Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
loop-closure detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/116)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Map-based localization and loop-closure detection from a moving underwater platform using flow features
Muhammad, Naveed
;
Fuentes-Pérez, Juan Francisco
;
Tuhtan, Jeffrey Andrew
;
Toming, Gert
;
Kruusmaa, Maarja
;
Musall, Mark
Autonomous robots
2019
/
p. 1419-1434 : ill
https://doi.org/10.1007/s10514-018-9797-3
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
116
1.
loop-closure detection
2.
closure depth
3.
closure equations
4.
mine closure
5.
routing closure
6.
security closure
7.
trace closure
8.
basic helix-loop-helix transcription factor
9.
basic helix–loop–helix transcription factor
10.
BDNF-positive feedback loop
11.
closed loop control
12.
closed loop systems
13.
closed-loop control
14.
closed-loop identification
15.
closed-loop PLM
16.
hardware in the loop
17.
hardware-in-the loop simulation
18.
Hardware-in-the-Loop simulation
19.
hydraulic closed-loop rotary transmission
20.
hysteresis loop
21.
multi-loop model reference control
22.
open-loop stability
23.
positive feedback loop
24.
power-hardware-in-the-loop
25.
software-in-the-loop (SIL) testing
26.
triple-loop control
27.
amoxicillin detection
28.
anomaly detection
29.
anomaly detection for system logs
30.
antibiotic detection
31.
antibiotics detection
32.
asynchronous fault detection
33.
attack detection
34.
barotrauma detection system
35.
body detection
36.
botnet detection
37.
capacitively coupled conductivity detection
38.
change detection
39.
chemical detection
40.
community detection
41.
compu ter-aided detection(CAD)
42.
computer-aided detection
43.
computer‐aided detection
44.
contactless conductivity detection
45.
contactless conductivity detection (C4D)
46.
crash detection
47.
defect detection
48.
detection
49.
detection efficiency
50.
detection engineering
51.
detection of anomalous end user nodes
52.
distributed detection
53.
early detection
54.
early intrusion detection
55.
energy detection
56.
error detection
57.
ESI-MS and IM detection
58.
Event detection
59.
face detection
60.
Face Manipulation Detection
61.
failure detection
62.
fall detection
63.
fault detection
64.
fault detection and diagnoses
65.
fault detection and diagnosis
66.
Fish detection
67.
fouling detection
68.
hepatitis C virus (HCV) detection
69.
hubs detection
70.
IED detection
71.
indicident detection and response
72.
indirect UV absorbance detection
73.
intrusion detection
74.
intrusion detection systems
75.
island detection
76.
islanding detection
77.
label-free detection
78.
LED fluorescence detection
79.
leg detection
80.
light detection and ranging
81.
Light Detection and Ranging (LiDAR) point cloud
82.
limit of detection
83.
lock-in detection
84.
malware detection
85.
marker detection
86.
mobile malware detection
87.
money laundering detection systems
88.
monitoring and detection
89.
multi-classed object detection
90.
mutant detection
91.
network anomaly detection
92.
nodules detection
93.
object detection
94.
oil-spill detection
95.
outlier’s detection methods
96.
outliers detection
97.
plagiarism detection
98.
position detection
99.
protein detection
100.
proton detection
101.
radar detection
102.
ramp event detection
103.
recycled FPGA detection
104.
robust detection
105.
short-circuit detection
106.
small molecule detection
107.
speech activity detection
108.
Suicidal ideation detection
109.
synchronous detection
110.
tyre detection
111.
unmanned aerial vehicle detection systems
112.
unsupervised outlier detection
113.
UV detection
114.
vehicle detection
115.
vortex detection
116.
3D lane detection
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT