咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是4081-4090 订阅
排序:
Signal Space Diversity in Decode-and-Forward Cooperative Communication
Signal Space Diversity in Decode-and-Forward Cooperative Com...
收藏 引用
WRI International Conference on Communications and Mobile Computing
作者: Wei Ning Zhang Zhongpei Li Shaoqian Univ Elect Sci & Technol China Natl Commun Lab Chengdu 610054 Sichuan Peoples R China
In Decode-and-Forward (DF) cooperative communication, cooperative nodes decode and retransmit each others' data to achieve spatial diversity. However, asymmetric inter nodes channel can cut down the performance of... 详细信息
来源: 评论
Content-Based Image Retrieval Using Automatically Determined Color Regions of Images
Content-Based Image Retrieval Using Automatically Determined...
收藏 引用
7th International Symposium on Applied Machine Intelligence and Informatics
作者: Sergyan, Szabolcs Budapest Tech John von Neumann Fac Informat Inst Software Technol H-1034 Budapest Hungary
In the content-based image retrieval systems such images what are similar to a given image can be retrieved, that consist some features or of the whole image, either of the homogeneous connected regions of the image. ... 详细信息
来源: 评论
Development of a Brand New System using RFID Combining with Wireless Sensor Network (WSNs) for Real-time Doze Alarm
Development of a Brand New System using RFID Combining with ...
收藏 引用
3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication
作者: Chen, Po-Ying Wu, Po-Han Ong, Woei Jye Huang, Yu-Jung Lin, Wei-cheng Pan, TSung-long I Shou Univ Dept Informat Engn Kaohsiung Cty Taiwan I Shou Univ Dept Elect Engn Kaohsiung Cty Taiwan
Driver fatigue is a key factor of accident. Recently, there is a system using RFID combined with a wireless accelerometer sensor module used for doze detector has become an important issue. It is because that about te... 详细信息
来源: 评论
Using Multimodal Analysis for Story Segmentation of News Video
Using Multimodal Analysis for Story Segmentation of News Vid...
收藏 引用
1st IITA International Joint Conference on Artificial Intelligence
作者: Liu Hua-Yong He Tingting Cent China Normal Univ Dept Comp Sci Wuhan 430079 Hubei Peoples R China
The research proposes an approach of story segmentation for news video using multimodal analysis. The approach detects the topic-caption frames, and integrates them with silence clips detection, as well as shot segmen... 详细信息
来源: 评论
Research on Software Vulnerability Testing Based on Function-Call
Research on Software Vulnerability Testing Based on Function...
收藏 引用
WRI International Conference on Communications and Mobile Computing
作者: Zeng, Fanping Chen, Minghui Yin, Kaitao Wang, Xufa Univ Sci & Technol China Dept Comp Sci Hefei 230026 Anhui Peoples R China
On the basis of analyzing the safety formulas for various types of vulnerabilities, this paper presents a novel method for software vulnerability, testing, which uses source-code conversion and the state of software. ... 详细信息
来源: 评论
Do Code Clones Matter?  09
Do Code Clones Matter?
收藏 引用
31st International Conference on Software Engineering (ICSE 2009)
作者: Juergens, Elmar Deissenboeck, Florian Hummel, Benjamin Wagner, Stefan Tech Univ Munich Inst Informat D-85748 Garching Germany
Code cloning is not only assumed to inflate maintenance costs but also considered defet-prone as inconsistent changes to code duplicates can lead to unexpected behavior Consequently, the identification of duplicated c... 详细信息
来源: 评论
Fault detection in Multitooth Machine Tool Using Different Statistical Approaches
收藏 引用
IFAC Proceedings Volumes 2009年 第8期42卷 474-479页
作者: A. Reñones J. Rodríguez L.J. De Miguel CARTIF Technology Center Boecillo Technology Park Boecillo Valladolid Spain Dept. Control and Systems Engineering University of Valladolid Spain
This paper describes a fault diagnosis method applied to a real multitooth machine tool. Several statistical alternatives are used to diagnose the different faults that may appear such as insert breakage within multit... 详细信息
来源: 评论
Efficient Shadow detection of Color Aerial Images Based on Successive Thresholding Scheme
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2009年 第2期47卷 671-682页
作者: Kuo-Liang Chung Yi-Ru Lin Yong-Huai Huang Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
Recently, Tsai presented an efficient algorithm which uses the ratio value of the hue over the intensity to construct the ratio map for detecting shadows of color aerial images. Instead of only using the global thresh... 详细信息
来源: 评论
Vision based safety system for human and robot arm detection *
收藏 引用
IFAC Proceedings Volumes 2009年 第16期42卷 68-72页
作者: Andrzej Grabowski Robert Kosiński Marek Dźwiarek Department of Safety Engineering Central Institute for Labour Protection - National research Institute 00-701 Warsaw Poland Department of Safety Engineering Central Institute for Labour Protection - National research Institute 00-701 Warsaw Poland Department of Physics Warsaw University of Technology
Abstract We present a vision based system for the advanced recognition of danger situation for safety control. The sequence of the images from two cameras located above the robot is presented to the system in order to... 详细信息
来源: 评论
Linguistic Steganography detection Algorithm Using Statistical Language Model
Linguistic Steganography Detection Algorithm Using Statistic...
收藏 引用
International Conference on Information Technology and Computer Science, ITCS
作者: Peng Meng Liusheng Hang Wei Yang Zhili Chen Hu Zheng Department of Computer Science and Technology National High Performance Computing Center Hefei Hefei China Department of Computer Science and Technology National High Performance Computing Center Hefei Xiaoxian Anhui China
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important r... 详细信息
来源: 评论