Search alternatives:
image » images (Expand Search)
Showing 201 - 220 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 201

    Metode Deteksi Pokok Pohon Secara Automatis pada Citra Perkebunan Sawit Menggunakan Model Convolutional Neural Network (CNN) pada Perangkat Lunak Sistem Informasi Geografis by Samuel Samuel, Kestrilia Rega Prilianti, Hendry Setiawan, Prasetyo Mimboro

    Published 2022-12-01
    “…This study demonstrates the use of the Convolutional Neural Network (CNN) method with the ResNet-34 and ResNet-50 architectures to build a palm tree principal detection model from UAV images of PTPN IV oil palm plantations. The purpose of tree detection is to carry out further analysis related to the condition of oil palm trees such as nutritional status, harvest readiness and indications of disease attacks.. …”
    Get full text
    Article
  2. 202

    Enhancing Voice Spoofing Detection: A Hybrid Approach With VGGish-LSTM Model for Improved Security in Automatic Speaker Verification Systems by Komal Shahzad, Saima Farhan, Yasin-Ul-Haq, Rabia Sana, Salman Pathan

    Published 2025-01-01
    “…To address these concerns, this research focuses on the detection of voice spoofing attacks by utilizing a hybrid VGGish-LSTM model. While previous transfer learning methodologies have essentially been applied to image classification tasks, our methodology focuses on voice classification. …”
    Get full text
    Article
  3. 203

    Pitting corrosion studies on SS316L wall fabricated by directed energy deposition based wire arc process by John Solomon I, D. Raguraman, Dhivakar Poosapadi, Nalla Bhanu Teja, Rupesh Kushwah, Surrya Prakash Dillibabu, Joshuva Arockia Dhanraj, Gourav Kalra, T.S. Senthil

    Published 2025-06-01
    “…EDS analysis confirmed localized depletion of chromium and molybdenum, with elevated oxygen and chloride concentrations within pits, verifying the aggressive localized attack. …”
    Get full text
    Article
  4. 204

    A new digital watermarking model using honey encryption and reversible cellular automata by Jianxin Xiong, Zhiyuan Zhou, Vyacheslav V. Dubrovskiy, Sangkeum Lee

    Published 2025-07-01
    “…Furthermore, normalized correlation analysis of the proposed method exhibits its higher robustness against various attacks, including noise and JPEG compression than the compared approaches.…”
    Get full text
    Article
  5. 205

    Intravascular Ultrasound Findings in Acute and Chronic Deep Vein Thrombosis of the Lower Extremities by Fabio Corvino, Francesco Giurazza, Massimo Galia, Antonio Corvino, Roberto Minici, Antonio Basile, Anna Maria Ierardi, Paolo Marra, Raffaella Niola

    Published 2025-02-01
    “…Deep vein thrombosis (DVT) of the lower extremities, as part of venous thromboembolism disorder, is the third leading cause of acute cardiovascular syndrome after heart attack and stroke. It can result in disability due to pulmonary embolism (PE) and post-thrombotic syndrome (PTS), particularly in cases where the thrombosis extends to the iliofemoral veins. …”
    Get full text
    Article
  6. 206

    Evaluation of Risk Factors, Etiology, Diagnosis, and Auxiliary Diagnostic Methods of Children With Recurrent Wheezing Between 1-24 Months by Ali Furkan Çetin, Öner Özdemir

    Published 2024-09-01
    “…Cystic fibrosis was detected in one of the 64 patients who underwent sweat testing, and the diagnosis was confirmed by mutation analysis. When all the cases were examined, it was observed that winter is 45% (n=34) of the attack season at the time of admission due to wheezing. …”
    Get full text
    Article
  7. 207

    Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains by Gege Sun, Wenbo Song, Miao Tian, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…The proposed remote sensing image encryption system exhibits high security performance and robustness against various attacks.…”
    Get full text
    Article
  8. 208

    Hilbert Convex Similarity for Highly Secure Random Distribution of Patient Privacy Steganography by Hussein K. Alzubaidy, Dhiah Al-Shammary, Mohammed Hamzah Alsalihi, Ayman Ibaida, Khandakar Ahmed

    Published 2023-01-01
    “…Medical images confidentiality suffers from potential attacks and tracing by an unauthorized access. …”
    Get full text
    Article
  9. 209

    ALDP-FL for adaptive local differential privacy in federated learning by Lixin Cui, Xu Wu

    Published 2025-07-01
    “…Regarding the reconstructed images under the iDLG attack, the average improvement rates in MSE and SSIM reach 391.2% and –85.4%, respectively, significantly outperforming all other comparison methods.…”
    Get full text
    Article
  10. 210

    The Role of Optical Coherence Tomography in the Diagnosis of Angle Closed Diseases of the Anterior Chamber. Part 2: Visualization of the Posterior Segment of the Eye by N. I. Kurysheva, G. А. Sharova

    Published 2021-10-01
    “…The emergence of new imaging technologies such as SS-OCT contributes to understanding the pathogenesis of primary angle closure diseases in terms of involvement of the choroid in the process. …”
    Get full text
    Article
  11. 211

    Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach by K. Meera, N. Selvaganesan

    Published 2025-01-01
    “…Histogram analysis, correlation analysis and key space analysis are performed to ensure the efficiency of the enhanced security approach. …”
    Get full text
    Article
  12. 212

    The Relationship of Clinical and Laboratory Factors with Acute Isolated Vertigo and Cerebellar Infarction by Cihan Bedel, Mustafa Korkut

    Published 2020-07-01
    “…Materials and Methods: Ninety patients presented with isolated acute vertigo attack and/or dizziness symptoms were retrospectively analyzed. …”
    Get full text
    Article
  13. 213

    A compressive data gathering method based on El Gamal cryptography by Xiaohan YU, Keming DONG, Xia LI, Chao CHEN

    Published 2019-12-01
    “…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
    Get full text
    Article
  14. 214
  15. 215

    (H-DIR)<sup>2</sup>: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers by Davide Tosi, Roberto Pazzi

    Published 2025-08-01
    “…All code, datasets, and Docker images are provided to ensure full reproducibility. …”
    Get full text
    Article
  16. 216

    HET0016 decreases lung metastasis from breast cancer in immune-competent mouse model. by Thaiz F Borin, Adarsh Shankar, Kartik Angara, Mohammad H Rashid, Meenu Jain, Asm Iskander, Roxan Ara, Iryna Lebedyeva, Hasan Korkaya, Bhagelu R Achyut, Ali S Arbab

    Published 2017-01-01
    “…The ability of tumor cells to modulate TME and to escape immune-mediated attack by releasing immunosuppressive cytokines has become a hallmark of breast cancer. …”
    Get full text
    Article
  17. 217

    Associations between multiple acute infarctions and intracranial arterial stenosis with functional outcomes in anterior circulation acute ischaemic stroke reperfusion therapy: resu... by Xiaoli Zhang, Xia Meng, Anxin Wang, Yijun Zhang, Xu Zhu, Yiping Wu, Ya Su, Shifeng Xiang

    Published 2025-05-01
    “…Objective This study aims to observe the correlation between infarction pattern and intracranial arterial stenosis (ICAS) on magnetic resonance and functional outcome in acute ischaemic stroke (AIS) patients after reperfusion therapy.Design This is a post hoc analysis of the Third China National Stroke Registry (CNSR-III) study.Setting The data was derived from the CNSR-III study, which was a nationwide clinical registry of ischaemic stroke or transient ischaemic attack based in China.Participants Patients with anterior circulation AIS who underwent reperfusion therapy were included for analysis. …”
    Get full text
    Article
  18. 218

    Design of the “EAST” strategy in patients with symptomatic intracranial atherosclerotic stenosis by Jiaqi Dai, Haobo Zhao, Xinyu Chen, Ping Nie, Jie Gong, Min Wang, Kezhong Zhang, Zhaolu Wang, Hua Lu

    Published 2025-05-01
    “…High resolution vessel wall magnetic resonance imaging (HR-vwMRI) will be performed at recruitment and after 6 months and 12 months. …”
    Get full text
    Article
  19. 219

    AI-Driven Framework for Recognition of Guava Plant Diseases through Machine Learning from DSLR Camera Sensor Based High Resolution Imagery by Ahmad Almadhor, Hafiz Tayyab Rauf, Muhammad Ikram Ullah Lali, Robertas Damaševičius, Bader Alouffi, Abdullah Alharbi

    Published 2021-06-01
    “…Guava, well known to be the tropics’ apple, is one significant fruit cultivated in tropical regions. It is attacked by 177 pathogens, including 167 fungal and others such as bacterial, algal, and nematodes. …”
    Get full text
    Article
  20. 220

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article