-
41
Network intrusion detection based on improved KNN algorithm
Published 2025-08-01“…An initial K-nearest neighbor algorithm based on representative points is proposed. …”
Get full text
Article -
42
Decentralized Algorithm for Sensors Fault Detection in HVAC Systems
Published 2016-01-01“…Due to the poor instantaneity and adaptability, the current methods for sensors fault detection are still less applied in practical project. …”
Get full text
Article -
43
Low complexity uplink multiuser MIMO detecting algorithm
Published 2010-01-01“…Aiming at the uplink multiuser MIMO system,a new space-time detecting algorithm was proposed,in which a linear recombination strategy was imposed on the received signal first,and then the matched filter vectors orthogonal to each users’ interference sets were used to eliminate the interference among users.Finally the signal of each user was line-arly space-time decoded by means of the orthogonal equivalent channel.The design of the algorithm under imperfect channel scenario was also provided.Theory analysis and simulation results reveal that the proposed algorithm has the advantages of low complexity and good robustness,and is superior to other detecting algorithms.…”
Get full text
Article -
44
Android malware detection using random forest algorithm
Published 2025-05-01“…Specifically, the research investigates the performance of various ML algorithms, with a focus on Random Forest, in detecting malware on the android platform. …”
Get full text
Article -
45
A survey of 3D object detection algorithms
Published 2023-03-01“…3D object detection is a fundamental problem in autonomous driving,virtual reality,robotics,and other applications.Its goal is to extract the most accurate 3D box characterizing interested targets from the disordered point clouds,such as the closest 3D box surrounding the pedestrians or vehicles.The target 3D box's location,size,and orientation are also output.Currently,there are two primary approaches for 3D object detection: (1) pure point cloud based 3D object detection,in which the point clouds are created by binocular vision,RGB-D camera,and lidar; (2) fusion-based 3D object detection based on the fusion of image and point cloud.The various representations of 3D point clouds were introduced.Then representative methods were introduced from three aspects: traditional machine learning techniques; non-fusion deep learning based algorithms; and multimodal fusion-based deep learning algorithms in progressive relation.The algorithms within and across each category were examined and compared,and the differences and connections between the various methods were analyzed thoroughly.Finally,remaining challenges of 3D object detection were discussed and explored.And the primary datasets and metrics used in 3D object detection studies were summarized.…”
Get full text
Article -
46
Feature-based enhanced boosting algorithm for depression detection
Published 2025-07-01Subjects: “…Feature-based enhanced boosting algorithm…”
Get full text
Article -
47
Unidirectional-link detection algorithms in wireless sensor networks
Published 2008-01-01Get full text
Article -
48
Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms
Published 2012-12-01Subjects: “…network intrusion detection…”
Get full text
Article -
49
-
50
Fake News Detection using the Random Forest Algorithm
Published 2025-05-01“…This study aims to develop an effective fake news detection system using the Random Forest algorithm approach. …”
Get full text
Article -
51
Weak Signal Detection Algorithm Based on Particle Filtering
Published 2025-06-01“…In the traditional particle filter algorithm, there exist problems such as poor robustness against noise and clutter, and difficulty in balancing the detection probability and false alarm probability. …”
Get full text
Article -
52
Machine learning algorithm for intelligent detection of WebShell
Published 2017-04-01“…WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To solve these problems,a supervised machine learning algorithm was put forward to detect WebShell intelligently.By learning the features of existing WebShell and non-existing WebShell pages,the algorithm can make prediction of the unknown pages,and the flexibility and adaptability were both very good.Compared with the traditional WebShell detection methods,the experiment proves that the algorithm has higher detection efficiency and accuracy,and at the same time there is a certain probability to detect new types of WebShell.…”
Get full text
Article -
53
Algorithms for Integrated Object Detection in Wireless Sensor Networks
Published 2025-05-01Subjects: Get full text
Article -
54
Surprisal-based algorithm for detecting anomalies in categorical data
Published 2025-06-01“…Although many algorithms have been proposed to address anomaly detection for numerical datasets, categorical and mixed datasets remain a significant challenge, primarily because a natural distance metric is lacking. …”
Get full text
Article -
55
-
56
Clustering Algorithm by Boundary Detection Base on Entropy of KNN
Published 2025-01-01“…Clustering analysis has been widely applied in various fields, and boundary detection based clustering algorithms have shown effective performance. …”
Get full text
Article -
57
A Novel Tornado Detection Algorithm Based on XGBoost
Published 2025-01-01“…The characteristics associated with the velocity attributes, reflectivity, velocity spectrum width, differential reflectivity, and correlation coefficient are used in the algorithm to achieve real-time tornado detection. Experimental evaluations have demonstrated that the proposed algorithm significantly improves tornado detection rates and leading times. …”
Get full text
Article -
58
Evaluating Subpixel Target Detection Algorithms in Hyperspectral Imagery
Published 2012-01-01“…We demonstrate our ability to evaluate detectors and find the best settings for their free parameters by comparing our results using the following stochastic algorithms for target detection: the constrained energy minimization (CEM), generalized likelihood ratio test (GLRT), and adaptive coherence estimator (ACE) algorithms. …”
Get full text
Article -
59
Reliable selfish node detection algorithm for opportunistic networks
Published 2016-03-01Subjects: Get full text
Article -
60
COMBINATORIAL ALGORITHM FOR OBJECT CONTOURS DETECTION OF DIGITAL IMAGES
Published 2016-10-01Get full text
Article