
IEEE/CAA Journal of Automatica Sinica
Citation: | Weiqiang Dong and Moshe Kam, "Dependent Randomization in Parallel Binary Decision Fusion," IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 361-376, Feb. 2021. doi: 10.1109/JAS.2021.1003823 |
WE study the parallel decentralized binary detection architecture shown in Fig. 1. The system uses
The architecture of Fig. 1 was investigated extensively (e.g., [1]–[10]). Its design in this study aims to satisfy a Neyman-Pearson criterion, namely to maximize the global probability of detection
To achieve this objective, the implementation tasks are to determine the local decision rules (mapping
Among other approaches, the existing literature provides analysis of three detection strategies for the system in Fig. 1.
1) A Deterministic Strategy: Each LD uses a deterministic local decision rule and the DFC uses a deterministic global decision rule [1].
2) A Strategy With Randomization at the DFC Only: Each LD uses a deterministic local decision rule and the DFC uses a randomized global decision rule [2], [7].
3) Dependent Randomization: all the LDs and the DFC use randomized decision rules. The randomization between the LDs and the DFC is coordinated and synchronized [5].
The need for dependent randomization (or “scheduled test”) was introduced in [4] and [5]. In [4], it was indicated that dependent randomization is certainly feasible but “may perform poorly if synchronization is lost.” In [5] scenarios were studied where dependent randomization can improve performance over a deterministic strategy and independent randomization. In this study, we find conditions under which dependent randomization is beneficial, quantify the effect of synchronization loss, and demonstrate how to recover (partially) from synchronization loss. Specifically, this paper analyzes the following cases.
4) Dependent Randomization (DFC Unsynchronized): All the LDs and the DFC use randomized decision rules. The LDs are coordinated and synchronized with each other. The DFC uses a randomized global decision rule but is not synchronized with the LDs.
5) Dependent Randomization (LDs Unsynchronized): All the LDs and the DFC use randomized decision rules. The randomization between some LDs and the DFC is coordinated and synchronized. Other LDs use randomized local decision rules independently of the other LDs and the DFC.
In Section II we present the three detection strategies (a)–(c) and summarize their characteristics. In Section III we present two examples of parallel decentralized detection system which we use to exemplify different operating conditions and performance. Section IV discusses strategies needed when the DFC loses synchronization with the LDs (d). Section V discusses strategies needed when some LDs lose synchronization with other LDs and the DFC (e).
A detection strategy is deterministic if each LD uses a single deterministic local decision rule and the DFC uses a single deterministic global decision rule. The operating point of the system
It is shown in [5] that under the assumption that the local observations
u0=γ0(U)={0Λ(U)<η01Λ(U)≥η0 | (1) |
uk=γk(yk)={0Λ(yk)<ηk1Λ(yk)≥ηk | (2) |
where
Λ(x)=P(x|H1)P(x|H0). | (3) |
Here,
For a binary parallel decentralized detection system with
The probability of false alarm and the probability of detection of the architecture shown in Fig. 1 are
{Pf=Pr(u0=1|H0)=∑Λ(U)≥η0P(Λ(U)|H0)Pd=Pr(u0=1|H1)=∑Λ(U)≥η0P(Λ(U)|H1). | (4) |
The probability of false alarm and the probability of detection at the
{Pfk=Pr(uk=1|H0)=∫yk|Λ(yk)≥ηkP(yk|H0)dykPdk=Pr(uk=1|H0)=∫yk|Λ(yk)≥ηkP(yk|H1)dyk | (5) |
where
When all the local operating points
{Pf=1∑u1=0…1∑un=0n∏k=1Pukfk(1−Pfk)(1−uk)×U−1(n∏k=1(PdkPfk)uk(1−Pdk1−Pfk)(1−uk)−η0)Pd=1∑u1=0…1∑un=0n∏k=1Pukdk(1−Pdk)(1−uk)×U−1(n∏k=1(PdkPfk)uk(1−Pdk1−Pfk)(1−uk)−η0) | (6) |
where
U−1(x)={0x<01x≥0. | (7) |
In (6), the value of the unit step function provides the global decision
If the local operating points are identical,
{Pf=n∑k(nk)pfk(1−pf)(n−k)Pd=n∑k(nk)pdk(1−pd)(n−k). | (8) |
We consider two cases of finding a deterministic strategy, depending on the local observations.
1) Local Observations Contain No Point Masses of Probability: Hoballah and Varshney [1] studied this case, using a Person-by-Person optimization (PBPO) approach to synthesize
2) Local Observations Contain Point Masses of Probability: If the local observations are discrete and finite, the probability distribution of the local observations contain point masses of probability. In this case, the number of achievable local operating points
Since the vector
Fig. 2 shows the receiver operating characteristic (ROC) curve [12] of a system with discrete local observations (this curve comes from the system we will later introduce in Section III-A). All possible operating points of the system are shown as blue circles. The probability of false alarm constraint
Performance of the architecture of Fig. 1 under the circumstance such as the one described in Fig. 2 can benefit from randomization. By randomization we mean that one or more of the decision makers in the system (an LD or the DFC) is selecting its decision rule (
It is possible that only the DFC employs randomization (e.g., [2], [4], [7], [9]) or that a subset of the of LDs and the DFC employ randomization (independently or dependently). The term “dependent randomization” is used when both the LDs and the DFC employ randomization, and when, in addition, their switching between decision rules is coordinated and synchronized ([4]–[6]).
One possible design has the system of Fig. 1 operate at one of two operating points,
PCf=pPAf+(1−p)PBf | (9) |
PCd=pPAd+(1−p)PBd. | (10) |
In order to satisfy the constraint on the probability of false alarm, we require
p=PBf−αPBf−PAf. | (11) |
If
Fig. 3 shows how randomization connects the isolated operating points shown in the ROC curve of Fig. 2. For example, randomization allows the system to operate at point
1) Randomization at the DFC Only: The authors of [2], [4], [7], [9], [13] studied strategies requiring that the DFC implement randomization, when the local decision rules are deterministic (
Thomopoulos et al. [2] showed that under a Neyman-Pearson criterion, a desired value of global false alarm
2) Dependent Randomization: In dependent randomization (or “a scheduled test” as it is called in [4]), both the DFC and the LDs participate in the randomization. At each time step, the system makes a selection between two deterministic strategies,
Dependent randomization requires a coordinated action between the DFC and the LDs. The DFC and the LDs would switch simultaneously together, back and forth, between
Strategy with randomization at the DFC only (Section II-B-1)) can be considered as a special case of dependent randomization, with
Table I summarizes the input and output of three different designs of a parallel decentralized detection system of Fig. 1.
Input for the design | ||
1. The number of local detectors, n | ||
2. The probability of false alarm constraint, α | ||
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,…,n | ||
Output of a design | ||
Deterministic strategy | 1. One global operating point (Pf,Pd) 2. The corresponding local operating points, (Pfk,Pdk),k=1,…,n | |
Randomization at the DFC only | 1. Two global operating points A=(PAf,PAd) and B=(PBf,PBd) 2. The corresponding local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n 3. The probability of selecting A, p, calculated by (11) 4. The operating point C=(PCf,PCd), calculated by (9) and (10) | The local operating points at A and B are identical (PAfk,PAdk)=(PBfk,PBdk),k=1,…,n |
Dependent randomization | The local operating points at A and B are different (PAfk,PAdk)≠(PBfk,PBdk),k=1,…,n |
In the remaining of the paper, we will use the following two examples to illustrate performance under different strategies.
We consider a system with two LDs (
{P(yk|H0)=14sech2(yk2)P(yk|H1)=14sech2(yk−2.52). | (12) |
The operating point (
{Pfk=∫∞τk14ssech2(yk2)dyk=12−12tanh(τk2)Pdk=∫∞τk14ssech2(yk−2.52)dyk=12−12tanh(τk−2.52) | (13) |
where
τk=yk|Λ(yk)=ηk. | (14) |
We want to design the system under a Neyman-Pearson criterion with
In Fig. 4, the ROC curves of this system, using the
Pd=(12−12tanh βAND−2.52)2,whereβAND=ln√Pf−PfPf. | (15) |
The ROC curve of the
Pd=1−(12+12tanh βOR−2.52)2,whereβOR=ln1+√1−Pf−PfPf. | (16) |
Although the two individual ROC curves are both concave, the team ROC curve of the system (which is the upper boundary of the two curves) is not. The point of intersection of the two ROC curves is
Referring to Fig. 4, if the 2-LD system uses a deterministic strategy to achieve the highest possible
Referring to Fig. 5 (which shows the ROC curve for
Fig. 5 shows the operating points of the 2-LD system employing different detection strategies. The blue circle
In this example the operating point achieved by the system employing Randomization at the DFC only is also
The value of
Under the Neyman-Pearson criterion with
Input for the design | |
1. The number of local detectors, n=2 | |
2. The probability of false alarm constraint, α=0.2009 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2, shown in (12) | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.2009,0.8217) |
2. The system operates at G when both LDs operate at (PGf1,PGd1)=(PGf2,PGd2)=(0.4482,0.9065) and the DFC uses the AND fusion rule | |
Randomization at the DFC | Same as deterministic strategy (Randomization at the DFC does not improve the system performance since the local observations are continuous) |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.1581,0.7870) and B=(PBf,PBd)=(0.2437,0.8652) |
2. The system operates at A when both LDs operate at (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871) and the DFC uses the AND fusion rule The system operates at B when both LDs operate at (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) and the DFC uses the OR fusion rule | |
3. The probability of selecting A is p=0.5 | |
4. The resulting operating point is C=(PCf,PCd)=(0.2009,0.8261) |
We consider the 3-LD implementation of the network shown in Fig. 1 (
We assume that the local observations are statistically independent, conditioned on the hypothesis. From Fig. 6, each LD has 4 distinct local decision rules, corresponding to 4 distinct local observation thresholds,
Under a Neyman-Pearson criterion with the probability of false alarm constraint
Input for the design | |
1. The number of local detectors, n=3 | |
2. The probability of false alarm constraint, α=0.1708 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2,3, shown in Fig. 6 | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.1360,0.7960) |
2. One way to achieve G is that the LDs operate at {(0.1,0.6),(0.2,0.7),(0.2,0.7)} while the DFC uses the fusion rule u0=u1|(u2&u3) | |
Randomization at the DFC | 1. Two operating points A=(PAf,PAd)=(0.1180,0.7680) and B=(PBf,PBd)=(0.1900,0.8400) |
2. When the LDs operate at (0.2,0.7),(0.2,0.7),(0.1,0.6), the DFC can use the fusion rule u0=u2|(u1&u3) to achieve point A=(0.1180,0.7680) and use the fusion rule u0=u1|u2 to achieve point B=(0.1900,0.8400) | |
3. The probability of selecting A is p=0.2667 | |
4. The resulting operating point is E=(PEf,PEd)=(0.1708,0.8208) | |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.104,0.784) and B=(PBf,PBd)=(0.271,0.936) |
2. A is achieved when (Pfk,Pdk)=(0.2,0.7),k=1,2,3, and the DFC uses a “2 out of 3 rule”, B is achieved when (Pfk,Pdk)=(0.1,0.6),k=1,2,3, and the DFC uses a “1 out of 3 rule” | |
3. The probability of selecting A is p=0.6 | |
4. The resulting operating point is C=(PCf,PCd)=(0.1708,0.8448) |
Fig. 7 shows the ROC curves of the 3-LD system with three different designs for
More details of the numerical examples are available in
Dependent randomization assumes synchronization between all the LDs and the DFC. When the synchronization is lost, unless a corrective action is taken, the system may exceed the allowed probability of false alarm
We will demonstrate the approach to corrective action on the 2-LD example in Section III-A (also see [9]). The ROC curves for the
Let
PW∗f=p2PAf+(1−p)2PBf+(1−p)pPM1f+p(1−p)PM2f | (17) |
PW∗d=p2PAd+(1−p)2PBd+(1−p)pPM1d+p(1−p)PM2d. | (18) |
In Fig. 8, the operating point
A special case occurs when the global fusion rules at point
If the DFC realizes that the synchronization with the group of LDs was lost, it may have the opportunity to take a corrective action to try to satisfy the probability of false alarm constraint
PC∗f=pqPAf+(1−p)(1−q)PBf+p(1−q)PM1f+(1−p)qPM2f | (19) |
PC∗d=pqPAd+(1−p)(1−q)PBd+p(1−q)PM1d+(1−p)qPM2d. | (20) |
The role of
Let
PQ0f(q=0)=(1−p)PBf+pPM1f | (21) |
PQ0d(q=0)=(1−p)PBd+pPM1d | (22) |
PQ1f(q=1)=pPAf+(1−p)PM2f | (23) |
PQ1d(q=1)=pPAd+(1−p)PM2d. | (24) |
The value of
q=PQ0f−αPQ0f−PQ1f=[PBf−p(PBf−PM1f)]−α[PBf−p(PBf−PM1f)]−[PM2f+p(PAf−PM2f)]. | (25) |
It is usable only if
Recall that before we lost synchronization, dependent randomization would be useful if the probability of false alarm constraint
Using (25), the conditions on the new probability of randomization at the DFC
Value of α | Existence of q | Value of PC∗f | |
PQ0f<PQ1f | α∈(−∞,PQ0f) | q does not exist | – |
α∈[PQ0f,PQ1f] | q∈[0,1] | PC∗f=α | |
α∈(PQ1f,∞) | q=1 | PC∗f=PQ1f | |
PQ0f≥PQ1f | α∈(−∞,PQ1f) | q does not exist | – |
α∈[PQ1f,PQ0f] | q∈[0,1] | PC∗f=α | |
α∈(PQ0f,∞) | q=0 | PC∗f=PQ0f |
So far we have referred to the 2-LD example in Section III-A. In the general case, points
1) 2-LD System: The design input and output of the 2-LD system employing dependent randomization with
Output of the non-synchronized 2-LD system before the corrective action is taken (α=0.2009) |
1. The probability of false alarm constraint, α=0.2009 |
2. The probability of selecting A, p=0.5, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1581,0.7870), B=(0.2437,0.8652), M1=(0.6371,0.9873), and M2=(0.0170,0.4004) |
4. The operating point of the non-synchronized system, W∗=(0.2640,0.7600), calculated by (17) and (18) |
Output of the non-synchronized 2-LD system after the corrective action is taken (α=0.2009) |
1. The new probability for the DFC selecting γA0, q=0.6787, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.2009,0.7005), calculated by (19) and (20) |
2) 3-LD System: The design input and output of the 3-LD system employing dependent randomization with
Output of the non-synchronized 3-LD system before the corrective action is taken (α=0.1708) |
1. The probability of false alarm constraint, α=0.1708 |
2. The probability of selecting A, p=0.6, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1040,0.7840), B=(0.2710,0.9360), M1=(0.4880,0.9730), and M2=(0.0280,0.6480) |
4. The operating point of the non-synchronized system, W∗=(0.2046,0.8210), calculated by (17) and (18) |
Output of the non-synchronized 3-LD system after the corrective action is taken (α=0.1708) |
1. The new probability for the DFC selecting γA0, q=0.7033, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.1708,0.7974), calculated by (19) and (20) |
More details of the numerical examples are available in
We assume that a decision fusion architecture was designed per Section II-B-2) (Dependent randomization) to maximize the probability of detection under a probability of false alarm constraint. This approach means that the LDs and the DFC are designed to operate at any given time at one of two operating points (say A and B). They operate at operating point A (corresponding to deterministic strategy
In the previous section (IV: Loss of Synchronization Between the DFC and the LDs Group), we assumed that in spite of loss of synchronization between the DFC and the LDs group, all LDs were still synchronized with each other. Under this circumstance, the DFC can in some cases change the probability
In this section, we assume a synchronization failure of the following characteristics:
a) Only
b) The remaining
c) The DFC is aware of a) and b) and of the identity of members in
Each LD of the system (say LD
Since
The input of the redesigned algorithm is shown in Table VII.
Input of the redesigned algorithm | |
The design input of dependent randomization (Table I) | 1. The number of local detectors, n |
2. The probability of false alarm constraint, α | |
The design output of dependent randomization (Table I) | 3. The local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n |
4. The probability of selecting A, p, calculated by (11) | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m (we assume Y={LD1,…,LDm} are synchronized) |
6. Identity of all synchronized LDs, Y={LD1,…,LDm} |
The local operating points of the
In order to satisfy the Neyman-Pearson criterion, under the new condition we can try to redesign the global fusion rules at the DFC. At each time step, the DFC will now use
We use (6) to calculate the operating points, corresponding to all the monotonic fusion rules, for both system A and system B. The calculated operating points are isolated in the
ROC curve A can be drawn as a sequence of straight line segments
In Fig. 13, the ROC curve of the 2-LD system (Section III-A) with dependent randomization is shown as the black curve. Recall (Figs. 4 and 5) that to create this curve, we have integrated two different ROC curves (one corresponding to an
Suppose that
Let
α=pPaf+(1−p)Pbf. | (26) |
This design would yield the probability of detection
Pd=pPad+(1−p)Pbd. | (27) |
We now proceed to locate the specific point on ROC curve A, denoted
PC′f=pPA′f+(1−p)PB′f | (28) |
PC′d=pPA′d+(1−p)PB′d. | (29) |
It can be shown that for
We can examine every point in
1) For each operating point
2) For each operating point
3) Let
Computational complexity: in steps 1) and 2) we examine
In most cases, when
Let the probabilities needed to redesign
PB′f=q′PωBaf+(1−q′)PωBbf. | (30) |
Therefore,
PC′f=pPA′f+(1−p)[q′PωBaf+(1−q′)PωBbf]. | (31) |
Since
q′=α−pPA′f−(1−p)PωBbf(1−p)(PωBaf−PωBbf). | (32) |
The probability of detection
PC′d=pPA′d+p[q′PωBad+(1−q′)PωBbd]. | (33) |
Similarly, when
PC′d=(1−p)PB′d+p[q″PωAad+(1−q″)PωAbd] | (34) |
α=(1−p)PB′f+p[q″PωAaf+(1−q″)PωAbf]. | (35) |
q″=α−(1−p)PB′f−pPωAbfp(PωAaf−PωAbf). | (36) |
In the case
1) 2-LD System: In Fig. 14, the black curve is the ROC curve of the 2-LD example in Section III-A when using dependent randomization. The design input and output of the 2-LD system employing dependent randomization with
If
PW′f=p2PAf+(1−p)2PBf+p(1−p)PM1′f+(1−p)pPM2′f | (37) |
PW′d=p2PAd+(1−p)2PBd+p(1−p)PM1′d+(1−p)pPM2′d. | (38) |
In this case,
Input of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
The design input of dependent randomization (Table II) | 1. The number of local detectors, n=2 |
2. The probability of false alarm constraint, α=0.2009 | |
The design output of dependent randomization (Table II) | 3. The local operating points of A: (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871), The local operating points of B: (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) |
4. The probability of selecting A, p=0.5 | |
Information at the synchronized LDs | 5. Numbers of synchronized LDs, m=1 |
6. Identity of all synchronized LDs, Y={LD1} | |
Output of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
1. ΩA={(0,0),(0.1049,0.6742),(0.3976,0.8871),(0.5566,0.9729),(1,1)}, ΩB={(0,0),(0.0344,0.4809),(0.1304,0.6328),(0.3599,0.9119),(1,1)} | |
2. Two operating points A′=(0.1049,0.6742)∈ΩA and B′=(0.2968,0.8410)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(AND fusion rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1304,0.6328)(achieved by the fusion rule such that u0=u1) with probability q′ and ωBb=(0.3599,0.9199)(achieved by the OR fusion rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.2009,0.7547), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
In this example, when the DFC realizes that the
Table VIII provides a summary of the input and output of the redesigned algorithm for the 2-LD system employing dependent randomization when
Fig. 15 and Table IX compare the operating points of the 2-LD system under the Neyman-Pearson criterion with
Detection strategy | α=0.2009 | |
1 | Deterministic strategy | G=(0.2009,0.8217) |
2 | Randomization at the DFC | G=(0.2009,0.8217) |
3 | Dependent randomization (synchronized) | C=(0.2009,0.8261) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.2009,0.7005) |
5 | Dependent randomization (the 2nd LD is unsynchronized with the DFC and other LDs) | C′=(0.2009,0.7547) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.2009,0.7008) |
a) Deterministic strategy and randomization at the DFC (
b) Dependent randomization (
c) Dependent randomization when the LDs group lost synchronization with the DFC before the redesigned algorithm is applied (
d) Dependent randomization when the
e) Dependent randomization when both two LDs lost synchronization with each other and the DFC before the redesigned algorithm is applied (
2) 3-LD System: Returning to the 3-LD system (Section III-B), we show in Fig. 16 what happen when
Input of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
The design input of dependent randomization (Table III) | 1. The number of local detectors, n=3 |
2. The probability of false alarm constraint, α=0.1708 | |
The design output of dependent randomization (Table III) | 3. The local operating points of A: (Pfk,Pdk)=(0.2,0.7),k=1,2,3, The local operating points of B: (Pfk,Pdk)=(0.1,0.6),k=1,2,3 |
4. The probability of selecting A, p=0.6 | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m=2 |
6. Identity of all synchronized LDs, Y={LD1,LD2} | |
Output of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
1. ΩA={(0,0),(0.0064,0.3234),(0.0576,0.6006),(0.0912,0.7672),(0.1936,0.8266),(0.4624,0.9694),(1,1)}, ΩB={(0,0),(0.0016,0.2376),(0.0100,0.3600),(0.0388,0.6768),(0.1900,0.8400),(0.3196,0.9456),(1,1)} | |
2. Two operating points A′=(0.0912,0.7672)∈ΩA and B′=(0.2902,0.9216)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(2 out of 3 rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1900,0.8400)(achieved by the fusion rule such that u0=u1|u2) with probability q′ and ωBb=(0.3196,0.9456)(achieved by the 1 out of 3 rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.1708,0.8290), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
Fig. 17 compares the operating points of the 3-LD system under the Neyman-Pearson criterion with
a) Deterministic strategy (
b) Randomization at the DFC (
c) Dependent randomization (
d) Dependent randomization when the LDs group lost synchronization with the DFC before the redesigned algorithm is applied (
e) Dependent randomization when the
f) Dependent randomization when both two LDs lost synchronization with each other and the DFC before the redesigned algorithm is applied (
Table XI shows the operating points of the 3-LD system employing different detection strategies under the Neyman-Pearson criterion with a)
Detection strategy | α=0.1708 | α=0.05 | |
1 | Deterministic strategy | G=(0.1360,0.7960) | (0.0460,0.6960) |
2 | Randomization at the DFC | E=(0.1708,0.8208) | (0.0500,0.7000) |
3 | Dependent randomization (synchronized) | C=(0.1708,0.8448) | (0.0500,0.7031) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.1708,0.7974) | (0.0500,0.7031) |
5 | Dependent randomization (the 3rd LD is unsynchronized with the DFC and other LDs) | C′=(0.1708,0.8290) | (0.0500,0.5704) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.1708,0.8009) | (0.0500,0.5534) |
An example of a larger system (with seven LDs) is available in
In parallel binary decentralized detection networks, dependent randomization can sometimes make the team’s Receiver Operating Characteristic curve concave (if it was non-concave under other detection schemes). This effect improves the system’s performance under a Neyman-Pearson criterion by realizing a higher probability of detection for the same upper bound on the probability of false alarm. Dependent randomization requires that the DFC and the LDs be synchronized, guided by a coordinated randomization scheme. The DFC and the LDs switch simultaneously together, back and forth, between
[1] |
I. Y. Hoballah and P. K. Varshney, “Neyman-Pearson detection with distributed sensors,” in Proc. 25th IEEE Conf. Decision and Control, vol. 25, pp. 237–241, 1986.
|
[2] |
S. Thomopoulos, R. Viswanathan, and D. Bougoulias, “Optimal distributed decision fusion,” IEEE Trans. Aerospace and Alectronic Aystems, vol. 25, no. 5, pp. 761–765, 1989.
|
[3] |
M. Kam, W. Chang, and Q. Zhu, “Hardware complexity of binary distributed detection systems with isolated local Bayesian detectors,” IEEE Trans. Systems,Man and Cybernetics, vol. 21, no. 3, pp. 565–571, 1991. doi: 10.1109/21.97477
|
[4] |
P. Willett and D. Warren, “The suboptimality of randomized tests in distributed and quantized detection systems,” IEEE Trans. Information Theory, vol. 38, no. 2, pp. 355–361, 1992. doi: 10.1109/18.119692
|
[5] |
J. N. Tsitsiklis, “Decentralized detection,” Advances in Statistical Signal Processing, vol. 2, no. 2, pp. 297–344, 1993.
|
[6] |
J. D. Papastavrou and M. Athans, “The team ROC curve in a binary hypothesis testing environment,” IEEE Trans. Aerospace and Electronic Systems, vol. 31, no. 1, pp. 96–105, 1995. doi: 10.1109/7.366296
|
[7] |
Y. I. Han, “Randomized fusion rules can be optimal in distributed Neyman-Pearson detectors,” IEEE Trans. Information Theory, vol. 43, no. 4, pp. 1281–1288, 1997. doi: 10.1109/18.605596
|
[8] |
S. Acharya, J. Wang, and M. Kam, “Distributed decision fusion using the Neyman-Pearson criterion,” in Proc. 17th IEEE Int. Conf. Information Fusion, pp. 1–7, 2014.
|
[9] |
W. Dong and M. Kam, “Parallel decentralized detection with dependent randomization,” in Proc. 52nd IEEE Annu. Conf. Information Sciences and Systems, pp. 1–6, 2018.
|
[10] |
P. K. Varshney, E. Masazade, P. Ray, and R. Niu, “Distributed detection in wireless sensor networks,” in Distributed Data Fusion for Network-Centric Operations, D. Hall, C.-Y. Chong, J. Llinas, and M. Liggins II, Eds., ch. 4, CRC Press, 2013.
|
[11] |
A. T. Zijlstra, Calculating the 8th Dedekind Number. Ph.D. Thesis, University of Groningen, 2013.
|
[12] |
H. L. Van Trees, Detection, Estimation, and Modulation Theory, Section 2.2.2. Wiley, 1968.
|
[13] |
Q. Yan and R. S. Blum, “On some unresolved issues in finding optimum distributed detection schemes,” IEEE Trans. Signal Processing, vol. 48, no. 12, pp. 3280–3288, 2000.
|
[14] |
J. Luo, J. Ni, and Z. Liu, “Distributed decision fusion under nonideal communication channels with adaptive topology,” Information Fusion, vol. 45, pp. 190–201, 2019. doi: 10.1016/j.inffus.2018.02.001
|
[15] |
M. A. Al-Jarrah, A. Al-Dweik, M. Kalil, and S. S. Ikki, “Decision fusion in distributed cooperative wireless sensor networks,” IEEE Trans. Vehicular Technology, vol. 68, no. 1, pp. 797–811, 2018.
|
[16] |
Y. He, S. Li, and Y. Zheng, “Distributed state estimation for leak detection in water supply networks,” IEEE/CAA J. Autom. Sinica, pp. 1–9, 2017. DOI: 10.1109/JAS.2017.7510367
|
[17] |
M. Ghahramani, M. Zhou, and C. T. Hon, “Mobile phone data analysis: A spatial exploration toward hotspot detection,” IEEE Trans. Automation Science and Engineering, vol. 16, no. 1, pp. 351–362, 2018.
|
[18] |
J. Cheng, M. Chen, M. Zhou, S. Gao, C. Liu, and C. Liu, “Overlapping community change-point detection in an evolving network,” IEEE Trans. Big Data, vol. 6, no. 1, pp. 189–200, 2020. doi: 10.1109/TBDATA.2018.2880780
|
[1] | Siwei Lou, Chunjie Yang, Zhe Liu, Shaoqi Wang, Hanwen Zhang, Ping Wu. Release Power of Mechanism and Data Fusion: A Hierarchical Strategy for Enhanced MIQ-Related Modeling and Fault Detection in BFIP[J]. IEEE/CAA Journal of Automatica Sinica. doi: 10.1109/JAS.2024.124821 |
[2] | Jinyuan Liu, Xingyuan Li, Zirui Wang, Zhiying Jiang, Wei Zhong, Wei Fan, Bin Xu. PromptFusion: Harmonized Semantic Prompt Learning for Infrared and Visible Image Fusion[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(3): 502-515. doi: 10.1109/JAS.2024.124878 |
[3] | Jiaxing Li, Zidong Wang, Jun Hu, Hongli Dong, Hongjian Liu. Cubature Kalman Fusion Filtering Under Amplify-and-Forward Relays With Randomly Varying Channel Parameters[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(2): 356-368. doi: 10.1109/JAS.2024.124590 |
[4] | Qingyuan Ji, Xiaoyue Wen, Junchen Jin, Yongdong Zhu, Yisheng Lv. Urban Traffic Control Meets Decision Recommendation System: A Survey and Perspective[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(10): 2043-2058. doi: 10.1109/JAS.2024.124659 |
[5] | Xiongbo Wan, Chaoling Zhang, Fan Wei, Chuan-Ke Zhang, Min Wu. Hybrid Dynamic Variables-Dependent Event-Triggered Fuzzy Model Predictive Control[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(3): 723-733. doi: 10.1109/JAS.2023.123957 |
[6] | Yanxia Tan, Zhenkun Huang. Synchronization of Drive-Response Networks With Delays on Time Scales[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 1063-1065. doi: 10.1109/JAS.2016.7510043 |
[7] | Xiang Li, Yixiao Xu, Naipeng Li, Bin Yang, Yaguo Lei. Remaining Useful Life Prediction With Partial Sensor Malfunctions Using Deep Adversarial Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(1): 121-134. doi: 10.1109/JAS.2022.105935 |
[8] | Tangyike Zhang, Junxiang Zhan, Jiamin Shi, Jingmin Xin, Nanning Zheng. Human-Like Decision-Making of Autonomous Vehicles in Dynamic Traffic Scenarios[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(10): 1905-1917. doi: 10.1109/JAS.2023.123696 |
[9] | Yunfan Zhang, Feng Liu, Yifan Su, Yue Chen, Zhaojian Wang, João P. S. Catalão. Two-Stage Robust Optimization Under Decision Dependent Uncertainty[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(7): 1295-1306. doi: 10.1109/JAS.2022.105512 |
[10] | Mykhailo Ivanov, Oleg Sergyienko, Vera Tyrsa, Lars Lindner, Wendy Flores-Fuentes, Julio Cesar Rodríguez-Quiñonez, Wilmar Hernandez, Paolo Mercorelli. Influence of Data Clouds Fusion From 3D Real-Time Vision System on Robotic Group Dead Reckoning in Unknown Terrain[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(2): 368-385. doi: 10.1109/JAS.2020.1003027 |
[11] | Wangli He, Zekun Mo, Qing-Long Han, Feng Qian. Secure Impulsive Synchronization in Lipschitz-Type Multi-Agent Systems Subject to Deception Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(5): 1326-1334. doi: 10.1109/JAS.2020.1003297 |
[12] | Tongle Zhou, Mou Chen, Jie Zou. Reinforcement Learning Based Data Fusion Method for Multi-Sensors[J]. IEEE/CAA Journal of Automatica Sinica, 2020, 7(6): 1489-1497. doi: 10.1109/JAS.2020.1003180 |
[13] | Fei-Yue Wang, Jie Zhang, Qinglai Wei, Xinhu Zheng, Li Li. PDP: Parallel Dynamic Programming[J]. IEEE/CAA Journal of Automatica Sinica, 2017, 4(1): 1-5. |
[14] | Subir Das, Vijay K Yadav. Stability Analysis, Chaos Control of Fractional Order Vallis and El-Nino Systems and Their Synchronization[J]. IEEE/CAA Journal of Automatica Sinica, 2017, 4(1): 114-124. |
[15] | Xu Quan, Zhuang Shengxian, Zeng Yingfeng, Xiao Jian. Decentralized Adaptive Strategies for Synchronization of Fractional-order Complex Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2017, 4(3): 543-550. doi: 10.1109/JAS.2016.7510142 |
[16] | Zeeshan Alam, Liguo Yuan, Qigui Yang. Chaos and Combination Synchronization of a New Fractional-order System with Two Stable Node-foci[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(2): 157-164. |
[17] | Ling Wang, Shengyao Wang, Xiaolong Zheng. A Hybrid Estimation of Distribution Algorithm for Unrelated Parallel Machine Scheduling with Sequence-Dependent Setup Times[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(3): 235-246. |
[18] | Shiming Chen, Xiaoling Chen, Zhengkai Pei, Xingxing Zhang, Huajing Fang. Distributed Filtering Algorithm Based on Tunable Weights Under Untrustworthy Dynamics[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(2): 225-232. |
[19] | Zhenyuan Guo, Shaofu Yang, Jun Wang. Global Synchronization of Stochastically Disturbed Memristive Neurodynamics via Discontinuous Control Laws[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(2): 121-131. |
[20] | Long Ma, Haibo Min, Shicheng Wang, Yuan Liu, Shouyi Liao. An Overview of Research in Distributed Attitude Coordination Control[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(2): 121-133. |
Input for the design | ||
1. The number of local detectors, n | ||
2. The probability of false alarm constraint, α | ||
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,…,n | ||
Output of a design | ||
Deterministic strategy | 1. One global operating point (Pf,Pd) 2. The corresponding local operating points, (Pfk,Pdk),k=1,…,n | |
Randomization at the DFC only | 1. Two global operating points A=(PAf,PAd) and B=(PBf,PBd) 2. The corresponding local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n 3. The probability of selecting A, p, calculated by (11) 4. The operating point C=(PCf,PCd), calculated by (9) and (10) | The local operating points at A and B are identical (PAfk,PAdk)=(PBfk,PBdk),k=1,…,n |
Dependent randomization | The local operating points at A and B are different (PAfk,PAdk)≠(PBfk,PBdk),k=1,…,n |
Input for the design | |
1. The number of local detectors, n=2 | |
2. The probability of false alarm constraint, α=0.2009 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2, shown in (12) | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.2009,0.8217) |
2. The system operates at G when both LDs operate at (PGf1,PGd1)=(PGf2,PGd2)=(0.4482,0.9065) and the DFC uses the AND fusion rule | |
Randomization at the DFC | Same as deterministic strategy (Randomization at the DFC does not improve the system performance since the local observations are continuous) |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.1581,0.7870) and B=(PBf,PBd)=(0.2437,0.8652) |
2. The system operates at A when both LDs operate at (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871) and the DFC uses the AND fusion rule The system operates at B when both LDs operate at (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) and the DFC uses the OR fusion rule | |
3. The probability of selecting A is p=0.5 | |
4. The resulting operating point is C=(PCf,PCd)=(0.2009,0.8261) |
Input for the design | |
1. The number of local detectors, n=3 | |
2. The probability of false alarm constraint, α=0.1708 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2,3, shown in Fig. 6 | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.1360,0.7960) |
2. One way to achieve G is that the LDs operate at {(0.1,0.6),(0.2,0.7),(0.2,0.7)} while the DFC uses the fusion rule u0=u1|(u2&u3) | |
Randomization at the DFC | 1. Two operating points A=(PAf,PAd)=(0.1180,0.7680) and B=(PBf,PBd)=(0.1900,0.8400) |
2. When the LDs operate at (0.2,0.7),(0.2,0.7),(0.1,0.6), the DFC can use the fusion rule u0=u2|(u1&u3) to achieve point A=(0.1180,0.7680) and use the fusion rule u0=u1|u2 to achieve point B=(0.1900,0.8400) | |
3. The probability of selecting A is p=0.2667 | |
4. The resulting operating point is E=(PEf,PEd)=(0.1708,0.8208) | |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.104,0.784) and B=(PBf,PBd)=(0.271,0.936) |
2. A is achieved when (Pfk,Pdk)=(0.2,0.7),k=1,2,3, and the DFC uses a “2 out of 3 rule”, B is achieved when (Pfk,Pdk)=(0.1,0.6),k=1,2,3, and the DFC uses a “1 out of 3 rule” | |
3. The probability of selecting A is p=0.6 | |
4. The resulting operating point is C=(PCf,PCd)=(0.1708,0.8448) |
Value of α | Existence of q | Value of PC∗f | |
PQ0f<PQ1f | α∈(−∞,PQ0f) | q does not exist | – |
α∈[PQ0f,PQ1f] | q∈[0,1] | PC∗f=α | |
α∈(PQ1f,∞) | q=1 | PC∗f=PQ1f | |
PQ0f≥PQ1f | α∈(−∞,PQ1f) | q does not exist | – |
α∈[PQ1f,PQ0f] | q∈[0,1] | PC∗f=α | |
α∈(PQ0f,∞) | q=0 | PC∗f=PQ0f |
Output of the non-synchronized 2-LD system before the corrective action is taken (α=0.2009) |
1. The probability of false alarm constraint, α=0.2009 |
2. The probability of selecting A, p=0.5, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1581,0.7870), B=(0.2437,0.8652), M1=(0.6371,0.9873), and M2=(0.0170,0.4004) |
4. The operating point of the non-synchronized system, W∗=(0.2640,0.7600), calculated by (17) and (18) |
Output of the non-synchronized 2-LD system after the corrective action is taken (α=0.2009) |
1. The new probability for the DFC selecting γA0, q=0.6787, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.2009,0.7005), calculated by (19) and (20) |
Output of the non-synchronized 3-LD system before the corrective action is taken (α=0.1708) |
1. The probability of false alarm constraint, α=0.1708 |
2. The probability of selecting A, p=0.6, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1040,0.7840), B=(0.2710,0.9360), M1=(0.4880,0.9730), and M2=(0.0280,0.6480) |
4. The operating point of the non-synchronized system, W∗=(0.2046,0.8210), calculated by (17) and (18) |
Output of the non-synchronized 3-LD system after the corrective action is taken (α=0.1708) |
1. The new probability for the DFC selecting γA0, q=0.7033, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.1708,0.7974), calculated by (19) and (20) |
Input of the redesigned algorithm | |
The design input of dependent randomization (Table I) | 1. The number of local detectors, n |
2. The probability of false alarm constraint, α | |
The design output of dependent randomization (Table I) | 3. The local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n |
4. The probability of selecting A, p, calculated by (11) | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m (we assume Y={LD1,…,LDm} are synchronized) |
6. Identity of all synchronized LDs, Y={LD1,…,LDm} |
Input of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
The design input of dependent randomization (Table II) | 1. The number of local detectors, n=2 |
2. The probability of false alarm constraint, α=0.2009 | |
The design output of dependent randomization (Table II) | 3. The local operating points of A: (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871), The local operating points of B: (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) |
4. The probability of selecting A, p=0.5 | |
Information at the synchronized LDs | 5. Numbers of synchronized LDs, m=1 |
6. Identity of all synchronized LDs, Y={LD1} | |
Output of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
1. ΩA={(0,0),(0.1049,0.6742),(0.3976,0.8871),(0.5566,0.9729),(1,1)}, ΩB={(0,0),(0.0344,0.4809),(0.1304,0.6328),(0.3599,0.9119),(1,1)} | |
2. Two operating points A′=(0.1049,0.6742)∈ΩA and B′=(0.2968,0.8410)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(AND fusion rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1304,0.6328)(achieved by the fusion rule such that u0=u1) with probability q′ and ωBb=(0.3599,0.9199)(achieved by the OR fusion rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.2009,0.7547), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
Detection strategy | α=0.2009 | |
1 | Deterministic strategy | G=(0.2009,0.8217) |
2 | Randomization at the DFC | G=(0.2009,0.8217) |
3 | Dependent randomization (synchronized) | C=(0.2009,0.8261) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.2009,0.7005) |
5 | Dependent randomization (the 2nd LD is unsynchronized with the DFC and other LDs) | C′=(0.2009,0.7547) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.2009,0.7008) |
Input of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
The design input of dependent randomization (Table III) | 1. The number of local detectors, n=3 |
2. The probability of false alarm constraint, α=0.1708 | |
The design output of dependent randomization (Table III) | 3. The local operating points of A: (Pfk,Pdk)=(0.2,0.7),k=1,2,3, The local operating points of B: (Pfk,Pdk)=(0.1,0.6),k=1,2,3 |
4. The probability of selecting A, p=0.6 | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m=2 |
6. Identity of all synchronized LDs, Y={LD1,LD2} | |
Output of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
1. ΩA={(0,0),(0.0064,0.3234),(0.0576,0.6006),(0.0912,0.7672),(0.1936,0.8266),(0.4624,0.9694),(1,1)}, ΩB={(0,0),(0.0016,0.2376),(0.0100,0.3600),(0.0388,0.6768),(0.1900,0.8400),(0.3196,0.9456),(1,1)} | |
2. Two operating points A′=(0.0912,0.7672)∈ΩA and B′=(0.2902,0.9216)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(2 out of 3 rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1900,0.8400)(achieved by the fusion rule such that u0=u1|u2) with probability q′ and ωBb=(0.3196,0.9456)(achieved by the 1 out of 3 rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.1708,0.8290), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
Detection strategy | α=0.1708 | α=0.05 | |
1 | Deterministic strategy | G=(0.1360,0.7960) | (0.0460,0.6960) |
2 | Randomization at the DFC | E=(0.1708,0.8208) | (0.0500,0.7000) |
3 | Dependent randomization (synchronized) | C=(0.1708,0.8448) | (0.0500,0.7031) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.1708,0.7974) | (0.0500,0.7031) |
5 | Dependent randomization (the 3rd LD is unsynchronized with the DFC and other LDs) | C′=(0.1708,0.8290) | (0.0500,0.5704) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.1708,0.8009) | (0.0500,0.5534) |
Input for the design | ||
1. The number of local detectors, n | ||
2. The probability of false alarm constraint, α | ||
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,…,n | ||
Output of a design | ||
Deterministic strategy | 1. One global operating point (Pf,Pd) 2. The corresponding local operating points, (Pfk,Pdk),k=1,…,n | |
Randomization at the DFC only | 1. Two global operating points A=(PAf,PAd) and B=(PBf,PBd) 2. The corresponding local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n 3. The probability of selecting A, p, calculated by (11) 4. The operating point C=(PCf,PCd), calculated by (9) and (10) | The local operating points at A and B are identical (PAfk,PAdk)=(PBfk,PBdk),k=1,…,n |
Dependent randomization | The local operating points at A and B are different (PAfk,PAdk)≠(PBfk,PBdk),k=1,…,n |
Input for the design | |
1. The number of local detectors, n=2 | |
2. The probability of false alarm constraint, α=0.2009 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2, shown in (12) | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.2009,0.8217) |
2. The system operates at G when both LDs operate at (PGf1,PGd1)=(PGf2,PGd2)=(0.4482,0.9065) and the DFC uses the AND fusion rule | |
Randomization at the DFC | Same as deterministic strategy (Randomization at the DFC does not improve the system performance since the local observations are continuous) |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.1581,0.7870) and B=(PBf,PBd)=(0.2437,0.8652) |
2. The system operates at A when both LDs operate at (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871) and the DFC uses the AND fusion rule The system operates at B when both LDs operate at (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) and the DFC uses the OR fusion rule | |
3. The probability of selecting A is p=0.5 | |
4. The resulting operating point is C=(PCf,PCd)=(0.2009,0.8261) |
Input for the design | |
1. The number of local detectors, n=3 | |
2. The probability of false alarm constraint, α=0.1708 | |
3. Conditional probability distributions of the local observations, P(yk|H0) and P(yk|H1), k=1,2,3, shown in Fig. 6 | |
Output of a design | |
Deterministic strategy | 1. System operating point G=(PGf,PGd)=(0.1360,0.7960) |
2. One way to achieve G is that the LDs operate at {(0.1,0.6),(0.2,0.7),(0.2,0.7)} while the DFC uses the fusion rule u0=u1|(u2&u3) | |
Randomization at the DFC | 1. Two operating points A=(PAf,PAd)=(0.1180,0.7680) and B=(PBf,PBd)=(0.1900,0.8400) |
2. When the LDs operate at (0.2,0.7),(0.2,0.7),(0.1,0.6), the DFC can use the fusion rule u0=u2|(u1&u3) to achieve point A=(0.1180,0.7680) and use the fusion rule u0=u1|u2 to achieve point B=(0.1900,0.8400) | |
3. The probability of selecting A is p=0.2667 | |
4. The resulting operating point is E=(PEf,PEd)=(0.1708,0.8208) | |
Dependent randomization | 1. Two operating points A=(PAf,PAd)=(0.104,0.784) and B=(PBf,PBd)=(0.271,0.936) |
2. A is achieved when (Pfk,Pdk)=(0.2,0.7),k=1,2,3, and the DFC uses a “2 out of 3 rule”, B is achieved when (Pfk,Pdk)=(0.1,0.6),k=1,2,3, and the DFC uses a “1 out of 3 rule” | |
3. The probability of selecting A is p=0.6 | |
4. The resulting operating point is C=(PCf,PCd)=(0.1708,0.8448) |
Value of α | Existence of q | Value of PC∗f | |
PQ0f<PQ1f | α∈(−∞,PQ0f) | q does not exist | – |
α∈[PQ0f,PQ1f] | q∈[0,1] | PC∗f=α | |
α∈(PQ1f,∞) | q=1 | PC∗f=PQ1f | |
PQ0f≥PQ1f | α∈(−∞,PQ1f) | q does not exist | – |
α∈[PQ1f,PQ0f] | q∈[0,1] | PC∗f=α | |
α∈(PQ0f,∞) | q=0 | PC∗f=PQ0f |
Output of the non-synchronized 2-LD system before the corrective action is taken (α=0.2009) |
1. The probability of false alarm constraint, α=0.2009 |
2. The probability of selecting A, p=0.5, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1581,0.7870), B=(0.2437,0.8652), M1=(0.6371,0.9873), and M2=(0.0170,0.4004) |
4. The operating point of the non-synchronized system, W∗=(0.2640,0.7600), calculated by (17) and (18) |
Output of the non-synchronized 2-LD system after the corrective action is taken (α=0.2009) |
1. The new probability for the DFC selecting γA0, q=0.6787, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.2009,0.7005), calculated by (19) and (20) |
Output of the non-synchronized 3-LD system before the corrective action is taken (α=0.1708) |
1. The probability of false alarm constraint, α=0.1708 |
2. The probability of selecting A, p=0.6, calculated by (11) |
3. Four possible operating points when the DFC lost synchronization with the LDs group, A=(0.1040,0.7840), B=(0.2710,0.9360), M1=(0.4880,0.9730), and M2=(0.0280,0.6480) |
4. The operating point of the non-synchronized system, W∗=(0.2046,0.8210), calculated by (17) and (18) |
Output of the non-synchronized 3-LD system after the corrective action is taken (α=0.1708) |
1. The new probability for the DFC selecting γA0, q=0.7033, calculated by (25) |
2. The fulfillment of the prerequisite of the correction action, 0<q<1 |
3. The operating point of the non-synchronized system after the corrective action is taken, C∗=(0.1708,0.7974), calculated by (19) and (20) |
Input of the redesigned algorithm | |
The design input of dependent randomization (Table I) | 1. The number of local detectors, n |
2. The probability of false alarm constraint, α | |
The design output of dependent randomization (Table I) | 3. The local operating points of A and B: (PAfk,PAdk) and (PBfk,PBdk),k=1,…,n |
4. The probability of selecting A, p, calculated by (11) | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m (we assume Y={LD1,…,LDm} are synchronized) |
6. Identity of all synchronized LDs, Y={LD1,…,LDm} |
Input of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
The design input of dependent randomization (Table II) | 1. The number of local detectors, n=2 |
2. The probability of false alarm constraint, α=0.2009 | |
The design output of dependent randomization (Table II) | 3. The local operating points of A: (PAf1,PAd1)=(PAf2,PAd2)=(0.3976,0.8871), The local operating points of B: (PBf1,PBd1)=(PBf2,PBd2)=(0.1304,0.6328) |
4. The probability of selecting A, p=0.5 | |
Information at the synchronized LDs | 5. Numbers of synchronized LDs, m=1 |
6. Identity of all synchronized LDs, Y={LD1} | |
Output of the redesigned algorithm for the 2-LD system when LD2 lost synchronization | |
1. ΩA={(0,0),(0.1049,0.6742),(0.3976,0.8871),(0.5566,0.9729),(1,1)}, ΩB={(0,0),(0.0344,0.4809),(0.1304,0.6328),(0.3599,0.9119),(1,1)} | |
2. Two operating points A′=(0.1049,0.6742)∈ΩA and B′=(0.2968,0.8410)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(AND fusion rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1304,0.6328)(achieved by the fusion rule such that u0=u1) with probability q′ and ωBb=(0.3599,0.9199)(achieved by the OR fusion rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.2009,0.7547), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
Detection strategy | α=0.2009 | |
1 | Deterministic strategy | G=(0.2009,0.8217) |
2 | Randomization at the DFC | G=(0.2009,0.8217) |
3 | Dependent randomization (synchronized) | C=(0.2009,0.8261) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.2009,0.7005) |
5 | Dependent randomization (the 2nd LD is unsynchronized with the DFC and other LDs) | C′=(0.2009,0.7547) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.2009,0.7008) |
Input of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
The design input of dependent randomization (Table III) | 1. The number of local detectors, n=3 |
2. The probability of false alarm constraint, α=0.1708 | |
The design output of dependent randomization (Table III) | 3. The local operating points of A: (Pfk,Pdk)=(0.2,0.7),k=1,2,3, The local operating points of B: (Pfk,Pdk)=(0.1,0.6),k=1,2,3 |
4. The probability of selecting A, p=0.6 | |
Information of synchronized LDs | 5. Numbers of synchronized LDs, m=2 |
6. Identity of all synchronized LDs, Y={LD1,LD2} | |
Output of the redesigned algorithm for the 3-LD system when LD3 lost synchronization | |
1. ΩA={(0,0),(0.0064,0.3234),(0.0576,0.6006),(0.0912,0.7672),(0.1936,0.8266),(0.4624,0.9694),(1,1)}, ΩB={(0,0),(0.0016,0.2376),(0.0100,0.3600),(0.0388,0.6768),(0.1900,0.8400),(0.3196,0.9456),(1,1)} | |
2. Two operating points A′=(0.0912,0.7672)∈ΩA and B′=(0.2902,0.9216)∉ΩB, which allow PC′f from (28) satisfying the probability of false alarm constraint α and achieving the highest probability of detection | |
3. The deterministic fusion rule γA′0(2 out of 3 rule) used to achieve A′ | |
4. The randomized fusion rule γB′0 used to achieve B′, which requires the system operating at ωBa=(0.1900,0.8400)(achieved by the fusion rule such that u0=u1|u2) with probability q′ and ωBb=(0.3196,0.9456)(achieved by the 1 out of 3 rule) with probability 1−q′, where q′=0.2748, calculated by (32) | |
5. The operating point of the non-synchronized system after the corrective action is taken, C′=(0.1708,0.8290), calculated by (31) and (33), which is achieved by operating at A′ with probability p and B′ with probability 1−p |
Detection strategy | α=0.1708 | α=0.05 | |
1 | Deterministic strategy | G=(0.1360,0.7960) | (0.0460,0.6960) |
2 | Randomization at the DFC | E=(0.1708,0.8208) | (0.0500,0.7000) |
3 | Dependent randomization (synchronized) | C=(0.1708,0.8448) | (0.0500,0.7031) |
4 | Dependent randomization (the DFC is unsynchronized with the LDs group) | C∗=(0.1708,0.7974) | (0.0500,0.7031) |
5 | Dependent randomization (the 3rd LD is unsynchronized with the DFC and other LDs) | C′=(0.1708,0.8290) | (0.0500,0.5704) |
6 | Dependent randomization (all LDs and the DFC are unsynchronized) | C″=(0.1708,0.8009) | (0.0500,0.5534) |