Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
leg detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/112)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Human detection and following by a mobile robot using 3D features
Ali, Badar
;
Iqbal, Khawaja Fahad
;
Ayaz, Yasar
;
Muhammad, Naveed
Proceedings of 2013 IEEE International Conference on Mechatronics and Automation (ICMA) : August 4-7, Takamatsu, Japan
2013
/
p. 1714-1719 : ill
book article
2
book article
Human tracking by a mobile robot using 3D features
Ali, Badar
;
Qureshi, Ahmed Hussain
;
Muhammad, Naveed
Proceeding of the IEEE International Conference on Robotics and Biomimetics (ROBIO) : Shenzhen, China, December 2013
2013
/
p. 2464-2469 : ill
book article
Number of records 2, displaying
1 - 2
keyword
112
1.
leg detection
2.
animal leg
3.
four leg
4.
four-leg VSI
5.
leg voltage
6.
wheel-leg
7.
amoxicillin detection
8.
anomaly detection
9.
anomaly detection for system logs
10.
antibiotic detection
11.
antibiotics detection
12.
aspect detection
13.
asynchronous fault detection
14.
attack detection
15.
barotrauma detection system
16.
behaviour-based intrusion detection systems
17.
body detection
18.
botnet detection
19.
capacitively coupled conductivity detection
20.
change detection
21.
chemical detection
22.
community detection
23.
compu ter-aided detection(CAD)
24.
computer-aided detection
25.
computer‐aided detection
26.
contactless conductivity detection
27.
contactless conductivity detection (C4D)
28.
crack detection
29.
crash detection
30.
cyber intrusion detection
31.
defect detection
32.
detection
33.
detection efficiency
34.
detection engineering
35.
detection methods
36.
detection of anomalous end user nodes
37.
detection of hydrogen isotopes
38.
distributed detection
39.
early detection
40.
early intrusion detection
41.
energy detection
42.
error detection
43.
ESI-MS and IM detection
44.
Event detection
45.
extraction and detection methods
46.
face detection
47.
Face Manipulation Detection
48.
failure detection
49.
fall detection
50.
fault detection
51.
fault detection and diagnoses
52.
fault detection and diagnosis
53.
Fish detection
54.
fouling detection
55.
harmonic detection
56.
hepatitis C virus (HCV) detection
57.
hubs detection
58.
IED detection
59.
image-based crack detection
60.
indicident detection and response
61.
indirect UV absorbance detection
62.
intrusion detection
63.
intrusion detection system
64.
intrusion detection system (IDS)
65.
intrusion detection systems
66.
island detection
67.
islanding detection
68.
label-free detection
69.
LED fluorescence detection
70.
light detection and ranging
71.
light detection and ranging (LiDAR)
72.
Light Detection and Ranging (LiDAR) point cloud
73.
limit of detection
74.
lock-in detection
75.
loop-closure detection
76.
malware detection
77.
marker detection
78.
mobile malware detection
79.
money laundering detection systems
80.
monitoring and detection
81.
multi-classed object detection
82.
mutant detection
83.
network anomaly detection
84.
network intrusion detection system
85.
nodules detection
86.
object detection
87.
oil-spill detection
88.
outlier’s detection methods
89.
outliers detection
90.
peak detection
91.
plagiarism detection
92.
position detection
93.
protein detection
94.
proton detection
95.
radar detection
96.
ramp event detection
97.
recycled FPGA detection
98.
residual current detection
99.
robust detection
100.
scene text detection
101.
short-circuit detection
102.
small molecule detection
103.
speech activity detection
104.
Suicidal ideation detection
105.
synchronous detection
106.
tyre detection
107.
unmanned aerial vehicle detection systems
108.
unsupervised outlier detection
109.
UV detection
110.
vehicle detection
111.
vortex detection
112.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT