咨询与建议

限定检索结果

文献类型

  • 6,459 篇 会议
  • 966 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,428 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,194 篇 工学
    • 1,130 篇 电气工程
    • 928 篇 计算机科学与技术...
    • 667 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 204 篇 仪器科学与技术
    • 165 篇 机械工程
    • 165 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 90 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 20 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 287 篇 理学
    • 80 篇 系统科学
    • 63 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 24 篇 地理学
  • 184 篇 医学
    • 123 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 166 篇 管理学
    • 156 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,428 篇 detection algori...
  • 765 篇 feature extracti...
  • 759 篇 detectors
  • 620 篇 algorithm design...
  • 582 篇 object detection
  • 533 篇 image edge detec...
  • 384 篇 testing
  • 370 篇 robustness
  • 331 篇 cameras
  • 307 篇 computer science
  • 291 篇 accuracy
  • 284 篇 monitoring
  • 276 篇 data mining
  • 273 篇 computational mo...
  • 255 篇 image segmentati...
  • 236 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 198 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,344 篇 英文
  • 43 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection Algorithms"
7428 条 记 录,以下是701-710 订阅
排序:
A lightweight small-object detection algorithm for remote sensing images based on 4SDC-YOLOv8
A lightweight small-object detection algorithm for remote se...
收藏 引用
Computer Applications and Information Technology (ISCAIT), International Symposium on
作者: Hanqing Ding Lichao Mo Shengfa Yue Jiaxue Li School of Electronics and Information Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou China
In the field of object detection, remote sensing image detection has become a critical research focus. However, existing small-object detection algorithms for remote sensing images often fail to strike an effective ba... 详细信息
来源: 评论
Anomaly detection Algorithm for Multivariate Complex Data Based on Deep Neural Network
Anomaly Detection Algorithm for Multivariate Complex Data Ba...
收藏 引用
Artificial Intelligence, Internet and Digital Economy (ICAID), International Conference on
作者: Guangzhi Deng Haikun Wu Wen He Sheng Ding Qingqing Pan Zekun Ma State Grid Yinchuan Electric Power Supply Company Yinchuan Ningxia
The conventional data anomaly detection structure is mostly single target execution, and the detection efficiency is relatively low, resulting in an increase in the final false detection rate. Therefore, the design an... 详细信息
来源: 评论
Improved YOLOv8 Factory Safety Wearable detection Algorithm
Improved YOLOv8 Factory Safety Wearable Detection Algorithm
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Wenhao Wang Buying Fu Yanlun Wu Zhenyang Yu Chenjin Sun Xin Chen Faculty of Computer Engineering Huaiyin Institue of Technology Huaian China
In industrial scenarios, the YOLOv8 algorithm is difficult to extract key features due to the complexity of background information in images such as helmets, safety vests, and gloves, and is prone to problems such as ... 详细信息
来源: 评论
Non-coherent Signal detection Algorithm Based on Molecular Communication and Its Experimental Verification
Non-coherent Signal Detection Algorithm Based on Molecular C...
收藏 引用
World Congress on Computing and Communication Technologies (WCCCT)
作者: Leifu Ren Yitao Hu Xiaoyi Bian Chuwen Lan Jiaxing Wang Guoan Zhao Zhimin Zheng Chunfeng Cui Zehua Gao China Mobile Information Technology Co. Ltd Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Beijing China North China Institute of Aerospace Engineering Hebei China China Mobile Research Institute Beijing China
Demodulation at the receiver is a pivotal process in molecular communication (MC), involving the identification and transformation of transmitted signals to retrieve the original information from the sender. Due to th... 详细信息
来源: 评论
Novel Abnormal Data Mining and detection Algorithm for Intelligent Systems
Novel Abnormal Data Mining and Detection Algorithm for Intel...
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International Conference on
作者: Shaomei Xu Yanling Fan Bing Lin Continuing Education Service Center Shandong Institute Of Commerce and Technology Jinan Shandong China
In intelligent systems, as the amount of data increases, how to analyse data and extract abnormal information is an important task. Based on this, in order to improve the detection efficiency and accuracy of abnormal ... 详细信息
来源: 评论
A Step-type Obstacle detection Method based on 3D Point Cloud Map
A Step-type Obstacle Detection Method based on 3D Point Clou...
收藏 引用
International Conference on Electronic Engineering and Informatics (EEI)
作者: Fanghong You Pengcheng Wang Rui Zhou Yihan Zhang Jian Zhang Tao Zhao College of Electrical Engineering Sichuan University Chengdu China
Addressing the challenge of precise detection of traversable obstacles resembling steps in 3D point cloud map generated by LiDAR, this paper proposes a detection algorithm based on Density-Based Spatial Clustering of ... 详细信息
来源: 评论
UAVLite-YOLOv8: UAV Small Target Lightweight detection Algorithm
UAVLite-YOLOv8: UAV Small Target Lightweight Detection Algor...
收藏 引用
Frontiers Technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Huan Liu Yusen Nie Xiaodong Cheng School of Electronic Information Engineering Inner Mongolia University Hohhot China
Aiming at the problems of UAVs in target detection, such as small target size, dense target, difficulty in feature extraction, and the excessive amount of parameters and high computation when the YOLO algorithm is app... 详细信息
来源: 评论
R-Wave detection Algorithm Based on Central Difference and Adaptive Multi-Threshold
R-Wave Detection Algorithm Based on Central Difference and A...
收藏 引用
Computer Information Science and Application Technology (CISAT), International Conference on
作者: Ke Xu Huibin Wang Sikai Guo Wenping Chen College of Information Science and Engineering Hohai University HHU Nanjing China
As a non-invasive method for diagnosing heart diseases, electrocardiography (ECG) relies on R-wave detection as a foundational step for other ECG waveform analysis. To further meet the demands for accuracy and real-ti... 详细信息
来源: 评论
Research on the detection Algorithm for Abnormal Crowd Behaviors Based on an Enhanced SlowFast Model
Research on the Detection Algorithm for Abnormal Crowd Behav...
收藏 引用
International Conference on Computers, Communications, and Systems (ICCCS)
作者: Yueping Peng Hexiang Hao Tongtong Zhou Baixuan Han Wenji Yin Information Engineering Collage Engineering University of PAP Xian China Engineering University of PAP Xian China
Aiming at the issues of inaccurate detection of behavioral classification in crowd abnormal behaviors detection algorithms and large model computation capacity, a crowd abnormal behaviors detection algorithm based on ... 详细信息
来源: 评论
detection of False Data Injection Attacks in New Energy Systems Based on Supervised Learning
Detection of False Data Injection Attacks in New Energy Syst...
收藏 引用
Internet of Things, Automation and Artificial Intelligence (IoTAAI), International Conference on
作者: Tong Li Lei Wang Jian Chen Yang Liu Hongwei Zhao Hongbi Geng State Grid Liaoning Electric Power Supply Co. Ltd. Shenyang China State Grid Liaoning Electric Power Research Institute Shenyang China
In recent years, with the rapid development of China’s new energy industry, and to the monitoring and data acquisition (SCADA) system brings a huge network security risks. False Data Injection Attack (FDIA) is a seri... 详细信息
来源: 评论