Showing 1,901 - 1,920 results of 20,691 for search 'detection process', query time: 0.21s Refine Results
  1. 1901

    Detection algorithm of LSB hidden messages based local image stability by ZHANG Qiu-yu, LIU Hong-guo, YUAN Zhan-ting

    Published 2009-01-01
    “…Aimed at the characteristics of LSB steganogtaphy, an algorithm based on local image stability was proposed.Combined with the idea of pollution data analysis, the secret information was regarded as noise in the process of informa-tion transmission.Then using the noise analysis technique, and selecting appropriate critical point value to achieve the detection purpose of the secret information.The theoretic analysis and experimental results show that detection algorithm advances than traditional algorithm in low embedding rate.…”
    Get full text
    Article
  2. 1902

    Skull fracture detection for point-of-care diagnostics using microwave technique by Mariella Särestöniemi, Daljeet Singh, Jarmo Reponen, Mikael von und zu Fraunberg, Teemu Myllylä

    Published 2025-04-01
    “…Additionally, frequent and safe monitoring of the healing process of skull fractures in smaller healthcare centers, as a new telemedicine solution, would enable early detection of potential problems. …”
    Get full text
    Article
  3. 1903

    Deep learning based detection of silicosis from computed tomography images by Hamit Aksoy, Ümit Atila, Sertaç Arslan

    Published 2024-01-01
    “…Silicosis, which has maintained its importance since the 1900s and has seen over 182,000 articles published in the last 10 years, is a global health problem. The automated detection and recognition of silicosis in lung computed tomography (CT) images can be considered the backbone of assisting the silicosis diagnosis process. …”
    Get full text
    Article
  4. 1904

    Les ailes du crime ou la modernité de Détective by Mélodie Simard-Houde

    Published 2018-12-01
    “…This is a paradoxal process, by which an object (aeronautics imaginaries) that has, at first view, very few things to do with criminality and “fait divers” is integrated to a periodic dedicated to this type of topics. …”
    Get full text
    Article
  5. 1905
  6. 1906

    Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection by MA Lin-ru1, YANG Lin2, WANG Jian-xin2, TANG Xin2

    Published 2006-01-01
    “…Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. …”
    Get full text
    Article
  7. 1907

    Significance of transvaginal Doppler ultrasonography for detection of malignant gestational trophoblastic disease by Nikolić Branka, Rakić Snežana, Pavlović Dejan, Popovac Svetlana, Lukić Relja

    Published 2005-01-01
    “…Resistance Index (RI) values were measured at the level of blood vessels of peritrophoblastic tissue and of suspected zones in the uterine tissue to detect neovascularization, which followed the malignant process. …”
    Get full text
    Article
  8. 1908

    Imaginary latent variables: Empirical testing for detecting deficiency in reflective measures by Marco Vassallo

    Published 2024-11-01
    “…This rationale is based on the theory of complex numbers used in the measurement process of common factor model–based structural equation modeling. …”
    Get full text
    Article
  9. 1909

    Fault detection and diagnosis method for heterogeneous wireless network based on GAN by Xiaorong ZHU, Peipei ZHANG

    Published 2020-08-01
    “…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
    Get full text
    Article
  10. 1910

    Fast detection method for IC card data integrity protection mechanism by Tang Zhongze, Huang Xiaopeng, Liu Qi

    Published 2025-05-01
    “…An improved power-off-testing theory is proposed aiming at the limitations and shortcomings of traditional single-command power-off detection methods, to detect and verify IC card transaction protection mechanism during data recovery process. …”
    Get full text
    Article
  11. 1911

    On detection of crack-like welding defects by existing quality control methods by V. A. Peredelsky, V. Y. Harchenko, A. I. Chernogorov, S. V. Tihinov

    Published 2021-04-01
    “…Welding defects were detected by standard quality control methods prescribed by the SPD and GOST standards.Results. …”
    Get full text
    Article
  12. 1912

    Leveraging edge learning and game theory for intrusion detection in Internet of things by Haoran LIANG, Jun WU, Chengcheng ZHAO, Jianhua LI

    Published 2021-06-01
    “…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
    Get full text
    Article
  13. 1913

    Fault detection and diagnosis method for heterogeneous wireless network based on GAN by Xiaorong ZHU, Peipei ZHANG

    Published 2020-08-01
    “…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
    Get full text
    Article
  14. 1914

    Strategy optimization method based on UAVs-assisted detection of covert communication by Xiaohan Wang, Wen Tian, Guangjie Liu, Yuwei Dai

    Published 2025-08-01
    “…Specifically, the UAV actively transmitsnoise to Alice’s transmission channels to disrupt covert transmission whenWillie detects a covert communication transmission. Furthermore, we ana-lyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditionsfor the existence of a Nash equilibrium, and formulate optimal strategiesfor both sides.…”
    Get full text
    Article
  15. 1915

    Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion by Gang Pan, Di Sun, Yarui Chen, Chuanlei Zhang

    Published 2016-01-01
    “…Multiresolution pyramid is used to accelerate this detection process. We also discuss a solution to deal with rotational symmetry detection under slight affine transformation. …”
    Get full text
    Article
  16. 1916
  17. 1917

    A comprehensive literature review on ransomware detection using deep learning by Er. Kritika

    Published 2025-12-01
    “…The paper delves into providing the literature review on ransomware detection using deep learning techniques.…”
    Get full text
    Article
  18. 1918

    OFDM-NOMA Error Rate Reduction Using Direct Data Detection by Tasneem Assaf, Arafat Al-Dweik, Anshul Pandey, Jean-Pierre Giacalone

    Published 2025-01-01
    “…Therefore, this article proposes an integrated <inline-formula> <tex-math notation="LaTeX">$D^{3}$ </tex-math></inline-formula>-NOMA where the channel state information estimation (CSIE), equalization, and detection are consolidated into one unified process. …”
    Get full text
    Article
  19. 1919
  20. 1920