咨询与建议

限定检索结果

文献类型

  • 6,385 篇 会议
  • 934 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,162 篇 工学
    • 1,114 篇 电气工程
    • 909 篇 计算机科学与技术...
    • 661 篇 信息与通信工程
    • 268 篇 控制科学与工程
    • 200 篇 仪器科学与技术
    • 162 篇 机械工程
    • 162 篇 软件工程
    • 121 篇 电子科学与技术(可...
    • 101 篇 生物医学工程(可授...
    • 100 篇 交通运输工程
    • 86 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 33 篇 土木工程
    • 29 篇 生物工程
    • 23 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 16 篇 光学工程
    • 15 篇 水利工程
  • 280 篇 理学
    • 80 篇 系统科学
    • 60 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 175 篇 医学
    • 116 篇 临床医学
    • 28 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 48 篇 农学
    • 26 篇 作物学
    • 21 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 13 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,324 篇 detection algori...
  • 759 篇 detectors
  • 738 篇 feature extracti...
  • 627 篇 algorithm design...
  • 563 篇 object detection
  • 526 篇 image edge detec...
  • 386 篇 testing
  • 359 篇 robustness
  • 331 篇 cameras
  • 307 篇 computer science
  • 284 篇 monitoring
  • 274 篇 data mining
  • 255 篇 image segmentati...
  • 255 篇 computational mo...
  • 249 篇 accuracy
  • 233 篇 signal to noise ...
  • 230 篇 clustering algor...
  • 199 篇 change detection...
  • 197 篇 electrocardiogra...
  • 195 篇 pixel

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,248 篇 英文
  • 36 篇 中文
  • 35 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection algorithms"
7324 条 记 录,以下是41-50 订阅
排序:
Geometric Congestion detection algorithms in the Speed-Flow and Flow-Density Spaces  18
Geometric Congestion Detection Algorithms in the Speed-Flow ...
收藏 引用
18th IEEE International Conference on Intelligent Transportation Systems
作者: Moylan, Emily Rey, David Waller, S. Travis Univ New S Wales Sch Civil & Environm Engn Sydney NSW 2052 Australia
Many ITS applications rely on known attributes of the traffic conditions. One useful property is congestion state which allows for differential behaviour in the system when demand is below, at or above capacity. Conge... 详细信息
来源: 评论
Signal design and detection algorithms for quick detection under false alarm rate constraints  25
Signal design and detection algorithms for quick detection u...
收藏 引用
25th National Conference on Communications (NCC)
作者: Kumar, Alamuru Pavan Vineeth, B. S. UR Rao Satellite Ctr Payload Data Management Grp Bangalore Karnataka India Indian Inst Space Sci & Technol Dept Avion Thiruvananthapuram Kerala India
In this paper, we consider the design of sequential detection algorithms for the low delay detection of a finite duration transient change signal from noisy observations of the signal under a false alarm rate constrai... 详细信息
来源: 评论
Anomaly detection algorithms for the Sleeping Cell detection in LTE Networks  81
Anomaly Detection Algorithms for the Sleeping Cell Detection...
收藏 引用
81st IEEE Vehicular Technology Conference (VTC Spring)
作者: Chernov, Sergey Cochez, Michael Ristaniemi, Tapani Univ Jyvaskyla Dept Math Informat Technol SF-40351 Jyvaskyla Finland
The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after m... 详细信息
来源: 评论
Compressed Channel Estimation and Data detection algorithms for IR-UWB
Compressed Channel Estimation and Data Detection Algorithms ...
收藏 引用
IEEE International Conference on Ultra-Wideband (ICUWB)
作者: Barbieri, Alessandro Pancaldi, Fabrizio Vitetta, Giorgio M. Univ Modena & Reggio Emilia Dept Informat Engn Reggio Emilia Italy Univ Modena & Reggio Emilia Dept Sci & Methods Engn Reggio Emilia Italy
In this paper compressed sensing (CS) techniques are employed to develop reduced sampling rate strategies for channel estimation and data detection in impulse radio ultrawideband (IR-UWB) systems. In particular, first... 详细信息
来源: 评论
Evaluation Method for Arc Fault detection algorithms  40
Evaluation Method for Arc Fault Detection Algorithms
收藏 引用
40th IEEE Photovoltaic Specialists Conference (PVSC)
作者: McConnell, Stephen Wang, Zhan Balog, Robert S. Johnson, Jay Texas A&M Univ College Stn TX 77840 USA Sandia Natl Labs Albuquerque NM 87185 USA
Many methods have been proposed to detect arc faults within photovoltaic systems. However, because of the dearth of data surrounding arcs that actually occur in commercial or residential PV systems, a sound method is ... 详细信息
来源: 评论
The Efficiency of detection algorithms for Optimal FTN Signals  19th
The Efficiency of Detection Algorithms for Optimal FTN Signa...
收藏 引用
19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems (NEW2AN) / 12th Conference on the Internet of Things and Smart Spaces ruSMART (Are You Smart)
作者: Zavjalov, Sergey V. Ovsyannikova, Anna S. Lavrenyuk, Ilya I. Volvenko, Sergey V. Peter Great St Petersburg Polytech Univ St Petersburg Russia
Optimal signals represent the branch of FTN signaling and may be used for spectral efficiency improvement. Such signals may be detected with a simple coherent bit-by-bit algorithm if the transmission rate is equal to ... 详细信息
来源: 评论
Specification and Evaluation of Geofence Boundary Violation detection algorithms
Specification and Evaluation of Geofence Boundary Violation ...
收藏 引用
International Conference on Unmanned Aircraft Systems (ICUAS)
作者: Stevens, Mia N. Rastgoftar, Hossein Atkins, Ella M. Univ Michigan Ann Arbor MI 48109 USA
This paper studies two methods of geofence boundary violation detection. The first method is Ray Casting, which iterates over each geofence boundary edge to determine if a given position of interest is inside the geof... 详细信息
来源: 评论
Context Exploitation in Intelligence, Surveillance, and Reconnaissance for detection algorithms  15
Context Exploitation in Intelligence, Surveillance, and Reco...
收藏 引用
IEE* Win* App* Com* Vis* Wor*
作者: Tucker, Jonathan D. Stanfill, S. Robert Lockheed Martin Missiles & Fire Control Appl Res Orlando FL 32819 USA
Intelligence, Surveillance, and Reconnaissance (ISR) missions involve complex analysis of sensor data that can benefit from the exploitation of geographically aligned context. In this paper we discuss our approach to ... 详细信息
来源: 评论
Performance Effects of Dynamic Graph Data Structures in Community detection algorithms
Performance Effects of Dynamic Graph Data Structures in Comm...
收藏 引用
IEEE High Performance Extreme Computing Conference (HPEC)
作者: Thankachan, Rohit Varkey Swenson, Brian P. Fairbanks, James P. Georgia Inst Technol Sch Comp Sci Atlanta GA 30332 USA Georgia Tech Res Inst Atlanta GA 30332 USA
Community detection algorithms create a dynamic graph as an internal data structure for tracking agglomerative merges. This community (block) graph is modified heavily through operations derived from moving vertices b... 详细信息
来源: 评论
Evaluation of Duplicate detection algorithms: From Quality Measures to Test Data Generation  37
Evaluation of Duplicate Detection Algorithms: From Quality M...
收藏 引用
37th IEEE International Conference on Data Engineering (IEEE ICDE)
作者: Panse, Fabian Naumann, Felix Univ Hamburg Hamburg Germany Univ Potsdam Hasso Plattner Inst Potsdam Germany
Duplicate detection identifies multiple records in a dataset that represent the same real-world object. Many such approaches exist, both in research and in industry. To investigate essential properties of duplicate de... 详细信息
来源: 评论