Distributed Estimation and Detection under Local Information
نویسندگان
چکیده
منابع مشابه
Distributed Estimation and Detection under Local Information
This work considers the problem of obtaining optimal estimates via distributed computation in a large scale system. The electric power system, the transportation system, and generally any computer or network system, are examples of large scale systems: a decentralized estimation of signals based on observations acquired by spatially distributed sensors is the basis for a wide range of important...
متن کاملA Robust Distributed Estimation Algorithm under Alpha-Stable Noise Condition
Robust adaptive estimation of unknown parameter has been an important issue in recent years for reliable operation in the distributed networks. The conventional adaptive estimation algorithms that rely on mean square error (MSE) criterion exhibit good performance in the presence of Gaussian noise, but their performance drastically decreases under impulsive noise. In this paper, we propose a rob...
متن کاملDistributed Estimation Under Bandwidth and Energy Constraints
In parameter estimation problems a sequence of observations {x(n)}n=1 is used to estimate a random or deterministic parameter of interest s. Optimal estimation exploits the statistical correlation between x(n) and s that is described either by the joint probability distribution function (pdf) p(x(n), s) when s is assumed random; or by a family of observation pdfs p(x(n); s) parameterized by s w...
متن کاملDistributed Signal Detection under The
A procedure for nding the Neyman-Pearson optimum distributed sensor detectors for cases with statistically dependent observations is described. This is the rst valid procedure we have seen for this case. This procedure is based on a Theorem proven in this paper. These results clarify and correct a number of possibly misleading discussions in the existing literature. Cases with networks of senso...
متن کاملDetection under Privileged Information
Modern detection systems use sensor outputs available in the deployment environment to probabilistically identify attacks. These systems are trained on past or synthetic feature vectors to create a model of anomalous or normal behavior. Thereafter, run-time collected sensor outputs are compared to the model to identify attacks (or the lack of attack). While this approach to detection has been p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC Proceedings Volumes
سال: 2010
ISSN: 1474-6670
DOI: 10.3182/20100913-2-fr-4014.00032