咨询与建议

限定检索结果

文献类型

  • 6,426 篇 会议
  • 962 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,188 篇 工学
    • 1,126 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,393 篇 detection algori...
  • 757 篇 detectors
  • 751 篇 feature extracti...
  • 620 篇 algorithm design...
  • 573 篇 object detection
  • 531 篇 image edge detec...
  • 384 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 282 篇 monitoring
  • 275 篇 accuracy
  • 274 篇 data mining
  • 267 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 231 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 193 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 14 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,314 篇 英文
  • 38 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7393 条 记 录,以下是4751-4760 订阅
排序:
Adaptive circular object detection
Adaptive circular object detection
收藏 引用
International Conference on Signal Processing and Communication Systems, ICSPCS
作者: Christopher Neil Young Ju Jia Zou School of Engineering University of Western Ontario NSW Australia
In this paper a robust and adaptive method of circular object detection is proposed. The proposed method aims to limit the need for parameter adjustment when applied to a wide range of different images, by implementin... 详细信息
来源: 评论
Novel detection Algorithm of IDMA System under Channel Estimation Error
Novel Detection Algorithm of IDMA System under Channel Estim...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Chulhee Jang Hyunwoo Choi Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul South Korea
In this paper, we propose a novel detection algorithm for the elementary signal estimator of an IDMA system considering channel estimation error. To develop the algorithm, we derive new probability density function of... 详细信息
来源: 评论
Using Outlier detection to Reduce False Positives in Intrusion detection
Using Outlier Detection to Reduce False Positives in Intrusi...
收藏 引用
IFIP International Conference on Network and Parallel Computing (NPC)
作者: Fu Xiao Xie Li State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Intrusion detection systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly by benign events). This makes it extremely difficult... 详细信息
来源: 评论
A Musical Onset detection System with Scalable Complexity
A Musical Onset Detection System with Scalable Complexity
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Wan-Chi Lee Yu Shiu C.-C. Jay Kuo Ming Hsieh Department of Electrical Engineering University of Southern California USA
An onset detection system based on linear prediction with scalable complexity is proposed in this work. One unique feature of the proposed onset detection algorithm is that it can offer a trade-off between complexity ... 详细信息
来源: 评论
Shot boundary detection using co-occurrence of global motion in video stream
Shot boundary detection using co-occurrence of global motion...
收藏 引用
International Conference on Pattern Recognition
作者: Yosuke Murai Hironobu Fujiyoshi Department of Computer Science Chubu University Aichi Japan
We propose a method of shot boundary detection based on the co-occurrence of global motion in video stream. In addition to the conventional features based on appearance and local motion, we apply ST (Space-Time) patch... 详细信息
来源: 评论
An Intrusion detection Research Based on Spectral Clustering
An Intrusion Detection Research Based on Spectral Clustering
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Min Luo Xiaohong Li Shouhe Xie
A spectral clustering intrusion detection approach is presented in this paper. The basic idea of the approach is to compute the similarities between the training data points, then to construct the affinity matrix, and... 详细信息
来源: 评论
The Discovery of Attribute Feature Cluster for Any Clustering Result Based on Outlier detection Technique
The Discovery of Attribute Feature Cluster for Any Clusterin...
收藏 引用
International Conference on Internet Computing in Science and Engineering (ICICSE)
作者: Gang Liu Jiming Pang Xiufeng Piao Shaobin Huang College of Computer Science and Technology Harbin Engineering of Technology Harbin Heilongjiang China College of Computer Science and Technology Jilin University Changchun Jilin China
The comprehension of the clustering result is a problem that hasn't yet resolve, which having important meaning to the usage of the cluster result and the evaluation of the cluster effect. We put forward the metho... 详细信息
来源: 评论
Effects of Channel Estimation Errors on V-BLAST detection
Effects of Channel Estimation Errors on V-BLAST Detection
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Wei Peng Fumiyuki Adachi Shaodan Ma Jiangzhou Wang Tung-Sang Ng Department of Electrical and Communication Engineering University of Tohoku Japan Department of Electrical and Electronic Engineering University of Hong Kong Hong Kong China Department of Electronics University of Kent UK
This paper investigates the effects of channel estimation errors on zero-forcing (ZF) vertical Bell laboratories layered space time (V-BLAST) detection. An analytical method is presented to derive the symbol error pro... 详细信息
来源: 评论
Evaluation of an Online Parallel Anomaly detection System
Evaluation of an Online Parallel Anomaly Detection System
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Shashank Shanbhag Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst MA USA
The rapid and accurate detection of anomalies in network traffic has always been a challenging task, and is absolutely critical to the efficient operation of the network. The availability of numerous different detecti... 详细信息
来源: 评论
detection Strategies for DS-SS Systems Employing Parity Bit Selected Spreading
Detection Strategies for DS-SS Systems Employing Parity Bit ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Brian Lawrence Claude D'Amours Department of Electrical and Computer Engineering McGill University Montreal Qc Canada School of Information Technology and Engineering University of Ottawa Ottawa ON Canada
In this paper, we examine the bit error rate (BER) performance of direct sequence spread spectrum (DS-SS) systems using the parity bit selected spreading technique. Suboptimum detection is done by determining which sp... 详细信息
来源: 评论