To see the other types of publications on this topic, follow the link: Detection and response.

Journal articles on the topic 'Detection and response'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Detection and response.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Soma, Venkata. "Threat Detection and Incident Response in the Cloud." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1578–81. http://dx.doi.org/10.21275/sr24822145029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dobie, Robert A. "Objective Response Detection." Ear and Hearing 14, no. 1 (1993): 31–35. http://dx.doi.org/10.1097/00003446-199302000-00005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Courage, Ojo, Ayodeji Osoko Emmanuel, Nnenna Okolo Joy, and Jaji Mamudat. "Incident response: A structured model from detection to containment and recovery." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 1401–7. https://doi.org/10.5281/zenodo.15032006.

Full text
Abstract:
As cyber-attacks evolve in sophistication; organizations are under constant threat. This necessitates a cohesive approach to prioritize incident response (IR) capabilities and mitigate potential damages. This research paper explores integrating Information Security Management (ISM) and Incident Response (IR) functions; underlining the need for a unified strategy that leverages organizational learning theory. The study comprehensively analyzes the Incident Response Lifecycle; outlining the critical phases of preparation; detection and analysis; containment; eradication; recovery; and post-incid
APA, Harvard, Vancouver, ISO, and other styles
4

May, Susanne, and Carol Bigelow. "Modeling Nonlinear Dose-Response Relationships in Epidemiologic Studies: Statistical Approaches and Practical Challenges." Dose-Response 3, no. 4 (2005): dose—response.0. http://dx.doi.org/10.2203/dose-response.003.04.004.

Full text
Abstract:
Non-linear dose response relationships pose statistical challenges for their discovery. Even when an initial linear approximation is followed by other approaches, the results may be misleading and, possibly, preclude altogether the discovery of the nonlinear relationship under investigation. We review a variety of straightforward statistical approaches for detecting nonlinear relationships and discuss several factors that hinder their detection. Our specific context is that of epidemiologic studies of exposure-outcome associations and we focus on threshold and J-effect dose response relationsh
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Rui, Yong Zheng Wen, Wei Ma, Jian Cheng Yang, and Xiao Mei Yu. "Specific Detection of Staphylococcus Enterotoxin B in Milk Using Piezoresistive Cantilever Aptasensor." Key Engineering Materials 645-646 (May 2015): 1298–302. http://dx.doi.org/10.4028/www.scientific.net/kem.645-646.1298.

Full text
Abstract:
In this paper, an aptasensor with high sensitivity and rapid response was developed for the detection of staphylococcus enterotoxin B (SEB) by using thiol-modified piezoresistive cantilever. Thiol-modified aptamers, acting as the functionalized sensing elements, were immobilized on the nanogold-coated surface of the sensing cantilever as agents for detecting SEB. By using the functionalized aptasensors, different concentrations of SEB were detected with a wide detection range of 6-100 ng/mL and a quick response in milk. The experimental results indicated that the cantilever-based aptasensors h
APA, Harvard, Vancouver, ISO, and other styles
6

Tatineni, Sumanth. "AI-Infused Threat Detection and Incident Response in Cloud Security." International Journal of Science and Research (IJSR) 12, no. 11 (2023): 998–1004. http://dx.doi.org/10.21275/sr231113063646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taniguchi, Kosuke, Kana Kuraguchi, and Yukuo Konishi. "Task Difficulty Makes ‘No’ Response Different From ‘Yes’ Response in Detection of Fragmented Object Contours." Perception 47, no. 9 (2018): 943–65. http://dx.doi.org/10.1177/0301006618787395.

Full text
Abstract:
Two-alternative forced choice tasks are often used in object detection, which regards detecting an object as a ‘yes’ response and detecting no object as a ‘no’ response. Previous studies have suggested that the processing of yes/no responses arises from identical or similar processing. In this study, we investigated the difference of processing between detecting an object (‘yes’ response) and not detecting any object (‘no’ response) by controlling the task difficulty in terms of fragment length and stimulus duration. The results indicated that a ‘yes’ response depends on accurate and stable de
APA, Harvard, Vancouver, ISO, and other styles
8

Cohen, Fred. "Intrusion detection and response." Computers & Security 16, no. 6 (1997): 516. http://dx.doi.org/10.1016/s0167-4048(97)84669-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Keller, Jörg, Wojciech Mazurczyk, Bela Genge, Lothar Fritsch, and Simon Vrhovec. "Cyberattack Detection and Response." JUCS - Journal of Universal Computer Science 25, no. (11) (2019): 1394–95. https://doi.org/10.3217/jucs-025-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abuabid, Ali, and Abdulrahman Aldeij. "Cyber Security Incident Response." Journal of Information Security and Cybercrimes Research 7, no. 1 (2024): 29–50. http://dx.doi.org/10.26735/pnob5534.

Full text
Abstract:
In response to the growing cyber-attack threat, incident response teams have become a critical component of an organization's cybersecurity strategy. These teams are responsible for detecting, analyzing, and responding to security incidents promptly and effectively. However, detecting code injection attacks can be particularly challenging, as they can be difficult to detect and often go unnoticed until it is too late. Cybersecurity professionals use detection tools to detect and respond to DLL injection attacks that monitor system activity and detect unusual behavior. A large portion of the re
APA, Harvard, Vancouver, ISO, and other styles
11

Morales, Glenda C. "Fi-Ro: Fire Detection and Quick Response Robot using FT143 Detector, Network Mapping, and Notification System through the GSM Module and ATMEGA 2560." GUILD OF EDUCATORS IN TESOL INTERNATIONAL RESEARCH JOURNAL 2, no. 3 (2024): 20–53. https://doi.org/10.5281/zenodo.13764185.

Full text
Abstract:
The implementation of autonomous robots for fire detection and suppression has become increasingly vital, particularly in critical infrastructures such as hospitals, where the need for efficient firefighting solutions is critical. However, many hospitals in the Philippines face challenges due to limited resources and outdated technologies. To address these issues, this study proposes an innovative solution: the Fire Detection, Alerting, and Quick Response robot system. By incorporating advanced technology such as the FT143 detector, network mapping, and GSM module with ATMEGA 2560, this system
APA, Harvard, Vancouver, ISO, and other styles
12

Kumar Kande, Santosh, and Alex Harris. "Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)." International Journal of Science and Research (IJSR) 11, no. 12 (2022): 1404–5. http://dx.doi.org/10.21275/sr221205090117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Smith, Douglas C. "Error Detection: a Gestalt Response." Bulletin of the Association for Business Communication 52, no. 4 (1989): 29–36. http://dx.doi.org/10.1177/108056998905200411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sophia, Hassiotis, and Grigoriadis Karolos. "Damage detection using impulse response." Nonlinear Analysis: Theory, Methods & Applications 30, no. 8 (1997): 4757–64. http://dx.doi.org/10.1016/s0362-546x(97)00376-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Bo, Xiangzhan Yu, Binxing Fang, and Xiaochun Yun. "Worm attack detection and response." Frontiers of Electrical and Electronic Engineering in China 2, no. 4 (2007): 464–72. http://dx.doi.org/10.1007/s11460-007-0087-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nishiya, T., and H. Yamakawa. "PERD: partial error response detection." IEEE Transactions on Magnetics 31, no. 6 (1995): 3042–44. http://dx.doi.org/10.1109/20.490263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

BALLY, J. "Response: Detection of Molecule Spectra." Science 238, no. 4824 (1987): 143–44. http://dx.doi.org/10.1126/science.238.4824.143-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

N. Sravani, Varala Vikas, Kathi Kalyan, Banothu Nagaraju, and Rangisetti Adithya. "INTELLIGENT ACCIDENT ALERT SYSTEM USING AI FOR TRAFFIC SURVEILLANCE VIDEOS." International Journal of Engineering Research and Science & Technology 20, no. 2 (2024): 1306–14. https://doi.org/10.62643/ijerst.2024.v20.i2.pp1306-1314.

Full text
Abstract:
Accident detection from CCTV footage is a vital advancement in computer vision, contributing significantly to public safety. Road and public area accidents can have serious consequences, making timely detection crucial for rapid emergency response and potential life-saving interventions. Traditional detection systems primarily relied on motion detection algorithms and predefined rules to identify incidents. These systems triggered alarms when unusual activity was detected, but they were often prone to false positives and lacked the ability to differentiate between different types of incidents
APA, Harvard, Vancouver, ISO, and other styles
19

A.Shaji, George, S.Sagayarajan, T.Baskar, and George A.S.Hovan. "Extending Detection and Response: How MXDR Evolves Cybersecurity." Partners Universal International Innovation Journal (PUIIJ) 01, no. 04 (2023): 268–85. https://doi.org/10.5281/zenodo.8284342.

Full text
Abstract:
As cyber threats grow more advanced, organizations need security solutions that can provide extensive visibility, rapid detection, and coordinated response across their entire IT environment. Managed Extended Detection and Response (MXDR) represents the next evolution in security, building on previous platforms like MDR and XDR to offer a more holistic detection and response approach. This white paper examines how MXDR enhances cybersecurity through continuous monitoring, advanced analytics, threat hunting, and other capabilities. It outlines the components of MXDR, including 24/7 monitoring,
APA, Harvard, Vancouver, ISO, and other styles
20

Lin, H., J. Zhao, Q. Chen, J. Cai, and P. Zhou. "Eggshell crack detection based on acoustic impulse response and supervised pattern recognition." Czech Journal of Food Sciences 27, No. 6 (2009): 393–402. http://dx.doi.org/10.17221/82/2009-cjfs.

Full text
Abstract:
A system based on acoustic resonance was developed for eggshell crack detection. It was achieved by the analysis of the measured frequency response of eggshell excited with a light mechanism. The response signal was processed by recursive least squares adaptive filter, which resulted in the signal-to-noise ratio of the acoustic impulse response reing remarkably enhanced. Five features variables were exacted from the response frequency signals. To develop a robust discrimination model, three pattern recognition algorithms (i.e. K-nearest neighbours, artificial neural network, and support vector
APA, Harvard, Vancouver, ISO, and other styles
21

A, Arul Kumaran, Dhanulesh S, Narenthirakumar G, Suriya V, Nageswari S, and Gomathi V. "Smart Traffic Accident Detection And Automated Emergency Response System Using Yolo Algorithm." International Journal of Research Publication and Reviews 6, no. 4 (2025): 4066–70. https://doi.org/10.55248/gengpi.6.0425.1461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Carter, Lyndal, Maryanne Golding, Harvey Dillon, and John Seymour. "The Detection of Infant Cortical Auditory Evoked Potentials (CAEPs) Using Statistical and Visual Detection Techniques." Journal of the American Academy of Audiology 21, no. 05 (2010): 347–56. http://dx.doi.org/10.3766/jaaa.21.5.6.

Full text
Abstract:
Background: With the advent of newborn hearing screening programs, the need to verify the fit of hearing aids in young infants has increased. The recording of cortical auditory evoked potentials (CAEPs) for this purpose is quite feasible, but rapid developmental changes that affect response morphology and the presence of electrophysiological noise can make subjective response detection challenging. Purpose: The purpose of this study was to investigate the effectiveness of an automated statistic versus experienced examiners in detecting the presence of infant CAEPs when stimuli were present and
APA, Harvard, Vancouver, ISO, and other styles
23

Andrii, Kushnir, Kopchak Bohdan, and Gavryliuk Andrii. "Operational algorithm for a heat detector used in motor vehicles." Eastern-European Journal of Enterprise Technologies 3, no. 10 (111) (2021): 6–18. https://doi.org/10.15587/1729-4061.2021.231894.

Full text
Abstract:
In most cases, fixed temperature heat detectors are used to detect fire in vehicles. The response parameter of such detectors is constant. The time of fire detection by a fire detector, as well as the probability of its false operation, are affected by heat flux from an internal combustion engine. This paper reports the development and investigation of an operational algorithm of the fixed-dynamic heat detectors with variable response parameters. Depending on the temperature influence exerted by engine operation modes, a given algorithm automatically changes a value of the minimal static respo
APA, Harvard, Vancouver, ISO, and other styles
24

Sachin, T. Khurade, Gowali Satya, M. C. Chiranjeevi, and S. Shivaprakasha K. "Stress Detection Indicators: A Review." Journal of Electronics and Communication Systems 4, no. 1 (2019): 12–17. https://doi.org/10.5281/zenodo.2548197.

Full text
Abstract:
<em>Stress is the way of body&#39;s response to any kind of demand in the normal life. The body reacts to these changes in terms of physical, mental and emotional responses. There are sample number of works being carried out to measure stress using physiological parameters such as Galvanic Skin Response (GSR), Blood Pressure (BP), Heart Rate (HR), Breathing Pattern, Speech Signal, ECG (Electro cardiograph) and EEG (Electroencephalography). This paper presents a qualitative analysis of different physiological parameters used to determine the stress level. </em>
APA, Harvard, Vancouver, ISO, and other styles
25

Gao, Weitao, Tiehua Ma, Changxin Chen, Chenbin Wang, and Na Feng. "Detection of Flying Metal Bodies Based on Photoelectric Composite Sensing." Sensors 23, no. 6 (2023): 2926. http://dx.doi.org/10.3390/s23062926.

Full text
Abstract:
In order to reduce the impact of the environment on the accuracy and sensitivity of detection, and to meet the requirements of concealment from detection and being lightweight, a technology for detecting flying metal objects based on photoelectric composite sensors is proposed. The method first analyzes the target’s characteristics and detection environment, and then compares and analyzes the methods for detecting typical flying metal objects. On the basis of the traditional eddy current model, the photoelectric composite detection model that meets the requirements of detecting flying metal ob
APA, Harvard, Vancouver, ISO, and other styles
26

Shtonda, Roman, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii, and Pavlo Kutsaiev. "METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 380–89. https://doi.org/10.28925/2663-4023.2025.27.737.

Full text
Abstract:
In the conditions of modern cyberspace, Endpoint Detection and Response (Extended Detection and Response) software solutions are the key to cyber protection. These solutions play a key role in the cyber protection of end devices operating in information and communication systems and electronic communication networks. However, the effectiveness of these solutions can vary significantly. That is why a comprehensive approach to testing their capabilities is necessary, which will allow them to be effectively evaluated. This article discusses the methodology for testing the capabilities of Endpoint
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Jun, Siu Seong Law, and Yong Ding. "Damage Detection of a Substructure Based on Response Reconstruction in Frequency Domain." Key Engineering Materials 569-570 (July 2013): 823–30. http://dx.doi.org/10.4028/www.scientific.net/kem.569-570.823.

Full text
Abstract:
A substructural damage identification approach based on structural response reconstruction in frequency domain is presented. The response reconstruction is based on transforming the measured responses into responses at other locations with the transmissibility matrix and then the relationship between two sets of response vectors is formulated. The damage identification is conducted by minimizing the difference between a measured response vector and the reconstructed response vector. Measured acceleration responses from the damaged substructure and the finite element model of the intact substru
APA, Harvard, Vancouver, ISO, and other styles
28

Sunnat, Rizaev, and Kholmuradov Sardorbek. "The Rise of AI in Cybersecurity: Transforming Threat Detection and Response." Multidisciplinary Journal of Science and Technology 5, no. 5 (2025): 144–48. https://doi.org/10.5281/zenodo.15351063.

Full text
Abstract:
This article explores the transformative impact of artificial intelligence (AI) on cybersecurity, focusing on its role in enhancing threat detection and response mechanisms. As cyber threats become increasingly sophisticated, traditional methods are proving inadequate. The study examines key applications of AI, including anomaly detection, automated incident response, and user behavior analytics. Findings highlight significant improvements in detection accuracy and response times, alongside challenges such as data quality and workforce skills gaps. Ethical considerations regarding privacy and
APA, Harvard, Vancouver, ISO, and other styles
29

Bai, Guoyun, Xindong Hu, Xudong Liao, et al. "Optimization and testing of a Mass Spectrometer Leak Detection (MSLD) system." Materials Evaluation 81, no. 12 (2023): 41–50. http://dx.doi.org/10.32548/10.32548/2023.me-04345.

Full text
Abstract:
A rapid helium mass spectrometry leak detection method is established to respond to problems of low sensitivity and efficiency in detecting leaks in large vessels. The optimized multistage tandem leak detection system improves leak detection sensitivity by increasing the amount of gas entering the analysis chamber. By involving the main pumping system in the detection process, the effective pumping speed is increased, resulting in a significant reduction in system response time. Additionally, the optimal leak detection vacuum required for maximizing the leak velocity indicating gas movement is
APA, Harvard, Vancouver, ISO, and other styles
30

Wong, Ling Shing, and Chieh Wean Choong. "Rapid Detection of Heavy Metals with the Response of Carotenoids in Daucus Carota." International Journal of Environmental Science and Development 5, no. 3 (2014): 270–73. http://dx.doi.org/10.7763/ijesd.2014.v5.490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

S, Badri. "Autonomous Cyber Systems Using AI - Approach on How to Improve Detection and Response." International Journal of Science and Research (IJSR) 12, no. 8 (2023): 426–33. http://dx.doi.org/10.21275/sr23802115802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Stojmenova, Kristina, and Jaka Sodnik. "Detection-Response Task—Uses and Limitations." Sensors 18, no. 2 (2018): 594. http://dx.doi.org/10.3390/s18020594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Heck, Patrice L. "Failure detection in auditory response stimulators." Journal of the Acoustical Society of America 102, no. 1 (1997): 22. http://dx.doi.org/10.1121/1.419840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mehrotra, Ravi. "MORE ABOUT CANCER DETECTION: Author's response." Journal of the American Dental Association 141, no. 6 (2010): 628–30. http://dx.doi.org/10.14219/jada.archive.2010.0243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bardy, Fabrice, Bram Van Dun, Mark Seeto, and Harvey Dillon. "Automated cortical auditory response detection strategy." International Journal of Audiology 59, no. 11 (2020): 835–42. http://dx.doi.org/10.1080/14992027.2020.1767808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bejtlich, Richard, John Steven, and Gunnar Peterson. "Directions in Incident Detection and Response." IEEE Security & Privacy Magazine 9, no. 1 (2011): 91–92. http://dx.doi.org/10.1109/msp.2011.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Joseph, A. W., and R. L. Hyson. "Coincidence detection by binaural neurons in the chick brain stem." Journal of Neurophysiology 69, no. 4 (1993): 1197–211. http://dx.doi.org/10.1152/jn.1993.69.4.1197.

Full text
Abstract:
1. Neurons in nucleus laminaris (NL) of birds are the first to receive binaural information and are presumed to play a role in encoding interaural time differences (ITDs). We studied extracellular single-unit responses of NL neurons in slices of the auditory brain stem of the chick. The afferents to NL were activated by electrical stimulation of nucleus magnocellularis (NM) or the auditory nerve. Changes in responses were measured as the delay between trains of bilateral stimuli (the simulated interaural time difference or S-ITD, n = 26) was varied and as the interstimulus interval and stimulu
APA, Harvard, Vancouver, ISO, and other styles
38

Zhou, Rong, Yong Fan, Emma E. Furth, Ernesto A. B. F. Lima, and Thomas E. Yankeelov. "MRI Detection of PDAC Response to KRAS Inhibitor Therapy—Response." Clinical Cancer Research 31, no. 15 (2025): 3345. https://doi.org/10.1158/1078-0432.ccr-25-1932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Phuvanatai, Pavaris, and Toempong Phetchakul. "Quartz Crystal Microbalance Coated with 18-Crown-6 Ether Film for 2,4,6-Trinitrotolurene (TNT) Vapor Detection." Key Engineering Materials 748 (August 2017): 358–62. http://dx.doi.org/10.4028/www.scientific.net/kem.748.358.

Full text
Abstract:
The 2, 4, 6-trinitrotoluene (TNT) vapor detection by quartz crystal microbalance (QCM) coated with 18-crown-6 ether film is introduced. The film acts as selective or sensitive layer for detecting TNT molecule. The frequency shift response is depend on the amount of mass of molecule adhere on the coated film surface. In this study, the concentrations of TNT vapor which is related to responses are studied. It shows that the TNT vapor concentration is related to the time for steady state condition and the frequency shift response. The high concentration vapor will increase the frequency shift res
APA, Harvard, Vancouver, ISO, and other styles
40

Cheng, Fan-Yin, and Spencer Smith. "Objective Detection of the Speech Frequency Following Response (sFFR): A Comparison of Two Methods." Audiology Research 12, no. 1 (2022): 89–94. http://dx.doi.org/10.3390/audiolres12010010.

Full text
Abstract:
Speech frequency following responses (sFFRs) are increasingly used in translational auditory research. Statistically-based automated sFFR detection could aid response identification and provide a basis for stopping rules when recording responses in clinical and/or research applications. In this brief report, sFFRs were measured from 18 normal hearing adult listeners in quiet and speech-shaped noise. Two statistically-based automated response detection methods, the F-test and Hotelling’s T2 (HT2) test, were compared based on detection accuracy and test time. Similar detection accuracy across st
APA, Harvard, Vancouver, ISO, and other styles
41

Xi, Xiaoli, Jinxin Wang, Fang Li, and Dongmei Li. "IRSDet: Infrared Small-Object Detection Network Based on Sparse-Skip Connection and Guide Maps." Electronics 11, no. 14 (2022): 2154. http://dx.doi.org/10.3390/electronics11142154.

Full text
Abstract:
Detecting small objects in infrared images remains a challenge because most of them lack shape and texture. In this study, we proposed an infrared small-object detection method to improve the capacity for detecting thermal objects in complex scenarios. First, a sparse-skip connection block is proposed to enhance the response of small infrared objects and suppress the background response. This block is used to construct the detection model backbone. Second, a region attention module is designed to emphasize the features of infrared small objects and suppress background regions. Finally, a batch
APA, Harvard, Vancouver, ISO, and other styles
42

Ross, Bernhard. "A Novel Type of Auditory Responses: Temporal Dynamics of 40-Hz Steady-State Responses Induced by Changes in Sound Localization." Journal of Neurophysiology 100, no. 3 (2008): 1265–77. http://dx.doi.org/10.1152/jn.00048.2008.

Full text
Abstract:
Magnetoencephalographic responses to 40-Hz amplitude-modulated tones of 4-s duration were recorded in young, middle-aged, and older healthy participants. Interaural phase difference (IPD) in the sound carrier was changed during stimulus presentation from 0 to 180°, resulting in perceptual change from focal to spacious sound. The stimulus modulation elicited synchronized gamma-band oscillations, the 40-Hz auditory steady-state response (ASSR). Equivalent current dipoles were localized in primary auditory cortices. Waveforms of cortical activity showed a decrement in ASSR amplitude 100 ms after
APA, Harvard, Vancouver, ISO, and other styles
43

Cone-Wesson, Barbara, Richard C. Dowell, Dani Tomlin, Gary Rance, and Wu Jia Ming. "The Auditory Steady-State Response: Comparisons with the Auditory Brainstem Response." Journal of the American Academy of Audiology 13, no. 04 (2002): 173–87. http://dx.doi.org/10.1055/s-0040-1715962.

Full text
Abstract:
Two studies are reported in which the threshold estimates from auditory steady-state response (ASSR) tests are compared to those of click- or toneburst-evoked auditory brainstem responses (ABRs). The first, a retrospective review of 51 cases, demonstrated that both the click-evoked ABR and the ASSR threshold estimates in infants and children could be used to predict the pure-tone threshold. The second, a prospective study of normal-hearing adults, provided evidence that the toneburst-evoked ABR and the modulated tone–evoked ASSR thresholds were similar when both were detected with an automatic
APA, Harvard, Vancouver, ISO, and other styles
44

Wetekam, Johannes, Julio Hechavarría, Luciana López‐Jury, and Manfred Kössl. "Correlates of deviance detection in auditory brainstem responses of bats." European Journal of Neuroscience 55, no. 6 (2022): 1601–13. https://doi.org/10.5281/zenodo.13427623.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Identifying unexpected acoustic inputs, which allows to react appropriately to new situations, is of major importance for animals. Neural deviance detection describes a change of neural response strength to a stimulus solely caused by the stimulus' probability of occurrence. In the present study, we searched for correlates of deviance detection in auditory brainstem responses obtained in anaesthetised bats (Carollia perspicillata). In an oddball paradigm, we used two pure tone stimuli that represented the main frequencies used by the animal du
APA, Harvard, Vancouver, ISO, and other styles
45

Wetekam, Johannes, Julio Hechavarría, Luciana López‐Jury, and Manfred Kössl. "Correlates of deviance detection in auditory brainstem responses of bats." European Journal of Neuroscience 55, no. 6 (2022): 1601–13. https://doi.org/10.5281/zenodo.13427623.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Identifying unexpected acoustic inputs, which allows to react appropriately to new situations, is of major importance for animals. Neural deviance detection describes a change of neural response strength to a stimulus solely caused by the stimulus' probability of occurrence. In the present study, we searched for correlates of deviance detection in auditory brainstem responses obtained in anaesthetised bats (Carollia perspicillata). In an oddball paradigm, we used two pure tone stimuli that represented the main frequencies used by the animal du
APA, Harvard, Vancouver, ISO, and other styles
46

Wetekam, Johannes, Julio Hechavarría, Luciana López‐Jury, and Manfred Kössl. "Correlates of deviance detection in auditory brainstem responses of bats." European Journal of Neuroscience 55, no. 6 (2022): 1601–13. https://doi.org/10.5281/zenodo.13427623.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Identifying unexpected acoustic inputs, which allows to react appropriately to new situations, is of major importance for animals. Neural deviance detection describes a change of neural response strength to a stimulus solely caused by the stimulus' probability of occurrence. In the present study, we searched for correlates of deviance detection in auditory brainstem responses obtained in anaesthetised bats (Carollia perspicillata). In an oddball paradigm, we used two pure tone stimuli that represented the main frequencies used by the animal du
APA, Harvard, Vancouver, ISO, and other styles
47

Wetekam, Johannes, Julio Hechavarría, Luciana López‐Jury, and Manfred Kössl. "Correlates of deviance detection in auditory brainstem responses of bats." European Journal of Neuroscience 55, no. 6 (2022): 1601–13. https://doi.org/10.5281/zenodo.13427623.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Identifying unexpected acoustic inputs, which allows to react appropriately to new situations, is of major importance for animals. Neural deviance detection describes a change of neural response strength to a stimulus solely caused by the stimulus' probability of occurrence. In the present study, we searched for correlates of deviance detection in auditory brainstem responses obtained in anaesthetised bats (Carollia perspicillata). In an oddball paradigm, we used two pure tone stimuli that represented the main frequencies used by the animal du
APA, Harvard, Vancouver, ISO, and other styles
48

Wetekam, Johannes, Julio Hechavarría, Luciana López‐Jury, and Manfred Kössl. "Correlates of deviance detection in auditory brainstem responses of bats." European Journal of Neuroscience 55, no. 6 (2022): 1601–13. https://doi.org/10.5281/zenodo.13427623.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Identifying unexpected acoustic inputs, which allows to react appropriately to new situations, is of major importance for animals. Neural deviance detection describes a change of neural response strength to a stimulus solely caused by the stimulus' probability of occurrence. In the present study, we searched for correlates of deviance detection in auditory brainstem responses obtained in anaesthetised bats (Carollia perspicillata). In an oddball paradigm, we used two pure tone stimuli that represented the main frequencies used by the animal du
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Ching-Long, Wen Pei, Yu-Cheng Lin, Anders Granmo, and Kang-Hung Liu. "Emotion Detection Based on Pupil Variation." Healthcare 11, no. 3 (2023): 322. http://dx.doi.org/10.3390/healthcare11030322.

Full text
Abstract:
Emotion detection is a fundamental component in the field of Affective Computing. Proper recognition of emotions can be useful in improving the interaction between humans and machines, for instance, with regard to designing effective user interfaces. This study aims to understand the relationship between emotion and pupil dilation. The Tobii Pro X3-120 eye tracker was used to collect pupillary responses from 30 participants exposed to content designed to evoke specific emotions. Six different video scenarios were selected and presented to participants, whose pupillary responses were measured w
APA, Harvard, Vancouver, ISO, and other styles
50

Researcher. "SECURITY DETECTIONS AS CODE: MODERNIZING THREAT DETECTION THROUGH SOFTWARE ENGINEERING PRINCIPLES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 991–99. https://doi.org/10.5281/zenodo.14281933.

Full text
Abstract:
This article offers an in-depth examination of Security Detections as Code (SDaC), an innovative approach that integrates software engineering principles with security operations to transform threat detection and response. It explores how organizations can leverage code-based security detection rules to enhance detection accuracy, streamline operations, and reduce incident response times. Through a detailed analysis of implementation methodologies, technical frameworks, and organizational impacts, the article highlights the potential of treating security detections as versioned, testable code
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!