Xem 1-20 trên 183 kết quả Detection techniques
  • The two fundamental building blocks of a digital communication system are modulation and channel coding. They enable reliable communication by providing signaling schemes and receiver structures that utilize the available spectrum and power efficiently.

    pdf38p huemanvdoc 23-11-2009 70 8   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Performance Evaluation of a Novel CDMA Detection Technique: The Two-State Approach

    pdf12p dauphong20 11-03-2012 20 4   Download

  • The thesis majors at: Camera surveillance systems and related works; the hand – off camera techniques in surveillance camera systems with multiple cameras; the anomaly detection techniques in video surveillance.

    pdf27p change00 04-05-2016 9 0   Download

  • The urgent need for computer-assisted detection of tumors and lesions in medical images becomes clear when one considers the state of affairs in X-ray film mammography for breast cancer screening. In the United States it is estimated that there are currently more than 50 million women over the age of 40 at risk of contracting breast cancer.

    pdf411p echbuon 02-11-2012 33 5   Download

  • Exhaustive testing (use of all possible inputs and conditions) is impractical must use a subset of all possible test cases. must have high probability of detecting faults. Need thought processes that help to select test cases more intelligently. test case design techniques are such thought processes.Effective testing: find more faults. focus attention on specific types of fault. know you're testing the right thing. Efficient testing: find faults with less effort. avoid duplication systematic techniques are measurable...

    pdf28p mummumzz 25-06-2013 15 5   Download

  • What are anomalies/outliers? The set of data points that are considerably different than the remainder of the data Variants of Anomaly/Outlier Detection Problems Given a database D, find all the data points x  D with anomaly scores greater than some threshold t Given a database D, find all the data points x  D having the top-n largest anomaly scores f(x) Given a database D, containing mostly normal (but unlabeled) data points, and a test point x, compute the anomaly score of x with respect to D Applications: Credit card fraud detection, telecommunication fraud detection, netwo...

    ppt25p trinh02 18-01-2013 24 4   Download

  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 22 4   Download

  • Existing sensor network architectures are based on the as- sumption that data will be polled. Therefore, they are not adequate for long-term battery-powered use in applications that must sense or react to events that occur at unpre- dictable times.

    pdf10p giamdocamnhac 06-04-2013 16 4   Download

  • The last quarter of the last century has witnessed major advancements that have brought imaging and radioanalytical techniques to a paramount status in life sciences and industry. Generally speaking, the scope of radiation imaging and radioanalytics covers data acquisi‐ tion, data processing, and data analysis, involving theories, methods, systems and applica‐ tions. While detection and post-processing techniques become increasingly sophisticated, traditional and emerging modalities play more and more critical roles in medical and indus‐ trial domains.

    pdf200p lyly_5 22-03-2013 19 3   Download

  • Event detection is one of the required services in sensor network applications such as environmental monitoring and object tracking. Composite event detection faces several challenges.The first challenge is uncertainty caused by variety of factors, while the second one is heterogeneity of sensor nodes in sensing capabilities. Finally, distributed detection,which is vital to facilitate uncovering composite events in large scale sensor networks, is challenging.

    pdf17p giamdocamnhac 06-04-2013 19 3   Download

  • We address the issue of on-line detection of communication problems in spoken dialogue systems. The usefulness is investigated of the sequence of system question types and the word graphs corresponding to the respective user utterances. By applying both ruleinduction and memory-based learning techniques to data obtained with a Dutch train time-table information system, the current paper demonstrates that the aforementioned features indeed lead to a method for problem detection that performs significantly above baseline.

    pdf8p bunrieu_1 18-04-2013 25 3   Download

  • This paper presents a new approach to bitext correspondence problem (BCP) of noisy bilingual corpora based on image processing (IP) techniques. By using one of several ways of estimating the lexical translation probability (LTP) between pairs of source and target words, we can turn a bitext into a discrete gray-level image. We contend that the BCP, when seen in this light, bears a striking resemblance to the line detection problem in IP.

    pdf8p bunthai_1 06-05-2013 16 3   Download

  • We present Subgroup Detector, a system for analyzing threaded discussions and identifying the attitude of discussants towards one another and towards the discussion topic. The system uses attitude predictions to detect the split of discussants into subgroups of opposing views. The system uses an unsupervised approach based on rule-based opinion target detecting and unsupervised clustering techniques. The system is open source and is freely available for download.

    pdf6p nghetay_1 07-04-2013 16 2   Download

  • We have analyzed 607 sentences of spontaneous human-computer speech data containing repairs, drawn from a total corpus of 10,718 sentences. We present here criteria and techniques for automatically detecting the presence of a repair, its location, and making the appropriate correction. The criteria involve integration of knowledge from several sources: pattern matching, syntactic and semantic analysis, and acoustics. INTRODUCTION Spontaneous spoken language often includes speech that is not intended by the speaker to be part of the content of the utterance. ...

    pdf8p bunmoc_1 20-04-2013 17 2   Download

  • In this paper, we present a novel approach for automatic summarization. Our system, called CBSEAS, integrates a new method to detect redundancy at its very core, and produce more expressive summaries than previous approaches. Moreover, we show that our system is versatile enough to integrate opinion mining techniques, so that it is capable of producing opinion oriented summaries. The very competitive results obtained during the last Text Evaluation Conference (TAC 2008) show that our approach is efficient. ...

    pdf4p bunthai_1 06-05-2013 15 2   Download

  • Principles of operation Magnetic Flux Leakage (MFL) inspection techniques are electromagnetic test methods primarily used to detect flaws or defects in high-permeability ferromagnetic metals such as carbon steel tubing, plate, wire rope and tubular parts.

    pdf4p truongvucknd 18-06-2014 14 2   Download

  • We describe a set of techniques for Arabic cross-document coreference resolution. We compare a baseline system of exact mention string-matching to ones that include local mention context information as well as information from an existing machine translation system. It turns out that the machine translation-based technique outperforms the baseline, but local entity context similarity does not. This helps to point the way for future crossdocument coreference work in languages with few existing resources for the task. cross-document coreference in Arabic as there is in English (e.g.

    pdf4p hongphan_1 15-04-2013 14 1   Download

  • This paper studies the problem of identifying erroneous/correct sentences. The problem has important applications, e.g., providing feedback for writers of English as a Second Language, controlling the quality of parallel bilingual sentences mined from the Web, and evaluating machine translation results. In this paper, we propose a new approach to detecting erroneous sentences by integrating pattern discovery with supervised learning models. Experimental results show that our techniques are promising. ...

    pdf8p hongvang_1 16-04-2013 19 1   Download

  • database maintained by the National Library of Medicine1 (NLM), which incorporates around 40,000 Health Sciences papers each month. Researchers depend on these electronic resources to keep abreast of their rapidly changing field. In order to maintain and update vital indexing references such as the Unified Medical Language System (UMLS) resources, the MeSH and SPECIALIST vocabularies, the NLM staff needs to review 400,000 highly-technical papers each year.

    pdf8p bunbo_1 17-04-2013 14 1   Download

  • This paper describes a Verb Phrase Ellipsis (VPE) detection system, built for robustness, accuracy and domain independence. The system is corpus-based, and uses machine learning techniques on free text that has been automatically parsed. Tested on a mixed corpus comprising a range of genres, the system achieves a 70% F1-score. This system is designed as the first stage of a complete VPE resolution system that is input free text, detects VPEs, and proceeds to find the antecedents and resolve them. ...

    pdf6p bunbo_1 17-04-2013 11 1   Download

Đồng bộ tài khoản