A learning decentralized sequential detection method based on neurocomputation

被引:0
作者
Guo, CG [1 ]
Kuh, A [1 ]
机构
[1] Univ Hawaii Manoa, Dept Elect Engn, Honolulu, HI 96822 USA
来源
FUSION'98: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTISOURCE-MULTISENSOR INFORMATION FUSION, VOLS 1 AND 2 | 1998年
关键词
decentralized sequential detection; neural networks; reinforcement learning; learning detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a neural-network learning method for a. decentralized sequential detection problem, in which each subsystem of the overall decentralized system is realized with a neural network. Suitable network models that can best match the detection problem of each subsystem are obtained. Then a reinforcement learning method is proposed to train the network fusion center and the error back propagation algorithm is used to train the network local detectors. It is shown that each neural-network subsystem can approach its ideal target - the posterior conditional probability function, in terms of minimum mean squared-error even though target values of the probability functions is not given to the learning system. This learning detection method has the advantage that it does not require statistical knowledge of observation sources and can be adapted to slowly changed environment. Simulation examples conducted on i.i.d. Gaussian data are presented for illustration.
引用
收藏
页码:199 / 206
页数:8
相关论文
共 50 条
  • [21] A chemical process fault detection method based on sparse filtering feature learning
    Jiang S.
    Kuang T.
    Li X.
    Huagong Xuebao/CIESC Journal, 2019, 70 (12): : 4698 - 4709
  • [22] Industrial Oil Pipeline Leakage Detection Based on Extreme Learning Machine Method
    Zhang, Honglue
    Li, Qi
    Zhang, Xiaoping
    Ba, Wei
    ADVANCES IN NEURAL NETWORKS, PT II, 2017, 10262 : 380 - 387
  • [23] A new method for behavioural-based malware detection using reinforcement learning
    Mohammadkhani, Sepideh
    Esmaeilpour, Mansour
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2018, 10 (04) : 314 - 330
  • [24] An efficient cascaded method for network intrusion detection based on extreme learning machines
    Yu, Yuanlong
    Ye, Zhifan
    Zheng, Xianghan
    Rong, Chunming
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11) : 5797 - 5812
  • [25] An efficient method for image forgery detection based on trigonometric transforms and deep learning
    Al Azrak, Faten Maher
    Sedik, Ahmed
    Dessowky, Moawad I.
    El Banby, Ghada M.
    Khalaf, Ashraf A. M.
    Elkorany, Ahmed S.
    Abd El-Samie, Fathi E.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 18221 - 18243
  • [26] Anomaly Detection Models Based on Context-aware Sequential Long Short-Term Memory Learning
    Xu, Lu
    Luan, Zhongzhi
    Fung, Carol
    Ye, Da
    Qian, Depei
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [27] QLLog: A log anomaly detection method based on Q-learning algorithm
    Duan, Xiaoyu
    Ying, Shi
    Yuan, Wanli
    Cheng, Hailong
    Yin, Xiang
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [28] Trend Detection Using Time Based Sequential Recommendations
    Khan, Aman
    Jain, S. K.
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [29] Decentralized supervisory control of discrete event systems based on reinforcement learning
    Yamasaki, T
    Ushio, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (11) : 3045 - 3050
  • [30] Autonomic decentralized elasticity based on a reinforcement learning controller for cloud applications
    Nouri, Seyed Mohammad Reza
    Li, Han
    Venugopal, Srikumar
    Guo, Wenxia
    He, MingYun
    Tian, Wenhong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 765 - 780