1997
DOI: 10.1109/62.618014
|View full text |Cite
|
Sign up to set email alerts
|

Sensor fusion for intelligent alarm analysis

Abstract: RECElV MAR 1 5 19%The purpose of an intelligent alarm analysis system is to provide complete and manageable information to a central alarm station operator by applying alarm processing and fusion techniques to sensor information. This paper discusses the sensor fusion approach taken to perform intelligent alarm analysis for the Advanced Exterior Sensor (AES). The AES is an intrusion detection and assessment system designed for wide-area coverage, quick deployment, low falsehuisance alarm operation, and immedia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2004
2004
2010
2010

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…Fig. 3 shows the local implementation of the rule at the ith node corresponding to (20) in terms of the causal filterH(z) = z H(z), in the case that W is given by (12). Proper choice of the strictly causal filter h [k] in (20) with W in the form (12) can lead to AC rules with faster convergences rates than the associated first-order rules.…”
Section: Asymptotically Converging Lti Rulesmentioning
confidence: 98%
See 3 more Smart Citations
“…Fig. 3 shows the local implementation of the rule at the ith node corresponding to (20) in terms of the causal filterH(z) = z H(z), in the case that W is given by (12). Proper choice of the strictly causal filter h [k] in (20) with W in the form (12) can lead to AC rules with faster convergences rates than the associated first-order rules.…”
Section: Asymptotically Converging Lti Rulesmentioning
confidence: 98%
“…3 shows the local implementation of the rule at the ith node corresponding to (20) in terms of the causal filterH(z) = z H(z), in the case that W is given by (12). Proper choice of the strictly causal filter h [k] in (20) with W in the form (12) can lead to AC rules with faster convergences rates than the associated first-order rules. In particular, provided X k h[k] = 1, 1 We remark that we can readily construct AC rules for arbitrary connected topologies by adding to the denominator of the fraction on the right-hand side of (18) an > 0.…”
Section: Asymptotically Converging Lti Rulesmentioning
confidence: 98%
See 2 more Smart Citations
“…In these methods, the macro features of network traffic, such as self-similarity [1,2],entropy [3,4], probability distribution [5,6,7,8] et al, were extracted, followed by using various pattern recognition techniques, such as neural networks [9], hidden Markov model [10], integrated access control [11], and sensor fusion [12], machine learning [13] ,to detect network anomaly.…”
Section: Introductionmentioning
confidence: 99%