搜索结果: 1-15 共查到“计算机科学技术 detection”相关记录97条 . 查询时间(0.228 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
2023/4/28
DEEP CONVOLUTIONAL NEURAL NETWORK FOR AUTOMATIC DETECTION OF DAMAGED PHOTOVOLTAIC CELLS
UAV, monitoring/inspection Anomaly Detection Deep Learning Photovoltaic Panels Thermography Classification
2018/6/4
The number of distributed Photovoltaic (PV) plants that produce electricity has been significantly increased, and issue of monitoring and maintaining a PV plant has become of great importance and invo...
DEEP LEARNING AND IMAGE PROCESSING FOR AUTOMATED CRACK DETECTION AND DEFECT MEASUREMENT IN UNDERGROUND STRUCTURES
Deep Learning Automated Crack Detection Photographic Tunnelling Surveys
2018/6/4
This work presents the combination of Deep-Learning (DL) and image processing to produce an automated cracks recognition and defect measurement tool for civil structures. The authors focus on tunnel c...
ENHANCEMENT OF FAST FACE DETECTION ALGORITHM BASED ON A CASCADE OF DECISION TREES
Face Detection Cascade Algorithm Decision Trees
2017/6/19
Face detection algorithm based on a cascade of ensembles of decision trees (CEDT) is presented. The new approach allows detecting faces other than the front position through the use of multiple classi...
LESION DETECTION IN CT IMAGES USING DEEP LEARNING SEMANTIC SEGMENTATION TECHNIQUE
Deep Neural Networks Convolutional Neural Networks Semantic Segmentation Chest Radiography Tuberculosis
2017/6/19
In this paper, the problem of automatic detection of tuberculosis lesion on 3D lung CT images is considered as a benchmark for testing out algorithms based on a modern concept of Deep Learning. For tr...
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
Towards Automated Detection Buffer Overrun Vulnerabilities
2016/5/24
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as...
Scalable Error Detection using Boolean Satisfiability
Program analysis error detection boolean satisfiability
2016/5/24
We describe a software error-detection tool that exploits recent advances in boolean satisfiability (SAT) solvers. Our analysis is path sensitive, precise down to the bit level, and models pointers an...
The term soundness originated in mathematical logic: a deductive system is sound with respect to a semantics if it only proves valid arguments. This concept naturally extends to the context of optimiz...
Saturn is a boolean satisfiability (SAT) based framework for static bug detection. It targets software written in C and is designed to support a wide range of property checkers.
Context- and Path-Sensitive Memory Leak Detection
Program analysis error detection memory management memory leaks boolean satisfiability
2016/5/24
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying escape analysis: any a...
Effective Static Race Detection for Java
static race detection Java synchronization concurrency multi-threading
2016/5/24
We present a novel technique for static race detection in Java programs,comprised of a series of stages that employ a combination of static analyses to successively reduce the pairs of memory accesses...
Static Detection of Security Vulnerabilities in Scripting Languages
Static Detection Security Vulnerabilities Scripting Languages
2016/5/24
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier ar...
Conditional Must Not Aliasing for Static Race Detection
static race detection Java synchronization concurrency multi-threading
2016/5/24
Race detection algorithms for multi-threaded programs using the common lock-based synchronization idiom must correlate locks with the memory locations they guard. The heart of a proof of race freedom ...
Static Error Detection Using Semantic Inconsistency Inference
Static analysis error detection satisfiability inconsistency
2016/5/24
Inconsistency checking is a method for detecting software errors that relies only on examining multiple uses of a value. We propose that inconsistency inference is best understood as a variant of the ...
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful supercomputers: using logs r...