Showing 21 - 40 results of 190 for search '"false alarm"', query time: 0.07s Refine Results
  1. 21

    Discriminative zero-watermarking algorithm based on region XOR and ternary quantization by Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG

    Published 2022-02-01
    “…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
    Get full text
    Article
  2. 22

    Spectrum sensing algorithm based on stochastic resonance and non-central F-distribution by Yuanmeng FAN, Shunlan LIU

    Published 2023-01-01
    “…To solve the problem that the detection probability of the spectrum sensing algorithm is low and the number of samples required for detection is large at low signal-to-noise ratio (SNR), a spectrum sensing algorithm based on stochastic resonance and non-central F-distribution (SRNF) was proposed.By introducing direct-current stochastic resonance noise, the system model of SRNF was established, and the expression of test statistic, false alarm probability and detection probability, and the expression of decision threshold obeying non-central F-distribution were deduced, and the optimal stochastic resonance noise parameter was solved by numerical method.The simulation results show that the detection performance of the proposed SRNF algorithm is better than that of energy detection (ED) algorithm and blind spectrum sensing based on F-distribution (BSF) algorithm at a low SNR.When the false alarm probability is 5%, the SNR is -12 dB, and the number of samples is 200, the detection probability of the proposed algorithm is 95%, which is 34% and 67% higher than BSF algorithm and ED algorithm, respectively.When the SNR is -12 dB, and the detection probability reaches 95%, the number of samples required by the proposed algorithm is 210, which saves 340 samples compared to the BSF algorithm.Furthermore, the proposed algorithm is less affected by noise uncertainty than ED algorithm.…”
    Get full text
    Article
  3. 23

    A range spread target detection algorithm based on polarimetric features and SVDD by Qiang LI, Yuanxin YAO, Xiangqi KONG

    Published 2023-10-01
    “…Multi-polarization range high resolution radar is an important mean for ground target detection.In the echo formed by it, the target occupies multiple range cells and becomes an extended target.The traditional spread target detection method relies on energy, and the detection performance decreases when the signal-to-clutter ratio decreases.A spread target detection algorithm based on polarization decomposition features was proposed, which improved the detection performance under low signal-to-clutter ratio by using the difference of polarization scattering characteristics between target and clutter.Specifically, 16 kinds of polarization decomposition features were extracted to form feature vectors as detection statistics, and then support vector data description (SVDD) was used to obtain the detection threshold.When training the detection threshold, the polarization decomposition features of clutter were extracted as training data.In order to ensure the false alarm probability, two penalty parameters were introduced into the objective function of SVDD.The experimental results show that the proposed method requires a signal-to-clutter ratio of about 12.6 dB in the case of Gobi background, false alarm probability of 10<sup>-4</sup> and detection probability of 90%, which is about 1.7 dB lower than the energy-based methods.…”
    Get full text
    Article
  4. 24

    A Modified Cycle Slip Detection Method with GNSS Doppler Assistance and Optimizing by Adaptive Threshold and Sliding Polynomial Fitting by Kezhao Li, Yunyan Shen, Xiaokui Yue, Yingxiang Jiao, Kai Wang, Zhe Yue, Keke Xu

    Published 2023-01-01
    “…At the sampling rate of 30 s and under the condition of the observed satellite altitude angle below 30°, the false alarm rate of the DAPSP-SPFAGF method is 0, but the TurboEdit method’s false alarm rate is 71.2%. …”
    Get full text
    Article
  5. 25

    Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution by Saranya N., Anandakumar Haldorai

    Published 2024-01-01
    “…Yet, IDS face challenges to detect the intruders accurately with reduced false alarm rate, feature selection, and detection. …”
    Get full text
    Article
  6. 26

    An Alarm Method for a Loose Parts Monitoring System by Yanlong Cao, Yuanfeng He, Huawen Zheng, Jiangxin Yang

    Published 2012-01-01
    “…In order to reduce the false alarm rate and missed detection rate of a Loose Parts Monitoring System (LPMS) for Nuclear Power Plants, a new hybrid method combining Linear Predictive Coding (LPC) and Support Vector Machine (SVM) together to discriminate the loose part signal is proposed. …”
    Get full text
    Article
  7. 27

    Analysis and Discussion of Atmospheric Precursor of European Heat Summers by Christine Träger-Chatterjee, Richard W. Müller, Jörg Bendix

    Published 2014-01-01
    “…The CEDI enables a correct indication of all extremely hot and dry summers between 1958 and 2011 without any false alarm.…”
    Get full text
    Article
  8. 28

    A Dual-Hierarchy Synchronization Method for Signal Preambles with High Detection Rates for Satellite-Based ADS-B Receivers with Different Sensitivities by Xinhui Jian, Xuejun Zhang, Jianxiang Ma, Weidong Zhang

    Published 2024-01-01
    “…Existing methods are unable to achieve high detection rates and low false alarm rates of satellite-based Automatic Dependent Surveillance-Broadcast (ADS-B) signal preambles at extremely low signal-to-noise ratios (SNRs) using limited on-star resources. …”
    Get full text
    Article
  9. 29

    Study on Evaluation Theory of Bridge Damage State and Methodology on Early Warning of Danger by Guofu Jiang, Qianxue Liang, Hua Wang, Yucai Ju, Haihua Wang, Xirui Wang, Longlin Wang, Wensheng Wang

    Published 2022-01-01
    “…The experimental results showed that the proposed method has high evaluation and judgment accuracy, low false alarm rate, and good real-time performance and reliability.…”
    Get full text
    Article
  10. 30

    Enhanced Lithographic Hotspot Detection via Multi-Task Deep Learning With Synthetic Pattern Generation by Xinguang Zhang, Shiyang Chen, Zhouhang Shao, Yongjie Niu, Li Fan

    Published 2025-01-01
    “…Furthermore, we show a 22&#x0025; improvement in TNSB hotspot detection and a 5X reduction in false alarms on HTC patterns compared to previous techniques. …”
    Get full text
    Article
  11. 31

    PRAPD: A novel received signal strength–based approach for practical rogue access point detection by Wenjia Wu, Xiaolin Gu, Kai Dong, Xiaomin Shi, Ming Yang

    Published 2018-08-01
    “…The results demonstrate that the practical rogue access point detection can significantly reduce the false alarm rate while ensuring a high detection rate.…”
    Get full text
    Article
  12. 32

    Detection Algorithm of Alarm Messages Based on Linear Cooperative Strategy in VAENT by Xuefei Zhang, Guoan Zhang, Yancheng Ji

    Published 2014-05-01
    “…The numerical simulation results show that the proposed strategy can improve the detection probability within the scope of the false alarm probability, and avoid the broadcast storm.…”
    Get full text
    Article
  13. 33

    Performance of XFAST in the presence of code Doppler by TANG Xiao-mei, YONG Shao-wei, WANG Fei-xue

    Published 2010-01-01
    “…The probability of detection and false alarm in XFAST(extended replica folding acquisition search technique) were introduced in the condition of code Doppler and deterioration of noise caused by replica folding.The simulation re-sults show that the model is correct,the equal signal to noise error is less than 0.5dB.The research is the academic base of XFAST parameter optimization and performance.When the extended replica folding number equal to 1,the model can be used to analyse other acquisition algorithm.…”
    Get full text
    Article
  14. 34

    Subseasonal forecasts of heat waves in West African cities by C. G. Ngoungue Langue, C. G. Ngoungue Langue, C. Lavaysse, C. Lavaysse, C. Flamant

    Published 2025-01-01
    “…The performance of the forecast models in predicting heat waves is assessed through the computation of categorical metrics such as the hit rate, the Gilbert skill score and the false alarm ratio. The results suggest that at subseasonal timescales, the forecast models provide a better forecast than climatology, but the hit rate and false alarm rate are sub-optimal and the forecasts may be overestimating the duration of heat waves while under-predicting the intensity. …”
    Get full text
    Article
  15. 35

    Fusion spectrum sensing algorithm based on eigenvalues by Wenjing ZHAO, He LI, Minglu JIN

    Published 2019-11-01
    “…Aiming at the problem of inefficient use of spectrum resources,a fusion spectrum sensing algorithm based on eigenvalues was proposed to effectively achieve dynamic spectrum sharing.The test statistics were constructed by employing the maximum eigenvalue,the trace and the geometric mean of all eigenvalues of the sample covariance matrix.The detection probability and false alarm probability of the proposed method were analyzed using the random matrix theory,and the analytical representation of the theoretical threshold was obtained.In addition,the parameter selection of the proposed algorithm was analyzed theoretically.Simulation results show that the proposed algorithm has better detection ability than the existing eigenvalue detection algorithm.…”
    Get full text
    Article
  16. 36

    Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network by Yingxue Li, Jing Lei, Shiyuan Zhong, Chunming Huang, Chao Huang

    Published 2015-11-01
    “…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
    Get full text
    Article
  17. 37

    Proximity-Based Robust Event Detection in Wireless Sensor Networks by Chan-O Hong, Yoon-Hwa Choi

    Published 2014-07-01
    “…The proposed scheme can effectively reduce false alarms while accurately detecting events even for a relatively small event region. …”
    Get full text
    Article
  18. 38

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  19. 39

    AntiGPS spoofing method for UAV based on LSTM-KF model by Yang SUN, Chunjie CAO, Junxiao LAI, Tianjiao YU

    Published 2020-10-01
    “…A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived,which combined deep learning and Kalman filter.The dynamic model of UAV flight was predicted from the flight state of UAV by using long short-term memory network,and the dynamic adjustment of Kalman filter and dynamic model was used to identify GPS deception.In order to resist the interference of GPS deception signal,this method did not need to increase the hardware overhead of the receiver,and was easy to realize.The experimental results show that the method has higher accuracy and lower false alarm rate for the recognition of GPS signals,and can effectively enhance the UAV's ability to resist GPS deception interference.…”
    Get full text
    Article
  20. 40

    Performance analysis and optimization of cooperative spectrum sensing for maximizing secondary throughput by LI Mei-ling1, YUAN Chao-wei1, LI Lin1, YANG Rui-zhe3

    Published 2011-01-01
    “…The relationship among SU,detection threshold,bandwidth,spectrum utilization and secondary throughput in cognitive radio networks was analyzed,which indicates the lower false alarm probability,higher spectrum utilization and larger secondary throughput with less SU in C-CSS(censoring based cooperative spectrum sensing),besides,the required detection threshold for maximizing the secondary throughput different with the traditional CSS under given SU number and the objective demand.Based on the NP criticism,an optimal cooperative spectrum sensing algorithm for maximizing the secondary throughput was proposed by solving the mathematic model to obtain the optimal party of SU and detection threshold.Theoretical analysis and simulation results show that the maximized secondary throughput achieved by the proposed optimal algorithm,while maintaining the given detection probability.…”
    Get full text
    Article