• Title/Summary/Keyword: probability of detection

Search Result 1,121, Processing Time 0.03 seconds

Design and Performance Analysis of Energy-Aware Distributed Detection Systems with Multiple Passive Sonar Sensors (다중 수동 소나 센서 기반 에너지 인식 분산탐지 체계의 설계 및 성능 분석)

  • Kim, Song-Geun;Hong, Sun-Mog
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.9-21
    • /
    • 2010
  • In this paper, optimum design of distributed detection is considered for a parallel sensor network system consisting of a fusion center and multiple passive sonar nodes. Nonrandom fusion rules are employed as the fusion rules of the sensor network. For the nonrandom fusion rules, it is shown that a threshold rule of each sensor node has uniformly most powerful properties. Optimum threshold for each sensor is investigated that maximizes the probability of detection under a constraint on energy consumption due to false alarms. It is also investigated through numerical experiments how signal strength, false alarm probability, and the distance between three sensor nodes affect the system detection performances.

Performance of Detection Probability with Adaptive Threshold Algorithm for CR Based on Ad-Hoc Network (인지 무선 기반 애드 혹 네트워크에서 적응적 임계치 알고리즘을 이용한 센싱 성능)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.5
    • /
    • pp.632-639
    • /
    • 2012
  • Ad-hoc networks can be used various environment, which it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio(CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In conventional CR based ad-hoc network, it uses constant threshold value to detect primary user signal, so the results become not reliable. In this paper, to solve this problem, we apply adaptive threshold value to the CR based ad-hoc network, and adaptive threshold is immediately changed by SNR(Signal to Noise Ratio). From the simulation results, we confirmed that proposed algorithm has the greatly better detection probabilities than conventional CR based ad-hoc network.

Performance Analysis of Fractional Bandwidth Mode Detection for a Cognitive Radio Based OFDM System (인지 라디오 기반 OFDM 시스템을 위한 부분대역모드 검출 기법의 성능 분석)

  • Lee, Ji-Hye;Wang, Jin-Soo;Kim, Yun-Hee;Yoon, Seok-Ho;Song, Lick-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.238-245
    • /
    • 2010
  • For orthogonal frequency division multiplexing (OFDM) systems sharing the spectrum with narrow band primary devices, a fractional bandwidth (FBW) mode has been proposed recently to reduce the interference to the primary users. The FBW mode divides the total OFDM bandwidth into subbands and activates (or deactivates) a subset of the subbands according to the result of spectrum sensing. In this paper, we analyze the detection error probability of FBW mode information which is delivered by the sequence embedded in the preamble and evaluate the performance in wireless regional area network environments. The results show that the detection probability derived analytically estimates the actual value from simulation adequately and that a low detection error probability less than $10^{-3}$ is obtained at a low signal-to-noise power ratio.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

An Effective Concept Drift Detection Method on Streaming Data Using Probability Estimates (스트리밍 데이터에서 확률 예측치를 이용한 효과적인 개념 변화 탐지 방법)

  • Kim, Young-In;Park, Cheong Hee
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.718-723
    • /
    • 2016
  • In streaming data analysis, detecting concept drift accurately is important to maintain the performance of classification model. Error rates are usually used for concept drift detection. However, by describing prediction results with only binary values of 0 or 1, useful information about a behavior pattern of a classifier can be lost. In this paper, we propose an effective concept drift detection method which describes performance pattern of a classifier by utilizing probability estimates for class prediction and detects a significant change in a classifier behavior. Experimental results on synthetic and real streaming data show the efficiency of the proposed method for detecting the occurrence of concept drift.

Fault Detection of Small Turbojet Engine for UAV Using Unscented Kalman Filter and Sequential Probability Ratio Test (무향칼만필터와 연속확률비 평가를 이용한 무인기용 소형제트엔진의 결함탐지)

  • Han, Dong Ju
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.4
    • /
    • pp.22-29
    • /
    • 2017
  • A study is performed for the effective detection method of a fault which is occurred during operation in a small turbojet engine with non-linear characteristics used by unmanned air vehicle. For this study the non-linear dynamic model of the engine is derived from transient thermodynamic cycle analysis. Also for inducing real operation conditions the controller is developed associated with unscented Kalman filter to estimate noises. Sequential probability ratio test is introduced as a real time method to detect a fault which is manipulated for simulation as a malfunction of rotational speed sensor contaminated by large amount of noise. The method applied to the fault detection during operation verifies its effectiveness and high feasibility by showing good and definite decision performances of the fault.

Damage detection using finite element model updating with an improved optimization algorithm

  • Xu, Yalan;Qian, Yu;Song, Gangbing;Guo, Kongming
    • Steel and Composite Structures
    • /
    • v.19 no.1
    • /
    • pp.191-208
    • /
    • 2015
  • The sensitivity-based finite element model updating method has received increasing attention in damage detection of structures based on measured modal parameters. Finding an optimization technique with high efficiency and fast convergence is one of the key issues for model updating-based damage detection. A new simple and computationally efficient optimization algorithm is proposed and applied to damage detection by using finite element model updating. The proposed method combines the Gauss-Newton method with region truncation of each iterative step, in which not only the constraints are introduced instead of penalty functions, but also the searching steps are restricted in a controlled region. The developed algorithm is illustrated by a numerically simulated 25-bar truss structure, and the results have been compared and verified with those obtained from the trust region method. In order to investigate the reliability of the proposed method in damage detection of structures, the influence of the uncertainties coming from measured modal parameters on the statistical characteristics of detection result is investigated by Monte-Carlo simulation, and the probability of damage detection is estimated using the probabilistic method.

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

A study on the detection threshold for multitarget tracking (다중표적 추적을 위한 표적 탐지 임계값에 대한 연구)

  • 이양원;이봉기;김광태;김경기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.834-838
    • /
    • 1992
  • Tracking performance depends on the quantity of the measurement data. In the Kalman-Bucy filter and other trackers, this dependence is well understood in terms of the measurement noise covariance matrix, which specifies the uncertainty in the value of measurement inputs. In this paper, we derived approximated error covariance matrix to evaluate the dependence of target detection probability and false alarm probability in the presence of uncertainty of measurement origin.

  • PDF

ANALYSIS OF HUMAN DECISION MAKING PROCESS BASED ON CONDITIONAL PROBABLILTY

  • Nakamura, Masatoshi;Goto, Satoru
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.783-786
    • /
    • 1997
  • Automatic realization of on-off human decision making was derived based on a conditional probability. Following the proposed procedure, problems of insulator washing timing in power substations and spike detection on EEG(electroencephalogram) records were appropriately solved.

  • PDF