Suggested Topics within your search.
Suggested Topics within your search.
-
2301
Significance of transvaginal Doppler ultrasonography for detection of malignant gestational trophoblastic disease
Published 2005-01-01“…Resistance Index (RI) values were measured at the level of blood vessels of peritrophoblastic tissue and of suspected zones in the uterine tissue to detect neovascularization, which followed the malignant process. …”
Get full text
Article -
2302
Imaginary latent variables: Empirical testing for detecting deficiency in reflective measures
Published 2024-11-01“…This rationale is based on the theory of complex numbers used in the measurement process of common factor model–based structural equation modeling. …”
Get full text
Article -
2303
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01“…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
Get full text
Article -
2304
Fast detection method for IC card data integrity protection mechanism
Published 2025-05-01“…An improved power-off-testing theory is proposed aiming at the limitations and shortcomings of traditional single-command power-off detection methods, to detect and verify IC card transaction protection mechanism during data recovery process. …”
Get full text
Article -
2305
On detection of crack-like welding defects by existing quality control methods
Published 2021-04-01“…Welding defects were detected by standard quality control methods prescribed by the SPD and GOST standards.Results. …”
Get full text
Article -
2306
Parametric Design of Steel Ball Automatic Detection System Based on VB
Published 2020-10-01“…Firstly, establishing the template model library of steel ball automatic detection system, and the library is divided into general parts model library and key parts design library through analyzing the function structure, using SolidWorks part design table function realizes parametric design of key components; Calling the model library to complete the establishment of detection system virtual assembly model, and using SolidWorks macro function to make the driver program of key parts and assembly model,Finally, the simulation technology is used to simulate the process of steel ball, and the correctness of the theoretical analysis results is verified Finally, the parametric design method of automatic detection system of steel ball is put forward…”
Get full text
Article -
2307
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01“…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
Get full text
Article -
2308
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01“…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
Get full text
Article -
2309
Strategy optimization method based on UAVs-assisted detection of covert communication
Published 2025-08-01“…Specifically, the UAV actively transmitsnoise to Alice’s transmission channels to disrupt covert transmission whenWillie detects a covert communication transmission. Furthermore, we ana-lyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditionsfor the existence of a Nash equilibrium, and formulate optimal strategiesfor both sides.…”
Get full text
Article -
2310
Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion
Published 2016-01-01“…Multiresolution pyramid is used to accelerate this detection process. We also discuss a solution to deal with rotational symmetry detection under slight affine transformation. …”
Get full text
Article -
2311
-
2312
A comprehensive literature review on ransomware detection using deep learning
Published 2025-12-01“…The paper delves into providing the literature review on ransomware detection using deep learning techniques.…”
Get full text
Article -
2313
OFDM-NOMA Error Rate Reduction Using Direct Data Detection
Published 2025-01-01“…Therefore, this article proposes an integrated <inline-formula> <tex-math notation="LaTeX">$D^{3}$ </tex-math></inline-formula>-NOMA where the channel state information estimation (CSIE), equalization, and detection are consolidated into one unified process. …”
Get full text
Article -
2314
Energy Efficient Signal Detection Using SPRT and Ordered Transmissions in Wireless Sensor Networks
Published 2024-01-01Get full text
Article -
2315
Adaptive Anomaly Detection in Network Flows With Low-Rank Tensor Decompositions and Deep Unrolling
Published 2025-01-01Get full text
Article -
2316
On the Design of Near-Optimal Generalized Block-Based Spatial Modulation With Low Detection Complexity
Published 2025-01-01Get full text
Article -
2317
A Survey on the Design, Detection, and Prevention of Pre-Silicon Hardware Trojans
Published 2025-01-01“…The complexity of the semiconductor design lifecycle and globalized manufacturing process creates concern over the threat of deliberate malicious alterations, or hardware Trojans, being inserted into microelectronic designs. …”
Get full text
Article -
2318
Efficient and real-time lane detection using CUDA-based implementation
Published 2024-01-01“…Median filtering is an essential pre-processing step for reducing noise and improving lane detection accuracy. …”
Get full text
Article -
2319
Background dictionary construction-based sparse representation hyperspectral target detection
Published 2022-01-01“…Aiming at the existing target detection algorithms based on sparse representation, in the process of building the background dictionary with concentric double windows, the target pixels will interfere with the background dictionary. …”
Get full text
Article -
2320
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
Published 2021-01-01“…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
Get full text
Article