Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
leg detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/115)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Human detection and following by a mobile robot using 3D features
Ali, Badar
;
Iqbal, Khawaja Fahad
;
Ayaz, Yasar
;
Muhammad, Naveed
Proceedings of 2013 IEEE International Conference on Mechatronics and Automation (ICMA) : August 4-7, Takamatsu, Japan
2013
/
p. 1714-1719 : ill
book article
2
book article
Human tracking by a mobile robot using 3D features
Ali, Badar
;
Qureshi, Ahmed Hussain
;
Muhammad, Naveed
Proceeding of the IEEE International Conference on Robotics and Biomimetics (ROBIO) : Shenzhen, China, December 2013
2013
/
p. 2464-2469 : ill
book article
Number of records 2, displaying
1 - 2
keyword
115
1.
leg detection
2.
animal leg
3.
four leg
4.
four-leg VSI
5.
leg voltage
6.
wheel-leg
7.
amoxicillin detection
8.
anomaly detection
9.
anomaly detection for system logs
10.
antibiotic detection
11.
antibiotics detection
12.
aspect detection
13.
asynchronous fault detection
14.
attack detection
15.
barotrauma detection system
16.
behaviour-based intrusion detection systems
17.
body detection
18.
botnet detection
19.
capacitively coupled conductivity detection
20.
change detection
21.
chemical detection
22.
community detection
23.
compu ter-aided detection(CAD)
24.
computer-aided detection
25.
computer‐aided detection
26.
contactless conductivity detection
27.
contactless conductivity detection (C4D)
28.
crack detection
29.
crash detection
30.
cyber intrusion detection
31.
defect detection
32.
detection
33.
detection efficiency
34.
detection engineering
35.
detection method
36.
detection methods
37.
detection of anomalous end user nodes
38.
detection of hydrogen isotopes
39.
distributed detection
40.
early detection
41.
early intrusion detection
42.
energy detection
43.
error detection
44.
ESI-MS and IM detection
45.
Event detection
46.
extraction and detection methods
47.
face detection
48.
Face Manipulation Detection
49.
failure detection
50.
fall detection
51.
fault detection
52.
fault detection and diagnoses
53.
fault detection and diagnosis
54.
Fish detection
55.
fouling detection
56.
harmonic detection
57.
hepatitis C virus (HCV) detection
58.
hubs detection
59.
IED detection
60.
image-based crack detection
61.
indicident detection and response
62.
indirect UV absorbance detection
63.
intrusion detection
64.
intrusion detection system
65.
intrusion detection system (IDS)
66.
intrusion detection systems
67.
island detection
68.
islanding detection
69.
label-free detection
70.
LED fluorescence detection
71.
light detection and ranging
72.
light detection and ranging (LiDAR)
73.
Light Detection and Ranging (LiDAR) point cloud
74.
limit of detection
75.
lock-in detection
76.
loop-closure detection
77.
malware detection
78.
marker detection
79.
mobile malware detection
80.
money laundering detection systems
81.
monitoring and detection
82.
multi-classed object detection
83.
Multi-valued Simulation for Hazard Detection in Digital Circuits
84.
mutant detection
85.
network anomaly detection
86.
network intrusion detection system
87.
nodules detection
88.
object detection
89.
oil-spill detection
90.
outlier’s detection methods
91.
outliers detection
92.
peak detection
93.
phytoplankton detection methods
94.
plagiarism detection
95.
position detection
96.
protein detection
97.
proton detection
98.
radar detection
99.
ramp event detection
100.
recycled FPGA detection
101.
residual current detection
102.
robust detection
103.
scene text detection
104.
short-circuit detection
105.
small molecule detection
106.
speech activity detection
107.
Suicidal ideation detection
108.
synchronous detection
109.
tyre detection
110.
unmanned aerial vehicle detection systems
111.
unsupervised outlier detection
112.
UV detection
113.
vehicle detection
114.
vortex detection
115.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT