咨询与建议

限定检索结果

文献类型

  • 6,452 篇 会议
  • 924 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,161 篇 工学
    • 1,138 篇 电气工程
    • 912 篇 计算机科学与技术...
    • 679 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 193 篇 仪器科学与技术
    • 161 篇 软件工程
    • 159 篇 机械工程
    • 118 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 98 篇 交通运输工程
    • 84 篇 测绘科学与技术
    • 81 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 14 篇 光学工程
    • 14 篇 水利工程
  • 266 篇 理学
    • 80 篇 系统科学
    • 50 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 32 篇 生物学
    • 24 篇 地理学
  • 171 篇 医学
    • 112 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 160 篇 管理学
    • 151 篇 管理科学与工程(可...
  • 44 篇 农学
    • 26 篇 作物学
    • 17 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 12 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,379 篇 detection algori...
  • 773 篇 detectors
  • 772 篇 feature extracti...
  • 627 篇 algorithm design...
  • 586 篇 object detection
  • 531 篇 image edge detec...
  • 404 篇 testing
  • 378 篇 robustness
  • 333 篇 cameras
  • 308 篇 computer science
  • 296 篇 accuracy
  • 288 篇 monitoring
  • 277 篇 data mining
  • 272 篇 computational mo...
  • 254 篇 image segmentati...
  • 240 篇 clustering algor...
  • 234 篇 signal to noise ...
  • 202 篇 electrocardiogra...
  • 199 篇 change detection...
  • 197 篇 signal processin...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 institute for in...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 mit lincoln labo...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,310 篇 英文
  • 36 篇 中文
  • 28 篇 其他
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7379 条 记 录,以下是3991-4000 订阅
排序:
EIT 2010 preliminary program: Session 3B — Distributed computing, embedded systems, design automation
EIT 2010 preliminary program: Session 3B — Distributed comp...
收藏 引用
IEEE International Conference on Electro-Information Technology
Provides a schedule of conference events and a listing of which papers were presented in each session.
来源: 评论
Quantitative Evaluation of Related Web-Based Vulnerabilities
Quantitative Evaluation of Related Web-Based Vulnerabilities
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Deepak Subramanian Ha Thanh Le Peter Kok Keong Loh Annamalai Benjamin Premkumar School of Computer Engineering Nanyang Technological University Singapore
Current web application scanner reports contribute little to diagnosis and remediation when dealing with vulnerabilities that are related or vulnerability variants. We propose a quantitative framework that combines de... 详细信息
来源: 评论
Ground Shell Dispersion Image Processing System Based on ARM
Ground Shell Dispersion Image Processing System Based on ARM
收藏 引用
International Conference on E-Product E-Service and E-Entertainment
作者: Dejun Zhang Junjun Zhang School of Manufacturing Science and Engineering Southwest University of Science and Technology Mianyang China
In order to detect the location of smoke in the Measuring System for Ground Shell Dispersion (MSGSD), presented an improved algorithm for the Background Subtraction. Focused on introducing design of the image detectio... 详细信息
来源: 评论
Increasing PCM main memory lifetime  10
Increasing PCM main memory lifetime
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Alexandre P. Ferreira Miao Zhou Santiago Bock Bruce Childers Rami Melhem Daniel Mossé Department of Computer Science University of Pittsburgh Pittsburgh PA USA
The introduction of Phase-Change Memory (PCM) as a main memory technology has great potential to achieve a large energy reduction. PCM has desirable energy and scalability properties, but its use for main memory also ... 详细信息
来源: 评论
A roust algorithm of constructing panorama
A roust algorithm of constructing panorama
收藏 引用
International Conference on Networking and Digital Society, ICNDS
作者: Qian Xia Yong Zhang College of media and communications Guizhou University for Nationalities Guiyang China College of science and technology Guizhou University Guiyang China
A robust stitching algorithm of panorama is proposed to improve the efficiency and accuracy of constructing panorama. Firstly, pyramid based image is formed according to the input images, and then use the least local ... 详细信息
来源: 评论
Who Is Peeping at Your Passwords at Starbucks? - To Catch an Evil Twin Access Point
Who Is Peeping at Your Passwords at Starbucks? - To Catch an...
收藏 引用
IEEE/IFIP International Conference on Dependable Systems & Networks
作者: Yimin Song Chao Yang Guofei Gu Texas A and M University USA
In this paper, we consider the problem of "evil twin" attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one ... 详细信息
来源: 评论
Visualizing similar text documents based on 3D dendrogram
Visualizing similar text documents based on 3D dendrogram
收藏 引用
SICE Annual Conference
作者: Tomohito Kinoshita Tomoyuki Ohkubo Kazuyuki Kobayashil Kajiro Watanabe Yosuke Kurihara Faculty of Engineering Hosei University Koganei Tokyo Japan Systems Engineering Seikei University Musashino Tokyo Japan
This paper describes a new data visualization method using a three-dimensional dendrogram to And the relationship between similar text documents. For the detection of similarities in documents, we introduce two basic ... 详细信息
来源: 评论
Identifying corners of clothes using image processing method
Identifying corners of clothes using image processing method
收藏 引用
International Conference on Intelligent and Advanced Systems, ICIAS
作者: Yew Cheong Hou Khairul Salleh Mohamed Sahari Department of Mechanical Engineering Universiti Tenaga Malaysia (UNITEN) Kajang Selangor Darul Ehsan Malaysia
This paper presents a method to identify the edges and corners of clothes in an image using image processing methods. In clothes manipulation, it is important for the GUI program to identify the shape of clothes befor... 详细信息
来源: 评论
A novel adaptive tracking algorithm for maneuvering targets
A novel adaptive tracking algorithm for maneuvering targets
收藏 引用
International Conference on Computer Design and Applications (ICCDA)
作者: Zhigang Li Hongjun Duan Department of Automatic Engineering Northeastern University Qinhuangdao China
Maneuvering target tracking methods mainly include maneuver detection algorithm and adaptive tracking algorithm. Maneuver detection and adaptive tracking algorithm has its own advantages and disadvantages. The standar... 详细信息
来源: 评论
A Real-time Anomaly Intrusion and Theft Items Detecting System for Surveillance Videos
A Real-time Anomaly Intrusion and Theft Items Detecting Syst...
收藏 引用
2010 International Conference on Audio,Language and Image Processing(2010年音频、语言与图像处理国际会议 ICALIP 2010)
作者: Xiaofeng Lu Hengli Lu Minxi Jin Lina Wang Songyu Yu Shanghai Jiao Tong University Shanghai University Shanghai University Shanghai Jiao Tong University
This paper proposes an embedded surveillance system for real-time anomaly intrusion detection based on temporal difference algorithm and theft items detection based on accumulated background subtraction algorithm. Thi... 详细信息
来源: 评论