Suggested Topics within your search.
Suggested Topics within your search.
-
1901
Detection algorithm of LSB hidden messages based local image stability
Published 2009-01-01“…Aimed at the characteristics of LSB steganogtaphy, an algorithm based on local image stability was proposed.Combined with the idea of pollution data analysis, the secret information was regarded as noise in the process of informa-tion transmission.Then using the noise analysis technique, and selecting appropriate critical point value to achieve the detection purpose of the secret information.The theoretic analysis and experimental results show that detection algorithm advances than traditional algorithm in low embedding rate.…”
Get full text
Article -
1902
Skull fracture detection for point-of-care diagnostics using microwave technique
Published 2025-04-01“…Additionally, frequent and safe monitoring of the healing process of skull fractures in smaller healthcare centers, as a new telemedicine solution, would enable early detection of potential problems. …”
Get full text
Article -
1903
Deep learning based detection of silicosis from computed tomography images
Published 2024-01-01“…Silicosis, which has maintained its importance since the 1900s and has seen over 182,000 articles published in the last 10 years, is a global health problem. The automated detection and recognition of silicosis in lung computed tomography (CT) images can be considered the backbone of assisting the silicosis diagnosis process. …”
Get full text
Article -
1904
Les ailes du crime ou la modernité de Détective
Published 2018-12-01“…This is a paradoxal process, by which an object (aeronautics imaginaries) that has, at first view, very few things to do with criminality and “fait divers” is integrated to a periodic dedicated to this type of topics. …”
Get full text
Article -
1905
Multiscale Motion Detection and Recognition Combining Still Images and Video Sequences
Published 2022-01-01Get full text
Article -
1906
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Published 2006-01-01“…Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. …”
Get full text
Article -
1907
Significance of transvaginal Doppler ultrasonography for detection of malignant gestational trophoblastic disease
Published 2005-01-01“…Resistance Index (RI) values were measured at the level of blood vessels of peritrophoblastic tissue and of suspected zones in the uterine tissue to detect neovascularization, which followed the malignant process. …”
Get full text
Article -
1908
Imaginary latent variables: Empirical testing for detecting deficiency in reflective measures
Published 2024-11-01“…This rationale is based on the theory of complex numbers used in the measurement process of common factor model–based structural equation modeling. …”
Get full text
Article -
1909
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01“…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
Get full text
Article -
1910
Fast detection method for IC card data integrity protection mechanism
Published 2025-05-01“…An improved power-off-testing theory is proposed aiming at the limitations and shortcomings of traditional single-command power-off detection methods, to detect and verify IC card transaction protection mechanism during data recovery process. …”
Get full text
Article -
1911
On detection of crack-like welding defects by existing quality control methods
Published 2021-04-01“…Welding defects were detected by standard quality control methods prescribed by the SPD and GOST standards.Results. …”
Get full text
Article -
1912
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01“…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
Get full text
Article -
1913
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01“…Aiming at the problem that in the process of network fault detection and diagnosis,how to train the precise fault diagnosis and detection model based on small data volume,a fault diagnosis and detection algorithm based on generative adversarial networks (GAN) for heterogeneous wireless networks was proposed.Firstly,the common network fault sources in heterogeneous wireless network environment was analyzed,and a large number of reliable data sets was obtained based on a small amount of network fault samples through GAN algorithm.Then,the extreme gradient boosting (XGBoost) algorithm was used to select the optimal feature combination of input parameters in the fault detection stage and completed fault diagnosis and detection based on these data.Simulation results show that the algorithm can achieve more accurate and efficient fault detection and diagnosis for heterogeneous wireless networks,with an accuracy of 98.18%.…”
Get full text
Article -
1914
Strategy optimization method based on UAVs-assisted detection of covert communication
Published 2025-08-01“…Specifically, the UAV actively transmitsnoise to Alice’s transmission channels to disrupt covert transmission whenWillie detects a covert communication transmission. Furthermore, we ana-lyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditionsfor the existence of a Nash equilibrium, and formulate optimal strategiesfor both sides.…”
Get full text
Article -
1915
Multiresolution Rotational Symmetry Detection via Radius-Based Frieze-Expansion
Published 2016-01-01“…Multiresolution pyramid is used to accelerate this detection process. We also discuss a solution to deal with rotational symmetry detection under slight affine transformation. …”
Get full text
Article -
1916
-
1917
A comprehensive literature review on ransomware detection using deep learning
Published 2025-12-01“…The paper delves into providing the literature review on ransomware detection using deep learning techniques.…”
Get full text
Article -
1918
OFDM-NOMA Error Rate Reduction Using Direct Data Detection
Published 2025-01-01“…Therefore, this article proposes an integrated <inline-formula> <tex-math notation="LaTeX">$D^{3}$ </tex-math></inline-formula>-NOMA where the channel state information estimation (CSIE), equalization, and detection are consolidated into one unified process. …”
Get full text
Article -
1919
Energy Efficient Signal Detection Using SPRT and Ordered Transmissions in Wireless Sensor Networks
Published 2024-01-01Get full text
Article -
1920
Adaptive Anomaly Detection in Network Flows With Low-Rank Tensor Decompositions and Deep Unrolling
Published 2025-01-01Get full text
Article