Search results for: intent detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3630

Search results for: intent detection

3630 Looking Elsewhere for Job: Relationship between Procedural Justice and Survivors’ Turnover Intent in Consolidated Nigeria Banks

Authors: Fasanmi Samuel Sunday

Abstract:

The study examines the relationship between procedural justice and turnover intent among survivors in a consolidated Nigeria bank. Opinions of eight hundred and eighty five staff of First City Monumental Bank and Finbank who survived the consolidated process were conveniently sampled using battery of tests. Two hypotheses were tested for this study. Results revealed that procedural justice and demographic variables (sex, age, previous banking job experience, and year of work experience) were significantly, independently and jointly influence turnover intent among survivors in consolidated banks in Nigeria. Also, there was a significant relationship between procedural justice and turnover intent among survivors in a consolidated bank in Nigeria. It was recommended that if the workers perceived the process of downsizing to be fair, they tend to reason with their management and coast along with the process rather than increasing in their turnover intent which will eventually drastically reduce the profitability matrix which the banks desired so desperately.

Keywords: bankers, procedural justice, sex, turnover intent

Procedia PDF Downloads 513
3629 Assertion-Driven Test Repair Based on Priority Criteria

Authors: Ruilian Zhao, Shukai Zhang, Yan Wang, Weiwei Wang

Abstract:

Repairing broken test cases is an expensive and challenging task in evolving software systems. Although an automated repair technique with intent preservation has been proposed, but it does not take into account the association between test repairs and assertions, leading to a large number of irrelevant candidates and decreasing the repair capability. This paper proposes an assertion-driven test repair approach. Furthermore, an intent-oriented priority criterion is raised to guide the repair candidate generation, making the repairs closer to the intent of the test. In more detail, repair targets are determined through post-dominance relations between assertions and the methods that directly cause compilation errors. Then, test repairs are generated from the target in a bottom-up way, guided by the intent-oriented priority criteria. Finally, the generated repair candidates are prioritized to match the original test intent. The approach is implemented and evaluated on the benchmark of 4 open-source programs and 91 broken test cases. The result shows that the approach can fix 89% (81/91) of broken test cases, which is more effective than the existing intentpreserved test repair approach, and our intent-oriented priority criteria work well.

Keywords: test repair, test intent, software test, test case evolution

Procedia PDF Downloads 129
3628 The Roles of Pay Satisfaction and Intent to Leave on Counterproductive Work Behavior among Non-Academic University Employees

Authors: Abiodun Musbau Lawal, Sunday Samson Babalola, Uzor Friday Ordu

Abstract:

Issue of employees counterproductive work behavior in government owned organization in emerging economies has continued to be a major concern. This study investigated the factors of pay satisfaction, intent to leave and age as predictors of counterproductive work behavior among non-academic employee in a Nigerian federal government owned university. A sample of 200 non-academic employees completed questionnaires. Hierarchical multiple regression was conducted to determine the contribution of each of the predictor variables on the criterion variable on counterproductive work behavior. Results indicate that age of participants (β = -.18; p < .05) significantly independently predicted CWB by accounting for 3% of the explained variance. Addition of pay satisfaction (β = -.14; p < .05) significantly accounted for 5% of the explained variance, while intent to leave (β = -.17; p < .05) further resulted in 8% of the explained variance in counterproductive work behavior. The importance of these findings with regards to reduction in counterproductive work behavior is highlighted.

Keywords: counterproductive, work behaviour, pay satisfaction, intent to leave

Procedia PDF Downloads 383
3627 The Impact of Level and Consequence of Service Co-Recovery on Post-Recovery Satisfaction and Repurchase Intent

Authors: Chia-Ching Tsai

Abstract:

In service delivery, interpersonal interaction is the key to customer satisfaction, and apparently, the factor of human is critical in service delivery. Besides, customers quite care about the consequences of co-recovery. Thus, this research focuses on service failure caused by other customers and uses a 2x2 factorial design to investigate the impact of consequence and level of service co-recovery on post-recovery satisfaction and repurchase intent. 150 undergraduates were recruited as participants, and assigned to one of the four cells randomly. Every participant was requested to read the scenario and then rated the post-recovery satisfaction and repurchase intent. The results show that under the condition of failed co-recovery, level of co-recovery has no effect on post-recovery satisfaction, while under the condition of successful co-recovery, high-level co-recovery causes significantly higher post-recovery satisfaction than low-level co-recovery. Moreover, post-recovery satisfaction has significantly positive impact on repurchase intent. In the system of service delivery, customers interact with other customers frequently. Therefore, comparing with the literature, this research focuses on the service failure caused by other customers. This research also supplies a better understanding of customers’ view on consequences of different levels of co-recovery, which is helpful for the practitioners to make use of co-recovery.

Keywords: service failure, service co-recovery, consequence of co-recovery, level of co-recovery, post-recovery satisfaction, repurchase intent

Procedia PDF Downloads 420
3626 Modeling False Statements in Texts

Authors: Francielle A. Vargas, Thiago A. S. Pardo

Abstract:

According to the standard philosophical definition, lying is saying something that you believe to be false with the intent to deceive. For deception detection, the FBI trains its agents in a technique named statement analysis, which attempts to detect deception based on parts of speech (i.e., linguistics style). This method is employed in interrogations, where the suspects are first asked to make a written statement. In this poster, we model false statements using linguistics style. In order to achieve this, we methodically analyze linguistic features in a corpus of fake news in the Portuguese language. The results show that they present substantial lexical, syntactic and semantic variations, as well as punctuation and emotion distinctions.

Keywords: deception detection, linguistics style, computational linguistics, natural language processing

Procedia PDF Downloads 218
3625 Changes in Knowledge and Awareness for a Community-Based Cancer Screening Educational Program

Authors: Shenghui Wu, Patricia Chalela, Amelie G. Ramirez

Abstract:

Background: Cervical cancer (CC), colorectal cancer (CRC), and breast cancer (BC) are diseases that can be prevented/detected through early test. Through educational programs, individuals can become better informed about these cancers and understand the importance of screening and early detection. A community-based educational program was developed to improve knowledge and awareness toward the screening of the three cancer types in a South Texas underserved population. Methods: Residents living in Laredo, Texas were invited to participate in the present study. From January 2020 to April 2021, participants were recruited using social media and flyer distributions in general community. Participants received a free live web cancer education presentation delivered by bilingual community health educators, and online pre- and post-education surveys for CC, CRC, and BC separately. Pre-post changes in knowledge for individual items were compared using McNemar’s chi-squared tests. Results: Overall, participants demonstrated increases in CC (n=237), CRC (n=59), and BC (n=56) screening knowledge and awareness after receiving the cancer screening education (Ps<0.05). After receiving the cancer screening education, 85-97% of participants had an intent to talk to a healthcare provider about CC/CRC/BC screening, 88-97% had an intent to get a CC/CRC/BC screening test in the next 12 months or at the next routine appointment, and 90-97% had an intent to talk about CC/CRC/BC with their family members or friends. Conclusion: A community-based educational program can help increase knowledge and awareness about cervical, colorectal, and breast cancer screening, promote positive changes in population's knowledge and awareness about the benefits of cancer screening.

Keywords: cervical cancer, colorectal cancer, breast cancer, educational program, health knowledge, awareness, Hispanics, screening, health education

Procedia PDF Downloads 107
3624 Socio Economic Deprivation, Institutional Outlay and the Intent of Mobile Snatching and Street Assaults in Pakistan

Authors: Asad Salahuddin

Abstract:

Crime rates seem to be severely augmenting over the past several years in Pakistan which has perpetuated concerns as to what, when and how this upsurge will be eradicated. State institutions are posed to be in utmost perplexity, given the enormity of worsening law and order situation, compelling government on the flip side to expend more resources in strengthening institutions to confront crime, whereas, the economy has been confronted with massive energy crisis, mass unemployment and considerable inflation which has rendered most of the people into articulate apprehension as to how to satisfy basic necessities. A framework to investigate the variability in the rising street crimes, as affected by social and institutional outcomes, has been established using a cross-sectional study. Questionnaire, entailing 7 sections incorporating numerous patterns of behavior and history of involvement in different crimes for potential street criminals was observed as data collection instrument. In order to specifically explicate the intent of street crimes on micro level, various motivational and de-motivational factors that stimulate people to resort to street crimes were scrutinized. Intent of mobile snatching and intent of street assault as potential dependent variables were examined using numerous variables that influence the occurrence and intent of these crimes using ordered probit along with ordered logit and tobit as competing models. Model Estimates asserts that intent of mobile snatching has been significantly enhanced owing to perceived judicial inefficiency and lower ability of police reforms to operate effectively, which signifies the inefficiency of institutions that are entitled to deliver justice and maintaining law and order respectively. Whereas, intent of street assaults, as an outcome, affirms that people with lack of self-stability and severe childhood punishments were more tempted to be involved in violent acts. Hence, it is imperative for government to render better resources in form of training, equipment and improved salaries to police and judiciary in order to enhance their abilities and potential to curb inflating crime.

Keywords: deprivation, street assault, self control, police reform

Procedia PDF Downloads 427
3623 One-Shot Text Classification with Multilingual-BERT

Authors: Hsin-Yang Wang, K. M. A. Salam, Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao

Abstract:

Detecting user intent from natural language expression has a wide variety of use cases in different natural language processing applications. Recently few-shot training has a spike of usage on commercial domains. Due to the lack of significant sample features, the downstream task performance has been limited or leads to an unstable result across different domains. As a state-of-the-art method, the pre-trained BERT model gathering the sentence-level information from a large text corpus shows improvement on several NLP benchmarks. In this research, we are proposing a method to change multi-class classification tasks into binary classification tasks, then use the confidence score to rank the results. As a language model, BERT performs well on sequence data. In our experiment, we change the objective from predicting labels into finding the relations between words in sequence data. Our proposed method achieved 71.0% accuracy in the internal intent detection dataset and 63.9% accuracy in the HuffPost dataset. Acknowledgment: This work was supported by NCKU-B109-K003, which is the collaboration between National Cheng Kung University, Taiwan, and SoftBank Corp., Tokyo.

Keywords: OSML, BERT, text classification, one shot

Procedia PDF Downloads 101
3622 The Impact of Quality of Life on Satisfaction and Intent to Return for Distance Running

Authors: Chin-Huang Huang, Chun-Chu Yeh

Abstract:

Physical activities have a positive impact on individuals’ health and well-being. They also play an important role in promoting quality of life (QoL). The distance running enhances participants’ life satisfaction and provides positive experiences in physical activity. This study aims to measure the perception of QoL and to find the effect on satisfaction and intent to return for distance runners. Exploratory factor analysis is carried out to extract four major factorial dimensions of QoL, including multiple functions, spiritual, physical and cognitive factors. The main factors of QoL will be introduced into the regression function on satisfaction and return intention. The results show that the QoL factors including multiple functions, spiritual, physical and cognitive factors have a positive and significant impact on satisfaction for participants. The multiple functions and physical factors are also significantly positively correlated to the intent of return for runners.

Keywords: quality of life, physical activity, distance running, satisfaction

Procedia PDF Downloads 465
3621 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 91
3620 Efficient Signal Detection Using QRD-M Based on Channel Condition in MIMO-OFDM System

Authors: Jae-Jeong Kim, Ki-Ro Kim, Hyoung-Kyu Song

Abstract:

In this paper, we propose an efficient signal detector that switches M parameter of QRD-M detection scheme is proposed for MIMO-OFDM system. The proposed detection scheme calculates the threshold by 1-norm condition number and then switches M parameter of QRD-M detection scheme according to channel information. If channel condition is bad, the parameter M is set to high value to increase the accuracy of detection. If channel condition is good, the parameter M is set to low value to reduce complexity of detection. Therefore, the proposed detection scheme has better trade off between BER performance and complexity than the conventional detection scheme. The simulation result shows that the complexity of proposed detection scheme is lower than QRD-M detection scheme with similar BER performance.

Keywords: MIMO-OFDM, QRD-M, channel condition, BER

Procedia PDF Downloads 370
3619 Reduced Complexity of ML Detection Combined with DFE

Authors: Jae-Hyun Ro, Yong-Jun Kim, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems, many detection schemes have been developed to improve the error performance and to reduce the complexity. Maximum likelihood (ML) detection has optimal error performance but it has very high complexity. Thus, this paper proposes reduced complexity of ML detection combined with decision feedback equalizer (DFE). The error performance of the proposed detection scheme is higher than the conventional DFE. But the complexity of the proposed scheme is lower than the conventional ML detection.

Keywords: detection, DFE, MIMO-OFDM, ML

Procedia PDF Downloads 610
3618 Cigarette Smoke Detection Based on YOLOV3

Authors: Wei Li, Tuo Yang

Abstract:

In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.

Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction

Procedia PDF Downloads 87
3617 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 583
3616 Video Based Ambient Smoke Detection By Detecting Directional Contrast Decrease

Authors: Omair Ghori, Anton Stadler, Stefan Wilk, Wolfgang Effelsberg

Abstract:

Fire-related incidents account for extensive loss of life and material damage. Quick and reliable detection of occurring fires has high real world implications. Whereas a major research focus lies on the detection of outdoor fires, indoor camera-based fire detection is still an open issue. Cameras in combination with computer vision helps to detect flames and smoke more quickly than conventional fire detectors. In this work, we present a computer vision-based smoke detection algorithm based on contrast changes and a multi-step classification. This work accelerates computer vision-based fire detection considerably in comparison with classical indoor-fire detection.

Keywords: contrast analysis, early fire detection, video smoke detection, video surveillance

Procedia PDF Downloads 447
3615 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 320
3614 Multichannel Object Detection with Event Camera

Authors: Rafael Iliasov, Alessandro Golkar

Abstract:

Object detection based on event vision has been a dynamically growing field in computer vision for the last 16 years. In this work, we create multiple channels from a single event camera and propose an event fusion method (EFM) to enhance object detection in event-based vision systems. Each channel uses a different accumulation buffer to collect events from the event camera. We implement YOLOv7 for object detection, followed by a fusion algorithm. Our multichannel approach outperforms single-channel-based object detection by 0.7% in mean Average Precision (mAP) for detection overlapping ground truth with IOU = 0.5.

Keywords: event camera, object detection with multimodal inputs, multichannel fusion, computer vision

Procedia PDF Downloads 27
3613 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 345
3612 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 418
3611 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 433
3610 Improved Skin Detection Using Colour Space and Texture

Authors: Medjram Sofiane, Babahenini Mohamed Chaouki, Mohamed Benali Yamina

Abstract:

Skin detection is an important task for computer vision systems. A good method for skin detection means a good and successful result of the system. The colour is a good descriptor that allows us to detect skin colour in the images, but because of lightings effects and objects that have a similar colour skin, skin detection becomes difficult. In this paper, we proposed a method using the YCbCr colour space for skin detection and lighting effects elimination, then we use the information of texture to eliminate the false regions detected by the YCbCr colour skin model.

Keywords: skin detection, YCbCr, GLCM, texture, human skin

Procedia PDF Downloads 459
3609 3rd Generation Modular Execution: A Global Breakthrough in Modular Facility Construction System

Authors: Sean Bryner S. Rey, Eric Tanjutco

Abstract:

Modular execution strategies are performed to address the various challenges of any projects and are implemented on each project phase that covers Engineering, Procurement, Fabrication and Construction. It was until the recent years that the intent to surpass mechanical modularization approach were conceptualized to give solution to much greater demands of project components such as site location and adverse weather condition, material sourcing, construction schedule, safety risks and overall plot layout and allocation. The intent of this paper is to introduce the 3rd Generation Modular Execution with an overview of its advantages on project execution and will give emphasis on Engineering, Construction, Operation and Maintenance. Most importantly, the paper will present the key differentiator of 3rd Gen modular execution against other conventional project execution and the merits it bears for the industry.

Keywords: 3rd generation modular, process block, construction, operation & maintenance

Procedia PDF Downloads 475
3608 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 469
3607 Iris Detection on RGB Image for Controlling Side Mirror

Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris

Abstract:

Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.

Keywords: iris detection, midpoint coordinates, RGB images, side mirror

Procedia PDF Downloads 423
3606 Automatic Vehicle Detection Using Circular Synthetic Aperture Radar Image

Authors: Leping Chen, Daoxiang An, Xiaotao Huang

Abstract:

Automatic vehicle detection using synthetic aperture radar (SAR) image has been widely researched, as well as using optical remote sensing images. However, most researches treat the detection as an independent problem, failing to make full use of SAR data information. In circular SAR (CSAR), the two long borders of vehicle will shrink if the imaging surface is set higher than the reference one. Based on above variance, an automatic vehicle detection using CSAR image is proposed to enhance detection ability under complex environment, such as vehicles’ closely packing, which confuses the detector. The detection method uses the multiple images generated by different height plane to obtain an energy-concentrated image for detecting and then uses the maximally stable extremal regions method (MSER) to detect vehicles. A result of vehicles’ detection is given to verify the effectiveness and correctness of proposed method.

Keywords: circular SAR, vehicle detection, automatic, imaging

Procedia PDF Downloads 367
3605 Adaptive CFAR Analysis for Non-Gaussian Distribution

Authors: Bouchemha Amel, Chachoui Takieddine, H. Maalem

Abstract:

Automatic detection of targets in a modern communication system RADAR is based primarily on the concept of adaptive CFAR detector. To have an effective detection, we must minimize the influence of disturbances due to the clutter. The detection algorithm adapts the CFAR detection threshold which is proportional to the average power of the clutter, maintaining a constant probability of false alarm. In this article, we analyze the performance of two variants of adaptive algorithms CA-CFAR and OS-CFAR and we compare the thresholds of these detectors in the marine environment (no-Gaussian) with a Weibull distribution.

Keywords: CFAR, threshold, clutter, distribution, Weibull, detection

Procedia PDF Downloads 588
3604 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 378
3603 Plant Disease Detection Using Image Processing and Machine Learning

Authors: Sanskar, Abhinav Pal, Aryush Gupta, Sushil Kumar Mishra

Abstract:

One of the critical and tedious assignments in agricultural practices is the detection of diseases on vegetation. Agricultural production is very important in today’s economy because plant diseases are common, and early detection of plant diseases is important in agriculture. Automatic detection of such early diseases is useful because it reduces control efforts in large productive farms. Using digital image processing and machine learning algorithms, this paper presents a method for plant disease detection. Detection of the disease occurs on different leaves of the plant. The proposed system for plant disease detection is simple and computationally efficient, requiring less time than learning-based approaches. The accuracy of various plant and foliar diseases is calculated and presented in this paper.

Keywords: plant diseases, machine learning, image processing, deep learning

Procedia PDF Downloads 7
3602 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 484
3601 The Effect of Pixelation on Face Detection: Evidence from Eye Movements

Authors: Kaewmart Pongakkasira

Abstract:

This study investigated how different levels of pixelation affect face detection in natural scenes. Eye movements and reaction times, while observers searched for faces in natural scenes rendered in different ranges of pixels, were recorded. Detection performance for coarse visual detail at lower pixel size (3 x 3) was better than with very blurred detail carried by higher pixel size (9 x 9). The result is consistent with the notion that face detection relies on gross detail information of face-shape template, containing crude shape structure and features. In contrast, detection was impaired when face shape and features are obscured. However, it was considered that the degradation of scenic information might also contribute to the effect. In the next experiment, a more direct measurement of the effect of pixelation on face detection, only the embedded face photographs, but not the scene background, will be filtered.

Keywords: eye movements, face detection, face-shape information, pixelation

Procedia PDF Downloads 317