The two fundamental building blocks of a digital communication system are modulation and channel coding. They enable reliable communication by providing signaling schemes and receiver structures that utilize the available spectrum and power efficiently.
The thesis majors at: Camera surveillance systems and related works; the hand – off camera techniques in surveillance camera systems with multiple cameras; the anomaly detection techniques in video surveillance.
The urgent need for computer-assisted detection of tumors and lesions in medical
images becomes clear when one considers the state of affairs in X-ray film mammography
for breast cancer screening. In the United States it is estimated that
there are currently more than 50 million women over the age of 40 at risk of contracting
Exhaustive testing (use of all possible inputs and conditions) is impractical
must use a subset of all possible test cases.
must have high probability of detecting faults.
Need thought processes that help to select test cases more intelligently.
test case design techniques are such thought processes.Effective testing: find more faults.
focus attention on specific types of fault.
know you're testing the right thing.
Efficient testing: find faults with less effort.
systematic techniques are measurable...
What are anomalies/outliers?
The set of data points that are considerably different than the remainder of the data
Variants of Anomaly/Outlier Detection Problems
Given a database D, find all the data points x D with anomaly scores greater than some threshold t
Given a database D, find all the data points x D having the top-n largest anomaly scores f(x)
Given a database D, containing mostly normal (but unlabeled) data points, and a test point x, compute the anomaly score of x with respect to D
Credit card fraud detection, telecommunication fraud detection, netwo...
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.
Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...
Existing sensor network architectures are based on the as-
sumption that data will be polled. Therefore, they are not
adequate for long-term battery-powered use in applications
that must sense or react to events that occur at unpre-
The last quarter of the last century has witnessed major advancements that have brought
imaging and radioanalytical techniques to a paramount status in life sciences and industry.
Generally speaking, the scope of radiation imaging and radioanalytics covers data acquisi‐
tion, data processing, and data analysis, involving theories, methods, systems and applica‐
tions. While detection and post-processing techniques become increasingly sophisticated,
traditional and emerging modalities play more and more critical roles in medical and indus‐
Event detection is one of the required services in sensor network applications such as environmental
monitoring and object tracking. Composite event detection faces several challenges.The first challenge is
uncertainty caused by variety of factors, while the second one is heterogeneity of sensor nodes in sensing
capabilities. Finally, distributed detection,which is vital to facilitate uncovering composite events in large
scale sensor networks, is challenging.
We address the issue of on-line detection of communication problems in spoken dialogue systems. The usefulness is investigated of the sequence of system question types and the word graphs corresponding to the respective user utterances. By applying both ruleinduction and memory-based learning techniques to data obtained with a Dutch train time-table information system, the current paper demonstrates that the aforementioned features indeed lead to a method for problem detection that performs signiﬁcantly above baseline.
This paper presents a new approach to bitext correspondence problem (BCP) of noisy bilingual corpora based on image processing (IP) techniques. By using one of several ways of estimating the lexical translation probability (LTP) between pairs of source and target words, we can turn a bitext into a discrete gray-level image. We contend that the BCP, when seen in this light, bears a striking resemblance to the line detection problem in IP.
We present Subgroup Detector, a system for analyzing threaded discussions and identifying the attitude of discussants towards one another and towards the discussion topic. The system uses attitude predictions to detect the split of discussants into subgroups of opposing views. The system uses an unsupervised approach based on rule-based opinion target detecting and unsupervised clustering techniques. The system is open source and is freely available for download.
We have analyzed 607 sentences of spontaneous human-computer speech data containing repairs, drawn from a total corpus of 10,718 sentences. We present here criteria and techniques for automatically detecting the presence of a repair, its location, and making the appropriate correction. The criteria involve integration of knowledge from several sources: pattern matching, syntactic and semantic analysis, and acoustics. INTRODUCTION Spontaneous spoken language often includes speech that is not intended by the speaker to be part of the content of the utterance. ...
In this paper, we present a novel approach for automatic summarization. Our system, called CBSEAS, integrates a new method to detect redundancy at its very core, and produce more expressive summaries than previous approaches. Moreover, we show that our system is versatile enough to integrate opinion mining techniques, so that it is capable of producing opinion oriented summaries. The very competitive results obtained during the last Text Evaluation Conference (TAC 2008) show that our approach is efﬁcient. ...
Principles of operation Magnetic Flux Leakage (MFL) inspection techniques are electromagnetic test methods primarily used to detect flaws or defects in high-permeability ferromagnetic metals such as carbon steel tubing, plate, wire rope and tubular parts.
We describe a set of techniques for Arabic cross-document coreference resolution. We compare a baseline system of exact mention string-matching to ones that include local mention context information as well as information from an existing machine translation system. It turns out that the machine translation-based technique outperforms the baseline, but local entity context similarity does not. This helps to point the way for future crossdocument coreference work in languages with few existing resources for the task. cross-document coreference in Arabic as there is in English (e.g.
This paper studies the problem of identifying erroneous/correct sentences. The problem has important applications, e.g., providing feedback for writers of English as a Second Language, controlling the quality of parallel bilingual sentences mined from the Web, and evaluating machine translation results. In this paper, we propose a new approach to detecting erroneous sentences by integrating pattern discovery with supervised learning models. Experimental results show that our techniques are promising. ...
database maintained by the National Library of Medicine1 (NLM), which incorporates around 40,000 Health Sciences papers each month. Researchers depend on these electronic resources to keep abreast of their rapidly changing field. In order to maintain and update vital indexing references such as the Unified Medical Language System (UMLS) resources, the MeSH and SPECIALIST vocabularies, the NLM staff needs to review 400,000 highly-technical papers each year.
This paper describes a Verb Phrase Ellipsis (VPE) detection system, built for robustness, accuracy and domain independence. The system is corpus-based, and uses machine learning techniques on free text that has been automatically parsed. Tested on a mixed corpus comprising a range of genres, the system achieves a 70% F1-score. This system is designed as the ﬁrst stage of a complete VPE resolution system that is input free text, detects VPEs, and proceeds to ﬁnd the antecedents and resolve them. ...