咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是1011-1020 订阅
排序:
Incremental Massive Random Access Exploiting the Nested Reed-Muller Sequences
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2021年 第5期20卷 2917-2932页
作者: Wang, Jue Zhang, Zhaoyang Zhong, Caijun Hanzo, Lajos Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China Zhejiang Univ Int Joint Innovat Ctr Haining 314400 Peoples R China Zhejiang Prov Key Lab Informat Proc Commun & Netw Hangzhou 310027 Peoples R China Univ Southampton Dept Elect & Comp Sci Southampton SO17 1BJ Hants England
Massive machine-type communication (mMTC) is expected to provide reliable and low-latency connectivity for an enormous number of devices, which turn active sporadically or frequently. In this highly dynamic situation,... 详细信息
来源: 评论
A Privacy-Preserving Iot-Based Fire Detector
收藏 引用
IEEE ACCESS 2021年 9卷 51393-51402页
作者: Altowaijri, Abdullah H. Alfaifi, Mohammed S. Alshawi, Tariq A. Ibrahim, Ahmed B. Alshebeili, Saleh A. King Saud Univ Elect Engn Dept Riyadh 11421 Saudi Arabia King Saud Univ KACST TIC Radio Frequency & Photon RFTONICS Riyadh 11421 Saudi Arabia
Fire detection has been an issue of interest to researchers due to its significant damage to lives and property within a very short time. One of the recent solutions developed to detect fire is to use Internet-of-Thin... 详细信息
来源: 评论
A Pruning Optimized Fast Learn plus plus NSE Algorithm
收藏 引用
IEEE ACCESS 2021年 9卷 150733-150743页
作者: Chen, Yong Zhu, Yuquan Chen, Haifeng Shen, Yan Xu, Zhao Jiangsu Univ Sch Comp Sci & Commun Engn Zhenjiang 212013 Jiangsu Peoples R China China Unicom Internet Things Co Ltd Nanjing 210014 Jiangsu Peoples R China Jiangsu Univ Dept Informat Management & Informat Syst Zhenjiang 212013 Jiangsu Peoples R China Nanjing Longyuan Microelect Technol Co Ltd Nanjing 211106 Jiangsu Peoples R China
Due to the large number of typical applications, it is very important and urgent to study the fast classification learning of accumulated big data in nonstationary environments. The newly proposed algorithm, named Lea... 详细信息
来源: 评论
A Maximum Likelihood Perspective of Spatial Filter Design in SSVEP-Based BCIs
收藏 引用
IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 2021年 第9期68卷 2706-2717页
作者: Wang, Zhenyu Zhao, Xi Zhang, Min Hu, Honglin Chinese Acad Sci Shanghai Adv Res Inst Shanghai 201210 Peoples R China Univ Chinese Acad Sci Beijing Peoples R China ShanghaiTech Univ Sch Informat Sci & Technol Shanghai Peoples R China
In steady-state visual-evoked potential (SSVEP) based brain-computer interfaces (BCIs), existing detection algorithms utilizing spatial filters like task-related component analysis (TRCA) derive the spatial filters ma... 详细信息
来源: 评论
Research on Detecting Bearing-Cover Defects Based on Improved YOLOv3
收藏 引用
IEEE ACCESS 2021年 9卷 10304-10315页
作者: Zheng, Zehao Zhao, Ji Li, Yue Univ Sci & Technol Liaoning Sch Comp Sci & Software Engn Anshan 114051 Peoples R China
Detecting defects, which is a branch of target detection in the field of computer vision, is widely used in factory production. To solve the problems in existing detection algorithms that relate to their insensitivity... 详细信息
来源: 评论
Successive-Coded Spatial Shift Keying Modulation for MIMO Wireless Communications
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2021年 第10期69卷 6516-6528页
作者: Wu, Liang Zhang, Zaichen An, Bo Dang, Jian Liu, Huaping Wang, Jiangzhou Southeast Univ Natl Mobile Commun Res Lab Nanjing 210096 Peoples R China Purple Mt Labs Nanjing 211111 Peoples R China Oregon State Univ Sch Elect Engn & Comp Sci Corvallis OR 97331 USA Univ Kent Sch Engn & Digital Arts Canterbury CT2 7NT Kent England
Spatial domain modulation employs spatial degree of freedom to convey information bits. Traditional spatial domain modulation schemes include spatial modulation, spatial shift keying (SSK), and variations of these two... 详细信息
来源: 评论
Performance evaluation of land cover change detection algorithms using remotely sensed data
Performance evaluation of land cover change detection algori...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: L. Antony Jude A. Suruliandi Dept. of CSE M S University Tamilnadu
Remote sensing has long been used as a means of detecting and classifying the different types of data attribute present in the land cover. In general, remote sensing is widely used across variety of real-time applicat... 详细信息
来源: 评论
A Cooperative Game Theory-Based Algorithm for Overlapping Community detection
收藏 引用
IEEE ACCESS 2020年 8卷 68417-68425页
作者: Zhou, Xu Cheng, Shichao Liu, Yanheng Jilin Univ Ctr Comp Fundamental Educ Changchun 130012 Peoples R China Univ Chinese Acad Sci Sch Comp & Control Engn Beijing 100049 Peoples R China Jilin Univ Coll Comp Sci & Technol Changchun 130012 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Changchun 130012 Peoples R China
Community detection is of great significance and has more guiding for network analysis which has attract a lot of attention and is widely used in many areas. The process of community formation is modeled as a game in ... 详细信息
来源: 评论
On Followers Search
收藏 引用
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS 2021年 第5期8卷 1068-1082页
作者: Ni, Li Luo, Wenjian Zhu, Tao Xu, Peilan Anhui Univ Sch Comp Sci & Technol Hefei 230601 Peoples R China Univ Sci & Technol China Sch Comp Sci & Technol Hefei 230027 Peoples R China Harbin Inst Technol Sch Comp Sci & Technol Shenzhen 518055 Peoples R China Univ South China Sch Software Engn Hengyang 421001 Peoples R China
Although followership has been widely studied in sociology and management, the problem of finding followers has not drawn attention in the field of artificial intelligence. We refer to the problem of finding followers... 详细信息
来源: 评论
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 1825-1840页
作者: Barni, Mauro Phan, Quoc-Tin Tondi, Benedetta Univ Siena Dept Informat Engn & Math I-53100 Siena Italy Univ Trento Dept Informat Engn & Comp Sci I-38123 Trento Italy
We propose a method to identify the source and target regions of a copy-move forgery so allow a correct localisation of the tampered area. First, we cast the problem into a hypothesis testing framework whose goal is t... 详细信息
来源: 评论