期刊文献+
共找到2,739篇文章
< 1 2 137 >
每页显示 20 50 100
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
1
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
在线阅读 下载PDF
An Enhanced Lung Cancer Detection Approach Using Dual-Model Deep Learning Technique
2
作者 Sumaia Mohamed Elhassan Saad Mohamed Darwish Saleh Mesbah Elkaffas 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期835-867,共33页
Lung cancer continues to be a leading cause of cancer-related deaths worldwide,emphasizing the critical need for improved diagnostic techniques.Early detection of lung tumors significantly increases the chances of suc... Lung cancer continues to be a leading cause of cancer-related deaths worldwide,emphasizing the critical need for improved diagnostic techniques.Early detection of lung tumors significantly increases the chances of successful treatment and survival.However,current diagnostic methods often fail to detect tumors at an early stage or to accurately pinpoint their location within the lung tissue.Single-model deep learning technologies for lung cancer detection,while beneficial,cannot capture the full range of features present in medical imaging data,leading to incomplete or inaccurate detection.Furthermore,it may not be robust enough to handle the wide variability in medical images due to different imaging conditions,patient anatomy,and tumor characteristics.To overcome these disadvantages,dual-model or multi-model approaches can be employed.This research focuses on enhancing the detection of lung cancer by utilizing a combination of two learning models:a Convolutional Neural Network(CNN)for categorization and the You Only Look Once(YOLOv8)architecture for real-time identification and pinpointing of tumors.CNNs automatically learn to extract hierarchical features from raw image data,capturing patterns such as edges,textures,and complex structures that are crucial for identifying lung cancer.YOLOv8 incorporates multiscale feature extraction,enabling the detection of tumors of varying sizes and scales within a single image.This is particularly beneficial for identifying small or irregularly shaped tumors that may be challenging to detect.Furthermore,through the utilization of cutting-edge data augmentation methods,such as Deep Convolutional Generative Adversarial Networks(DCGAN),the suggested approach can handle the issue of limited data and boost the models’ability to learn from diverse and comprehensive datasets.The combined method not only improved accuracy and localization but also ensured efficient real-time processing,which is crucial for practical clinical applications.The CNN achieved an accuracy of 97.67%in classifying lung tissues into healthy and cancerous categories.The YOLOv8 model achieved an Intersection over Union(IoU)score of 0.85 for tumor localization,reflecting high precision in detecting and marking tumor boundaries within the images.Finally,the incorporation of synthetic images generated by DCGAN led to a 10%improvement in both the CNN classification accuracy and YOLOv8 detection performance. 展开更多
关键词 Lung cancer detection dual-model deep learning technique data augmentation CNN YOLOv8
在线阅读 下载PDF
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques
3
作者 Patrick Vermander Aitziber Mancisidor +2 位作者 Raffaele Gravina Itziar Cabanes Giancarlo Fortino 《Digital Communications and Networks》 2025年第3期622-633,共12页
Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,... Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,given the challenges faced by health specialists to carry out continuous monitoring,the development of an intelligent anomaly detection system is proposed.Unlike other authors,where they use supervised techniques,this work proposes using unsupervised techniques due to the advantages they offer.These advantages include the lack of prior labeling of data,and the detection of anomalies previously not contemplated,among others.In the present work,an individualized methodology consisting of two phases is developed:characterizing the normal sitting pattern and determining abnormal samples.An analysis has been carried out between different unsupervised techniques to study which ones are more suitable for postural diagnosis.It can be concluded,among other aspects,that the utilization of dimensionality reduction techniques leads to improved results.Moreover,the normality characterization phase is deemed necessary for enhancing the system’s learning capabilities.Additionally,employing an individualized approach to the model aids in capturing the particularities of the various pathologies present among subjects. 展开更多
关键词 Sitting posture monitoring Anomaly detection Assistive technology Pressure sensors Unsupervised techniques INDIVIDUALIZATION WHEELCHAIR
在线阅读 下载PDF
Advanced Techniques for Dynamic Malware Detection and Classification in Digital Security Using Deep Learning
4
作者 Taher Alzahrani 《Computers, Materials & Continua》 2025年第6期4575-4606,共32页
The rapid evolution of malware presents a critical cybersecurity challenge,rendering traditional signature-based detection methods ineffective against novel variants.This growing threat affects individuals,organizatio... The rapid evolution of malware presents a critical cybersecurity challenge,rendering traditional signature-based detection methods ineffective against novel variants.This growing threat affects individuals,organizations,and governments,highlighting the urgent need for robust malware detection mechanisms.Conventional machine learning-based approaches rely on static and dynamicmalware analysis and often struggle to detect previously unseen threats due to their dependency on predefined signatures.Although machine learning algorithms(MLAs)offer promising detection capabilities,their reliance on extensive feature engineering limits real-time applicability.Deep learning techniques mitigate this issue by automating feature extraction but may introduce computational overhead,affecting deployment efficiency.This research evaluates classical MLAs and deep learningmodels to enhance malware detection performance across diverse datasets.The proposed approach integrates a novel text and imagebased detection framework,employing an optimized Support Vector Machine(SVM)for textual data analysis and EfficientNet-B0 for image-based malware classification.Experimental analysis,conducted across multiple train-test splits over varying timescales,demonstrates 99.97%accuracy on textual datasets using SVM and 96.7%accuracy on image-based datasets with EfficientNet-B0,significantly improving zero-day malware detection.Furthermore,a comparative analysis with existing competitive techniques,such as Random Forest,XGBoost,and CNN-based(Convolutional Neural Network)classifiers,highlights the superior performance of the proposed model in terms of accuracy,efficiency,and robustness. 展开更多
关键词 Machine learning EffiicientNet B0 malimg dataset XceptionNet malware detection deep learning techniques support vector machines(SVM)
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
5
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Research Progress on Analysis and Detection Techniques of Veterinary Drug Residues in Animal Foods 被引量:3
6
作者 Bing LI Xuzheng ZHOU +3 位作者 Fusheng CHENG Xiaojuan WEI Weiwei Wang Jiyu ZHANG 《Agricultural Biotechnology》 CAS 2019年第5期60-64,69,共6页
As an important guarantee for the prevention and control of animal diseases,veterinary drugs have important functions in improving animal production performance and product quality and maintaining ecological balance.T... As an important guarantee for the prevention and control of animal diseases,veterinary drugs have important functions in improving animal production performance and product quality and maintaining ecological balance.They are an important guarantee for the healthy development of animal husbandry,food safety and public health.However,the irrational use and abuse of veterinary drugs and feed pharmaceutical additives are widespread,causing harmful substances in animal foods and damage to human health,and threatening the sustainable development of the environment and animal husbandry as well.In order to ensure human health,it is urgent to develop a simple,rapid,high-sensitivity,high-throughput and low-cost veterinary drug residue detection technology.In this paper,the sample pretreatment methods and detection techniques for the analysis of veterinary drug residues in animal foods were reviewed. 展开更多
关键词 ANIMAL FOOD VETERINARY DRUG RESIDUE SAMPLE preparation detection techniques
在线阅读 下载PDF
Bubble counter based on photoelectric technique for leakage detection of cryogenic valves 被引量:2
7
作者 Tao JIN Bin XU +1 位作者 Ke TANG Jian-ping HONG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第1期88-92,共5页
In order to overcome the inconvenience of manual bubble counting, a bubble counter based on photoelectric technique aiming for automatically detecting and measuring minute gas leakage of cryogenic valves is proposed. ... In order to overcome the inconvenience of manual bubble counting, a bubble counter based on photoelectric technique aiming for automatically detecting and measuring minute gas leakage of cryogenic valves is proposed. Experiments have been conducted on a self-built apparatus, testing the performance with different gas inlet strategies (bottom gas-inlet strategy and side gas-inlet strategy) and the influence of gas pipe length (0, 1, 2, 4, 6, 8, 10 m) and leakage rate (around 10, 20, 30, 40 bubbles/min) on first bubble time and bubble rate. A buffer of 110 cm3 is inserted between leakage source and gas pipe to simulate the down- stream cavum adjacent to the valve clack. Based on analyzing the experimental data, experiential parameters have also been summarized to guide leakage detection and measurement for engineering applications. A practical system has already been suc- cessfully applied in a cryogenic testing apparatus for cryogenic valves. 展开更多
关键词 Photoelectric technique Bubble counter Leakage detection
在线阅读 下载PDF
Ultrasound for Detection of Ascites and for Guidance of the Paracentesis Procedure: Technique and Review of the Literature 被引量:2
8
作者 Josh Ennis Geoffrey Schultz +3 位作者 Phillips Perera Sarah Williams Laleh Gharahbaghian Diku Mandavia 《International Journal of Clinical Medicine》 2014年第20期1277-1293,共17页
Objective: To review the use of ultrasound (US) for the detection of free intraperitoneal fluid (ascites) and for the procedural guidance of the paracentesis procedure. Methods: Two clinical vignettes are presented to... Objective: To review the use of ultrasound (US) for the detection of free intraperitoneal fluid (ascites) and for the procedural guidance of the paracentesis procedure. Methods: Two clinical vignettes are presented to review the pertinent diagnostic, management and safety considerations associated with paracentesis. First, US techniques used for the identification of ascites and in the quantification of fluid pockets amenable to aspiration will be discussed. Next, the actual steps required for the performance of US-guided paracentesis will be covered. A review and analysis of the most current literature regarding US and paracentesis then follows. Conclusion: Current literature favors US-guided paracentesis over the traditional blind technique with a significant reduction in both the rate of unsuccessful aspiration of fluid and in the bleeding complications related to this procedure. Use of US for both the diagnostic and therapeutic management of ascites should be advocated as an essential skill for physicians and other health care providers caring for these patients. 展开更多
关键词 ULTRASOUND for detection of ASCITES and for GUIDANCE of the PARACENTESIS Procedure: technique and Review of the Literature
暂未订购
New technologies and techniques to improve adenoma detection in colonoscopy 被引量:1
9
作者 Ashley Bond Sanchoy Sarkar 《World Journal of Gastrointestinal Endoscopy》 CAS 2015年第10期969-980,共12页
Adenoma detection rate(ADR) is a key component of colonoscopy quality assessment, with a direct link between itself and future mortality from colorectal cancer. There are a number of potential factors, both modifiable... Adenoma detection rate(ADR) is a key component of colonoscopy quality assessment, with a direct link between itself and future mortality from colorectal cancer. There are a number of potential factors, both modifiable and non-modifiable that can impact upon ADR. As methods, understanding and technologies advance, so should our ability to improve ADRs, and thus, reduce colorectal cancer mortality. This article will review new technologies and techniques that improve ADR, both in terms of the endoscopes themselves and adjuncts to current systems. In particular it focuses on effective techniques and behaviours, developments in image enhancement, advancement in endoscope design and developments in accessories that may improve ADR. It also highlights the key role that continued medical education plays in improving the quality of colonoscopy and thus ADR. The review aims to present a balanced summary of the evidence currently available and does not propose to serve as a guideline. 展开更多
关键词 COLORECTAL cancer ADENOMA detection Newtechnology techniques COLONOSCOPY
暂未订购
Detection Technique of Software-Induced Rowhammer Attacks 被引量:2
10
作者 Minkyung Lee Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2021年第4期349-367,共19页
Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access... Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes. 展开更多
关键词 Rowhammer attack static analysis detecting technique side-channel attack bit flip
在线阅读 下载PDF
Rapid <i>In-Vitro</i>and <i>In-Vitro</i>Detection of <i>Chalara fraxinea</i>by Means of Mass Spectrometric Techniques 被引量:1
11
作者 Thi Lam Huong Pham Irmtraut Zaspel +2 位作者 Michael Schuemann Heike Stephanowitz Eberhard Krause 《American Journal of Plant Sciences》 2013年第2期444-453,共10页
For the first time, mass spectrometric (MS) techniques were employed to rapidly detect the pathogen Chalara fraxinea in-vitro and directly in-vivo in tissues of diseased ash trees caused by C. fraxinea, using a range ... For the first time, mass spectrometric (MS) techniques were employed to rapidly detect the pathogen Chalara fraxinea in-vitro and directly in-vivo in tissues of diseased ash trees caused by C. fraxinea, using a range of characteristic novel secondary metabolites of C. fraxinea as chemical markers for the presence of the pathogen. We have found an evident correlation between the presence and amount of these-only for C. fraxinea characteristic and novel-secondary metabolites (named chalarafraxinines) and the degree of disease of respective infected ash seedlings. As demonstrated in this work, the MS based high-throughput-screening approach constitute an alternative to the time consuming and expensive micro biological isolation procedures for detection of the pathogen C. fraxinea and furthermore, can be used to rapidly test ash genotypes for resistance / susceptibility to C. fraxinea infection. 展开更多
关键词 Chalara fraxinea RAPID In-Vitro In-Vitro detection MS techniqueS MALDI LC-MS
暂未订购
Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique 被引量:1
12
作者 Husam Ahmad Al Hamad Mohammad Shehab 《Computers, Materials & Continua》 SCIE EI 2024年第5期2015-2034,共20页
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr... Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset. 展开更多
关键词 Arabic handwritten SEGMENTATION image processing ligature detection technique intelligent recognition
在线阅读 下载PDF
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique 被引量:1
13
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +3 位作者 M.A.Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat 《Computers, Materials & Continua》 SCIE EI 2021年第7期77-102,共26页
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult... The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes. 展开更多
关键词 Text watermarking tamper detection AUTHENTICATION quranic text exclusive-or operation queuing technique
在线阅读 下载PDF
Fast Semantic Duplicate Detection Techniques in Databases
14
作者 Ibrahim Moukouop Nguena Amolo-Makama Ophélie Carmen Richeline 《Journal of Software Engineering and Applications》 2017年第6期529-545,共17页
Semantic duplicates in databases represent today an important data quality challenge which leads to bad decisions. In large databases, we sometimes find ourselves with tens of thousands of duplicates, which necessitat... Semantic duplicates in databases represent today an important data quality challenge which leads to bad decisions. In large databases, we sometimes find ourselves with tens of thousands of duplicates, which necessitates an automatic deduplication. For this, it is necessary to detect duplicates, with a fairly reliable method to find as many duplicates as possible and powerful enough to run in a reasonable time. This paper proposes and compares on real data effective duplicates detection methods for automatic deduplication of files based on names, working with French texts or English texts, and the names of people or places, in Africa or in the West. After conducting a more complete classification of semantic duplicates than the usual classifications, we introduce several methods for detecting duplicates whose average complexity observed is less than O(2n). Through a simple model, we highlight a global efficacy rate, combining precision and recall. We propose a new metric distance between records, as well as rules for automatic duplicate detection. Analyses made on a database containing real data for an administration in Central Africa, and on a known standard database containing names of restaurants in the USA, have shown better results than those of known methods, with a lesser complexity. 展开更多
关键词 SEMANTIC DUPLICATE detection technique detection CAPABILITY Automatic DEDUPLICATION detection Rates and Error Rates
暂未订购
Progress and Developmental Direction of Post-harvest Component Detection and Preservation Techniques of Nanfeng Citrus in China
15
作者 Xiaoyi LONG Chuying CHEN Jinyin CHEN 《Agricultural Biotechnology》 CAS 2014年第5期29-33,共5页
This paper was summarized the research status and the development tendency of post-harvest component detection and preservation techniques of Nanfeng citrus in China, also analyzed the characteristics of various techn... This paper was summarized the research status and the development tendency of post-harvest component detection and preservation techniques of Nanfeng citrus in China, also analyzed the characteristics of various techniques, and proposed the developmental direction of novel techniques for post-harvest component detection and preservation of Nanfeng citrus. 展开更多
关键词 Nanfeng citrus Component detection Preservation technique Developmental direction
在线阅读 下载PDF
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
16
作者 Matthew Abu John Ibukunoluwa Bankole +3 位作者 Oluwatayo Ajayi-Moses Tofunmi Ijila Timilehin Jeje Patil Lalit 《American Journal of Plant Sciences》 2023年第11期1260-1295,共36页
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow... Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being. 展开更多
关键词 Disease Management detection techniques Advanced detection SUSTAINABILITY Science-Policy Food Security
暂未订购
An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces
17
作者 Sheetal Sharma Kamali Gupta +2 位作者 DeepaliGupta Shalli Rani Gaurav Dhiman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2029-2059,共31页
The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness... The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things. 展开更多
关键词 ERROR fault detection techniques sensor faults OUTLIERS Internet of Things
在线阅读 下载PDF
Detection and Diagnosis of Gear Fault By the Single Gear Tooth Analysis Technique 被引量:1
18
作者 MENG Tao, LIAO Ming-fu Institute of Monitoring and Control for Rotating Machinery and Wind- turbines (NPU&TU Berlin), Northwestern Polytechnical University(NPU), Xi′an 710072, P.R.China 《International Journal of Plant Engineering and Management》 2003年第3期141-148,共8页
This paper presents a procedure of sing le gear tooth analysis for early detection and diagnosis of gear faults. The objec tive of this procedure is to develop a method for more sensitive detection of th e incipient ... This paper presents a procedure of sing le gear tooth analysis for early detection and diagnosis of gear faults. The objec tive of this procedure is to develop a method for more sensitive detection of th e incipient faults and locating the faults in the gear. The main idea of the sin gle gear tooth analysis is that the vibration signals collected with a high samp ling rate are divided into a number of segments with the same time interval. The number of signal segments is equal to that of the gear teeth. The analysis of i ndividual segments reveals more sensitively the changes of the vibration signals in both time and frequency domain caused by gear faults. In addition, the locat ion of a failed tooth can be indicated in terms of the position of the segment t hat deviates from the normal segments. An experimental investigation verified th e advantages of the single gear tooth analysis. 展开更多
关键词 FIGURE of detection and Diagnosis of Gear Fault By the Single Gear Tooth Analysis technique
在线阅读 下载PDF
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
19
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 Cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
在线阅读 下载PDF
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques
20
作者 Md. Mijanur Rahman Anuva Rani Saha 《Journal of Information Security》 2019年第3期188-197,共10页
ATM card fraud is increasing gradually with the expansion of modern technology and global communication. In the whole world, it is resulting in the loss of billions of dollars each year. Fraud detection systems have b... ATM card fraud is increasing gradually with the expansion of modern technology and global communication. In the whole world, it is resulting in the loss of billions of dollars each year. Fraud detection systems have become essential for all ATM card issuing banks to minimize their losses. The main goals are, firstly, to review alternative techniques that have been used in fraud detection and secondly compare and analyze these techniques that are already used in ATM card fraud detection. Recently different card security systems used different fraud detection techniques;these techniques are based on neural network, genetic algorithm, hidden Markov model, Bayesian network, decision tree, clustering method, support vector machine, etc. According to our survey, the most important parameters used for comparing these fraud detection systems are accuracy, speed and cost of fraud detection. This study is very useful for any ATM card provider to choose an appropriate solution for fraud detection problem and also enable us to build a hybrid approach for developing some effective algorithms which can perform properly on fraud detection mechanism. 展开更多
关键词 ATM CARD FRAUD detection PREVENTION Technology Supervised and UNSUPERVISED technique
暂未订购
上一页 1 2 137 下一页 到第
使用帮助 返回顶部