咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是4441-4450 订阅
排序:
Distributed Sphere Decoding
Distributed Sphere Decoding
收藏 引用
International Conference on Telecommunications (ICT)
作者: Charlotte Dumard Erwin Riegler Forschungszentrum Telekommunikation Wien Vienna Austria
Based on a simple gossip algorithm, which computes the sum of values known by several nodes, we investigate the research challenge of distributed sphere decoding. We provide distributed algorithms to perform both the ... 详细信息
来源: 评论
The development of an assistive robot for improving the joint attention of autistic children
The development of an assistive robot for improving the join...
收藏 引用
IEEE International Conference on Rehabilitation Robotics (ICORR)
作者: P. Ravindra S. De Silva Katsunori Tadano Azusa Saito Stephen G. Lambacher Mastake Higashi Computer Aided Design Laboratory Toyota Technological Institute Japan Department of Software Engineering University of Aizu Japan Aoyama Gakuin University Japan
In this paper, an assistive robot is proposed for children with autism to enhance their joint attention, the main focus of which is an interactive scenario with potential modalities to establish a learning environment... 详细信息
来源: 评论
Structuring and analyzing low-quality lecture videos
Structuring and analyzing low-quality lecture videos
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yu-Tzu Lin Bai-Jang Yen Greg C. Lee Information Technology Center National Taiwan Normal University Taiwan Department of Computer Science and Information Engineering National Taiwan Normal University Taiwan
This paper presents a lecture video structuring and analysis scheme to provide students an efficient way to access the lecture content. Instead of using color-based or histogram-based methodologies, we propose a new e... 详细信息
来源: 评论
An automatic sleep spindle detector based on wavelets and the teager energy operator
An automatic sleep spindle detector based on wavelets and th...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Beena Ahmed Amira Redissi Reza Tafreshi Engineering Faculty Texas A and M University Qatar Doha Qatar Mechanical Engineering Department Texas A and M University Qatar Doha Qatar
Sleep spindles are one of the most important short-lasting rhythmic events occurring in the EEG during Non-Rapid Eye Movement sleep. Their accurate identification in a polysomnographic signal is essential for sleep pr... 详细信息
来源: 评论
Eye Tracking Based on Grey Prediction
Eye Tracking Based on Grey Prediction
收藏 引用
International Workshop on Education Technology and Computer Science, ETCS
作者: Jianxiong Tang Jianxin Zhang Zhejiang Institute of Communication and Media Hangzhou China Zhejiang Science and Technology University Hangzhou China
Eye tracking is the focus problem in the researching domain of human-machine interaction and computer vision in recent years. The method of using a single eye location and detection algorithm has poor real-time perfor... 详细信息
来源: 评论
Application of Improved KMP Algorithm in Tire Disfigurement Recognition
Application of Improved KMP Algorithm in Tire Disfigurement ...
收藏 引用
International Workshop on Computer Science and Engineering (WCSE)
作者: Fengying Cui Baoming Shan College of Automation and Electronic Engineering Qingdao University of Science and Technology Qingdao China
Image matching is usually used in tire disfigurement recognition. Traditional template matching methods such as the NC and the SSDA have high matching precision, but the calculating is hard and time consuming. The fas... 详细信息
来源: 评论
A Noise Tolerant Method for ECG Signals Feature Extraction and Noise Reduction
A Noise Tolerant Method for ECG Signals Feature Extraction a...
收藏 引用
International Conference on Bioinformatics and Biomedical Engineering (ICBBE)
作者: Emna Zoghlami Ayari Reinhard Tielert Norbert Wehn Microelectronic Systems Design Research Group University of Kaiserslautern Kaiserslautern Germany
A noise tolerant template model technique for ECG feature extraction based on an individual-specific training approach is presented in this paper. Baseline wander, electrode motion artifacts, and electromyographic int... 详细信息
来源: 评论
Speaker identification system using PCA & eigenface
Speaker identification system using PCA & eigenface
收藏 引用
International Conference on Computer and Information Technology (ICCIT)
作者: Md. Rashedul Islam Md. Shafiul Azam Saleh Ahmed Dept. of Computer Science & Engineering University of'Raishahi Bangladesh Dept. of Computer Science & Engineering University of'Raishahi Sylhet Bangladesh
This paper presents a speech-based speaker identification system and an efficient approach for selection of acoustic parameters closely related to the vocal track shape of the speaker. Speech endpoint detection algori... 详细信息
来源: 评论
Future airborne collision avoidance — Design principles, analysis plan and algorithm development
Future airborne collision avoidance — Design principles, an...
收藏 引用
Conference on Digital Avionics Systems (DASC)
作者: Roxaneh Chamlou Center for Advanced Aviation System Development MITRE Corporation McLean VA USA
As the aviation community moves toward the Next Generation Air Transportation System (NextGen), the current Traffic Alert and Collision Avoidance System (TCAS II) may become inadequate. This paper presents a novel app... 详细信息
来源: 评论
Detecting Stepping-Stone Connection Using Association Rule Mining
Detecting Stepping-Stone Connection Using Association Rule M...
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Ying-wei Kuo Shou-Hsuan Stephen Huang Department of Computer Science University of Houston Houston TX USA
A main concern for network intrusion detection systems is the ability of an intruder to evade the detection by routing through a chain of intermediate stepping-stone hosts. The intruders have developed some evasion te... 详细信息
来源: 评论