-
Why Does Language Matter to Philosophy?
Many people find themselves dissatisfied with recent linguistic philosophy, and yet know that langu
-
Intrusion Detection System for Wireless Sensor Networks
Ingram 出版Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development
-
Temporal Land Cover Change Detection
Ingram 出版The research contents were derived with the use of Fragmentation statistics, spatial analysis and r
-
Text Segmentation and Recognition for Enhanced Image Spam Detection
Springer 出版This book discusses email spam detection and its challenges such as text classification and categor
-
Traffic congestion detection and management using VANET and CR-VANET
The vehicular Ad-hoc network, or VANET, is for sharing of emergency and safety information among ve
-
Intrusion Detection using Feature Selection and Hybridized
Recently, it is adamant to maintain a secured and trusted information transformation between variou
-
Hybrid Depression Detection Framework Using BILSTM
Nowadays, due to mental stress, a significant section of society is affected by depression. There m
-
Lung Tumor Detection and Classification
Lung cancer is a leading reason of death worldwide it refers to the uncontrolled growth of abnormal
-
Remote Sensing for Target Object Detection and Identification
Mdpi AG 出版Target object detection and identification are among the primary uses for a remote sensing system.
-
Massive Mimo Detection Algorithm and VLSI Architecture
Springer 出版CHAPTER 1 INTRODUCTION ............................................................................
-
Early Detection and Early Intervention in Developmental Motor Disorders
The book aims to provide a comprehensive overview of assessments and interventions applied in young
-
Anomaly Detection System for Network Traffic using Data Mining
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly
-
Drowsiness Detection Using Image Processing
Grin Verlag 出版Bachelor Thesis from the year 2019 in the subject Engineering - Robotics, grade: 78, University of
-
Fault - Tolerant Anomaly Detection System
Intrusion detection is defined as a second-line security mechanism that can detect intrusions that
-
Techniques for Damage Detection, Location and Assessment in Pipelines
Ingram 出版Third party damage to petroleum pipelines can be catastrophic if undetected. This damage results in
-
Implementing Deep Learning Model for Object Detection
Giving the ability to a computer or robot to know a shape or pattern in an image is a very difficul
-
A study on network intrusion detection using classifiers
Grin Verlag 出版Research Paper (undergraduate) from the year 2019 in the subject Computer Science - Applied, VIT Un
-
Early Detection
Ingram 出版Somewhere between Atlanta and New York, the world changed, and so did Alex Southerland. Her career'
-
Intrusion Detection Mit Merkmalsauswahl Und Hybridisierter
Heutzutage ist es sehr wichtig, ein hohes Ma? an Sicherheit zu gew瓣hrleisten, um eine sichere und v
-
Is Hell for Real or Does Everyone Go to Heaven?
Zondervan 出版Both outside and inside of the church, many people today are increasingly uncomfortable with hell.
-
Methods Used in Prevention and Detection Against ARP Spoofing Attack
Address Resolution Protocol (ARP) spoofing attack is the most common type of local area network att
-
Some Methods for ECG Signal Analysis for Arrhythmia Detection
The ECG is an electrical manifestation of contractile activity of the heart. Artifacts like 50/60 H
-
Fatigue Crack Detection on Structural Steel Members by Using Ultrasound Excited Thermography = Erkennung Von Erm羹dungsrissen in Stahlbauteilen Durch Ultraschallangeregte Thermografie
Ultrasound excitation of structural steel members leads to localised energy dissipation at existent
-
Moving Object Detection and Segmentation for Remote Aerial Video Surveillance
Unmanned Aerial Vehicles (UAVs) equipped with video cameras are a flexible support to ensure civil
-
Towards Magnetic Resonance in Scanning Tunneling Microscopy Using Heterodyne Detection
The present work introduces a new concept for magnetic resonance measurements in the GHz regime ins
-
Packet Drop Attack Detection In Mobile Adhoc Networks using ANN
Ingram 出版Intrusion Detection Systems uses multiple methods to detect and prevent network attacks. A good IDS
-
GMM based Offline Handwritten Signature Forgery Detection Technique
Handwritten Signature is a behavioral biometric trait which is extensively used for personal author
-
Tamper Detection and Image Recovery Based on Watermarking Techniques
Watermarking protects the image from infringements without distortion it, since the embedded waterm
-
Emotions Detection in Music Lyrics
Search of music through emotions is one of the main criteria utilized by users on Internet. Real-wo
-
Advancing Gene Fusion Detection Towards Personalized Cancer Nanodiagnostics
Springer 出版This book presents a unique concept of merging nanotechnology and novel urinary biomarkers for accu
-
Scene Text Detection and Recognition
Images are captured by a variety of physical devices, including still and video cameras, scanners,
-
Automatic event detection in computational physiology signals
The dataset which we used in this thesis comes from an experiment where the Computational Physiolog
-
Computer Immune System for Intrusion and Virus Detection
Revision with unchanged content. Today's computer systems are running (mostly) one kind of operatin
-
Enhanced Intrusion Detection System for MANETs
The migration to the wireless network from the wired network has been a global trend in the past fe
-
Runtime Data Race Detection in Multi-Threaded Programs
Revision with unchanged content. Multi-threaded programs are becoming more common in order to explo
-
Software Architecture Discovery and Design Pattern Detection from Data
During the execution of software systems, tremendous amounts of data are recorded. These data can p
-
An Optimized Hardware System on Chip for Melanoma Detection
Melanoma is the deadliest form of skin cancer. Early detection of melanoma is vital, as it helps in
-
Phishing Website Detection Using Machine Learning Algorithms
Reducing the risk pose by phishers and other cyber criminals in the cyber space requires a robust a
-
Genetic Disorders in Iraqi population, Detection and causes
A genetic disorder is a genetic problem caused by one or more abnormalities formed in the genome. M
-
Factors Influencing Early Pulmonary Tuberculosis Case Detection
Pulmonary tuberculosis is a contagious disease which attacks mainly the respiratory system and any
-
Path Detection Protocol in Wireless AdHoc Networks
The Path Detection (PD) protocol used to select the shortest path and DNAP (Dynamic Non-linear auth
-
Real-Time Anomaly Detection Over Massive Data Streams
Real-time anomaly detection of massive data streams is one of the important research topics nowaday
-
Detecting Backdoor Using Stepping Stone Detection Approach
In this book, we consider the use of SSD concepts in the field of backdoor attack detection. The ap
-
Brain tumor detection using digital image processing
The book covers the digital image processing techniques used for brain tumor detection using MRI im
-
Segmentation and Classification Algorithms for Brain Tumor Detection
Ingram 出版Brain Tumor is a complex disease that occurs due to the abnormal growth of brain cells. For efficie
-
Web Phishing Detection
Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate
-
Non-Proliferative Diabetic Retinopathy Detection by Digital R-Images
Advance Digital Imaging and Computing Power have made it possible to use data provided from medical
-
Acoustic Wireless Sensor for Pest Detection in Cauliflower
Agriculture is a backbone of India. It is one of the major domains which decides the economy of the