Noisy corruption detection
نویسندگان
چکیده
منابع مشابه
Corruption Detection on Networks
We consider the problem of corruption detection on networks. In this model each vertex of a directed graph can be either truthful or corrupt. Each vertex reports about the types (truthful or corrupt) of all his out-neighbors. If he is truthful, he reports the truth, whereas if he is corrupt he reports adversarially. This model, considered in [15] motivated by the desire to identify the faulty c...
متن کاملNoisy images edge detection: Ant colony optimization algorithm
The edges of an image define the image boundary. When the image is noisy, it does not become easy to identify the edges. Therefore, a method requests to be developed that can identify edges clearly in a noisy image. Many methods have been proposed earlier using filters, transforms and wavelets with Ant colony optimization (ACO) that detect edges. We here used ACO for edge detection of noisy ima...
متن کاملAnomaly Detection in Noisy
Title of dissertation: Anomaly Detection in Noisy Images Xavier Gibert Serra, Ph.D. Examination, Fall 2015 Dissertation directed by: Professor Rama Chellappa Department of Electrical and Computer Engineering Finding rare events in multidimensional data is an important detection problem that has applications in many fields, such as risk estimation in insurance industry, finance, flood prediction...
متن کاملMotion Corruption Detection in Breast DCE-MRI
Motion corruption can result in difficulty identifying lesions, and incorrect diagnoses by radiologists in cases of breast cancer screening using DCE-MRI. Although registration techniques can be used to correct for motion artifacts, their use has a computational cost and, in some cases can lead to a reduction in diagnostic quality rather than the desired improvement. In a clinical system it wou...
متن کاملDetection and Prevention of Memory Corruption Attacks
Vulnerabilities in software programs made possible the widespread and frequent occurrence of malware outbreaks. Extensive research has been devoted to detection and prevention of control hijacking attacks due to their prevalence. The non-control data attacks are not yet so prevalent, but, as more and more avenues are closed for the malicious software authors they will gain
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Processing Letters
سال: 2020
ISSN: 0020-0190
DOI: 10.1016/j.ipl.2019.105897