• Title/Summary/Keyword: Detection probability

Search Result 1,121, Processing Time 0.038 seconds

A Probabilistic Detection Algorithm for Noiseless Group Testing (무잡음 그룹검사에 대한 확률적 검출 알고리즘)

  • Seong, Jin-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1195-1200
    • /
    • 2019
  • This paper proposes a detection algorithm for group testing. Group testing is a problem of finding a very small number of defect samples out of a large number of samples, which is similar to the problem of Compressed Sensing. In this paper, we define a noiseless group testing and propose a probabilistic algorithm for detection of defective samples. The proposed algorithm is constructed such that the extrinsic probabilities between the input and output signals exchange with each other so that the posterior probability of the output signal is maximized. Then, defective samples are found in the group testing problem through a simulation on the detection algorithm. The simulation results for this study are compared with the lower bound in the information theory to see how much difference in failure probability over the input and output signal sizes.

M & S Tool for Analyzing the Detection Performance in Bistatic Radar (바이스태틱 레이더의 탐지 성능 분석용 M & S Tool)

  • Kim, Kwan-Soo;Youn, Jae-Hyuk;Yang, Hoon-Gee;Chung, Young-Seek;Lee, Won-Woo;Bae, Kyung-Bin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.6
    • /
    • pp.631-640
    • /
    • 2011
  • This paper proposes a M & S Tool for simulating the detection performance in the bistatic radar system. After examing the interrelationship among the bistatic radar parameters, $P_d$(probability of detection), $P_{fa}$(probability of false alarm) and ��SNR of the received signal, we analyze the range of the bistatic radar range product and range sum. We derive the number of integration of the received pulses that satisfies the required detection performance of the bistatic radar system, along with the analysis of the performance degradation in the jammer scenario. Finally, the analyzed results are implemented in the M & S Tool which consists of 4 modules.

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theorys

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kwon, Kee-Koo;Kwon, Ki-Ryong;Lee, Kuhn-Il
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1272-1275
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes' decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.

  • PDF

The Infiltrating Small Ship Target Detection Probability Calculation Program Design for the USV Mission Planning Suitability Analysis (무인수상정의 임무계획 적합성 분석을 위한 침투 표적 탐지율 산출 프로그램 설계)

  • Kim, Min J.;Hwang, Kun Chul;Yu, Chan Woo;Kim, Jung Hoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.5
    • /
    • pp.287-293
    • /
    • 2017
  • The naval unmanned surface vehicle (USV) conducts the surveillance operations, based on the mission plan set by the user. For setting the mission planning, the user needs to analyze the suitability of the operation for the mission planning. In this paper, we proposed a simulation program that estimates the probability of detecting targets of the mission planning in the analysis. In the simulation analysis, we design the USV's maneuvering characteristics, radar detection operational performance equipped on the USV, and targets infiltrating into surveillance area in the simulation experiment scenario. Based on the simulation results, we evaluated the mission planning suitability and find a mission planning solution recursively.

Speech detection using the probability of spectral occupancy (주파수 차지확률을 이용한 음성검출기 제안)

  • Hong, Seong-Bong;Ki, Tae-Young;Kim, Nam-Soo;Kim, Taejeong
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.171-174
    • /
    • 2000
  • In this paper, we improve statistical-model-based speech detector using the probability that a speech occupies a frequency bin. While the previous method assumes speech energy occupies all the frequency components and use them with equal weights in the likelihood ratio test for speech detection, the proposed method assumes speech energy occupies just some frequency componets and use them with different weights in accordance with the probabilities of spectral occupancy in the test. The probability is iteratively up-dated for speech frames to contribute to the likelihood ratio test. The proposed method well reflects the characteristic distribution of speech spectrum, and yields better detection performance.

  • PDF

Improvement in Probability of Detection for Leakage Magnetic Flux Methods (누설자속탐상법의 결함검출능력 향상에 관한 연구)

  • Lee, Jin-Yi
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.13-18
    • /
    • 2004
  • It is important to estimate the distribution of intensity of a magnetic field for application of magnetic method to industrial nondestructive evaluation. Magnetic camera provides the distribution of a quantitative magnetic field with homogeneous lift-off and same spatial resolution. Leakage magnetic flux near the crack on the specimen could be amplified by 3-dimensional magnetic fluid and zoom in and out of measurement area. This study introduces the experimental consideration of the effects of lens for concentrating of magnetic flux. The experimental results showed that the magnetic fluid has sufficient lens effect for magnetic camera and effect of improvement in probability of detection.

  • PDF

ADS-B based Trajectory Prediction and Conflict Detection for Air Traffic Management

  • Baek, Kwang-Yul;Bang, Hyo-Choong
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.3
    • /
    • pp.377-385
    • /
    • 2012
  • The Automatic Dependent Surveillance Broadcast (ADS-B) system is a key component of CNS/ATM recommended by the International Civil Aviation Organization (ICAO) as the next generation air traffic control system. ADS-B broadcasts identification, positional data, and operation information of an aircraft to other aircraft, ground vehicles and ground stations in the nearby region. This paper explores the ADS-B based trajectory prediction and the conflict detection algorithm. The multiple-model based trajectory prediction algorithm leads accurate predicted conflict probability at a future forecast time. We propose an efficient and accurate algorithm to calculate conflict probability based on approximation of the conflict zone by a set of blocks. The performance of proposed algorithms is demonstrated by a numerical simulation of two aircraft encounter scenarios.

Maximum Product Detection Algorithm for Group Testing Frameworks

  • Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.2
    • /
    • pp.95-101
    • /
    • 2020
  • In this paper, we consider a group testing (GT) framework which is to find a set of defective samples out of a large number of samples. To handle this framework, we propose a maximum product detection algorithm (MPDA) which is based on maximum a posteriori probability (MAP). The key idea of this algorithm exploits iterative detection to propagate belief to neighbor samples by exchanging marginal probabilities between samples and output results. The belief propagation algorithm as a conventional approach has been used to detect defective samples, but it has computational complexity to obtain the marginal probability in the output nodes which combine other marginal probabilities from the sample nodes. We show that the our proposed MPDA provides a benefit to reduce computational complexity up to 12% in runtime, while its performance is only slightly degraded compared to the belief propagation algorithm. And we verify the simulations to compare the difference of performance.

Double Faults Isolation Based on the Reduced-Order Parity Vectors in Redundant Sensor Configuration

  • Yang, Cheol-Kwan;Shim, Duk-Sun
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.2
    • /
    • pp.155-160
    • /
    • 2007
  • A fault detection and isolation (FDI) problem is considered for inertial sensors, such as gyroscopes and accelerometers and a new FDI method for double faults is proposed using reduced-order parity vector. The reduced-order parity vector (RPV) algorithm enables us to isolate double faults with 7 sensors. Averaged parity vector is used to reduce false alarm and wrong isolation, and to improve correct isolation. The RPV algorithm is analyzed by Monte-Carlo simulation and the performance is given through fault detection probability, correct isolation probability, and wrong isolation probability.

Performance Analysis of Cooperative Spectrum Sensing Based on Sharing Threshold among cooperative users (협력 노드의 합리적 임계치 공유를 통한 센싱 검출 성능 분석)

  • Seo, SungIl;Lee, MiSun;Kim, Jinyoung
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.1
    • /
    • pp.66-70
    • /
    • 2013
  • In this paper, Threshold setting method is proposed to improve detection probability for cooperative sensing. Even if cooperative users have all same false alarm rate, each user has different threshold due to pass ad-hoc channel. threshold level is related to detection probability. So, we select the highest threshold among cooperative users and then share threshold information for getting the high detection probability.