咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是4481-4490 订阅
排序:
Improving Similarity Join algorithms Using Fuzzy Clustering Technique
Improving Similarity Join Algorithms Using Fuzzy Clustering ...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Lisa Tan Farshad Fotouhi William Grosky Horia F. Pop Noureddine Mouaddib Department of Computer Science Wayne State University Detroit USA Department of Computer and Information Sciences University of Michigan Dearborn Dearborn USA Department of Computer Science Babes Bolyai University Cluj Romania Universite de Nantes France
In this paper, we propose a pre-processing technique to improve existing string similarity join algorithms using fuzzy clustering. Our approach first identifies groups of related attributes and then, using this inform... 详细信息
来源: 评论
An Improved Method of Detecting Spoofed Attack in Wireless LAN
An Improved Method of Detecting Spoofed Attack in Wireless L...
收藏 引用
International Conference on Networks and Communications (NETCOM)
作者: Shikha Goel Sudesh Kumar Department of computer Science and Engineering PEC University of Technology Chandigarh India
The spoofing threats in wireless network increases with its popularity. They are the generator of all other attacks in wireless network. Free availability of MAC address changing tools over internet makes adversary ea... 详细信息
来源: 评论
An Approach for Discovering Rare High-Density Outlier Cluster
An Approach for Discovering Rare High-Density Outlier Cluste...
收藏 引用
International Conference on Networking and Digital Society, ICNDS
作者: Xiaobin Li Jiansheng Qian Zhikai Zhao School of Computer Science and Technology China University of Mining and Technology Xuzhou China
Outlier detection is one of the common tasks in engineering applications. Its aim is to identify uncommon records from large amounts of data. Many efforts have been done to reach this goal. But different approach shou... 详细信息
来源: 评论
A Local Space Based Watermarking Algorithm for Three Dimensional Meshes
A Local Space Based Watermarking Algorithm for Three Dimensi...
收藏 引用
IEEE International Symposium on Computer Network and Multimedia Technology, CNMT
作者: Wen-Guang He Yan Li
Watermarking for 3D models is a challenging topic in the research of watermarking. Difficulties came up on maintaining pretty robustness and implementing blind detection of watermarks in previous related work. In orde... 详细信息
来源: 评论
Weld Slim Line Defects Extraction Based on Adaptive Local Threshold and Modified Hough Transform
Weld Slim Line Defects Extraction Based on Adaptive Local Th...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Jiaxin Shao Dong Du Xinjie Zhu Li Wang
Computer aided evaluation is objective, scientific and standardized, and automatic defects detection technology based on X-ray digitized images is the core of computer aided evaluation. However, for the slim line defe... 详细信息
来源: 评论
On-road vehicle detectioin using histograms of multi-scale orientations
On-road vehicle detectioin using histograms of multi-scale o...
收藏 引用
IEEE Youth Conference on Information, Computing and Telecommunication, YC-ICT
作者: Fanjing Kong Qixiang Ye Ning Zhang Ke Lu Jianbin Jiao Chinese Academy of Sciences Beijing China
In this paper, we investigated a new feature set, called the histograms of multi-scale orientations (H-MSO), for vehicle representation and detection. The multi-scale orientations on image pixels are calculated using ... 详细信息
来源: 评论
Relative evaluation of partition algorithms for complex networks
Relative evaluation of partition algorithms for complex netw...
收藏 引用
International Conference on Networked Digital Technologies, NDT
作者: Gunce Keziban Orman Vincent Labatut Computer Science Department Galatasaray University Istanbul Turkey TUBITAK Kocaeli Turkey
Complex networks partitioning consists in identifying denser groups of nodes. This popular research topic has applications in many fields such as biology, social sciences and physics. This led to many different partit... 详细信息
来源: 评论
Detecting termination in pervasive sensor networks
Detecting termination in pervasive sensor networks
收藏 引用
International Symposium on Autonomous Decentralized Systems (ISADAS)
作者: Habel Kurian Abhishek Rakshit Gurdip Singh Computing and Information Sciences Kansas State University Manhattan KS USA
With the increased deployment of pervasive systems, there has been an explosive growth in the number of applications being developed for such systems. Distributed applications typically depend on the underlying middle... 详细信息
来源: 评论
An architecture for scalable network defense
An architecture for scalable network defense
收藏 引用
Conference on Local Computer Networks (LCN)
作者: Tim Strayer Walter Milliken Ronald Watro Walt Heimerdinger Steve Harp Robert P. Goldman Dustin Spicuzza Beverly Schwartz David Mankins Derrick Kong Peiter Mudge Zatko BBN Technologies GTE USA Honeywel Inc. USA Adventium Enterprises SIFT LLC
We describe a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appr... 详细信息
来源: 评论
Novel method to generate inspection care areas using GDS
Novel method to generate inspection care areas using GDS
收藏 引用
IEEE/SEMI Conference and Workshop on Advanced Semiconductor Manufacturing
作者: HoSung Kang MinHo Kim KiHo Kim SooCheol Lee JungA Choi YeonHo Pae ChangHo Lee Chris Lee System LSI Division Samsung Electronics Company Limited Yongin si Gyeonggi South Korea KLA-Tencor Corporation Milpitas CA USA
In order to make wafer inspection more sensitive, it is necessary to create inspection care areas that better reflect the actual layout of features in each die. However, it is very time consuming and tedious to draw s... 详细信息
来源: 评论