咨询与建议

限定检索结果

文献类型

  • 6,416 篇 会议
  • 961 篇 期刊文献
  • 3 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,381 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,126 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 271 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 100 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,381 篇 detection algori...
  • 757 篇 detectors
  • 746 篇 feature extracti...
  • 620 篇 algorithm design...
  • 570 篇 object detection
  • 529 篇 image edge detec...
  • 384 篇 testing
  • 362 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 282 篇 monitoring
  • 273 篇 data mining
  • 269 篇 accuracy
  • 262 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 231 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 193 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,302 篇 英文
  • 38 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7381 条 记 录,以下是181-190 订阅
PPGCN: Phase-Aligned Periodic Graph Convolutional Network for Dual-Task-Based Cognitive Impairment detection
收藏 引用
IEEE ACCESS 2024年 12卷 37679-37691页
作者: Godo, Akos Wu, Shuqiong Okura, Fumio Makihara, Yasushi Ikeda, Manabu Sato, Shunsuke Suzuki, Maki Satake, Yuto Taomoto, Daiki Yagi, Yasushi Osaka Univ SANKEN Osaka Ibaraki 5650871 Japan Osaka Univ Grad Sch Informat Sci & Technol Osaka Suita 5650871 Japan Osaka Univ Grad Sch Med Dept Psychiat Osaka Suita 5650871 Japan Esaka Hosp Dept Psychiat Osaka Suita 5650871 Japan Osaka Univ United Grad Sch Child Dev Dept Behav Neurol & Neuropsychiat Osaka Suita 5650871 Japan
Early detection methods for cognitive impairment are crucial for its effective treatment. Dual-task-based pipelines that rely on skeleton sequences can detect cognitive impairment reliably. Although such pipelines ach... 详细信息
来源: 评论
Privacy-Centric Multi-Class detection of COVID 19 Through Breathing Sounds and Chest X-Ray Images: Blockchain and Optimized Neural Networks
收藏 引用
IEEE ACCESS 2024年 12卷 89968-89985页
作者: Thandu, Asha Latha Gera, Pradeepini Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Vijayawada 520002 India
The CoronaVirus Disease of 2019 (COVID19) pandemic poses a significant global challenge, with millions affected and millions of lives lost. This study presents a privacy-conscious technique to early identification of ... 详细信息
来源: 评论
Financial Fraud detection Using Value-at-Risk With Machine Learning in Skewed Data
收藏 引用
IEEE ACCESS 2024年 12卷 64285-64299页
作者: Usman, Abdullahi Ubale Abdullahi, Sunusi Bala Yu, Liping Alghofaily, Bayan Almasoud, Ahmed S. Rehman, Amjad Zhejiang Gongshang Univ Sch Stat & Math Hangzhou 310018 Peoples R China King Mongkuts Univ Technol Thonburi Fac Engn Dept Elect & Telecommun Engn Bang ModThrung Khru Bangkok 10140 Thailand Kano Univ Sci & Technol Dept Stat Wudil 713281 Nigeria Prince Sultan Univ Coll Comp & Informat Sci Riyadh 11586 Saudi Arabia
The significant losses that banks and other financial organizations suffered due to new bank account (NBA) fraud are alarming as the number of online banking service users increases. The inherent skewness and rarity o... 详细信息
来源: 评论
General Recursive Least Square Algorithm for Distributed detection in Massive MIMO
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2024年 第8期73卷 12137-12142页
作者: Chen, Qiqiang Wang, Zheng Ma, Cong Dai, Xiaoming Ng, Derrick Wing Kwan Southeast Univ Sch Informat Sci & Engn Nanjing 210096 Peoples R China ZTE Corp Shenzhen 518057 Peoples R China Univ Sci & Technol Beijing Beijing 100083 Peoples R China Univ New South Wales Sch Elect Engn & Telecommun Sydney NSW 2052 Australia
In this paper, a general recursive least square (GRLS) detection algorithm is proposed for the uplink of distributed massive multiple-input multiple-output (MIMO) to alleviate the bottlenecks in both computational com... 详细信息
来源: 评论
detection and Defense: Student-Teacher Network for Adversarial Robustness
收藏 引用
IEEE ACCESS 2024年 12卷 82742-82752页
作者: Park, Kyoungchan Kang, Pilsung Korea Univ Sch Ind Management Engn Seoul 02841 South Korea
Defense against adversarial attacks is critical for the reliability and safety of deep neural networks (DNNs). Current state-of-the-art defense methods achieve significant robustness against adversarial attacks. Howev... 详细信息
来源: 评论
Toward Long Range detection of Elephants Using Seismic Signals: A Geophone-Sensor Interface for Embedded Systems
收藏 引用
IEEE ACCESS 2024年 12卷 72210-72223页
作者: Wijayaraja, Jaliya L. Wijekoon, Janaka L. Wijesundara, Malitha Mendis Wickramasinghe, L. J. Sri Lanka Inst Informat Technol Malabe 10115 Sri Lanka Victorian Inst Technol Adelaide SA 5000 Australia Keio Univ Dept Syst Design Engn Yokohama 1080073 Japan Herpetol Fdn Sri Lanka HFS Wattala 11300 Sri Lanka
The long-distance detection of the presence of elephants is pivotal to addressing the human-elephant conflict. IoT-based solutions utilizing seismic signals originating from the movement of elephants are a novel appro... 详细信息
来源: 评论
Oil Palm Loose Fruit detection Using YOLOv4 for an Autonomous Mobile Robot Collector
收藏 引用
IEEE ACCESS 2024年 12卷 138582-138593页
作者: Japar, Ahmed Fareed Ramli, Hafiz Rashidi Norsahperi, Nor Mohd Haziq Hasan, Wan Zuha Wan Univ Putra Malaysia Dept Elect & Elect Engn Serdang 43400 Selangor Malaysia
This study researches the usage of YOLOv4 for real-time loose fruit detection in oil palm plantations as the first step in implementing automation in the collection of loose fruits. Our system leverages high-resolutio... 详细信息
来源: 评论
A Novel Approach for Spam detection Using Natural Language Processing With AMALS Models
收藏 引用
IEEE ACCESS 2024年 12卷 124298-124313页
作者: Agarwal, Ruchi Dhoot, Anshita Kant, Surya Singh Bisht, Vimal Malik, Hasmat Ansari, Md. Fahim Afthanorhan, Asyraf Hossaini, Mohammad Asef JIMS Engn Management Tech Campus Dept Comp Sci Greater Noida 201303 India Moscow Inst Phys & Technol Sch Radio Engn & Comp Technol Dept Phystech Moscow 141701 Russia Graph Era Hill Univ Dept Elect & Commun Engn Bhimtal 263136 India Univ Teknol Malaysia UTM Fac Elect Engn Dept Elect Power Engn Skudai 81310 Johor Bahru Malaysia Graph Era Dept Elect Engn Dehra Dun India Univ Sultan Zainal Abidin UniSZA Artificial Intelligence Islamic Civilizat & Sustai Kuala Nerus 21300 Terengganu Malaysia Univ Sultan Zainal Abidin UniSZA Operat Res & Management Sci Kuala Nerus 21300 Terengganu Malaysia Badghis Univ Dept Phys Badghis 3351 Afghanistan
To enhance their company operations, organizations within the industry leverage the ecosystem of big data to manage vast volumes of information effectively. To achieve this objective, it is imperative to analyze textu... 详细信息
来源: 评论
A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks detection in Blockchain-Enabled Industrial Supply Chain
收藏 引用
IEEE ACCESS 2024年 12卷 102481-102491页
作者: Ismail, Shereen Dandan, Salah Dawoud, Diana W. Reza, Hassan Univ Michigan Merit Network Inc Ann Arbor MI 48108 USA Univ North Dakota Sch Elect Engn & Comp Sci Grand Forks ND 58202 USA Univ Dubai Coll Engn & Informat Technol Dubai U Arab Emirates
The security of Industrial Supply Chain (ISC) has emerged through the integration of Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves effectively protecting IIoT systems from ... 详细信息
来源: 评论
Exploring Deep Learning and Machine Learning Approaches for Brain Hemorrhage detection
收藏 引用
IEEE ACCESS 2024年 12卷 45060-45093页
作者: Ahmed, Samia Esha, Jannatul Ferdous Rahman, Md. Sazzadur Kaiser, M. Shamim Hosen, A. S. M. Sanwar Ghimire, Deepak Park, Mi Jin Bangladesh Univ Profess Dept Informat & Commun Technol ICT Dhaka 1216 Bangladesh Jahangirnagar Univ Inst Informat Technol Dhaka 1342 Bangladesh Woosong Univ Dept Artificial Intelligence & Big Data Daejeon 34606 South Korea Soongsil Univ Coll Informat Technol Sch AI Convergence Seoul 06978 South Korea Catholic Univ Korea Coll Med Seoul St Marys Hosp Dept Psychiat Seoul 03083 South Korea
Brain hemorrhage refers to a potentially fatal medical disorder that affects millions of individuals. The percentage of patients who survive can be significantly raised with the prompt identification of brain hemorrha... 详细信息
来源: 评论