منابع مشابه
Asymptotically optimum tests for decentralized change detection
Assuming that sensors have full local memory, we introduce a novel test for the problem of decentralized change detection that is asymptotically optimum. According to our proposed scheme, sensors perform locally repeated SPRTs and communicate, asynchronously, their one-bit decisions to a fusion center. The fusion center in turn uses the sequentially acquired information to perform a CUSUM test ...
متن کاملHierarchical Quickest Change Detection via Surrogates
Change detection (CD) in time series data is a critical problem as it reveal changes in the underlying generative processes driving the time series. Despite having received significant attention, one important unexplored aspect is how to efficiently utilize additional correlated information to improve the detection and the understanding of changepoints. We propose hierarchical quickest change d...
متن کاملHierarchical Censoring Sensors for Change Detection
Devices in energy-limited wireless sensor networks remain in a low-communication ‘sleep’ mode until an alarm event is detected. It has been proposed to use ‘censoring sensors’ to reduce the probability that a sensor must transmit in this mode, thereby minimizing energy consumption when alarm events are not occurring, and lengthening sensor lifetime. Further, since devices in multi-hop networks ...
متن کاملA Generalizable Hierarchical Bayesian Model for Persistent SAR Change Detection
This paper proposes a hierarchical Bayesian model for multiple-pass, multiple antenna synthetic aperture radar (SAR) systems with the goal of adaptive change detection. We model the SAR phenomenology directly, including antenna and spatial dependencies, speckle and specular noise, and stationary clutter. We extend previous work by estimating the antenna covariance matrix directly, leading to im...
متن کاملEntropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Neural Networks and Learning Systems
سال: 2017
ISSN: 2162-237X,2162-2388
DOI: 10.1109/tnnls.2015.2512714