咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是4121-4130 订阅
排序:
A FPGA-Based Dual-Pixel Processing Pipelined Hardware Accelerator for Feature Point detection Part in SIFT
A FPGA-Based Dual-Pixel Processing Pipelined Hardware Accele...
收藏 引用
International Joint Conference on INC, IMS and IDC, NCM
作者: Jingbang Qiu Tianci Huang Takeshi Ikenaga Graduate School of IPS Waseda University Kitakyushu Japan
SIFT is regarded as one of the most robust feature point detection algorithms in CV field. The feature point detection part, allocating final positions of all feature points, majorly defines the accuracy and stability... 详细信息
来源: 评论
Community detection in Large-Scale Bipartite Networks
Community Detection in Large-Scale Bipartite Networks
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Xin Liu Tsuyoshi Murata Department of Computer Science Graduate School of Information Science and Engineering Tokyo Institute of Technology Tokyo Japan
Community detection in networks receives much attention recently. Most of the previous works are for unipartite networks composed of only one type of nodes. In real world situations, however, there are many bipartite ... 详细信息
来源: 评论
Anomaly detection Using Improved Hierarchy Clustering
Anomaly Detection Using Improved Hierarchy Clustering
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Liang Hu Weiwu Ren Fei Ren Department of Computer Science and Technology Jilin University Changchun China
Most anomaly detection methods can not be fit for the changing and complex network. High noise and updating normality profiles not in time will lead to high false alarm rate. In this paper, a new anomaly detection alg... 详细信息
来源: 评论
Automatic defects detection in industrial C/C++ software
Automatic defects detection in industrial C/C++ software
收藏 引用
Central and Eastern European Software Engineering Conference in Russia (CEE-SECR)
作者: Vladimir Itsykson Mikhail Moiseev Vadim Tsesko Alexey Zakharov Saint Petersburg State Polytechnical University Russia
The solution to the problem of automatic defects detection in industrial software is covered in this paper. The results of the experiments with the existing tools are presented. These results stand for inadequate effi... 详细信息
来源: 评论
Joint channel estimation and data detection for OFDM systems over doubly selective channels
Joint channel estimation and data detection for OFDM systems...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Lanlan He Shaodan Ma Yik-Chung Wu Tung-Sang Ng Department of Electrical and Electronic Engineering University of Hong Kong Hong Kong China
In this paper, a joint channel estimation and data detection algorithm is proposed for OFDM systems under doubly selective channels (DSCs). After representing the DSC using Karhunen-Loe¿ve basis expansion model (... 详细信息
来源: 评论
A New Type of Automatic Ship detection Method
A New Type of Automatic Ship Detection Method
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Zhuo Chen Coll. of Inf. Sci. & Technol. Qingdao Univ. of Sci. & Technol. Qingdao China
A new type of automatic ship detection algorithm is proposed in this paper. By determining whether the local area is heterogeneous, simplex two-parameter CFAR algorithm based on Gauss-distribution or both two-paramete... 详细信息
来源: 评论
Improved small target detection for IR point target
Improved small target detection for IR point target
收藏 引用
International Conference on Infrared and Millimeter Waves
作者: Jihui Ye Yongjin Kim Boohwan Lee Jieun Kim Byungin Choi Samsung Thales Company Limited Yongin si Gyeonggi South Korea Agency for Defence Development Daejeon South Korea
In the target detection algorithm based on the bivariate cubic facet fitting (BCFF), the target position can be selected so that the position has the maximum value or energy value of the filtered result. However, in t... 详细信息
来源: 评论
Theoretically Optimal Distributed Anomaly detection
Theoretically Optimal Distributed Anomaly Detection
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Aleksandar Lazarevic Nisheeth Srivastava Ashutosh Tiwari Josh Isom Nikunj Oza Jaideep Srivastava United Technologies Corporation Hartford CT USA Department of Computer Science University of Minnesota MN USA NASA Ames Research Center Moffett Field CA USA
A novel general framework for distributed anomaly detection with theoretical performance guarantees is proposed. Our algorithmic approach combines existing anomaly detection procedures with a novel method for computin... 详细信息
来源: 评论
A P2P-Based Distributed detection Scheme against DDoS Attack
A P2P-Based Distributed Detection Scheme against DDoS Attack
收藏 引用
International Workshop on Education Technology and Computer Science, ETCS
作者: Zaihong Zhou Dongqing Xie Wei Xiong School of Computer and Communications Hunan University Changsha China School of Computer Science and Educational Software Guangzhou University Guangzhou China
The distributed hosts in the Internet are organized into a P2P network by chord protocol for detection. The detection node uses the CUSUMpsilas sensitivity to the slight change to detect the change in the amount of pa... 详细信息
来源: 评论
An Intrusion detection Method for Ad Hoc Network Based on Class Association Rules Mining
An Intrusion Detection Method for Ad Hoc Network Based on Cl...
收藏 引用
Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST)
作者: Chuan-xiang Ma Ze-ming Fang Rui Chen School of mathematics and computer science Hubei University Wuhan China School of mathematics and computer science Hubei University Wuhan Wuhan China
Ad Hoc network is a newly developed network without fixed infrastructure and a changing topology. Its vulnerability makes it prone to attacks, which brings greater challenges for intrusion detection for Ad Hoc. Throug... 详细信息
来源: 评论