Rozprawy doktorskie na temat „Detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Kapoor, Prince. "Shoulder Keypoint-Detection from Object Detection". Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38015.
Pełny tekst źródłaLaxhammar, Rikard. "Conformal anomaly detection : Detecting abnormal trajectories in surveillance applications". Doctoral thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8762.
Pełny tekst źródłaAlbrektsson, Fredrik. "Detecting Sockpuppets in Social Media with Plagiarism Detection Algorithms". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208553.
Pełny tekst źródłaAllteftersom nya former av propaganda och informationskontroll sprider sig över internet krävs också nya sätt att identifiera dessa. En allt mer populär metod för att sprida falsk information på mikrobloggar som Twitter är att göra det från till synes ordinära, men centralt kontrollerade och koordinerade användarkonton – på engelska kända som “sockpuppets”. I denna undersökning testar vi ett antal potentiella metoder för att identifiera dessa genom att applicera plagiatkontrollalgoritmer ämnade för text, och utvärderar deras prestanda mot denna sortens hot. Vi identifierar framför allt en typ av algoritm – den som nyttjar vektorrymdsmodellering av text – som speciellt användbar i detta avseende.
Le, Anhtuan. "Intrusion Detection System for detecting internal threats in 6LoWPAN". Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/21958/.
Pełny tekst źródłaOlsson, Jonathan. "Detecting Faulty Piles of Wood using Anomaly Detection Techniques". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83061.
Pełny tekst źródłaPrevot, Yohan. "Arterial perfusion detection method by synchronous detection". [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001385.
Pełny tekst źródłaChau, Sam. "Investigation of silicon PIN-detector for laser pulse detection". Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-325.
Pełny tekst źródłaThis report has been written at SAAB Bofors Dynamics (SBD) AB in Gothenburg at the department of optronic systems.
In military observation operations, a target to hit is chosen by illumination of a laser designator. From the targetpoint laser radiation is reflected on a detector that helps identify the target. The detector is a semiconductor PIN-type that has been investigated in a laboratory environment together with a specially designed laser source. The detector is a photodiode and using purchased components, circuits for both the photodiode and the laserdiode has been designed and fabricated. The bandwidth of the op-amp should be about 30 MHz, in the experiments a bandwidth of 42 MHz was used. Initially the feedback network, which consists of a 5.6 pF capacitor in parallel with a 1-kohm resistor determined the bandwidth. To avoid the op-amp saturate under strong illuminated laser radiation the feedback network will use a 56-pF capacitor and a 100-ohm resistor respectively.
The laser should be pulsed with 10-20 ns width, 10 Hz repetition frequency, about 800 nm wavelength and a maximum output power of 80 mW. To avoid electrical reflection signals at measurement equipment connections, the laser circuit includes a resistor of about 50 ohm, that together with the resistance in the laserdiode forms the right termination that eliminate the reflection signals. The wire-wound type of resistor shall be avoided in this application and instead a surface mounted type was beneficial with much lower inductance. The detector showed a linear behaviour up to 40-mW optical power. Further investigation was hindered by the breakdown of the laserdiodes. The function generator limits the tests to achieve 80 mW in light power. In different experiments the responsivity of the photodiode is different from the nominal value, however it would have required more time to investigate the causes.
Chang, Pi-Jung. "Double Chooz neutrino detector: neutron detection systematic errors and detector seasonal stability". Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16861.
Pełny tekst źródłaDepartment of Physics
Glenn Horton-Smith
In March 2012, the Double Chooz reactor neutrino experiment published its most precise result so far: sin[superscript]2 2theta13 = 0.109 +/- 0.030(stat.) +/- 0.025(syst.). The statistical significance is 99.8% away from the no-oscillation hypothesis. The systematic uncertainties from background and detection efficiency are smaller than the first publication of the Double Chooz experiment. The neutron detection efficiency, one of the biggest contributions in detection systematic uncertainties, is a primary topic of this dissertation. The neutron detection efficiency is the product of three factors: the Gd-capture fraction, the efficiency of time difference between prompt and delayed signals, and the efficiency of energy containment. [superscript]252 Cf is used to determine the three factors in this study. The neutron detection efficiency from the [superscript]252 Cf result is confirmed by the electron antineutrino data and Monte Carlo simulations. The systematic uncertainty from the neutron detection efficiency is 0.91% used in the sin[superscript]2 2theta13 analysis. The seasonal variation in detector performance and the seasonal variations of the muon intensity are described in detail as well. The detector stability is confirmed by observation of two phenomena: 1) the [electron antineutrino] rate, which is seen to be uncorrelated with the liquid scintillator temperature, and 2) the daily muon rate, which has the expected correspondence with the effective atmospheric temperature. The correlation between the muon rate and effective atmospheric temperature is further analyzed in this thesis to determine the ratio of kaon to pion in the local atmosphere. An upper limit on instability of the neutron detection efficiency is established in the final chapter. The systematic error, 0.13%, from the relative instability is the deviation of the calibration runs. This thesis concludes with the potential systematic errors of neutron detection efficiency and estimation of how these potential systematic errors affect the result of sin[superscript]2 2theta13.
Wang, Jinghui. "Evaluation of GaN as a Radiation Detection Material". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1343316898.
Pełny tekst źródłaFrascarelli, Antonio Ezio. "Object Detection". Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28259.
Pełny tekst źródłaMacey, Paul Michael. "Apnoea detection". Thesis, University of Canterbury. Electrical and Electronic Engineering, 1998. http://hdl.handle.net/10092/6888.
Pełny tekst źródłaVella, Mark Joseph. "Distress detection". Thesis, University of Strathclyde, 2012. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=27534.
Pełny tekst źródłaMustamo, P. (Pirkko). "Object detection in sports:TensorFlow Object Detection API case study". Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201802081173.
Pełny tekst źródłaKohteentunnistusta käytetään yleisesti urheilumaailmassa, mm. valmennuksessa, televisiolähetyksissä sekä fanikäytössä. Neuroverkkoihin perustuvia menetelmiä käytetään yhdessä muiden tekniikoiden kanssa. Tämän tutkimuksen päämäärä oli tarkastella moderneja avoimen lähdekoodin ratkaisuja kohteentunnistukseen urheilussa, tässä tapauksessa jalkapalloilijoiden tunnistuksessa. TensorFlow Object Detection API perustuu avoimeen lähdekoodiin ja tarjoaa työkaluja kohteentunnistukseen. Sen avulla opetettiin ja testattiin SSD (Single-Shot Multibox Detector) with Mobilenet- mallia sekä a) valmiiksi treenattuna että b) hienosäädettynä aineistolla, joka koostui kahdesta jalkapallo-otteluvideosta poimituista kuvista. Työssä tarkasteltiin seuraavia hypoteeseja: 1) Valmiiksi opettettu malli ei toimi ilman hienosäätöä omalle aineistolle. 2) Hienosäädetty malli toimii kohtuullisen hyvin omalle aineistolle. 3) Hienosäädetyllä mallilla on ongelmia toisensa peittävien tai takaseinää vasten kuvattujen pelaajien tunnistamisessa. 4) Mallin opettaminen vaihtelevammalla aineistolla parantaa tuloksia uudenlaisia esineitä tunnistettaessa. Tutkimuksen tulosten perusteella: 1) Valmiiksi opetettu malli oli hyödytön tämän datan käsittelyssä. 2) Hienosäädetty malli toimi kohtalaisen hyvin. 3) Hienosäädetyllä mallilla oli ongelmia toisensa peittävien tai takaseinää vasten kuvattujen pelaajien tunnistamisessa. 4) Yhdestä pelistä saadulla aineistolla opetettu malli tunnisti pelaajat toisesta pelistä kohtalaisen hyvin. Mallin toiminta ei juurikaan parantunut kun se opetettiin molemmista peleistä koostetulla aineistolla. Muita mallityyppejä (kuten Faster R-CNN model) pitäisi testata tällä datalla
Zilch, Lloyd W. "Image charge detection and image charge detection mass spectrometry". [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344616.
Pełny tekst źródłaTitle from home page (viewed Oct. 8, 2009). Source: Dissertation Abstracts International, Volume: 70-02, Section: B, page: 0994. Adviser: Martin F. Jarrold.
Yerra, Rajiv. "Detecting Similar HTML Documents Using A Sentence-Based Copy Detection Approach". Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd977.pdf.
Pełny tekst źródłaJenner, Mareike. ""Follow the evidence"? : methods of detection in American TV detective drama". Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/973dbcaf-5796-42c5-a044-b51252c91b66.
Pełny tekst źródłaGranath, Linus, i Andreas Strid. "Detecting the presence of people in a room using motion detection". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20099.
Pełny tekst źródłaLiu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems". Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-123).
Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection methods to quickly and accurately detect ICS cyber attacks. Two fundamental challenges in developing ICS cyber attack detection methods are the lack of historical attack data and the ability of attackers to make their malicious activity appear normal. The goal of this thesis is to develop methods which generalize well to anomalies that are not included in the training data and to increase the sensitivity of detection methods without increasing the false alarm rate. The thesis presents and analyzes a baseline detection method, the multivariate Shewhart control chart, and four extensions to the Shewhart chart which use machine learning or optimization methods to improve detection performance. Two of these methods, stationary subspace analysis and maximized ratio divergence analysis, are based on dimensionality reduction techniques, and an additional model-based method is implemented using residuals from LASSO regression models. The thesis also develops an ensemble method which uses an optimization formulation to combine the output of multiple models in a way that minimizes detection delay. When evaluated on 380 samples from the Kasperskey Tennessee Eastman process dataset, a simulated chemical process that includes disruptions from cyber attacks, the ensemble method reduced detection delay on attack data by 12% (55 minutes) on average when compared to the baseline method and was 9% (42 minutes) faster on average than the method which performed best on training data.
by Jessamyn Liu.
S.M.
S.M. Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center
Pretz, John. "Detection of atmospheric muon neutrinos with the IceCube 9-String Detector". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/4163.
Pełny tekst źródłaThesis research directed by: Physics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Erickson, Anna S. "Remote detection of fissile material : Cherenkov counters for gamma detection". Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/76496.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 161-167).
The need for large-size detectors for long-range active interrogation (Al) detection has generated interest in water-based detector technologies. AI is done using external radiation sources to induce fission and to detect, identify, and characterize special nuclear material (SNM) through the gamma rays and neutrons emitted. Long-range applications require detectors with a large solid angle and an ability to significantly suppress lowenergy background from linear electron accelerators. Water Cherenkov Detectors (WCD) were selected because of their transportability, scalability, and an inherent energy threshold. The main objective of this thesis was to design a large-size WCD capable of detecting gamma rays and to demonstrate particle energy discrimination ability. WCD was modeled in detail using Geant4 for optimization purposes. The experimental detector is composed of an aluminum body with a high efficiency (98.5%) diffuse reflector. Cherenkov photons are detected with six 8" hemispherical Hamamatsu photomultiplier tubes (PMT). PMTs are calibrated using two monoenergetic LEDs. The detector was shown to successfully detect gamma rays of energies above the Cherenkov threshold. The detector was able to discriminate between various sources, such as ⁶⁰Co and ²³²Th, even though WCD are known for their poor energy resolution. The detector design and analysis was completed, and it was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. One of the accomplishments of this thesis was demonstration of event reconstruction capability of the detector system. A full-detector model was created using Geant4 simulation toolkit. The performance of the detector was predicted using the model and then experimentally verified. The qualitative agreement between the model and the experiment was observed. The event reconstruction was an important part of the detector performance analysis. Post-experimental data processing was done using ROOT.
by Anna S. Erickson.
Ph.D.
Kaatz, Miriam. "Impedimetric DNA detection : towards improved detection schemes for sensor integration". Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/17890.
Pełny tekst źródłaGonzalez-Garcia, Abel. "Image context for object detection, object context for part detection". Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/28842.
Pełny tekst źródłaJakobsson, Uno, i Martin Andréasson. "Wildlife Detection Network". Thesis, Högskolan i Halmstad, Sektionen för ekonomi och teknik (SET), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17765.
Pełny tekst źródłaStåhl, Björn. "Online Anomaly Detection". Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2825.
Pełny tekst źródłaWen, Shihua. "Semiparametric cluster detection". College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7204.
Pełny tekst źródłaThesis research directed by: Mathematical Statistics. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Malek, Esmaeili Mani. "Multimedia copy detection". Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44581.
Pełny tekst źródłaFoisy, André. "Robust collision detection". Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28746.
Pełny tekst źródłaSince the computer representation of real numbers is finite, an interval projective point is used to encompass all localization errors of a modeled point. An interval point is the elementary geometrical form from which all others are constructed. The Euclidean convex set spanned by an interval point is also a polytope.
The construction of a polytope relies on a robust convex hull algorithm. The computed hull is guaranteed to contain all interval projective points.
An extrusion based collision detection algorithm builds an AND-OR decision tree. Each leaf is a univariate function that expresses the relation between a moving point and a moving plane. Interval zero finding methods are applied to find the overlap and non-overlap portions of the trajectories of moving polytopes.
The swept-volume based collision detection algorithm depends on the construction of a convex approximation that comprises the real swept volume. To obtain a convex approximation, the convex hull algorithm is applied to the bounding volumes of the vertices of a moving polytope. Each bounding volume is an interval projective point.
Finally, both collision detection algorithms are tested in the context of generate-and-test path planning.
Espinosa-Romero, Arturo. "Situated face detection". Thesis, University of Edinburgh, 2001. http://hdl.handle.net/1842/6667.
Pełny tekst źródłaKalal, Zdenek. "Tracking learning detection". Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.540948.
Pełny tekst źródłaOhlson, Frida, i Nadim Al-Mosawi. "Occupant Detection System". Thesis, Högskolan i Halmstad, Bio- och miljösystemforskning (BLESS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28617.
Pełny tekst źródłaElsenbroich, Corinna Julia. "Instinct for detection". Thesis, King's College London (University of London), 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.430430.
Pełny tekst źródłaLafis, S. "Rapid microbial detection". Thesis, Cranfield University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357505.
Pełny tekst źródłaDoney, George Daniel. "Acoustic boiling detection". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/28110.
Pełny tekst źródłaAlzarooni, K. M. A. "Malware variant detection". Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1347243/.
Pełny tekst źródłaKemp, E., M. Floyd, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click i J. Gorniewicz. "IPV Detection Strategies". Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6406.
Pełny tekst źródłaFloyd, M., E. Kemp, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click i J. Gorniewicz. "IPV Detection Strategies". Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6416.
Pełny tekst źródłaEnt, Petr. "Voice Activity Detection". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235483.
Pełny tekst źródłaMatos, Diogo Silva. "Person detection system". Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23853.
Pełny tekst źródłaO RADAR é para fins militares já relativamente antigo que sofreu um grande impulso durante a Segunda Guerra Mundial. Hoje em dia existe um forte desenvolvimento no RADAR em aplicações de navegação ou vigilância/segurança. Esta dissertação surge no seguimento destas novas aplicações, em que se pretende o desenvolvimento de um RADAR de baixo custo que permita ao utilizador detetar pessoas, bem como, os seus movimentos através de paredes ou objetos opacos. O desenvolvimento deste RADAR recaiu em tecnologias emergentes como antenas adaptativas e rádio definido por software que permitem uma grande versatilidade e adaptação em termos de aplicações. A utilização de um RADAR com múltiplas entradas e múltiplas saídas fornece uma maior diversidade de informação que garante mais probabilidades de deteção. A aplicação de técnicas digitais de beamforming, possibilita conhecer a posição e o movimento da pessoa. Com a implementação destas técnicas um protótipo capaz de detetar pessoas e os seus movimentos através de paredes e tijolos foi desenvolvido com sucesso solucionando o problema inicial. Na fase de projeto de RADAR houve necessidade de caracterizar a propagação de ondas de rádio em materiais de construção, como tijolos e madeira, medindo-se a sua atenuação. Deste modo foi possível fazer o balanço de potencia para varios canarios.
The RADAR is already relatively old for military purposes that underwent a major development during World War II. Nowadays there is a strong development in RADAR in navigation or surveillance/security applications. This dissertation follows on from these new applications, which aim to develop a low cost RADAR that allows the user to detect people as well as their movements through walls or opaque objects. The development of this RADAR has relied on emerging technologies such as adaptive antennas and SDR that allow for great versatility and adaptation in terms of applications. The use of a MIMO RADAR provides a greater diversity of information that guarantees more probabilities of detection and the application of digital techniques of beamforming, allows to know the position and the movement of the person. With the implementation of these techniques a prototype capable of detecting people and their movements through walls and bricks was successfully developed solving the initial problem. In the RADAR design phase it was necessary to characterize the propagation of radio waves in building materials, such as bricks and wood, by measuring their attenuation. In this way it was possible to perform the power balance for several scenarios.
O'Keefe, Eion Seiorse. "Polymer chemiluminescence detection". Thesis, University of Sussex, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.238667.
Pełny tekst źródłaPark, Sean. "Neural malware detection". Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/173759.
Pełny tekst źródłaDoctor of Philosophy
Barascud, Nicolas. "Auditory pattern detection". Thesis, University College London (University of London), 2014. http://discovery.ucl.ac.uk/1458387/.
Pełny tekst źródłaRogers, Stuart Craig. "Defect Detection Microscopy". BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2256.
Pełny tekst źródłaButler, Joseph G. "Automated Fingertip Detection". BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3164.
Pełny tekst źródłaPark, Jea Woo. "Lithography Hotspot Detection". PDXScholar, 2017. https://pdxscholar.library.pdx.edu/open_access_etds/3781.
Pełny tekst źródłaGarcia, Hurtado J. (Juan). "Indoor outdoor detection". Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906062479.
Pełny tekst źródła姚志霖. "Vehicle detection using endpoint detection method for FMCW radar detector". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/77448172476508925617.
Pełny tekst źródłaKarademir, SARUHAN. "DETECTING PDF JAVASCRIPT MALWARE USING CLONE DETECTION". Thesis, 2013. http://hdl.handle.net/1974/8387.
Pełny tekst źródłaThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2013-09-30 11:50:15.156
Lotspeich, Erica H. "Evaluation of the Odor Compounds Sensed by Explosive-Detecting Canines". 2011. http://hdl.handle.net/1805/2473.
Pełny tekst źródłaTrained canines are commonly used as biological detectors for explosives; however, there are some areas of uncertainty that have led to difficulties in canine training and testing. Even though a standardized container for determining the accuracy of explosives-detecting canines has already been developed, the factors that govern the amount of explosive vapor that is present in the system are often uncertain. This has led to difficulties in comparing the sensitivity of canines to one another as well as to analytical instrumentation, despite the fact that this container has a defined headspace and degree of confinement of the explosive. For example, it is a common misconception that the amount of explosive itself is the chief contributor to the amount of odor available to a canine. In fact, odor availability depends not only on the amount of explosive material, but also the explosive vapor pressure, the rate with which the explosive vapor is transported from its source and the degree to which the explosive is confined. In order to better understand odor availability, headspace GC/MS and mass loss experiments were conducted and the results were compared to the Ideal Gas Law and Fick’s Laws of Diffusion. Overall, these findings provide increased awareness about availability of explosive odors and the factors that affect their generation; thus, improving the training of canines. Another area of uncertainty deals with the complexity of the odor generated by the explosive, as the headspace may consist of multiple chemical compounds due to the extent of explosive degradation into more (or less) volatile substances, solvents, and plasticizers. Headspace (HS) and solid phase microextraction (SPME) coupled with gas chromatography/mass spectrometry (GC/MS) were used to determine what chemical compounds are contained within the headspace of an explosive as well as NESTT (Non-Hazardous Explosive for Security Training and Testing) products. This analysis concluded that degradation products, plasticizers, and taggants are more common than their parent explosive.
Chiu, Chin-Chi, i 邱敬棋. "Using Edge Detection Combined with Feature Detection for Moving Object Detection". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b32ygd.
Pełny tekst źródła國立臺灣師範大學
機電工程學系
105
This thesis is detecting object for moving images. Nowadays, there are many methods for moving object detection on surveillance, and the method used is to find features and then to use the motion of those features between images to calculate features points moving. But the feature points sometimes are more difficult to define because the objects moving are easy to make images blur. Especially, when the objects may not be known in advance. In this thesis, using SURF algorithm defines the features of motional images because it detecting speed is faster than SIFT. But whether it is SIFT or SURF when the detected object moves, the matching result is not as good as expected because the objects may have incorrect feature points on moving. In the thesis, we provide edge and feature detection to combine for increasing the feature matching. In addition, this study we use a lot of different detection to detect and calculate the correct feature points to analyze. In experiment, we can further understand our methods getting the better ability to identify compared to the traditional methods.
Teh-Chung, Chen. "Detecting Visually Similar Web Pages: Application to Phishing Detection". Phd thesis, 2011. http://hdl.handle.net/10048/1682.
Pełny tekst źródłaSoftware Engineering and Intelligent Systems