Showing 341 - 360 results of 12,239 for search 'algorithm detection', query time: 0.18s Refine Results
  1. 341
  2. 342
  3. 343

    An Oracle Normalized Least Mean Square (NLMS) Algorithm and a Simple Bayesian Detection NLMS Algorithm Robust to Impulse Noise by Hadi Zayyani, Yaser Attar

    Published 2024-02-01
    “…This paper suggests an oracle normalized least-mean-square (NLMS) algorithm and a simple Bayesian detection NLMS impulse noise detection algorithm as an effective adaptive algorithm against impulsive noises. …”
    Get full text
    Article
  4. 344

    Evaluation of the Performance of Unsupervised Learning Algorithms for Intrusion Detection in Unbalanced Data Environments by Gutierrez-Portela Fernando, Almenares Mendoza Florina, Calderon-Benavides Liliana

    Published 2024-01-01
    “…This study evaluated the performance of unsupervised machine learning algorithms for intrusion detection in unbalanced data environments using the BoT-IoT dataset. …”
    Get full text
    Article
  5. 345

    A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems by javad nehriri, sasan hosseinali zadeh

    Published 2017-12-01
    “…In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. …”
    Get full text
    Article
  6. 346

    3L-YOLO: A Lightweight Low-Light Object Detection Algorithm by Zhenqi Han, Zhen Yue, Lizhuang Liu

    Published 2024-12-01
    “…In comparison to the LOL-YOLO low-light object detection algorithm, 3L-YOLO requires 16.9 GFLOPs, representing a reduction of 4 GFLOPs.…”
    Get full text
    Article
  7. 347
  8. 348

    Loop-Reduction LLL Algorithm and Architecture for Lattice-Reduction-Aided MIMO Detection by Chun-Fu Liao, Li-Wei Chai, Yuan-Hao Huang

    Published 2012-01-01
    “…We propose a loop-reduction LLL (LR-LLL) algorithm for lattice-reduction-aided (LRA) multi-input multioutput (MIMO) detection. …”
    Get full text
    Article
  9. 349
  10. 350
  11. 351

    End-to-end scene text detection and recognition algorithm based on Transformer decoders by Jinzhi ZHENG, Ruyi JI, Libo ZHANG, Chen ZHAO

    Published 2023-05-01
    “…Aiming at the detection and recognition task of arbitrary shape text in scene, a novelty scene text detection and recognition algorithm which could be trained by end-to-end algorithm was proposed.Firstly, the detection branch of text aware module based on segmentation idea was introduced to detect scene text from visual features extracted by convolutional network.Then, a recognition branch based on Transformer vision module and Transformer language module encoded the text features of the detection results.Finally, the text features encoded by the fusion gate in the recognition branch were fused to output the scene text.The experimental results on the three benchmark datasets of Total-Text, ICDAR2013 and ICDAR2015 show that the proposed algorithm has excellent performance in recall, precision, F-score, and has certain advantages in efficiency.…”
    Get full text
    Article
  12. 352
  13. 353
  14. 354

    Anomaly detection algorithm based on fractal characteristics of large-scale network traffic by XU Xiao-dong1, ZHU Shi-rui2, SUN Ya-min1

    Published 2009-01-01
    “…Based on the fractal structure of the large-scale network traffic aggregation, anomalies were analyzed qualitatively and quantitatively from perspective of the global and local scaling exponents.Multi-fractal singular spectrum and Lipschitz regularity distribution were used to analyze the fractal parameters of abnormal flow, trying to identify the relationship between the changes of these parameters and the emergence of anomalies.Experimental results show that the emergence of anomalies has obvious signs on the singular spectrum and Lipschitz regularity distribution.Using this feature, a new multi-fractal-based anomaly detection algorithm and a new detection framework were constructed.On the DARPA/Lincoln laboratory intrusion detection evaluation data set 1999, this algorithm’s detection rate is high at low false alarm rate, which is better than EMERALD.…”
    Get full text
    Article
  15. 355

    Implementation of CNN Algorithm for Indonesian Hoax News Detection on Online News Portals by Clifansi Remi Siwi Hati, Heni Sulistiani

    Published 2025-06-01
    “…Therefore, an effective method is needed to detect it. The purpose of this research is to apply deep learning with the Convolutional Neural Network (CNN) algorithm in detecting text-based hoax news in Indonesian. …”
    Get full text
    Article
  16. 356

    Application-Oriented Fault Detection and Recovery Algorithm for Wireless Sensor and Actor Networks by Jinglin Du, Li Xie, Xiaoyan Sun, Ruoqin Zheng

    Published 2012-10-01
    “…This paper proposed an application-oriented fault detection and recovery algorithm (AFDR), a novel distributed algorithm to reestablish connectivity. …”
    Get full text
    Article
  17. 357
  18. 358

    Res-DNN based signal detection algorithm for end-to-end MIMO systems by Guoquan LI, Yonghai XU, Jinzhao LIN, Zhengwen HUANG

    Published 2022-03-01
    “…Deep learning can improve the effect of signal detection by extracting the inherent characteristics of wireless communication data.To solve the tradeoff between the performance and complexity of MIMO system signal detection, an end-to-end MIMO system signal detection scheme based on deep learning was proposed.The encoder and the decoder based on residual deep neural network replace the transmitter and the receiver of the wireless communication system respectively, and they were trained in an end-to-end manner as a whole.Firstly, the features of the input data were extracted by encoder, then the communication model was established and was sent to the zero forcing detector for preliminary detection.Finally, the detection signal was reconstructed through the decoder.Simulation results show that the proposed detection scheme is superior to the same type of algorithm, and the detection performance is significantly better than that of the MMSE detection algorithm at the expense of a certain time complexity.…”
    Get full text
    Article
  19. 359

    Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm by Jie Chang, Xiaojun Zuo, Botao Hou, Lipeng Shi, Guanghua Zhang

    Published 2021-01-01
    “…Finally, the characteristics of grey relational analysis and rough set theory attribute reduction are used to form the basis of grey correlation decision-level fusion algorithm, to achieve effective processing of the data of the Internet of Things security monitoring system.…”
    Get full text
    Article
  20. 360

    Research on intrusion detection algorithm in wireless network based on Bayes game model by CHEN Hang1, TAO Jun1

    Published 2010-01-01
    “…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
    Get full text
    Article