咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是1191-1200 订阅
排序:
CPS-Net: Segmentation Network Based on Feature Fusion and Siamese
CPS-Net: Segmentation Network Based on Feature Fusion and Si...
收藏 引用
Frontiers Technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Ke Shi John Xu Jian Mao School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Traditional deep convolutional neural networks are weak in handling multi-scale issues in tooth CT image segmentation. Based on the evolution of siamese network vision and image cutting algorithms, we make progress wh... 详细信息
来源: 评论
A Pick and Place Mechanism with Vision to Sort Objects of Different Colour and Size
A Pick and Place Mechanism with Vision to Sort Objects of Di...
收藏 引用
Communication, Computing and Industry 4.0 (C2I4), International Conference on
作者: Shweta J Sreeja Kochuvila Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru India
The traditional pick and place mechanisms in manufacturing and automation often lack adaptability, precision, and cost-effectiveness, when handling objects of different sizes and colours. This paper describes an innov... 详细信息
来源: 评论
Bubble or Not: An Analysis of Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem
Bubble or Not: An Analysis of Ethereum ERC721 and ERC1155 No...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Yixiang Tan Zhiying Wu Jieli Liu Jiajing Wu Ting Chen Kaixin Lin School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
The non-fungible token (NFT) is an emergent type of cryptocurrency that has garnered extensive attention since its inception. The uniqueness, indivisibility, and humanistic value of NFTs are the key characteristics th... 详细信息
来源: 评论
Study of fast startup criterion for AC microgrid faults based on Hankel matrix singular value decomposition
Study of fast startup criterion for AC microgrid faults base...
收藏 引用
Energy, Power and Grid (ICEPG), International Conference on
作者: Yudong Fang Yutao Qiu Biyun Qi Juan Fang State Grid Zhejiang Electric Power Co. Ltd Hangzhou China Quzhou Electric Power Bureau of Zhejiang Electric Power Company Quzhou Zhejiang China
New energy generation technologies such as photovoltaic and wind turbines are frequently integrated into AC microgrids as distributed power sources. This integration presents new challenges for fault detection and oth... 详细信息
来源: 评论
Generalized Likelyhood Ratio based detection on Cyber-Attacks
Generalized Likelyhood Ratio based Detection on Cyber-Attack...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Hao Wu Deyu Zhang dept. of Software Henan University of Engineering Zhengzhou China Institute for Automatic Control and Complex Systems University of Duisburg-Essen Duisburg Germany
In this paper, a generalized likelihood ratio based detection algorithm with a statistical method for threshold setting is proposed to detect cyber-attacks on a unified remote control architecture. Based on an encoder... 详细信息
来源: 评论
Massive MIMO-Enabled Semi-Blind detection for Grant-Free Massive Connectivity
Massive MIMO-Enabled Semi-Blind Detection for Grant-Free Mas...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Malong Ke Zhen Gao Shufeng Tan Liang Fang Mengnan Jian Hanqing Xu Yajun Zhao School of Information and Electronics Beijing Institute of Technology Beijing China Advanced Research Institute of Multidisciplinary Science Beijing Institute of Technology Beijing China Beijing TASSON Technology Co. Ltd Beijing China State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen China ZTE Corporation Beijing China
This paper studies the reliable support for massive machine-type communications and proposes an efficient semi-blind detection scheme for grant-free massive connectivity. In the proposed scheme, each active device dir... 详细信息
来源: 评论
Incipient Slip detection for Rectilinear Movements using the PapillArray Tactile Sensor
Incipient Slip Detection for Rectilinear Movements using the...
收藏 引用
IEEE Sensors
作者: Pablo Martinez Ulloa David Cordova Bulens Stephen J. Redmond Schoo of Eecric nd Eecronic Engineering Universiy Coege Dubin (UCD) IrendSchoo of Eecric nd Eecronic Engineering Universiy Coege Dubin (UCD) IrendSchoo of Eecric nd Eecronic Engineering Universiy Coege Dubin (UCD) Irend
It is critical during dexterous manipulation to avoid dropping the object. It is believed that humans can rapidly detect object slip and subsequently correct the applied gripped forces to prevent losing the grasp. In ... 详细信息
来源: 评论
An application of XGBoost algorithm for online transaction fraud detection based on improved sailfish optimizer
An application of XGBoost algorithm for online transaction f...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Hongwei Chen Lun Chen School of Computer Science Hubei University of Technology Wuhan China
Fraud detection is relevant in this context because of the large scale of online transactions, which conceal a small number of fraudulent *** learning (ML) fraud detection models have numerous hyperparameters of the e... 详细信息
来源: 评论
detection of Attacks using Attention-based Conv-LSTM and Bi-LSTM in Industrial Internet of Things
Detection of Attacks using Attention-based Conv-LSTM and Bi-...
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: Bebin Josey T D.S. Misbha Department of Computer Science Nesamony Memorial Christian College Marthandam India Nesamony Memorial Christian College Marthandam India
This research work proposes an attack detection algorithm for the industrial internet of things (IIoT) which uses an attention-based Conv-LSTM and Bidirectional Long short-term memory (Bi-LSTM) network. The approach c... 详细信息
来源: 评论
Framework for Image Sensor Design Parameter Optimization for Pupil detection
Framework for Image Sensor Design Parameter Optimization for...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Gernot Fiala Zhenyu Ye Christian Steger Institute of Technical Informatics Graz University of Technology Graz Austria OS R&D SYS SW ams-OSRAM AG Premstaetten Austria
Machine vision systems (MVS) use image sensors to process and analyze image data. Depending on the application, the image sensor parameters are configured differently. However, some parameters are fixed for a specific... 详细信息
来源: 评论