نتایج جستجو برای: detection as precautious measures

تعداد نتایج: 6127465  

2012
Carlo Tomasi

Given a collectionC ofC items of information (web pages, images, video clips, documents, or other) and a predicateR(i) that takes an item i ∈ C as input and is true when the item i is relevant, a retrieval system returns all items i ∈ C for which it estimates R(i) to be true. Given an image, a collection C of C windows in the image, and a predicateR(i) that takes a window i ∈ C as input and is ...

2002
Shyjan Mahamud Takeo Kanade Jianbo Shi Pietro Perona

The reliable detection of an object of interest in an input image with arbitrary background clutter and occlusion has to a large extent remained an elusive goal in computer vision. Traditional model-based approaches are inappropriate for a multi-class object detection task primarily due to difficulties in modeling arbitrary object classes. Instead, we develop a detection framework whose core co...

Journal: :European journal of medical and health sciences 2022

Background: Foreign body invasion of the brain can cause traumatic injury with severe complications. In most cases, it be a late diagnosis. We reported here case from foreign and, after being invested patient was taken for emergency craniotomy successfully removal body. Case Report: A 12 yr. old boy developed headache and vomiting 2 days his head hit on bundle sticks back while riding cycle. On...

2011
S. Vidya R. Bhaskaran

The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) to physical addresses (MAC). The protocol has proved to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP storming attacks, an intruder can create Denial of Service (DoS) in another host and prevent it’s functioning or just cause network slowdowns...

2014
Simon Graf Tobias Herbig Markus Buck Gerhard Schmidt

Voice activity detection is an essential part of many speech processing algorithms. The requirements of the speech application determine the design of voice activity detection. Some applications need low-latency results whereas the accuracy of speech detection is more important for other applications. The performance is generally evaluated by Receiver Operating Characteristic (ROC) curves, whic...

Journal: :The Bulletin of the American Academy of Psychiatry and the Law 1980
B E Lynch J M Bradford

The term amnesia encompasses many varied examples and causes of memory loss. In an edited text on amnesia, Whitty and Zangwill explore the subject in terms of cerebral disease, trauma, electroconvulsive therapy and psychogenesis. 1 It becomes obvious from the various causative factors involved in amnesia that such a multi-factorial problem requires an eclectic approach in answering. At present,...

2001
Wenke Lee Dong Xiang

Anomaly detection is an essential component of the protection mechanisms against novel attacks. In this paper, we propose to use several information-theoretic measures, namely, entropy, conditional entropy, relative conditional entropy, information gain, and information cost for anomaly detection. These measures can be used to describe the characteristics of an audit data set, suggest the appro...

2011
Marco Liuni Axel Röbel Marco Romito Xavier Rodet

Change detection within an audio stream is an important task in several domains, such as classification and segmentation of a sound or of a music piece, as well as indexing of broadcast news or surveillance applications. In this paper we propose two novel methods for spectral change detection without any assumption about the input sound: they are both based on the evaluation of information meas...

Journal: :CoRR 2016
José A. R. Fonollosa

In this paper we derive variability measures for the conditional probability distributions of a pair of random variables, and we study its application in the inference of causal-effect relationships. We also study the combination of the proposed measures with standard statistical measures in the the framework of the ChaLearn cause-effect pair challenge. The developed model obtains an AUC score ...

Journal: :CoRR 2009
Sujit Gujar C. E. Veni Madhavan

Still and multi-media images are subject to transformations for compression, steganographic embedding and digital watermarking. We propose new measures and techniques for detection and analysis of steganographic embedded content. We show that both statistical and pattern classification techniques using our proposed measures provide reasonable discrimination schemes for detecting embeddings of d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید