2015
DOI: 10.1007/978-3-319-25159-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Fusion of Static and Temporal Information for Threat Evaluation in Sensor Networks

Abstract: Abstract. In many CCTV and sensor network based intelligent surveillance systems, a number of attributes or criteria are used to individually evaluate the degree of potential threat of a suspect. The outcomes for these attributes are in general from analytical algorithms where data are often pervaded with uncertainty and incompleteness. As a result, such individual threat evaluations are often inconsistent, and individual evaluations can change as time elapses. Therefore, integrating heterogeneous threat evalu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…This preference ordering means that the potential threat of x is higher than that of y if and only if the overall threat assessment of x is greater than that of y. Hence, together with the equivalence relation ~ (ie, x ~ y if x y and y x), we show that the preference ordering in Definition is a total order that satisfies the properties of completeness and strict transitivity …”
Section: Finding the Most Dangerous Threatmentioning
confidence: 79%
See 2 more Smart Citations
“…This preference ordering means that the potential threat of x is higher than that of y if and only if the overall threat assessment of x is greater than that of y. Hence, together with the equivalence relation ~ (ie, x ~ y if x y and y x), we show that the preference ordering in Definition is a total order that satisfies the properties of completeness and strict transitivity …”
Section: Finding the Most Dangerous Threatmentioning
confidence: 79%
“…After obtaining the point‐valued DPTs of the watched objects regarding each attribute, to rank the potential threats of all the suspects to take the appropriate action directly, in this section we will discuss how to use a weighted aggregation operator to calculate the overall degree of a potential threat for each watched object after considering all relevant attributes. And Table lists notations used in Ma et al's paper, where DPT involves a given attribute for watched object x.…”
Section: Finding the Most Dangerous Threatmentioning
confidence: 99%
See 1 more Smart Citation