Noisy corruption detection

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Corruption Detection on Networks

We consider the problem of corruption detection on networks. In this model each vertex of a directed graph can be either truthful or corrupt. Each vertex reports about the types (truthful or corrupt) of all his out-neighbors. If he is truthful, he reports the truth, whereas if he is corrupt he reports adversarially. This model, considered in [15] motivated by the desire to identify the faulty c...

متن کامل

Noisy images edge detection: Ant colony optimization algorithm

The edges of an image define the image boundary. When the image is noisy, it does not become easy to identify the edges. Therefore, a method requests to be developed that can identify edges clearly in a noisy image. Many methods have been proposed earlier using filters, transforms and wavelets with Ant colony optimization (ACO) that detect edges. We here used ACO for edge detection of noisy ima...

متن کامل

Anomaly Detection in Noisy

Title of dissertation: Anomaly Detection in Noisy Images Xavier Gibert Serra, Ph.D. Examination, Fall 2015 Dissertation directed by: Professor Rama Chellappa Department of Electrical and Computer Engineering Finding rare events in multidimensional data is an important detection problem that has applications in many fields, such as risk estimation in insurance industry, finance, flood prediction...

متن کامل

Motion Corruption Detection in Breast DCE-MRI

Motion corruption can result in difficulty identifying lesions, and incorrect diagnoses by radiologists in cases of breast cancer screening using DCE-MRI. Although registration techniques can be used to correct for motion artifacts, their use has a computational cost and, in some cases can lead to a reduction in diagnostic quality rather than the desired improvement. In a clinical system it wou...

متن کامل

Detection and Prevention of Memory Corruption Attacks

Vulnerabilities in software programs made possible the widespread and frequent occurrence of malware outbreaks. Extensive research has been devoted to detection and prevention of control hijacking attacks due to their prevalence. The non-control data attacks are not yet so prevalent, but, as more and more avenues are closed for the malicious software authors they will gain

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Processing Letters

سال: 2020

ISSN: 0020-0190

DOI: 10.1016/j.ipl.2019.105897