Source Conflicts in Bayesian Identification

نویسندگان

  • Max Krüger
  • David Hirschhäuser
چکیده

In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discussing some general aspects of source conflicts and introducing two established conflict-definition approaches, it is denoted that these approaches each show a counterintuitive effect. By applying a conflict definition from the theory of Bayesian networks, the Coherence Approach and as refinement the Extended Coherence Approach are proposed. In an experimental evaluation, all approaches are compared with each other and with the expert’s intuitive understanding of source conflicts. 1 Bayesian Identification Identification of a tracked object is the characterization by assignment of an identity (ID). This identity describes object features, e.g., allegiance or intent, necessary to know in performing military missions. The standard identities Friend, Assumed Friend, Neutral, Suspect, Hostile, and Unknown are often used in context of military air surveillance and defense. Depending on the application context, different identities might be defined and applied. Bayesian identification facilitates fusion of uncertain information from manifold ID sources, e.g., track behavior, IFF equipment, Electronic Support Measures, and adherence to air traffic regulations. Subsequently, we sketch an exemplary Bayesian identification process. More details can be found in [BP99, pp. 496-497], [HM04, pp. 214-220], and [KK09]. A declaration is the statement of an ID source on a specific attribute or behavior of the considered tracked object, based on emissions measured by sensors. Consider as example the declaration object follows a civil air route. We assume that each of N ID sources provides a declaration di ∈ Di with i ∈ {1, . . . , N}. An object belongs to exactly one of M possible Operational Object States. The finite set of all possible states is given by OOS := {O1, . . . , OM}, e.g., OOS = {OF,NA,EF} with own forces (OF ), neutral allegiance (NA), and enemy forces (EF ). For each ID source i the Source Likelihood Vector SLV i = (p(di|Oj))j=1,...,M is assigned to the declaration di. Fusion is performed by element-wise multiplication of the source likelihood vectors of all ID sources, providing the Combined Likelihood Vector CLV = (p(d1, . . . , dN |Oj))j=1,...,M , whereat conditional independence as a model-given precondition is assumed. Subsequently, by application of the Theorem of Bayes the Posterior Likelihood Vector PLV = (p(Oj |d1, . . . , dN ))j=1,...,M is calculated. Finally, the PLV needs to be transformed into a standard identity (Friend, Assumed Friend, etc.) to be presented to an operational user. A minimax approach can be used to select an appropriate identity based on the PLV , for details see [KK09]. By configuration, a Bayesian identification process can be customized for different operational and technical scenarios, see e.g., [KZ08]. Subsequently, we will define and analyze conflicts based on the sketched exemplary identification process. The treatment can be transferred easily to other Bayesian-based identification processes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Contaminant Source Identification in Water Distribution Infrastructure Systems

Large water distribution systems can be highly vulnerable to penetration of contaminant factors caused by different means including deliberate contamination injections. As contaminants quickly spread into a water distribution network, rapid characterization of the pollution source has a high measure of importance for early warning assessment and disaster management. In this paper, a methodology...

متن کامل

Author gender identification from text using Bayesian Random Forest

Nowadays high usage of users from virtual environments and their connection via social networks like Facebook, Instagram, and Twitter shows the necessity of finding out shared subjects in this environment more than before. There are several applications that benefit from reliable methods for inferring age and gender of users in social media. Such applications exist across a wide area of fields,...

متن کامل

Competition on Rangelands Utilizations Conflict Source among Users in Semi – Arid Areas at Eldebeibat, South Kordofan State–Sudan

This study was conducted at Eldebeibat area, in South Kordofan State, Sudan. The aim of this study was to assess the role of competition on rangelands’ utilization on occurrence of conflicts between land’s users in the semi-arid areas of Eldebeibat, Sudan. Two target questionnaires were designed to collect data from two groups of land users namely nomadic pastoralists and sedentary farmers that...

متن کامل

SAR Interferometry, Bayesian inversion, Sarpol-e zahab earthquake, Fault source parameters

Abstract Earthquakes occur at teh border of teh plates and faults, causing financial and casual damages. Teh study of earthquakes and surface deformation is useful in understanding teh mechanism of earthquakes and managing teh risks and crises of earthquakes. A fault can be specified by its geometric source parameters. In Okada’s definition, these parameters are length, width, depth, strike, di...

متن کامل

Dynamic Bayesian Network Factors from Possible Conflicts for Continuous System Diagnosis

This paper introduces a factoring method for Dynamic Bayesian Networks (DBNs) based on Possible Conflicts (PCs), which aim to reduce the computational burden of Particle Filter inference. Assuming single fault hypothesis and known fault modes, the method allows performing consistency based fault detection, isolation and identification of continuous dynamic systems, with the unifying formalism o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009