When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Detection error tradeoff - Wikipedia

    en.wikipedia.org/wiki/Detection_error_tradeoff

    The normal deviate mapping (or normal quantile function, or inverse normal cumulative distribution) is given by the probit function, so that the horizontal axis is x = probit(P fa) and the vertical is y = probit(P fr), where P fa and P fr are the false-accept and false-reject rates.

  3. Features from accelerated segment test - Wikipedia

    en.wikipedia.org/wiki/Features_from_accelerated...

    The compiled code is used as corner detector later for other images. Notice that the corners detected using this decision tree algorithm should be slightly different from the results using segment test detector. This is because that decision tree model depends on the training data, which could not cover all possible corners.

  4. Constant false alarm rate - Wikipedia

    en.wikipedia.org/wiki/Constant_false_alarm_rate

    However, in most fielded systems, unwanted clutter and interference sources mean that the noise level changes both spatially and temporally. In this case, a changing threshold can be used, where the threshold level is raised and lowered to maintain a constant probability of false alarm. This is known as constant false alarm rate (CFAR) detection.

  5. Matched filter - Wikipedia

    en.wikipedia.org/wiki/Matched_filter

    where [] is the input as a function of the independent variable , and [] is the filtered output. Though we most often express filters as the impulse response of convolution systems, as above (see LTI system theory ), it is easiest to think of the matched filter in the context of the inner product , which we will see shortly.

  6. Step detection - Wikipedia

    en.wikipedia.org/wiki/Step_detection

    The step detection problem occurs in multiple scientific and engineering contexts, for example in statistical process control [1] (the control chart being the most directly related method), in exploration geophysics (where the problem is to segment a well-log recording into stratigraphic zones [2]), in genetics (the problem of separating ...

  7. Canny edge detector - Wikipedia

    en.wikipedia.org/wiki/Canny_edge_detector

    The Canny edge detector is an edge detection operator that uses a multi-stage algorithm to detect a wide range of edges in images. It was developed by John F. Canny in 1986. Canny also produced a computational theory of edge detection explaining why the technique works.

  8. Reed–Muller code - Wikipedia

    en.wikipedia.org/wiki/Reed–Muller_code

    The Reed–Muller RM(r, m) code of order r and length N = 2 m is the code generated by v 0 and the wedge products of up to r of the v i, 1 ≤ i ≤ m (where by convention a wedge product of fewer than one vector is the identity for the operation).

  9. Local outlier factor - Wikipedia

    en.wikipedia.org/wiki/Local_outlier_factor

    In anomaly detection, the local outlier factor (LOF) is an algorithm proposed by Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng and Jörg Sander in 2000 for finding anomalous data points by measuring the local deviation of a given data point with respect to its neighbours.