咨询与建议

限定检索结果

文献类型

  • 6,426 篇 会议
  • 962 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,188 篇 工学
    • 1,126 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,393 篇 detection algori...
  • 757 篇 detectors
  • 751 篇 feature extracti...
  • 620 篇 algorithm design...
  • 573 篇 object detection
  • 531 篇 image edge detec...
  • 384 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 282 篇 monitoring
  • 275 篇 accuracy
  • 274 篇 data mining
  • 267 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 231 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 193 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,314 篇 英文
  • 38 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7393 条 记 录,以下是4581-4590 订阅
排序:
Detecting communities in networks by merging cliques
Detecting communities in networks by merging cliques
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Bowen Yan Steve Gregory Department of Computer Science University of Bristol Bristol UK
Many algorithms have been proposed for detecting disjoint communities (relatively densely connected subgraphs) in networks. One popular technique is to optimize modularity, a measure of the quality of a partition in t... 详细信息
来源: 评论
On the achievable improvement by the linear minimum mean square error detector
On the achievable improvement by the linear minimum mean squ...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Manar Mohaisen KyungHi Chang The Graduate School of IT and T Inha University Incheon South Korea
Linear minimum mean square error (MMSE) detector has been shown to alleviate the noise amplification problem, resulting in the conventional zero-forcing (ZF) detector. In this paper, we analyze the performance improve... 详细信息
来源: 评论
Automated initial setup method for two-fingered micro hand system
Automated initial setup method for two-fingered micro hand s...
收藏 引用
2009 IEEE/RSJ International Conference on Intelligent Robots and Systems
作者: Izumi Hatta Kenichi Ohara Tatsuo Arai Yasushi Mae Tomohito Takubo Department of Systems Innovation Graduate School of Engineering Science Osaka University Toyonaka Osaka Japan
A two-fingered micro hand has been available for use for years and allows dexterous manipulation of a single cell: grabbing, positioning, rotating and releasing. The end-effector of this micro hand consists of two gla... 详细信息
来源: 评论
Dealing with Multi Security Policies in Communication Networks
Dealing with Multi Security Policies in Communication Networ...
收藏 引用
International Conference on Networking and Services (ICNS)
作者: Ryma Abassi Sihem Guemara El Fatmi Sup' COM School of Communication Engineering Tunis Tunisia
In any organization, there are generally several applications in place and usually, each application has its own security policy. In fact, the ability to define multiple security policies is needed in several cases. M... 详细信息
来源: 评论
Metrological characterization of algorithms adopted for voltage dip measurement
Metrological characterization of algorithms adopted for volt...
收藏 引用
IEEE Instrumentation and Measurement Technology Conference
作者: Daniele Gallo Carmine Landi Mario Luiso Dipartimento di ingegneria dell informazione Seconda Università di Napoli Campania Italy
This paper analyzes accuracy of algorithms commonly adopted in instrument devoted to the detection and the characterization of voltage dips (also called sags). This analysis is particularly interesting because the res... 详细信息
来源: 评论
Identifying Useless States in Non-FIFO Distributed Computations by Using Pseudo Timestamps
Identifying Useless States in Non-FIFO Distributed Computati...
收藏 引用
International Symposium on Parallel Architectures, algorithms and Networks (ISPAN)
作者: Lung-Pin Chen Meng-Yuan Ho Jhen-You Hong Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan
In a distributed system, a monitor process collects the execution states and invokes a detection procedure to test and debug the program. This paper investigates the global state analyzing problems for the non-FIFO di... 详细信息
来源: 评论
Bounding-Volume Hierarchies Technique for Detecting Object Interference in Urban Environment Simulation
Bounding-Volume Hierarchies Technique for Detecting Object I...
收藏 引用
International Conference on Environmental and Computer Science (ICECS)
作者: Hamzah Asyrani Sulaiman Abdullah Bade Norhaida Mohd Suaib Universiti Teknikal Malaysia Melaka Tunggal Malacca Malaysia Universiti Teknologi Malaysia Skudai Johor Malaysia
Performing and detecting object interference or collision detection in urban environment simulation is always challenging problem for researchers to come out with fast and efficient collision detection algorithm. Most... 详细信息
来源: 评论
Corner Detector Algorithm for Colour Image with Highlights and Shadows
Corner Detector Algorithm for Colour Image with Highlights a...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Shi-Guo Huang Ming-Quan Zhou Guo-Hua Geng Xiaolin Li Comput. & Inf. Coll. Fujian Agric. & Forestry Univ. Fuzhou China Coll. of Inf. Sci. & Technol. Beijing Normal Univ. Beijing China Visualization Technol. Inst. Northwest Univ. Xi'an China
Traditional curvature scale space (CSS) corner detection algorithms did not differentiate various physical causes of image differential structure, therefore these algorithms could not detect corners correctly in color... 详细信息
来源: 评论
Outlier elimination for robust ellipse and ellipsoid fitting
Outlier elimination for robust ellipse and ellipsoid fitting
收藏 引用
IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP)
作者: Jieqi Yu Haipeng Zheng Sanjeev R. Kulkarni H. Vincent Poor Department of Electrical Engineering Princeton University Princeton NJ USA
In this paper, an outlier elimination algorithm for ellipse/ellipsoid fitting is proposed. This two-stage algorithm employs a proximity-based outlier detection algorithm (using the graph Laplacian), followed by a mode... 详细信息
来源: 评论
SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps
SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps
收藏 引用
IEEE International Conference on Communications (ICC)
作者: K. Magalhaes R. Dahab Instituto de Computer ção State University of Campinas-UNICAMP Sao Paulo Brazil
RAWVec is a private watermarking method for vector maps that uses a raster image as watermark. Visually recognizable watermarks can add extra information like integrity and authentication, while blind watermarks do no... 详细信息
来源: 评论