咨询与建议

限定检索结果

文献类型

  • 6,401 篇 会议
  • 953 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,179 篇 工学
    • 1,119 篇 电气工程
    • 919 篇 计算机科学与技术...
    • 662 篇 信息与通信工程
    • 271 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 100 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 285 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 35 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 179 篇 医学
    • 120 篇 临床医学
    • 28 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,359 篇 detection algori...
  • 756 篇 detectors
  • 738 篇 feature extracti...
  • 621 篇 algorithm design...
  • 569 篇 object detection
  • 528 篇 image edge detec...
  • 382 篇 testing
  • 361 篇 robustness
  • 329 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 275 篇 data mining
  • 258 篇 computational mo...
  • 255 篇 image segmentati...
  • 254 篇 accuracy
  • 234 篇 signal to noise ...
  • 231 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 194 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,280 篇 英文
  • 38 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection algorithms"
7359 条 记 录,以下是311-320 订阅
排序:
Iterative detection algorithms for extended MC-CDMA
Iterative detection algorithms for extended MC-CDMA
收藏 引用
IEEE International Symposium on Spread Spectrum Techniques and Applications
作者: W.G. Teich A. Bury J. Egle M. Nold J. Lindner Information Technology University of Ulm (EBS) Ulm Germany
Multicarrier code division multiple access (MC-CDMA) combines the advantages of CDMA and orthogonal frequency division multiplexing techniques. For time-varying channels, it can be further improved by introducing an a... 详细信息
来源: 评论
On the False Alarm Rate of Adaptive detection algorithms for Channel Matrix-Based Cognitive Radar/Sonar
On the False Alarm Rate of Adaptive Detection Algorithms for...
收藏 引用
Asilomar Conference on Signals, Systems & Computers
作者: Touseef Ali Douglas Cochran Christ D. Richmond School of Electrical Computer and Energy Engineering Arizona State University Tempe AZ Department of Electrical and Computer Engineering Duke University Durham NC
In this work, we derive an analytical expression for the probability of false alarm for the generalized likelihood ratio test (GLRT) in the channel matrix-based sonar/radar framework when the waveform-independent colo... 详细信息
来源: 评论
Performance comparison of distributed deadlock detection algorithms
Performance comparison of distributed deadlock detection alg...
收藏 引用
International Conference on Data Engineering
作者: O. Bukhres Computer Science Department Moorhead State University Moorhead MN USA
A performance evaluation study of two proposed distributed deadlock detection algorithms, the central controller and distributed deadlock detection algorithms, is described. The author examines and reports the magnitu... 详细信息
来源: 评论
Comparison of voice activity detection algorithms for VoIP
Comparison of voice activity detection algorithms for VoIP
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: R. Venkatesha Prasad A. Sangwan H.S. Jamadagni M.C. Chiranth R. Sah V. Gaurav C. E. D. T. Indian Institute of Science Bangalore India Department of E&C PESIT Bangalore India
We discuss techniques for voice activity detection (VAD) for voice over Internet Protocol (VoIP). VAD aids in saving the bandwidth requirement of a voice session, thereby increasing the bandwidth efficiently. We compa... 详细信息
来源: 评论
Secure Traffic Networks in Smart Cities: Analysis and Design of Cyber-Attack detection algorithms
Secure Traffic Networks in Smart Cities: Analysis and Design...
收藏 引用
American Control Conference
作者: Tanushree Roy Satadru Dey Department of Electrical Engineering University of Colorado Denver Colorado USA
In this paper, we focus on cyber attacks in the context of macroscopic transportation network models. For our studies, we consider a strip of freeway traffic network that is actuated on the upstream boundary by ramp-m... 详细信息
来源: 评论
Performance comparison of Wavelet based OFDM (WOFDM) V-BLAST MIMO system with different detection algorithms
Performance comparison of Wavelet based OFDM (WOFDM) V-BLAST...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Muhammad Yasir M. J. Mughal N.D. Gohar S. A. Moiz GIK Institute of Engineering Science and Technology Topi Khyber Pakhtunkhwa Pakistan Department of Electronic Engineering Mohammad Ali Jinnah University Islamabad Pakistan
In this article, design, performance and simulation of wavelet based OFDM V-BLAST MIMO system has been discussed. Wavelet based OFDM technique is based upon orthonormal wavelets bases generated from Haar quadrature mi... 详细信息
来源: 评论
A comparison between the sum-product and the min-sum iterative detection algorithms based on density evolution
A comparison between the sum-product and the min-sum iterati...
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: A. Anastasopoulos Electrical Engineering and Computer Science Department University of Michigan Ann Arbor MI USA
Recently, density evolution techniques have been used to predict the performance of iterative decoders utilizing the sum-product belief propagation algorithm. We extend this analysis to the min-sum algorithm for binar... 详细信息
来源: 评论
Real-Time Pipe Burst Localization in Water Distribution Networks Using Change Point detection algorithms
Real-Time Pipe Burst Localization in Water Distribution Netw...
收藏 引用
International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
作者: Takudzwa Mzembegwa Clement N Nyirenda Dept. of Computer Science University of the Western Cape Cape Town South Africa
Change point detection (CPD) has proved to be an effective tool for detecting drifts in data and its use over the years has become more pronounced due to the vast amount of data and IoT devices readily available. This... 详细信息
来源: 评论
Design and evaluation of energy detection algorithms for IEEE 802.11a systems
Design and evaluation of energy detection algorithms for IEE...
收藏 引用
IEEE Radio and Wireless Symposium (RWS formerly RAWCON)
作者: Chia-Horng Liu Wireless Communication Technology Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan
This paper presented signal detection algorithms for IEEE 802.11a orthogonal frequency division multiplexing (OFDM) systems. Signal detection is to detect the arrival of the OFDM packets. Due to the burst transmission... 详细信息
来源: 评论
Evaluating Fraud detection algorithms Using an Auction Data Generator
Evaluating Fraud Detection Algorithms Using an Auction Data ...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Sidney Tsang Gillian Dobbie Yun Sing Koh The University of Auckland
Online auction sites are a target for fraud. Researchers have developed fraud detection and prevention methods. However, there are difficulties when using either commercial or synthetic auction data to evaluate the ef... 详细信息
来源: 评论