咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 925 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,162 篇 工学
    • 1,138 篇 电气工程
    • 909 篇 计算机科学与技术...
    • 678 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 160 篇 机械工程
    • 160 篇 软件工程
    • 119 篇 电子科学与技术(可...
    • 107 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 83 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 15 篇 水利工程
    • 14 篇 光学工程
  • 265 篇 理学
    • 80 篇 系统科学
    • 50 篇 地球物理学
    • 49 篇 物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 169 篇 医学
    • 110 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,380 篇 detection algori...
  • 773 篇 detectors
  • 766 篇 feature extracti...
  • 632 篇 algorithm design...
  • 585 篇 object detection
  • 532 篇 image edge detec...
  • 397 篇 testing
  • 372 篇 robustness
  • 333 篇 cameras
  • 307 篇 computer science
  • 292 篇 accuracy
  • 286 篇 monitoring
  • 280 篇 data mining
  • 273 篇 computational mo...
  • 254 篇 image segmentati...
  • 235 篇 signal to noise ...
  • 235 篇 clustering algor...
  • 200 篇 change detection...
  • 196 篇 pixel
  • 195 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,309 篇 英文
  • 36 篇 中文
  • 30 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection Algorithms"
7380 条 记 录,以下是4741-4750 订阅
排序:
A skin detection algorithm based on discrete Cosine transform and generalized Gaussian density
A skin detection algorithm based on discrete Cosine transfor...
收藏 引用
IEEE International Conference on Image Processing
作者: S. Ghouzali S. Hemami M. Rziza D. Aboutajdine E. M. Mouaddib GSCM-LRIT Mohammed-V University Rabat Morocco School of Electrical and Computer Engineering Cornell University Ithaca NY USA MIS Universite de Picardie Jules Verne Amiens France
In this paper, we propose a highly efficient algorithm to model the human skin color. The underlying algorithm involves generating a discrete Cosine transform (DCT) at each pixel location, using the surrounding points... 详细信息
来源: 评论
Using Outlier detection to Reduce False Positives in Intrusion detection
Using Outlier Detection to Reduce False Positives in Intrusi...
收藏 引用
IFIP International Conference on Network and Parallel Computing (NPC)
作者: Fu Xiao Xie Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Intrusion detection systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly by benign events). This makes it extremely difficult... 详细信息
来源: 评论
A Musical Onset detection System with Scalable Complexity
A Musical Onset Detection System with Scalable Complexity
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Wan-Chi Lee Yu Shiu C.-C. Jay Kuo Ming Hsieh Department of Electrical Engineering University of Southern California USA
An onset detection system based on linear prediction with scalable complexity is proposed in this work. One unique feature of the proposed onset detection algorithm is that it can offer a trade-off between complexity ... 详细信息
来源: 评论
Novel detection Algorithm of IDMA System under Channel Estimation Error
Novel Detection Algorithm of IDMA System under Channel Estim...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Chulhee Jang Hyunwoo Choi Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul South Korea
In this paper, we propose a novel detection algorithm for the elementary signal estimator of an IDMA system considering channel estimation error. To develop the algorithm, we derive new probability density function of... 详细信息
来源: 评论
An Intrusion detection Research Based on Spectral Clustering
An Intrusion Detection Research Based on Spectral Clustering
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Min Luo Xiaohong Li Shouhe Xie
A spectral clustering intrusion detection approach is presented in this paper. The basic idea of the approach is to compute the similarities between the training data points, then to construct the affinity matrix, and... 详细信息
来源: 评论
The Discovery of Attribute Feature Cluster for Any Clustering Result Based on Outlier detection Technique
The Discovery of Attribute Feature Cluster for Any Clusterin...
收藏 引用
International Conference on Internet Computing in Science and Engineering (ICICSE)
作者: Gang Liu Jiming Pang Xiufeng Piao Shaobin Huang College of Computer Science and Technology Harbin Engineering of Technology Harbin Heilongjiang China College of Computer Science and Technology Jilin University Changchun Jilin China
The comprehension of the clustering result is a problem that hasn't yet resolve, which having important meaning to the usage of the cluster result and the evaluation of the cluster effect. We put forward the metho... 详细信息
来源: 评论
Unsupervised automatic change detection in images under time-varying illumination
Unsupervised automatic change detection in images under time...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: N. D. Atkekar Sayeed Ahmed Khan M. A. Joshi Pune India Department of Electronics and Telecommunication College of Engineering Department of Electronics and Telecommunication College of Engineering Pune India
It is not surprising that the process of change detection is fundamental to many machine vision applications. Most change detection algorithms assume that the illumination on a scene will remain constant. Unfortunatel... 详细信息
来源: 评论
A detection Algorithm of Audio Spread Spectrum Data Hiding
A Detection Algorithm of Audio Spread Spectrum Data Hiding
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: S. Gao R. M. Hu W. Zeng H. J. Ai C. R. Li National Engineering Research Center for Multimedia Software Wuhan University of China Wuhan China
In this paper, a method of passive steganalysis is proposed. We focus on detecting the existing of data hidden in audio files with spread spectrum (SS) data hiding. SS data hiding is considered as a process of adding ... 详细信息
来源: 评论
Effects of Channel Estimation Errors on V-BLAST detection
Effects of Channel Estimation Errors on V-BLAST Detection
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Wei Peng Fumiyuki Adachi Shaodan Ma Jiangzhou Wang Tung-Sang Ng Department of Electrical and Communication Engineering University of Tohoku Japan Department of Electrical and Electronic Engineering University of Hong Kong Hong Kong China Department of Electronics University of Kent UK
This paper investigates the effects of channel estimation errors on zero-forcing (ZF) vertical Bell laboratories layered space time (V-BLAST) detection. An analytical method is presented to derive the symbol error pro... 详细信息
来源: 评论
Evaluation of an Online Parallel Anomaly detection System
Evaluation of an Online Parallel Anomaly Detection System
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Shashank Shanbhag Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst MA USA
The rapid and accurate detection of anomalies in network traffic has always been a challenging task, and is absolutely critical to the efficient operation of the network. The availability of numerous different detecti... 详细信息
来源: 评论