Distributed Estimation and Detection under Local Information

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Estimation and Detection under Local Information

This work considers the problem of obtaining optimal estimates via distributed computation in a large scale system. The electric power system, the transportation system, and generally any computer or network system, are examples of large scale systems: a decentralized estimation of signals based on observations acquired by spatially distributed sensors is the basis for a wide range of important...

متن کامل

A Robust Distributed Estimation Algorithm under Alpha-Stable Noise Condition

Robust adaptive estimation of unknown parameter has been an important issue in recent years for reliable operation in the distributed networks. The conventional adaptive estimation algorithms that rely on mean square error (MSE) criterion exhibit good performance in the presence of Gaussian noise, but their performance drastically decreases under impulsive noise. In this paper, we propose a rob...

متن کامل

Distributed Estimation Under Bandwidth and Energy Constraints

In parameter estimation problems a sequence of observations {x(n)}n=1 is used to estimate a random or deterministic parameter of interest s. Optimal estimation exploits the statistical correlation between x(n) and s that is described either by the joint probability distribution function (pdf) p(x(n), s) when s is assumed random; or by a family of observation pdfs p(x(n); s) parameterized by s w...

متن کامل

Distributed Signal Detection under The

A procedure for nding the Neyman-Pearson optimum distributed sensor detectors for cases with statistically dependent observations is described. This is the rst valid procedure we have seen for this case. This procedure is based on a Theorem proven in this paper. These results clarify and correct a number of possibly misleading discussions in the existing literature. Cases with networks of senso...

متن کامل

Detection under Privileged Information

Modern detection systems use sensor outputs available in the deployment environment to probabilistically identify attacks. These systems are trained on past or synthetic feature vectors to create a model of anomalous or normal behavior. Thereafter, run-time collected sensor outputs are compared to the model to identify attacks (or the lack of attack). While this approach to detection has been p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC Proceedings Volumes

سال: 2010

ISSN: 1474-6670

DOI: 10.3182/20100913-2-fr-4014.00032