• No results found

fixed false alarm rate

Reliable likelihood ratios for statistical model-based voice activity detector with low false-alarm rate

Reliable likelihood ratios for statistical model-based voice activity detector with low false-alarm rate

... almost fixed, the high-powered region may also be fixed for every noise frame, but in case of speech frames, the high-powered region can be moved by speech ...

12

Index Terms Genetic Programming, Fitness function, Object Detection, Detection Rate, False Alarm Rate

Index Terms Genetic Programming, Fitness function, Object Detection, Detection Rate, False Alarm Rate

... of fixed size over the image containing objects which are to be ...are fixed. By allowing a fixed step size, we reduce the number of false alarms ...more false alarms we ...

6

Distributed CA-CFAR and OS-CFAR Detectors Mentored by Biogeography Based Optimization Tool

Distributed CA-CFAR and OS-CFAR Detectors Mentored by Biogeography Based Optimization Tool

... constant false alarm rate (CFAR) detection in homogeneous and heterogeneous Gaussian clutter using Biogeography Based Optimization (BBO) method is ...achieving fixed probabilities of ...

10

SMILE DETECTION WITH IMPROVED MISDETECTION RATE AND REDUCED FALSE ALARM RATE

SMILE DETECTION WITH IMPROVED MISDETECTION RATE AND REDUCED FALSE ALARM RATE

... Running cross correlation value’s mean and standard deviation on FGNET face database. There are eighteen people, who have three sets of image sequences for each. Each set has 101 images or 151 images and roughly half of ...

9

A Prototype Multiview Approach for Reduction of False alarm rate in Network Intrusion Detection System

A Prototype Multiview Approach for Reduction of False alarm rate in Network Intrusion Detection System

... In this experiment, we deploy MVPSys in CIDN (collaborative intrusion detection network) within an organization including over 100 personnel. A CIDN enables an IDS node to exchange information and learn experience with ...

11

Intrusion Detection: A Survey

Intrusion Detection: A Survey

... tree technique to improve existing IDS. Further, to detect cross layer attacks they deployed intelligent IDS methods like Back Propagation Network,Bayesian Classification,Support VectorMachines. The main goal is to ...

5

Spectrum Occupancy Measurement of Weakly Correlated Noise over Fading Channels

Spectrum Occupancy Measurement of Weakly Correlated Noise over Fading Channels

... of false alarm and detection probability compared to energy detection ...The false alarm and detection probabilities with correlation coefficient ...samples fixed to 10000 are estimated ...

6

2231 0 discex00 paper pdf

2231 0 discex00 paper pdf

... Background traffic was necessary to determine the false alarm rates of intrusion detection systems. A large amount of web, telnet, and mail traffic was generated between the inside PC’s and workstations and ...

15

Chinese Spelling Check Evaluation at SIGHAN Bake off 2013

Chinese Spelling Check Evaluation at SIGHAN Bake off 2013

... Table 1 shows the statistics of our prepared test sets. The sentences were collected from 13 to 14- year-old students’ essays in formal written tests. The average length of sentences is about 70 characters, which is a ...

8

809b88f4447b6bf43485eb6460b26f6afabdb40a.pdf

809b88f4447b6bf43485eb6460b26f6afabdb40a.pdf

... The unprecedented characteristics of DLT17ck raise a question as to the rates of such objects. The daily cadence of the DLT40 search can help constrain the rates of kilonovae and other rapidly-evolving transients. ...

22

Non parametric wavelet based texture synthesis

Non parametric wavelet based texture synthesis

... In this communication we propose an approach to auto- matically set the threshold to apply to the GLR CUSUM statistics. Optimality criteria of sequential tests such as the CUSUM test are defined as a lower bound on a ...

6

Constant False Alarm Rate for Target Detection by Using First Order and Second Order Microwave Differentiators

Constant False Alarm Rate for Target Detection by Using First Order and Second Order Microwave Differentiators

... A differentiator, which is set by using basic components like capacitor (C) and resister (R) as shown in fig 1.The same circuit is performed in Advanced Design Software (ADS) as shown in fig 2 and the input is applied by ...

7

Attack Detection over Network based on C45 and RF Algorithms

Attack Detection over Network based on C45 and RF Algorithms

... detection rate (percentage of detecting attacks among all attack data) and false alarm rate (percentage of normal data which is wrongly recognized as an attack) and compare both algorithm ...

6

Was LIGO’s Gravitational Wave Detection a False Alarm?

Was LIGO’s Gravitational Wave Detection a False Alarm?

... a false detection of gravitational ...“ false alarm rate lower than 1 in 22,500 years” , denying the statistical evidence that LIGO has detected gravitational waves in the GW150914 ...

21

Efficient evaluation of the Number of False Alarm criterion

Efficient evaluation of the Number of False Alarm criterion

... Since the seminal articles of Desolneux et al. [1, 2], detec- tion approaches based on the Number of False Alarms (NFA) criterion became more and more popular in the field of image processing over the last decade. ...

15

Online Full Text

Online Full Text

... In this paper we proposed improved Support Vector Machine (iSVM) algorithm for classification of cyber attack dataset. As we know that the performance of support vector machine is greatly depend on the kernel function ...

6

Advanced Cell – Averaging Constant False Alarm Rate Method in Homogeneous and Multiple Target Environment

Advanced Cell – Averaging Constant False Alarm Rate Method in Homogeneous and Multiple Target Environment

... Radar return is often a mixture of noise, clutter and targets. A key component in RADAR processing is the setting of detection thresholds. These thresholds differentiate between targets of interest and unwanted radar ...

6

An intrusion detection scheme for identifying known and unknown web attacks (I WEB)

An intrusion detection scheme for identifying known and unknown web attacks (I WEB)

... Classification is a supervised approach that is able to differentiate unusual data patterns, thus making it the most suitable option to identify unseen attack patterns (Farid et al., 2014). A classifier will gather the ...

188

Intrusion Detection in KDD99 Dataset using SVM PSO and Feature Reduction with Information Gain

Intrusion Detection in KDD99 Dataset using SVM PSO and Feature Reduction with Information Gain

... 41 fixed feature attributes and a class identifier. In the 41 fixed feature attributes, nine characteristic properties is the discrete type, and others are ...

5

On the effect of false alarm rate on the performance of cognitive radio networks

On the effect of false alarm rate on the performance of cognitive radio networks

... Here, we introduce a new performance metric that mea- sures the secondary self-termination probability. The motivation of proposing this new metric starts with the fact that in CRNs, the occurrence of false alarms ...

17

Show all 10000 documents...

Related subjects