咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 925 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,162 篇 工学
    • 1,138 篇 电气工程
    • 909 篇 计算机科学与技术...
    • 678 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 160 篇 机械工程
    • 160 篇 软件工程
    • 119 篇 电子科学与技术(可...
    • 107 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 83 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 15 篇 水利工程
    • 14 篇 光学工程
  • 265 篇 理学
    • 80 篇 系统科学
    • 50 篇 地球物理学
    • 49 篇 物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 169 篇 医学
    • 110 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,380 篇 detection algori...
  • 773 篇 detectors
  • 766 篇 feature extracti...
  • 632 篇 algorithm design...
  • 585 篇 object detection
  • 532 篇 image edge detec...
  • 397 篇 testing
  • 372 篇 robustness
  • 333 篇 cameras
  • 307 篇 computer science
  • 292 篇 accuracy
  • 286 篇 monitoring
  • 280 篇 data mining
  • 273 篇 computational mo...
  • 254 篇 image segmentati...
  • 235 篇 signal to noise ...
  • 235 篇 clustering algor...
  • 200 篇 change detection...
  • 196 篇 pixel
  • 195 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,309 篇 英文
  • 36 篇 中文
  • 30 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7380 条 记 录,以下是3931-3940 订阅
排序:
Malware variants identification based on byte frequency
Malware variants identification based on byte frequency
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Sheng Yu Shijie Zhou Leyuan Liu Rui Yang Jiaqing Luo School of Computer Science & Engineering University of Electronic Science and Technology Chengdu China
Malware variants refer to all the new malwares manually or automatically produced from any existing malware. However, such simple approach to produce malwares can change signatures of the original malware to confuse a... 详细信息
来源: 评论
Substation remote infrared image registration based on multi-scale Harris corner and hierarchical guiding match strategy
Substation remote infrared image registration based on multi...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Xinghua Zhang Dongmei Wu Communication and Information Institute Xi''an University of Science and Technology Xi'an China
The sequence remote infrared images acquired from the intelligent substation monitoring system existed position deviation. The deviated images need to be registered in order to ensure the system accurately locating an... 详细信息
来源: 评论
Performance verification of instruments adopted for voltage dip measurement
Performance verification of instruments adopted for voltage ...
收藏 引用
IEEE Instrumentation and Measurement Technology Conference
作者: Daniele Gallo Carmine Landi Mario Luiso Dipartimento di Ingegneria Dell'Informazione Seconda Università di Napoli Caserta Italy
The Voltage magnitude reductions (dips or sags) are one of power quality issues with the greater economical impact. For this reason, often, supply sites are characterized by dip measurement campaign in order to asses ... 详细信息
来源: 评论
The design and implementation of a malicious code behavior detecting model based on virtualization techology
The design and implementation of a malicious code behavior d...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Wei Ma Ming Wang Bo Zhu Beijing jiaotong University Beijing China China Information Security Certification Center Beijing China
Among the existing malicious code detecting methods, the approach that based on code behavior is more practical. In this method, it judges if one code is malicious or not based on behavior the code generated. This way... 详细信息
来源: 评论
A cardiod based technique to identify Cardiovascular Diseases using mobile phones and body sensors
A cardiod based technique to identify Cardiovascular Disease...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Fahim Sufi Ibrahim Khalil Zahir Tari School of CS & IT RMIT University Melbourne VIC Australia
To prevent the threat of Cardiovascular Disease (CVD) related deaths, the usage of mobile phone based computational platforms, body sensors and wireless communications is proliferating. Since mobile phones have limite... 详细信息
来源: 评论
Linking Collaborative Filtering and Social Networks: Who Are My Mentors?
Linking Collaborative Filtering and Social Networks: Who Are...
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Armelle Brun Anne Boyer LORIA Nancy Universitè Vandoeuvre-les-Nancy France
This paper proposes a new approach of mentor selection in memory-based collaborative filtering when no rating is available. Users are represented under the form of a social network. The selection of mentors is perform... 详细信息
来源: 评论
A method for hand gesture recognition based on morphology and Fingertip-Angle
A method for hand gesture recognition based on morphology an...
收藏 引用
International Conference on Computer and Automation Engineering, ICCAE
作者: Xiaotang Wen Yanyu Niu School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China School of Software University of Electronic Science and Technology Chengdu China
This paper proposes an automatic method to recognize the hand in complex background. With this method, contour of hand in pictures can be figured out and the fingertips can be marked out. Skin color detection is used ... 详细信息
来源: 评论
Curious snakes: A minimum latency solution to the cluttered background problem in active contours
Curious snakes: A minimum latency solution to the cluttered ...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Ganesh Sundaramoorthi Stefano Soatto Anthony J. Yezzi University of California Los Angeles USA Georgia Institute of Technology USA
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedded in complex background clutter. Curr... 详细信息
来源: 评论
Multi-Agent network security audit system based on information entropy
Multi-Agent network security audit system based on informati...
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Lü Lü Taoxia Liu Peiyu School of Information Science and Engineering Shandong Normal University Jinan China
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ... 详细信息
来源: 评论
A faster image registration algorithm
A faster image registration algorithm
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Haifeng Liu Chuangbai Xiao Mike Deng Zhifei Tang College of Computer Science and Technology Beijing University of Technology Beijing China
Image registration is of prime importance for image mosaic. It is the process of geometrically aligning one image to another image of the same scene taken from different time, from different viewpoints or by different... 详细信息
来源: 评论