Development of Intelligent Human Flow Density Detection System based on Sensor Fusion

Author(s):  
Yi-Horng Lai ◽  
Yu-Cheng Chang ◽  
Jau-Woei Perng
2014 ◽  
Vol 1044-1045 ◽  
pp. 818-824
Author(s):  
Bo Fan Yang ◽  
Rui Wang ◽  
Gang Wang ◽  
Li Zhao

Aiming at signal detection of radar target, concerning about on the basis of the influence of SNR on detection probability when false alarm probability is given based on N-P criterion, a kind of multi-sensor fusion detection based on SNR is put forward. It can improve system’s detection probability under the condition of required false alarm probability in the detection of low SNR signal. The simulation results show that the detection performance is significantly increased, no matter fusion detection system is composed of same sensors working in the same working point or different sensors.


2016 ◽  
Vol 43 (1) ◽  
pp. 0114001
Author(s):  
罗伟 Luo Wei ◽  
李淼 Li Miao ◽  
张健 Zhang Jian ◽  
李华龙 Li Hualong ◽  
高翔 Gao Xiang

1998 ◽  
Author(s):  
O. Robert Mitchell ◽  
Thomas J. Herrick ◽  
David A. Summers ◽  
Richard D. Rechtien ◽  
James L. Drewniak ◽  
...  

Author(s):  
Ciza Thomas ◽  
N. Balakrishnan

Intrusion Detection Systems form an important component of network defense. Because of the heterogeneity of the attacks, it has not been possible to make a single Intrusion Detection System that is capable of detecting all types of attacks with acceptable levels of accuracy. In this chapter, the distinct advantage of sensor fusion over individual IDSs is proved. The detection rate and the false positive rate quantify the performance benefit obtained through the fixing of threshold bounds. Also, the more independent and distinct the attack space is for the individual IDSs, the better the fusion of Intrusion Detection Systems performs. A simple theoretical model is initially illustrated and later supplemented with experimental evaluation. The chapter demonstrates that the proposed fusion technique is more flexible and also outperforms other existing fusion techniques such as OR, AND, SVM, and ANN, using the real-world network traffic embedded with attacks.


Sign in / Sign up

Export Citation Format

Share Document