-
481
Low-complexity optimal MPSK detection for spatial modulation
Published 2015-08-01“…The low-complexity optimal SM detection algorithm for MQAM signal detection had been proposed,but no similar method was found for MPSK signal.The problem of low-complexity detection for MPSK signal was considered in SM systems.Utilizing 2-D vector quantization of ML demodulation and the property of MPSK constellation,a low-complexity optimal detection which is independent to modulation order was developed.Since the approach avoids the exhaustive searching on signal constellation space,the computational complexity can be significantly reduced.The proposed detection algorithm can provide the identical performance with ML-optimum detector and has lower computational complexity.Therefore,it has both theoretical and practical significance.The proposed algorithm is of great significance in the large antenna and green communication technology.…”
Get full text
Article -
482
Deterministic Aided STAP for Target Detection in Heterogeneous Situations
Published 2013-01-01“…Indeed, in this case, representative target free data are no longer available. Single dataset algorithms, such as the MLED algorithm, have proved their efficiency in overcoming this problem by only working on primary data. …”
Get full text
Article -
483
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
484
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
485
Detection of Montage in Lossy Compressed Digital Audio Recordings
Published 2014-12-01“…This paper addresses the problem of tampering detection and discusses methods used for authenticity analysis of digital audio recordings. …”
Get full text
Article -
486
Visual detection of screen defects in occlusion and missing scenes
Published 2023-11-01“…To improve the intelligent level and solve the difficult problem of defect detection in complex scenarios, a visual detection system for screen defects in occluded and missing scenes is constructed based on object detection and matching, as well as image difference technology. …”
Get full text
Article -
487
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
Get full text
Article -
488
Improved printed circuit board defect detection scheme
Published 2025-01-01“…Abstract In this paper, an improved printed circuit board(PCB)defect detection scheme named PD-YOLOv8 is proposed, which is specialized in the common and challenging problem of small target recognition in PCB inspection. …”
Get full text
Article -
489
Semi-supervised anchorless single-engine grip detection
Published 2025-04-01“…The extensive application of artificial intelligence in wireless communication, 3D reconstruction, and target location has successfully solved the modeling problem. Grasping specific objects in a stacked scene is a difficult task to achieve robot grasping. …”
Get full text
Article -
490
Domain Adaptation for Pedestrian Detection Based on Prediction Consistency
Published 2014-01-01“…Pedestrian detection is an active area of research in computer vision. …”
Get full text
Article -
491
Detection and Optimization of Traffic Networks Based on Voronoi Diagram
Published 2021-01-01“…As compared with the existing algorithms, our approach works directly on noisy data and detects salient peaks without a smoothing prestep and thus avoids the dilemma in choosing an appropriate smoothing scale and prevents the occurrence of removing/degrading real peaks during smoothing step. …”
Get full text
Article -
492
Statistical bayesian algorithm for processing thermographic images of the cow udder for diagnosing mastitis
Published 2023-08-01Get full text
Article -
493
Determined the Edges Using the ant Colony Algorithm and Apply them to Medical Images
Published 2012-12-01“…The results show high accuracy in edge detection of different biomedical images with different neighbors, the proposed algorithm is implemented in C Sharp 2008 language which provides high-efficiency software visible language and speed. …”
Get full text
Article -
494
Abnormal Event Detection Method in Multimedia Sensor Networks
Published 2015-11-01“…Audio sensors also have price advantage. Detecting abnormal audio events in complicated background environment is a very difficult problem; only few previous researches could offer good solution. …”
Get full text
Article -
495
Machine vision model for drip leakage detection of pipeline.
Published 2025-01-01“…The droplet boundary extraction algorithm is proposed, and the three-dimensional model of the target droplet is established, so the volume calculation problem of the droplet is solved, which provides a way of thinking for drip leakage detection of the pipeline.…”
Get full text
Article -
496
Spectrum sensing algorithm based on stochastic resonance and non-central F-distribution
Published 2023-01-01“…To solve the problem that the detection probability of the spectrum sensing algorithm is low and the number of samples required for detection is large at low signal-to-noise ratio (SNR), a spectrum sensing algorithm based on stochastic resonance and non-central F-distribution (SRNF) was proposed.By introducing direct-current stochastic resonance noise, the system model of SRNF was established, and the expression of test statistic, false alarm probability and detection probability, and the expression of decision threshold obeying non-central F-distribution were deduced, and the optimal stochastic resonance noise parameter was solved by numerical method.The simulation results show that the detection performance of the proposed SRNF algorithm is better than that of energy detection (ED) algorithm and blind spectrum sensing based on F-distribution (BSF) algorithm at a low SNR.When the false alarm probability is 5%, the SNR is -12 dB, and the number of samples is 200, the detection probability of the proposed algorithm is 95%, which is 34% and 67% higher than BSF algorithm and ED algorithm, respectively.When the SNR is -12 dB, and the detection probability reaches 95%, the number of samples required by the proposed algorithm is 210, which saves 340 samples compared to the BSF algorithm.Furthermore, the proposed algorithm is less affected by noise uncertainty than ED algorithm.…”
Get full text
Article -
497
Use of deep learning in early software bug detection
Published 2025-07-01“…To increase software efficiency, dependability, and quality early software problem identification is important. Therefore, an efficient software bug detection model is a critically significant challenging operation, and that has been developed in this work by designing the efficient model while using the promises dataset as input for bug identification. …”
Get full text
Article -
498
Domain Adaptation for Satellite-Borne Multispectral Cloud Detection
Published 2024-09-01“…In this paper, we address the domain gap problem in the context of onboard multispectral cloud detection. …”
Get full text
Article -
499
Fire and Smoke Detection Based on Improved YOLOV11
Published 2025-01-01“…In this paper, the core DCN2 (Deformable Convolutional Networks2) of the YOLOV11 Head is replaced with the DCN3 module to form a new detection head. In addition, the loss function CIOU in YOLOV11 is replaced with IOU to consider the irregular shape of fire and smoke and the problem of multi-scale targets. …”
Get full text
Article -
500
Analysis of Internet Marketing Forecast Model Based on Parallel K-Means Algorithm
Published 2021-01-01“…Secondly, the weights in the K-means algorithm are mostly only applicable to target detection tasks. …”
Get full text
Article