【源码】入侵检测算法的源代码&PIR传感器的解析建模

在这里插入图片描述

Human-Intrusion-Detect

Source Code for the Intrusion Detection Algorithm & Analytical Modeling of PIR Sensor. IntrusionDetectionAlgorithm.c implements the online phasse of Intrusion Detection Algorithm (shown in Figure below).

We suggest the user refer to the publication/masters thesis for implementation details.

Please feel free to use the code in your research and development works. We would appreciate a citation to the paper below when this code is helpful in obtaining results in your future publications.

Publication for citation:

(1) Abu Sajana R*., R. Subramanian*, P. Vijay Kumar, Syam Krishnan, Bharadwaj Amrutur, Jeena Sebastian, Malati Hegde, S. V. R. Anand, “A Low-Complexity Algorithm for Intrusion Detection in a PIR-Based Wireless Sensor Network,” In 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pages 337–342, Dec 2009.

(2) The SmartDetect WSN Team, “SmartDetect: An efficient WSN implementation for intrusion detection,” Communication Systems and Networks (COMSNETS), 2010 Second International Conference on, Bangalore, 2010, pp. 1-2.

Please find my masters thesis here and my thesis defense slides here.

A Low-Complexity Algorithm for Intrusion Detection in a PIR-Based Wireless Sensor Network

• Investigated the problem of detecting a human intruder in the presence of clutter arising from wind-blown vegetation in a passive infra-red (PIR) based wireless sensor network (WSN).

• Proposed a low-complexity algorithm based on a combination of Haar Transform (HT) and Support Vector Machine (SVM) based training. Extensive field testing of the algorithm was done. The algorithm exhibited a very good performance.

Analytical Model For Intruder Signature

• Goal was to come up with a model for the intruder signature.

• Provided a closed-form expression for a good approximation to the intruder waveform.

• Developed, for the first time in literature, a model for the PIR sensor’s signature.

• Used this to determine how to optimally place multiple sensing nodes so as to estimate the path of the intruder in motion.

更多精彩文章请关注公众号:在这里插入图片描述

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值