This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Detection" – news · newspapers · books · scholar · JSTOR(March 2018) (Learn how and when to remove this message)
In general, detection is the action of accessing information without specific cooperation from with the sender.
In the history of radio communications, the term "detector" was first used for a device that detected the simple presence or absence of a radio signal, since all communications were in Morse code. The term is still in use today to describe a component that extracts a particular signal from all of the electromagnetic waves present. Detection is usually based on the frequency of the carrier signal, as in the familiar frequencies of radio broadcasting, but it may also involve filtering a faint signal from noise, as in radio astronomy, or reconstructing a hidden signal, as in steganography.
In optoelectronics, "detection" means converting a received optical input to an electrical output. For example, the light signal received through an optical fiber is converted to an electrical signal in a detector such as a photodiode.
In steganography, attempts to detect hidden signals in suspected carrier material is referred to as steganalysis. Steganalysis has an interesting difference from most other types of detection, in that it can often only determine the probability that a hidden message exists; this is in contrast to the detection of signals which are simply encrypted, as the ciphertext can often be identified with certainty, even if it cannot be decoded.
In the military, detection refers to the special discipline of reconnaissance with the aim to recognize the presence of an object in a location or ambiance.
Finally, the art of detection, also known as following clues, is the work of a detective in attempting to reconstruct a sequence of events by identifying the relevant information in a situation.
In general, detection is the action of accessing information without specific cooperation from with the sender. In the history of radio communications...
In data analysis, anomaly detection (also referred to as outlier detection and sometimes as novelty detection) is generally understood to be the identification...
Neutron detection is the effective detection of neutrons entering a well-positioned detector. There are two key aspects to effective neutron detection: hardware...
The limit of detection (LOD or LoD) is the lowest signal, or the lowest corresponding quantity to be determined (or extracted) from the signal, that can...
Collision detection is the computational problem of detecting an intersection of two or more spatial objects, commonly computer graphics objects. It has...
A detection dog or sniffer dog is a dog that is trained to use its senses to detect substances such as explosives, illegal drugs, wildlife scat, currency...
An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for...
Edge detection includes a variety of mathematical methods that aim at identifying edges, defined as curves in a digital image at which the image brightness...
videos. Well-researched domains of object detection include face detection and pedestrian detection. Object detection has applications in many areas of computer...
Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful...
In statistical analysis, change detection or change point detection tries to identify times when the probability distribution of a stochastic process...
Artificial intelligence detection software aims to determine whether some content (text, image, video or audio) was generated using artificial intelligence...
disambiguation page lists articles associated with the title Radiation detection. If an internal link led you here, you may wish to change the link to...
Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection also refers...
In computer science, cycle detection or cycle finding is the algorithmic problem of finding a cycle in a sequence of iterated function values. For any...
Detection theory or signal detection theory is a means to measure the ability to differentiate between information-bearing patterns (called stimulus in...
was coined in 1940 by the United States Navy as an acronym for "radio detection and ranging". The term radar has since entered English and other languages...
Motion detection is the process of detecting a change in the position of an object relative to its surroundings or a change in the surroundings relative...
The Canny edge detector is an edge detection operator that uses a multi-stage algorithm to detect a wide range of edges in images. It was developed by...
Agent detection is the inclination for animals, including humans, to presume the purposeful intervention of a sentient or intelligent agent in situations...
Corner detection is an approach used within computer vision systems to extract certain kinds of features and infer the contents of an image. Corner detection...
about 2% phase detection pixels on the chip. With suitable software support, that enables phase detection auto focus. Contrast-detection autofocus is achieved...
In electrical engineering, homodyne detection is a method of extracting information encoded as modulation of the phase and/or frequency of an oscillating...
Plagiarism detection or content similarity detection is the process of locating instances of plagiarism or copyright infringement within a work or document...
theory with applications in computer science and telecommunication, error detection and correction (EDAC) or error control are techniques that enable reliable...
Detection Risk (DR) is the risk that the auditor will not detect a misstatement that exists in an assertion that could be material (significant), either...
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter...
also LIDAR, LiDAR or LADAR, an acronym of "light detection and ranging" or "laser imaging, detection, and ranging") is a method for determining ranges...
Runtime error detection is a software verification method that analyzes a software application as it executes and reports defects that are detected during...
Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors...