-
21
Reliable selfish node detection algorithm for opportunistic networks
Published 2016-03-01“…To address the problem of detection accuracy affected by situations like the omission of node receiving wrong frame and failure of monitoring beyond nodes'communication range during the consideration of the ex ing selfish node detection algorithms in opportunistic networks,a novel and reliable selfish node detection algorithm——RSND algorithm for opportunistic networks was proposed.It employs wrong frame analysis based on cross-layer monitoring mechanism,information excavation based on node encounter and node distance estimation based on RSSI three new mechanisms to eliminate the influence of node's selfishness detection due to wrong frame and failure of monitoring beyond nodes' communication range,improving the reliability of detection.Theoretical analysis verifies the effectiveness of RSND,and simulation results show that RSND can improve selfish node detection accuracy ratio and network throughput at least 6% and 4%,as compared to the existing selfish node detection algorithm based on 2-ACK and watchdog detection algorithm.…”
Get full text
Article -
22
ADOS-CFAR Algorithm for Multibeam Seafloor Terrain Detection
Published 2016-07-01“…This paper first discusses the principles and existing problems of the OS-CFAR and K-FINDER algorithms and then suggests the ADOS-CFAR algorithm and its fast calculation method for those problems. …”
Get full text
Article -
23
Weak Signal Detection Algorithm Based on Particle Filtering
Published 2025-06-01“…In the traditional particle filter algorithm, there exist problems such as poor robustness against noise and clutter, and difficulty in balancing the detection probability and false alarm probability. …”
Get full text
Article -
24
A survey of 3D object detection algorithms
Published 2023-03-01“…3D object detection is a fundamental problem in autonomous driving,virtual reality,robotics,and other applications.Its goal is to extract the most accurate 3D box characterizing interested targets from the disordered point clouds,such as the closest 3D box surrounding the pedestrians or vehicles.The target 3D box's location,size,and orientation are also output.Currently,there are two primary approaches for 3D object detection: (1) pure point cloud based 3D object detection,in which the point clouds are created by binocular vision,RGB-D camera,and lidar; (2) fusion-based 3D object detection based on the fusion of image and point cloud.The various representations of 3D point clouds were introduced.Then representative methods were introduced from three aspects: traditional machine learning techniques; non-fusion deep learning based algorithms; and multimodal fusion-based deep learning algorithms in progressive relation.The algorithms within and across each category were examined and compared,and the differences and connections between the various methods were analyzed thoroughly.Finally,remaining challenges of 3D object detection were discussed and explored.And the primary datasets and metrics used in 3D object detection studies were summarized.…”
Get full text
Article -
25
Machine Learning Algorithms Performance Evaluation for Intrusion Detection
Published 2021-01-01“…In this paper authors introduces Intrusion detection system (IDS) framework that is deployed over KDD Cup99 dataset by using machine learning algorithms as Support Vector Machine (SVM), Naïve Bayes and Random Forest for the purpose of improving the precision, accuracy and recall value to compute the best suited algorithm.…”
Get full text
Article -
26
Phishing detection algorithm based on attention and feature fusion
Published 2024-08-01“…To address the problem of escalating adversarial phishing technologies, a phishing detection algorithm based on the attention mechanism and feature fusion was proposed, and a hierarchical classification model was established. …”
Get full text
Article -
27
COMBINATORIAL ALGORITHM FOR OBJECT CONTOURS DETECTION OF DIGITAL IMAGES
Published 2016-10-01Get full text
Article -
28
Machine learning algorithm for intelligent detection of WebShell
Published 2017-04-01“…WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To solve these problems,a supervised machine learning algorithm was put forward to detect WebShell intelligently.By learning the features of existing WebShell and non-existing WebShell pages,the algorithm can make prediction of the unknown pages,and the flexibility and adaptability were both very good.Compared with the traditional WebShell detection methods,the experiment proves that the algorithm has higher detection efficiency and accuracy,and at the same time there is a certain probability to detect new types of WebShell.…”
Get full text
Article -
29
Algorithms for Integrated Object Detection in Wireless Sensor Networks
Published 2025-05-01“…Wireless sensor networks can be used to solve various economic problems, including detection of objects (phenomena) of interest. …”
Get full text
Article -
30
An Improved YOLOv9s Algorithm for Underwater Object Detection
Published 2025-01-01“…However, the complex marine environment, poor resolution, color distortion in underwater optical imaging, and limited computational resources all affect the accuracy and efficiency of underwater object detection. To solve these problems, the YOLOv9s-SD underwater target detection algorithm is proposed to improve the detection performance in underwater environments. …”
Get full text
Article -
31
Improved cell search algorithm for 5G NR
Published 2021-02-01“…The era of 5G NR has higher requirements for speed, capacity and user experience.In 5G NR physical layer, cell search is an indispensable process.Cell search mainly includes primary synchronization signal (PSS) detection algorithm and secondary synchronization signal (SSS) detection algorithm.The traditional PSS detection algorithm and SSS detection algorithm can’t satisfy the basic requirements of 5G NR.In order to solve this problem, an improved PSS detection algorithm based on the traditional M-segment cross-correlation detection algorithm was proposed.When the channel environment is bad, the traditional SSS detection algorithm will also fail.The improved SSS detection algorithm proposed can solve this problem.Finally, the traditional algorithm and the improved algorithm were compared and analyzed.The simulation results show that the detection performance of the proposed algorithm is significantly improved, and the detection efficiency and overall performance are also improved.…”
Get full text
Article -
32
An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms
Published 2023-06-01Get full text
Article -
33
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
Get full text
Article -
34
Research on Track Irregularity Detection Algorithm Based on Data Fusion
Published 2021-05-01“…Aiming at the problem of track irregularity detection method and accuracy, a strap-down inertial navigation technology was proposed. …”
Get full text
Article -
35
False Matches Removing in Copy-Move Forgery Detection Algorithms
Published 2020-03-01“…This paper presents an algorithm of the Copy-Move forgery detection using the SIFT algorithm with an effective method to remove the false positives by rejecting all key-points in matches list that own a neighbor less than the threshold. …”
Get full text
Article -
36
Garbage classification detection system based on the YOLOv8 algorithm
Published 2024-12-01“…Subsequently, the YOLOv8 algorithm is studied, applied to garbage detection and classification, and used for practical verification in unmanned vehicles. …”
Get full text
Article -
37
A traffic pattern detection algorithm based on multimodal sensing
Published 2018-10-01“…Although much work has been done on transportation mode detection problem, the accuracy is not sufficient. …”
Get full text
Article -
38
SIFT Feature-Based Video Camera Boundary Detection Algorithm
Published 2021-01-01“…Aiming at the problem of low accuracy of edge detection of the film and television lens, a new SIFT feature-based camera detection algorithm was proposed. …”
Get full text
Article -
39
Topology of Complex Networks and Performance Limitations of Community Detection Algorithms
Published 2017-01-01“…In this paper, we attempt to highlight this problem by studying networks with different topologies and evaluate the performance of community detection algorithms in the light of these topological changes. …”
Get full text
Article -
40
Research on Dual Mode Target Detection Algorithm for Embedded Platform
Published 2021-01-01“…The experimental results show that it has a more obvious advantage in detection accuracy than the single-band target detection model while the decision-level fusion target detection model meets the real-time requirements and also verifies the effectiveness of the above algorithm.…”
Get full text
Article