咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是4231-4240 订阅
排序:
Quickest change detection in multiple on-off processes
Quickest change detection in multiple on-off processes
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Zhao Jia Ye University of California Davis CA USA
A Bayesian formulation of quickest change detection in multiple on-off processes is obtained within a decision-theoretic framework. For geometrically distributed busy and idle times, we show that the optimal joint des... 详细信息
来源: 评论
BANBAD - A Centralized Belief-Networks-Based Anomaly detection Algorithm for MANETs
BANBAD - A Centralized Belief-Networks-Based Anomaly Detecti...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Chaoli Cai Aakash Gupta Rajib Paul Department of Computer Science Western Michigan University USA College of Literature Science & the Arts University of Michigan USA Department of Statistics Western Michigan University USA
We present an efficient anomaly detection algorithm, named BANBAD. Using belief networks (BNs), the algorithm identifies abnormal behavior, like inappropriate energy consumption, in mobile ad-hoc networks (MANETs). By... 详细信息
来源: 评论
Research of Blind Watermark detection Algorithm Based on Wavelet and Contourlet Transform Domain
Research of Blind Watermark Detection Algorithm Based on Wav...
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Xiang-Wei Zhu Liang Xiao Suzhou Campus Nanjing Institute of Railway Technology Suzhou China Institute of Computer Science Nanjing University of Science and Technology of PLA Nanjing China
Blind watermark detection is a modern digital watermark technology with outstanding feature. To start with, this paper carries on the statistical analysis to the high frequency sub-band coefficients of wavelet and con... 详细信息
来源: 评论
A Realtime Clique detection Algorithm: Time-Based Incremental Label Propagation
A Realtime Clique Detection Algorithm: Time-Based Incrementa...
收藏 引用
International Symposium on Intelligent Information Technology Application, IITA
作者: Sheng Pang Changjia Chen Ting Wei School of electric and info engineering Beijing Jiaotong University Beijing China
Most networks will evolve with time instead of keeping unchanged in reality. Therefore, we proposed the time-based incremental label propagation (TILP) algorithm to detect community structures in complex networks in r... 详细信息
来源: 评论
An energy-based detection algorithm of epileptic seizures in EEG records
An energy-based detection algorithm of epileptic seizures in...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Agustina Garces Correa Eric Laciar Lorena Orosco Maria E. Gomez Raul Otoya Raimon Jane Gabinete de Tecnología Medica Facultad de Ingeniería Universidad Nacional de San Juan San Juan Argentina Servicio de Neurología Hospital H. Notti Mendoza Argentina Institut de Bioenginyeria de Catalunya (IBEC) and CIBER de Bioingenieri Biomateríales y Nanomedicina Department ESAII Universitat Poliltècnica de Catalunya Barcelona Spain
A simple algorithm to automatically detect segments with epileptic seizures in long EEG records has been developed. The main advantages of the proposed method are: the simple algorithm used and the lower computational... 详细信息
来源: 评论
Hierarchical node replication attacks detection in wireless sensors networks
Hierarchical node replication attacks detection in wireless ...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Wassim Znaidi Marine Minier Stephane Ubeda CITI Laboratory University of Lyon I France
Wireless sensor networks (WSNs) are composed of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate at short distance through wireless links. They are usually deployed in an open ... 详细信息
来源: 评论
Automatic tree-ring mark detection for teak and pine trees
Automatic tree-ring mark detection for teak and pine trees
收藏 引用
International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON
作者: Thitiporn Chanwimaluang Rungkarn Siricharoenchai Treepop Sunpetniyom Wasin Sinthupinyo National Electronics and Computer Technology Center Pathum Thani Thailand
In this paper, we address the problem of tree-ring mark detection for teak and pine trees. Tree ring marks, especially from teak images, are barely visible since they are well-blended with the background. Moreover, wo... 详细信息
来源: 评论
detection Algorithm of Dim and Small Infrared Target Based on Temporal chi² Test
Detection Algorithm of Dim and Small Infrared Target Based o...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Lihui Sun Sumei Jin Ruisheng Zhang
The detection for motive small target in infrared image sequence has become a hot topic nowadays. A novel detect algorithm of dim and small infrared target 9 based on temporal chi 2 test, which aims at disadvantages ... 详细信息
来源: 评论
Random Access for Decentralized detection in Wireless Sensor Networks
Random Access for Decentralized Detection in Wireless Sensor...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Dianhui Xu Yingwei Yao Robert Y. Li Department of Electrical and Computer Engineering University of Illinois Chicago Chicago USA Department of Electrical and Computer Engineering North Carolina Agricultural and Technical State University Greensboro USA
In this work, we propose a random access protocol for decentralized detection in wireless sensor networks. In this scheme, sensors are grouped according to the informativeness of their data. Then fusion center collect... 详细信息
来源: 评论
A Novel Attack detection Algorithm Based on t-Distribution in Wireless Sensor Networks
A Novel Attack Detection Algorithm Based on t-Distribution i...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Yong-jian Luo Xiao-yong Ding Gang Wu Guang-dong Ding Xi'an Commun. Inst. Xi'an China
In order to prevent the malicious attack from reducing the accuracy of aggregation result in wireless sensor networks, it is necessary to perform the attack detection in the received readings of all the sensor nodes b... 详细信息
来源: 评论