Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Detection.

Rozprawy doktorskie na temat „Detection”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Detection”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Kapoor, Prince. "Shoulder Keypoint-Detection from Object Detection." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38015.

Pełny tekst źródła
Streszczenie:
This thesis presents detailed observation of different Convolutional Neural Network (CNN) architecture which had assisted Computer Vision researchers to achieve state-of-the-art performance on classification, detection, segmentation and much more to name image analysis challenges. Due to the advent of deep learning, CNN had been used in almost all the computer vision applications and that is why there is utter need to understand the miniature details of these feature extractors and find out their pros and cons of each feature extractor meticulously. In order to perform our experimentatio
Style APA, Harvard, Vancouver, ISO itp.
2

Laxhammar, Rikard. "Conformal anomaly detection : Detecting abnormal trajectories in surveillance applications." Doctoral thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8762.

Pełny tekst źródła
Streszczenie:
Human operators of modern surveillance systems are confronted with an increasing amount of trajectory data from moving objects, such as people, vehicles, vessels, and aircraft. A large majority of these trajectories reflect routine traffic and are uninteresting. Nevertheless, some objects are engaged in dangerous, illegal or otherwise interesting activities, which may manifest themselves as unusual and abnormal trajectories. These anomalous trajectories can be difficult to detect by human operators due to cognitive limitations. In this thesis, we study algorithms for the automated detection of
Style APA, Harvard, Vancouver, ISO itp.
3

Albrektsson, Fredrik. "Detecting Sockpuppets in Social Media with Plagiarism Detection Algorithms." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208553.

Pełny tekst źródła
Streszczenie:
As new forms of propaganda and information control spread across the internet, the need for novel ways of identifying them increases as well. One increasingly popular method of spreading false messages on microblogs like Twitter is to disseminate them from seemingly ordinary, but centrally controlled and coordinated user accounts – sockpuppets. In this paper we examine a number of potential methods for identifying these by way of applying plagiarism detection algorithms for text, and evaluate their performance against this type of threat. We identify one type of algorithm in particular – that
Style APA, Harvard, Vancouver, ISO itp.
4

Le, Anhtuan. "Intrusion Detection System for detecting internal threats in 6LoWPAN." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/21958/.

Pełny tekst źródła
Streszczenie:
6LoWPAN (IPv6 over Low-power Wireless Personal Area Network) is a standard developed by the Internet Engineering Task Force group to enable the Wireless Sensor Networks to connect to the IPv6 Internet. This standard is rapidly gaining popularity for its applicability, ranging extensively from health care to environmental monitoring. Security is one of the most crucial issues that need to be considered properly in 6LoWPAN. Common 6LoWPAN security threats can come from external or internal attackers. Cryptographic techniques are helpful in protecting the external attackers from illegally joining
Style APA, Harvard, Vancouver, ISO itp.
5

Olsson, Jonathan. "Detecting Faulty Piles of Wood using Anomaly Detection Techniques." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83061.

Pełny tekst źródła
Streszczenie:
The forestry and the sawmill industry have a lot of incoming and outgoing piles of wood. It's important to maintain quality and efficiency. This motivates an examination of whether machine learning- or more specifically, anomaly detection techniques can be implemented and used to detect faulty shipments. This thesis presents and evaluates some computer vision techniques and some deep learning techniques. Deep learning can be divided into groups; supervised, semi-supervised and unsupervised. In this thesis, all three groups were examined and it covers supervised methods such as Convolutional Ne
Style APA, Harvard, Vancouver, ISO itp.
6

Prevot, Yohan. "Arterial perfusion detection method by synchronous detection." [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001385.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chau, Sam. "Investigation of silicon PIN-detector for laser pulse detection." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-325.

Pełny tekst źródła
Streszczenie:
<p>This report has been written at SAAB Bofors Dynamics (SBD) AB in Gothenburg at the department of optronic systems.</p><p>In military observation operations, a target to hit is chosen by illumination of a laser designator. From the targetpoint laser radiation is reflected on a detector that helps identify the target. The detector is a semiconductor PIN-type that has been investigated in a laboratory environment together with a specially designed laser source. The detector is a photodiode and using purchased components, circuits for both the photodiode and the laserdiode has been designed and
Style APA, Harvard, Vancouver, ISO itp.
8

Chang, Pi-Jung. "Double Chooz neutrino detector: neutron detection systematic errors and detector seasonal stability." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16861.

Pełny tekst źródła
Streszczenie:
Doctor of Philosophy<br>Department of Physics<br>Glenn Horton-Smith<br>In March 2012, the Double Chooz reactor neutrino experiment published its most precise result so far: sin[superscript]2 2theta13 = 0.109 +/- 0.030(stat.) +/- 0.025(syst.). The statistical significance is 99.8% away from the no-oscillation hypothesis. The systematic uncertainties from background and detection efficiency are smaller than the first publication of the Double Chooz experiment. The neutron detection efficiency, one of the biggest contributions in detection systematic uncertainties, is a primary topic of this diss
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Jinghui. "Evaluation of GaN as a Radiation Detection Material." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1343316898.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Frascarelli, Antonio Ezio. "Object Detection." Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28259.

Pełny tekst źródła
Streszczenie:
During the last two decades the interest about computer vision raised steadily with multiple applications in fields like medical care, automotive, entertainment, retail, industrial, and security. Objectdetection is part of the recognition problem, which is the most important scope of the computervision environment.The target of this thesis work is to analyse and propose a solution for object detection in a real timedynamic environment. RoboCup@Home will be the benchmarking event for this system, which willbe equipped on a robot competing in the 2018 event. The system has to be robust and fast
Style APA, Harvard, Vancouver, ISO itp.
11

Macey, Paul Michael. "Apnoea detection." Thesis, University of Canterbury. Electrical and Electronic Engineering, 1998. http://hdl.handle.net/10092/6888.

Pełny tekst źródła
Streszczenie:
This thesis is concerned with the detection of apnoeas in infants from an abdominal breathing signal, where an apnoea is a pause in breathing during sleep. Apnoea detection is performed by analysing breathing signals recorded during sleep studies. An abdominal breathing signal recorded by the BabyLog polysomnographic system is used for this research. A reference set of apnoeas is formed by three human experts identifying apnoeas five seconds and longer within ten overnight recordings of breathing. There was a 10% disagreement on the identification of events. Based on this reference set, the pe
Style APA, Harvard, Vancouver, ISO itp.
12

Vella, Mark Joseph. "Distress detection." Thesis, University of Strathclyde, 2012. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=27534.

Pełny tekst źródła
Streszczenie:
Web attacks pose a prime concern for cybersecurity, and whilst attackers are leveraging modern technologies to launch unpredictable attacks with serious consequences, web attack detectors are still restricted to the classical misuse and anomaly detection methods. As a result, web attack detectors have limited resilience to novel attacks or produce impractical amounts of daily false alerts. Advances in intrusion detection techniques have so far only partly alleviated the problem as they are still tied to existing methods. This thesis proposes Distress Detection (DD), a detection method providin
Style APA, Harvard, Vancouver, ISO itp.
13

Mustamo, P. (Pirkko). "Object detection in sports:TensorFlow Object Detection API case study." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201802081173.

Pełny tekst źródła
Streszczenie:
Object detection is widely used in the world of sports, its users including training staff, broadcasters and sports fans. Neural network based classifiers are used together with other object detection techniques. The aim of this study was to explore the modern open source based solutions for object detection in sports, in this case for detecting football players. TensorFlow Object Detection API, an open source framework for object detection related tasks, was used for training and testing an SSD (Single-Shot Multibox Detector) with Mobilenet- model. The model was tested as a) pre-trained and b
Style APA, Harvard, Vancouver, ISO itp.
14

Zilch, Lloyd W. "Image charge detection and image charge detection mass spectrometry." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344616.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Indiana University, Dept. of Chemistry, 2008.<br>Title from home page (viewed Oct. 8, 2009). Source: Dissertation Abstracts International, Volume: 70-02, Section: B, page: 0994. Adviser: Martin F. Jarrold.
Style APA, Harvard, Vancouver, ISO itp.
15

Yerra, Rajiv. "Detecting Similar HTML Documents Using A Sentence-Based Copy Detection Approach." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd977.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Jenner, Mareike. ""Follow the evidence"? : methods of detection in American TV detective drama." Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/973dbcaf-5796-42c5-a044-b51252c91b66.

Pełny tekst źródła
Streszczenie:
This thesis deals with methods of detection i.e. the mode of investigation employed to catch a criminal in American detective dramas on television. It divides methods of detection into the categories of ‘rational-scientific’ and ‘irrational-subjective’. ‘Rational-scientific’ methods of detection are linked to the literary tradition of Golden Age fiction and suggest an analytical distance to the crime. ‘Irrational-subjective’ methods are linked to a hard-boiled tradition and suggest (often emotional) ‘closeness’ to the victim, suspects or witnesses. Drawing on the work of Michel Foucault, John
Style APA, Harvard, Vancouver, ISO itp.
17

Granath, Linus, and Andreas Strid. "Detecting the presence of people in a room using motion detection." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20099.

Pełny tekst źródła
Streszczenie:
Companies face a problem where employees reserve rooms and do not show up, which leadsto money and resources loss for the companies. An application capable of detecting thepresence of people in a room could solve this problem.This thesis details the process of building an Android application capable of detectingthe presence of people in a static room using motion detection. The application wasdeveloped through a five-staged process and evaluated by performing experiments whichmeasured the accuracy of the application.The finished application is installed on a Sony Xperia M4 Aqua device which i
Style APA, Harvard, Vancouver, ISO itp.
18

Liu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.

Pełny tekst źródła
Streszczenie:
Thesis: S.M., Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, September, 2020<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 119-123).<br>Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection meth
Style APA, Harvard, Vancouver, ISO itp.
19

Pretz, John. "Detection of atmospheric muon neutrinos with the IceCube 9-String Detector." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/4163.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Physics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Style APA, Harvard, Vancouver, ISO itp.
20

Erickson, Anna S. "Remote detection of fissile material : Cherenkov counters for gamma detection." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/76496.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 161-167).<br>The need for large-size detectors for long-range active interrogation (Al) detection has generated interest in water-based detector technologies. AI is done using external radiation sources to induce fission and to detect, identify, and characterize special nuclear material (SNM) through the gamma rays and neutrons emitted. Long-range applications require detectors with a large solid angle and an
Style APA, Harvard, Vancouver, ISO itp.
21

Kaatz, Miriam. "Impedimetric DNA detection : towards improved detection schemes for sensor integration." Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/17890.

Pełny tekst źródła
Streszczenie:
Detection of DNA by electrochemical impedance spectroscopy (EIS) has been reported by many authors and assays have been developed using lab setups. However, as for most detection assay methods there are issues to address to enable the development for the sensor market: Long time-to-result & high complexity for labelled assays and a lack of sensitivity and reproducibility for label-free assays. This work considers two different approaches to address the issues of time-to-result and assay complexity. The first part presents work on achieving rapid sequence-specific electrochemical detection of D
Style APA, Harvard, Vancouver, ISO itp.
22

Gonzalez-Garcia, Abel. "Image context for object detection, object context for part detection." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/28842.

Pełny tekst źródła
Streszczenie:
Objects and parts are crucial elements for achieving automatic image understanding. The goal of the object detection task is to recognize and localize all the objects in an image. Similarly, semantic part detection attempts to recognize and localize the object parts. This thesis proposes four contributions. The first two make object detection more efficient by using active search strategies guided by image context. The last two involve parts. One of them explores the emergence of parts in neural networks trained for object detection, whereas the other improves on part detection by adding objec
Style APA, Harvard, Vancouver, ISO itp.
23

Jakobsson, Uno, and Martin Andréasson. "Wildlife Detection Network." Thesis, Högskolan i Halmstad, Sektionen för ekonomi och teknik (SET), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17765.

Pełny tekst źródła
Streszczenie:
Traffic accidents where wild animals are involved represents between 60 and 80 percent of all reported accidents, depending on location in Sweden. In a country like Sweden, with a lot of forest, there is always risk of a collision with a wild animal. Imagine if you, as a road user, had the possibility to receive warnings when the risk of an accident according to statistics is extra high. Wildlife Detection Network is a wildlife warning system with an information service, which makes the whole concept unique. When an animal is approaching the road, it is registered by sensors, and warning light
Style APA, Harvard, Vancouver, ISO itp.
24

Ståhl, Björn. "Online Anomaly Detection." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2825.

Pełny tekst źródła
Streszczenie:
Where the role of software-intensive systems has shifted from the traditional one of fulfilling isolated computational tasks, larger collaborative societies with interaction as primary resource, is gradually taking its place. This can be observed in anything from logistics to rescue operations and resource management, numerous services with key-roles in the modern infrastructure. In the light of this new collaborative order, it is imperative that the tools (compilers, debuggers, profilers) and methods (requirements, design, implementation, testing) that supported traditional software engineeri
Style APA, Harvard, Vancouver, ISO itp.
25

Wen, Shihua. "Semiparametric cluster detection." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7204.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.<br>Thesis research directed by: Mathematical Statistics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Style APA, Harvard, Vancouver, ISO itp.
26

Malek, Esmaeili Mani. "Multimedia copy detection." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44581.

Pełny tekst źródła
Streszczenie:
Asmultimedia-sharing websites are becoming increasingly popular, content providers get more concerned about the illegal distribution of their copyrighted contents. The recent content-based multimedia fingerprinting technology has evolved as an important tool for automatically detecting illegal copies of audio, image, and video signals. Multimedia fingerprints are signatures that are extracted from an audio, image, or video signal as a compact identifier of the signal. Therefore fingerprints should have enough discriminating ability to identify a multimedia object among others. At the same time
Style APA, Harvard, Vancouver, ISO itp.
27

Foisy, André. "Robust collision detection." Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28746.

Pełny tekst źródła
Streszczenie:
The problem of locating collisions between computer modeled moving rigid bodies is considered. Each rigid body is modeled by the union of polytopes. Safe and reliable collision detection algorithms are constructed.<br>Since the computer representation of real numbers is finite, an interval projective point is used to encompass all localization errors of a modeled point. An interval point is the elementary geometrical form from which all others are constructed. The Euclidean convex set spanned by an interval point is also a polytope.<br>The construction of a polytope relies on a robust convex h
Style APA, Harvard, Vancouver, ISO itp.
28

Espinosa-Romero, Arturo. "Situated face detection." Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/6667.

Pełny tekst źródła
Streszczenie:
In the last twenty years, important advances have been made in the field of automatic face processing, given the importance of human faces for personal identification, emotional expression and verbal and non verbal communication. The very first step in a face processing algorithm is the detection of faces; while this is a trivial problem in controlled environments, the detection of faces in real environments is still a challenging task. Until now, the most successful approaches for face detection represent the face as a grey-level pattern, and the problem itself is considered as the classifica
Style APA, Harvard, Vancouver, ISO itp.
29

Kalal, Zdenek. "Tracking learning detection." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.540948.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Ohlson, Frida, and Nadim Al-Mosawi. "Occupant Detection System." Thesis, Högskolan i Halmstad, Bio- och miljösystemforskning (BLESS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28617.

Pełny tekst źródła
Streszczenie:
The purpose of the ODS (Occupant Detection System) project is to develop a car safety camera system that is able to discriminate human occupants in order to activate safety features depending on the human size. In order to discriminate the size of an occupant anthropometric measurements need to be performed. The aim of this study was to investigate the possibility of anthropometric measurements of human height and weight with a Kinect for Windows v2 sensor for discrimination of different occupants inside a vehicle. The goal was to find valid anthropometric methods for determination of human he
Style APA, Harvard, Vancouver, ISO itp.
31

Elsenbroich, Corinna Julia. "Instinct for detection." Thesis, King's College London (University of London), 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.430430.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Lafis, S. "Rapid microbial detection." Thesis, Cranfield University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Doney, George Daniel. "Acoustic boiling detection." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/28110.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Alzarooni, K. M. A. "Malware variant detection." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1347243/.

Pełny tekst źródła
Streszczenie:
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware writers use semantic-preserving code transformation (obfuscation) techniques to produce new stealth variants of their malware programs. Malware variants are hard to detect with today's detection technolog
Style APA, Harvard, Vancouver, ISO itp.
35

Kemp, E., M. Floyd, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6406.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Floyd, M., E. Kemp, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6416.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Ent, Petr. "Voice Activity Detection." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235483.

Pełny tekst źródła
Streszczenie:
Práce pojednává o využití support vector machines v detekci řečové aktivity. V první části jsou zkoumány různé druhy příznaků, jejich extrakce a zpracování a je nalezena jejich optimální kombinace, která podává nejlepší výsledky. Druhá část představuje samotný systém pro detekci řečové aktivity a ladění jeho parametrů. Nakonec jsou výsledky porovnány s dvěma dalšími systémy, založenými na odlišných principech. Pro testování a ladění byla použita ERT broadcast news databáze. Porovnání mezi systémy bylo pak provedeno na databázi z NIST06 Rich Test Evaluations.
Style APA, Harvard, Vancouver, ISO itp.
38

Matos, Diogo Silva. "Person detection system." Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23853.

Pełny tekst źródła
Streszczenie:
mestrado em Engenharia Eletrónica e Telecomunicações<br>O RADAR é para fins militares já relativamente antigo que sofreu um grande impulso durante a Segunda Guerra Mundial. Hoje em dia existe um forte desenvolvimento no RADAR em aplicações de navegação ou vigilância/segurança. Esta dissertação surge no seguimento destas novas aplicações, em que se pretende o desenvolvimento de um RADAR de baixo custo que permita ao utilizador detetar pessoas, bem como, os seus movimentos através de paredes ou objetos opacos. O desenvolvimento deste RADAR recaiu em tecnologias emergentes como antenas a
Style APA, Harvard, Vancouver, ISO itp.
39

O'Keefe, Eion Seiorse. "Polymer chemiluminescence detection." Thesis, University of Sussex, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.238667.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Park, Sean. "Neural malware detection." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/173759.

Pełny tekst źródła
Streszczenie:
At the heart of today’s malware problem lies theoretically infinite diversity created by metamorphism. The majority of conventional machine learning techniques tackle the problem with the assumptions that a sufficiently large number of training samples exist and that the training set is independent and identically distributed. However, the lack of semantic features combined with the models under these wrong assumptions result largely in overfitting with many false positives against real world samples, resulting in systems being left vulnerable to various adversarial attacks. A key observation
Style APA, Harvard, Vancouver, ISO itp.
41

Barascud, Nicolas. "Auditory pattern detection." Thesis, University College London (University of London), 2014. http://discovery.ucl.ac.uk/1458387/.

Pełny tekst źródła
Streszczenie:
The work presented in this doctoral thesis uses behavioural methods and neuroimaging to investigate how human listeners detect patterns and statistical regularities in complex sound sequences. Temporal pattern analysis is essential to sensory processing, especially listening, since most auditory signals only have meaning as sequences over time. Previous evidence suggests that the brain is sensitive to the statistics of sensory stimulation. However, the process through which this sensitivity arises is largely unknown. This dissertation is organised as follows: Chapter 1 reviews fundamental prin
Style APA, Harvard, Vancouver, ISO itp.
42

Rogers, Stuart Craig. "Defect Detection Microscopy." BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2256.

Pełny tekst źródła
Streszczenie:
The automotive industry's search for stronger lighter materials has been hampered in its desire to make greater use of Magnesium alloys by their poor formability below 150°C. One current challenge is to identify the complex structure and deformation mechanisms at work and determine which of these are primary contributors to the nucleation of defects. Orientation Imaging Microscopy has been the most accessible tool for microstructural analysis over the past 15 years. However, using OIM to analyze defect nucleation sites requires prior knowledge of where the defects will occur because once the d
Style APA, Harvard, Vancouver, ISO itp.
43

Butler, Joseph G. "Automated Fingertip Detection." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3164.

Pełny tekst źródła
Streszczenie:
One of the oldest biometrics that has been used to uniquely identify a person is their fingerprint. Recent developments in research on fingerprint collection have made it possible to collect fingerprint data from a stand-off digital image. Each of the techniques developed so far have relied on either a very controlled capture environment to ensure only a single fingertip is collected or manual cropping of the image down to the fingertip. The main body of the research focuses on extracting the fingerprint itself. If fingerprint collection via digital image is ever to be fielded in the real worl
Style APA, Harvard, Vancouver, ISO itp.
44

Park, Jea Woo. "Lithography Hotspot Detection." PDXScholar, 2017. https://pdxscholar.library.pdx.edu/open_access_etds/3781.

Pełny tekst źródła
Streszczenie:
The lithography process for chip manufacturing has been playing a critical role in keeping Moor's law alive. Even though the wavelength used for the process is bigger than actual device feature size, which makes it difficult to transfer layout patterns from the mask to wafer, lithographers have developed a various technique such as Resolution Enhancement Techniques (RETs), Multi-patterning, and Optical Proximity Correction (OPC) to overcome the sub-wavelength lithography gap. However, as feature size in chip design scales down further to a point where manufacturing constraints must be applied
Style APA, Harvard, Vancouver, ISO itp.
45

Garcia, Hurtado J. (Juan). "Indoor outdoor detection." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906062479.

Pełny tekst źródła
Streszczenie:
Abstract. This thesis shows a viable machine learning model that detects Indoor or Outdoor on smartphones. The model was designed as a classification problem and it was trained with data collected from several smartphone sensors by participants of a field trial conducted. The data collected was labeled manually either indoor or outdoor by the participants themselves. The model was then iterated over to lower the energy consumption by utilizing feature selection techniques and subsampling techniques. The model which uses all of the data achieved a 99 % prediction accuracy, while the energy effi
Style APA, Harvard, Vancouver, ISO itp.
46

姚志霖. "Vehicle detection using endpoint detection method for FMCW radar detector." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/77448172476508925617.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Karademir, SARUHAN. "DETECTING PDF JAVASCRIPT MALWARE USING CLONE DETECTION." Thesis, 2013. http://hdl.handle.net/1974/8387.

Pełny tekst źródła
Streszczenie:
One common vector of malware is JavaScript in Adobe Acrobat (PDF) files. In this thesis, we investigate using near-miss clone detectors to find this malware. We start by collecting a set of PDF files containing JavaScript malware and a set with clean JavaScript from the VirusTotal repository. We use the NiCad clone detector to find the classes of clones in a small subset of the malicious PDF files. We evaluate how clone classes can be used to find similar malicious files in the rest of the malicious collection while avoiding files in the benign collection. Our results show that a 10% subset tr
Style APA, Harvard, Vancouver, ISO itp.
48

Lotspeich, Erica H. "Evaluation of the Odor Compounds Sensed by Explosive-Detecting Canines." 2011. http://hdl.handle.net/1805/2473.

Pełny tekst źródła
Streszczenie:
Indiana University-Purdue University Indianapolis (IUPUI)<br>Trained canines are commonly used as biological detectors for explosives; however, there are some areas of uncertainty that have led to difficulties in canine training and testing. Even though a standardized container for determining the accuracy of explosives-detecting canines has already been developed, the factors that govern the amount of explosive vapor that is present in the system are often uncertain. This has led to difficulties in comparing the sensitivity of canines to one another as well as to analytical instrumentation,
Style APA, Harvard, Vancouver, ISO itp.
49

Chiu, Chin-Chi, and 邱敬棋. "Using Edge Detection Combined with Feature Detection for Moving Object Detection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b32ygd.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣師範大學<br>機電工程學系<br>105<br>This thesis is detecting object for moving images. Nowadays, there are many methods for moving object detection on surveillance, and the method used is to find features and then to use the motion of those features between images to calculate features points moving. But the feature points sometimes are more difficult to define because the objects moving are easy to make images blur. Especially, when the objects may not be known in advance. In this thesis, using SURF algorithm defines the features of motional images because it detecting speed is faster than SIF
Style APA, Harvard, Vancouver, ISO itp.
50

Teh-Chung, Chen. "Detecting Visually Similar Web Pages: Application to Phishing Detection." Phd thesis, 2011. http://hdl.handle.net/10048/1682.

Pełny tekst źródła
Streszczenie:
We propose a novel approach for detecting visual similarity between two web pages. The proposed approach applies Gestalt theory and considers a webpage as a single indivisible entity. The concept of supersignals, as a realization of Gestalt principles, supports our contention that web pages must be treated as indivisible entities. We objectify, and directly compare, these indivisible supersignals using algorithmic complexity theory. We apply our new approach to the domain of anti-Phishing technologies, which at once gives us both a reasonable ground truth for the concept of “visually similar,”
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!