Shruti Jain Jaypee University of Information Technology Solan H.P India
The electrocardiogram is the graphical representation of the bio potential generated by the movement of the heart and is used to diagnose different types of heart diseases. The main purpose is to compute Heart Rate an... 详细信息
来源: 评论
Assessment of the single data set detection algorithms under template mismatch
Assessment of the single data set detection algorithms under...
收藏 引用
IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
作者: E. Aboutanios B. Mulgrew School of Engineering and Electronics University of Edinburgh Edinburgh UK
The detection of signals with known templates embedded in zero-mean coloured Gaussian interference is relevant to many fields such as radar, sonar, seismology and biomedicine to name a few. Traditional detection algor... 详细信息
来源: 评论
New Approaches for Lowering Path Expansion Complexity of K-Best MIMO detection algorithms
New Approaches for Lowering Path Expansion Complexity of K-B...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: J. Pons P. Duvaut Conexant Systems Inc. Red Bank NJ USA
The present paper proposes two original approaches to reduce computational resources necessary for expanding survivor paths while searching in a K-best manner the MIMO detection tree. The first approach involves preco... 详细信息
来源: 评论
IntruDetector: a software platform for testing network intrusion detection algorithms
IntruDetector: a software platform for testing network intru...
收藏 引用
Annual Computer Security Applications Conference
作者: Tao Wan Xue Dong Yang Department of Computer Science University of Regina Regina SAS Canada
An intrusion detection system (IDS), that monitors passively specific computing resources, and reports anomalous or intrusive activities, is becoming an important component in the security system of information infras... 详细信息
来源: 评论
A comparative study of anomaly detection algorithms for detection of SIP flooding in IMS
A comparative study of anomaly detection algorithms for dete...
收藏 引用
International Conference on Internet Multimedia Services Architecture and Applications, IMSAA
作者: M. Ali Akbar Zeeshan Tariq Muddassar Farooq Next Generation Intelligent Networks Research Center (nexGIN RC) National University of Computer and Emerging Sciences Islamabad Pakistan
The IP multimedia subsystem (IMS) framework uses session initiation protocol (SIP) for signaling and control of sessions. In this paper, we first demonstrate that SIP flooding attacks on IMS can result in denial of se... 详细信息
来源: 评论