To see the other types of publications on this topic, follow the link: Detection.

Dissertations / Theses on the topic 'Detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kapoor, Prince. "Shoulder Keypoint-Detection from Object Detection." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38015.

Full text
Abstract:
This thesis presents detailed observation of different Convolutional Neural Network (CNN) architecture which had assisted Computer Vision researchers to achieve state-of-the-art performance on classification, detection, segmentation and much more to name image analysis challenges. Due to the advent of deep learning, CNN had been used in almost all the computer vision applications and that is why there is utter need to understand the miniature details of these feature extractors and find out their pros and cons of each feature extractor meticulously. In order to perform our experimentatio
APA, Harvard, Vancouver, ISO, and other styles
2

Laxhammar, Rikard. "Conformal anomaly detection : Detecting abnormal trajectories in surveillance applications." Doctoral thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8762.

Full text
Abstract:
Human operators of modern surveillance systems are confronted with an increasing amount of trajectory data from moving objects, such as people, vehicles, vessels, and aircraft. A large majority of these trajectories reflect routine traffic and are uninteresting. Nevertheless, some objects are engaged in dangerous, illegal or otherwise interesting activities, which may manifest themselves as unusual and abnormal trajectories. These anomalous trajectories can be difficult to detect by human operators due to cognitive limitations. In this thesis, we study algorithms for the automated detection of
APA, Harvard, Vancouver, ISO, and other styles
3

Albrektsson, Fredrik. "Detecting Sockpuppets in Social Media with Plagiarism Detection Algorithms." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208553.

Full text
Abstract:
As new forms of propaganda and information control spread across the internet, the need for novel ways of identifying them increases as well. One increasingly popular method of spreading false messages on microblogs like Twitter is to disseminate them from seemingly ordinary, but centrally controlled and coordinated user accounts – sockpuppets. In this paper we examine a number of potential methods for identifying these by way of applying plagiarism detection algorithms for text, and evaluate their performance against this type of threat. We identify one type of algorithm in particular – that
APA, Harvard, Vancouver, ISO, and other styles
4

Le, Anhtuan. "Intrusion Detection System for detecting internal threats in 6LoWPAN." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/21958/.

Full text
Abstract:
6LoWPAN (IPv6 over Low-power Wireless Personal Area Network) is a standard developed by the Internet Engineering Task Force group to enable the Wireless Sensor Networks to connect to the IPv6 Internet. This standard is rapidly gaining popularity for its applicability, ranging extensively from health care to environmental monitoring. Security is one of the most crucial issues that need to be considered properly in 6LoWPAN. Common 6LoWPAN security threats can come from external or internal attackers. Cryptographic techniques are helpful in protecting the external attackers from illegally joining
APA, Harvard, Vancouver, ISO, and other styles
5

Olsson, Jonathan. "Detecting Faulty Piles of Wood using Anomaly Detection Techniques." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83061.

Full text
Abstract:
The forestry and the sawmill industry have a lot of incoming and outgoing piles of wood. It's important to maintain quality and efficiency. This motivates an examination of whether machine learning- or more specifically, anomaly detection techniques can be implemented and used to detect faulty shipments. This thesis presents and evaluates some computer vision techniques and some deep learning techniques. Deep learning can be divided into groups; supervised, semi-supervised and unsupervised. In this thesis, all three groups were examined and it covers supervised methods such as Convolutional Ne
APA, Harvard, Vancouver, ISO, and other styles
6

Prevot, Yohan. "Arterial perfusion detection method by synchronous detection." [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chau, Sam. "Investigation of silicon PIN-detector for laser pulse detection." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-325.

Full text
Abstract:
<p>This report has been written at SAAB Bofors Dynamics (SBD) AB in Gothenburg at the department of optronic systems.</p><p>In military observation operations, a target to hit is chosen by illumination of a laser designator. From the targetpoint laser radiation is reflected on a detector that helps identify the target. The detector is a semiconductor PIN-type that has been investigated in a laboratory environment together with a specially designed laser source. The detector is a photodiode and using purchased components, circuits for both the photodiode and the laserdiode has been designed and
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Pi-Jung. "Double Chooz neutrino detector: neutron detection systematic errors and detector seasonal stability." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16861.

Full text
Abstract:
Doctor of Philosophy<br>Department of Physics<br>Glenn Horton-Smith<br>In March 2012, the Double Chooz reactor neutrino experiment published its most precise result so far: sin[superscript]2 2theta13 = 0.109 +/- 0.030(stat.) +/- 0.025(syst.). The statistical significance is 99.8% away from the no-oscillation hypothesis. The systematic uncertainties from background and detection efficiency are smaller than the first publication of the Double Chooz experiment. The neutron detection efficiency, one of the biggest contributions in detection systematic uncertainties, is a primary topic of this diss
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Jinghui. "Evaluation of GaN as a Radiation Detection Material." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1343316898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frascarelli, Antonio Ezio. "Object Detection." Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28259.

Full text
Abstract:
During the last two decades the interest about computer vision raised steadily with multiple applications in fields like medical care, automotive, entertainment, retail, industrial, and security. Objectdetection is part of the recognition problem, which is the most important scope of the computervision environment.The target of this thesis work is to analyse and propose a solution for object detection in a real timedynamic environment. RoboCup@Home will be the benchmarking event for this system, which willbe equipped on a robot competing in the 2018 event. The system has to be robust and fast
APA, Harvard, Vancouver, ISO, and other styles
11

Macey, Paul Michael. "Apnoea detection." Thesis, University of Canterbury. Electrical and Electronic Engineering, 1998. http://hdl.handle.net/10092/6888.

Full text
Abstract:
This thesis is concerned with the detection of apnoeas in infants from an abdominal breathing signal, where an apnoea is a pause in breathing during sleep. Apnoea detection is performed by analysing breathing signals recorded during sleep studies. An abdominal breathing signal recorded by the BabyLog polysomnographic system is used for this research. A reference set of apnoeas is formed by three human experts identifying apnoeas five seconds and longer within ten overnight recordings of breathing. There was a 10% disagreement on the identification of events. Based on this reference set, the pe
APA, Harvard, Vancouver, ISO, and other styles
12

Vella, Mark Joseph. "Distress detection." Thesis, University of Strathclyde, 2012. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=27534.

Full text
Abstract:
Web attacks pose a prime concern for cybersecurity, and whilst attackers are leveraging modern technologies to launch unpredictable attacks with serious consequences, web attack detectors are still restricted to the classical misuse and anomaly detection methods. As a result, web attack detectors have limited resilience to novel attacks or produce impractical amounts of daily false alerts. Advances in intrusion detection techniques have so far only partly alleviated the problem as they are still tied to existing methods. This thesis proposes Distress Detection (DD), a detection method providin
APA, Harvard, Vancouver, ISO, and other styles
13

Mustamo, P. (Pirkko). "Object detection in sports:TensorFlow Object Detection API case study." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201802081173.

Full text
Abstract:
Object detection is widely used in the world of sports, its users including training staff, broadcasters and sports fans. Neural network based classifiers are used together with other object detection techniques. The aim of this study was to explore the modern open source based solutions for object detection in sports, in this case for detecting football players. TensorFlow Object Detection API, an open source framework for object detection related tasks, was used for training and testing an SSD (Single-Shot Multibox Detector) with Mobilenet- model. The model was tested as a) pre-trained and b
APA, Harvard, Vancouver, ISO, and other styles
14

Zilch, Lloyd W. "Image charge detection and image charge detection mass spectrometry." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344616.

Full text
Abstract:
Thesis (Ph. D.)--Indiana University, Dept. of Chemistry, 2008.<br>Title from home page (viewed Oct. 8, 2009). Source: Dissertation Abstracts International, Volume: 70-02, Section: B, page: 0994. Adviser: Martin F. Jarrold.
APA, Harvard, Vancouver, ISO, and other styles
15

Yerra, Rajiv. "Detecting Similar HTML Documents Using A Sentence-Based Copy Detection Approach." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd977.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jenner, Mareike. ""Follow the evidence"? : methods of detection in American TV detective drama." Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/973dbcaf-5796-42c5-a044-b51252c91b66.

Full text
Abstract:
This thesis deals with methods of detection i.e. the mode of investigation employed to catch a criminal in American detective dramas on television. It divides methods of detection into the categories of ‘rational-scientific’ and ‘irrational-subjective’. ‘Rational-scientific’ methods of detection are linked to the literary tradition of Golden Age fiction and suggest an analytical distance to the crime. ‘Irrational-subjective’ methods are linked to a hard-boiled tradition and suggest (often emotional) ‘closeness’ to the victim, suspects or witnesses. Drawing on the work of Michel Foucault, John
APA, Harvard, Vancouver, ISO, and other styles
17

Granath, Linus, and Andreas Strid. "Detecting the presence of people in a room using motion detection." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20099.

Full text
Abstract:
Companies face a problem where employees reserve rooms and do not show up, which leadsto money and resources loss for the companies. An application capable of detecting thepresence of people in a room could solve this problem.This thesis details the process of building an Android application capable of detectingthe presence of people in a static room using motion detection. The application wasdeveloped through a five-staged process and evaluated by performing experiments whichmeasured the accuracy of the application.The finished application is installed on a Sony Xperia M4 Aqua device which i
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, September, 2020<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 119-123).<br>Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection meth
APA, Harvard, Vancouver, ISO, and other styles
19

Pretz, John. "Detection of atmospheric muon neutrinos with the IceCube 9-String Detector." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/4163.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Physics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
20

Erickson, Anna S. "Remote detection of fissile material : Cherenkov counters for gamma detection." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/76496.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 161-167).<br>The need for large-size detectors for long-range active interrogation (Al) detection has generated interest in water-based detector technologies. AI is done using external radiation sources to induce fission and to detect, identify, and characterize special nuclear material (SNM) through the gamma rays and neutrons emitted. Long-range applications require detectors with a large solid angle and an
APA, Harvard, Vancouver, ISO, and other styles
21

Kaatz, Miriam. "Impedimetric DNA detection : towards improved detection schemes for sensor integration." Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/17890.

Full text
Abstract:
Detection of DNA by electrochemical impedance spectroscopy (EIS) has been reported by many authors and assays have been developed using lab setups. However, as for most detection assay methods there are issues to address to enable the development for the sensor market: Long time-to-result & high complexity for labelled assays and a lack of sensitivity and reproducibility for label-free assays. This work considers two different approaches to address the issues of time-to-result and assay complexity. The first part presents work on achieving rapid sequence-specific electrochemical detection of D
APA, Harvard, Vancouver, ISO, and other styles
22

Gonzalez-Garcia, Abel. "Image context for object detection, object context for part detection." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/28842.

Full text
Abstract:
Objects and parts are crucial elements for achieving automatic image understanding. The goal of the object detection task is to recognize and localize all the objects in an image. Similarly, semantic part detection attempts to recognize and localize the object parts. This thesis proposes four contributions. The first two make object detection more efficient by using active search strategies guided by image context. The last two involve parts. One of them explores the emergence of parts in neural networks trained for object detection, whereas the other improves on part detection by adding objec
APA, Harvard, Vancouver, ISO, and other styles
23

Jakobsson, Uno, and Martin Andréasson. "Wildlife Detection Network." Thesis, Högskolan i Halmstad, Sektionen för ekonomi och teknik (SET), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17765.

Full text
Abstract:
Traffic accidents where wild animals are involved represents between 60 and 80 percent of all reported accidents, depending on location in Sweden. In a country like Sweden, with a lot of forest, there is always risk of a collision with a wild animal. Imagine if you, as a road user, had the possibility to receive warnings when the risk of an accident according to statistics is extra high. Wildlife Detection Network is a wildlife warning system with an information service, which makes the whole concept unique. When an animal is approaching the road, it is registered by sensors, and warning light
APA, Harvard, Vancouver, ISO, and other styles
24

Ståhl, Björn. "Online Anomaly Detection." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2825.

Full text
Abstract:
Where the role of software-intensive systems has shifted from the traditional one of fulfilling isolated computational tasks, larger collaborative societies with interaction as primary resource, is gradually taking its place. This can be observed in anything from logistics to rescue operations and resource management, numerous services with key-roles in the modern infrastructure. In the light of this new collaborative order, it is imperative that the tools (compilers, debuggers, profilers) and methods (requirements, design, implementation, testing) that supported traditional software engineeri
APA, Harvard, Vancouver, ISO, and other styles
25

Wen, Shihua. "Semiparametric cluster detection." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7204.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.<br>Thesis research directed by: Mathematical Statistics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
26

Malek, Esmaeili Mani. "Multimedia copy detection." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44581.

Full text
Abstract:
Asmultimedia-sharing websites are becoming increasingly popular, content providers get more concerned about the illegal distribution of their copyrighted contents. The recent content-based multimedia fingerprinting technology has evolved as an important tool for automatically detecting illegal copies of audio, image, and video signals. Multimedia fingerprints are signatures that are extracted from an audio, image, or video signal as a compact identifier of the signal. Therefore fingerprints should have enough discriminating ability to identify a multimedia object among others. At the same time
APA, Harvard, Vancouver, ISO, and other styles
27

Foisy, André. "Robust collision detection." Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28746.

Full text
Abstract:
The problem of locating collisions between computer modeled moving rigid bodies is considered. Each rigid body is modeled by the union of polytopes. Safe and reliable collision detection algorithms are constructed.<br>Since the computer representation of real numbers is finite, an interval projective point is used to encompass all localization errors of a modeled point. An interval point is the elementary geometrical form from which all others are constructed. The Euclidean convex set spanned by an interval point is also a polytope.<br>The construction of a polytope relies on a robust convex h
APA, Harvard, Vancouver, ISO, and other styles
28

Espinosa-Romero, Arturo. "Situated face detection." Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/6667.

Full text
Abstract:
In the last twenty years, important advances have been made in the field of automatic face processing, given the importance of human faces for personal identification, emotional expression and verbal and non verbal communication. The very first step in a face processing algorithm is the detection of faces; while this is a trivial problem in controlled environments, the detection of faces in real environments is still a challenging task. Until now, the most successful approaches for face detection represent the face as a grey-level pattern, and the problem itself is considered as the classifica
APA, Harvard, Vancouver, ISO, and other styles
29

Kalal, Zdenek. "Tracking learning detection." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.540948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ohlson, Frida, and Nadim Al-Mosawi. "Occupant Detection System." Thesis, Högskolan i Halmstad, Bio- och miljösystemforskning (BLESS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28617.

Full text
Abstract:
The purpose of the ODS (Occupant Detection System) project is to develop a car safety camera system that is able to discriminate human occupants in order to activate safety features depending on the human size. In order to discriminate the size of an occupant anthropometric measurements need to be performed. The aim of this study was to investigate the possibility of anthropometric measurements of human height and weight with a Kinect for Windows v2 sensor for discrimination of different occupants inside a vehicle. The goal was to find valid anthropometric methods for determination of human he
APA, Harvard, Vancouver, ISO, and other styles
31

Elsenbroich, Corinna Julia. "Instinct for detection." Thesis, King's College London (University of London), 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.430430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lafis, S. "Rapid microbial detection." Thesis, Cranfield University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Doney, George Daniel. "Acoustic boiling detection." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/28110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Alzarooni, K. M. A. "Malware variant detection." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1347243/.

Full text
Abstract:
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware writers use semantic-preserving code transformation (obfuscation) techniques to produce new stealth variants of their malware programs. Malware variants are hard to detect with today's detection technolog
APA, Harvard, Vancouver, ISO, and other styles
35

Kemp, E., M. Floyd, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Floyd, M., E. Kemp, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ent, Petr. "Voice Activity Detection." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235483.

Full text
Abstract:
Práce pojednává o využití support vector machines v detekci řečové aktivity. V první části jsou zkoumány různé druhy příznaků, jejich extrakce a zpracování a je nalezena jejich optimální kombinace, která podává nejlepší výsledky. Druhá část představuje samotný systém pro detekci řečové aktivity a ladění jeho parametrů. Nakonec jsou výsledky porovnány s dvěma dalšími systémy, založenými na odlišných principech. Pro testování a ladění byla použita ERT broadcast news databáze. Porovnání mezi systémy bylo pak provedeno na databázi z NIST06 Rich Test Evaluations.
APA, Harvard, Vancouver, ISO, and other styles
38

Matos, Diogo Silva. "Person detection system." Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23853.

Full text
Abstract:
mestrado em Engenharia Eletrónica e Telecomunicações<br>O RADAR é para fins militares já relativamente antigo que sofreu um grande impulso durante a Segunda Guerra Mundial. Hoje em dia existe um forte desenvolvimento no RADAR em aplicações de navegação ou vigilância/segurança. Esta dissertação surge no seguimento destas novas aplicações, em que se pretende o desenvolvimento de um RADAR de baixo custo que permita ao utilizador detetar pessoas, bem como, os seus movimentos através de paredes ou objetos opacos. O desenvolvimento deste RADAR recaiu em tecnologias emergentes como antenas a
APA, Harvard, Vancouver, ISO, and other styles
39

O'Keefe, Eion Seiorse. "Polymer chemiluminescence detection." Thesis, University of Sussex, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.238667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Park, Sean. "Neural malware detection." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/173759.

Full text
Abstract:
At the heart of today’s malware problem lies theoretically infinite diversity created by metamorphism. The majority of conventional machine learning techniques tackle the problem with the assumptions that a sufficiently large number of training samples exist and that the training set is independent and identically distributed. However, the lack of semantic features combined with the models under these wrong assumptions result largely in overfitting with many false positives against real world samples, resulting in systems being left vulnerable to various adversarial attacks. A key observation
APA, Harvard, Vancouver, ISO, and other styles
41

Barascud, Nicolas. "Auditory pattern detection." Thesis, University College London (University of London), 2014. http://discovery.ucl.ac.uk/1458387/.

Full text
Abstract:
The work presented in this doctoral thesis uses behavioural methods and neuroimaging to investigate how human listeners detect patterns and statistical regularities in complex sound sequences. Temporal pattern analysis is essential to sensory processing, especially listening, since most auditory signals only have meaning as sequences over time. Previous evidence suggests that the brain is sensitive to the statistics of sensory stimulation. However, the process through which this sensitivity arises is largely unknown. This dissertation is organised as follows: Chapter 1 reviews fundamental prin
APA, Harvard, Vancouver, ISO, and other styles
42

Rogers, Stuart Craig. "Defect Detection Microscopy." BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2256.

Full text
Abstract:
The automotive industry's search for stronger lighter materials has been hampered in its desire to make greater use of Magnesium alloys by their poor formability below 150°C. One current challenge is to identify the complex structure and deformation mechanisms at work and determine which of these are primary contributors to the nucleation of defects. Orientation Imaging Microscopy has been the most accessible tool for microstructural analysis over the past 15 years. However, using OIM to analyze defect nucleation sites requires prior knowledge of where the defects will occur because once the d
APA, Harvard, Vancouver, ISO, and other styles
43

Butler, Joseph G. "Automated Fingertip Detection." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3164.

Full text
Abstract:
One of the oldest biometrics that has been used to uniquely identify a person is their fingerprint. Recent developments in research on fingerprint collection have made it possible to collect fingerprint data from a stand-off digital image. Each of the techniques developed so far have relied on either a very controlled capture environment to ensure only a single fingertip is collected or manual cropping of the image down to the fingertip. The main body of the research focuses on extracting the fingerprint itself. If fingerprint collection via digital image is ever to be fielded in the real worl
APA, Harvard, Vancouver, ISO, and other styles
44

Park, Jea Woo. "Lithography Hotspot Detection." PDXScholar, 2017. https://pdxscholar.library.pdx.edu/open_access_etds/3781.

Full text
Abstract:
The lithography process for chip manufacturing has been playing a critical role in keeping Moor's law alive. Even though the wavelength used for the process is bigger than actual device feature size, which makes it difficult to transfer layout patterns from the mask to wafer, lithographers have developed a various technique such as Resolution Enhancement Techniques (RETs), Multi-patterning, and Optical Proximity Correction (OPC) to overcome the sub-wavelength lithography gap. However, as feature size in chip design scales down further to a point where manufacturing constraints must be applied
APA, Harvard, Vancouver, ISO, and other styles
45

Garcia, Hurtado J. (Juan). "Indoor outdoor detection." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906062479.

Full text
Abstract:
Abstract. This thesis shows a viable machine learning model that detects Indoor or Outdoor on smartphones. The model was designed as a classification problem and it was trained with data collected from several smartphone sensors by participants of a field trial conducted. The data collected was labeled manually either indoor or outdoor by the participants themselves. The model was then iterated over to lower the energy consumption by utilizing feature selection techniques and subsampling techniques. The model which uses all of the data achieved a 99 % prediction accuracy, while the energy effi
APA, Harvard, Vancouver, ISO, and other styles
46

姚志霖. "Vehicle detection using endpoint detection method for FMCW radar detector." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/77448172476508925617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Karademir, SARUHAN. "DETECTING PDF JAVASCRIPT MALWARE USING CLONE DETECTION." Thesis, 2013. http://hdl.handle.net/1974/8387.

Full text
Abstract:
One common vector of malware is JavaScript in Adobe Acrobat (PDF) files. In this thesis, we investigate using near-miss clone detectors to find this malware. We start by collecting a set of PDF files containing JavaScript malware and a set with clean JavaScript from the VirusTotal repository. We use the NiCad clone detector to find the classes of clones in a small subset of the malicious PDF files. We evaluate how clone classes can be used to find similar malicious files in the rest of the malicious collection while avoiding files in the benign collection. Our results show that a 10% subset tr
APA, Harvard, Vancouver, ISO, and other styles
48

Lotspeich, Erica H. "Evaluation of the Odor Compounds Sensed by Explosive-Detecting Canines." 2011. http://hdl.handle.net/1805/2473.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>Trained canines are commonly used as biological detectors for explosives; however, there are some areas of uncertainty that have led to difficulties in canine training and testing. Even though a standardized container for determining the accuracy of explosives-detecting canines has already been developed, the factors that govern the amount of explosive vapor that is present in the system are often uncertain. This has led to difficulties in comparing the sensitivity of canines to one another as well as to analytical instrumentation,
APA, Harvard, Vancouver, ISO, and other styles
49

Chiu, Chin-Chi, and 邱敬棋. "Using Edge Detection Combined with Feature Detection for Moving Object Detection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b32ygd.

Full text
Abstract:
碩士<br>國立臺灣師範大學<br>機電工程學系<br>105<br>This thesis is detecting object for moving images. Nowadays, there are many methods for moving object detection on surveillance, and the method used is to find features and then to use the motion of those features between images to calculate features points moving. But the feature points sometimes are more difficult to define because the objects moving are easy to make images blur. Especially, when the objects may not be known in advance. In this thesis, using SURF algorithm defines the features of motional images because it detecting speed is faster than SIF
APA, Harvard, Vancouver, ISO, and other styles
50

Teh-Chung, Chen. "Detecting Visually Similar Web Pages: Application to Phishing Detection." Phd thesis, 2011. http://hdl.handle.net/10048/1682.

Full text
Abstract:
We propose a novel approach for detecting visual similarity between two web pages. The proposed approach applies Gestalt theory and considers a webpage as a single indivisible entity. The concept of supersignals, as a realization of Gestalt principles, supports our contention that web pages must be treated as indivisible entities. We objectify, and directly compare, these indivisible supersignals using algorithmic complexity theory. We apply our new approach to the domain of anti-Phishing technologies, which at once gives us both a reasonable ground truth for the concept of “visually similar,”
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!