Showing 961 - 980 results of 2,333 for search 'blocking detection', query time: 0.10s Refine Results
  1. 961
  2. 962

    Advanced smart assistance with enhancing social interaction and daily activities for visually impaired individuals using deep learning with modified seagull optimization by Sana Alazwari, Hussah Nasser AlEisa, Mohammed Rizwanullah, Radwa Marzouk

    Published 2025-05-01
    “…This study proposes an Automated Damage Detection using a Modified Seagull Optimizer with Ensemble Learning (ADD-MSGOEL) method for visually impaired people. …”
    Get full text
    Article
  3. 963

    DeepLASD countermeasure for logical access audio spoofing by Hamed Al-Tairi, Ali Javed, Tasawer Khan, Abdul Khader Jilani Saudagar

    Published 2025-07-01
    “…Achieving an Equal Error Rate as low as $$4.98\%$$ and a minimum Tandem Detection Cost Function of 0.1208, along with strong generalization to both VC and TTS spoof types, demonstrate the competency of the proposed method for LA spoofing detection. …”
    Get full text
    Article
  4. 964

    SonarNet: Global Feature-Based Hybrid Attention Network for Side-Scan Sonar Image Segmentation by Juan Lei, Huigang Wang, Liming Fan, Qingyue Gu, Shaowei Rong, Huaxia Zhang

    Published 2025-07-01
    “…SonarNet features a dual-encoder architecture that leverages residual blocks and a self-attention mechanism to simultaneously capture both global structural and local contextual information. …”
    Get full text
    Article
  5. 965
  6. 966
  7. 967

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  8. 968

    Extensive identification of landslide boundaries using remote sensing images and deep learning method by Chang-dong Li, Peng-fei Feng, Xi-hui Jiang, Shuang Zhang, Jie Meng, Bing-chen Li

    Published 2024-04-01
    “…SCDnn exhibits notable improvements in landslide feature extraction and semantic segmentation by combining an enhanced Atrous Spatial Pyramid Convolutional Block (ASPC) with a coding structure that reduces model complexity. …”
    Get full text
    Article
  9. 969

    Drainage Pipeline Multi-Defect Segmentation Assisted by Multiple Attention for Sonar Images by Qilin Jin, Qingbang Han, Jianhua Qian, Liujia Sun, Kao Ge, Jiayu Xia

    Published 2025-01-01
    “…The multiple attention method proposed in this paper was adopted for detection, instance segmentation, and pose detection in different public datasets, especially in the object detection of the coco128-seg dataset under the same condition. …”
    Get full text
    Article
  10. 970
  11. 971

    Post-COVID-19 myocardium and coronary involvement in a young patient: differential diagnosis and comprehensive treatment by O. V. Blagova, V. A. Bryukhanov, M. B. Kislova, V. A. Yumasheva, M. S. Gaeva, D. Kh. Ainetdinova, N. V. Gagarina, E. A. Kogan

    Published 2024-04-01
    “…We described a 35-year-old smoking male patient who, by the end of the first month after COVID-19, developed left ventricular dysfunction with decrease in ejection fraction to 25-30% and persistent left bundle branch block (LBBB). Echocardiography also detected local contractility disorders. …”
    Get full text
    Article
  12. 972

    Automated Snow Avalanche Monitoring and Alert System Using Distributed Acoustic Sensing in Norway by Antoine Turquet, Andreas Wuestefeld, Guro K. Svendsen, Finn Kåre Nyhammer, Espen Lauvlund Nilsen, Andreas Per-Ola Persson, Vetle Refsum

    Published 2024-12-01
    “…The system successfully identified 10 road-impacting avalanches (100% detection rate). Our results via DAS align with the previous works and indicate that low frequency part of the signal (<20 Hz) is crucial for detection and size estimation of avalanche events. …”
    Get full text
    Article
  13. 973

    DEFORMATION WAVES AS A TRIGGER MECHANISM OF SEISMIC ACTIVITY IN SEISMIC ZONES OF THE CONTINENTAL LITHOSPHERE by S. I. Sherman

    Published 2015-09-01
    “…The method can be applied to estimate a dominating direction of movement of the epicentres, which corresponds to the phase velocity of the deformation wave disturbing meta-stability of the fault-block medium, leading to displacement of neighbouring blocks and thus causing a seismic event (Fig. 14). …”
    Get full text
    Article
  14. 974
  15. 975
  16. 976

    Precise Spatial Prediction of Rice Seedlings From Large-Scale Airborne Remote Sensing Data Using Optimized Li-YOLOv9 by Jayakrishnan Anandakrishnan, Arun Kumar Sangaiah, Hendri Darmawan, Nguyen Khanh Son, Yi-Bing Lin, Mohammed J. F. Alenazi

    Published 2025-01-01
    “…Rice is pivotal in global food security and Rice seeding detection in precision agriculture is essential for optimizing crop productivity and efficient resource use. …”
    Get full text
    Article
  17. 977

    A Three-Stage-Concatenated Non-Linear MMSE Interference Rejection Combining Aided MIMO-OFDM Receiver and its EXIT-Chart Analysis by Jue Chen, Siyao Lu, Tsang-Yi Wang, Jwo-Yuh Wu, Chih-Peng Li, Soon Xin Ng, Robert G. Maunder, Lajos Hanzo

    Published 2024-01-01
    “…This reduced complexity NL detection algorithm is particularly well suited for practical hardware implementation using parallel processing at a low latency. …”
    Get full text
    Article
  18. 978

    DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK by T. A. Andryianava, S. B. Salomatin

    Published 2017-11-01
    “…The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer of information.…”
    Get full text
    Article
  19. 979
  20. 980

    A virtual rail train path recognition method based on binocular stereo vision by ZENG Junwei, GENG Li, LU Chenyang, REN Lihui

    Published 2024-01-01
    “…To achieve this, a lane detection model based on Mask R-CNN was developed, incorporating their characteristics such as obvious lane blocks, contour integrity, and unique shape. …”
    Get full text
    Article