Suggested Topics within your search.
Suggested Topics within your search.
-
1481
Measurement-induced entanglement entropy of gravitational wave detections
Published 2025-09-01“…Coincident multiple detector operations make it possible to consider the bipartite measurement-induced entanglement, in the detection process, as a signature of non-classicality. …”
Get full text
Article -
1482
Detection and Classification of Emotional State Based on Speech Signal
Published 2019-06-01Get full text
Article -
1483
Detection and Defense: Student-Teacher Network for Adversarial Robustness
Published 2024-01-01“…In this paper, we propose a novel defense method based on the student-teacher framework that can minimize the classification performance degradation for NEs by detecting AEs and then applying the defense process only to AEs. …”
Get full text
Article -
1484
HEAVY METALS DETECTION IN ATMOSPHERIC FALLOUT AND AMBIANT AIR
Published 2019-06-01Get full text
Article -
1485
Development of an SPRi Immune Method for the Quantitative Detection of Osteopontin
Published 2025-06-01Get full text
Article -
1486
Cost-effective annotation of fisheye images for object detection
Published 2024-12-01“…It also seeks a way to prove that the annotation can be converted to fisheye images, resulted into a pre-process, which will facilitate the data preparation process. …”
Get full text
Article -
1487
Parameter Adaptive LCD Screen Defect Detection Framework
Published 2020-10-01“…It is necessary to detect defects in the production process of LCD screens for quality improvements Manual detection brings a heavy workload and low accuracy Therefore, an efficient and accurate automatic detection method is urgently needed To this end, this paper proposes a new defect detection framework, which mainly includes screen area extraction, preprocessing, threshold segmentation and defect selection By adaptive adjustment of parameters, the detection method can adapt to various complex situations In order to eliminate the influence of illumination changes, the defect region is segmented by automatic parameter adjustment in the threshold segmentation First, the maximum grayscale value of the image is calculated, and then the fixed parameters and the coefficient of the defect image are determined according to the nodefect image, and finally the maximum value which was selected as the minimum threshold of the threshold segmentation from the fixed parameters and the product of the maximum grayscale value and the coefficient In addition, in order to solve the problem that the brightness difference of the images captured by lowresolution cameras is too small to detect defects in the saturation condition, selfadaptive adjustment of exposure parameters was used to collect images to process different parts of images with large difference in light and shade Experiments show that the method can achieve high performance and efficiency in detecting defects such as points, lines, Mura, saturation…”
Get full text
Article -
1488
Center-Guided Network with Dynamic Attention for Transmission Tower Detection
Published 2025-04-01“…In addition, a two-stage detection head is proposed to employ a two-stage detection process to perform more accurate detection. …”
Get full text
Article -
1489
Identification of orthohantaviruses detected for the first time in the Republic of Belarus
Published 2025-03-01“…Comparative and phylogenetic analysis was carried out using the MegAlign programs from the Lasergene package (DNASTAR, USA) and MEGA 11. …”
Get full text
Article -
1490
CLEAN Technique to Classify and Detect Objects in Subsurface Imaging
Published 2012-01-01Get full text
Article -
1491
Explainable handcrafted features for mitotic event detection and classification
Published 2025-03-01“…These unwanted noise elements and artifacts can cause false positive detections and lead to low precision in detecting proliferation processes. …”
Get full text
Article -
1492
Method of detecting network anomaly on multi-time-scale
Published 2007-01-01“…To detect anomaly timely and precisely in high-speed network,an algorithm,named DA-MTS(detecting anomaly on multi-time-scale synchronously),was proposed.Firstly,pre-process the time series of traffic with non-decimated Haar wavelet transform to produce detail signals,which approximately follow Gaussian white noise.Then detect anomaly based on "3σ" principal of normal distribution.Analysis and experiments reveal that this algorithm can detect anomaly on several time-scales recursively without delay,so it can detect anomaly precisely and timely.…”
Get full text
Article -
1493
Deviance detection and regularity sensitivity in dissociated neuronal cultures
Published 2025-08-01“…Crucially, we also showed sensitivity to the statistical regularity of stimuli, a phenomenon previously observed only in intact brains: the MMRs in a predictable, periodic sequence were smaller than those in a commonly used sequence in which the appearance of the deviant stimulus was random and unpredictable.DiscussionThese results challenge the traditional view that a hierarchically structured neural network is required to process complex temporal patterns, suggesting instead that deviant detection and regularity sensitivity are inherent properties arising from the primitive neural network. …”
Get full text
Article -
1494
Study on user behavior profiling in insider threat detection
Published 2018-12-01“…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. …”
Get full text
Article -
1495
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01“…SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. …”
Get full text
Article -
1496
GHSOM intrusion detection based on Dempster-Shafer theory
Published 2015-11-01“…On the basis of incremental GHSOM,the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness,as well as can constantly narrowing assumptions set by accumulate the evidence,effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.…”
Get full text
Article -
1497
Concept Drift Detection in Dynamic Probabilistic Relational Models
Published 2021-04-01“…We propose an approach to account for non-stationary processes w.r.t. to changing probability distributions over time, an effect known as concept drift. …”
Get full text
Article -
1498
Grasp Detection under Occlusions Using SIFT Features
Published 2021-01-01“…There are two key steps for the proposed method in the process of grasping occluded object: generating template information and grasp detection using the matching algorithm. …”
Get full text
Article -
1499
Method for Detecting Disorder of a Nonlinear Dynamic Plant
Published 2025-02-01“…Also, CCF-AE has more advantages in detecting disorder of complex nonlinear processes.…”
Get full text
Article -
1500
Policy-focused Stance Detection in Parliamentary Debate Speeches
Published 2022-07-01“… Legislative debate transcripts provide citizens with information about the activities of their elected representatives, but are difficult for people to process. We propose the novel task of policy-focused stance detection, in which both the policy proposals under debate and the position of the speakers towards those proposals are identified. …”
Get full text
Article