Showing 41 - 60 results of 190 for search '"false alarm"', query time: 0.08s Refine Results
  1. 41

    Spectrum sensing algorithm based on the eigenvalue of Wishart random matrix by Xuemei YANG, Xi HE, Jiapin XU

    Published 2017-09-01
    “…In order to improve the spectrum sensing performance and overcome the shortcomings of the classical algorithm,a new cooperative spectrum sensing algorithm based on Wishart random matrix theory was proposed.According to the logarithmic distribution characteristics of the sampled covariance matrix eigenvalues and using the ratio of maximum eigenvalue and geometric mean eigenvalue,a simple closed-form threshold expression could be obtained,and the spectrum sensing decision could be performed depend on the threshold.The simulation results show that the proposed algorithm can get better sensing performance even under the conditions of a few number of cooperative users,low signal to noise ratio and a few samples.It is less affected by false-alarm probability and the extreme values,and has better detection performance than similar algorithms.…”
    Get full text
    Article
  2. 42

    Design of home fire detection system based on wireless multi-sensor data fusion by Wenbin CHENG, Lei DU, Yiyi LIU

    Published 2017-09-01
    “…Aiming at the shortcomings of false alarm and leakage alarm in the existing fire detection system and the complicated wiring,high cost and poor flexibility of the traditional wired fire detection system,a set of home fire detection system based on wireless multi-sensor data fusion was designed,to detect the fire safety hazards caused by kitchen equipment aging,electrical wiring aging or electrical equipment aging.The design of multi-sensor data fusion algorithm,fire detection system hardware framework and software implementation were described in detail.The simulation results show that the scheme has the characteristics of high accuracy and flexibility.…”
    Get full text
    Article
  3. 43

    Spectrum Sensing under Correlated Antenna Array Using Generalized Detector in Cognitive Radio Systems by Modar Safir Shbat, Vyacheslav Tuzlukov

    Published 2013-01-01
    “…We derive the probability of false alarm and detection threshold under employment of the generalized detector (GD) in cognitive radio (CR) systems for two scenarios: firstly, the independent antenna array elements; the secondly, the correlated antenna array elements. …”
    Get full text
    Article
  4. 44

    Adaptive spectrum sensing algorithm based on cyclostationary spectrum energy by Hao-ye ZHANG, Zhi-hua BAO, Shi-bing ZHANG

    Published 2011-11-01
    “…Focused on the characteristic of cyclostationary spectrum of signal and the spectrum sensing in low signal-to-noise ratio,an adaptive decision threshold spectrum sensing algorithm was proposed,which combines cyclostationary spectrum sensing with energy detection.By weighting the sum of probabilities of detection and false alarm,estimating the eigenvalues of the cyclostationary spectrum,the algorithm provides an adaptive decision threshold which could differentiate the primary signal from the background noise.The simulation results show that the algorithm could perform well in low signal-to-noise ratio and remove the effect of noise uncertainty on the spectrum sensing.It outperforms maximum-minimum eigenvalue and blind detection with 4dB and 8dB respectively in signal-to-noise ratio,and has robustness to different modulated primary signal.…”
    Get full text
    Article
  5. 45

    Research on the security audit model in intrusion prevention based on write-related support vector data description by LUO Jun, PAN Zhi-song, MIAO Zhi-min, HU Gu-yu

    Published 2007-01-01
    “…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
    Get full text
    Article
  6. 46

    WmFall: WiFi-based multistage fall detection with channel state information by Xu Yang, Fangyuan Xiong, Yuan Shao, Qiang Niu

    Published 2018-10-01
    “…Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
    Get full text
    Article
  7. 47

    A new cooperation spectrum sensing algorithm based on energy detection by Caimei FU, Youming LI, Guili ZHOU, Mingchen YU, Jingwen TONG, Xupeng WANG

    Published 2016-09-01
    “…To improve the reliability of spectrum sensing in cognitive radio system,a new cooperation spectrum sensing algorithm was proposed.In this algorithm,the property of the low probability between adjacent frames of the states change was used and then the decision was made by combing the energy value of the current sensing frame with that of the neighboring frame.Therefore,the proposed algorithm could decrease the miss detection probability in case of the instantaneous signal energy dropping when primary user used the licensed spectrum.Furthermore,theoretical expressions for detection probability and false alarm probability were derived.Finally,theoretical analysis and simulation results verify that the detection performance of the proposed algorithm is better than that of cooperative spectrum sensing which is based on the classical energy detection.…”
    Get full text
    Article
  8. 48

    Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests by Gökhan Koç, Korkut Yegin

    Published 2013-10-01
    “…Results from 92 different test configurations were analyzed in terms of detection and classification. Hit and false alarm rates of classification algorithm were formed, and detection ranges were determined based on these results. …”
    Get full text
    Article
  9. 49

    FMCW radar range estimation algorithm based on fast iterative interpolation by Yongchang DUAN, Xin LI, Yaohui HUANG, Ping HUANG

    Published 2019-09-01
    “…For the multi-target detection,a multi-objective range estimation algorithm was proposed based on iterative interpolation to solve the problem of the range accuracy of frequency modulation continuous wave (FMCW) radar being easy to be interfered by spectrum.Firstly,the number of targets and the rough location of the target were obtained through the fast Fourier transform (FFT) and the constant false alarm (CFAR) detection algorithm.Then spectrum was iteratively interpolate,and the inter-spectral interference was eliminated during each iteration to obtain more accurate distance.Simulation results show that the proposed algorithm has higher estimation accuracy in multi-target environment and low Signal-to-noise ratio(SNR).The proposed algorithm is implemented by DSP,which proved that the algorithm meets the real-time requirements and is easy to be implemented in engineering.…”
    Get full text
    Article
  10. 50

    Soft threshold wideband spectrum sensing algorithm based on enhanced gradient operator by GONG Kexian, FANG Jiale, LIU Honghua, SUN Peng, WANG Wei

    Published 2024-05-01
    “…Theoretical analysis and simulation results show that the detection probability and false alarm probability of the proposed algorithm are significantly improved and less complex than MPSG algorithm in Gaussian channel and Rayleigh fading channel. …”
    Get full text
    Article
  11. 51

    Energy Efficient Distributed Fault Identification Algorithm in Wireless Sensor Networks by Meenakshi Panda, P. M. Khilar

    Published 2014-01-01
    “…The performance is evaluated in terms of detection accuracy, false alarm rate, detection latency and message complexity.…”
    Get full text
    Article
  12. 52

    Anomaly detection algorithm based on fractal characteristics of large-scale network traffic by XU Xiao-dong1, ZHU Shi-rui2, SUN Ya-min1

    Published 2009-01-01
    “…Based on the fractal structure of the large-scale network traffic aggregation, anomalies were analyzed qualitatively and quantitatively from perspective of the global and local scaling exponents.Multi-fractal singular spectrum and Lipschitz regularity distribution were used to analyze the fractal parameters of abnormal flow, trying to identify the relationship between the changes of these parameters and the emergence of anomalies.Experimental results show that the emergence of anomalies has obvious signs on the singular spectrum and Lipschitz regularity distribution.Using this feature, a new multi-fractal-based anomaly detection algorithm and a new detection framework were constructed.On the DARPA/Lincoln laboratory intrusion detection evaluation data set 1999, this algorithm’s detection rate is high at low false alarm rate, which is better than EMERALD.…”
    Get full text
    Article
  13. 53

    Analysis of Hybrid Spectrum Sensing in Cognitive Radio Using Hybrid Approaches by Haribhau Ashok Shinde, Sandeep Garg

    Published 2025-01-01
    “…A novel hybrid MFD method was developed and evaluated via MATLAB simulations, analyzing factors like sample size, signal-to-noise ratio (SNR), and false alarm probability. Results reveal that ED has a higher miss-detection rate compared to MFD and the proposed hybrid method, which performs particularly well under low sample counts and SNR conditions. …”
    Get full text
    Article
  14. 54

    Support Detection for SAR Tomographic Reconstructions from Compressive Measurements by Alessandra Budillon, Gilda Schirinzi

    Published 2015-01-01
    “…In this paper, a support detection method, based on a Generalized Likelihood Ratio Test (Sup-GLRT), is proposed and compared with the SequOMP method, in terms of probability of detection achievable with a given probability of false alarm and for different numbers of measurements.…”
    Get full text
    Article
  15. 55

    Research on the multiuser MIMO linear cooperative spectrum sensing in cognitive radio networks by Yong-qiang HEI, Xiao-hui LI, Wen-tao LI

    Published 2012-02-01
    “…The multiuser MIMO based linear cooperative spectrum sensing problem was investigated in cognitive radio system to improve the reliability of spectrum sensing.Both the local spectrum detecting strategy and global spectrum detecting strategy for multiuser MIMO based linear cooperative spectrum sensing system were derived.Then the optimization model that the different weights assigned on the receive signals of each user at the fusion center for global decision were optimized to maximize the detection probability given a targeted probability of false alarm is established.Furthermore,genetic algorithm (GA) was introduced to find the optimal weight vector of the above-mentioned cooperative spectrum sensing problem,with the purpose of reducing the sensing time in the spectrum sensing process.The simulation results show that,the reliability of spectrum sensing in cooperative spectrum sensing system can be efficiently enhanced with multiple antennas.Besides,the proposed GA method is efficient and stable,and achieves better detection performance when compared with the existing methods.…”
    Get full text
    Article
  16. 56

    Two-level feature selection method based on SVM for intrusion detection by Xiao-nian WU, Xiao-jin PENG, Yu-yang YANG, Kun FANG

    Published 2015-04-01
    “…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
    Get full text
    Article
  17. 57

    Detection of 3D Spatial-Temporal Spectrum Opportunity in Satellite-Terrestrial Integrated Network by Ning YANG, Daoxing GUO

    Published 2022-12-01
    “…The detection of 3D spectrum opportunities in the downlink sharing scenario in satellite-terrestrial integrated networks was investigated.First, defined the 3D space-time spectrum opportunities in the satellite-terrestrial integrated networks, and further divided the opportunities into three areas in the spatial domain: the communication area of primary user, the communication protection belt, and the free access area.Then, based on the proposed 3D opportunity model, derived the closed expressions of the detection and false alarm probability at the user-level and the network-level, respectively.In order to further utilized the spatial spectrum opportunity, a power control scheme of the cognitive user was determined through 3D spectrum sensing, i.e., interference constraint (IC).The simulation results demonstrated that the proposed power control scheme could realized the detection of 3D spectrum opportunity.…”
    Get full text
    Article
  18. 58

    Opportunistic spectrum access method for cognitive radio sensor network of typical deployment strategies by Wen-xiang LI, Ya-jie MA, Peng KE

    Published 2014-11-01
    “…Explored the opportunistic spectrum access method for cognitive radio sensor networks with regular topology patterns and coverage patterns.The method includes an economic spectrum-and-timeslot-allocation scheme,a sensing-results-reporting scheme and a cooperative spectrum-sensing scheme.A model was proposed for analyzing the blocking and dropping probability for secondary users,the effective reception bandwidth and transmission delay.Numerical analysis shows that Triangle yields the optimal cooperative sensing performance,and square yields the optimal reception bandwidth.In case of complete coverage,Square and triangle lead to less transmission delay,and in case of multiple coverage,square leads to the least transmission delay.The false alarm probability of single node has little impact on transmission delay,and Primary User’s activity may affect delay noticeably.On the other hand,larger ratio of transmission timeslot to sensing timeslot helps to decrease delay.…”
    Get full text
    Article
  19. 59

    Intrusion detection scheme based on neural network in vehicle network by Yi-liang LIU, Ya-li SHI, Hao FENG, Liang-min WANG

    Published 2014-11-01
    “…Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of redundant data,to reduce dependence on redundant data,an intrusion detection scheme based on neural network is presented.The program can be described as a lot of traffic event types ,and the integrated use of the back-propagation (BP) and support vector machine (SVM) two learning algorithms.The two algorithms respectively applicable to personal safety driving fast and efficient transportation system with high detection applications.Simulation results and performance analysis show that our scheme has a faster speed intrusion detection,and has a high detection rate and low false alarm rate.…”
    Get full text
    Article
  20. 60

    Multidimensional detection and dynamic defense method for link flooding attack by Yang WANG, Guangming TANG, Cheng LEI, Dong HAN

    Published 2019-08-01
    “…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
    Get full text
    Article